Post Job Free

Resume

Sign in

Network Security Engineer

Location:
Lakewood, NJ, 08701
Posted:
January 30, 2023

Contact this candidate

Resume:

Ratna Deevi

Senior Network Engineer

+1-980-***-****

adu073@r.postjobfree.com

Professional Summary

Around 8 years of experience in system designing, network support, administration, firewall security and troubleshooting of networking systems.

Experience in Engineering, Designing and Configuring Layer 2 & Layer 3 Switching, LAN/WAN fundamentals, VLAN, Routing Protocols like OSPF, EIGRP, RIP, BGP & IGRP, ISDN, Frame Relay, MPLS, VPN, VoIP etc. and also configuring Access Points to industry standards.

Experience involving in IP multimedia systems development and support.

Used Tenable Security Center, to perform regular scans on end user hosts to generate reports on vulnerabilities.

Managed conflicts performing threat assessments of alerts by continuous monitoring through SIEM tools (Splunk) and IDS logs on assigned systems and determined the severity of each alert that was issued.

Recently moved from CVSS score to VPR – Vulnerability Priority Rating (Tenable owned) which helped a lot on prioritizing the vulnerabilities and what to be patched.

Experience running various types of scans, like Wannacry Ransomware, Internal PCI Network scan among others on Tenable.

Expert level Knowledge on working with Wireless LAN Controller's, Cisco Meraki, Cisco NCS, Cisco AP's, LWAPS, Standalone AP's and Mesh AP's.

Experience in Cisco Routing and Switching using 3600, 3700, 3800, 5300, 6500, 7200,7600 Nexus 9k, 7k, 5k, 2k series routers.

Implemented VDC, VPC, Fabric Path on the Nexus 5505 and 7009 switches and also implemented VSS on Cisco catalyst 6509 and 6513 switches.

Designed Redundancy Gateways for Campus Network using HSRP/VRRP/GLBP.

Experienced in wireless/RF communications with knowledge and experience in technology integration of Wireless Broadband/Convergence (IEEE 802.11, WiMAX, BYOD, etc.)

Worked with MPLS in establishing peer ship with BGP protocol.

Constant monitoring of QRadar and Nexpose to identify vulnerabilities in the network devices and mitigating them.

Configured 7ks and ASA firewalls for the Datacenter Interconnect (DCI)

Experience with F5 load balancers 6400 LTM and Citrix Netscaler Load balancers.

Proficient with various applications, services and network management tools including FTP, Telnet, Ping, DNS, DHCP, ARP etc.

Operating systems package and firmware installation support for networking hardware.

Responsible for design and architecture of the LAN, WAN and the security infrastructure.

Planning, designing of Corporate Network architecture and implementing in distributed environment with future expansion option.

Supported server-based environment on Windows 2003/2008/2012/R2 with Active Directory, DNS, DHCP, and ADCS.

Implemented Security Policies using ACL, Firewall, IPS/IDS, AAA (TACACS+, RADIUS).

Experience with automated MAC authentication bypass functionalities.

Acquaintance with field engineering such as cabling and troubleshooting hardware at data centers.

Experience working with various teams in the organization, supporting incident and change management, product assistance, implementation assistance, and solution audits and tune-ups.

Progressive experience in networking and network security including VoIP, VPNs, enterprise routing.

Enhanced level of experience with Layer 2 and Layer 3 networking configuration and troubleshooting.

Working on the migration of Cisco catalyst 4948 and 3750 with Arista 7280 and 7010.

Responsible for Checkpoint and Cisco ASA firewall administration across global networks.

Experience in Configuring, Monitoring, and Troubleshooting Cisco ASA 5500/PIX security appliance and failover DMZ zoning.

Help diagnose, resolve, and communicate advanced problems in Active Directory and Windows 2008/12 server

Experience working with Windows Server and LDAP for Encryption and Authentication.

Strong interpersonal, organizational communication, customer service & presentation skills.

