Post Job Free
Sign in

Network Engineer ( CCIE )

Location:
Toronto, ON, Canada
Posted:
March 23, 2016

Contact this candidate

Resume:

HIGHLIGHTS OF QUALIFICATION

Networking professional with over 6+ years of relevant experience and exposure along with CCIE Security certification (CCIE#51276).

Expertise in Network Security and Content technologies with Cisco TAC.

Wide exposure in networking technologies having worked on Cisco, Firewall, Web Security Appliance (WSA), Security Management Appliance (SMA), Access Control Server (ACS), Identity Service Engine (ISE), Radius Protocol, Tacacs+ Protocol, VPN, AAA, Wireless, Routers, Switches.

Skillful in troubleshooting, designing and optimizing complex networks to improve network operation and performance.

Excellent communication and interpersonal skills with problem solving and analytical abilities.

Having worked both in support and implementation domains in the networking field, have exposure on various technical as well as ground level difficulties.

RELATED NETWORKING EXPERIENCE

NETWORK SPECIALIST - Cisco Systems, Inc

May 2013 - May 2015

Core Responsibilities:

Part of Network Security Team and I was responsible for deploying Access Control Servers (ACS), Ironport Cisco Web Security Appliances (WSA), Security Management Appliance (SMA), Identity Service Engine (ISE).

Design and implement Cisco Access Control Servers, Cisco Identity Service Engine and Ironport Web Security Appliance solutions for Mid/Large scale customers.

Provide support for customer networks and responsible to ensure projects are delivered on time.

Understand and evaluate the business goals of the customer and provide advice and direction in both operational processes and technical architectures.

Worked in Customer’s Data Centre, assisted customers in installing, maintaining and troubleshooting Cisco Products in the live environment.

Provide an effective high-level assessment of the costs, benefits and risks to develop and deliver total solutions.

Evaluate technology opportunities for new customer service offerings.

Network planning, design, optimization and consulting, Design part of security network for more than 20 different companies and managed them.

Responsible for understanding customer requirement and taking decision to deploy the Cisco Security products.

Responsible for installing, configuring, troubleshooting and maintaining them till they were moved in production environment.

Assisted customer in opening a TAC case and resolving the issues on priority bases.

Devices worked on: ACS 3.x, ACS 4.x, ACS 5.x, ISE, WSA, SMA, Ironport, ASA 5500-x series, PIX Firewall ñ PIX 500 Series, Routers ñ 1700, 1800, 2600, 2800, 3600, 3800 and 7200 Series, Switches-3550, 3750, 4000, 6500, Wireless 1100, 1200, 1300, 1400 AP's and bridges.

Sectors worked in: Aerospace (Nasa), Defense and Security (DoD, US Military), Airline Industry (Lufthansa, Air India, Banking (BMO, JPMorgan Chase, Citigroup, BOA), Health (Hospitals ), Telecom (Bell, AT&T, Airtel, Vodafone), Automobile (Mercedes, BMW), Tourism (Disneyland)

Role Breakdown: Network Design 30%, Network Deployment 30%, Development/Testing 20%, and Troubleshooting 20%

NETWORK ENGINEER - Cisco Systems, Inc

December 2010 - April 2013

TAC Escalation engineer serving enterprise/mid-market accounts utilizing Cisco's Security devices and solutions.

Acting as Technical Lead - Handle escalation calls and assists other engineers on complex issues requiring advanced troubleshooting and research skills.

Provide technical reviews on cases to help resolve them quickly. Actively work along with the team mates to meet the team CSAT & TSAT target and suggest methods of improvement in SR handling and delivery.

Conduct technology training for new joiners.

Identify training needs of the team members, conduct training sessions and hence help in performance enhancement and skill set addition of the team.

Analyze team performance on the escalation rates, reasons and preventive measures to reduce the same.

Setup test beds for customer reported issues with the Cisco products & features, verify them as software bugs using different debugging tools and assign them to the development team.

Build and maintain strong partnerships with key stakeholders in the Business Unit team and Product Engineering to help resolve the issues quickly.

Do technical and process related documentation on the Team Database so that it could be helpful to new people coming in.

Integrated F5 load balancers ( BIG-IP ) with Cisco ISE and ACS.

Set-up, maintain and manage the LAB for the team, and all related responsibilities.

Assisting engineers on aged & complex cases.

Provide technical assistance to the customers on complex issues of TACACS+, RADIUS, EAP, PKI, 802.1x Authentication Authorization & Accounting, Active Directory & RSA two factor Authentication on the ACS 5.x, ACS 4.x, CAS, ISE, ASA.

Audit cases worked upon by the team, and provide technical analysis and improvement feedback to the engineers.

Identify Training requirements & Deliver training to the Engineers on new Cisco Security products and features.

Create technical documentation on new features and products of security domain teams to guide the customers through step-by-step process of configuration and troubleshooting of security domain Cisco products. This involves working with development and product verification teams to understand the software code level functionality.

Advise design modifications as and when needed for addressing capacity and performance bottlenecks.

Part of technical interview panel for responsible for qualifying and hiring new candidates.

Familiar with Virtualization: VMware (ESXi) and Microsoft (Hyper-V). Functional knowledge about Red Hat (KVM).

Knowledge of Protocols: HTTP, SSL/TLS, GRE, IKE/ESP/ISAKMP, IPSec, WCCP, DNS, LDAP, Radius, TACACS, Kerberos.

Familiar with concepts of PKI implementations, Intrusion Prevention Systems (IPS), Deep Packet Inspection (DPI), Data Leak Prevention (DLP) Security Information and Event Management (SIEM) and Network Address Translation (NAT).

