Post Job Free

Resume

Sign in

Network Engineer Cisco

Location:
United States
Posted:
March 18, 2019

Contact this candidate

Resume:

Sr.Network Engineer

Uday Kumar Ballingu

E: ac8top@r.postjobfree.com

P: 949-***-****

SUMMARY:

Network Engineer with 8 years of experience in the field of routing, switching, firewall technologies with strong technical and troubleshooting of various network systems with decent written and verbal communication skills, strong interpersonal and relationship-building skills contributing to team development.

Designing, installing, configuring and maintenance of Enterprise Networks using Cisco routers, Catalyst Switches and Load Balancers, Cisco Firewalls.

Strong hands on understanding in installing, configuring and troubleshooting of Cisco Catalyst 6500, 4500, 3750, 2950 and 3500XL series switches, Cisco 7600, 7200, 3800, 3600, 2800, 2600, 2500 and 1800 series Routers.

Configuring, Administering and troubleshooting the Checkpoint, Palo Alto, and ASA firewall.

Broadly experienced working with Nexus 7010, 5020, 2148, 2248 devices.

Proficient in implementing and troubleshooting VLANs, VTP, STP, RSTP, DTP, Root Guard, BPDU Guard, Port Fast,Uplink Fast, Backbone Fast, Ether Channel, PAGP, LACP and 802.1Q.

Acquaintance with the Cisco IOS, Junos & basic Nexus (7K, 5K&2K).

Integrating Symantec DCS with NSX, providing server hardening.

Switching tasks comprising VTP, ISL/ 802.1q, VLAN, Ether Channel, STP and RSTP.

Strong hands on experience on PIX (506, 515, 525, 535), ASA (5505/5510) Firewalls. Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).

Established, maintained and operated Check Point and Cisco ASA firewall administration across global networks.

Experienced in testing Cisco routers and switches in laboratory and deploy them on site production.

Planning, Designing & Implementing VPN connections using Checkpoint, ASA and Cisco Routers using site-to-site VPN's.

Excellent knowledge and experience on multi-vendor platforms like Cisco, Juniper, Checkpoint, F5 Big-ip LTM load balancers, Bluecoat, Riverbed, Citrix, and VMware.

Surveyed, tested and implemented Aruba wireless coverage.

Updated Palo Alto NGFW PAN-OS, Threat Databases, AV datasets and filters as required.

Worked as the Network/VOIP administrator focusing more on the VoIP side of the networks.

Working experience on Juniper J series j230, M 320 routers and EX 3200 series switch.

Comprehensive experience in WAN Technologies, Switching Technologies also with Failover Mechanisms &Inter Vlan Routing types.

Experience working on administering various AWS Services using AWS Console, AWS CLI and using Amazon API (Boto3 SDK) using python

Experience in F5, Cisco ACE 4710 Load balancers, Aruba wireless access points and controllers.

Well Experienced in configuring protocols HSRP, GLBP, VRRP, ICMP, IGMP, PPP, HDLC, PAP, CHAP, and SNMP.

Configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.

Comprehensively experienced in configuring and troubleshooting of routing protocols RIP v1/v2, EIGRP, OSPF, ISIS BGP and MPLS.

Excellent knowledge and experience on multi-vendor platforms like Cisco, Juniper, Checkpoint, F5 Big-ip LTM load balancers, Bluecoat, Riverbed, Citrix, and VMware.

Experience with F5 load balancers LTM, GTM series like 6400, 6800, 8800 for the corporate applications. Experience with Juniper SRX 240 Firewalls .

Provide NSX Micro-Segmentation Security for ASW Data Center.

Familiar with iRule management like loading rules, writing iRule syntax using TCL language.

Experienced in installing and configuring DNS, DHCP server.

Experience with vBlock Cloud infra such as VMware vSphere, VMware Cloud Director and Veeam Backup.

Configuration of F5's Big IP for Application Load Balancing.

Implementing Security Solutions in Juniper SRX and Net screen SSG firewalls by using NSM.

Knowledge in configuring and troubleshooting Cisco Wireless Networks: LWAPP, WLC, WCS, Standalone APs, Roaming, Wireless Security Basics, IEEE 802.11 a/b/g, RF spectrum characteristics.

Good knowledge and experience in Installation, Configuration and Administration of Windows […] HTTP, FTP, DNS, NTP, DHCP servers under various LAN and WAN environments.

Proficient in handling Network Monitoring tools and Packet capture tools.

