Post Job Free
Sign in

Network Engineer

Location:
Atlanta, GA
Posted:
May 10, 2023

Contact this candidate

Resume:

Naitik Lad ************@*****.***

551-***-****

SUMMARY:

* ***** ** ********** ** routing, switching, firewall technologies, systems design, and administration and troubleshooting.

Exposure to LAN/WAN setup, installation, configuration and troubleshooting.

Completed above 100+ sites installation, fiber and upgrades with 3650 cisco catalyst switches.

Experienced AP designing using Planner mode in Air magnet, Ekahau and Cisco Prime planner.

Experience of routing protocols like EIGRP, OSPF, RIP, BGP and IP addressing,

Experienced in Troubleshooting for connectivity and hardware problems on Cisco Networks.

Experience in L2/L3 protocols like VLAN, STP, ISL, MPLS, DMVPN and Trunking protocols.

Good knowledge in WAN Technologies, ACL, NAT/ PAT, Ether Channel, IPSec and VPNs.

Enhanced level of knowledge with PPP, ATM, T1 /T3 Frame-Relay.

Expertise in implementation and troubleshooting of protocols such HSRP, VRRP, GLBP, ACL.

Extensive knowledge in different networking protocols DHCP, DNS, FTP, VOIP (SIP, H.323, MGCP)

Provisioned customer VOIP features on the Nortel voice Switches - DMS 250, 300 and 500.

Managed SD-WAN network using Versa and Viptela and implemented security through Versa.

Experienced AP designing using Planner mode in Air magnet, Ekahau and Cisco Prime planner.

Experienced in post survey using passive and active survey methods. Experienced in Cisco and Aruba wireless solutions. Importing floor plans, Aps and heatmaps in Cisco prime and Aruba Airwave.

Experienced in working with Aruba clear pass, Aruba AP & Aruba wireless controllers.

Developed deployment solutions for network technologies including Optical VoIP VPN SAN switching and routing, Avaya Definity G3, Cisco Unified Communication Manager, Dial plan configuration and routing, SIP, H232, PRI and WAN protocols.

Expertise in Wired and wireless technologies and also implementation of RF design and RF analysis.

Experience with Cisco UCS, Virtual Infra on VMware, Installation, Upgrades and Patching.

Experience with Cisco Prime applications and Cisco Controllers.

Hand-on implementation in Identity Service Engine (ISE).

Great experience in Cisco wireless LAN controller and Access points.

Deployed and configured Cisco FIREPOWER Management Center.

Designed and implemented frameworks to host products on Fire EYE cloud so that customers can update/download newly release products to their devices or data center.

Develop procedures and sustainability processes for the operations of Cisco AMP and Microsoft EndPoint Security Protection.

Administered and configured Avaya Cloud Service solutions for Unified Communication and Call Center capabilities.

Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability

Worked with monitoring tools such as: SolarWinds, VPM (Virtual Performance Manager), Wireshark and visio.

Proficient knowledge with IP phone and PBX technologies.

Worked on different signaling and media protocols such as SIP on UDP, SIP on TCP, Encrypted SIP

Familiar with managing cisco unified call managers, UNITY voicemail systems, H323 and SIP voice gateways.

Experience working with JUNOS OS on Juniper Routers and Switches

Extensive hands-on experience in Palo Alto, Juniper and Cisco network design, deployment and troubleshooting.

Responsible for Check Point and Cisco ASA firewall administration across global networks.

Remarkable experience in Cisco VoIP system solutions.

Hands-on experience with Cisco Unity, Jabber and contact center.

Extensive experience in System Testing with large scale solutions, including Avaya Call Center solution integration.

Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).

Experienced in Nexus technologies like VDC, VPC, fabric path, OTV in data center.

Experience in configuring VDC, VPC and FCOE, upgrading NXOS for Nexus Family Switches

Working knowledge on AAA technology with TACACS and RADIUS methods.

Enterprise experience with Nexus models like 7K, 5K, and 2K series.

Implementing security policies using ASA 55XX Firewall, IPS/IDS, AAA Security (TACACS+, RADIUS) on different series of routers.

OSPF, EIGRP, RIP, BGP,IS-IS, VTP, Telnet, SSH, CDP, LLDP, STP / RSTP, VLAN, Private

VLAN, HSRP, VRRP, NAT,PAT, Ether-Channel, ACL,WLC, Firewall, Cisco Routers, Wireless Access Point, L2 & L3 switches, ADSL Routers, Fiber, Port security, DHCP, DNS, TFTP, Syslog, Radius, and TACAS+ etc.

TECHNICAL SKILLS:

Security/Firewalls

Cisco ASA, Checkpoint, Palo Alto, Juniper SSG and SRX, IPSEC and SSL VPNs, IPS/IDS, DMZ Setup, CBAC, Cisco NAC, ACL, NAT,

PAT, RSA Secure IDIOS Firewall features, IOS Setup and Security features.

Features and Services

IOS and Features, NAT, SNMP, NTP, DHCP, CDP, DNS, TFTP and

FTP Management, AD.

Protocols

OSPF, BGP, EIGRP, RIP-2, HSRP, VRRP, GLBP, LACP, PAGP, DNS, SMTP, SNMP, FTP, TFTP, LPD/TDP, WLAN,

SIP,802.11/802.11e. Route Filtering, Redistribution, Summarization, Static Routing.

