Ramesh
*****@*************.***
SUMMARY
Network Professional with 7 Plus years of experience in Designing and troubleshooting LAN,
WAN, MPLS in Branch, Campus and Data Center environments.
Expert level knowledge of troubleshooting, implementing, optimizing and testing of static and
Dynamic routing protocols such as EIGRP, OSPF, BGP; ability to interpret and resolve complex route table problems.
Responsible for supporting Palo Alto using Panorama centralized management and Cisco ASDM.
Configured policies and URL filtering according to company security policy on Palo Alto fire wall.
Implementing traffic policy changes with Cisco PIX Firewall appliance switch WAP configuration and installations.
Hands on experience on inspection, data loss prevention, content caching and bandwidth management using bluecoat proxy.
My responsibilities include Monitoring and Configuration of Cisco ASA 55xx series firewalls.
Updated firewall rules and provided support for checkpoint 13500 firewalls. Used checkpoint console 77.30 and 77.47. Also worked with ASA firewall ASDM.
I did Firewall policy provisioning on Fortinet Fortigate appliances using FortiManager.
I do have Working experience on Fortigate 5000-series security appliance to maintain SSL Inspection, Application control, Firewall and VPN management.
Implemented Panorama to create policies and monitor on multiple Palo Alto firewall at different locations.
Helped in design and installation of test network environment of over 300 servers running in parallel of production data center.
Do have experience of Implementing Change Management & Backout Plan documentation for all change services.
Do have experience with Installation as well as upgradation of Cisco IOS on Cisco switches and routers.
Do have experience with implementing layer 2 and layer 3 policies
Provided active support for defining policies and configuring Palo Alto PA-5020
Implementation of traffic filters on Cisco routes using Standard, extended Access list.
Expert Level Knowledge about TCP/IP and OSI models.
I interface directly with internal and external in the Strategic Planning and execution of a DMZ migration from Cisco ASAs Firewalls to Palo Alto Networks of Next Generation Firewalls.
In-depth expertise in analysis, implementation, troubleshooting & documentation of LAN/WAN
Install and upgrade bluecoat proxy SG (900, 810 and SG9000 series) and Proxy AV (510,810 and 1400 series) in all the Datacenters.
Extensively worked on Juniper models EX 2200, EX 4200, EX 4500, MX-480, M Series, SRX210 and SRX240. Configured CISCO content switch for load balancing and Netscalar load balancing.
Worked on F5 BIG-IP LTM 8900, Citrix and Netscalar configured profiles, provided and ensured high availability.
WAN, MPLS, P2P, DMVPN, and Internet Routers (Cisco and Juniper)
Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
Hands on experience on inspection, data loss prevention, content caching and bandwidth management using bluecoat proxy.
Configured policies and URL filtering according to company security policy on Palo Alto fire wall.
Experience working on Juniper based Mx series router, SRX 220 firewall.
Avaya switching and Network/Routing.
Have experience in Install and monitor application traffic using network protocol monitoring tools such as NTOP and Wireshark.
Knowledge working with API's for troubleshooting Network issues using wireshark and NTOP.
Experience configuring Virtual Device Context in Nexus 9k, 7k, 5k and 2k.
Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF,
LDP, EIGRP, RIP, BGP v4, MPLS
Hands on Experience testing iRules using Browser (IE), HTTP watch, curl, Scripts (shell/batch
file/Perl) and host files
Involved in Designing and deployed F5 Networks Load balancer to migrate from old Cisco ACE30-MOD-K9 module (bridged mode) to a simpler solution with F5 BIG-IP 7200 Routing Domains.
Built RSYSLOG server to store syslog messages from Firewalls, Switches, Routers and load balancers.
Configuring and testing Multicast for both IPv4 and IPv6 routing in Data Environment
Technical Knowledge on Cisco DMZ, ASA 5500 series firewalls.
Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN
Trunks, VTP Ether channel, STP, RSTP and MST.
