Post Job Free

Resume

Sign in

Cisco Manager

Location:
Redmond, WA
Posted:
April 02, 2020

Contact this candidate

Resume:

Surya Bollu

Contact: 872-***-**** Email: adck9i@r.postjobfree.com

Professional Summary

CCNA, CCNP & JNCIAx5A CERTIFIED professional with over around 9 years of experience in routing, switching, firewall technologies, systems design, administration and troubleshooting.

Exposure to LAN/WAN setup, installation, configuration and troubleshooting.

Experience of routing protocols like EIGRP, OSPF, RIP, BGP and IP addressing.

Experience in testing Cisco & Juniper routers cum switches in laboratory scenarios and deploy on site for production.

Configured syslog-ng for Splunk implementation, Familiar with monitoring tools such as Nagios and splunk.

Worked on contrail and openstack cloud environment to deploy virtual machines like vSRXs, vMX routers into cloud and provided design to the network cloud.

Strong experience in Network security using ASA Firewall, Checkpoint, Palo Alto, IDS/IPS and IPSEC/SSL VPN and implementing security rules.

Knowledge and experience on F5 load balancers and Cisco load balancers (CSS and ACE).

Excellent hands on Cisco ASA and checkpoint firewall to use multiple security levels and interfaces.

Worked on writing some test cases for different line ups by using Python, Robot Framework and integrating with ANT(Automation Network Tool).

In Depth knowledge of all DNS RFC specifications

Experience in working with Cisco Catalyst series 2900, 3560, 3750, 4500, 4900, 6500 Switches.

Experienced in Troubleshooting for connectivity and hardware problems on Cisco devices.

Hands on experience in configuring Cisco Nexus 2232, 2248, 5548, 6001 and 7018(Sup 2E) and worked on nexus protocols VPC, VRF, VDC and FEX Links.

IOS/JunOS upgrade for Cisco & Juniper routers and switches.

Hands on experience in cisco call manager and VoIP.

Install Avaya VoIP phones, Polycom and Cisco Codecs.

VMware ESX/ESXi, VMware vCenter, VMware vCSA and Windows 2008 R2 Hyper-V.

Implementing, maintaining and troubleshooting switching tasks such as VLANs, VTP, VLAN Trunking using 802.1Q, STP, RSTP, PVST+, Ether channel using LACP and PAGP, Inter-Vlan routing, and CEF.

Experience in L2/L3 protocols like VLAN, STP, VTP, MPLS, 802.1Q protocols.

Good knowledge in SD WAN Technologies like ACL, NAT/ PAT, Ether Channels, IPSec VPNs.

Enhanced level of knowledge with, PPP, ATM, T1 /T3 Frame-Relay, MPLS.

Expertise in implementation and troubleshooting of FHRP protocols such HSRP, VRRP, GLBP, ACL.

Prepared, arranged and tested Splunk core search strings and operational strings.

Worked with Cisco, Palo Alto, Juniper, Splunk, Force point, Nessus, Stealth watch, Checkpoint, Zscaler and other vendors to provide a stable, high-speed secure network.

Experience in working with Cisco 2800, 3600, 3800, 3900, 7200 7600 series Routers

Expertise in Ansible playbooks and AWX deployments.

Extensive knowledge in different networking protocols DHCP, DNS, FTP, VOIP (SIP, H.323)

Extensive experience with Cisco IOS, IOS-XR, NX-OS Windows client/server operating systems, Linux, Networking technologies, Firewalls.

Troubleshooting & implementation of VLAN, STP, MSTP, RSTP, PVST, 802.1Q,, HSRP, VRRP, GLBP, LACP, PAGP, AAA, TACACS, RADIUS, MD5authentication, VTP & SVI.

Knowledge on complex Checkpoint, Cisco ASA & Palo Alto Firewalls Environment.

Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments

IOS/JUNOS upgrade for Cisco & Juniper routers cum switches.

Experience working with Nexus 7K, 5K and 2K.

Install core components of the7.6 XenApp environment.

Experience with virtualized ISE deployment.

Hands on Knowledge/experience on F5 load balancers, its methods, implementation and troubleshooting on LTMs and GTMs.

