Post Job Free

Resume

Sign in

Solar Engineer

Location:
Irving, TX
Posted:
May 17, 2021

Contact this candidate

Resume:

Chandana Mareedu

Sr. Network Security Engineer

E: admhoe@r.postjobfree.com / C: 732-***-****

https://www.linkedin.com/in/chandana-mareedu-b2a783128/

PROFESSIONAL SUMMARY

Over 7 years of professional experience in software industry with the right expertise on Implementing, Configuring, Troubleshooting Network & Security infrastructure on routers, switches & firewalls of various vendor equipment.

Hands on experience on Cisco Catalyst 6500, 4500, 3750, 2950 series switches, Cisco 3800, 3600, 2800, 2600, 2500,1800 series Routers, Checkpoint 12400, 12600, 21400 Appliances, Palo Alto 200, 500, 2000, 5000 and 7000 Series, Juniper, Fortinet and Cisco ASA firewalls.

Expertise experience in implementing and troubleshooting VLANs, VTP, STP, RSTP, Root Guard, BPDU Guard, Port Fast, Uplink Fast, Backbone Fast, Ether Channel, PAGP, LACP and 802.1Q.

Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers and Firewalls.

Experience with design and deployment of MPLS Layer 3 VPN, MPLS Traffic Engineering, MPLSQOS.

Configured Security policies including NAT, VPN’s and Access Control Lists.

Experience in analyzing events using the help of the Security tools Arcsight (SIEM), Imperva (Web & DB Security), Blade Logic (File Integration Monitoring).

Proficient in handling Network and Security Monitoring tools and Packet capture tools like Solar winds, Wireshark, SNMP, skybox, Firemon, Arc sight, Imperva, Bladelogic, Intrusion prevention system and intrusion detection systems.

Experience of routing protocols like EIGRP, OSPF, RIP, and BGP.

Implement and maintain network availability and performance monitoring across private and public Cloud networks.

Audit and help support Virtual Private Networks (VPN) and other remote access technologies.

Hands on experience with creating virtual network security groups, virtual subnets, load balancers etc. in AWS cloud environment.

Extensive experience using Microsoft suite like Word, Visio, Excel, PowerPoint.

Great team player and able to work under pressure 24x7 duty rotation.

Technical Skills:

Cisco Platforms:

Cisco Catalyst 6500, 4500, 3750, 2950 series switches, Cisco 3800, 3600, 2800, 2600, 2500, 1800 series Routers

Firewalls:

Checkpoint 12400, 12600, 21400 / PaloAlto 200, 500, 2000, 5000, 7000 Series / Juniper / Fortinet and Cisco ASA etc.

Operating Systems:

Windows 2000/2003/ XP/Vista/7, LINUX, Mac etc.

Network Management:

Solar winds, SNMP, Wire shark.

Network Security:

IPS, IDS, Imperva, Bladelogic, Arcsight, Skybox, Firemon, NAT.

Load Balancers:

A10 Networks (AX2500), Cisco CSM, F5 Networks (Big-IP).

Cloud:

AWS and AZURE

Security Protocols:

DHCP, DNS, TFTP, FTP, SMTP, ARP, TELNET, SSH, HTTP/HTTPS, IKE, IPSEC, SSL-VPN etc.

Documentation:

MS Visio, MS office

EDUCATION

Master of Science in Information Security from California University of Management and Sciences with 3.90 GPA.

PROFESSIONAL EXPERIENCE

Client: Southwest Airlines, Dallas, TX Nov 19 - Till Date

Role: Sr. System Engineer – Network Security Engineer

Responsibilities:

Evaluate, develop, customize, install, implement and maintain Security solutions, policies, and procedures, according to Southwest Airlines requirements.

Analyze, troubleshoot, and investigate network security-related incident tickets based on security platform reporting, network traffic, log files, host-based and automated security alerts.

Using intelligence tools like Firemon, to perform scoping, triaging, prioritizing, and proposing solutions for risk found in Southwest Airlines current collection of firewall rules. Southwest Airlines having a diverse environment implemented across several platforms including cisco ASA, Juniper, and Palo Alto.

Design, implement and provide support to the network firewall, Firemon and host load-balancing solutions at Southwest Airlines.

Responsible for Migration of Cisco ASA to Paloalto Firewalls using Expedition tool.

Responsible for replacement of standby unit of Paloalto firewall in Active/Standby HA pair.

Responsible for setting up of 40 IPSEC VPN tunnels on Paloalto firewalls using on premises and cloud environments.

Upgrade of software versions on different models of Palo chassis.

Have hands on experience on Integration and Management of Palo Alto devices via Panorama.

Upgrade of Panorama from M-100 to M-500 to increase the performance.

Perform Monthly Firewall Rule Management & Remediation projects.

Monitoring the traffic through panorama logs and packet capture for troubleshooting the incident tickets.