Experience in troubleshoot network issues including boundary protection devices, Cisco
Nortel/Avaya and Bluecoat Proxy Servers
Responsible for the acquisition, installation, support and implementation of an Avaya CS1000 suite of equipment in support of the Department of State Embassy’s.
Migrating existed bluecoat Proxy infrastructure with MacAfee Web Gateway using Parent/Child architecture across multiple Data Centers using F5's LTM load balancer
Trunk, Vlan, Ether channel, port security, routing protocols including EIGRP, OSPF & BGP and
Other related technologies such as multicasting, IP Telephony & IP Video.
Hands-on configuration and experience in setting up Cisco routers to perform functions at the
Access, Distribution, and Core layers.
Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate
Applications and their availability
Expertise in configuring and troubleshooting of Palo Alto, Juniper NetScreen & SRX Firewalls and their implementation
Do have experience on Configuring NAT onto the Juniper SRX firewalls using Inflobox.
Installation & configuration of Microsoft Proxy Server 2.0 and Inflobox DNS, DNCP and IP Address Management
Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall.
develop cron jobs and Shell Scripts for automating administration tasks like file system management and process management, Server reboots
Creating and provisioning Juniper SRX firewall policies.
Experience using Cisco ASR 1K, 9K series switches.
Experience working with JUNOS OS on Juniper Routers and Switches.
Working knowledge of frame relay, MPLS services, IPSecVPN's, OSPF, BGP and EIGRP routing protocols, NAT'ing, sub-netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS,
TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP &
Multicasting protocols.
Experience in the setup of Access-Lists, and RIP, EIGRP, and tunnel installations.
Proficiency in configuration of VLAN setup on various Cisco Routers and Switches.
Good knowledge and experience in Installation, Configuration and Administration of Windows
Servers Active Directory, FTP, DNS, DHCP, TFTP, Linux OS under various
WAN environments.
Education: Holds a bachelor’s degree from JNTU
CERTIFICATIONS
CCNP (Cisco Certified Network Professional)
CCNA (Cisco Certified Network Associate)
TechnicalSkills
Cisco Routers : 1600,1700,2600,2800, 2900, 3600, 3800, 7200 and 7600
Cisco L2 & L3 Switches : 1900, 2900, 3560, 3750, 4500, 4900, 6500
Cisco Nexus : 5020, 5548, 5596T, 2148, 2248TP, 2348UPQ, 7010, 7702
Juniper : EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210,
SRX240, Juniper Netscreen, IDP Technologies, Junos IOS.
LAN Technologies : Ethernet, Fast Ethernet, and Gigabit Ethernet, SMTP, VLAN,
Inter-VLAN Routing, VTP, STP, RSTP, Light weight access
Point, WLC.
WAN Technologies : Frame Relay, PPP, HDLC, (E1/T1/E3T3), DS3, OC192.
Network Security : Cisco ASA, ACL, IPSEC-VPN
OS products/Services : DNS, DHCP, Windows (2000/2003/2008, XP), UNIX, LINUX.
Routing Protocols : OSPF, EIGRP, BGP, ISIS, VRF, PBR, Route Filtering,
Redistribution, Summarization, and Static Routing.
Gateway Load Balancing : HSRP, VRRP, GLBP, EBGP
Various Features / Services : IOS and Features, IRDP, NAT, SNMP, VM Ware, AWS, NTP, DHCP,
TFTP, FTP, VoIP, DDoS, L4
Network Management Tools : Solarwinds, Wireshark, Netflow Analyzer, Cisco Works, Ethereal,
SNMP, HP open view. Security Server Protocols TACACS+,
RADIUS.
Facilities : DS0, DS1, DS3, OCX, T1/T3
Load Balancers : Cisco CSM, F5 Networks (BIG-IP) LTM 8900, BIG-IP GTM 6800,
Cisco ACE 4710.
Operating Systems : Windows (98, ME, 2000, XP, Server 2003/2008, Vista, Windows
7/8), Linux, UNIX.
