Sampath Reddy
***********************@*****.***
SUMMARY:
CCNA CCNP certified professional with around 6+ years of experience in network design, implementation, and support. Routing, switching, firewall technologies, system design, implementation and troubleshooting of complex network systems.
Extensive experience in configuring and troubleshooting of protocols RIP v1/v2, EIGRP, OSPF, IS-IS, BGP and MPLS.
Extensive knowledge with VLAN’s, Trucking, RSTP, SNMP, Ether Channels, HSRP, Port Security, ACL’s, QoS, Traffic Policing, Shaping, EIGRP, OSPF, NAT, PAT, Inspections, VPN’s, DHCP, Wireshark etc.
Expertise in configuring and troubleshooting of Palo Alto, Juniper Net Screen & SRX Firewalls and their implementation
Administration and diagnostics of LAN and WAN with in-depth knowledge of TCP/IP, NAT, PPP, ISDN and associates network protocols and services.
In-depth knowledge and hands-on experience in ISP Routing Policies, Network Architecture, IP Sub netting, VLSM, TCP/IP, NAT, DHCP, DNS, IPAM FT1 / T1 / FT3 / T3 SONET POS OCX / GigE circuits, Firewalls.
Working Knowledge of Cisco IOS, Junos & basic Nexus (7K, 5K&2K).
Switching tasks include VTP, ISL/ 802.1q, VLAN, Ether Channel, STP and RSTP.
Strong hands on experience on PIX (506, 515, 525, 535), ASA (5505/5510) Firewalls. Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
Responsible for Check Point and Cisco ASA firewall administration across global networks.
Well experienced in configuring HSRP, GLBP, ICMP, PPP, PAP, CHAP and SNMP.
Experience in installing and configuring DNS, DHCP server, IPAM- IPv4, IPv6
Expertise in installing, configuring, and maintaining Cisco Switches (2900, 3500,7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800)
Expertise in installing, configuring and troubleshooting Juniper Routers (J, M and MX-series)
Hands-on expertise with routers ASR-901, ASR-903, ASR 5500, ASR-9010 and Juniper ACX, E, M, MX960 series
Experience maintaining malicious code prevention systems (e.g. Symantec Anti-Virus)
Implementing/supporting security measures & controls (vulnerability mgmt., Log Monitoring Configuration Management, network scans, malicious code etc.
Industrial Control System experience.
Experience participating in developing and updating of system recovery plans.
Experience with Continuous Improvement programs (e.g. Six SGMA)
Experience in NOC (network operation Center) and DATA center
Experience working with Nexus 7K, 5K and 2K.
Expertise in Cisco Nexus 9332PQ, 9372PX-E,9396TX, 93128TX switches.
Knowledge on F5’s BIG-IP Application security management and Edge Gateway Solution
Worked extensively on Palo Alto, Juniper Net screen, Fortinet and SRX Firewalls.
Knowledge on cryptosystems such as RSA and AES.
Experience with design and deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, MPLS QOS
Extensive experience in configuring Layer3 routing and layer2/3 switching of Juniper & Cisco based J2320, MX, EX,2950,2960,3600,3750,4500,6500,1700,1800,2600 and 3700 series routers & Switches.
Troubleshooting & implementation of Vlan, STP, MSTP, RSTP, PVST, 802.1Q, DTP, HSRP, VRRP, GLBP, LACP, PAGP, AAA, TACACS, RADIUS, MD5, VTP & SVI.
Knowledge on complex Checkpoint, Cisco ASA & Palo Alto Firewalls Environment.
Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
Experience in testing Cisco & Juniper routers cum switches in laboratory scenarios and deploy on site for production.
