Post Job Free
Sign in

Engineer Network

Location:
Charlotte, NC
Posted:
April 08, 2019

Contact this candidate

Resume:

Harish

Network Engineer

Ph. No: 908-***-****

Email Id: ***********.*******@*****.***

Professional Summary:

Experience in Networking, including hands-on experience in IP network design providing network support, installation and analysis.

Network Professional with 9+ Plus years of experience in Designing and troubleshooting LAN,

WAN, MPLS in Branch, Campus and Data Center environments.

Implementation of traffic filters on Cisco routes using Standard, extended Access list.

Expert Level Knowledge about TCP/IP and OSI models.

In-depth expertise in analysis, implementation, troubleshooting & documentation of LAN/WAN

Architecture and good experience on IP services.

Extensively worked on Juniper models EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210 and SRX240.

Experienced in installation, configuration and maintenance of Cisco ASR 9K, 7200, 3900, 2800, 2600, 2500 and 1800 series Router / Cisco Nexus 9500, 7010, 5548, 2148 Catalyst Cisco 6500 (sup 720), 4500 (SUP 6), 3750, 2950 series Switches.

Experience configuring Virtual Device Context in Nexus 9k, 7k, 5k and 2k.

Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF,

LDP, EIGRP, RIP, BGP v4, MPLS

Migration from Cisco to PaloAlto Firewalls platforms PA 4000 and PA 500 and PA- 200 firewalls.

Hands on Experience testing iRules using Browser(IE), HTTP watch, curl, Scripts (shell/batch file/Perl) and host files

Configuring and testing Multicast for both IPv4 and IPv6 routing in Data Environment

Technical Knowledge on Cisco DMZ, ASA 5500 series firewalls.

Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN

Trunks, VTP Ether channel, STP, RSTP and MST.

Experience in troubleshoot network issues including boundary protection devices, Cisco

Nortel/Avaya and Bluecoat Proxy Servers

Configuring Cisco routers and switches to enable and troubleshoot a variety of features such as

Trunk, Vlan, Ether channel, port security, routing protocols including EIGRP, OSPF & BGP and Other related technologies such as multicasting, IP Telephony & IP Video.

Hands-on configuration and experience in setting up Cisco routers to perform functions at the

Access, Distribution, and Core layers.

Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate

Applications and their availability

Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, NOKIA Firewalls

Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall.

Good knowledge on the IDS and IPS Of the Firepower services

Experience using Cisco ASR 1K, 9K series switches.

Working knowledge of frame relay, MPLS services, IPSecVPN's, OSPF, BGP and EIGRP routing protocols, NAT'ing, sub-netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP.

Technical Skills:

Cisco Routers: (1800, 2500, 2600, 2800, 3600, 3750, 3800, 7200), ASR 1K and 9K.

Cisco Switches: (2900, 3500, 4000, 4500, 5000, 5800, 6500, and 7600 Nexus 2k, 3k, 5k and 7k 9k), MSFC, MSFC2.

Juniper: E series, J series and M series. Juniper SRX & Netscreen, T -Series, MX-Series Routers.

Routing Protocol: (BGP, OSPF, EIGRP, ISIS, IGRP, LDAP, IGMP, RIP), Routed Protocol TCP/IP, SIP, Multicasting (PIM), 802.1Q.

LAN Protocol: VLAN, PVLAN, VTP, IPX, Inter-VLAN routing, ISL, dot1q, STP, IS-IS, RSTP, MSTP, IPVST, LACP, HSRP, GLBP, VPC, VDC, Ethernet, Port security.

WAN Technology: Frame Relay, ISDN, ATM, WAAS, PPP, ICMP, WiSM Module in 6509, X.25, L2VPN, L3VPN, E1/T1/DS1/DS3

Network Management: SNMP v2, v3, Syslog, HP Open View NNM, Net flow Analyzer, Sniffer, Wireshark, Cisco Works, Cyber Ark, VSphere5.0, 3Com Network Analyzer, SolarWinds, Orion.

AAA Architecture: TACACS+, RADIUS, Cisco ACS.

