Post Job Free

Resume

Sign in

Network Security Engineer, VMWare NSX Engineer, Network Engineer

Location:
Hayward, CA
Posted:
March 16, 2021

Contact this candidate

Resume:

Siddhartha Yalamanchili

Network Security Engineer

adky0b@r.postjobfree.com

201-***-****

PROFESSIONAL SUMMARY:

• Cisco Certified Network Engineer with 9+ years of diversified experience in LAN/WAN, routing, switching, firewall technologies, administration and disaster recovery as a Network/System Engineer. Seeking a challenging and interesting opportunity in computer/network engineering which enables me to maximize my technical and managerial skills.

• Expertise in installing, configuring, and maintaining Cisco Switches (2900, 3500, 3700, 6500 series)

• Expertise in installing, configuring, and troubleshooting of Cisco Routers (3800, 3600, 2800, 2600, 1800, 1700, 800)

• Extensively worked on Cisco catalyst 6509 and implemented VSS along with VDC and VPC on Nexus 5505, 7009 switches.

• Hands on experience in Cisco IOS/IOS-XR/NX-OS for configuration & troubleshooting of routing protocols: MP- BGP, SSH, OSPF, LDP, EIGRP, BGP v4, MPLS, NAT, VLAN, STP(802.1D), SNMP, VTP, NTP, HSRP & GLBP.

• Knowledge of advanced technologies like VOIP, H.323, SIP, QOS, Multicasting, MPLS and MPLS-VPN.

• Extensively worked on Microsoft AZURE Cloud Database Services.

• Designed VNets and subscriptions to conform to Azure Network Limits.

• Designed and configured Azure Virtual Networks (VNets), subnets, Azure network settings, DHCP address blocks, DNS settings, security policies and routing.

• Exposed Virtual machines and cloud services in the VNets to the Internet using Azure External Load Balancer.

• Administration and diagnostics of LAN and WAN with in-depth knowledge of TCP/IP, NAT, PPP, ISDN and associates network protocols and services.

• Configuring and maintaining Site to Site and client to site VPN connectivity. Experience on Network management tool SolarWinds. Configured and maintained Cisco ASA firewalls, NSX and Palo Alto firewalls.

• Hands-on experience on Cisco ASA Firewalls - ASA 5540, 5550, ASDM, CLI, Firepower, Sourcefire IPS/IDS

• Experience in working with GTM, LTM, AFM, APM, or ASM, - SDSL and HDSL. Experience on Cisco MPLS.

• Experience working with High performance data center switch like Nexus 7010, 7018, 7009, 5020, 2148, 2248 devices.

• Experience with NSX (Edge, Firewall, LB)

• Configuration and administration of Cisco Intelligent, Contact Management which includes Cisco ICM Router, Logger, AW Distributor, PG's and CTIOS.

• Extensive experience in Cisco IP Telephony network construction and handling.

• Exceptional skills in Cisco Unity Tele Presence and voice Trunking.

• High ability to access data and VoIP at a variety of locations.

• Expertise in Cisco Unified Communications Manager(CUCM), Call Manager Express (CME), Cisco

• Unity, Cisco Unity Connection (CUC), Cisco Unity Express (CUE), voice gateways (MGCP, SIP, H323), and voice applications.

• Experience with F5 load balancers – LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.

• Configuring and implementing VLAN, VTP, LAN switching, STP and 802.x authentication in access layer switches.

• Design and configuring in different networking protocols like DHCP, DNS, FTP, VOIP (SIP, H.323, MGCP), Quality of Service (QOS).

• Executed POC trials of Network Security technologies including web application firewalls like Fortigate, Juniper Net screen, SRX, and Palo Alto and also implemented the solutions.

• Implemented Security Policies using ACL, ASA Firewall, Palo Alto Firewall IPSEC, SSL, VPN, AAA (TACACS+ & RADIUS).

• Comfortable managing the relationship and work of a managed services team dedicates to ongoing SNOW operations and maintenance, minor enhancements and major development work.

• Experience with orchestration tools (SOAR), Security Information and Event Management (SIEM), vulnerability scanning and management tools, etc.

• Extensive knowledge in different networking protocols DHCP, DNS, FTP, Quality of Service (QOS).

