Post Job Free

Resume

Sign in

Cisco Engineer

Location:
Piscataway, NJ
Posted:
December 31, 2019

Contact this candidate

Resume:

SRIMAN MULLAPUDI

Certified Network Engineer

269-***-****

ada6k7@r.postjobfree.com

PROFESSIONAL SUMMARY:

CCNA Certified Professional with 8+ years of experience in routing, switching, firewall technologies, system design, implementation, troubleshooting of complex network systems, enterprise network security, wireless design, data network design, capacity management and network growth.

In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP services.

Expert in dealing with Networking Protocols and Standards such as TCP/IP, OSI, UDP, Layer 2 (VLANs, STP, VTP), Routing Protocols ( EIGRP, OSPF)

Experience working with security devices such as Firewalls, VPN switches and Intrusion Detection Systems.

Experience in troubleshooting NAT configurations, Access-Lists (ACL), and DNS/DHCP related issues within the LAN network.

Hands-on experience on SDN technology, including Vmware NSX and Cisco ACI

Experience with VMWARE NSX, vSphere, vCenter, Configuration of switch ports for ESXi hosts. Worked with storage team on various projects.

Handle changes & maintain documentation in respect to CI items for IT assets in internal ticketing system integrated CMDB database.

Experience with SDN/NFV technologies including Open Stack Neutron, VMware NSX, Open flow, Open Daylight, Open vSwitch, Open Contrail or Cisco ACI.

Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and MST.

Extensive experience working on Palo Alto and Cisco ASA Firewalls.

Responsible for the installation and configuration of Cisco ASA and Palo Alto Firewalls

Experience in configuring HSRP and redistribution between routing protocols troubleshooting them.

In-depth knowledge and hands-on experience on IP Addressing, Sub netting, VLSM and ARP, reverse & proxy ARP, Ping Concepts.

Extensive Knowledge on the implementation of Cisco ASA 5500 series firewalls.

A hands-on role, which involves installation, management, and support of globally developed extremely complex, highly available Palo Alto and Cisco ASA firewall infrastructure.

Experience in using and maintaining various network monitoring tools like Solarwinds, Wireshark.

Experience with migrating from Cisco ASA 8.2 version to Cisco ASA 8.4 Version.

Experience with convert PIX rules over to the Cisco ASA solution.

Hands on experience in configuring Cisco Catalyst 2960, 3750,3850, 4500, 6500 and Nexus 3000, 5000, 6000, 7000, 9000 series switches and Cisco 2600, 2800, 3600, 3800, 7200, 7600 series routers

Cisco ASA/Palo Alto Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.

Technical Knowledge on Cisco ASA 5500 series firewalls.

Implementation of HSRP, VRRP and GLBP for Default Gateway Redundancy.

Worked on Cisco Nexus 5010 Switch.

Experience in F5, Cisco ACE 4710 Load balancers.

Expert Level Knowledge about TCP/IP and OSI models.

Excellent communication skills to interact with team members and support personnel and also can act as a mentor to less experienced personnel

CERTIFICATIONS:

CCNA(CSCO13194696) Valid: June 2020

Education

Bachelors in Electronics and communications, India

TECHNICAL SKILLS:

Operating Systems

Windows (Server 2003/2008, Vista, Windows 7), Linux OS

Routers

Cisco GSR12016, ASR1001, 2900, 3900, 7200, 7600 & ASR9000

Switches

Cisco 3750, 4507, 4510 & 6500 series switches, Nexus 7010, 5548

Routing

MPLS, OSPF, EIGRP, BGP, PBR, IS-IS, Route Filtering, Redistribution, Summarization, Static Routing

Switching

LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging.

Network security

Cisco (ASA, PIX) 5510, SANS SIFT ACL, IPSEC VPN, GRE VPN

Load Balancer

F5 Networks (Big-IP) LTM Module, Cisco ACE 30 load balancer

LAN

Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet.