Operating systems: Linux, UNIX, DOS, Windows XP/2007/2008, Windows 2003 server and Windows 2008 server

Network Security: NAT/PAT, Ingress &Egress Firewall Design, VPN Configuration Internet Content Filtering, Knowledge of Firewall, ASA, Cisco FWSM/PIX/ASDM, Cisco NAC, IPSEC, Nokia Checkpoint NG, SPLAT, IPS/IDS (Snort), IPS 4260.

Application Protocols: DHCP, DNS, FTP, HTTP, SMTP, TFTP.

Programming Languages: C, C++, Perl, VB Script, Power Shell, Python, SQL

Documentation: Microsoft Office, Visio

Professional Experience:

Charter Spectrum, Charlotte, NC Oct 2017 – Present

Sr. Firewall Engineer

Experience with Firewall administration, Rule analysis, Rule modification

My daily tasks are used to be providing the security between the data centers on the basis of tiers and also give access to the servers which are in two different zones and monitor the traffic.

Provide design solutions to the users based on the requirement and also work on the changes that lead to work on the implementation.

Worked on implementation of major project in charter called Spectrum Mobile to go live and BHN to ICOMS Migration

Worked on the outages and change implementations for issues like timeouts, latency and asymmetrical routing issues

Experience on JUNO Space, NSM (Network and Security Manager) and Pulse secure (SSL VPN), Panorama (Palo Alto), Algosec (Firewall analyzer), Splunk tools.

Responsible for Configuring SITE-TO-SITE VPN on Juniper SRX between headquarters and vendor locations

Contributing to the major charter projects like Tech-mobile and unified buy flow, telemetry and migration (ATIM - BHN to TWC) and Gateway App Servers.

Provided Layer3 (L3) support for project’s like Spectrum Mobile and Tech-Mobile to go live

Worked on configuring new Juniper SRX firewalls 5400, 3600, 1500, 650 devices and also worked on Palo Alto Firewall.

Configured and maintained IPSEC and SSL VPN's, Troubleshoot IAP (Internet Access Points) on Palo Alto Firewalls.

Assisting offshore teams located in Navisite (India & UK) in troubleshooting layer 3 issues and routing protocol issues mostly BGP.

Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.

Experience with Route advertising on Panorama (PALO ALTO), Adding Static Routes on SRX and Net screens

Hands on experience on the Juniper SRX 5400, 3600, 1500, 650,240h, 210he, 100 and also Juniper Net screens ISG1000, SSG-550, 2000 and also on cisco ASA 5585, 5580

Experienced in trouble-shooting both connectivity issues and hardware problems on Juniper based networks.

Troubleshoot traffic passing managed firewalls via logs and packet captures

Configured firewall logging, DMZs, related security policies and monitoring

Provide GG-SSL-VPN access to more than 700 vendors for charter across all over the world.

Strong experience in Network security using ASA Firewall, Juniper, Checkpoint, Palo Alto, IDS/IPS and IPSEC/SSL VPN and implementing security rules.

Experience in Network Tools like SNMP, Wireshark, Splunk, Solarwinds Orion, Network automation ITNA and algosec tool analyzer for the Network Operations.

Experience with the escalation problems for Routing, Switching and firewall connectivity issues using ticketing system Service Now and Jira.

Implementation traffic filters on Cisco routes using Standard and extended Access list.

Experience in implementation and troubleshooting of Datacenter devices like Nexus 7k, Nexus 5k and Nexus 2k Series devices with VDC's /VRF's configurations.

Troubleshooting, optimizing and testing of static and dynamic routing protocols such as OSPF, BGP

Managed inventory of all network hardware, Management and Monitoring by use of SSH, SFTP, SYSLOG, SNMP, NTP, NAT and PAT

Built alert & monitoring scripts for applications & servers using Python & Shell Script

Good experience in deploying complex Routing Policy across different routing protocols.

Environment:

Juniper (SRX 5400, 3600, 1500, 650,240h, 210he, 100), Juniper Net screens ISG1000, SSG-550, 2000 cisco ASA 5585, 5580 Cisco Routers (1900, 2900, 3900, ASR 7200, 9000), Juniper M20, switches (6500/3750/3550 3500/2950), Nexus 7K,5K &2K, BGP, OSPF, SSLVPN, Site-to-Site VPN, MPLS, Ether Channels, Cisco Catalyst Switches, JUNO Space, NSM (Network and Security Manager) and Pulse secure, Panorama, Algosec (Firewall analyzer), JUNO Space, NSM (Network and Security Manager) and, Splunk tools

Caradigm Corp, Bellevue WA Dec 2016 – Sep 2017

Sr. Network Engineer (Data Center)

Responsibilities:

Installed and Configuring Nexus 7004 Switches.

