SaiSumanth D
Senior Firewall Engineer
Email id: *******.***@*****.***
Ph No: 330-***-****
Professional Summary:
Around 8 years of Experience with in designing, deploying and troubleshooting Network & Security infrastructure on Routers, Switches, Firewalls of various vendor equipment.
Extensive work experience on Load Balancers and Firewalls.
Worked on F5 BIG-IP LTM 8900, Citrix NetScaler configured profiles, provided and ensured high availability.
Worked on Load Balancer F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.
Experience working on Palo Alto Firewalls.
Responsible for Check Point and Cisco ASA &Palo Alto Firewalls environment.
Experienced with Juniper: EX-2200, EX-4200, EX-4500, MX-480, and M Series, SRX210, SRX240.
Strong hands on experience on PIX Firewalls, ASA (5540/5550) Firewalls.
Implemented Security Policies using ACL, IPSEC, SSL, VPN, IPS/IDS.
Configured ASA 5520 Firewall to support Cisco VPN Client on Windows 7/XP/Vista.
Configured Client-to-Site VPN using SSL Client on Cisco ASA 5520 ver8.2
Experience in adding Rules and Monitoring Checkpoint Firewall traffic through Smart Dashboard and Smart View Tracker applications.
Experience with design and deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, and MPLSQOS.
Configured Security policies including NAT, PAT, VPN's and Access Control Lists
Implemented redundancy with HSRP, VRRP, GLBP, Ether channel technology (LACP, PAGP) etc.
Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus 7K, 5K, 2K series Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches
Expertise in configuration of routing protocols and deployment of OSPF, EIGRP, BGP and policy routing over Cisco routers.
Experience with designing, deploying and troubleshooting LAN, WAN, Frame-Relay, Ether-channel, IP Routing Protocols - (RIPV2, OSPF, EIGRP & BGP), ACL's, NAT, VLAN, STP, VTP
Excellent technical and project management skills combined with strong communication skills.
Professional Certification:
Cisco Certified Network Associate (CCNA).
Cisco Certified Network Professional (CCNP).
Technical skills:
Cisco Platforms
Nexus 7K, 5K, 2K & 1K
Juniper Platforms
SRX, MX, EX Series Routers and Switches
Networking Concepts
Access-lists, Routing, Switching, Subnetting, Designing, IPsec, VLAN, VPN, WEP, WAP, MPLS.
Firewall
PIX Firewall (506/515/525/535), ASA Firewall (5505/5510), Palo Alto (PA-2k, 3k, 5k), Checkpoint R75/77, Juniper SRX.
Network Tools
Solar Winds, SNMP, Cisco Works, Wire shark
WAN technologies
Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, T1 /T3 & SONET
LAN technologies
Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q
Security Protocols
IKE, IPSEC, SSL-VPN
Networking Protocols
RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA
Operating System
Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux
Professional Experience:
Client: St. Joseph Health System, Anaheim, CA Oct’16 - Present
Senior Firewall Engineer
Responsibilities:
Firewall technologies including general configuration, optimization, security policy, rules creation and modification of Palo Alto.
Experience with working on Palo Alto centralized management GUI PANORAMA.
Experience with working on Palo Alto Next-Generation firewalls security profiles and Cisco ASA VPN.
Exposure to wild fire advance malware detection using IPS feature of Palo Alto.
Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments.
Palo Alto design and installation, which includes Application and URL filtering Threat Prevention and Data Filtering.
Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (40+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series, PA5000.
Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs.
Installing and Configuring Palo Alto Pa-500 series firewalls using Panorama.
Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments.
Hands On experience in push Policy from Panorama to Firewall in Palo Alto.
Worked with Palo Alto Firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the Firewall.
Integrating Panorama with Palo Alto Firewalls, managing multiple Palo Alto Firewall using Panorama.
Provides updates and upgrades to the Palo Alto Firewall and Panorama devices.
Involved in upgrade of Panorama to version 7.1.5.
Configuring, administering and troubleshooting the Check Point, Palo Alto and ASA Firewall.
Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
Implemented zone based firewalling and security rules on the Palo Alto Firewall.
Experience with convert Palo Alto VPN rules over to the Cisco ASA solution. Migration with both Palo Alto and Cisco ASA VPN experience.