WAN

Leased lines 128k - 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ISDN, Load Balancing. Various Features & Services: IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP Management

AAA Architecture

TACACS+, RADIUS, Cisco ACS

Network Management

SNMP, Solar Winds, HP open view, and Wire shark

Reports and Network Diagrams

Microsoft (Visio pro.)

WORK EXPERIENCE:

Port Authority of NY&NJ, Jersey City, NJ Feb 2019 - Present

Network Engineer

Responsibilities:

Installing and configuring new cisco instrumentation as well as Cisco catalyst switches 6500, Nexus 7010,

Nexus 5548 and Nexus 2k as per the need of the corporate.

Updated Fortinet firewall configurations, programmed switch ports and cameras, and maintained asset information.

Worked on Multi-vendor platform with Check Point, Fortinet and Cisco firewalls requesting net flow for security compliance, coding, and pushing firewall rules after approval and troubleshoot incidents.

24x7 on-call step-up support as a part of the safety operations team.

Working closely with data center management to investigate the information center sites for cabling necessities of a

sorted network instrumentation.

Managed web-site security appliance to control Internet access, including Cisco IronPort, Websense, Blue Coat and Surf Control.

Developed an implementation plan to modify our Ironport ESA Email Security Appliance to allow our coalition partner to utilize their legacy marking to communicate with the US via email.

Provided application level redundancy and accessibility by deploying F5 load balancers long-term memory.

Hands-on expertise within the network management of circuits and Frame Relay

Managing and providing support to numerous project groups with regards to the addition of recent

instrumentation like routers switches and firewalls to the DMZs.

Implementing traffic engineering on Existing Multiprotocol Label shift (MPLS) network, Frame Relay and Open Shortest Path initial (OSPF).

Responsible for troubleshooting network, VPN and firewall problems, specifically Checkpoint GAIA and Cisco ASA.

Upgraded Cisco ASA 5510 firewalls using 6500/7600 catalyst modules for enhanced performance, security and reliability. Security policy review and configuration in Palo Alto and Juniper SRX Firewall in Datacenter.

Expertise in Palo Alto design and installation for Application, URL filtering, Threat Prevention and Data Filtering.

Administered Palo Alto Firewalls to allow and deny specific traffic and to monitor user usage for malicious activity and future QoS.

Performed Palo Alto firewall configuration, rule creation and assessment of firewall traffic flow.

Configured Site-Site VPN on Palo Alto Firewall on one side and Fortinet on the other side.

Migration of Cisco ASA to Palo Alto using Palo Alto Migration Tools.

Working experience on tools and devices like Source Fire, Fire eye, Aruba, Cisco ASA, Cisco ISE.

Provided redundancy in a very multi homed Border Entree Protocol (BGP) network by tunings AS-path addition, route-maps and prefix-lists.

Worked extensively with Infoblox, QIP, Cisco Prime Infostructure, Spectrum, Cmdb, Telnet, modem access, Putty/Super Putty.

Worked with Configuration Management Database (CMDB) a centralized repository that stores information about the IP address, Vlan's info of the hardware devices.

Work on a team to maintain our core MPLS network over the Alcatel/ Nokia 7750 SR/7450 ESS platform.

Migrated SAP based applications from old Cisco ACE load balancers to new VMware NSX edges.

Performed automation operations using VMware NSX and Python scripting.

Internal and External DNS locking block Virus Infected Domains on DNS server.

Migrated, configured & installed 100 Cisco Meraki MR42 in a corporate & warehouse environment.

Worked securing, maintaining, configuring Cisco Aironet & Meraki Access points, Sonicwall access points

Worked with Netspot on doing a site survey for the new Meraki APs towards optimization of the Corporate and Warehouse WIFI Network.

Integrated Palo Alto next-gen firewalls with overlay VMware NSX SDN network

Handling enterprise outages effectively and driving towards the resolution.

Coordination of fault escalations in conjunction with the first high-level technical management of high priority or technically complicated calls.

