Post Job Free

Resume

Sign in

Data Center Network Engineer

Location:
Avon, IN
Posted:
January 31, 2024

Contact this candidate

Resume:

CAREER OBJECTIVE:

To be associated as a Network Engineer with a progressive organization that gives me scope to update knowledge and skills in accordance with the latest technologies and a part of team that dynamically works towards growth of organization and gain satisfaction thereof.

PROFESSIONAL SUMMARY:

●Around 5 years of experience on switches, routers, firewalls and load balancers. Have a good experience in operations team working on troubleshooting tickets.

●Configuring Routing protocols like BGP, OSPF, MPLS, multicast and L2 protocols in ASA to check it is passing through via ASA in customer deployments.

●Experience in installation and configuration of cisco switches (2950, 2960, 3550, 3750, 4500 and 6500) and cisco routers (2500, 2600, 3000, 3800, 6500, 7200, 7500 and 7600).

●Experience in setting up cisco routers to perform functions at the access, distribution and core layers.

●Working experience in creating VLAN’s in cisco switches and setting up inter-vlan routing on multi-layer switches as cisco 4500 and 6500.

●Experience in designing, documenting, deploying and supporting LAN and WAN network equipment, with distribution, core and data center LAN services.

●Rebuilding data centers and redundant sites for failover, F5 load balancers.

● Having Data Center Design Experience, installing and configuring Network Devices in the Data Center including patching the cables in the patch panel.

●Experienced in securing configurations of SSL/VPN connections, troubleshooting Cisco ASA firewalls and related network security measures.

●Worked on configuration, maintenance and administration of Palo Alto PA3000 Firewalls and migrating customers from Cisco ASA to Palo Alto network.

●Experience in migrating policies from checkpoint firewall and Cisco ASA to Palo-alto.

●Experience with working on firewalls like CISCO ASA 5500 series (5510,5540), JUNIPER SRX series and also PALO ALTO (pa-3060, pa-5060), etc.,.

●In-depth knowledge and experience on IP Addressing, Subnetting, VLSM, and ARP, Ping concept, working knowledge on OSI model, TCP/IP, 802.1q. Working experience on Cisco Virtual Office solution.

●Experience with working on latest cisco switches like Nexus 2000, 5000, 6000 and 7000 series switches while implementing advanced features like VDC, VPC, OTV and Fabric Path.

●Troubleshoot Data center network issues, Cross connectivity and WAN Backbone issues between Data centers.

●Experience in using network monitoring tool Solar winds.

●Using Solar Winds to generate reports on WAN utilization.

●Implemented, analyzed and recommended appropriate system for the out of band management monitoring. utilizing Solar winds for primary and disaster recovery site.

TECHNICAL SKILLS:

Networking Technologies

LAN/WAN Architecture, TCP/IP, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP

Networking Hardware

Cisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls.

Switches

Cisco (9200,9300,2900,3500 and 6500)

Security Monitoring Tools

Sentinel Check Point Provider (R65), Check Point Smart View Tracker

Network Monitoring

SolarWinds, Wireshark, Harping, Whatsupgold, Infoblox

Checkpoint

NG R65 & 75 1180,2200

Routers

Cisco (1750, 1800, 2800, 3700,3800,7200 series)

Network Monitoring tools

HP Open View. OP Manager & Remedy,HP Open NMS Ticketing Tool

Protocols

RIP, IGRP, EIGRP, OSPF& Amp; BGP

Firewalls

ASA 5510,5520,5540,5580, Palo Alto

EDUCATION:

●Masters in Lewis University, Romeoville (MSBA)

CERTIFICATION:

●(CCNA) – Cisco Certified Network Associate

●(CCNP) –Cisco Certified Network Professional

PROFESSIONAL EXPERIENCE:

Client: State of Indiana, Hoosier Lottery

Location: Indianapolis, Indiana Oct 2023– Present

Maintained Cisco Catalyst 9300/9400 switches as core, distribution and access layer switches across main office and 3 remote offices.

Configured stack wise virtual link between 9300 switch pairs at main office for increased resiliency and uplink bandwidth.

Upgraded IOS versions, managed configurations and monitored performance using Cisco DNA Center

Managed cloud-based Meraki MS250 switches and Meraki MR42 wireless APs providing access layer connectivity at Office 1 and Office 2

Configured access policies, VLANs, port security for Meraki gear using cloud-based dashboard.

Troubleshot and resolved connectivity and RF interference issues for Wi-Fi network with Meraki MR42 WAPs

Administered intrusion prevention and malware protection policies on Cisco Firepower firewalls.

Created baselines and monitored network bandwidth utilization using SolarWinds.

Mapped detailed physical layouts with precise server, switch and end device locations and cabling.

Developed comprehensive logical diagrams depicting redundancy, routing and IP addressing design.

Documented IP allocation sheets, network configs and topology details for switches, firewalls, and routers

Implemented SolarWinds network performance monitoring solution leveraging SNMPv3 for secure and reliable data collection.