TECHNICAL SKILLS:
Network Protocols
MPLS, VRF, OSPF, BGPv4, EIGRP, HSRP, VRRP, Policy-Based Routing (PBR), Route Redistribution, Static Routing, Web Cache Communication Protocol (WCCP), MPLS, Metropolitan Area Network (MAN), Wavelength Division Multiplexing (WDM), ISDN, PPP, VTP, STP, RSTP, VLANs, 802.1q/ISL, CDP, LACP
Cisco Router Platforms
1841, 2611, 2621, 2800, 3600, 3845, 3900, 7206VXR
Cisco Switch Platforms
2900XL, 2950, 2960, 3500, 3550, 3560, 3760, 4500, 6500, Nexus 4k, Nexus 5k, Nexus 2k, Nexus 1k, Nexus 7k
Routing Protocols
EIGRP, BGP, OSPF, RIP, MPLS
LAN Technologies
Ethernet, Fast Ethernet, Gigabit Ethernet, Port Channel, TCP/IP, VLSM, Cisco/Catalyst L2/L3 Switches, Wireless (802.11 a/b/g/n) Juniper/Netscreen/Cisco Firewalls
WAN Equipment
Cisco/Juniper Routers, Silver Peak NX-7xxx WAN Accelerators, OC-192, OC-48, FRAME RELAY, PPP, T1/E1, HDLC, MPLS, DS3, Leased Lines, DSL Modems, ISDN(PRI/BRI), Fiber technology, Copper Cabling Technology
Network Management Tools
Cisco Works, Silver peak GMS, RSA Security Console, RSA Operations Console, VMware vSphere Client, TFTP, FTP, SSH IXIA, Spirent
Security Access Control
Cisco Secure ACS for Windows, RSA, AAA, TACACS+, Radius, IPSec, GRE, NAT/PAT, ACLs, Juniper SA SSLVPN w/DUO, Cisco Altiga SSLVPN, VeriSign
Operating Systems
Windows 2003, Windows 2008, Linux
Languages
C, C++, Perl scripting, Bash, Assembly, HTML, SQL, Oracle 10g
Software
Microsoft Visio 2010, Microsoft Office, AutoCad, Matlab
Network Operating Systems
Cisco IOS, Nexus OS, CATOS, Junos
Documentation Tools
Microsoft Office, Visio, Project, SharePoint
PROFESSIONAL EXPERIENCE:
FOX Studios, LA, CA Apr 2018 - Present
Sr. Network Engineer
Responsibilities:
Worked with Cisco Layer 3 switches 3750,4500,6500; Cisco Nexus 5596 and 7010 in multi VLAN environment with the use of inter-VLAN routing, 802.1Q trunk, ether channel
Configuring objects such as Load Balancer pools for local traffic management on F5 Load Balancers.
Configured Cisco ASR-9K, ISR 2800 & 3800 series routers with OSPF as an enterprise IGP
Extensively used TCP/IP tool like TELNET for remote login to the routers and SSH for secure login.
Configuring and Maintaining TACACS+ for AAA.
Migrated AAA server to ISE 2.0 from legacy ACS servers
Managed IP addressing and implemented IP Access Lists.
Worked extensively on Palo Alto, Cisco Firewalls, Cisco PIX & ASA 5500(5525/5585) Series.
Knowledge on Palo Alto- OS: Version 5,6,7
Experience with Firewall Administration, Rule Analysis, Rule Modification.
Monitoring network access rules usage on Tufin Secure Track.
Configuring Tufin and network devices for monitoring network rules.
Experience with administering, troubleshooting and configuring / implementation (Cisco and Checkpoint) firewalls.
Supported Cisco Trustsec Early-Field-Trial program, supported UHC with their deployment queries and assisted them in ensuring smoother Trustsec field deployments.
Involved in Switching Technology Administration including creating and managing VLANS, Port security, Trunking, RPVST+, Inter-VLAN routing, LAN security etc.
Worked on Disaster Recovery (DR) test plan and build an IPSEC tunnel site to site.
Configured PVSTP+ for loop prevention and VTP for Inter-VLAN Routing.
Set up VSS cluster, ether channel, VLAN trunking, VTP and inter-VLAN routing on 6506.
Configure VDC and vPC on Nexus 7010 and Nexus 5596.
Configures and managed Nexus 2248 and 2400 series of wireless controller.
Implemented port aggregation & link negotiation using LACP and PAGP.
Configured site to site VPN technologies using IPSEC.