Regular upgrade and maintenance of Juniper Routers PTX, M and MX series and Next Generation Firewalls NGFW, Nexus 9k, 7k, 5k & 2k, f5 BIG IP, Palo Alto Firewalls, Bluecoat Proxy and Riverbed Steelhead appliances.

Performed Network Security solutions using Cisco VPN Concentrators and Cisco ACS sever.

Use of Microsoft VISIO/Office for technical documentation and presentation tools.

Good knowledge and experience in Installation, Configuration and Administration of Windows Servers 2000/2003, Active Directory, FTP, DNS, DHCP, TFTP, Linux OS under various LAN and WAN environments.

Excellent leadership with good written and oral communication skills

Technical Skills

Cisco Platforms : Nexus 7K, 5K, 2K & 1K, Cisco routers (7600, 7200, 3900, 3600,

2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series)

Juniper Platforms : M, J and MX Series Routers.

Routing Protocols : RIP V1/V2, EIGRP, OSPF, BGP, Summarization, Route filtering, Redistribution.

Switching : VLANs, Dot1Q, VTP, STP, RSTP, PVST+, RPVST, VLAN Maps, Inter VLAN, routing & Multi-Layer Switching, Ether channels (LACP, PAGP), VSS, VPC, VDC,Port Security, POE

Networking Concepts : Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec,

VLAN, VPN and Wireless Technology, Cisco ACI

Firewall : Palo Alto, Juniper Net screen, Checkpoint, Cisco ASA, Juniper SRX.

Network Tools : IBM ITNM, Splunk, Stealth Watch, Solar Winds, SNMP, CiscoWorks,

Wireshark.

Load Balancers : F5 Networks (Big-IP).

Ticketing Software : Remedy, ClearQuest, Service Now & Peregrine.

WAN technologies : Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP,

DS1DS3OC3, T1 /T3 & SONET.

LAN technologies : Ethernet, Fast Ethernet, Gigabit Ethernet& 10 Gigabit Ethernet, Port-

Channel, VLANS, VTP, STP, RSTP, 802.1Q.

Security Protocols : IKE, IPSEC, SSL-VPN.

Networking Protocols : RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS,

HSRP, VRRP, GLBP, TACACS+, Radius and AAA.

Operating System : Windows 7/XP, Windows Server 2008/2003, Linux, UNIX.

PROFESSIONAL EXPERIENCE

Ericsson – San Jose CA June 2016 - Present

Sr. Network Engineer

Responsibilities:

•Installing, Maintaining and Troubleshooting of Cisco ASR 1K, 7200, 3925E and 2951E Routers and Cisco 6500, 4510, 3560X, 3750X and 2950T Switches for deployment on production network.

•Hands-on experience with configuring Ether Channel, Spanning Tree, Trunking, ACLs, Syslog. Experience in the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.

•Built site-to-site IPsec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.

•Configured new application URL on the Brocade vTraffic Managers as per client requests on the Load Balancing methods and techniques.

•Troubleshooting and Incident resolving on Juniper Mx-960 and 10,000 Switches.

•To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.

•Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NAT'ing, sub-netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP & Multicasting protocols.

•Planning, Designing and implementing Network and security solutions like Firewalls (Palo Alto, Check Point, ASA), Data Center Switching, Bluecoat Proxy and F5 Load Balancers.

•Performed work on bluecoat servers.

•Cooperating with Checkpoint Support (5600) team & Juniper support (SRX 4100 & SRX 4200 series) for resolving escalated issues.

•Establish AWS technical credibility with customers and external parties. Help customers build scalable, resilient, and high-performance applications and services on AWS.

• Working experience on tools and devices like Source Fire, Fire eye, Aruba, Cisco ASA, Cisco ISE.

•Migration of network devices (Palo Alto, F5, Juniper, Aruba, Riverbed, Routers& switches) from one zone to other. Changing the management IP address

•Replaced Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.

•Construct Dell EMC EHC Private Cloud with VMware NSX SDN globally in four regions; integrate into current DC environment .

•Assisted CVS/Caremark with forklift upgrade from versions 8.5 and 9.0 to UCCE/ ICM 11.3 in a

hybrid CUCM/ Avaya ACD environment.

•Experience with VOIP and QOS implements and support.

•Hands on experience on dealing with Microsoft Azure cloud computing including implementing access lists in the Network Security Group.

•Security configuration on Wireless LAN using protocols PEAP, EAP-FAST.

