Post Job Free

Resume

Sign in

Security Engineer

Location:
Wylie, TX
Posted:
January 15, 2021

Contact this candidate

Resume:

Ravi DeviReddy

Mobile: 512-***-****

Email: adjf8h@r.postjobfree.com

LinkedIn:https://www.linkedin.com/in/ravi-kumar-reddy-devi-reddy-505807b8

Summary:

Certified Lead Network Security Engineer with ITILV4, CEH, Cisco, Palo Alto, and Check Point firewalls certifications with around 10+ year’s professional experience in Network Designing, Deployment, Configuring, Troubleshooting and Testing of Networking System.

Expertise in configuration of Cisco Catalyst Switches of 1900/2900/3550/3750/6500, Cisco Routers of 2600/2800/3600/3800/7200/7600, Load Balancers ACE, A10 and F5.

Experience in Checkpoint firewall administration and troubleshooting.

Advanced knowledge in design, installation and configuration of Juniper Net Screen Firewall ISG 1000/2000, SSG series and NSM Administration.

Implementation and administration of Juniper WX/WXC devices for WAN Traffic acceleration Policy development and planning/programming on IT Security, Network Support and Administration.

Juniper, Checkpoint Cisco ASA, Cisco PIX and Palo Alto Firewalls Administration.

Experience with designing, deploying and troubleshooting LAN, WAN, Frame-Relay, Ether-channel, IP Routing Protocols(RIPV2,OSPF,EIGRP&BGP), ACL’s, NAT,VLAN,STB,VTP,HSRP &GLBP.

Design and configuring of OSPF, BGP on Juniper Routers (MX960).

Hands on working knowledge and diverse skills of all routing protocols (For example: BGP, EIGRP, OSPF, RIP).

Dealt with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing system like Remedy Ticketing System.

Experience working with Nexus 7010, 7018, 5020, 2148, 2248 devices.

Worked with Cisco for opening TAC Case and resolving issues to meet project deadlines.

Strong hands on experience on PIX, Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ &RADIUS).

Maintain, deploy, upgrade, design, and troubleshoot UCLA's Enterprise Security (Cisco ISE v2.2), LAN, WAN and AWS Cloud network deployments.

Maintain, deploy, upgrade, design, and troubleshoot AWS Cloud.

Supporting AWS Services (EC2, network, ELB, S3/EBS, Lambda, API Gateway, IAM, SMAL, Cloud Formation, SNS, SQS, Dynamo DB, and other core AWS technologies.)

Experience with Automation and Orchestration tools in AWS environment by using Ansible automation tools.

Migrated ASA CLI code to Firepower using Cisco's 1st and 2nd generation migration tools.

Installed FPS on ASA Firepower Module for hybrid deployment (ASA with CLI and FPS).

Installed FPS on ASA devices and FPR devices.

Familiar with Cisco FMC SMART and classic licensing to manage FTD or hybrid installs.

Installed AnyConnect with some advanced features such as machine authentication, ISE integration, and always-on VPN.

Exposed to security products including: ASA 5512, 5520, NGFW with Firepower Services.

Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 5000 and 2000.

Performed upgrading of load balancers from citrix to F5 BigIP load balancer to improved functionality, reliability and scalability in the system.

Managed the F5 BigIP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs.

Worked on configuration of BIG IP (F5) Load balancers, also monitored the Packet Flow in the load balancers. Upgrades/Downgrades of F5 TMOS, Hot-fix installations depending on need.

Assisted on building usecase for Splunk such as detecting Kerberoasting activities

SIEM Solution – ArcSight, Splunk, SolarWinds LEM, Fine-tuning log input and use case

Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability Configuring ASM policies for external applications. Administrating on F5 LTM, GTM, ASM, APM on series 5050, 10000 8900.

Created an automated backup procedure for all F5 load balance appliances. Create complex iRules using TCL language for URL redirections, HTTP header-insertion and HTTP header modification.

Educating and nurturing others in the team environment.

Experienced in deploying, managing and monitoring systems that run on Linux.