Firewall & Security : Checkpoint (R62, R65, R70, NGX), WAF, bluecoat, Cisco ASA,
Palo Alto, Juniper SRX, FortiGate 5000-series.
Professional Experience
PSEG, Newark, NJ Apr 2015- Present Network Security Engineer
Responsibilities:
Configuring Static, IGRP, EIGRP, and OSPF Routing Protocols on Cisco 1600, 2600, 2800, 3600, 7300 series Routers.
Manage Cisco and Juniper Firewall access lists, address translation, and Site to Site IPSec and remote connection VPN's
Deployed on Nexus 7000, 5000 and 2000 series with V-Block servers and Cisco UCS E-series.
Experience in working with Cisco Nexus 2148 Fabric Extender and Nexus 7010, 5000 series to provide a Flexible Access Solution for datacenter access architecture.
Helped in design and installation of test network environment of over 300 servers running in parallel of production data center.
Do have experience of Implementing Change Management & Backout Plan documentation for all change services.
Expertise in configuring and troubleshooting of Palo Alto, Juniper NetScreen & SRX Firewall and their implementation.
Experience in configuring, upgrading and verifying the NX-OS.
Extensive knowledge of basic networking hardware (routers, switches, bridges) and protocols (UDP, TCP/IP)
Configuring RIP, OSPF and Static routing on Juniper Routers.
Expert-level professional experience with Cisco iOS or Juniper JunOS including configuration and troubleshooting.
Have great hands on experience on Configuring and manage bluecoat 510 directors in active and Standby mode.
Implemented Panorama to create policies and monitor on multiple Palo Alto firewall at different locations.
Performing network monitoring, providing analysis using various tools like Wireshark, Solar winds.
Implementing traffic policy changes with Cisco PIX Firewall appliance switch WAP configuration and installations.
My responsibilities include Monitoring and Configuration of Cisco ASA 55xx series firewalls.
Provided active support for defining policies and configuring Palo Alto PA-5020
Involved in Installation and configuration of SSL certificates on Cisco ACE and F5 Appliances
Design, Implement & troubleshooting of Juniper switches, routers and Firewalls EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210, SRX240, SRX 3600/650.
Configuring and implementation of Juniper Firewall, SSG Series, Net screen Series ISG 1000, SRX Series.
Do have experience with Configuration and administration of Nexus 5020 and 2248 server access switches, utilizing Nexus FEX and VPC connections.
Setting of IT Infrastructure using Nexus Switching /Cisco UCS.
Configuration of Nexus 7010 including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer links
Maintaining software applications, operating systems w/Hyper-V, VMware, SCCM, SCOM, SCVMM, SCORCH, SCSM, SCVMM.
Have experience in Install and monitor application traffic using Network protocol monitoring tools such as NTOP and Wireshark.
Experience working on Juniper based Mx series router, SRX 220 firewall.
Created and resolved Palo Alto and Checkpoint Firewall Rules, Routing, Pushed Policy.
Responsible to evaluate, test, configure, propose and implement network, firewall and security solution with Palo Alto networks.
Expansion and implementation of current data center for different phases of migration.
Perform extensive testing around the upgrade, migration and configuration functionality of our software.
Migrated VIPs from old Cisco ACE and CSM to F5 Load balancers.
Sound knowledge of data communication wiring (CAT5/5E/6A and Fiber optics)
Configured Easy VPN server and SSL VPN to facilitate various employees’ access internal servers and resources with access restrictions.
Responsible for entire company network infrastructure that includes Cisco Switches, Routers, Firewalls, Access Points, Servers and PBX.
Expertise in configuring and troubleshooting of Palo Alto, Juniper NetScreen & SRX Firewalls and their implementation.
Implementation of Site-to-Site VPNs and DMVPN over the internet using IKE Phase 1 and IKE Phase 2 based on traffic with ASA 5500 series Firewalls.
Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access layer switches such as Cisco 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.
Have great hands on experience on Configuring and manage bluecoat 510 directors in active and Standby mode.
Avaya switching and Network/Routing.