•Expertise with Installation, configuration and troubleshooting of Cisco Routers (ASR 9K, NSX 5K, Meraki MX84, CISCO ISR 1K, 7600, 3800, 2800, 2600, 1800 series). and Juniper Routers (MX, PTX, T4000-series)

•Created and implemented rules for Juniper SRX 550 hosted before the server farm.

•Deployment of NSX in Mission Critical Data-Center and engagements with C-Levels, Stakeholders and IT Executive Enterprise and Federal Sectors.

•Working with Panorama Centralized Management tool for Palo Alto firewall PA-5000, PA-2000 and PA-3060, to centrally manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration.

•Troubleshooting issues related to Layer 2/3 skills like switching & routing, WAN/Hardware and critical network links by coordinating with the vendor.

•Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.

•Carried out Route-redistribution between different routing protocols like OSPF, BGP, EIGRP for increased efficiency.

•Worked with F5 Load balancing, IDS/IPS, Bluecoat proxy servers and Administrating.

•Coordinate with application teams, firewall team and network team to migrate the application from old DMZ to New DMZ on F5 load balancers.

•Troubleshooting Firewall Connectivity related issues using Smart view tracker on Checkpoint, NSM Log viewer for Juniper Firewalls.

•Worked on F5 Local Traffic managers (LTM), Global traffic manager (GTM) of series 6400, 6800, 3400, 5100, 3600 and 3DNS migration to GTM.

•Provided an IP Addressing scheme using VLSM and maintained VLAN table and implemented DHCP server for assigning IP address to various connecting devices.

•Managing alerts and making sure all devices (1500+) are in proper health and working efficiently.

•Replace EOS/EOL devices with new later devices by configuring the new devices to company guidelines and putting them in production.

•Adding new devices to be monitored in EMC Smarts monitoring tool.

•Raising client change requests which were managed using ServiceNow with &would proactively take up tickets/Incidents and assign to themselves to work on them.

•Migrated and upgrade of 2008 R2 Domain Controllers from a data center hosted server to Windows Server 2012 R2 Standard in Microsoft Azure.

•Migrated data from File share from a data center hosted server to MS SharePoint infrastructure for better access to data across all sites without the need for IPSec VPNs.

•Migrated Dell Global Management System from primary data center and upgraded to 8.0 to virtual machine in Azure.

•Tested and implemented various BGP attributes such as Local Preference, MED, AS-PATH, Community, Extended community using route-maps.

•Configured Windows Clusters, Windows NLB, H/W Load Balancers (F5, NetScaler). Deployed, configured and troubleshooting runtime errors related to .Net applications on 7.0/7.5 Web Servers and Windows Server 2008/2008 R2 in Dev, QA & Pre-prod environments.

Environment: Cisco 6500/3750/3550/3500/2960switches and Cisco3640/3845/3600/2800, ISR 4331, 4321, ASR 1000 routers, F5 BIG-IP LTM 8900,OSPF,BGP,EIGRP,LAN,WAN,VPN,HSRP, Nexus 2K, 5K, 9K, Brocade Virtual Traffic Managers

Charles Schwab -Austin, TX Oct 2014 – June 2016

Sr. Network Engineer

The Charles Schwab Corporation is an American brokerage and banking company, based in San Francisco, California. The company serves 7.9 million client brokerage accounts, with $1.65 trillion in assets (as of September 2011), from over 300 offices in the U.S, one office in Puerto Rico, and one branch in London.

Responsibilities:

•Supervised handling of the Global design, engineering, and level 2/3 support of existing network technologies services and the integration of new network technologies / services

•Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.

•Experience with converting Cisco 6500 IOS to Cisco Nexus NX-OS in the data center environment.

•Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.

•Experience in configuring Virtual Device Context in Nexus 7010.

•Providing daily network support for national wide area networks consisting of MPLS, VPN and point-to point site.

•Worked in the environment of cloud-based technologies such as Azure and VMware.

•Worked on Configuring F5 load balancers to enable load sharing and load balancing among web servers.

•Deployed and Configured vShield& VMware NSX for network segmentation and host based Anti-Virus solutions.

•Create a Virtual Network on Windows Azure to connect all the servers.

•Assemble core HP 5406 and configure edge switches. Configure HP MSM765 controller for wireless mesh. Configure Aruba 7210 controllers for VRRP and ClearPass.

•Configure Cisco, Aruba and HP Access Points, WLC, WCS and Airwave.