Experience in design, implementation, and support of F5’s Big-IP Access Policy Manager (APM) software component in a complex enterprise environment

Knowledge on F5’s BIG-IP Application security management and Edge Gateway Solution

Worked extensively on Palo Alto, Juniper Net screen, Fortinet and SRX Firewalls.

Experience with design and deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, MPLS, QoS and ITIL.

Hand-on experience in developing scripts using Perl scripting language.

Demonstrated success record in managing multiple tasks with proven ability to meet deadlines and proactively identifying the problem to solve complex technical issues.

In-depth knowledge of network communication technologies and techniques.

Experience on SONET and deployment of DWDM

Technical Skills

Network Protocols

MPLS, VRF, VRRP, Policy Based Routing, Route Redistribution,

Static Routing, WCCP, VDC, MPLS, LDP, ISDN, PPP, VoIP, SIP, VTP, STP, RSTP, VLANs, 802.1q/ISL, CDP, LACP, OSPF, BGPv4, EIGRP, HSRP, RIPv2, VPC, VDC.

Cisco Router platforms

1841, 2611, 2621, 2800, 3600, 3845, 3900, 7206VXR

Cisco Switch Platforms

2900XL, 2950, 2960, 3500, 3550, 3560, 3760, 4500, 6500,

Nexus 9k 7k, 5k, 4k, 2k, 1k

Firewalls

Juniper SRX (5400, 3600, 1500, 650,240h, 210he, 100) (Netscreen ISG1000, SSG-550, 2000,5200,5400), Cisco ASA (5510,5520,5540,5550,5580,5585),

FWSM, Checkpoint NGX R-55,R-60,R-65, Palo alto- 7500, 7050

LAN Technologies

Ethernet, Fast Ethernet, Gigabit Ethernet, Port Channel, TCP/IP, Ether channel, VLSM, Cisco/Catalyst L2/L3 Switches, Wireless (802.11 a/b/g/n), Checkpoint, Juniper/Net screen/Cisco Firewalls

WAN Equipment

Cisco/Juniper Routers, Silver Peak NX-7xxx WAN Accelerators,

OC-192, OC-48, FRAME RELAY, PPP, T1/E1, HDLC, MPLS, DS3, Leased Lines, DSL Modems, ISDN(PRI/BRI)

Network Management Tools

Cisco Works, Silver peak GMS, RSA Security and operations

Console, VMware vSphere Client, TFTP, FTP, SSH.

Security Access Control/Policy

Cisco Secure ACS for Windows, RSA, AAA, TACACS+, Radius, MD5, IPsec, GRE, NAT/PAT, ACLs, Juniper SA SSLVPN w/DUO, SSLVPN

Operating Systems

Windows 2003, Windows 2008, Linux, Unix, Windows server 2012

Network Operating Systems

Cisco IOS, NX-OS, CAToS, Aruba, JUNOS.

Documentation Tools

Microsoft Office, Visio, Project, SharePoint.

Load Balancing

F5 LTM, Citrix, Cisco ACE 4700 Series

IP Telephony

H.323, MGCP, SCC Cisco SRST

VoIP Devices

Cisco IP phones, Avaya

Cloud

Contrail, AWS, Openstack

Virtual devices

vSRX, vMX, Vf5

Education:

Bachelors of Technology in Electrical and Electronics, JNTU, Kakinada -2008

Certifications :

CCNA

CCNP (Routing & Switching)

JNCIA(JunOS, Cloud, Security, DevOps, Design)

Experience:

AT&T, Redmond, WA Feb 2019 – Present

Network Security Engineer

Key Responsibilities:

Experience in designing new architecture and maintain a sandbox environment for testing.

Worked on implementation of major project like Juniper SRX firewall migrations in core mobility networks for multiple sites and zones(CORE-DMZ, EXN, ECB,CAZ, ISPAN, DST)

Worked on Automation tool called ANT an internal tool used for code upgrades and configuring of new devices at different data centers.

Provide design solutions to the users based on the requirement and also work on the changes that lead to work on the implementation.

Worked on cloud infrastructure like Open stack, contrail.

Experience in tools like monitoring tools like JUNO Space, STRM, IP control and testing tools like MuDynamics, Spirent, Cyber flood, IXIA.