Upgraded legacy Catalyst switches to 3750X for MACSEC and CTS rollout
Involved in design, implementation and configuration of HSRP for load balancing on L3 switches on different location of office on the switched Network.
Worked with Routing Protocols of OSPF, and BGP.
Implementation of name resolution using WINS &DNS in TCP/IP environment
Knowledge on DNS zone migration and DHCP scope migration
Administer IP control Appliances for DNS/DHCP services
Worked on F5 BIG-IP LTM 6900, configured profiles, and provided and ensured high availability
Worked on F5and CSM load balancers deploying many load balancing techniques with multiple components for efficient performance
Established an SSL VPN connection to F5 Networks' BIG-IP ASM security management, Edge Gateway, BIG-IP APM, and Fire Pass controllers.
Worked with end to end switching and firewall using Cisco 9300 series.
Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5585 Firewalls.
Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance, troubleshooting etc.)
Worked for change management procedure and implementation of configuration changes during non-production window
Building Green filed setup network data center.
Building industry in Brownfield using Greenfield deployment.
Accessibility to high speed networks / ISPs.
Well-connected transportation environment because you need to have a 24 7 staff working there.
Performed Network Security Assessment and implemented security improvements such as network filtering, SSH, AAA, SNMP access lists, VTY access lists, EIGRP MD5 authentication, RSA authentication and HSRP authentication.
Maintained an 8-node virtualized ISE deployment providing access layer security across two network enclaves for over 5000 end points
Implementation of Juniper Firewall, SSG Series, Netscreen Series ISG 1000, SRX Series
Implementation of HA-JSRP in JUNOS devices, SRX Series Router/Firewall in both A/A and A/P mode
Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall
Used internal network monitoring tools to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption.
Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments in data center
Consolidated remote and LAN access and wireless connections within a single interface to streamline access management.
Provided Breakthrough Approach to Unifying and Optimizing Access to the Data Center using F5’s BIG-IP Edge Gateway Solution
Implementation of name resolution using WINS & DNS in TCP/IP environment
Ability to analyze, configure and troubleshoot networks
Environment: Cisco Routers 7600, 7200, 3800, 3700, 2800, 2500; Cisco Catalyst switches: 6500, 4500, 3500, 3750, 3850, 2900; Cisco ASA 5550, 5520; ASR-9K, ISR 2800 & 3800, VTP, and 802.1Q trucking; Routing Protocols OSPF, BGP, IP MPLS, IPSec, VLANs, Load Balancer: Big-IP F5, VOIP protocols: SIP; Sniffer tools: Wire shark, MS Visio.
DTE Energy, Detroit, MI Feb 2017 – Mar 2018
Sr. Network Engineer
Responsibilities:
Implementing, administering and troubleshooting network infrastructure devices like routers, switches, Wireless access points and controllers.
Working knowledge on configuring access lists. Troubleshooting DNS/DHCP issues within the LAN network
Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access layer switches such as Cisco 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.
Implemented and configured LAN Protocols: Ethernet, VLANs, VTP and STP.
Created Voice Mail boxes, call handlers, create and reset passwords.
Designed complex network systems using Cisco routers, switches
Involved with the designing and Configuring of the network (data and VoIP) ensuring maximum security.
Planned, scheduled, tested, and implemented critical data center network changes.
Developed and maintained service measurements for data network systems and Services.
Open Systems Interconnection (OSI), T-1 system design, TCP/IP, ATM and various Network Management systems.
Troubleshoot L2/L3 and upgrade Nexus, ASR9K/1K/ACI mode nexus guide for Cisco and Juniper Datacenters equipment’s
Created dedicated VLANs for Voice and Data.
Dealt with creating VIP pools, nodes and created custom iRules for the virtual servers like cookie persistency and redirection of URL on F5 ASM cookies issues and configures ASM policies
F5 VIPRION hardware products like LTM, GTM series like 6400, 6800, 8800.
Experience working on network security Palo Alto Firewall Using Panorama for managing Palo Alto to provides a comprehensive, graphical view of network traffic.
Complete implementation of Firepower Firewall protects threat from External attack. Unified Threat Management, Configuration of Remote VPN connectivity to remote location.