Excellent at problem resolving, verbal & written communication and teamwork skills.

Certifications

Cisco Certified Network Associate – CCNA Routing and Switching (CSCO13629054)

Technical Skills:

Routing Protocols

OSPF, IGRP, EIGRP, RIP, MPLS, BGP, Multicasting.

Switches

CISCO 2900, 3750, 2950, 2934, 3500, 4500, 4900, 5000, 6500, 7500 Nexus 7k, 5k, 2k. Arista 7280, 7010.

Routers

CISCO 2500, 2600, 2800, 3000, 3600, 3601, 3640,3800, 3825 4000, 7200, 7500, 7600 Juniper M & T Series, Cisco CRS-1, CRS -3, GSR

Firewalls and Load Balancers

IPSEC, SSL VPN, F-5 BIGIP, Juniper net screen (500/5200), Juniper SRX (650/3600), Pix (500/525/535), ASA (5520/5550/5580)

Networking Technologies

LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP.

LAN Networks

Ethernet, Fast Ethernet, Gigabit Ethernet & 10 Gigabit Ethernet, VLAN routing, Inter-VLAN Routing, VTP, STP, RSTP.

Networking Hardware

Cisco Switches, Cisco Routers, Cisco ASA firewalls, Palo Alto Juniper routers, Nexus Switches.

Infrastructure services

DHCP, DNS, SMTP, FTP, TFTP

Monitoring tools

Cisco Works 2000, Wireshark, SNMP, TCP dump, Orion, Splunk

Operating Systems

Cisco IOS, IOS XR, Windows 7, Vista, XP, 2000,2003, LINUX,

Network Simulators

GNS3, Packet Tracer, Wireshark, Netflow Analyzer, Spirent

Documentation

MS Office, MS Visio, Netbrain

Ticketing Tool

REMEDYBMC, Service now and HP – Service Center/Service Manager, Heat

Language skills

C, Python, Bash, SQL

Professional Experience

AT&T, Middletown, New Jersey August 2021 — Present

Network Security Engineer

Plan, design, and troubleshoot local and wide area network infrastructure, including routers, switches, gateways, DNS servers, DHCP servers, clustering solutions, and related hardware, software, and services.

Assist in the administration of user access and privileges to applications/systems, ensuring that access requests are properly authorized, appropriately documented, and accurately fulfilled.

Performed LDAP interoperability testing. Setup a test-bed between different vendor devices in different subnets to test BGP, ACLs, service-policies, throughput etc

Worked with Spirent to test BFD, Throughput, simulate and advertise routes, send traffic etc

Configured and tested Cisco CRS, Juniper MX and Nexus routers. Worked with vendors to test the hardware present in our huge facility.

Worked with OSPF, BFD, BGP,NM( TACACS, SNMP, syslog, NTP, User groups etc) configuration and verifications.

Performed a IXC zone verification test

Ability to manage time and workload effectively which includes planning, organizing, and prioritizing with attention to details.

Exposure to excessive noise or adverse environmental issues.

Worked with shipping, installation of hardware and softwares, Firmware upgrades of X-leaf devices.

Performed clustering of loaded UFI boxes to form X-Leafs.

Troubleshoot our networks, firewalls, and other network equipment.

Experience collecting system logs and event data and performing engineering analysis to determine system security function, performance, and compliance.

Experience developing, configuring, and maintaining Linux and Windows Operating Systems (OS).

Installed and upgraded SMUs on various Cisco, Juniper devices according to the requirements.

Skilled in MPLS, LAN Switching, Data Center, troubleshooting, test, and validation experience.

Highly capable and dependable when managing logistics with vendors, hardware ordering, project deadlines, and people

Manage Network Implementation & Configuration (UFI, Cisco,HP and Dell hardware.

Created and maintained documentation and technical specification information as it relates to network configuration, network mapping, processes and service records.

Responsible for performing firewall vulnerability testing and reporting.