Successfully installed Palo Alto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
Reviewing & creating the FW rules and monitoring the logs as per the security standards in Palo Alto Firewalls.
Monitoring Traffic and Connections in Palo Alto and ASA Firewall.
Backup and restore of Palo Alto and Cisco ASA Firewall policies.
Installed, configured and set security policies on cisco and Palo Alto firewalls, VPN.
Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as Firewalls and URL and application inspection.
Knowledge of Firewall (Cisco ASA), for multiple contexts, failover with redundancy.
Experience with working on Palo Alto Next-Generation firewalls security profiles and Cisco ASA VPN
Configuration and troubleshooting of Site to Site as well as Remote Access VPN on Cisco ASA and Check Point firewalls.
Managing of CISCO ASA 5550 Firewall in Active/stand-by mode.
Convert Checkpoint VPN rules over to the Cisco ASA solution, Migration with both Checkpoint and Cisco ASA VPN.
Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500. Implemented and troubleshooting the Virtual firewalls solutions in ASA.
Troubleshoot and hands on experience on security related issues on Cisco ASA, Checkpoint, IDS/IPS, Palo Alto firewalls.
Experience in installing, configuring and troubleshooting of Palo Alto, Checkpoint & Cisco ASA/Pix firewall.
Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.
Drafted, installed, and provisioned ASA and Checkpoint firewall rules and policies.
Implemented Site to Site connections for third party connectivity using Cisco ASA firewalls.
IPSEC VPN design connection and protocols, IPSEC tunnel configuration, encryption and integrity protocols.
Intrusion Detection, DMZ, encryption, IPsec, proxy services, Site to Site VPN tunnels, MPLS/VPN, SSL/VPN.
Deploying site to site IPsec VPN, managing Certificate Authority server for PKI based authentications, Configuring Remote Access IPSEC VPN using cisco VPN client.
Configuring IPSEC VPN (Site-Site to Remote Access), Negotiated VPN tunnels using IPSEC encryption standards and also configured and implemented site-to-site VPN, Remote VPN.
Set up networks at remote sales locations and conferences/meetings using Cisco VPN to connect to our secure office network.
Management of each firewall is done remotely and onsite at client sites.
Client: Avaya, Thornton CO Jul’15 – Oct’16
Sr. Firewall Engineer
Responsibilities:
Installation, advanced configuration and troubleshooting of Cisco and F5's load balancing devices.
Worked on F5 BIG-IP LTM 8900, Citrix NetScaler configured profiles, provided and ensured high availability.
Configuration of Virtual Servers, Nodes, and load balancing Pools
Responsible for supporting the Citrix NetScaler F5 platform, configuring, implementing and troubleshooting Citrix NetScaler VIP configuration with health check, policy configurations Access Gateway, and content switching configuration solutions.
Implemented ADC on F5 LTM and GTM hardware platforms design and deployment implementation guidelines, DMZ Network infrastructure policies, LTM Inbound SNAT configurations and outbound NAT server to IP mapping processes.
Configure and Manage site-to-site IPSEC VPN with different partners.
Configured IPsec tunnels with Palo Alto to enable secure transport and cloud based/site-site VPN to AWS.
Troubleshoot remote access services like Citrix NetScaler, Cisco VPN clients and for the users to access their enterprise network
Hands on Experience with blocking of IP's on Checkpoint that are suspicious.
Responsible for Checkpoint firewall management and operations across our global networks.
Implementing security Solutions using Palo Alto PA-5000 and Checkpoint Firewalls R75, R77.
Implemented Positive Enforcement Model with the help of Palo Alto Networks.
Configured ASA 5520 Firewall to support Cisco VPN Client on Windows 7/XP/Vista.
Configured Client-to-Site VPN using SSL Client on Cisco ASA 5520 ver8.2
Expertise in installing, configuring and troubleshooting Juniper EX switches (EX2200, EX2500, EX 3200, EX 4200, EX 4500 series).
Configuring IPSEC VPN on SRX series firewalls
Deployed Palo Alto Networks PAN-5050 designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K.
Experience working with Nexus 7018/7010, 5020, 5548, 2148, 2248 devices.
Implementation of Data center migration from 6500 based data center to Nexus based data center with 9k-7k- 5k dual home design with multiple VDC's, VPC, OTV and FEX
Configured VPC, VDC and ISSU Software upgrades on Cisco Nexus 7010.