• Experience with Load Balancers for administrating and monitoring global & local traffic.

• Experience with SD WAN and SDN (VMware NSX) vSphere and Cisco ACI

• Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.

• Expert level knowledge in installing, configuring, and troubleshooting of Palo Alto (PA-3060 and PA-5250), Cisco ASA (5505/ 5510) and Checkpoint (4400, 4600) Firewalls.

• Designed, implemented and supported for network security technologies and products (WAF, Cisco ISE, AMP for endpoints, Firepower, etc.)

• Experience in monitoring and analyzing the load balancing of network traffic using KIWI Solar Winds

• Experience in working with service applications like cisco AnyConnect, Service now, ITG request and release, Workbench, Vital QIP, windows server manager etc.

TECHNICAL SKILLS:

Networking Technologies: LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP

Networking Hardware: Cisco Switches, Cisco Routers, ASA/Pix firewalls, VMware, Ironport Routing Protocols: OSPF, IGRP, EIGRP, BGP, RIP, MPLS, IS-IS, BGP, Multicasting, Routing on VMWare

Security Technologies: PAP, CHAP, Cisco PIX, Blue Coat Cisco ASA, IDS/IPS (4200), Checkpoint, Palo Alto, NSX, (ISO 27002, NIST 800-53, COBIT, HITRUST) Network Monitoring: Cisco Works 2000, Wire Shark, HRPing, SolarWinds, VRNI, Tableau, Log Insight Operating Systems: Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR Routers: CISCO 2600, 2800,3600,3800,7200, Juniper M & T Series, Cisco CRS-1, CRS -3, GSR Switches: CISCO 2900, 3500,4500,5000,6500, Nexus 7k,5k,2k Load Balancer : F5 BigIP GTM/LTM 2000, 5000, 6500, 6800 series, Cisco ACE 4710 Simulation Tools: Qualnet Developer, OPNET IT GURU, OPNET Modeler, Cadence Firewalls: Juniper net screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580 ), Checkpoint, Palo Alto, McAfee Web Gateway, NSX

AAA Architecture: TACACS+, RADIUS, Cisco ACS

Features & Services: IOS and Features, HSRP, GLBP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR s, HLD and LLD documents, Dell equal logics, VMWare.

CERTIFICATIONS:

• CCNA: Cisco Certified Network Associate

• CCNP: Cisco Certified Network Professional

PROFESSIONAL EXPERIENCE:

Gilead Sciences, Foster City, CA Aug 2018 to Present Senior Network Segmentation Lead

Responsibilities:

• Configuring Vmotion and Virtual Center Infrastructure for VMware ESX/NSX with Hyper V and EMC Clarrion Environment.

• Actively involved in switching technology Administration including creating and managing VLANS, Port security -

• Deployed and Configured VMware NSX Manager, Controller, Edge Gateway leveraging network data and intelligence for advanced security.

• Worked on Palo Alto firewalls PA-2050 in creating and implementing the policies required by the company.

• Exposed Virtual machines and cloud services in the VNets to the Internet.

• Configured, managed VMware NSX for vSphere and NSX for Multi-Hypervisor, including NSX Manager, NSX Controller, Logical Switch, Distributed Logical Router, Distributed Firewall, and Edge Services Gateway.

• Done Micro segmentation on over 600+ systems in the whole company on Prem and in cloud AWS.

• Daily tasks including extracting and refining traffic flows for all systems (Ingress, Egress) and setting up Flow review meetings with System managers and explaining them about traffic.

• Used Monitoring Tool VRNI and Tableau to extract flow reports for creating policies and trouble shooting them at the same time.

• Setting up New virtual Servers and tagging them in the VMWare VSphere Web Interface.

• Integrating Palo-Alto in to NSX Vmware.

• Creating rules threat detection, DDOS Prevention and Detecting Zero Day Attacks on the systems.

• Upgrading the VMWare Tools on all the hosts and Making sure all the ESXI Hosts are up and running at the same time.

• Checking the communication Channel Health Between the clusters and Firewalls and also installing NSX Firewall on all the Hosts.

• Upgrading the entire Gilead NSX Firewalls to NSX T 2.2 from time to time.