Testing of the new Core SRX zone hardware in Sandbox Lab– including regression feature test, performance and failover.

Worked with the Lab Ops team to install new SRX Core Zone hardware in Willows Lab and execute migration.

Worked on configuring new Juniper SRX Gen3 hardware firewalls 5800, 5600, 4600 devices and also worked on vSRX devices in network cloud

Worked on contrail and openstack cloud environment to deploy virtual machines like vSRXs, vMX routers into cloud and provided design to the network cloud.

Update Core Zone EDP documentation, Review the EDP, TOL and IG with the production teams (ATS) and Support FFA activities as needed.

Worked with Lab Ops and application folks to schedule, test and troubleshoot the migration strategy in lab and provide direction to lab operations as needed.

Good experience in deploying complex Routing Policy across different routing protocols.

Worked on writing some test cases for different line ups by using Python, Robot Framework and integrating with ANT(Automation Network Tool).

Worked on automating the JUNOSPACE and some other basic deployments by using ANSIBLE, PYCHARM, JINJA2 templates which is called End to End Automation.

Experienced in trouble-shooting both connectivity issues and hardware problems on vSRX, Contrail cloud.

Experience in implementation and troubleshooting of Datacenter devices like Nexus 7000, Nexus 5000 and Nexus 2000 Series devices with VDC's /VRF's configurations.

Experience in implementation and troubleshooting of own physical and virtual lab setup by using devices like Nexus 7k, SRX 5800,5600,4600’s MX960, 480and also vSRX devices.

Addition/ Deletion of Firewall Rules, Reviewing and Processing the ticket, Firewall Clean up, Virtual Servers, Certificate Creation/Renewals, Troubleshooting

Troubleshoot traffic passing managed firewalls via logs and packet captures

Expert in using ANT scripts, Make and Maven for Build process. Experience in Implementation of Continuous Integration through Jenkins. Deployment using various CI Tools like Chef/Ansible

Automated the cloud deployments in contrail, openstack using Ansible and AWS Cloud Formation Templates.

Automated software installation using Ansible Playbooks.

Worked on F5 GTM, AFM, ASM and other F5 components to protect against advanced DDoS attacks.

Designed, built, and deployed F5 Big IP load balancers (8900’s, Viprions, Blades), F5 Big IP TCL, F5 Big IP TMOS, F5 Big IP LTM Local Traffic Manager, F5 DNS Domain Name Services

Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.

Provided TierII Load Balancer expertise on F5 BigIP Local Traffic Managers (LTM). Designing F5solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 BigIP Load Balancers.

Environment: Juniper (SRX 4600, 3400, 5600, 5800) cisco ASA 5585, 5580 Cisco Routers (3900, ASR 7200, 9000), Juniper MX960, MX480, switches (3750/3550), Nexus 9k,7K,5K, BGP, OSPF, SSLVPN, Site-to-Site VPN, MPLS, Ether Channels, Cisco Catalyst Switches, JUNO Space, NSM (Network and Security Manager) and Pulse secure, Panorama, JUNO Space, Ansible, JSA and Network Monitoring tools

Charter Spectrum, Charlotte, NC October 2017 – December 2018

Sr. Network Engineer

Key Responsibilities:

Experience with Firewall administration, Rule analysis, Rule modification

My daily tasks are used to be providing the security between the data centers on the basis of tiers and also give access two the serves which are in two different zones and also monitor the traffic.

Provide design solutions to the users based on the requirement and also work on the changes that lead to work on the implementation.

Worked on implementation of major project in charter called Spectrum Mobile to go live.

Worked on the outages and change implementations for issues like timeouts, latency and asymmetrical routes.

Fortinet firewall deployment for multiple locations

Experience in JUNO Space, NSM (Network and Security Manager) and Pulse secure, Panorama, Algosec (Firewall analyzer), Splunk tools.

Contributed to the major charter projects like Spectrum mobile, Techmobile and Unified buy flow, telemetry and BHN to ICOMS migration.

Performed management and review of Sidewinder Firewall and BlueCoat Proxy policy, work flow and system settings following established change process.

Strong hands on and exposure to PaloAlto and juniper on regular basis tickets.

Handled Enterprise Network firewalls and involved in a part of migration from juniper to Palo Alto firewalls.