Assisted with training the support team for primary customer and reviewed the team's work for the replacement certificates.

Consistently exceeded performance goals and expectations, recognized for contributions to several major projects.

NVIDIA, Santa Clara, CA Oct 2020 — August 2021

Network Engineer

Responsibilities

Engage with new acquisitions to design network taps for their core data centers.

Create and manage VMWare virtual server environments to support various tools including Palo Alto, EIS, Rapid7, FireEye and Netbrain VMs that are deployed in new acquisition space.

Good at manage hosting plans for Azure Infrastructure, implementing and deploying workloads on Azure virtual machines (VMs)

Review existing Ixia network tap solution and recommend new solutions for network taps and network traffic discovery to support M&A integration agenda.

Review existing NetBrain network traffic analyzer and recommend new solutions for network discovery.

Good experience on Microsoft Azure. Created a Virtual Network on Windows Azure to connect all the servers.

Review existing Palo Alto virtual firewall solution and recommend new solutions for perimeter security.

Capacity planning of the cloud infrastructure in AWS.

Review existing internet network hub and recommend new solutions to meet enterprise security requirements.

Creating and managing endpoints using Azure Traffic Manager.

Implementing and troubleshooting (on-call) IPsec VPNs for various business lines (site-t-site and remote) and making sure everything is in place for both Palo alto firewalls and Juniper SRX firewalls

Co-ordinate with Project Managers of the work being done and stay on top of the deployment and cutover schedules.

Recommend efficient solutions to speed up the Ixia network tap solution deployment.

Co-ordinate and Collaborate with the Network Engineers on-site at Business Partner location on piecing together the information required for the deployment.

Troubleshooting as required during outages and device failures.

Documentation of all the changes made, information gathered and providing them during the hand-over to the Operations team.

Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configured and maintained IPSEC and SSL VPNs on Palo Alto Firewalls.

Implement new Meraki Security Appliance, like MX84, MX100 at the end offices of the Acquired Entities to replace their existing firewalls and route their traffic through Regional Hubs which has the head end like MX250 or MX400.

Configuring the various tools part of the Pathfinder kit and get it ready to be deployed based on the Customer’s requirements.

HMS, Irving, Texas Jan 2020 — Sep 2020

Network Security Engineer

Responsibilities

Responsible for designing, implementing, and maintaining network infrastructure, included but not limited to switches, routers, firewalls, load balancers and wireless.

Working on the Vulnerability management project, classifying the networking devices and providing an action plan on how to mitigate the vulnerabilities on that equipment.

Used Tenable Security Center, to perform regular scans on end user hosts to generate reports on vulnerabilities.

Implementing D/R (Disaster Recovery) strategies for the built AWS environment if there is an AWS region failover.

Managed conflicts performing threat assessments of alerts by continuous monitoring through SIEM tools (Splunk, LogRhythm) and IDS logs on assigned systems, and determined the severity of each alert that was issued.

Recently moved from CVSS score to VPR – Vulnerability Priority Rating (Tenable owned) which helped a lot on prioritizing the vulnerabilities and what to be patched.

Worked with Cisco Security Manager (CSM) to push access lists to firewalls. Upgraded firewalls and maintained CSM, scheduling regular backup jobs, security updates. For the rules on the Palo Alto NGFW, implemented zone based rules on it directly.

Part of the upgrade and validation of Internet Gateway Firewall – Juniper to version 6.3.. And then planned the migration from Juniper to Palo Alto 5280.

Developed an organized and systematic approach while providing cooperative assistance in configurations and restorations of networks and systems during the incidence response process

Worked on Legacy NAC to ISE migration.

Whitelisted device MAC address for access in ISE. Created profiles, endpoint groups and DACLs.

As part of the Vulnerability mitigation, I have upgraded the Palo Alto firewalls from version 6.1.21 to 7.1.18 and then to 7.1.23.

Worked on McAfee Web Gateway Proxy to bypass SSL proxies in order to provide restricted access.