Monitored performance and analyzed network irregularities using tool such as Solarwinds.

Implemented Network monitoring tools like MRTG, PRTG, and Solarwinds.

Installed Solarwinds Network Performance Monitor with emphasis on traffic analysis, application and virtualization management.

Provided backup connections by utilizing SD- WAN and cradlepoints.

Created boot configs/run books for Junos based SD- WAN devices and Cisco PE Routers.

Upgraded and updated Cisco IOS and SD- WAN device OS.

Configure, monitor and maintain Fortigate firewalls.

Upgraded 10 Fortigate firewalls from v5.6.x to v6.0.2

Worked on FortiGate 1000D, 1200D and ASA 55XX firewalls models and implementation of rules as per the requirement.

Managed and performed countless hours troubleshooting for Fortigate Firewalls.

Microsoft, Redmond, WA Feb2018 - Jan2019 Network Security Analyst (DSRE)

Responsibilities:

Implement network, mainframe, distributed systems, collaboration, conference, voice and security changes Execute or implement automated and scripted changes or infrastructure request

Work directly with the Core Infrastructure Services (NCIS) Team to coordinate the completion all automated scripts.

Good experience on Microsoft Azure and Create a Virtual Network on Windows Azure to connect all the servers.

Configure network devices F5 load balancing for GTM/LTM traffic monitoring. Add/modify/delete VIPS/WIPS

Perform device migrations and work with the migration team to ensure that all manageability checks have been properly performed during device acceptance.

experience in managing, maintaining, and configuring Cisco IronPort Email Security Appliances (ESA) and related SMA

Configure, maintain and design network security solutions including Firewalls (Check Point and CISCO ASA), IDS/IPS (Check Point and Source Fire), VPN, ACLs, Web Proxy, etc.

Configuring TACACS, LDAP, and RADIUS for CISCO ASA and Palo Alto Firewalls

Responsible for Migrating Virtual Firewalls to Physical Firewall and Cisco ASA to Palo Alto Firewalls

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of Firewall logs using SecureCRT, ASDM, QRadar

Responsible for Palo Alto hardware, include maintenance, code upgrade and licensing.

Configured Zones, Virtual routers, Security Policies and interfaces on Palo Alto Firewall. monitoring and troubleshooting Palo Alto and managed them with Panorama M-500 Device.

Installed Palo Alto PA 3060 firewalls to protect Data Center and provided L3 support.

Creating and managing endpoints using Azure Traffic Manager.

Involved in SD- WAN project for successful evaluation of POC to proceed with production implementation. We primarily focused on implementing SD- WAN technology using Viptela vEdge 2000 and Cisco ENCS 5400 devices.

Worked on Next Gen Firewall features like Application and URL filtering, SSL Forward Proxy, SSL Decryption, Web-filter, SD- WAN in Fortigate firewalls.

Assist with coordination and implementation of monthly projects.

Maintained accurate records of all Data Center equipment move, add, change, repair, upgrade, and also decommissioning via Remedy web based CMDB

Create monitoring template using custom MIBs in Solarwind.

Involvement in configuring solarwind tools for regular activities as well for proactive monitoring of specific routers to record behavioral statistics.

Worked Meraki Heatmap to pickup trends within the client traffic

Configure and deploy Cisco ASA Meraki MX84 firewalls with site-to-site IPsec VPN tunnels to connect smaller branch sites back to the data center.

Developed new and enhance existing network and operating system infrastructure in support of the Commission's databases, web sites, document management and workflow environments including Active Directory, Novell eDirectory, System Center, Cisco IOS, IronPort appliances, TACACS, two factor authentication VPN, traffic shaping/QOS, network monitoring and risk mitigation in a complex Microsoft Windows, Unix, Cisco Unified Communications and OS/400 integrated LAN and WAN environment.