Configure the Fire POWER chassis in clustered and then after HA mode to meet the clients ever changing design requirements
Design Installation and Configuration of Cisco Nexus 9372 DMZ Switches
To hold network information gathering workshops with the Customer to understand the Customer's existing network design and technical requirements of new network designs.
Worked on upgrading F5 device from 11.4 to 11.5.3 to remediate HTTP classes and profiles and Upgrading and relicensed F5 LTM.
Configuration, migrations, upgrades of F5 Big IP LTM 3400, 6400, 8900 running v4.x to 10.2.x, Active/Standby.
Implemented and Managed Cisco Nexus 7010, 7700 and Nexus 5596UP Switches configured with FEX 2248 extenders
Configured OSPF, Multicast and static route on Firewalls.
To raise equipment's Return Material Authorizations (RMA's) and to track these through to problem resolution
Responsible for researching new technology directions and making recommendations for improving the reliability & functionality of LAN & WAN.
Experience with firewall administration, Rule Analysis and Rule modification.
Environment: Cisco 7200/3845/3600/2800/2900, ASR 1000 routers, 2950/2560/3850/nexus 7 series switches, Flow, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, Ether Channels, Sniffer, Solarwinds, WAN, Aruba, Airwave, Clear pass policy manager, AWS, VMware, Infoblox, Palo Alto firewalls, Cisco Prime Infrastructure, Checkpoint, check point firewall.
Disney May 2015 – Nov 2016
Network Engineer
Responsibilities:
Complete ownership Self-Hosted Openstack environment comprised of EqualLogic 10GbE; Force10; Cisco Routing, Nexus Switching, and ASA firewalls; and Fortinet Firewalls
Design an available and secure firewall solution for the Cloud program
Performed Proxy testing which serves Layer-7/ HTTP traffic and other Proxy features like HEADER ERICHEMENT, TFD, LTMI and Video Optimization.
Worked on call flows involving IMS architecture - VOLTE, IP messaging (RCS)
Lead the testing team on Virtualized Proxy which supports port 80 traffic in connected car project.
Also migrated from the hierarchical tree networking model to leaf-spine design using Ethernet fabric network.
Implementation, configuration and maintenance of Cisco Devices such as Cisco routers, 4500X, 4900M, 4948, 7600 Series, ASR 9010, 9001, 1001
Optimized spine-and-leaf topologies with integrated gateways to provide greater efficiency and transparent mobility for physical and virtual machines and services along with end-to-end visibility.
Involved in test case design, execution and analyze the traces and perform root cause analysis on issues.
Experience and worked on protocols: SIP, DIAMETER, HTTP, GTP, RADIUS, and TCP/IP.
Working closely in sync with other node teams for integration, functionality and understanding.
Worked on Tools like NetScout, IRIS EPC/IMS analyzer, JDSU, Wireshark, HPQC
Worked on Traffic generating tools, IXLOAD and LANDSLIDE SPIRENT
Integration, Testing, Verification and Software upgrade of Ericsson’s Multi Server Proxy (MSP) Solution in AT&T’s Core Network for optimizing HTTP, MMS and video traffic.
Providing ongoing customer support throughout implementation as well as driving new solutions development for MSP.
Solution deployment and implementation was done on various Servers running on Linux
Configured network interfaces, routes, DNS, DNAT, NTP, IPAM and SNMP on traffic servers and VLAN on network switches.
Implementation of name resolution using WINS & DNS in TCP/IP environment
Performed troubleshooting of networking issues in MSP system using tools like TCP dump, traceroute, and netstat, nslookup and SQL queries.
Configuration and management of various Virtual Servers.
Created Test Plans and executed regression and call-flow testing between Mobile Proxy, RADIUS Server, LDAP server, F5 Load Balancer and Webserver using Wireshark and Pureload.
Migrated AAA server to ISE 2.0 from legacy ACS servers
Optimized the IP network with the F5 BIG-IP platform
Worked on Net scaler MPX, VPX and SDX.