Responsible for installation, configuration, maintenance and administration of Palo Alto firewalls PA-7000(7050,7060), PA -5000, series (5060/5050/5020), PA-4000 (4060/4050/4020) and PA 500 and PA- 200 firewalls.

Monitoring and implementing security measures to maintain secured network systems. Includes Intrusion Detection, Identify management, ID Provisioning, and other key system security infrastructure.

Assisting in installation, customization, development, implementation and maintenance of network systems developed internally and/or in conjunction with the outside vendors.

Implement and maintain network availability and performance monitoring across private and public Cloud networks.

Audit and help support Virtual Private Networks (VPN) and other remote access technologies.

Hands on experience with creating virtual network security groups, virtual subnets, loan balancers etc. in AWS.

Responsible for immediate response to system software problems and perform root cause analysis procedures.

Implementing new networks and configuration changes per detailed designs provided.

Troubleshooting within the data center network and external to the data center over various WAN / LAN connectivity methods to customer premise.

Configuring and supporting data center firewalls, including various models of Cisco ASA, Juniper and Palo Alto firewalls.

Responsible for Firemon policy implementation and operation support across Southwest Airlines networks.

Involved in the critical problem triaging discussions with SME’s and recommend alternative solutions.

Supporting the organization’s project management policy, practice, and methodology. And providing timely and accurate progress information by sharing the PCI project status reports.

Maintaining good professional relationship with peers and customer stake holders with excellent written / verbal communication skills.

Attending daily standup meetings with team to provide updates, explain issues/incidents and problems.

Client: AVAYA Inc., Irving, TX Feb 19 – Nov 19

Role: IT Network Security Engineering and Architect

Responsibilities:

Design, develop, deploy, and maintain network infrastructure and core security system which provide always available and secure Avaya Cloud solutions.

Implementing new networks and configuration changes per detailed designs provided. Network elements include routers, switches, firewalls, load balancers and DNS updates.

Troubleshooting within the data center network and external to the data center over various WAN connectivity methods to customer premise.

Performing general network engineering and operations support and maintenance activities, including working incident tickets.

Configuration, migration and support of A10 and F5 load balancers.

Working with security compliance teams, implement and maintain secure network infrastructure to adhere to HIPAA and PCI-DSS requirements.

Configuration and support of Public Cloud (AWS, Azure, Google, or equivalent) network and security systems.

Working with BGP and OSPF routing in Avaya’s global networks, including WAN and Internet routing.

Responsible for Palo Alto firewall management and operations across AVAYA global networks.

Evaluate, develop, customize, install, implement and maintain security solutions, policies, and procedures, according to AVAYA requirements.

Configured Client-to-Site VPN using SSL Client on Cisco ASA.

Design Network templates to create custom sized VPN, subnets, NAT to ensure successful deployment of Cisco wireless access points.

Configuring, troubleshooting and supporting data center switches. Avaya & Extreme VSP series devices or equivalent.

Network design skills especially in LAN switching and WAN & Internet routing.

Client: ESP - Health Care, Dallas, TX Jan 19 – Feb 19

Role: Sr. Network Security Engineer

Responsibilities:

Migrating all the ESP Networks to SD-WAN using Aruba and HPE.

Discover and collect details from the current ESP Network environment at headquarters and will continue assistance onsite for go-live at ESP’s Major Locations.

Travelling to other major ESP sites and gather information related to their Network and Infrastructure.

Leading the SD-WAN Deployment.

Leading the deployment of network equipment.

Implement customer request for firewall rules.

Supporting centralization of ESP telephone systems to Cloud from a Network Security Engineer perspective.

Creating New Changes request for firewall rule adhere to ESP policy and process.

Migrating NextGen (Electronics EMR/PM System) Instances to new Dallas data centre.

Maintaining organization with a system of prioritization throughout the project.

Engineer Aruba Networks.

Supporting HPE Systems.

Move emails to Office 365 and Centralize all ESP users on a new Active Directory.

Responsible for all aspects of design, implementation, monitoring, and troubleshooting.

Manage and maintain the LAN and WAN for all ESP sites.

Design Network templates to create custom sized VPN, subnets, NAT to ensure successful deployment of Cisco wireless access points.

Manages Switches, Routers and network performance, provides escalated "help desk" support as it relates to the network

Client: BRG Sports, Irving, TX Oct 18 – Jan 19

Role: Network Security Engineer

Responsibilities:

Implement customer request for firewall rules.

Creating New Changes request for firewall rule adhere to BRG policy and process.

Responsible for Juniper Firewalls to Cisco Firewalls migration/deployment.

Monitor and troubleshoot Cisco Sourcefire IPS/IDS.

Manage and maintain the LAN and WAN for all BRG sites.

Responsible for BGP/MPLS networks.

Design, implementation and support of infrastructure on COS / QOS management.