Network analysis tools (Wireshark, tcpdumps etc.), Design utilities (Microsoft Visio) and Simulation software (GNS3 and Packet Tracer).

Interact with Network Management/Design teams to address network security related incidents and concerns.

Researching and troubleshooting compatibility issues of Cisco devices with other Vendor products.

Mentoring junior engineers and helping them improve their performance.

Coordinating with other teams in providing technical assistance to the customers who open a TAC case with Cisco.

Training on changed and new features with respect to Security domain/technology.

Have hands on Linux operating system (Red Hat), Worked on ACS 5.x and Ironport devices, which are Linux, based platform.

Assisted customers with installing Python script on ACS 5.x.

Devices worked on: ACS 3.x, ACS 4.x, ACS 5.x, ISE, WSA, SMA, Ironport, ASA 5500-x series, PIX Firewall ñ PIX 500 Series, Routers 1700, 1800, 2600, 2800, 3600, 3800 and 7200 Series, Switches-3550, 3750, 4000, 6500, Wireless 1100, 1200, 1300, 1400 AP's and bridges.

Sectors worked in: Aerospace (Nasa), Defense and Security (DoD, US Military), Airline Industry (Lufthansa, Air India, Banking (BMO, JPMorgan Chase, Citigroup, BOA), Health (Hospitals ), Telecom (Bell, AT&T, Airtel, Vodafone), Automobile (Mercedes, BMW), Tourism (Disneyland)

Role Breakdown: Systems Support 35%, Network Design/Support 35%, End-user support 15%, Management 10%, Reporting 5%

ASSOCIATE NETWORK ENGINEER - Cisco Systems, Inc

May 2009 - May November 2010

Timely and quick resolution provided to customers via Email, Phone or WebEx meeting deadlines and providing Customer satisfaction without compromising quality norms and adhering to SLA.

Trained to provide expert level assistance on technologies like AAA (Authentication, Authorization & Accounting), SMA (Security Management Appliance), WSA (Web Security Appliance) and ACS (Access Control Servers), VPN (Virtual Private Network), Firewall.

Support customers with design, implementation and troubleshooting of Cisco Cloud Web Security, Cisco Web Security Appliance, Cisco Content Security Management Appliance, Adaptive Security Appliances (ASA), and Access Control Server Windows (ACS), Access Control Server Linux (ACS 5.x).

Deploying AAA on IOS Routers, Switches, PIX, VPN Concentrator and ASA for user authentication, authorization and accounting using a centralized AAA server using RADIUS/ TACACS.

Using Cisco ACS for deploying various networks access restrictions (NAR) in the network.

802.1X Port-Based Authentication, Configuring Switches and ACS/IAS for dot1x authentication.

Configuring and troubleshooting EAP protocols (PEAP/EAP-TLS/EAP-FAST).

Integration of Cisco Secure ACS with Active Directory, RSA Token Server and LDAP.

Knowledge of Sniffer (Wireshark, tcpdumps) technology and capable of using it efficiently in the process of troubleshooting.

Good understanding of OSI Model, TCP/IP protocol suite (IP, ARP, ICMP, TCP, UDP, SMTP, FTP, TFTP)

Be the escalation point for level 1 in the team in resolving complex issues.

Design and implement several process flows in order to bring effectiveness in daily operations.

Collect syslogs, captures/sniffers and analyze them using Ethereal/Wire shark to get to the cause of the network issue.

Deal with approximately 100 different networks monthly and troubleshoot issues.

Recreate on specific network scenarios to help resolve the issues quickly.

Simulate/reproduce customer’s issues in lab and report any bugs found to Cisco Developers.

Document network diagrams and troubleshooting procedures.

Provide support for highly complex Network Upgrades and Network Migration activities.

Meeting Service Level Agreement on cases based on their priority.

Basic conceptual and configuration knowledge of Routing Protocols RIP, OSPF, EIGRP, Multicast Routing.

Basic conceptual and configuration knowledge - VLANSs, Trunks, STP, inter VLAN routing, DHCP snooping, dynamic ARP inspection, port security and Dot1Q tunneling.

Root Cause Analysis (RCA) in case of outage, coordination with 3rd parties.

Act as Back up for Lead when ever required.

Devices worked on: ACS 3.x, ACS 4.x, ACS 5.x, ISE, WSA, SMA, Ironport, ASA 5500-x series, PIX Firewall ñ PIX 500 Series, Routers ñ 1700, 1800, 2600, 2800, 3600, 3800 and 7200 Series, Switches-3550, 3750, 4000, 6500, Wireless 1100, 1200, 1300, 1400 AP's and bridges.

Sectors worked in: Aerospace (Nasa), Defense and Security (DoD, US Military), Airline Industry (Lufthansa, Air India, Banking (BMO, JPMorgan Chase, Citigroup, BOA), Health (Hospitals ), Telecom (Bell, AT&T, Airtel, Vodafone), Automobile (Mercedes, BMW), Tourism (Disneyland)

Role Breakdown: End-user support 70%, Systems Support 20%, Research 5%, Implementation 5%

EDUCATION & QUALIFICATION

Cisco Certified Internetwork Expert Security (CCIE# 51276) May 2015 to Dec 2015

Amity Institute of Information Technology & Amity University June 2007 to July 2009

MSc in Network Technology & Management

Consistently maintained 8.2 SCGPA throughout education curriculum.

Relevant Subjects: Wireless LAN, Wireless Communications, Satellite Network Planning & Design, Network Management, Operating Systems, System Administration, and Foreign Language.

LinkedIn Profile

ca.linkedin.com/in/harshdsi



Contact this candidate