Implement ITIL V3.0 through a phased approach - Service Desk, Change, Incident, Problem Management and Service Catalog.
Handled tickets within BMC Remedy and the ITIL environment
Worked extensively with multiple wireless hardware vendors including Cisco, Cisco Meraki.
Worked on multiple projects related to Branch networks, Campus networks, extranet clients and Data Center Environments involving in data center migrations from one data center to another.
Involved in migration from Site-to-sire GRE tunnels network to MPLS-based VPN for customer’s WAN infrastructure.
Implementation of BGP to optimize WAN routing on the core and edge routers.
Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
Mutual redistribution of OSPF and BGP routes using route maps.
Troubleshoot connectivity issues involving VLAN's, OSPF, QoS etc.
Implemented various OSPF scenarios on networks consisting of 7600 routers.
Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs. Cisco CLI, Cisco works, Network Security, Network Analysis Tools.
Involved in upgrades to the WAN network from existing 7200vxr with ASR1004, ASR9000 and 3845/3945 routers.
Developed tight security standards for all LAN/WAN connections.
Configured Cisco wireless controllers to work in the newly deployed infrastructure at the Veterans Administration utilizing Cisco Prime 2.2 Infrastructure (NCS) systems.
Implemented backup MPLS networks for critical locations, and standardized Cisco Wireless Access Points for security & 'guest' network access.
Expert working knowledge (including the ability to setup, configure, upgrade, manage and troubleshoot Cisco routers, switches, VPN concentrators, firewalls, IDS, IPS, 802.1x, Internet Proxy, 802.11 wireless access points and load balancers.
WAN Pilot project to convert branch from dual T1 circuits to I WAN only broadband circuit. To Enable Internet WAN connectivity for the Lab in Hauppauge.
Test and turn-up IWAN link and disable the 2 existing T1 circuits, running branch on IWAN only. After testing was completed site will be placed back on either dual TDM circuits or TDM with IWAN backup circuit figured Cisco wireless controllers and access points for enterprise network including setting up SSIDs and WLANs.
Initiated new iWAN design for remote sites that will result in infrastructure costs reduction.
Managed MPLS and PRI's EMC VNX for Global deployments and Cisco iWAN Circuit upgrades.
Setup, configuration, and administration of Cisco wireless networks using autonomous and LWAPP devices.
Upgrading branch network connectivity with total refresh of the network infrastructure with new 3845 routers and 2960 switches.
Configuration and troubleshooting on HSRP, VRRP, GLBP, RSTP, MST related issues coming in network environment
Configuration of OSPF, BGP on Juniper Routers and SRX Firewalls.
Deploying and decommission of VLANs on core Nexus 7000 and its downstream devices
Configuration and extension of VLAN from one network segment to their segment between Different vendor switches (Cisco, Juniper).
Involved in Configuration of VLAN on the HPE comware to display the port information.
Configured HPE Comware series like HP A5500 and HP 5900AF.
Experience in Configuring, upgrading and verifying NX-OS operation system with OSPF, BGP.
Design Implement MPLS/BGP for customer
Designed, implemented and maintained a new Network Management/Monitoring tool, Netbrain, for the City in order to provide a more suitable tool for network analysis and Management oversight.
Maintained multiple software tools Netbrain, Solarwinds, Statseeker IPAM, Netflow Analyzer
Cisco WCS, Visual Uptime Select
Operate network monitoring and management tools Tools analysis software suites such as CA Spectrum, Cisco Prime LMS, NetScout, NetMRI, Cisco Prime Infrastructure, SevOne, NetBrain, HP Network Automation, Nagios and Orion, Live Action to diagnose problems, restore service for network systems
Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.
Working with and supporting VMware technologies in, high availability, and fault tolerant datacenter environment.
Successfully implemented VMware Site Recovery Manager (SRM) in all 4 datacenters to provide comprehensive DR business continuity capability.
Implemented and Tested desktop virtualization and introduced VMware View to the client.
Engineering the configurations for the different branches, campus locations.
Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to no-Trunk, deployed port security when possible for user ports
Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.
Involved in the modification and removal of BGP from the MPLS routers.