Successfully installed PaloAlto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.

Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.

Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Created firewall policies and NAT rules to provide access for websites internal and externally on Palo Alto and Juniper firewalls.

Also push Firewall rules staged during the day to respective cmas at night. Push includes the juniper and Palo Alto firewalls.

Worked on Firewall tickets to deal with low, medium and high priority issues.

Addition/ Deletion of Firewall Rules, Reviewing and Processing the ticket, Firewall Clean up, Virtual Servers, Certificate Creation/Renewals, Troubleshooting.

Involved in L2 Technical approver for any changes made to the network which involved changes to the Switches, routers, firewall, Load balancers and DNS

Hands-on experience Installing & configuring firewalls - Checkpoint NG & NGX, Cisco ASA (5500), Cisco Pix, ISA, and IP tables.

Responsible for maintaining multi-vendor network environment including Cisco ASA, Juniper JUNOS, Fortinet firewalls, Palo Alto PA-200 and configuring different policies to provide connectivity.

Implementing security Solutions using PaloAlto Pa-5000/3000, Cisco ASA, Checkpoint firewalls R75, R77.20.

Configure and administer network devices consisting of F5 load balancers, Bluecoat proxies, Juniper SRX's, PaloAlto Network Firewalls.

Designed, implemented, and managed network security countermeasures including firewalls and intrusion detection/prevention systems such as: Palo Alto, Pfsense, and Cisco's SourceFire.

Configuration and troubleshooting of Firewalls ASA 5520, ASA 5510, Nokia Check Point VPN1 NGX R55/R65/R70.Performed upgradation from old platforms to new platforms R65 to R75.45 Created multiple policies and pushed them in to Checkpoint Firewall (Gateways) and the Checkpoint Management Server with SPLAT operating system.

Setup Cisco ACI Fabric (Spine/Leaf/APIC) Configure ACI APIC controller.

Configuration and troubleshooting of Site to Site as well as Remote Access VPN on Cisco ASA and Checkpoint firewalls.

Build and maintain network security infrastructure using Cisco ASA, IPS,

FirePower, ISE, ACS and RSA SecurID.

Provided proactive threat defense with ASA that stops attacks before they spread through the network.

Working with level-2 team in deploying and installing Palo Alto firewalls.

Participating in the firewall review calls to get the changes approved.

Experience with designing and configuring secure Virtual Private Cloud (VPC) through private and public networks in AWS.

Successfully set up an OPNET lab session to examine the effect of ATM adaptation layers and service classes on the performance of the network

Worked on configuring new Juniper SRX firewalls 5400, 3600, 1500, 650, 100 devices and also worked on Palo Alto Firewall.

Configured and maintained IPSEC and SSL VPN's, Troubleshoot IAP (Internet Access Points) on Palo Alto Firewalls.

Worked on juniper chassis cluster and solved the critical issues on user basis.

Participating in the firewall review calls to get the changes approved.

Responsible for Cisco ASA firewall administration, Rule Analysis, Rule Modification.

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500, Juniper and Palo alto.

Primary responsibility is to design and deploy various network security & High Availability products like Checkpoint, Cisco ASA other security products

Installed various network hardware including concentrators, bridges, and hubs to establish communication connections with remote locations

Configure SSL VPN and Zone Based Firewall (site to site IPSEC)

Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.

Hands on experience on the Juniper SRX 5400, 3600, 1500, 650,240h, 210he, 100 and also Juniper Net screens ISG1000, SSG-550, 2000 and also on cisco ASA 5585, 5580

Experienced in trouble-shooting both connectivity issues and hardware problems on Juniper based networks.

Troubleshoot traffic passing managed firewalls via logs and packet captures

Configured firewall logging, DMZs, related security policies and monitoring

Responsible for Configuring SITE-TO-SITE VPN on Juniper SRX between headquarters and vendor locations.

Hands-on experience with SD WAN (MPLS/Frame Relay), routers, switches, TCP/IP, routing Protocols (BGP/OSPF), and IP addressing.

Provide GG-SSL-VPN access to more than 700 vendors for charter across all over the world.

Assisting offshore teams located in Navisite India in troubleshooting layer 3 issues and routing protocol issues mostly BGP.