Involved in Design and implementation of Data center migration.

Worked on Migrating all the Vlan’s from Cisco Nx-3k to Nexus 7k switches

Configured Nexus 7004 including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer links.

Performed in Migrating L3 Vlan’s from Cisco ASA 5585-X to nexus 7k switches

Created a static route from ASA to nexus 7k specific for subnets and from nexus to ASA created the default route in order to make nexus 7k live and active on to the network.

Worked on troubleshooting VLAN, STP (Spanning tree protocol), & Switch Trunk and IP subnet issues.

Re-Cabling or Re-wiring the devices in datacenter environment, performing active/standby failover testing on Nx-7004 devices

Hands on experience with Nexus Switches 2K, 5K and 7K.

Working as a Security Escalation Engineer responsible for 100 + Devices that includes Cisco ASA 5585 SSP-60, Cisco Firepower 9300, and Cisco Source fire with URL License Enabled.

Cisco ACI Deployments including POC, Beta Deployment and to the 2 New ACI Based Data Centers build completed.

The ACI deployment is Hybrid L4-7 Integrated Citrix NetScaler and Cisco ASA Firepower 9300 and VMWare based.

Upgrading and Installing IPS (Intrusion prevention system)/ Firepower and Configuring

Good experience in ASA Configuration (5525X & 5515X With Firepower services)

Managed successful delivery of massive security response portfolio including Splunk, Cisco WSA, Cisco IPS, Sourcefire, Firepower and AMP.

Implementing new FirePower and SourceFire Cisco technology

SME for Sourcefire / Cisco Firepower Tasked with Configuration / Implementation, Tuning and Trouble-Shooting

Provided Tier III level support for Sourcefire IDS/IPS and Cisco firepower/firesight Systems

Tasked with Implementation, Trouble-Shooting, Tuning and Training of Cisco Firepower Intrusion Prevention System(IPS)

Extensively working on Cisco ASA 5585-SSP-20

Worked and working with Cisco ASA 5525, 5585-SSP-20 firewalls with current and demonstrated expertise with ACL security in a multi-VLAN environment.

Adding Vlan’s on Cisco ASDM-Launcher

Maintained, upgraded, configured, installed Cisco ASA 5510, 5520, & 5505 Firewalls from the CLI & ASDM

Performing the ACL requests change by collecting source and destination information from them.

Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2B network connectivity.

Configuring ASA Firewall and accept/reject rules for network traffic

Decommissioning the Nexus 7K supervisors and Deploying latest software upgrades on Nexus 7K.

Troubleshooting the various issues while upgrading and installing the new supervisors on Nexus 7K.

In charge of asset tracking, installing VPNs and involved with security assessments.

Working extensively in data center environment migrating the network from two tier to 3 tier environments, writing access-rules on cisco ASA

Extending end to end network support on L2 and L3 switches, configured ASA 5585 appliance and VPN

Configuring F5 Load Balancers: Adding virtual IPs, nodes, pools and health monitoring.

Worked on F5 Load Balancer to load balance the Unified CVP http and https traffic.

Working on the project of F5 LTM and GTM code upgrade project, doing couple of them every week.

Environment:

Cisco ASA 5585-SSP-20, 5525, 5510, 5520, Cisco Routers (1900, 2900, 3900, ASR 7200, 9000), Nexus 7K,5K & 2K, BGP,OSPF,MPLS, Ether Channels, Cisco Catalyst Switches, ASDM Launcher, Firepower, F5 Load Balancer.

Avaya, Thornton CO Sep 2014 – Nov2016

Sr. Network Engineer

Responsibilities:

Performed network engineering, design, planning (WAN & LAN) & implementation. Studied single point failures & designed WAN structure in such a way that there are no failures in network in case of any device or link failure.

Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.

Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between Switches.

L2 and L3 solutions of Cisco routers and switches, including (but not limited to): 2850, 2921, 3945, 3750, 3850

Upgraded the version of the ASA WITH Firepower services and applied the Patches including the Hotfix to the version.