Client: Johnson Controls, Milwaukee, WI Oct’13-Jun’15
Sr. Network Engineer
Responsibilities:
Experience with configuring Cisco 6500 VSS in Distribution layer of the Data center network
Worked on configuration of BIG IP (F5) Load balancers, also monitored the Packet Flow in the load balancers
Handled Citrix NetScaler Load Balancing using F5 Networks
Configure and Manage site-to-site IPSEC VPN with different partners. Troubleshoot remote access services like Citrix NetScaler, Cisco VPN clients and for the users to access their enterprise network
Upgraded load balancers from Redware to F5 BigIP that improved functionality and scalability in the enterprise.
Managed the F5 Big IP LTM, GTM appliances to include writing I Rules, SSL offload and everyday task of creating WIP and VIPs.
Working with Checkpoint Support for resolving escalated issues.
Involved in configuring Juniper SSG-140 and Check point firewalls
Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliances.
Administration of ASA firewalls in the DMZ and FWSM in the Server Farm to provide security and controlled/restricted access
Involved in the redistribution into OSPF on the core ASA firewall.
Configuring rules and Maintaining Palo Alto Firewalls & analysis of firewall logs using various tools
Experience in installing and configuring DNS, DHCP servers
Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches.
Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
Configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550)
Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
Configured networks using routing protocols such as RIP, OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure.
Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
Experience with moving data center from one location to another location.
Optimizing and monitoring the performance of a WLAN, LAN, WAN and user's segments
Experience with setting up MPLS Layer 3 VPN cloud in data centers, also working with BGP WAN towards customer.
Commissioning and Decommissioning of the MPLS circuits for various field offices.
Configure and troubleshoot Juniper EX series switches and routers
Migrated Juniper EX series switches to Cisco 3500 series and 6500 series switches
Maintenance and configuration of Cisco ASR series routers at data center and deployment of 3900, 3800, 2951 and 2821 for branch connectivity.
Configured, deployed and managed network storage appliances for multiple client sites. Monitored and maintained local and cloud client backups both disk to tape, disk to disk
Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices
Diagnose MPLS protocol problems including VRF and COS issues to full resolution.
Responsible to build configurations for various connectivity types, which involves port configuration on Cisco ASR for MPLS circuit termination
Good knowledge with the technologies VPN, WLAN and Multicast.
Configure and Support Hub and Spoke Cisco routers within DMVPN IWAN solutions.
Configured Cisco Wireless Networks like IEEE 802.11 a/b/g/n, LWAPP, WLC, WCS, Standalone APs, Roaming, Wireless Security Basics, RF spectrum characteristics.
Moderate knowledge in configuring and troubleshooting Cisco Wireless Networks: LWAPP, WLC, WCS, Standalone APs, Roaming, Wireless Security Basics, IEEE 802.11 a/b/g, RF spectrum.
Installed, configured and troubleshot Cisco wireless network, Wireless LAN controllers.
Well Experienced in configuring protocols HSRP, GLBP, ICMP, IGMP, PPP, PAP, CHAP, and SNMP.
Installed dual DS-3 SAN replication WAN with Riverbed Interceptors and 6050 Steelhead appliances to optimize the traffic
Worked on Customer applications like IWAN (Intelligent WAN), PnP (Plug and Play).
create the BoM for Hubs&Branches and provide lead time, considering the future move to IWAN
solution
Switching tasks include VTP, ISL/ 802.1q, IPsec and GRE Tunneling, VLANs, Ether Channel, Trucking, Port Security, STP and RSTP.
Management of NetBrain software for network mapping and automation.
Classes taken include Zenoss, NetBrain, UIM, eHealth, Spectrum.
Knowledge of network monitoring, testing and analysis tools, as NetQos, Solarwinds, eHealth, Open view, MRTG, Netbrain.
Replace branch hardware with new 3900 routers and 2960 switches.
Convert Branch WAN links from TDM circuits to MPLS and convert encryption from IPsec/GRE to Get VPN.
Client: Wolters Kluwer, Tampa FL Mar’11 – Oct’13
Network Engineer
Responsibilities:
Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-6400 load balancer.
Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers.
Managed F5 BigIP LTM appliances to load balance server traffic in critical serval access silos.
Involved in conversion of PIX firewall to ASA firewall.
Implemented load balancing in various environments using NetScaler also used NIC bonding
Experience in adding firewall rules, Network address Translation and in creating multiple security contexts (virtual firewalls).