Strong understanding of hardware, Security, storage, networking and database capacity

Multiple years hands on working as a System Engineer, Networking or Data Center operation and user support experience.

Excellent written and oral communications. Ability to create diagrams and charts using Visio

Understanding of Cisco VPN, wireless, Force Point DLP and Shibboleth, Duo

Expert level knowledge of Security systems such as; SEIM, IDS/IPS, Firewalls, Evident and related network Security tools.

Education:

Master of Science in Information Technology, University of Mary-Hardin Baylor, Belton, TX

B. Tech in Electronics and Communications Engineering, Jawaharlal Nehru Technological University, India.

Certifications:

Palo Alto Certified Network Security Engineer (PCNSE) PANW00025195

Check Point Certified Security Administrator (CCSA) CP0000106905

Check Point Certified Security Expert (CCSE) CP0000106905

ITIL V4 Foundation 9980091492424046

CCNA (Routing & switching) CSCO12853233

CCNP (Routing, Switching & Troubleshooting) CSCO12853233

CCIE (Security) CSCO12853233

Certified Ethical Hacker (CEH) ECC8061257934

Technical Skills:

Network Hardware

Cisco Routers of (1900, 2800, 2900,3600,3800,7200 and 7600).

Cisco L2&L3 switches (3560, 3750, 4500, 4900 & 6500, NX 5000 & NX7000).

Juniper M/E/ACX Series, SRX, IDP and STRM/JSA

Firewalls PIX Firewall (506/515/525/535), ASA (5540) Sonicwall Firewalls, Palo Alto Firewalls, Fortinet Fortigate, Checkpoint Fw1/NGX/Provider-1.

Load balancers- Cisco CSM, F5 Networks (Big-IP) LTM, GTM, ASM, and APM, A10 Load balancers.

Routing: Static Routes, RIP, EIGRP, OSPF & BGP, IBGP/EBGP, BGP Attributes/Communities.

Switching: VLAN’s, Dot IQ, VTP, STP, RSTP, VLAN Maps, HSRP, VRRP, GLBP, CEF, DCEF and Port Security.

Protocols: IPv4, IPv6, TCP, UDP, ICMP, DNS, DHCP, SNMP, SYSLOG.

LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet & 10 Gigabit Ethernet, Port-channel.

Wireless: Cisco WLAN 5500 series, Aruba WAP, Sonicpoints.

WAN Technologies: Frame Relay, PPP, HDLC, T1/T3.

Network Security: NAT/PAT, Ingress & Egress, Firewall Design, VPN Configuration, Dynamic, Reflexive ACL and authentication AAA (TACACS+ & RADIUS).

Voice over IP: H.323, MGCP, SIP, SCCP.

Network Management: Solar Winds, Wire shark, GNS3, Cisco Packet Tracer.

Documentation: MS Office, MS Visio.

Professional Experience:

Altice USA, Plano, TX [Feb’17- Present]

Lead Network Security Engineer

Altice USA is one of the largest broadband communications and video services providers in the United States. Altice USA is subsidiary of Altice NV (Euronext: ATC, ATCB), a convergent global leader in telecom, content, media, entertainment and advertising founded in 2001 by entrepreneur Patrick Drahi. Altice USA delivers innovative, customer-centric products and solutions that connect and unlock the limitless potential of its more than 4.9 million residential and business customers across 21 states. Altice USA deliver broadband, pay television, telephony services, Wi-Fi hotspot access, proprietary content and advertising services, bringing everything to our customers’ fingertips anytime, anywhere. To meet our customers’ needs, Altice USA also provide international news, and hyper-local news created specifically for the communities we serve in the New York area.

Responsibilities:

Customize risk assessment frameworks (RAF) to prioritize and share the details of the assessment, including any risks to their information technology (IT) infrastructure. The RAF helps an organization identify potential hazards and any business assets put at risk by these hazards, as well as potential fallout if these risks come to fruition.