• Upgrading on prem NSX to NSX V and Installing NSX T on cloud AWS.

• Worked with VMWare for setting up the new AWS Environment and deploying NSX T

• Micro segmenting Clients New AWS Environment using NSX T.

• Migrating On-Prem Virtual Servers to Cloud AWS and Migrating On prem NSX Policies to AWS NSX T.

• Performing URL Filtering on NSX T using Wild cards from time to time and Perimeter Palo Alto Firewall from time to time.

• Strong understanding of key infrastructure systems (AD, Linux, Databases, Virtual Environment).

• Integrating Newly deployed NSX T with the VRNI and extracting flows for troubleshooting and creating flow reports.

• Experience in VMware VSphere and converged infrastructure VXBlock, UCS manager

• Experience and knowledge with designing installing and implementing VMware ESX server, VMware virtual center, Virtual machines and setting up V-Motion, HA, DRS

• Provide support for global Virtual Infrastructure VMware, assist with capacity planning, analysis, and monitoring

• Add/Remove Memory or any other Hardware resources on the VM

• Installing or upgrading VMtools, upgrade hardware version on the VM

• Taking, Deleting and reverting snapshots of the VM

• Ability to provide expert technical advice, guidance, and recommendations to management and other technical specialists on critical information technology security issues.

• Ability to work in a fast paced, highly visible, changing environment.

• Strong understanding of key infrastructure systems (AD, Linux, Databases, Virtual Environment).

• Proven ability at building working relationships with partners, peers, and senior Management.

• Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release management.

• Configured, managed VMware NSX for vSphere and NSX for Multi-Hypervisor, including NSX Manager, NSX Controller, Logical Switch, Distributed Logical Router, Distributed Firewall, and Edge Services Gateway.

• Deployed and Configured vShield & VMware NSX for network segmentation and host based Anti-Virus solutions.

• Worked in team of two to implement NSX in complex environments for use cases such as Multi-Site Active-Active, DMZ Anywhere, Cisco ACI Underlay, Micro-Segmentation, Application Continuity and Multi-Data Center Resource Pooling.

Environment: Cisco 2800, 3600 routers, Cisco 2900, 3750 switches, LAN, WAN, Subnetting, VLAN, VTP, VPN, NAT, OSPF, BGP, IS-IS, EIGRP, Palo Alto, Dome-9, AWS, ACL, ASA Firewall, NSX Vmware, NSX Firewall, NSX T 2.2, Firewall IPSEC, SSL, VPN, AAA (TACACS+ & RADIUS), ASDM, NSX, F5 Load Balancer. Moody’s, 7 WTC, New York Jan 2017 to Jun 2018

Network Security Engineer

Responsibilities:

• Main point of contact for any Palo Alto Firewall related issues for Dev Ops teams from China, London, west and east coast of USA, Canada and WTC branch.

• Responsible for migrating all the On-Prem Firewalls to AWS Cloud Firewalls and spinning up new VPC’s and setting up cloud Firewalls for the newly created VPC’s.

• Spinning up new Cloud Firewalls in AWS and configuring them and creating new rules and creating security profiles for all the Admins and Firewall Engineers.

• Configuring all the Firewalls logs and data to Splunk and raising Request on Service-Now to Splunk team to create adapters for the newly setup Firewalls.

• Creating Documentation on Guidelines for all the users on how to set up VPN configurations and Proxy Configurations.

• Public Key Infrastructure (PKI) design and management

• Deploying Panorama and Dome-9 for all the AWS Palo Alto Firewalls.

• Worked, set up, and maintained all Cisco ASA's, Catalyst Switches, Wireless controllers, and Wireless Aps using CLI and ASDM.

• Hyper-V: Installed, configured and used Hyper-V instances for a global rollout of SCCM and SCOM on a secure private virtual network

• VMware: Installed, configured and used vRealize Operations, vRealize Automation, vRealize Orchestrator, vRealize Business, vSphere, vSAN, NSX, Site Recovery Manager, vCSA, vCenter, vCOP, vCAC, etc.

• Installed and configured Firepower 4110 Management Center 6.0 on VMware and added ASA Sourcefire Agents as well as Firepower NGIPS for monitoring and management.