Developed the features of web application projects to create management system for next generation

firepower security devices and performed the unit and integration testing.

Firepower/Firesight deployment across multiple sites for two customers.

Cisco Firepower 9300, and Cisco Source fire with URL License Enabled.

Installation, tuning, and support Cisco Firepower 9300 and ASAv firewall.

Formulate group policies for Citrix and NetScaler accessed apps

Support NetScaler utilizing firewalls and content filtering devices.

Extending end to end network support on L2 and L3 switches

Configuring of Virtual Private Cloud (VPC) with networking of subnets containing servers

Re-Cabling or Re-wiring the devices in datacenter environment, performing active/standby failover testing on Nx-9k devices

Implemented Chef Cookbooks for OS component configuration to keep AWS server's template minimal

Created network architecture on AWS VPC, subnets, Internet Gateway, Route Table and NAT Setup

WLAN design and troubleshooting ranging from isolating issues with WAP configurations to upgrading from Cisco Prime 1.9.x to 3.0.1

Install New monitoring tool “Infoblox” (DNS and DHCP migrated).

Secure Process Networks from business LAN for facilities utilizing PaloAlto and Cisco ASA firewalls as well as performed 'special projects' as needed.

Setup a NetScaler appliance in order to load balance internal server/ Exchange and VDI Streaming Servers and/or TFTP load balancing.

Configured Nexus 9500 including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer links.

Tasked with Implementation, Trouble-Shooting, Tuning and Training of Cisco Firepower Intrusion Prevention System(IPS)

Assisted in the creation of policies and objects for 100+ customers in Firepower console

Create and deployed intrusion, firewall, and ACL policies in Firepower console

Assisted with the deployment of Firepower IDS management system for customer network of over 2k servers

Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corporate Network. Performed Troubleshooting connectivity issues through Blue Coat as well writing and editing web policies.

Configured & managed Security Devices that includes Juniper (Netscreen) Firewalls, F5 BigIP Load balancers, Blue Coat Proxies and Plug Proxies. Worked with PaloAlto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.

Deployed Paloalto /Cisco ASA firewall and IDS thereby securing up to the application layer on the network

Automate and script processes with the PaloAlto Networks Next Gen Firewalls

Troubleshooting the VPC configurations, updating the control plane policy (COPP) on the devices.

Supported Infoblox appliances grid environment for DNS, DHCP and IP Address Management tools (IPv4), for the State Farm enterprise network.

Decommissioning the Nexus 9K supervisors and Deploying latest software upgrades on Nexus 9K.

Troubleshooting the various issues while upgrading and installing the new supervisors on Nexus 9K

Worked on Blue Coat Proxy SG to safeguard web applications (Blacklisting and Whitelisting of web URL) in extremely untrusted environments such as guest Wi-Fi zones.

Worked on design, configuring and managing of Blue Coat Proxy Servers. Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).

Configured and installed Bluecoat Proxy SGs to a newly designed network scheme, from an inline perspective to a WCCP load balanced network layout

Troubleshooted daily VDI, Citirx, NetScaler issue

Editing and Changing PaloAlto Polices and Monitoring threats on firewalls. Analyzed traffic pattern and implemented URL filtering. using the PaloAlto Firewall. Troubleshooting and configuring PaloAlto FW's 3060 & 5060.

Designed security policies on PaloAlto network firewall for controlling what traffic needs to be allowed or blocked based on customer requirements.

Configured and maintained IPSEC and SSL VPN's on PaloAlto Firewalls. Implemented Zone Based Firewalling and Security Rules on the PaloAlto Firewall

Extensive Packet level debugging and troubleshooting on PaloAlto Firewalls to resolve numerous network issues. Analyzed the Policy rules, monitor logs and documented the Network/Traffic flow Diagram of the PaloAlto Firewalls placed in the Data Center with MS Visio

Interact with the PaloAlto Networks TAC to troubleshoot and diagnose cases

Troubleshooting the Layer 1 issues related to the SFP modules and optics

Layer 1 work involving physically punching down RJ-45/RJ-11 and Fiber jacks/connectors.

Configured Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210

Configured VLAN, spanning tree, VSTP, SNMP on EX series switches

Designed and implemented security policies using ACL, firewall.