•Working with ITS networking teams to install an Avaya VoIP phone system and tested the phone system connectivity and functionality.

•Assisted in migration project from Avaya to Cisco.

•Participated in designing and implementation of Selenium WebDriver automationframework for smoke and regression test suites using C#.

•Controlling the URL access by using the Bluecoat proxy servers and also McAfee web gateway.

•In-depth knowledge and hands-on experience on Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS and Firewalls.

•Configured Voice ports and Dial peers on the call manager for the VOIP call to reach remote destination.

•Focused on working with Cisco Channel partners to build practices around Cisco ACI and Nexus 9K.

•Worked with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for data center access architecture.

•Resolve/Escalate (remediation of) alerts/trouble tickets notified by the system within the SLA timelines.

•Managing and administering Juniper SRX5800 and Checkpoint Firewalls at various zones including DMZ, Extranet (Various Business Partners) and ASZ and internal.

•Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.

•Configuring STP for switching loop prevention and VLANs for data and voice along with configuring port security for users connecting to the switches.

•Deliver best practices guidance for managing Palo Alto Networks firewalls.

•Configured network access servers and routers for AAA Security (RADIUS/ TACACS+).

•Verified the existing configuration on every interface meets the standard (like access ports having Portfast and BPDU guard enabled).

•Establish AWS technical credibility with customers and external parties

•Experience with implementing Cisco 6500 VSS on the User distribution switches.

•Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability.

•Worked on F5 and CSM load balancers deploying load balancing techniques with multiple components for efficient performance.

•Configuring Big-IP F5 LTMs (virtual servers, pools, SNATs, health monitors, iRules) for managing the traffic and tuning the load on the network servers

•Implemented Access lists and policy mapping on Juniper router installed in each branch across all the states.

•Handled SRST and implemented and configured the Gateways, Voice Gateways.

•Tested and implemented various BGP attributes such as Local Preference, MED, AS-PATH, Community, Extended community using route-maps.

•Implementation of HSRP, IPSec, Static Route, IPSEC over GRE, Dynamic directing, DHCP,DNS, FTP, TFTP.

•Instructed the team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX-4200 & EX-3200 switches.

•Design, implement and administer IPv4/IPv6 enterprise network infrastructure utilizing Juniper routers.

•Implementing iRule on LTMs for http traffic rerouting.

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960 6500 switches and Cisco 3640/12000/7200/3845/3600/2800 routers, ASR 9K, Cisco Nexus 7K/5K, Cisco ASA 500, F5 BIG-IP LTM 8900,OSPF,BGP,EIGRP,LAN,WAN,VPN,HSRP, Juniper EX-4200, EX-3200

Fox Studio –Los Angeles, CA Feb 2013 -Sep 2014

Network Engineer

Fox Studio is an American film studio, distributor and one of the six major American film studios. Located in the Century City area of Los Angeles, just west of Beverly Hills, the studio is currently owned by 21st Century Fox and is formerly owned by News Corporation.

Responsibilities:

•Responsible for the Global design, engineering, and level 2/3 support of existing network technologies services and the integration of new network technologies / services

•Racking, stacking, configuring NEXUS 2K, 5K and 7K.

•Worked with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for data center access architecture.

•Assist customer team with the design and placement of Palo Alto Networks devices.

•Installation and Configuration of Cisco Catalyst switches6500, 3750&3550 series and configured routing protocol like OSPF and BGP with Access Control lists implemented as per Network Design Document.

•Configuring Cisco ACS 4.0 along with TACACS+ server authentication.

•Bluecoat Administration - Blocking/Unblocking URL's.

•Worked extensively on Cisco Firewalls ASA 5500 (5510/5540) series.

•Responsible for building and managing field enablement and training, channel partner go to market strategy and engagement for Cisco Nexus 9K and ACI.

•Worked with VMWare and Flex team for Configuring and installing Dell Power Connect switch 5548 and increasing their Bandwidth Usage.

•Liaison between security staff at web hosting company, monitored threats and traffic on Palo Alto NGFW

•Creating and provisioning Juniper SRX firewall policies.

•Creating, adding and deleting new rules and objects on Checkpoint firewalls R65/ R75.

•Troubleshoot network issues using Checkpoint tracker tool.

•Documentation involved preparing MOPs, Work Orders, DCE cabling and NEMS request. Also creating and submitting Remedy tickets and Homer work orders.

•Experience deploying F5 Load Balancers for load balancing and traffic management of business application.