• Strong knowledge on blocking malicious sites as required by the information security system using Bluecoat Proxies.

• Experience in VMware VSphere and converged infrastructure VXBlock, UCS manager

• Experience and knowledge with designing installing and implementing VMware ESX server, VMware virtual center, Virtual machines and setting up V-Motion, HA, DRS

• Provide support for global Virtual Infrastructure VMware, assist with capacity planning, analysis, and monitoring.

• Performing URL Filtering and NATing the traffic and restricting the traffic at the perimeter Palo Alto Firewalls.

• Responsible for installation and maintenance of VPN gateways, IDS/IPS, F5 Load Balancers and proxy servers.

• Maintained and Troubleshot IP connectivity problems using PING, and Trace route utilities and packet capture tools such as Wireshark and configuring Packet Filter on Palo Alto.

• Hands on experiences with configuration and implementation of NAT, Security Polices on Palo Alto (PA-5250, PA- 3060) firewalls.

• Performed installs, configuration and troubleshooting on State-full inspection firewalls and inline/passive IPS/ IDS. Worked on implemented Active/ Standby HA configuration on Palo Alto Firewalls.

• Worked in team to implement NSX in complex environments for use cases such as Multi-Site Active-Active, DMZ Anywhere, Cisco ACI Underlay, Micro-Segmentation, Application Continuity and Multi-Data Center Resource Pooling

• Installed and implemented & troubleshoot the Network Virtualization through VM Ware and NSX.

• Strong Knowledge on implementation of security profiles such as DDOS Prevention, Threat prevention and PAN- DB in security policies on Palo Alto.

• Integrated the Cisco Unified Wireless IP Phones (792X series) with Cisco Unified Communications Manager and Cisco Unified Communications Manager Express using IEEE 802.11 over a Cisco access point.

• Experienced with configuration of security polices with App-ID and User-ID. Hands on experience with Configuring Palo Alto firewall using Wild fire feature.

• Worked on the migration to new Checkpoint R61/R75.40 firewalls from Cisco ASA firewalls

• Configuration of Checkpoint R75 Firewall Rules and Application and URL Blades and VPN\IPSEC Set up IPSEC Tunnels and VPN. Upgrade when needed.

• Strong understanding of key infrastructure systems (AD, Linux, Databases, Virtual Environment).

• Deployed and Configured vShield & VMware NSX for network segmentation and host based Anti-Virus solutions.

• Built, maintained, and supported internal network, including LAN/WAN configuration, VPN and wireless, IP/Telecom Gateway, VoIP phone system.

• Configured and installed VoIP devices and IP Phones such as 7940, 7942, 7960, 7961, 7971G-Ge, 7975G.

• Worked on Centralized management for AWS and Azure using Panorama M-100, Dome-9.

• Migration of the firewall rules, DOS attacks from Cisco ASA 5510, On-Prem to Cloud AWS Palo Alto firewalls.

• Worked on configuration of TACACS+, RADIUS and LDAP in Cisco ASA and Palo Alto firewall.

• Worked on F5 load balancer deploying many load balancing techniques with multiple components for efficient performance.

• Part of IT security professionals and identified the security gaps relating to HIPAA and PCI DSS.

• Part of team to identify the security risks relating to PCI DSS. Provided guidance on PCI DSS requirements. Enabled and assisted internal business units to build and maintain PCI certified systems and infrastructures.

• Provided application level redundancy and accessibility by deploying F5 load balancers long-term memory. Environment: Cisco 2800, 3600 routers, Cisco 2900, 3750 switches, LAN, WAN, Subnetting, VLAN, VTP, VPN, NAT, OSPF, BGP, IS-IS, EIGRP, Palo Alto, Dome-9, AWS, ACL, ASA Firewall, Firewall IPSEC, SSL, VPN, AAA (TACACS+ & RADIUS), ASDM, NSX, F5 Load Balancer.

Humana Health, Louisville, KY July 2016 to Dec 2016 Network Security Engineer

Responsibilities:

• Maintained a Network with more than 600 Network devices, 20,000-end hosts, and the other Network devices like DHCP, DNS Servers, and Firewall Servers

• Performed IOS upgrades on Catalyst 3750, 2950, 1900 switches, and 3600, 2600 and 2500 routers.