Responsible for the acquisition, installation, support and implementation of an Avaya CS1000 suite of equipment in support of the Department of State Embassy’s.
Managing and troubleshooting of Juniper M320 routers including installation, upgrade, configuration and network management.
Configuration and troubleshooting of CSM, integration with ASA devices.
Experience in migration of VLANS & Configured VLANs with 802.1q tagging, Ether channels, and Spanning tree for creating Access/distribution and core layer switching.
Creation of firewall rules on Checkpoint Smart Dashboard and install policies.
Management of corporate Checkpoint Firewall implementing security protocols and alleviating network attacks.
Installation & configuration of Microsoft Proxy Server 2.0 and Inflobox DNS, DNCP and IP Address Management
Upgraded the infrastructure from SCCM2012 R2 to SCCM 1602 and redeployed the client
Provided support and suggestions for Cisco voice infrastructure.
Deployed Palo Alto Firewalls for web filtering and application control.
Configured EBGP load balancing and ensured stability of BGP peering interfaces.
Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.
Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.
Do have experience on Configuring NAT onto the Juniper SRX firewalls using Inflobox.
Installation & configuration of Microsoft Proxy Server 2.0 and Inflobox DNS, DNCP and IP Address Management
Configuring DNS and DHCP configuration in Inflobox.
Analyzed existing SCCM 2012 R2 implementation
Worked on FortiGate 5000-series security appliance to maintain SSL Inspection, Application control, Firewall and VPN management.
Worked extensively on Cisco ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.
develop cron jobs and Shell Scripts for automating administration tasks like file system management and process management, Server reboots
Worked on migration of existing PIX firewall to ASA firewall, PIX OS upgrade from 6.3 to 7.0.
Design and Implement DMZ for FTP, Web and Mail Servers with CISCO PIX 506, PIX515.
Mapped, Network Diagrams and physical identification in MS Visio.
Worked with engineering team to resolve tickets and troubleshoot L3/L2 problems efficiently.
Configured Cisco 2800, 3800 routers and 3750, 4500, 6500 switches as part of the implementation plan.
Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960 6500 switches and Cisco 3640/1200/
7200/7600/3845/3600/2800 routers, Cisco Nexus5k/2k, Cisco ASA 500, Juniper-net screen 5200/500, EX-2200/4200/4500, MX-480, M Series, SRX-210/240, Fortigate,SRX-3600/650,F5 Load balancer, Checkpoint, IDS/IPS, WAF, HSRP, VRRP, STP, RTP, F5 BIGIP LTM, Inflobox, RIP, OSPF, BGP, EIGRP, Wire-shark, LAN, WAN, VPN, VoIP infrastructure.
Capital One, Mclean, VA Aug 2014 – mar 2015
Network Security Engineer
Key Responsibilities:
Performed network implementation that includes configuration of routing protocols, leased lines, ISDN lines, VLANs and IOS installations.
Troubleshot the network issues onsite and remotely, depending on the severity of the issues.
Deployed and decommissioned the VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices.
Had hands-on experience with WAN (ATM/Frame Relay), Routers, Switches and IP addressing.
Configured and deployed VPC, OTV, FABRIC PATH between Nexus 7010 and Nexus5596, 5548 switches.
Migrating existed bluecoat Proxy infrastructure with MacAfee Web Gateway using Parent/Child architecture across multiple Data Centers using F5's LTM load balancer
Implemented Panorama to create policies and monitor on multiple Palo Alto firewall at different locations.
Provided active support for defining policies and configuring Palo Alto PA-5020.
I interface directly with internal and external in the Strategic Planning and execution of a DMZ migration from Cisco ASAs Firewalls to Palo Alto Networks of Next Generation Firewalls.
The FortiGate Firewall use FortiASIC technology, an Application-specific integrated circuit which is designed for accelerated processing of security and networking functions,
I do experience on Fortinet's premiere Advanced Threat Protection appliance.
Monitoring Network infrastructure using SNMP tools HP NNM, Solar-Winds and Opnet.