Upgraded legacy v2c community-string based monitoring to user-based authentication & encryption through SNMPv3.

Configured SNMPv3 user credentials across Cisco Catalyst switches enforcing data integrity via SHA/MD5 algorithms and confidentiality using AES-128 data encryption.

Created customized dashboards and alerts for critical network infrastructure achieving near real-time visibility into health, traffic and resource utilization.

Automated daily reports on network statistics allowing proactive capacity planning reducing outages due to bandwidth bottlenecks by 20

Environment: Catalyst Switches- 9200/9300,Meraki-Ms250&MR42,Cisco Firepower1150,1010 Next Generation Fire Walls, LAN, WAN, Switching protocols (VTP, STP, GLBP, HSRP)Visio for Network maps and SolarWinds for Network monitoring

Role: Network Security Admin

Client: IP INFUSION Aug’2022 – Oct'2023

Location: Santa Clara, California (Remote)

Role: Network Security Admin

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco ASA's 5585.

Responsible for Cisco ASA firewall administration, Rule Analysis, Rule Modification.

Implementation of Access Lists for allowing/blocking desired traffic.

Packet capturing, troubleshooting on network problems, identifying and fixing problems.

Experience working in Datacenters environment, configuration changes as per the needs of company.

Support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process.

Implemented Ansible to manage all existing servers and automate the build/configuration of new servers.

Configured Policies to allow customer traffic in Juniper Netscreen/SRX firewalls

Contribute to the support forums (specific to Azure Networking, Azure Virtual Machines, Azure Active Directory, Azure Storage) for Confidential Developers Network.

Provide support for escalated issues in Azure Platform

Working on Azure for highly available customer facing B2B and B2C applications.

Deploying and managing applications in Datacenter, Virtual environment and Azure platform as well.

Drafted and installed Juniper SRX Firewall rules and policies

Level 3 support Firewall Engineer (Checkpoint and Juniper SRX)

Extensive Knowledge on the implementation of Cisco ASA 5500 series and checkpoint R 75 firewalls

Extensive Knowledge on the implementation of Cisco ASA 5500 series and checkpoint R 75 firewalls

Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices and also configure 2k, 3k,7k series Routers

Experience configuring Virtual Device Context in Nexus 7k series switch.

Strong knowledge on networking concepts like TCP/IP, Routing and Switching.

Designed, configured, implemented site-site VPN on cisco ASA 5500 firewall.

Experience with configuring Load Balancing methods in F5 LTM and also configured the virtual server.

Working with Checkpoints, ASA’s (Other Remote sites), Palo Alto’s FW’s

Worked in projects converting P2P circuits into MPLS circuits, commissioning and decommissioning of the MPLS circuits.

Performing network monitoring, providing analysis using various tools like Wire shark, Solar winds etc.

Provided proactive threat defense with ASA that stops attacks before they spread through the network.

Designed, Validated and implemented LAN, WLAN & WAN solution to suite client’s needs.

Configured and designed LAN networks with Access layer switches such as Cisco catalyst 6500, 4510, 4948, 4507 switches.

Environment: Cisco switches - 2948/3560/4500/3560/3750/3550/3500/2960 6500 and Cisco Nexus 7K/5K, Cisco ASA 500, Cisco routers - 1200/3640/7200/3845/3600/2800, Cisco ISE, F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, TCL, SQL Server 2005 Integration services packages.

Client: Washio Dry Cleaners Aug’20 – May 21

Location: Hyderabad, INDIA

Role: Network Engineer

Responsibilities:

●Designing and supporting the consolidation of data centers utilizing Cisco 6500, Nexus 2K, 5K and 7K infrastructure.

●Configure and maintain all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.

●Hands on experience on all software blades of Check Point Firewall. 24x7 on-call step-up support as a part of the safety operations team.

●Update customer networks by configuring routers, switches, and incorporate the SDWAN into the network design.

●Working closely with knowledge center management to investigate the information center sites for cabling necessities of assorted network instrumentation.

●Migration from Checkpoint firewall cluster to Cisco ASA 5580 firewalls in a failover pair configuration.

●Provided application-level redundancy and accessibility by deploying F5 load balancers long-term memory.

●Experience with converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.

●Provided Level-3 Network support for Cisco Switches and Cisco ASA 5500 Series Security.

●Experience in administrating Viptela SDWAN enterprise deployment and implementations of Network and Devices for SDWAN environment.

●Configured SDWAN router Viptela to connect remote sites over the Internet

●Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewalls.

●Experience in converting PIX rules over to the Cisco ASA solution.

●Designing and assisting in deploying enterprise-wide Network Security and High Availability Solutions for ASA.

●Worked extensively in Configuring, observation and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover demilitarized zone socialization & configuring VLANs/routing/NAT.

●Managing a TACACS server for VPN user authentication and network devices authentication.

●Performed Imperva Secure Sphere DAM on WAF Health Checks.