• Installed and configured DHCP, DNS Server.

• Worked with application developers and systems engineer to migrate applications and systems to a new Border Gateway network.

• Responsible for Cisco ASA 5540 administration and checkpoint firewall provider-1 across our global networks.

• Implementing and operating the Cisco ACS 5.x platform.

• Design, implementation, ongoing management and troubleshooting of Cisco UCS (Unified Communications Systems), including Call Manager / Unified Communications Manager 7.x and 8.x.

• Optimized, analyzed and improved performance of GSM network per client specification.

• Create Database(s) on SQL AZURE, setting up SQL Azur firewall.

• Good experience with like checkpoint VSX, IDS, IPS as well as encryption techniques.

• Experienced of network monitoring and management utility: Tcp dump and Wireshark

• Troubleshooting and installing of ISR, ASR9000 and Nexus devices.

• Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall.

• Hands on experience in Implementation, Troubleshooting &configuring for Checkpoint R77. 30 with GAIA and SPLAT.

• Strong background in SIEM and Log Aggregation Systems

• Experience in Syslog, WEF, UBA and related technologies

• Experience with SOC monitoring and Incident response operations

• Experience with Endpoint and Network Security systems that feed data to SOC

• Experience in a large scale globally dispersed operation model.

• Public Key Infrastructure (PKI) design and management

• Experience with Netflow/IPFIX based performance and security monitoring solutions

• Deploying and decommission of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices.

• Involved in configuring and implementing of composite Network models consists of Cisco 7600,7200,3800 and ASR 9K, GSR 12k and Cisco 9k,2k,3k,6k Series Switches.

• Migrated internal Cisco ASA 5510 firewalls with ASA 5512-X firewalls with Firepower Services.

• Installed and configured Firepower 4110 Management Center 6.0 on VMware and added ASA Sourcefire Agents as well as Firepower NGIPS for monitoring and management.

• Audited the systems for complying with SOX-404 IT Compliance, PCI DSS Compliance, HIPAA Compliance, SAS 70 Certifications and ISO 27001 Certifications.

• Managed and implemented the policies, procedures and controls that are required for HIPAA act.

• Added licensing to Firepower 4110 Management Center to cover NGIPS as well as 5512-x.

• Allow MAB functionality for secured access of CISCO Identity Based Networking Services (IBNS) and Network Admission Control (NAC) strategy using client MAC address.

• Administered SSL certification deployments and PKI infrastructure.

• Created PKI based network infrastructure and conduct trends analysis

• HIPAA Compliance Audit: Conducted the HIPAA compliance audit for one of their healthcare division and identified the deficiencies.

• Experience working with Nexus 7010, 5020, 5548, 2148, 2248 devices

• Reviewed the systems and processes and identified the gaps relating to HIPAA and PCI compliance. Recommended the policies, procedures and controls to comply with HIPAA and PCI.

• Used Kiwi-Cat tools to manage configurations from desktop for network devices, including routers, switches and firewalls.

• Centrally managed all Palo Alto Firewalls using Palo Alto Panorama M-100 management server.

• Experience on monitoring of QOS and analyze the traffic to troubleshoot any QOS related issues.

• Experience in WAN technologies like T1/T3, DS3, STM1 and STM4 circuit types

• Scripting for automation of processes for Windows Servers. Familiarity with main script languages like Power Shell, PHP, Shell, Perl, Python.

• Configuration, support and administration of Palo Alto and Checkpoint and to migrate all gateways and management servers to new hardware and software – Checkpoint SG appliances running GAiA OS and Checkpoint R75.40

• Upgrade of Checkpoint firewalls and management servers from Splat R75.30 to Gaia R77.20.

• Worked on checkpoint provider R71, R75.40 and R77 GAIA and secured policies and blocked websites using URL filtering, application identification and threat prevention

• Implemented Checkpoint FW Interface, NAT and VLAN using R77 GAIA Smart Dashboard.

• Hands on experience on ticketing tool Digital work flow 100(DW-100), HPSM-ASM, HPSM-APJ.