Migrate applications from physical/virtual infrastructure into Citrix NetScaler.

Design Network templates to create custom sized VPN, subnets, NAT to ensure successful deployment of Cisco wireless access points.

SolarWinds Orion Network Monitoring.

Manages Switches, Routers and network performance, provides escalated "help desk" support as it relates to the network.

Develops and recommends voice and data networking and connectivity solutions to IS management for consideration and implementation into BRG infrastructure.

Maintains DNS and registration of domains.

Implements and maintains network security so that business and communications are secure. Managing customer expectations and ensuring customer satisfaction. Seeks staff input in determining system/operations improvements and/or needs in relation to the network.

Client: Southwest Airlines, Dallas, TX May 16 – Oct 18

Role: Network Firewall & Cyber Security Engineer

Responsibilities:

Strong hands on and exposure to Palo Alto on a regular basis.

Successfully installed Palo Alto firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.

Maintained and Configured Check Point VSX with firewall virtualization.

Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.

Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.

Configuring rules and Maintaining Checkpoint, Palo Alto, and Analysis of firewall logs using various tools.

Implementation configuration and troubleshooting of Checkpoint firewall R77.

Migration from Cisco firewalls to Palo Alto firewalls platforms PA -5000, series (5060/5050/5020), PA-4000 (4060/4050/4020) and PA 500 and PA- 200 firewalls.

Strong knowledge and understanding with IPsec, Remote Access VPN, and Source Fire intrusion prevention systems.

Experience in evaluating existing policies and optimizing the rules based on current corporate requirements.

Responsible to evaluate the need for upgrades, new installations, and license modifications

Client: Energy Future Holdings, Dallas, TX Jun 15 – May 16

Role: Network Security Engineer

Responsibilities:

Responsible for designing and implementation of customer’s network and Security infrastructure.

Involved in complete LAN, WAN, Extranet redesign (including IP address planning, designing, installation, pre configuration of network equipment, testing, and maintenance) in both Campus and Branch networks.

Experience working with MPLS Layer 3 VPN on ASR 9006 with IOS-XR.

Experience with converting Cisco 6500 IOS to Cisco Nexus NX-OS in the data center environment.

Experience working with Nexus 7010, 5020, 2148, 2248 devices.

Experience configuring VPC, VDC and ISSU Software upgrades on Cisco Nexus 7010.

Experience in Configuring, upgrading and verifying the NX-OS operation system.

Worked on the migration to new Checkpoint R7x firewalls from Cisco ASA firewalls.

Troubleshoot and hands on experience on security related issues on Cisco ASA/PIX, Checkpoint and Palo Alto Firewalls.

Coordination with the Cisco TAC/Cisco AM, Checkpoint Consultant, for the critical cases/projects.

Responsible to validate compliance of firewall rules and its configurations using Skybox firewall assurance.

Support customer with the configuration and maintenance of PIX and ASA firewall systems.

Client: Dhanekula Institute, INDIA Feb 13 – Jan 14

Role: Network Administrator / Student Professor

Responsibilities:

Experience with Supporting both Network and Security infrastructure in data center environment and Campus environment, which involved with devices such as routers, switches, firewalls and wireless access points.

3rd level support lead for network security and firewall issues on Checkpoint NGX R71 and Cisco ASA devices.

Experience with moving data center from one location to another location, from Cisco 6500 based data center to both Cisco 6500 & Nexus based data center.

Experience with implementing Cisco 6500 VSS on the User distribution switches.

Working with MPLS Designs from the PE to CE and also configuring VRF on PE routers.

Teach bachelor degree student on the Network Administration, Firewall rules, security policies and help them with real time projects.

Working Knowledge of Cisco IOS, Cisco IOS-XR, Cisco CatOS, Cisco NX-OS, JUNOS.

Experience with configuring BGP in the data center and also using BGP as a WAN protocol and manipulating BGP attributes.

Design and deployment of MPLS QOS, MPLS Multicasting per company standards.

Implemented site to site VPN in Juniper SRX as per college requirement.

Implemented various EX, SRX & J series Juniper devices.

Installed controller and light weight access point coordination with JTAC.

Maintenance and trouble-shooting of LAN, WAN, IP Routing, Multilayer Switching.

Worked on different phases of testing such as Sanity Testing, Functionality Testing, Smoke Testing, System Testing, Installation Testing, Compatibility Testing, Regression Testing, Stress Testing and UAT Testing.

Writing Test cases & Test scripts for the application functionality.

Testing routers and modems troubleshot issues related to broadband technologies for Residential and Business Customers.

Performing onsite data center support including monitoring electrical power, switch alarms, network alerts and access logs.

Co-ordination with Hardware vendors, software vendors and service Providers.

Assisted in backup, restoring and upgrading the Router and switch IOS.

Attended Team meetings and provided comments on existing network and the recommendations to improve the current network Performance.



Contact this candidate