Designed and implement Cisco/ Meraki Enterprise Cloud Wireless Bridge/Repeater to extend the LAN for multiple buildings

Worked on multi-vendor load balancers including F5 Big IP LTM, Cisco ACE and VMware NSX between multiple centers.

Configure Routers/Switches ( Cisco 7000, 6500E, Nexus 5000, Nexus 2000,

Cisco 4000, 3800, 3700, 3600, 3500, 2900, 2800, 1900, 1800, 800 Series, Aristas,

F5 and Citrix), ASA Firewalls, Juniper Devices

Configured and troubleshoot Network security including NAT/PAT, ACL, IPSEC, site-to-site and remote VPNs in ASA/Palo Alto/ Fortinet Firewalls.

Configuring, maintaining and troubleshooting with Fortinet firewall and security

Implement SNMP, SSH, Filters, VLAN, HSRP, STP, Port Security.

Worked on Next Gen Firewall features like Application and URL filtering, SSL Forward Proxy, SSL Decryption, Web-filter, SD-WAN in Fortigate firewalls.

Configure, update software, troubleshoot routing issues and maintain various enterprise network devices such as Cisco Nexus 9k's,7k', 6k's, 5k's and 2k's, Cisco Catalyst switches, Dell switches and Fortigate Firewalls.

Administer Lucent Vital QIP, including group policy, creation and deletion of user accounts, managing access controls, and domain structure configuration.

Brocade, Herndon, VA Dec 2016 - Jan 2018 Network engineer/wireless engineer

Responsibilities:

Configuring Static, IGRP, EIGRP, and OSPF Routing Protocols on Cisco 1600, 2600, 2800, 3600, 7300 series Routers.

Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access layer switches such as Cisco 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.

Migrating access policies from Cisco ASA to Palo Alto firewalls.

Worked on Deployment of Palo Alto firewall into the network.

Experience with F5 LTM and Cisco CSM load balancer in-between the servers inside the server farm and DMZ.

Migrate the older Omniswitch-6800 devices at branches to Juniper EX4200,EX4300 devices as a part of the tech refresh project with higher port density

ALU/ Nokia 7750 Persistence (2014): Helped implement Persistence on the 7750s, network-wide.

ALU/ Nokia 7750 SFM Upgrades (2015): Helped upgrade the 7750s’ SFMs to support new broadband initiatives.

Configuring Virtual Chassis for Juniper switches EX-4200,Firewalls SRX-210

Migrated SD- Wan Viptela vEdge 1K to 2K and upgrade from 17.1.5 to 18.3.6 version.

Troubleshooting on Cisco routers, Nexus 5k, 9k (ACI & Standalone) switches and F5 LTM & GTM and Viptela SD- Wan devices.

Deployed SDN networks such as Cisco Meraki SDN solution using MX and MS routers and switches technologies.

Experience with Network Automation using Python.

Monitored WAN and LAN for circuit outages, network component failure, and user-reported network issues as well as network components such as routers, switches, and firewalls via the Network Management System ( Solarwind)

Monitoring of devices using SolarWinds and also analyze packet captures using Wireshark

Maintained and manage CMDB is updated regularly

I proactively submitted Change Management Data Base ( CMDB), Move Add Change Database (MACD) and SecureWorks Information Form (SIF) forms for New or Updated Hilton asset equipment

Evaluate configuration and support Juniper SRX320 firewalls

Deploy 802.1x authentication (both Wireless and Wired network) for office users using Aruba Clear pass access management system

Experienced in handling and installing Palo Alto Firewalls and Integrated Palo Alto next-gen firewalls with overlay VMware NSX SDN network.

Performed configuration, deployment and support of cloud services including Amazon Web Services (AWS) and deploy monitoring, metrics, and logging systems on AWS

Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.

Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.

Preformed IOS upgrades on Cisco routers and switches.

Worked on NGFW equipment, preferably experienced with Fortinet.

Configured inside ACL, outside ACL, inside, outside interfaces.