Risk advisory helps business owners address their unique risk challenges and maintain security, compliance and growth efforts, with enterprise risk management, process improvement, information technology, with internal control and compliance, including framework compliance, to help our clients understand and proactively address business risks that are critical to their success. Managed risk assessment by the compliance rules. Identify any potential hazards that, if they were to occur, would negatively influence the organization's ability to conduct business.

Potential hazards that could be considered or identified during risk assessment. Determine what, or who, could be harmed. Evaluate the risks and develop control measures. Record the findings. Review and update the risk assessment regularly. KPI, KRI, Risk Registers, and Identify Inherent Risks of 3rd party, internal Cyber (NIST, PCI DSS, SOX, CSF, HIPPA, PII. GDPR).

Performed advance managerial (senior-level) information security analysis work. Work involved planning, implementing, and monitoring security measures for information systems and infrastructure to regulate access to computer data files and to prevent unauthorized modification, destruction, or disclosure of information. May plan, assign, and/or supervise the work of others. Works under limited supervision, with considerable latitude for the use of initiative and independent judgment.

Strong hands on and exposure to Checkpoint & Palo Alto Firewalls and F5, GTM, LTM, ASM, APM modules on a regular basis.

Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Fortinet and Palo Alto appliances serving as firewalls and URL and application inspection.

Install, configure and maintain Check Point NGX 75.20 on SPLAT and GAIA 77.20, R77.30.

Configure and administer security rules and policies to permit and/or deny user traffics based on company security policy.

Implementing Checkpoint firewall policies across firewalls throughout the network.

Network monitoring, packet captures and troubleshooting traffic passing through firewalls via logs.

Expertise in configuring, troubleshooting, migration of ASA Firewalls to Firepower Threat Defense FTD 2100, 4100 and 9300 series firewalls, configuring access control polices, FlexConfig etc.

Migration of ASA Firewalls ASA 5525, 5555-X, 5585 to Cisco Firepower Threat Defense (FTD) 4110 and 9300 for tightening the IT Security of the Company's Infrastructure and increase the handling capability of Network traffic.

Deployed Firepower Management Center (FMC) 4500 in HA pair mode for managing and configuring the new generation FTD Firewalls devices and policies for security of network.

Implementation, configuration and deployment of Cisco next generation of FTD firewall for security enhancement.

Troubleshooting and maintenance of Cisco Identity Service Engine (ISE) utilizing 802.1X to enable the creation and enforcement of security and access policy for end user's laptop and the desktop access of company network.

Optimizing existing policies to improve security and performance.

Perform system upgrades, regular firewall patches and maintenance.

Configure IP-SEC VPN for user traffics that needs to be encrypted using Checkpoint.

Monitor Checkpoint VPN tunnel activities with smart view monitor and troubleshoot VPN issues via CLI.

Deployed Antivirus and Host Intrusion Prevention System to over 5000 workstations.

Created and maintained Antivirus and Firewall policies to meet special needs for field laptops, standard desktops, laptops and servers.

Configure and manage LDAP User management with Checkpoint Smart Directory

Integrates Microsoft active directory (LDAP) into checkpoint for identity awareness and user authentication.

Back up, Restore and upgrade of Check Point firewall appliance.

Configure and troubleshooting HA Cluster on Checkpoint Firewall.

Analyze logs and make necessary network report using smart reporter console application.

Monitor all users/Firewall traffics using smart view-tracker, and smart view-monitor smart consoles.

Supporting AWS Services (EC2, Network, ELB, S3/EBS, Lambda, API Gateway, IAM, SMAL, Cloud Formation, SNS, SQS, Dynamo DB, and other core AWS technologies.)

Experience with Automation and Orchestration tools in AWS environment by using Ansible automation tools.

Troubleshoot, Monitor and configure checkpoint firewall issues and other smart console applications using CLI.

Good work experience in Splunk - correlation rules creation, dashboard & report creation, log source integration, Splunk implementation, administration & management.

ArcSight administration - Log source integration, connector configuration, report creation, Splunk implementation, administration & management.