●Managing and providing support to numerous project groups with regards to the addition of recent instrumentation like routers switches and firewalls to the DMZs.

●Implementing traffic engineering on existing Multiprotocol Label Switching (MPLS) network and Open Shortest Path First (OSPF).

●Provided redundancy in a very multi homed Border Gateway Protocol (BGP) network by tunings AS-path.

●Handling enterprise outages effectively and driving towards the resolution. Coordination of fault escalations in conjunction with the first high-level technical management of high priority or technically complicated calls.

●Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.)

●Configured and troubleshooting Riverbed WAN optimization software to improve the network acceleration at the user end.

●Earlier efforts included verification of DOCSIS upstream logical channels, proprietary RF spectrum

management algorithms, system high availability, etc.

●Support vendors with product and service requirements based on Charter business needs and internal customer requests. My position requires technical skills and working knowledge of DOCSIS Specifications including the following technologies DOCSIS 2.0, DOCSIS3.0, DOCSIS 3.1, Packet Cable 1.0, Packet Cable 1.5 and Packet Cable 2.0.

●Deploy, scale and automate network across multiple global datacenters supporting Amazon Web Services (AWS).

●Knowledge and skill on 802.11 a/b/g/n LAN normal for wireless Technology.

●Used Cisco ACI Fabric which is based on Cisco Nexus 9000 Series Switches and the Cisco Application Virtual Switch (AVS).

●Worked on implementing lab for SDN using Cumulus Linux for test-driving part of DC migration to SDN.

●Coordinating, documenting and managing cases and routing support calls with the Tier 1, Tier 2, and Tier 3 Support engineers at HPE and AT&T.

●Configure best route map configurations in the new Cisco IOS XR Routing Protocol Language (RPL).

●Supporting EIGRP and BGP supported network by partitioning level two & three issues of internal groups & external customers of all locations.

●Performing troubleshooting on slow network property problems, routing problems that involves OSPF, BGP and distinctive the foundation reason for the problems.

●Extensive active expertise with complicated routed local area network and WAN networks, routers and switches.

●Design and Building Software-Defined Data Center environment, including Vm ware, VCenter, NSX and Cisco ACI.

●Hands-on expertise with Ether Channel, Spanning Tree, Trucking, ACLs, Syslog. Expertise with the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.

●Proficiency in configuration of VLAN setup on varied Cisco Routers and Switches.

●Work allotted tickets to see the purpose of failure and resolve issues remotely utilizing obtainable tools and different Operation Center resources.

●Monitor the network using cisco prime, HRping.

●Provide step-up support to L1 members of network team.

●Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

●Configured Windows Clusters, Windows NLB, H/W Load Balancers (F5, Netscaler). Deployed, configured and troubleshooting runtime errors related to .Net applications on 7.0/7.5 Web Servers and Windows Server 2008/2008 R2 in Dev, QA & Pre-prod environments.

Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, Juniper SRX100, Fortinet Next Generation Fire Walls, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, VPN, Checkpoint, Cisco ASA, AWS, TCL, Riverbed, Clustered SQL server 2014/2012/2008R2/2008/2005, DC migration, Active-Active& Active-Passive Clustering, Windows 2012/2008R2/2008/2003

Client: TURPY MOBILE APPS Jan’18 – July20

Location: HYDERABAD, INDIA

Role: Jr. Network Engineer

Responsibilities:

●Configuration & troubleshooting of routing protocols: MP-BGP, OSPF, EIGRP, RIP

●Configured IP access filter policies

●Maintained and provided Level 2 and Level 3 technical supports for all network related issues

●Experience in Cisco 7200, 7600 routers, Cisco 2800 3700 series switches: Physical cabling, IP addressing, WAN

●Worked with the Help Desk for circuit troubleshooting to give Support to the Tech persons at the site.

●Configuring routers and sending it to Technical Consultants for new site activations

●Giving online support at the time of activation

●Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access

●Configured and troubleshoot Juniper Ex 4500 and series switches and Juniper ACX series routers.

●Responsibilities included Creating Lab demonstrations for recent technology deployments with loaner equipment from various vendors and presented the findings to upper management

●Other responsibilities included monitoring and managing servers, desktop computers, printers, routers, switches, phones, and security updates

●Configuring HSRP between VLANs, Configuring Ether-Channels and Port Channel on Cisco6500 catalyst switches

●Good understanding on Cisco ASA 5500 (5510/5540) Series

●Configuring static NAT, dynamic NAT, inside Global Address Overloading, TCP overload distribution, Overlapping Address Translation, ACL

Environment: Catalyst Switches – 3750, 4500, 4508, 6500, Cisco Routers - 2600, 3600, 7613, Switches - 3750, 4500 and 6500 series and Cisco Firewall ASA 5585-X, Solar Winds, Checkpoint Firewall, Routing Protocols (EIGRP, OSPF, RIP), Switching protocols (VTP, STP, GLBP, HSRP)



Contact this candidate