•Configuring and troubleshooting site-to-site IPSEC VPN tunnels on VPN concentrators and ASA firewalls with private vendors.

•Virtualization - Nutanix, Vmware

•Administration, Configuration and support for Microsoft windows Azure IAAS for us clients for migration.

•Deployed VMware vCenter v6, ESXi v6, NSX v6, vRealize Log Insight, vRealize Network Insight.

•Worked on Cisco wireless LAN technologies and Switching. Configured Virtual server, service groups, Session persistence, Health monitors and Load balancing methods in new F5 andA10 LTMs. Configured WIDE IP and WIDE IP pool on F5 GTM's to support load balancing between data centers.

•Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability

•Serve as the customer's go-to resource for all matters related to the Palo Alto next-generation firewall.

•Designed and implemented Cisco VoIP infrastructure for a large enterprise and multi-unit office environment. Met aggressive schedule to ensure a Multi-office reconfiguration project which was successfully delivered.

•Created dedicated VLANs for Voice & Data with QOS for prioritizing VOICE over DATA.

•Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.

•Installation, configuration and maintenance of Palo Alto, Cisco ASA 5500, Juniper SRX and ISG Firewalls

•Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trucking, STP, Inter-VLAN routing, LAN security.

•Worked in Configuration and extension of VLAN from one network segment to other segment between different vendor switches (Cisco, Juniper)

•Worked on commissioning and decommissioning of the MPLS circuits for various field offices.

•Updated the HP open view map to reflect and changes made to any existing node/object.

•Handled SRST and implemented and configured the Gateways, Voice Gateways.

•Network Cabling, dressing, labeling and troubleshooting various network drops onsite.

Environment:Cisco6500/3750/3550/3500/2960switches and Cisco3640/12000/7200/3845/3600/2800 routers,Checkpoint,OSPF,BGP,VLAN,HSRP,LAN,WAN,IPV4,ASAFirewall,Checkpoint,Nexus 7K/5K/2K, BIG-IP F5.

Pfizer - Chicago, IL Dec 2011 – Jan 2013

Network Engineer

Pfizer Inc. is an American multinational pharmaceutical corporation headquartered in New York City with its research headquarters in Groton, Connecticut. At Pfizer products are responsibly reported about our business practices in a fashion that promotes transparency. It is among the world's largest pharmaceutical companies. Pfizer is listed on the New York Stock Exchange, and its shares have been a component of the Dow Jones Industrial Average since 2004.

Responsibilities:

•Worked as a part of a team to manage Enterprise Network Infrastructure as a Tier 3 Support Engineer.

•Involved in Configuring and implementing of Composite Network models consists of Cisco 7600,7200,3800 series routers and Cisco 2950, 3500,5000, 6500 Series switches.

•Configuring Firewall switch module on Cisco 6506 distribution layer switches.

•Configuring VTPs, Trunking, inter-Vlan routing, port fast, uplink fast, and backbone fast on access layer switches.

•Navigate customers to Azure portals and help them in creating Express route, Vnet gateways and attaching vnets to express route.

•To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.

•Cisco UCS, switching and routing equipment. F5 3900 and Viprion load balancers

•Installation of Palo Alto (Application and URL filtering, Threat Prevention, Data Filtering).

•Implemented Zone Based Firewalling and Security Rules on the Palo Alto and Exposure to wild fire feature of Palo Alto.

•Design and Build Software-Defined Data Center environment, including Vmware, VCenter,NSX and Cisco ACI.

•Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches

•Expertise in testing activities like Test case Development and Reviews, Test Execution, defect reporting and Test Automation.

•Enable STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP.

•Planned and installed Frame Relay WAN links to the branch offices.

•Implemented a backup for the existing WAN connection using site to site IPsec VPN tunnels.

•Configuring and troubleshooting OSPF routing protocol on the corporate network.

•Worked on the migration of Frame Relay based branches to MPLS based VPN for customer's WAN infrastructure.

•Configuring and Troubleshooting the Juniper SRX100 and 110 series, Juniper Net Screen routers.

•Worked on the migration of existing PIX firewall to ASA firewall. PIX OS upgrade from 6.3 to 7.0 (x)

•Configuration on BIG IP (F5) Load balancers and also monitored the Packet Flow in the Load balancers.

•Had a good experience working with the Trouble Tickets on F5 Load balancers.

•Switch experience includes Cisco Catalyst switches: CISCO 3750, 4500, 6500 series switches.