Splunk, Arcsight, Symantec SIM, Forescout, DB networks, Nessus, Qualys, Arbor Peak and HPE UBA.

Troubleshoot firewall issues through command-line using CLI commands and GUI interface using smart console.

Configure checkpoint firewall to authenticate users based on user identity, user group, User session etc.

Expert level knowledge of security systems such as; SEIM, IDS/IPS, Firewalls, Evident and related network security tools.

Managing F5 LTM (3600, 3900, 4000, 5250, 5050), GTM (2200, 1500, 1600) for Altice USA cable IT Enterprise network.

Configured GSLB, requests Global load balancing, on GTM (WIPs, Pools, iQuery, A records, zones and servers).

Configured SLB requests Local load balancing on LTM (SSL acceleration, HTTP compression/caching, Pools, Monitors, iRules, Persistence, Advanced Health Checks, SSL termination methods) and DNS as per application and business requirements.

Mitigating Security Vulnerabilities on F5 SSL profiles and Management IP.

Configuring base configs, SNMP traps, Self ip, VLANS, SNAT pool on F5 LTM.

Troubleshooting issues related to TCP/IP deep packet inspection for application errors, network and server errors.

Environment: CISCO routers and switches, Checkpoint, Palo alto, F5 Load Balancers, LTM, GTM, ASM, APM, Cisco, VPN, STP, VLANS, VTP, Ether channel, Port channel, Access Points, Switch Stacking, Wire Shark, SolarWinds, VPC, VDC, VRF, VISIO.

Equifax, Alpharetta, GA [Feb’16- Mar’ 17]

Sr. Network Operations – Security

Equifax powers the financial future of individuals and organizations around the world. Using the combined strength of unique trusted data, technology and innovative analytics, Equifax has grown from a consumer credit company into a leading provider of insights and knowledge that helps its customers make informed decisions. The company organizes, assimilates and analyzes data on more than 800 million consumers and more than 88 million businesses worldwide, and its databases includes employee data contributed from more than 5,000 employers.

Responsibilities:

Provided leadership and oversight of Operations Security via daily management of security monitoring, vulnerability assessment, datacenter security solutions and information assurance.

Worked with a variety of internal and external vendors to ensure the effective detection, response, mitigation, and reporting of cyber threats affecting networks, systems, mobile devices, and critical data.

The scope of services includes system auditing, event monitoring, end point security, boundary controls, authorization, and compliance reporting solutions.

In this position my responsibilities include, but were not limited to providing oversight of services to include 24x7 monitoring, incident response, enterprise defense technologies, and vulnerability assessments and ensure the quality of delivery.

Strong hands on and exposure to Checkpoint & Palo Alto on a regular basis.

Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Fortinet and Palo Alto appliances serving as firewalls and URL and application inspection.

Successfully installed Palo Alto PA 3060 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.

Configuration and Administration of Checkpoint, Palo Alto Firewalls to manage large scale firewall deployments.

Maintained and Configured Check Point VSX with firewall virtualization.

Remediation of firewall rules from checkpoint firewalls to Fortinet firewalls and their implementation.

Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering.

Log forwarding agent installation and configuration - nxlog agent, Splunk universal forwarder, snarewin etc.

Install and Configure alert manager, Splunk add-on s and Splunk apps.

Amazon Web Services engineer with excellent experience in Cloud computing, Infrastructure Solutions and services, Data center virtualization and Database Services. Deep technical experience with architecture, design and hands-on diverse technology platforms including different Cloud Platforms (AWS/Azure), Virtualization, Database Technology.

Technology and Infrastructure consultant for Cisco and Juniper design and implementation projects. Specific tasks include installations, configurations, support and maintenance of routers and switches.

Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.

Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Configuring rules and Maintaining Checkpoint, Palo Alto, Fortinet Firewalls& Analysis of firewall logs using various tools.

Configuring rules and Maintaining Fortinet Firewalls & Analysis of firewall logs using Forti-analyser.

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.