Configured Cisco Prime, Cisco Works, ServiceNow, HPNA, IBM Remedy, SolarWinds, PRTG

Involved in configuring VPC(Virtual Port Channel), VDC(Virtual Device Context) in Nexus 7010/7018 devices

Configured VLAN’s, Private VLAN’s.

Experience and Certifications with Fortinet, SonicWALL and HP Networking Switches.

Configuration, maintenance, and support of the enterprise network consisting of Cisco routers and switches, Aruba switches, Cisco and Aruba wireless, and FortiGate firewall.

Design, and configuring of OSPF, BGP on Juniper EX2300 Routers and Palo alto Firewalls

Extensive use of NSM (Network and Security Manager) and NetScout CSM (Cisco Security Manager) for adding or modifying firewall policies for the firewalls in use.

Configure various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches and Access layer switches such as Cisco 4510, 4948, 4507 switches for VLAN, Fast Ether Channel configuration.

Implemented and configured Fortinet Firewall FortiGate 600, 800 series

Designed and Implemented Firewalls, F5Viprion deployments to Front end and DMZ customers.

Univar, Redmond, WA July 2016 – Nov 2016

Network Security Engineer

Responsibilities:

Performed OSPF, BGP routing protocol administration.

Configure and implement Palo alto Wildfire and URL filtering PAN DB

Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls

Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.

Configured and debugged policy-based routing for special traffic, route filtering with route maps, route redistribution.

Expertise in configuration of routing protocols and deployment of OSPF, EIGRP, BGP and Policy routing over Cisco Routers, Switches (Nexus 7Ks, Catalyst 6500).

Experience in Python scripting and Rest API

Performed ISSU on Nexus Switches and responsible for troubleshooting application latency.

Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.

Worked on F5 LTM series like 7050, 4800, 2200 for several applications and their availability.

Maintained and manage CMDB is updated regularly

Configured VLAN Trucking 802.1Q, STP, and Port Security on Catalyst 6500 switches.

Router memory & IOS upgrade with TFTP.

Working on Nokia 7210 routers which involves configuration, commissioning of OSPF, VPLS, VRRP, SNMP, DHCP

Experience using, building and maintaining combination of following Network Security Products: Checkpoint, Cisco ASA, F5 AFM/LTM, Fort INET/ Fort iGATE.

Was Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all-around technical support

Used solarwind for Adding/removing devices on the Network

Used SolarWind for monitoring entire customer Networks and gain Visibility into other network appliances.

Responsible for designing and implementation of customers network infrastructure

Configuring, Monitoring and Troubleshooting Cisco’s ASA 5500 security appliance, Failover DMZ zoning and configuring VLANs/routing/NATing with the firewalls as per the design.

Integration of VMware NSX with VMware's suite of products (i.e. vRealize Automation, vRealize Operations)

Worked on Extensively on Cisco Firewalls, SANS SIFT, Cisco (506E/515E/525/) & ASA 5500(5510/5540) Series

Implement Cisco IOS Firewall IDS using 2600 series router

Adept at configuring and troubleshooting of VPC on Nexus 7Ks, 5Ks and VSS on Cat 6509, 4500-X. Expertise in Configuration of Virtual Local Area Networks (VLANS) using Nexus 7Ks, Cisco routers and multi-layer.

Experience with setting up IPSEC VPN on Juniper SRX 3600 Firewalls towards the multiple Customer sites as backup path to the datacenter.

Participated in planning and implementation of Cisco systems and SD- WAN solutions in direct support of targeted objectives.

Designation and Implementation of Aruba Wireless solution including Aruba S3500 mobility switch, Aruba 105, 175, 225 Campus AP, Aruba 7210 & 7220 AP Controller

Understand the JUNOS platform and worked with IOS upgrade of Juniper EX2300 devices

Extensive experience in implementing and managing boundary defense technologies to include firewalls, IDS/IPS, DLP and other. Specific knowledge of Checkpoint, Palo Alto, Cisco and Fortinet firewall appliances.