Strong experience in Network security using ASA Firewall, Juniper, Checkpoint, Palo Alto, IDS/IPS and IPSEC/SSL VPN and implementing security rules.

Experience in Network Tools like SNMP, Wireshark, Splunk, Solarwinds Orion, Network automation ITNA and algosec tool analyze the Network Operations.

Experience with the escalation problems for Routing, Switching and firewall connectivity issues using ticketing system Service Now and Jira.

Implementation traffic filters on Cisco routes using Standard, extended Access list.

Troubleshooting, optimizing and testing of static and dynamic routing protocols such as OSPF, BGP

Managed inventory of all network hardware, Management and Monitoring by use of SSH, SFTP, SYSLOG, SNMP, NTP, NAT and PAT

Built alert & monitoring scripts for applications & servers using Python & Shell Script

Good experience in deploying complex Routing Policy across different routing protocols.

Environment: Juniper (SRX 5400, 3600, 1500, 650,240h, 210he, 100) Juniper Net screens ISG1000, SSG-550, 2000 cisco ASA 5585, 5580 Cisco Routers (1900, 2900, 3900, ASR 7200, 9000), Juniper M20, switches (6500/3750/3550 3500/2950), Nexus 7K,5K &2K, BGP, OSPF, SSLVPN, Site-to-Site VPN, MPLS, Ether Channels, Cisco Catalyst Switches, JUNO Space, NSM (Network and Security Manager) and Pulse secure, Panorama, Algosec (Firewall analyzer), JUNO Space, Ansible, NSM (Network and Security Manager) and, Splunk tools

Consumers Energy, Jackson, MI May 2016 – September 2017

Sr. Network Engineer

Key Responsibilities:

Worked as a part of network team where my daily tasks included configuring, monitoring and troubleshooting of TCP/ IP networks.

Worked on installation, configuration of LAN/WAN Networks, Hardware, Software, and Telecommunication services: Cisco Routers and Switches

Managed Cisco call manager, Cisco Voice Mail Unity servers. Worked with in Cisco Routing and switching background w/QOS.

Experience configuring BGP, OSPF in Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 on advanced technologies like, MPLS VPNs, TE and other service provider technologies.

Managed AD Domain Controller, DNS and DHCP Servers and configurations

Responsible for the IPAM (IP Address management) system for a very large WAN/LAN network.

Expertise in configuring and troubleshooting of Palo Alto, SRX Firewalls and their implementation Experience in site-to-site and remote access VPN solutions.

Experience in Cisco Unified Communication Manager (CUCM), Call Manager Express (CME), Cisco Unity Connection (CUC), Unified Contact Center Express (UCCX), Unified Contact Center Enterprise (UCCE), IM and Presence, SRST and Voice Gateways.

Worked thru Aruba and Cisco WLAN and Controller config files to help Admin with WLAN troubleshooting

Delivering global engineering support to customers, partners, and field engineers for Stealthwatch product line.

Designed, proposed and implemented NSX micro-segmentation.

Design and sessions, installing ICM / UCCE, developing call flows, compose technical documentation & mentoring other team members.

Worked with Cisco UCCE, IPIVR, Cisco Unified Communication System

Designing, configuring, and troubleshooting QoS, SIP, H.323, RTP, SCCP, Session Border Controllers, Voice Gateways, Voice circuits IP /TDM, Cisco Telepresence Infrastructure, QoS, NAT, PAT, and multicast.

Understanding of the different IP based applications and their use with StealthWatch.

Manage Meraki equipment for office network supporting 60 staff members.

Executed zero impact cutover of all HTTP/HTTPS internal traffic for 6500 users to new Websense/Forcepoint proxy platform from Blue Coat.

Configured and implemented voice gateways (H323/MGCP/SIP), SRST for remote sites

Developed MTS software plug-in for Multimedia over Coax Alliance (MoCA) configuration capability on DOCSIS cable modem and gateway products.

Upgrade the physical and virtual environments, including VMware vCenter, NSX, ESXi, Cisco Nexus 9K, Palo Alto, & BigIP F5

Fortinet Access List Management in Fortigate 200B hardware model with IOS 4.1

Configured WIDE IP and WIDE IP pool on F5 GTM’s to support load balancing between data centers.