Managed Virtualization Environment using VM Ware ESX 3.x, VM Ware V Spere 4.x, Virtual Center, VI Client, and P2V.

Creating and Managing Virtual Machines and Templates.

Migrate Physical Servers to Virtual Server using VMware Converter (P2V Converter).

Creation of Virtual Switches, Ports and Port groups and setting up Layer 2 Security Policies for Virtual Networks.

Created virtual systems (firewalls) in the Palo Alto Environment.

Implementation configuration and troubleshooting of Checkpoint firewall R77.

Configuring VPN, clustering and ISP redundancy in Checkpoint firewall.

Built and support VRRP / Cluster based HA of Checkpoint firewalls.

Migration from Cisco firewalls to Palo Alto firewalls platforms PA -5000, series (5060/5050/5020), PA 4000 (4060/4050/4020) and PA 500 and PA- 200 firewalls.

Configuration and troubleshooting of Site to Site as well as Remote Access VPN on Cisco ASA and Check Point firewalls.

Strong knowledge and understanding with IPsec, Remote Access VPN, and Source Fire intrusion prevention systems.

Fully versed in the syntax of security platforms, and day to day rule verification.

Experience in evaluating existing policies and optimizing the rules based on current corporate requirements.

Knowledge on usage of Queries in Smart View Tracker to monitor IPS and common network traffic and troubleshoot events using packet data.

Responsible to evaluate the need for upgrades, new installations, and license modifications using Smart Update.

Have good understanding on configuring NAT for Web and Gateway servers.

Handled deployment and management of Checkpoint GAIA, R75, R71, and R65.

Environment: CISCO routers and switches, Checkpoint, Palo alto, Cisco, VPN, STP, VLANS, VTP, Ether channel, Port channel, Access Points, Switch Stacking, Wire Shark, SolarWinds, VPC, VDC, VRF, VISIO.

HOME AWAY, Austin, TX [May‘14 – Feb’16]

Network Operations Engineer - Security

Responsibilities:

Installation, configuration and maintenance of Palo Alto Firewalls, Cisco ASA firewalls.

Deployed and managed Varonis specifically Data Governance, Data Advantage and Data Alert modules in complex environments.

Demonstrate the features and benefits of Varonis software to the staff and documented the operations.

Used Varonis Data advantage and Data Alert to monitor and analyze and alert file system activities on NAS.

Switch experience includes Cisco Catalyst switches: CISCO 3750, 4500, 6500 series switches and Cisco Nexus switches 7000 and 7700 series.

Performed Checkpoint firewall upgrade of 50 firewalls from R55 to R65. Administered Juniper 50, 200, 500, and SSG 520 firewalls.

Troubleshoot and hands on experience on security related issues on Cisco ASA/PIX, Checkpoint, IDS/IPS, Palo Alto and Juniper Net screen firewalls.

Configuration and maintenance of Juniper Net Screen SSG-550.

Configured Routers for OSPF, EIGRP, BGP protocols.

Hands on experience and Good Understanding of OSPF, BGP, MP-BGP, MPLS-VPN.

Configuration and maintenance of OSPF protocol which was the enterprise IGP. Configuration included deploying of new branch locations or new network devices in the existing infrastructure. Creating Stub Areas & configuring Summarization for effective Routing.

Using PBR with Route Maps for route manipulation/filtering. Troubleshooting routing issues like suboptimal routing and asymmetric routing.

Provided technical support for full setup, debugged the problems of OSPF, switching and HSRP.

Configure email server in Splunk to send automatic alert & report emails.

Implement and manage Splunk components - Search heads, heavy forwarders, and deployment servers, licensing server, deployed and Indexers.

Create lookups, objects and use it in Splunk query.

Configure Splunk and syslog servers.

Switching related tasks included implementing VLANs, VTP and configuring and maintaining multi VLAN environment and inter-VLAN routing on Fast-Ethernet channel.

Configured Object Grouping, Protocol Handling and Code up gradation on Palo Alto Firewalls.