Worked on the migration project from ClearQuest Rational to ServiceNow for processing firewall request.

Monitoring, reviewing and working on Incident tickets, Service Requests and Problem tickets in Remedy BMC.

Designed and built the new Campus environment. Installing, racking and configuring the routers, switches and firewalls. Configuring ISE authentication configuration on the switch-ports to get the end-users authenticated and authorized.

Upgraded and renewed the SSL certificates on the ACS servers and ISE servers- PANs, PSNs.

Migrated all the firewall access rules, NAT, PAT policies from old 5585 firewalls to the Next Gen Firewall which helped in Data Loss Prevention and decommissioned the old ones.

Migrated from the Legacy NAC to ISE2.3, Upgraded the existing ISE 2.1 to 2.3 and merged them to the new environment. Added extra Policy Service Nodes in High Availability in the new Campus.

Worked on Cisco Security Manager Upgrade from 4.16 to 4.17.

Successfully upgraded RSA Authentication Manager from 8.1 to 8.2 sp1.

Attended weekly incidence response meetings with security team.

AON solutions, Kansas City, Missouri Jan 2019 – Dec 2019

Network Engineer

Responsibilities

Constant monitoring of live logs of Endpoints in ISE to eliminate Fault positives. Worked with the security team on the migration of Firesight IPS, staging new server for the Firewpower Management Center in Vmware and re-imaging the SFR modules in the firewalls 5515, 5525 and 5585 pairs to the latest Cisco recommended version

Configured 7ks and ASA firewalls for the Datacenter Interconnect (DCI) during the merger of Fidelis Care and Centene.

Strong experience in the design and deployment of Public Cloud technologies (AWS)

Maintained documentation up to date on the FidelisCare Wiki page, added Knowledgebase articles and SOPs for future use.

Assisted the team in setting up an ACI lab with 3 APICs, Nexus 9396PQs serving as Spine and 9396PXs serving as leaf switches and a Netscaler load balancer. Worked with the Facilites team to secure the closet switches by configuring Biometric devices for all the rooms

Experience in operating and the configuration of Cisco Meraki, Cisco Catalyst, Palo Alto firewalls switches

Scheduled and Implemented OS upgrades of Cisco routers, switches and firewalls as needed.

Manage policy reports and maintain the compliance of all the devices using SolarWinds. Created scripts and job scheduling in SolarWinds to deploy the said configuration into the devices.

Experience using NetBrain to oversight, validate Network Changes and dynamically map traffic flows.

Worked extra hours as needed during the maintenance windows to upgrade software and apply patches to the network infrastructure.

Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.

Troubleshoot Site – Site IPSec tunnels, network connectivity, EIGRP issues, IP SLA issues among other duties.

Designed and configured the routing protocols, Local Area Network and Wireless Access points. Expert Hands On Experience in Cisco ACS & Cisco ISE for 802.1x, AAA Configurations.

Successfully Upgraded Aruba Airwave from AMP FIPS version 8.0.10 to FIPS Version 8.2.4.2

Configured Fabric Path to enable L2 routing in Datacenter which would help in providing Stability to F1 module line cards.

Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.

Responsible for simulating network operations with the usage of packet analyzer like Wire shark, and use to resolve tickets whenever there is an issue.

Hands-on experience with Ether Channel, Spanning Tree, Trunking, ACLs, Syslog. Experience in the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.

Proficiency in configuration of VLAN setup on various Cisco Routers and Switches

Implementing security policies using Cryptography, ACL, SDM, PIX Firewall, IPsec, VPN, and AAA Security on different series of routers.

Implement and manage IP network devices including routers, switches, & working with firewalls, and VoIP teams.

Responsible for using and managing IP Control system, and work with DHCP configuration team.

Using different types of Network Monitoring tools like Solar Winds, Wireshark, Netbrain,

Worked on Cisco Firewall ASA 5500(5510/5540) Series, Protocol Handling, Object Grouping and NAT.