• Hands-on experience in the network management of circuits using TDM and Frame Relay network

• Installed and configured Routers, Bridges, Terminal Servers and CSU/DSU's to support WAN links.

• Experienced with RIP, RIPv2, EIGRP, OSPF, IS-IS, BGP, MPLS.

• Configured F5 GTM solutions, which includes Wide IP, Pool Load Balancing Methods and monitors.

• Implemented SNMP on Cisco routes to allow for network management.

• Experience with Juniper SRX 240 Firewalls.

• Worked on Solar winds Orion for analysis and monitoring purposes

• Performing SIP call flow & other protocol packets flow using Wireshark. Environment: Tcpdump, Wireshark, ASR series, Cisco UCS, Nexus devices, Juniper SRX, Checkpoint firewall, Palo alto, ASX, IDS, IPS, DHCP, DNS, Orion, ACL, PBX, Nortel, Juniper routers, Load Balancing, Routing Protocol, VLAN, Frame Relay, Trunking, VoIP, NAT, NSX Manager, NSX PAT, TCP/IP, Security, Vulnerability, Kiwi-Cat Tool,ACS 5.x, Wireshark TACACS, ASDM, RADIUS.

CMOS Research Labs, Vijayawada, India Jan 2014 to Dec 2014 Network Developer

Responsibilities:

• Responsible with analysis and diagnosis of highly complex networking problems.

• Hands on Experience with simulated networks in test labs to resolve highly complex problems and compatibility issues.

• Supports with technology design conversations/collaboration/workshops

• Delivering subscription optimization business to maximize customer value.

• Works on standard project documentation including detailed test plan for highly complex networks.

• Provide Support and Generates network configurations from Low Level for highly complex networks.

• Plans and executes highly complex Network Upgrade and Network Migration activity.

• Assists customer (Comcast) with deployment and strategy of highly complex technology solutions

• Troubleshoots and resolves highly complex customer network problems across a broad range of technologies.

• Acts as a focal point for highly complex network problem resolution.

• Hands on Experience with the ATP Testing with IOS-XR.

• Working with Daily Basis Reporting (Network Profiler).

• Interacted with clients and analyzed operational requirements.

• Hands on experience with the VPN.

• Supports Customer with day to day Issues with the Protocols. Environment: Cisco 2900, 3600 routers, Cisco 2900, 3750 switches, Cisco ASA Firewalls, STP, VLAN, VTP, VPN, NAT, JAVA, Power Shell Scripting, OSPF, BGP, IS-IS, EIGRP, Cisco Switches, HP open view, Wireshark, Solar Winds. Datatel Networks, Hyderabad, India March 2012 to Dec 2013 Jr. Network Engineer

Responsibilities:

• Level 1 technical support for IT Enabled Services of Hewlett Packard (HP) desktop and accessories.

• Responsible for providing first contact resolution meeting floor targets.

• Responsible for revenue generation, excellent sales experience.

• Ensured team always gets cast on surveys.

• Worked over time and on weekends to meet floor targets for the team.

• Installation and setup of Windows XP and Windows 7 for remote customers.

• Installation, configuration of Microsoft Outlook 2007.

• Installation and configuration of Norton antivirus software and McAfee antivirus software.

• Responsible for resolving technical issues related to registry files, running services, and start-up tools.

• Installation, configuration and technical support of HP webcams, HP keyboards, wired and wireless HP mouse, HP monitors, HP printers.

• HP Hardware technical support to find the root cause for black screen, blue screen; RAM failure, Processor failure, and any other hardware failure.

• Responsible for handling high call volume and provide on call resolution in a limited timeframe known as Average handling Time (AHT) of 30 min./call

• Responsible for escalation to L2 team or higher depending on the issues and remote login to help customer install software that customer is unable to understand.

Environment: Cisco 2800, 3600 routers, Cisco 2900, 3750 switches, LAN, WAN, Subnetting, VLAN, VTP, VPN, NAT, OSPF, BGP, IS-IS, EIGRP.

EDUCATION:

• Bachelor’s degree in Computer Science and Engineering from Karunya University, Coimbatore, India, 2013

• Masters in Computer Networking from New Jersey Institute of Technology, Newark NJ, US, 2016



Contact this candidate