Worked extensively on Cisco Firewalls, Cisco (506E/515E/525/) & ASA 5500(5510/5540) Series

Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.

Worked extensively with ASR 9K (9010 9922), Nexus 9000, 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco 2960s series switches and Cisco 3560/3750s switches.

Converted Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience

Testing traffic QOS, shaping, policing.

Conducted on site QOS testing and prepared reports for the engineering team on ways the networks could be improved

Implemented Cisco IOS Firewall IDS using 2600 series router.

Environment: DDI, Infoblox 6.x, REST API, Perl API, Red Hat Linux 6.x, Tivoli (TSM), VMware ESX, NFS share, Perl Scripting, Korn shell Scripting, HP Service Manager, Technical writing.

Experience with F5 load balancers (6400, 6800, and 8800) and Cisco load balancers (CSM, ACE and GSS), also migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5load balancers.

Wireless/Voice Technologies - Cisco WLC, IEEE 802.1x & 802.11, WLAN, WAP, AP, SSID, LWAPP, Aironet, HP MSM 760 WC, Bluetooth, Avaya, AURA - Voice Over Internet Protocol (VoIP), VoIP/SIP, CUCM, UCCM, UCCX, MGCP, RSTP, SCCP, STP, Quality of Service (QoS), PoE, MMDS, LMDS, CCK, DSSS.

Designed, set up and supported wireless network, with 1,500 Cisco APs, 5,508 wireless controllers

Actively support Proof of Concepts for large scale and complex wireless network deployment including RF site survey, configuration of Wi-Fi controllers and Access Points

Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.

Successfully installed PaloAlto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.

Develop Engineering Documentations to record F5 environment and change processes LTM/GTM/iRules.

Design, verification and of On-board testing/Debugging of wireless chipsets 802.11a/b/g/n wireless LAN MAC.

Wireless packet capture and network analysis of wireless chipsets.

Verizon Wireless, NYC NY Apr 2013 - Sep 2014

Sr. Network Engineer

Responsibilities:

Worked on converting Cisco ACE load balancer to F5 LTM load Balancer in data center environment

Worked on converting PIX rules over to the Cisco ASA solution

Hands on experience with Cisco Nexus 2148 Fabric Extender and Nexus 9500, 7010 5000 series to provide a Flexible Access Solution for datacenter access architecture.

Worked on Migrating all the Vlan’s from Cisco Nx-5k to Nexus 9k switches

Deploying and decommission of VLANs on core ASR 9K, Nexus 9K 7K, 5K and its downstream devices

Installed and Configuring Nexus 9000 Switches.

Used Cloud Watch for monitoring AWS cloud resources and the applications that deployed on AWS by creating new alarm, enable notification service.

Experience with moving data center from one location to another location, from Cisco 6500 based data center to both Cisco 6500 & Nexus based data center.

Configure and manage PaloAlto Next Generation Firewall and Panorama Management Appliances

Worked on creating and maintaining new subnets, host with several record entries like CNAME, PTR, A, etc) with DHCP scopes using Graphical User Interface as well as IBCLI (Infoblox command line interface).

Network security including NAT/PAT, ACL, and ASA/PIX Firewalls.

Integrated Active Directory/LDAP with PaloAlto Next Generation Firewalls

Integrated LDAP with PaloAlto rule base and Global Protect Client VPNs

Configuring rules and Maintaining Checkpoint, PaloAlto & Analysis of firewall logs using various tools. Migration from Cisco firewalls to PaloAlto firewalls platforms PA 4000 and PA 500 and PA- 200 firewalls.

Configuration and troubleshooting of Site to Site as well as Remote Access VPN on Cisco ASA and Check Point firewalls. Maintained and Configured Check Point VSX with firewall virtualization.

Configured and maintained IPSEC and SSL VPN's on PaloAlto Firewalls. Implemented Zone Based Firewalling and Security Rules on the PaloAlto Firewall.

Migration from Cisco firewalls to PaloAlto firewalls platforms PA 4000 and PA 500 and PA- 200 firewalls.

Managing the changes through export/import of CSV spreadsheets on Infoblox web interface

Worked on ACE load balancers. Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.

Configure and manage Cisco ASA devices for customer VPNs, IPS, IDS and Firewalls.