Civic Plus, Manhattan, KS Jan 2018 – Dec 2018

Network Engineer

Responsibilities

Involved in the activity of DATA-Center migration of Cisco catalyst series 4900, 3750 switches with the new Arista 7280, 7010 with 10GE & 40GE interfaces.

As part of Data Center fabric remediation/refresh project, deployed Cisco Nexus switches and implemented features like FEX Links, VPC and VDC.

Designed and configured the routing protocols, Local Area Network and Wireless Access points. Expert Hands-on Experience in Cisco ACS & Cisco ISE for 802.1x, AAA Configurations.

Configured Fabric Path to enable L2 routing in Datacenter which would help in providing Stability to F1 module line cards.

Installed and configured Cisco Meraki (MX80, MX60) Appliance via Cisco Meraki MX400 Cloud.

Configured VSS on Cisco Catalyst 6509 switches in order to have redundancy and provided post-deployment support for issues.

Worked on T1/E1/T3 technologies and different LAN & WAN technologies and supported various LAN environments consisting of Cisco 6500 switches with Sup-720.

Designed and implemented Cisco 7500, 7200, 6500, 3600, 2600 Series routers in lab environment to reproduce various issues and test fixes for them.

Planned and implemented network designs, including WAN, LAN, MPLS.

Applied ACLs for Internet access to the servers using Cisco 5550 ASA firewall and performed NAT: static NAT, dynamic NAT, and dynamic NAT overloading.

Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls.

Implemented firewall policies on Cisco ASA.

Responsible for simulating network operations with the usage of packet analyzer like Wire shark, and use to resolve tickets whenever there is an issue.

Provided support in configuring and implementing Prefix-lists, Route-maps, and Ether-channels.

Hands-on experience with Ether Channel, Spanning Tree, Trunking, ACLs, Syslog. Experience in the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.

Proficiency in configuration of VLAN setup on various Cisco Routers and Switches

Troubleshooting of Cisco 2900, 3900, 6500, 7500, 7200 Series routers.

Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.

Implementing security policies using Cryptography, ACL, SDM, PIX Firewall, IPsec, VPN, and AAA Security on different series of routers.

Experience in implementing and configuring F5 Big-IP load balancers 6400-LTM (V9) and working with Blue Coat proxies.

Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.

Implement and manage IP network devices including routers, switches, & working with firewalls, and VoIP teams.

Responsible for using and managing IP Control system, and work with DHCP configuration team.

Using different types of Network Monitoring tools like Solar Winds, Wireshark.

Worked on Cisco Firewall ASA 5500(5510/5540) Series, Protocol Handling, Object Grouping and NAT.

Configuring IPSEC VPN (Site-Site to Remote Access), Negotiated VPN tunnels using IPSEC encryption standards and also configured and implemented site-to-site VPN, Remote VPN.

Sonata Software Ltd., Hyderabad, India April 2017 – Nov 2017

Network Engineer

Responsibilities

Responsible for implementing and staging firewall policy, rules, firewall objects over Cisco ASA firewalls.

Responsible for creating and maintaining access rules for all ASA firewalls through ITSM.

Installation and administration of Cisco ASA 5500 series firewalls, Cisco 6500, 3560, 4500, 2950, 2924 series switches, Cisco Router 7200, 3945, 3640, 2600, 2500 and Palo Alto Next Generation firewall.

Install and monitor application traffic using network protocol monitoring tools such as NTOP or Wireshark.

Supported the Designing team with the routing protocols and network design.

Create ACL on required firewalls or routers to grant access or decommission access through leadership approval upon LOB request.

Provide support to development team for the access to corporate network and outside world. Provide access to specific IP, Static NAT, Hide NAT, PAT, Port filter and port access.

Installing and configuring new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548 and Nexus 2k as per the requirement of the company

Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.

Acted as a third level support for Exchange and Active Directory end-user issues.