Worked with F5 Balancers and their Implementation in various Networks
Involved in setting up IP sec VPN between ASA firewalls.
Experience with implementing Cisco 6500 VSS on the User distribution switches.
Upgraded IOS on the ASA 555*-****-**** firewalls
Performed basic security audit of perimeter routers, identifying missing ACL’s, writing and applying ACL’s.
Network security including NAT/PAT, ACL, and ASA Firewalls.
Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.
Experience configuring VPC, VDC and ISSU software upgrade in Nexus 701
Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256.
Working with MPLS Designs from the PE to CE and also configuring VRF on PE routers
Experience with designing and deployment of MPLS Traffic Engineering
Configuring RIP, OSPF, EIGRP BGP, MPLS, QOS, ATM and Frame Relay
Design and deployment of MPLS QOS, MPLS Multicasting per company standards.
Implemented site to site VPN in Juniper SRX as per customer.
Installed controller and access point coordination with JTAC.
Maintenance and trouble-shooting of LAN, WAN, IP Routing, Multilayer Switching.
Configured iWAN utilizing PfR (Performance Routing).
WAN Pilot project to convert branch from dual T1 circuits to iWAN only broadband circuit. To Enable Internet WAN connectivity for the Lab in Hauppauge. Test and turn-up IWAN link and disable the 2 existing T1 circuits, running branch on IWAN only.
After testing was completed site will be placed back on either dual TDM circuits or TDM with IWAN backup circuit.
Worked on different phases of testing such as Sanity Testing, Functionality Testing, Smoke Testing, System Testing, Installation Testing, Compatibility Testing, Regression Testing, Stress Testing and UAT Testing.
Testing routers and modems, troubleshot issues related to broadband technologies for Residential and Business Customers.
Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers
Configuring VLAN, spanning tree, VSTP, SNMP on EX series switches
Dealt with monitoring tools like (Solar Winds, Cisco Works), network packet capture tools like Wire shark
Configured Client VPN Technologies such as Cisco’s VPN Client via IPSEC. Configured Cisco ASR, ISR 2800 & 3800 series routers with OSPF as an enterprise.
Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed
Maintained a Network with more than 600 Network devices, some 25,000 end hosts, and the other Network devices like DHCP, DNS servers, Firewall servers.
Co-ordination with Hardware vendors, software vendors and service Providers.
Assisted in backup, restoring and upgrading the Router and switch IOS.
Attended Team meetings and provided comments on existing network and the recommendations to improve the current network Performance.
Upgraded, installed and supported Cisco Wireless controllers (Cisco 7500, 8500)
Maintaining the health of 250+ wireless Access points in two locations.
Client: Hexaware Technologies, India Jul’09 – Feb’11
Network Engineer
Responsibilities:
Used TFTP server to backup Cisco configuration files.
Provided technical support for expansion of the existing network architecture to incorporate new users.
Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company
Configured STP for loop prevention on Cisco Catalyst Switches
Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.
Worked in setting up inter-vlan routing, redistribution, access-lists and dynamic routing.
Involved in configuring and implementing of Composite Network models consists of Cisco 3750, 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches.
Implemented various Switch Port Security features as per the company’s policy
Configured OSPF, and EIGRP on 2901 and 3925 Cisco routers.
Configured VLANS to isolate different departments
Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.
Configured IPSEC VPN on SRX series firewalls
Design, installation and troubleshooting networks with hand-on experience with OSPF, BGP, VPLS, Multicast, VPN, MPLS, & Traffic engineering.
Involved in implementation of trunking using Dot1Q, and ISL on Cisco Catalyst Switches
Worked with snipping tools like Ethereal (Wireshark) to analyze the network problems
Maintenance and troubleshooting of network connectivity problems using PING, Trace Route.
Performed replacements of failed hardware and upgraded software
Performed scheduled Virus Checks & Updates on all Servers & Desktops.
Implementing Routing and Switching using the following protocols; OSPF, BGP on Juniper M series routers.
Involved in Local Area Network (LAN) implementation, troubleshooting, and maintenance as per company’s requirements.
Environment: Cisco 3750/2620/1900 routers, Cisco 2950/3500, VLAN, HSRP, SRX, OSPF, BGP.