Implementation of Site-to-Site VPNs over the internet using 3DES, AES/AES-256 with ASA Firewalls

Network Assessment and Documentation (including technical, operational, and economic assessment)

Ensured network, system and data availability and integrity through preventative maintenance and upgrade.

Community Loans of America, Atlanta, GA Jan 2016 – June 2016

Firewall/Network Engineer

Responsibilities:

Working on Cisco 6509 and 4507 series switches for LAN requirements that includes managing VLANs, Port Security and troubleshooting LAN issues.

Configuration of Access List ACL (STD, Ext, Named) to allow users all over the company to access different applications and blocking others.

Dealt with NAT configuration and its troubleshooting issues related access lists and DNS/DHCP issues within the LAN network.

Worked with customers, installation team, LCP/u MGW team, and other OEMs (Nokia and Ericsson) to ensure the Network interfaces (IuCS, IuPS, IuR, and IuB) on the 9370 RNCs are fully operational.

Responsible for technical documentation and Visio Drawings for the implemented projects.

Involved in Attending meetings and technical discussions related to current project.

Involved in the configuration of BGP as a WAN protocol, and OSPF/EIGRP as interior routing protocol.

Worked on code upgrades of F5 LTM 8950’s local traffic manager which involves upgrading the code from V 10.x to V 11.x

Monitoring the NMS system for different Network Alerts.

Palo Alto firewall rule base review and fine-tuning recommendation.

Responsible for installation, troubleshooting of Checkpoint firewall and LAN/WAN protocols Implementing firewall rules and configuring Palo Alto, fortinet Network Firewall.

Configure IDS and Deep Packet Inspection on Fortigate Firewalls. Perform STIGing on all network devices to meet DoD requirements

Coordinate with Nokia and its Client Coral Enterprises to deploy and Maintain SD-WAN solution, routers and Switches, Cisco ASR, Juniper SRX and Fortinet firewalls.

Involved in troubleshooting of DHCP and other IP conflict problems.

Performed switching technology administration including VLANs, inter-VLAN routing, Trucking, STP, RSTP, port aggregation & link negotiation.

Configured EBGP/IBGP policies also tested BGP attributes such as Local preference, MED, AS-PATH, Community and Weight.

Configured EIBGP load balancing and ensured stability of BGP peering interfaces.

Resolved network issues, ran test scripts and prepared network documentation.

Working on Cisco 6509 and 4507 series switches for LAN requirements that includes managing VLANs, Port Security and troubleshooting LAN issues.

Configuration of Access List ACL (STD, Ext, Named) to allow users all over the company to access different applications and blocking others.

Dealt with NAT configuration and its troubleshooting issues related access lists and DNS/DHCP issues within the LAN network.

Responsible for technical documentation and Visio Drawings for the implemented projects.

Involved in Attending meetings and technical discussions related to current project Birla Soft, India

IBM, India Aug 2012 to July2014

Role: Network Engineer

Responsibilities:

Configured RIP and EIGRP on 2600, 2900 and 3600series Cisco routers.

Implemented VTP and trucking protocols (802.1q and ISL) on 3560, 3750 and 4500series Cisco Catalyst switches.

Upgraded the IOS on 1900, 2900, 3500 series Cisco Catalyst switches and 2500, 2600, 3600 series Cisco routers using TFTP.

Configured Access List (Standard, Extended, and Named) to allow users all over the company to access different applications and blocking others.

Configured STP for loop prevention and VTP for Inter-VLAN Routing.

Done troubleshooting of TCP/IP problems and connectivity issues in multi-protocol Ethernet environment.

Worked on network-based IT systems such as racking, stacking, and cabling.

CERTIFICATIONS:

CCNA(CSCO13194696) Valid: June 2020

Education

Bachelors in Electronics and communications, India, 2012

Master’s in Electrical engineering, Fremont, CA 2015



Contact this candidate