Researched, designed, and replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.

Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.

Designing, Implementing and Troubleshooting Cisco Routers and Switches using different routing protocols like RIP, OSPF, EIGRP, BGP, ISIS & MPLS L3 VPN, and VRF.

Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter Vlan routing, LAN security etc.

Involved in the DATA CENTER Implementation techniques and methodologies.

Installed and monitored extreme networks S-series, 7100 stackable switches and E4G-400, 1800 router to support VMware machines.

Worked closely with the RACF team in the installation of the program in the Z-VM and logging and authorization purposes.

Using various types of LAN Concepts like Port Channel, Ether Channel.

Working on security levels with RADIUS, TACACS+.

Convert Checkpoint VPN rules over to the Cisco ASA solution, Migration with both Checkpoint and Cisco ASA VPN.

Checking and configuring Cisco 7600 and 7200 routers at data center for remote sites’ issues.

Upgraded and updated Cisco IOS from 12.3T to 12.4. Used to DHCP to automatically assign reusable IP addresses to DHCP clients.

Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.

Experience working with design and deployment of MPLS Layer 3 VPN cloud, involving VRF, Route Distinguisher(RD), Route Target(RT), Label Distribution Protocol (LDP) & MP-BGP

Configured Ether-channels between Core layer and Distribution layer switches using Link Aggregation Control protocol (LACP) and to increase the link speed and provide redundancy for high availability.

Systel, Hyderabad, India April 2015- March 2017

Network Engineer

Responsibilities

Installed various branch Cisco devices including switches and routers. Compiled diagrams in Visio of the WAN and LAN infrastructure

Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE.

Work with static NAT, dynamic NAT, inside Global Address Overloading, TCP overload distribution, Overlapping Address Translation.

Worked on commissioning and decommissioning of the MPLS circuits for various field offices

Designing, Implementing and troubleshooting with BGP, OSPF, EIGRP routing protocols.

Expert level WLAN design work, being a subject matter expert with 802.11 concepts.

Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.

Hand on experience the configuration and implementation of various Cisco Routers and L2 Switches.

Troubleshot complex routing and switching issues in a HSRP and GLBP environment.

Used DHCP to assign reusable IP addresses to DHCP clients via IPAM.

Worked on larger projects, I was in charge of junior level personnel, overseeing new cabling and wireless access point placement. Well versed in multiple Cisco wireless LAN products including: Wireless Control System (WCS), Mobility Services Engine (MSE), 2700 Series Location Appliance, 5500 and 4400 Series Wireless LAN Controllers and lightweight access points, as well as legacy autonomous wireless LAN solutions.

Used Solarwinds network monitoring tool to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption

Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications.

Configured policy statements, and routing instances

Experience on Policy based IP routing

Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.

Hands on Experience with Cisco Wireless Controllers 5500’s and 2500’s and coming to access points, worked on 3700’s, 3500’s and 1142 access points.

Involved in the redistribution into OSPF on the core ASA firewall.

Involved in the removal of EIGRP from all devices and making OSPF the primary routing protocol.

Involved in the modification and removal (wherever necessary) of BGP from the MPLS routers.

Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system.

Tuned BGP internal and external peers with manipulation of attributes such as metric, origin and local Preference.

Worked on Security issues, VPN, IPsec, NAT, Configuration Standard and Extended Access Control Lists (ACLs) and Firewalls.

Implemented virtual Network Environment on VMware VSphere 4.1 and 5.5. Designed topologies to connect physical layer 2 and virtual layer 2 switches.

Upgraded the Cisco Secure ACS server from v5.2 to v5.3

Analyzed Network design to determine what were the major problems and improvements needed to be made to the network infrastructure.

Design, configuration and installation of Cisco routers and catalyst switches.

Supporting Development team for the access to corporate network and outside world. Providing access to specific IP, Port filter and port access

Experience in Cisco switches and routers: Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay)

Worked on A10 and F5 load balancing



Contact this candidate