Experience in configuring, upgrading and troubleshooting on Riverbed Traffic Optimizers and Cisco WAAS (Wide Area Application Services) and managing all the devices in the network using Central Manager

Worked on configuring the Nexus 5k Aggregation Switch and Nexus 2k Fabric Extenders.

Installed and Configured new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2K

Supported Operations team when complex changes are done by developing MOPs for network devices (routers, switches and A10 Load balancers) code upgrades, VLAN/IP migrations from old to new network topology without any service disruption.

Deployment and management of the following firewalls: Fortinet 100D, Fortinet 60C, Fortinet 60E, Fortinet 60D, Fortinet 200E (HA), this includes the whole UTM (app control, Web Filter, IPS, DoS, DDoS, etc.

Configured network using routing protocols such as RIPv2, OSPF and troubleshooting L2/L3 issues.

Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2900, 3500,7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800) Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, Riverbed Steelhead appliances

Added and modified the servers and infrastructure to the existing DMZ environments based on the requirements of various application platforms.

Programming and maintaining Cisco, Meraki and Hp networking equipment on campus. Set up and maintenance of Windows 2008 and 2012 servers. Managing a PBX phone system with Mitel and Aastra phones. Pulling and installing cabling and wireless access points. Extensive work with Meraki and cisco ISO on all types of Meraki Access points (indoor and outdoor) and Cisco 2960s and 2960x models.

Supporting the operational needs of customers using Stealthwatch for network security and forensics

Assist in creating network design standards for hardware and software. Developing and maintain Network Documentation (Visio diagrams, Excel spreadsheets, Word documents, etc.) Configure and troubleshoot network elements in a test/dev environment.

Deployment and management of the following security software: Trend Micro FDE with Bit Locker extension, Mimecast e-mail security (the whole suite and more than 30 modules), Trend Micro Security Suite DLP, Application Control, AV, Deep Inspection, Trend Micro HIDS, Trend Micro Predictive Learning, Trend Micro Web Filter, Device Control, URL Filtering/URL rating and Predictive Machine Learning. Packet Analyzing/Scanning with WireShark and NMAP, IDS Monitoring with Security Onion, Alien Vault SIEM for servers and PC's and FortiAnalyzer SIEM for the firewalls, Vulnerability Assessment with Qualys and Nessus Professional.

Worked on Inflobox to update the DNS host, Configuring NAT onto the Juniper SRX firewalls and a record to assist the part of the load balancer migration from F5 to A10.

Hardware/Software Installation and Maintenance of Avaya Aura Communication Manager 5.x, Avaya Aura Communication Manager 6.x templates.

Worked with Avaya Aura g700, g350, g250, g430, g450, g650 VOIP Gateways

Integrating Cisco Stealthwatch with other Cisco Security services such as Firepower and Cisco Identity Services Engine (ISE).

Worked on large scale implementation and maintenance for SSH (Secure Shell), PKI/SSH, VPN, IPSEC Satan, ISS, TCP/IP Monitoring.

Environment: Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800), switches (6500/3750/3550 3500/2950), Nexus 7K,5K &2K, F5 Load balancing (LTM, GTM, APM, AFM, ASM), EIGRP, RIP, OSPF, Voice Gateways, BGP, VPN, MPLS,WAAS, Wi-Fi controllers, Ether Channels, Cisco Catalyst Switches, Firewalls (Cisco ASA, Palo Alto), Cisco Voice (CCM, UCCE), Shell Scripting, Avaya Aura.

Scholastic, NYC, NY Jun 2015 – Apr 2016

Sr. Network Engineer

Key Responsibilities:

Worked as part of delivery team where my daily tasks included code upgrades, prefix-list addition, and access-list addition using python script and on Linux platform based on tickets generated by customers.

Migration and implementation of Palo Alto Next-Generation Firewall seriesPA-500, PA-3060, PA-5060, PA-7050, PA-7080.

Worked on migration project - XenApp 4.5 to XenApp 6.5 - Server 2003 (Legacy) to 2008 R2 (Gen 2) environment.