Involved in Designing and deployed F5 Networks Load balancer to migrate from old Cisco ACE30-MOD-K9 module (bridged mode) to a simpler solution with F5 BIG-IP 7200 Routing Domains.
Monitoring Network infrastructure using SNMP tools HP NNM,Solar-Winds and Opnet.
Performing Network monitoring, providing analysis using Solarwinds
Upgraded an SCCM 2012 R2 infrastructure to SCCM to support doubling managed clients to 94,000 Windows Servers and Desktops
Redesigned SCCM 1602 infrastructure to better meet business objectives and requirements
Responsible for supporting Palo Alto using Panorama centralized management and Cisco ASDM.
Configured policies and URL filtering according to company security policy on Palo Alto fire wall
Built RSYSLOG server to store syslog messages from Firewalls, Switches, Routers and load balancers.
Extensively worked on Juniper models EX 2200, EX 4200, EX 4500, MX-480, M Series, SRX210 and SRX240. Configured CISCO content switch for load balancing and Netscalar load balancing.
Worked on F5 BIG-IP LTM 8900, Citrix and Netscalar configured profiles, provided and ensured high availability.
Configuring DNS and DHCP configuration in Inflobox.
Install and upgrade bluecoat proxy SG (900, 810 and SG9000 series) and Proxy AV (510,810 and 1400 series) in all the Datacenters.
Responsible for supporting Palo Alto using Panorama centralized management and Cisco ASDM.
Have experience in Install and monitor application traffic using network protocol monitoring tools such as NTOP and wireshark.
Knowledge working with API's for troubleshooting Network issues using Wireshark and NTOP.
Designed 10 gigabit networks using Cisco Nexus7000 series switches, and Cisco 3800 series routers
Designed new Datacenter Network with Cisco Nexus 7700, 5000 and 2000 switches to replace old 6500/4500s
Configured policies and URL filtering according to company security policy on Palo Alto fire wall.
Hands on experience on inspection, data loss prevention, content caching and bandwidth management using bluecoat proxy.
Implemented Panorama to create policies and monitor on multiple Palo Alto Firewall at different locations.
Coordinates with local and long distance network carriers to resolve technical telephonic issues
Programs and implements new networks and changes to existing networks on the Avaya/Audix Voice Network system
Hands on experience on inspection, data loss prevention, content caching and bandwidth management using bluecoat proxy.
Configure and manage bluecoat 510 directors in active and Standby mode.
Worked with layer 4 switching technology architecture. Implemented L2 and L3 switching functionality, which includes the use of VLANS, STP, VTP and their functions as they relate to networking infrastructure requirements including internal and external treatment, configuration and security.
Worked with convert Checkpoint VPN rules over to the Cisco ASA solution.
Experience in migration with both Checkpoint and Cisco ASA VPN .Involved in configuring Cisco Net flow for Network performance and monitoring.
Administering Juniper SRX and Checkpoint Firewalls at various zones including DMZ, Extranet and ASZ.
Migrating existed bluecoat Proxy infrastructure with MacAfee Web Gateway using Parent/Child architecture across multiple Data Centers using F5's LTM load balancer
Install and configure bluecoat ProxySG in the network for web traffic management and Policy configuration
Experience of performing software upgrades and patching to F5 appliances.
Do have experience in Installation and configuration of F5 Load balancer appliances from scratch.
Supported core network consisting of Cisco 7200 series routers running multi area OSPF.
Configured EIGRP and OSPF as interior gateway protocols with route filtering and route redistribution. Troubleshot complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF and BGP.
Migrating existed bluecoat Proxy infrastructure with McAfee Web Gateway using Parent/Child architecture across multiple Data Centers using F5's LTM load balancer.
Responsible for all aspects of TCP/IP functionality across multiple enterprise environments.
Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
Involved in Implementation and Configuration (Profiles, I Rules) of F5 Big-IP C-4400 load balancers
Provided active support for defining policies and configuring Palo Alto PA-5020
Configured ASA 5500-X Series firewalls to provide highly secure and high performance connectivity between the site locations.