Troubleshoot customer networks in relation to PaloAlto Firewalls Issues range from IPsec/SSL VPNs, user authentication using LDAP, network/connectivity problems, security policies.

Implementation, configuration & troubleshooting the issues related to Virtual Servers, pools, nodes & certificates on F5 Load Balancer.

Configure and maintain Bluecoat SG510 gateways for all HTTP and HTTPS traffic traversing the PBGC network. Effectively update the Visual Policy manager (VPM) as per required access by the client.

Periodically upgrade the bluecoat devices to desired feature set OS level as required.

Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability

Managed break/fix hardware issues and RMAs through F5 Support.

Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls

System level monitoring on Linux and Infoblox Appliances to watch process and service statuses, like Performance Monitoring & Tuning - iostat, vmstat & netstat, nfsstat, etc.

Coordinate activities with vendors(Infoblox/F5/Cisco) and other State Ram services teams like Network services, Security, Cloud Services, Windows Support, etc inventory management, etc.

Installation and trouble-shooting of LAN, WAN & Multi-Layer Switching.

Worked on Implementation and maintenance of IP Telephony Networks. Configured Avaya Gateways, QOS for Voice, Cisco Unified Communication Manager. Worked on a Project to migrate analog phone system to VOIP. Thorough knowledge in SIP, H.323 Protocols

Hands on experience with Nexus 9500, 7010, 5020, 2148, 2248 devices.

AT&T, Dallas TX Nov 2011 – Mar 2013

Network Engineer

Responsibilities:

Responsible for Internal and external accounts and, managing LAN/WAN and checking for Security

Troubleshoot on security related issues on Cisco ASA/PIX, Checkpoint and IDS/IPS

Configured, installed, & managed DHCP, DNS, & WINS servers

Experience in different VPN platforms, IPsec, SSL & Web VPN. Mobile VPNs solutions from Cisco and Checkpoint.

Converted Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience

SME for NetScaler Load balancing SSL VPN Config

Successfully migrate ASA, McAfee, Check Point firewall to the PaloAlto Networks platform

Automation using REST Web API, Perl API, Korn Shell, and shell scripting on Red Hat Linux, Solaris and Infoblox appliances

Experience in working on MPLS networks, Implementation of QOS in MPLS, MPLS over Diffserv networks. Implemented MPLS/VPN to connect the Enterprise branches

Install virtual firewalls in AWS and Microsoft Azure

Deployment of Mobility farm to allow access to Parsons owned software assets using a verity of mobile devices utilizing Citrix Web interface and NetScaler VPX systems

Designed and implement security strategies with Cisco and PaloAlto Firewalls.

Responsible to evaluate, test, configure, propose and implement network, firewalls and security solution with PaloAlto networks.

Worked with PA250, PA4050, PA3020using Panorama servers, performing changes to monitor/block/allow the traffic on the PaloAlto firewalls.

Implementing firewall rules and configuring PaloAlto, Fortinet Network Firewall.

Configuration & maintenance of Cisco2600 series routers with OSPF.

Managed a TACACS server for VPN user authentication and network devices authentication

Upgrading the network by translating protocols like EIGRP to OSPF.

Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.

Installed and configured F5 Load with LAN/WAN configuration. balancers and firewalls

Worked on various Nexus Products 9500, 7010, 7009, 2248.

To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.

Experience working with Layer 1-7 switching, TCP/IP, OSPF and load balancing (Cisco L2/L3 switches, firewalls, load balancers.

Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series

Qualcomm, India July 08 –Oct 11

Network Engineer

Responsibilities:

Worked on troubleshooting customer related issues related to router Configuration, Layer 1/Layer 2 issues.

Worked on Frame Relay switches.

Worked on OSPF using features like TSA, SA, NSSA and route summarization.

Configured EBGP/IBGP policies also tested BGP attributes such as Local preference, MED, AS-PATH, Community and Weight.

Configured EIBGP load balancing and ensured stability of BGP peering interfaces.

Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.

Configured Virtual-link between discontiguous backbone areas in the network also established authentication between all OSPF routers using MD5 authentication.

Involved in effective communication with vendors, peers and clients in resolution of problems, equipment RMA’s and provided 24x7 support.

Monitor network performance accompanying company service level agreements (SLA’s) using Network management tools such as Cisco works and also provided necessary recommendations to improve network performance.



Contact this candidate