Conducted vulnerability assessments and generic security scans of both systems and networks to identify and mitigate security vulnerabilities using Nessus Vulnerability Scanner.

Design, implement and provide second level support for host load-balancing solutions at SWA.

Working knowledge of the UNIX and CLI based command to implement the networking tools.

Configured and monitored Firewall logging, DMZ’s and related security policies.

Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support.

Configuration of ACLs in Cisco 5540 series ASA firewall for Internet Access requests for servers in LAN and DMZ and also for special user requests as authorized by management.

Airtel, Hyderabad, India [Jun‘11 – Nov‘13]

Network Engineer

Responsibilities:

Responsible for Installation, configuration and maintenance of Cisco 7200, 3900, 2800, 2600, 2500 and 1800 series Router / Cisco Catalyst Cisco 6500 (sup 720), 4500 (SUP 6), 3750, 2950 series Switches.

Designed and implemented Cisco Nexus data center platform and worked closely with Cisco advance services and built Communication access zone for contact center services, management access zone for network management and monitoring tools, private wan access zone for remote site and elastic computing access zone.

Exposure to Nexus, Hardware Architecture of the Sups, chassis, I/O Modules, Fabrics, Licensing, VDC, VPC, ISSU, Using NXOS CLI

Worked with Cisco advance services to implement data center Nexus environment for new Upgraded the NX-OS in nexus 7018,7010 and nexus 5548 and 5596.Consolidated multi-tiered environment into a pair of Nexus 7000 switches using VPC and VRF

Maintained good understanding of the basics behind the Internet and its workings (DNS, Security, IP Routing, HTTP, VPN, Email Routing, SPAM, etc.)

Configuration included VLANs & VTP, STP port features, Gateway redundancy using HSRP, enterprise security using Cisco Port Security and Dot1X framework.

Configuration and maintenance of OSPF protocol which was the enterprise IGP. Configuration included deploying of new branch locations or new network devices in the existing infrastructure. Creating Stub Areas & configuring Summarization for effective Routing.

Worked on BGP configuration for providing redundant internet connectivity using BGP attributes, Route maps, prefix-lists etc.

Configured and Maintained BGP features such as load balancing, Route Reflectors, BGP metrics such as maintaining the Enterprise IP Addressing scheme with allocation of new Pools for user subnets, and updating the port on the switches MED, AS Path, Local Preference, Communities.

Performed administration on Palo Alto NGFW, creating policies, rules, users, VPN connections etc.

Managed VPN migration from Nortel i100 to Palo Alto NGFW VPN devices.

Traffic monitoring and managing using Palo Alto Panorama.

Updated Palo Alto NGFW PAN-OS, Threat databases, AV databases and filters as required.

Electronics Corporation of India Limited [Feb-‘10 – May’11]

Network Engineer

Responsibilities:

Configured Routing protocols such as OSPF, BGP, static routing and policy based routing.

Team member of Configuration of Cisco router with VPN and Configuration of Catalyst switches.

Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls for stable VPNs.

Configuration and troubleshooting link state protocols like OSPF in single area and multiple areas.

Redesign of Internet connectivity infrastructure for meeting bandwidth requirements.

Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.

Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.

Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.

Providing Technical Support and solutions for Network Problems.

Planned, tested and evaluated various equipment, systems, IOSs and procedures for use within the Network / security infrastructure.

Managed the testing, deployment and configuration of WLC, WCS and WiSM systems. Worked on Cisco 1242, 2400 & 3500.

Hand-on experience in developing scripts using Perl scripting language.

Experience in designing, managing, and implementing complex IPCC and Cisco ICM/UC systems.

Worked on Cisco Routers, Active /Passive Hubs, Switches, Juniper SRX firewall, VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall.

Designed ACLs, VLANs, troubleshooting IP addressing issues and taking back up of the configurations on switches and routers.

Provided testing for network connectivity before and after install/upgrade

Cisco switches and routers: Physical cabling, IP addressing, Wide Area Network configurations.

Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external.

Responsible for creating and maintaining diagrams and documentation of network systems.



Contact this candidate