Configuring Big-IP F5 LTMs (virtual servers, pools, SNATs, health monitors, iRules) for managing the traffic and tuning the load on the network servers.
Managing and troubleshooting of Juniper M320 routers including installation, upgrade, configuration and network management.
Worked on Juniper SRX 5800 firewalls to create policies using J-Web User Interface.
Managing firewall rules for SRX firewall for both Zone and Global policy.
Performed Network Address Translation on Cisco ASA 8.2 and 8.3
Used DHCP to automatically assign reusable IP addresses to DHCP clients.
Performed the ACL request changes for various clients by collecting source and destination information from them.
Troubleshoot the BIG-F5 1600 LTM through constant contact with the vendor.
Created MOPS (Method of procedures) and sought the approval of peers to perform configuration changes.
Environment: Cisco Routers, Cisco Switches, Nexus 9k/7k/5k/2k Routing protocols,F5, Load Balancer HSRP, VRRP, IPSEC VPN, VPN, QOS, Fortigate, bluecoat, ASA firewall, Load balancer, DDoS, MPLS, VLANS, VTP, RSTP, ACL, NAT, IDS/IPS, Monitoring tools(PRTG, HP Openview), SIP, RTP, RADIUS, TACACS+, Cisco Wi-Fi technologies, Juniper SRX, ASR 9000, Catalyst 6500, WAF, Solar-winds,Cisco ASR Firewall.
Western Union, Washington, DC Feb 2012 – July 2014
Network Engineer
Responsibilities:
Responsible for the configuration of Cisco Routers (7000, 5300, 4000, 2500, 3000, 2600) using RIP, IGRP, OSPF, EIGRP, BGP
Implemented Cisco IOS Firewall IDS using 2600 series router
Configured and installed multi-protocol (IP, IPX) multi-interface Cisco routers
Managed office network with Cisco devices with network devices including 2500 and 3600 series routers and 3500, 2900, 1900 series switches
Responsible for Cisco ASA firewall administration across our Organizational networks.
Have experience with HA for Palo Alto Firewall with Cisco ASA
Involved in the redistribution of OSPF on the core ASA firewall.
Analyzed and resolved a high percentage of initial customer contact in the areas of PC/LAN.
Dealt with customer problems to management and support groups utilizing standard escalation model.
Monitored Network for optimum traffic distribution and load balancing using Solar-Winds.
Responsible for Checkpoint firewall management and operations across all networks in capital one.
Experience with Working on Checkpoint Support for resolving escalated issues
Coming to Security polices responsible for maintaining the Checkpoint security policies including NAT, VPN and Secure Remote
Responsible for supporting Palo Alto using Panorama centralized management and Cisco ASDM.
Configured policies and URL filtering according to company security policy on Palo Alto firewall.
Experience administration and configuration of Cisco PIX, ASA and Checkpoint firewalls.
Experience on PIX Firewalls, ASA firewalls. Implemented Security Policies using ACL, firewall, IPSEC, SSL, VPN, IPS/IDS.
Configure ASA 5520 Firewalls to support Cisco VPN Client on Linux environment.
Responsible for the advanced testing and analysis of all elements within the Radio Access Network (RAN) topology, training, special projects, Network outages for shift
Extensive experience in configuring and implementing OSPF and BGP.
Performed remote T-1/T3 testing and trouble isolation via Net analyst
Supported core network consisting of Cisco 7200 series routers running multi area OSPF.
Configured EIGRP and OSPF as interior gateway protocol with route filtering and route redistribution, installed and maintained Cisco 3600, 2600 and 7200 backbone routes with HSRP
Implemented stub/Totally stub areas and various OSPF features like route-summarization and SPF throttling.
Implemented the Access lists and policy mapping on Juniper router installed in each branch across all the states.
Experience with site to site VPN in Juniper SRX as per customer.
Implemented various EX, SRX & J series Juniper devices
Involved in the redistribution of OSPF on the core ASA Firewall.