Experience with Palo Alto - Firewall Administration, Rule Analysis, Rule Modification
Performed Deep packet inspection using Wireshark for various protocols like RADIUS, HTTP, LDAP and SSL.
Responsible for addressing all issues on core nodes (MSS, MGW, SGSN, MME, CPG, MSP and IMS) related to performance, capacity and QOS and provide sustainable technical solutions through engineering and/or tools for AT&T.
Involved in migration of virtual machines from VMware ESX 4.1 to ESX 5.0/5.5.
Involved in Corporate Sponsored Data and SOCKS, Toggle Voice testing
Worked on SD interface testing and performance testing, failover resiliency
Dealt with EAP-AKA authentication
Implementation of EAP-AKA protocol on voice over WIFI calling
Implemented DER and DEA, Post challenge request messages for authentication on AAA and HSS
Implementation of Radius and Diameter (RFC 3588, RFC 4072) interface with EAP for AAA Controller
Integration of EAP module with R6 module.
Initial troubleshooting Cisco routers and switches, problem analysis, isolation of network events in a 24x7 NOC
Created and designed network layout and documented network system design with detail information using Visio
Working with deploying services to virtual environments like OpenStack, VMware, etc.
Configured and managed VLANs, 802.1Q Trunk, RPVST+, Inter-VLAN routing, HSRP and LAN security for Layer-2 and Layer-3 switching domains as per the organization's requirement plan
Pramathi Technologies, Hyderabad, India July 2012 – Nov 2014
Network Administrator
Responsibilities:
Responsible for entire LAN and WAN maintenance and troubleshooting of the company network
Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements
Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 7010 5000 series to provide a Flexible Access Solution for a datacenter access architecture
Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000
Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer
Design an available and secure firewall solution for the Cloud program
Involved in project planning, deploying and reviewing based on the requirements within the existing network
Reviewing all changes to network configuration for technical accuracy and providing solutions to Multi-Protocol Network problems
Configured and managed VLANs, 802.1Q Trunk, RPVST+, Inter-VLAN routing, HSRP and LAN security for Layer-2 and Layer-3 switching domains as per the organization's requirement plan
Experience Working on Traffic generating tools like IXIA and LANDSLIDE SPIRENT.
Worked with F5 Load-Balancers and the following software modules: LTM, ASM, AFM, GTM
Tested various BGP attributes like local preference, MED, Weight and replicated customer issues in the testing environment lab
Routing protocol configuration such as OSPF, IS-IS, EIGRP and BGP, Router redundancy configuration (HSRP, VRRP and GLBP)
Administrated LAN and WAN with of TCP/IP, NAT, PPP, ISDN and associates network protocols and services.
Multicasting, Route redistribution, Route Filtering using Distribute list
IP Allocation for all applications and servers with high availability throughout the company
Configured ASA 5540 to ensure high-end security on the network with ACLs and Firewall
Experience working on Net Scaler platform for SDN. Also worked on Network automation, HPNA
WAN Technologies (PPP, Frame Relay, ATM, ISDN, Site to Site VPN)
Exposure to building frameworks based upon SDN/NFV functionality.
Provided application level redundancy and availability by deploying F5 6500 series LTM load balancers
Worked on F5 BIG-IP LTM 6900, configured profiles, and provided and ensured high availability
Experience in design, implementation, and support of F5’s Big-IP Access Policy Manager (APM) software component in a complex enterprise environment
Involved in designing WAN infrastructure for redundancy in case of link failure
Responsible for technical evaluation, troubleshooting, overall project management, problem solving and turn-up of the service with the ISP
Created and designed network layout and documented network system design with detail information using Visio
Involved in Principle Architect for Next Generation Security Data Center project utilizing SDN (Software Delivered Networks) including technologies like OpenStack and ACI
Implementation of HA-JSRP in JUNOS devices, SRX Series Router/Firewall in both A/A and A/P mode
Environment: Cisco 3750/3550/3500/2960 switches and Cisco 7200/3700/3600/2800/2600/2691 routers, EIGRP, OSPF, BGP, VLAN, Cisco Packet tracer and GNS3 simulators for Network design, KIWI for Network Management