Architected, proposed and implemented a 100gb, rack-mount server ESXi environment with NSX and VSAN

Configured Motorola WIFI Wireless controller routers

Basic understanding of Unified Contact Center Enterprise (UCCE) – Intelligent Contact Management (ICM), Customer Voice Portal (CVP) and Interactive Voice Response (IVR/VRU).

Worked on OSPF routing protocol, configuring BGP sessions and troubleshooting on Nexus 1K, 5K, 7K, Juniper MX-960 routers and cisco ASR routers.

Installed and maintained production servers for client services (web, dns, dhcp, mail).

Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 and Juniper J series J230, M 320 and MX960 routers

Mitigated security risk from within Azure Cloud. Ensured the secure transfer of data from on-premises to Azure.

Use of Azure services for HA and DR and developed security policies for Azure cloud.

Responsible for planning, documenting and implementation of complex Firewall and VPN solutions.

Designed perimeter security policy, Implemented Firewall ACL's, allowed access to specified services, Configured Client VPN technologies including Cisco's VPN client via IPSEC

Installed and configured LAN/WAN Networks, Hardware, Software, and Telecommunication services- Cisco Routers and Switches.

Configuring firewall rules in Juniper SRX firewall using cli.

Developed entire frontend and backend modules using Python on Flask Web Framework

Created MSI packages using Citrix Installation packager in Citrix.

Configuring Citrix Load balancing for XenApp 6.5 farm as per the environment demand.

Working on configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between different data centers.

Implementing IPv6 addressing scheme for routing protocols, VLANs, subnetting and mostly during up gradation of cisco ISR routers2800/2900/3800/3900 and switches.

Configuration and deployment of cisco ASA 5540 firewall for internet Access requests for servers, Protocol Handling, Object Grouping.

Also role of Network Operator Center technician and monitoring the whole infrastructure, including: Solaris OS, VmWare ESXi ver 5.0, Hyper-V, Windows Server 2012 OS, IBM Blade Center H, Brocade Switches, BNT Switches, VPN connections, Cisco Switches, Fortinet Firewalls Ver 5.0, ASA Firewalls.

Worked on Cisco wireless LAN technologies and Switching. Configured Virtual server, service groups, Session persistence, Health monitors and Load balancing methods in new F5 andA10 LTMs. Configured WIDE IP and WIDE IP pool on F5 GTM’s to support load balancing between data centers.

Installation & configuration of Microsoft Proxy Server 2.0 and Inflobox DNS, DNCP and IP Address Management (IPAM)

Manage Bluecoat Web Proxy and content filter.

Lead member of the SSL decryption team for the implementation of decryption of SSL traffic using the Blue coat proxy SG.

Security configuration on Wireless LAN using protocols PEAP, EAP-FAST.

Assigning RADIUS and TACACS+ for new deployments in production environment. AAA for users to implement changes on production devices. Most of these devices are cisco propriety.

Generating audit reports by running automated scripts on various devices to check the layer 2 issues like errors on the links, port flapping’s.

Analyzing the Audit report and work along with Data center teams to check the optics and troubleshoot issues.

Developed/Modified/Enhanced existing and new Perl Packages, Perl frameworks and tools

Coordinating along with Global data center teams located at different locations and work along with them for troubleshooting layer 2 issues.

Worked on Citrix NetScaler load balancer for load balancing and failover across data center and between web servers.

Implementing continuous delivery (CICD) pipeline with Docker, Maven, Ansible, Jenkins, GitHub and AWS AMI's in Linux environment.

Environment: Routers (Nexus 1K, 5K,7K, Juniper MX-960), switches (6500/3750/3550 3500/2950), F5 Load balancing (LTM, GTM, APM, AFM, ASM), EIGRP, RIPv2, OSPF, BGP, VPN, Unified Contact Center Enterprise (UCCE), MPLS, Cisco Catalyst Switches, Firewalls (Cisco ASA, Palo Alto), Cisco Voice (CCM, UCCE, UCCX), Citrix, Python, Shell and Perl Scripting.

Alaska Airlines, Seattle, WA Feb 2014 – May 2015

Network Security Engineer

Key Responsibilities:

Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration

Worked on configuring and troubleshooting of routing protocols such as OSPF and BGP for effective communication.

Maintain LAN communication between Servers/Workstations.

Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls, Installing and configuring new juniper SRX series



Contact this candidate