Experience administration and configuration of Cisco PIX, ASA and Checkpoint Firewalls.
Experience on PIX Firewalls, ASA firewall. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS.
Migrating existed bluecoat Proxy infrastructure with MacAfee Web Gateway using Parent/Child architecture across multiple Data Centers using F5's LTM load balancer
Install and configure bluecoat ProxySG in the network for web traffic management and Policy configuration
Expertise in configuring and troubleshooting of Palo Alto, Juniper NetScreen & SRX Firewalls and their implementation.
Hands-on experience with WAN technologies like T1/T3, DS3, STM1 and STM4 circuit types
Implemented Cisco Secure Access Control Server (ACS 3.0) for TACACS+/RADIUS
Knowledge with redistribution of routing protocols and Frame-Relay configuration
Handled Network Migration from RIP to OSPF
Expertise in configuring and troubleshooting of Palo Alto, Juniper NetScreen & SRX Firewalls and their implementation.
Implementation of TCP/IP and related Services-DHCP/ DNS/ WINS
Configured, maintained and troubleshot routing protocols such as OSPF, EIGRP and BGP.
Engaged in office moves, helped in identifying network requirements of new building, installed new networking hardware, and coordinated with vendors for cabling/wiring
Performed troubleshooting, while maintaining trouble ticket tracking, following both internal/external routes.
Configured CISCO content switch for load balancing and Netscalar Load balancing.
Worked on F5 BIG-IP LTM 8900, Citrix and Netscalar configured profiles, provided and ensured high availability.
Assisted with escalation procedures and customer notifications.
Configured Cisco Routers for OSPF, IGRP, RIPv2, EIGRP, Static and default route.
Upgraded Cisco Routers, Switches and Firewall (PIX) IOS using TFTP
Acted as Tier 3 support for connectivity, failures, configuration, implementation, and troubleshooting.
Provided project management for data center cabling, documented all network drawings using Visio
Design, test, and implement global Next Generation MPLS network (150 sites) using Cisco 3800, 2800, 2600, and 1721 routers using BGP and EIGRP protocols.
Implementing traffic policy changes with Cisco PIX Firewall appliance switch WAP configuration and installations.
Environment: Cisco 2600/2800/3600 Cisco 2950/2960 series switches, Juniper Netscreen, Cisco Routers 7000, 5300, 4000, 2500, 3000, 2600, NAT, Citrix Netscalar, Bluecoat, Cisco ASA, PAT, DHCP, DNS, OSPF, EIGRP, Palo Alto, F5 Load balancer,Checkpoint, MPLS, ASR, TCP/IP, LAN, WAN.
MBR Informatics, Hyderabad, India April 2010 – Jan 2012
Network Engineer
Responsibilities:
Configured OSPF on CISCO devices with multiple routing processes and redistributed them. Tested and hands on experience in multi area OSPF topologies.
Configuring, managing and troubleshooting networks using routing protocols like RIP, EIGRP and OSPF (Single Area and Multi Area).
Assisted with troubleshooting all network issues with routers and switches when necessary and consulted with on call tech as needed for client.
Implementing traffic policy changes with Cisco PIX Firewall appliance switch WAP configuration and installations.
My resposibilities include Monitoring and Configuration of Cisco ASA 55xx series Firewalls.
Responsible for Cisco ASA Firewall administration across our Organizational networks
Experience with Installation as well as upgradation of Cisco IOS on Cisco switches and routers.
Monitor, troubleshoot, test and resolve Frame Relay, ATM, MLPPP, PPP, and Dial-up.
Configuring/Troubleshoot issues with the following types of routers Cisco (7200, 6500, 4500, 1700, 2600 and 3500 series), to include: bridging, switching, routing, Ethernet, NAT, and DHCP, as well as assisting with customer LAN /MAN.
Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
Installation and Configuration of various types of Personal Computers and Printers. Installation of different operating systems on Intel based PC's.
Configuring Vlan’s, VTP’s