•Managing enterprise BGP setup by configuring and troubleshooting BGP related issues. My responsibility was also to add new BGP peers for remote branch offices and business partners.

•Scaling of IGP and BGP in the core.

•Administration of ASA firewalls in the DMZ and FWSM in the Server Farm to provide security and controlled/ restricted access.

•Establish AWS technical credibility with customers and external parties. Help customers build scalable, resilient, and high-performance applications and services on AWS.

•Involved in troubleshooting of DNS, DHCP and other IP conflict problems. Implementation of name resolution using WINS & DNS in TCP/IP environment.

•Installed and monitored extreme networks S-series, 7100 stackable switches and E4G-400, 1800 router to support VMware machines in NCFAST.

•Dealt with implementation of deployment related to Cisco devices and applying security policies on it.

•Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.

•Configuration of NAT.

•Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port security for users connecting to the switches.

•Maintain effective communications with vendors, peers and clients in resolution of trouble-tickets, equipment RMAs, and support requests.

•Planning for upgrade of IOS on devices and performing the upgrade.

•Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware, software related to IP Networking.

•Monitored network traffic and developed capacity planning initiatives, making necessary recommendations for additional resources or hardware.

•Responsibilities also include writing and executing Test Plan, Desk level procedures and Test Case Documents for smooth network operations of the remote location, assisted in design guidance for infrastructure upgrade.

Environment:NetFlow,TACACS,EIGRP,RIP,OSPF,BGP,VPN,MPLS,CSM,SUP720,EtherChannels,Cisco 7200/3845/3600/2800 routers, Fluke and Sniffer, Cisco 6509/ 3750/3550/3500/2950 switches, Cisco ASA firewalls.

Client S.V.K Systems Pvt. Ltd, India March 2011 – Sep 2011

Jr. Network Engineer

The Spectra Mind Solutions is a multi-dimensional corporate entity. Its services have already established a presence in most geographical zones across the Globe Chandra Net Solutions is a total solutions company specialized in providing Project management Consulting, Quality Consulting, Applications and Products development, support and maintain, Consulting in Test Automation solutions, IT Staffing, IT services and Business Process Outsourcing (BPO)

Responsibilities:

•Migration of RIP V2 to OSPF, BGP routing protocols.

•Configured EIGRP for Lab Environment.

•Implemented ISL and 802.1Q for communicating through VTP.

•Working with Client teams to find out requirements for their Network Requirements.

•Designing solutions for frozen requirements using Cisco Routers and Switches.

•Deploying the network infrastructure to meet the requirements.

•Created VLAN and Inter-Vlan routing with Multilayer Switching.

•Documenting and Log analyzing the Cisco ASA 5500 series firewall.

•Deliver best practices guidance for managing Palo Alto Networks firewalls.

•Monitor performance of network and servers to identify potential problems and bottleneck.

•Performed administrative support for RIP, OSPF routing protocol.

•Involved in setting up and maintaining F5 load balancers.

•Strong understanding of Network Virtualization and experience implementing NSX Security.

•Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.

•Real time monitoring and network management using Cisco Works LMS.

•Satisfactorily Resolved Problems in timely manner with focus on providing a high level of support for all customers.

•Experience in design, Deploying & Troubleshooting F5 Load Balancer Includes BIGIP Series 5050V, 10000V, 8900, 6900, and 3900.

•Evaluate and build proof of concept of HPE Cloud with Nuage SDN and EMC EHC platform with VMware NSX based SDN

•Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments.

•Provide high level technical support, including identifying and resolving problems on Cisco for e-Commerce infrastructure. This included external routing and internal/intranet routing for DMZ servers.

•Designed VLAN’s and set up both L2 and L3 logical to have it communicate to the Enterprise network.

•Scheduled preventive maintenance for fire-protection systems, including new protocols. Utilize MS Windows, Word, and Excel for reporting/documenting process.

•Prepared Engineering documents and Network diagrams in Microsoft Visio.

•Delivered Departmental Efficiency through advanced engineering, technical support, and documentation procedures.

•Provided technical support on hardware and software related issues to remote production sites.

Environment: Cisco 7200/3845/3600/2800 routers, TACACS+, EIGRP, RIP, Vulnerability Assessment tools like Nessus, Red Hat, Solaris, Juniper VPN’s, SSL

CERTIFICATIONS:

Cisco Certified Network Professional (CCNP)

Cisco Certified Network Associate (CCNA)

Palo Alto Certified



Contact this candidate