Switching

VLANs, VTP, STP, RSTP Inter VLAN routing and Multi-Layer Switching, Layer3 Switches, and Ether channels, Dot1Q, HSRP, GLBP, CEF, DCEF and Port Security.

Network Security

Check Point Nokia Firewalls IP350, IP550 & IP750, Juniper Netscreen, Fortinet, Firewalls ISG 1000/2000, Cisco PIX 505/515E/525 & ASA 5500 Series, ZSCALER

Network Products

CISCO ISR Routers 1900, 2900. CISCO High End Router 3600, 3800, 7200, 12010. Infoblox (4010/4020,2210,1410/1420)

CISCO Switches 1900, 2950, 2960. CISCO

Campus Switches 3550XL, 4984 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507.

LAN

Ethernet, Fast Ethernet, Gigabit Ethernet, Ten Gigabit Ethernet, LAN emulation.

WAN

Leased lines (PPP/HDLC), channelized links (E1/T1/E3/T3/DS1/DS3), Fiber Optic circuits (OS3), Frame relay, ISDN.

AAA Architecture

TACACS+, RADIUS, Cisco ACS.

Scripting Languages

Yaml, Python, shell, power, shell, Json,Ruby and Rails,

Bachelors in Computer Sci. From Northern University, IL (2011)

Master’s in Computer Sci. From Northern University, IL (2014)

HPE, Atlanta, GA

November 2020 – Present

Network Engineer

Responsibilities:

Experienced in installation, configuration and maintenance of Cisco Router, Catalyst Switches and Firewalls.

Configuration and maintenance of OSPF protocol which was the enterprise IGP. Configuration included deploying of new branch locations or new network devices in the existing infrastructure. Creating Stub Areas & configuring Summarization for effective Routing.

Support in collaboration tools using integrated voice, video and data structure.

Started as a Security Systems Engineer and was promoted to the Security SIEM Systems Engineer to take over as the lead SIEM Engineer.

Knowledge and Worked with networking tools such as Cisco - ISE, Cisco Prime, Wireshark and Solar winds.

Responsible for the delivery of Wireless Planning, Design, Implementation & Optimization Services to Cisco's major accounts.

Experience deploying and operating AWS, specifically VPC, EC2, RC2, S3, EBS, IAM, ELB, Cloud Formation and Cloud Watch using the AWS console and AWS CLI.

Managed User/Accounts, roles and attached policies using AWS IAM service.

Implement and support AWS Private Cloud implementation.

Worked on SD-WAN and managed using Viptela in encryption for security, enforced policies locally and from a central location.

NSG filter network traffic to and from Azure resources in an Azure virtual network.

Cloud implementation. Responsible for management, maintenance, and operations of Azure.

NGINX consistently beats Apache and other servers in benchmarks measuring web server performance.

NGINX efficiently handles tasks that might slow down your web server, such as negotiating SSL/TLS or compressing and caching content to improve performance.

Implemented and manage Cisco FirePower and Firepower management console.

Configured routing policies and service profiles for separate levels in an organizational hierarchy using Cisco Prime Network services controller virtual machine.

Experienced in installation, configuration and maintenance of Cisco Router, Catalyst Switches and Firewalls.

Responsible for management, maintenance, and operations of Cisco ISE. Integrated dynamic Authentication and Authorization to utilize PKI certificates as part of the Organization strategy.

Deployed Cisco ISE 1.2 with 8 nodes in deployment, initially in learning mode increasing methodically to 802.1x on wireless and wired.

Provide troubleshooting of Cisco switches in relation to ISE. Works with System Services on coordination of ISE with LDAP and AD for certificate-based Authentication and Authorization. Perform upgrades on ISE, Cisco switches and appropriate network equipment

Configuration and maintenance of OSPF protocol which was the enterprise IGP. Configuration included deploying of new branch locations or new network devices in the existing infrastructure. Creating Stub Areas & configuring Summarization for effective Routing.

Configured and hardened CISCO Nexus 7000 data center switches.

Configured Object Grouping, Protocol Handling and Code up gradation on ASA Firewalls.

Configuration the access-list rules, network object-service group based on well-known port the port i.e. FTP/SFTP, SSH, HTTPS/HTTPS (SSL) and etc

Hands on experience in configuring and supporting site-to-site and remote access Cisco, IPsec, VPN solutions using ASA/PIX firewalls, Cisco, B2B VPN client in addition to providing TACACS+ and RADIUS services.

Configure Cisco Identify Services Engine for various user profiles and for AAA (TACACS+) to authenticate users to access switches and routers.

Working on security levels with RADIUS, TACACS+.

Configuration of ACLs in Cisco 5540 series ASA firewall for Internet Access requests for servers in LAN and DMZ and also for special user requests as authorized by management.

Hands on experience with CISCO Nexus 7k, 5k, and 2k series equipment including configuration of protocols.

Forming network and service monitoring at an enterprise level with Cisco Prime Infrastructure.

Configure, deploy and administer Cisco Advanced Malware Protection (Cisco AMP) to approximately 12, 000 endpoints, including workstations and servers.

Planned product releases & stack ranked requirements based on effort estimates, defined in conjunction with the engineering team, for FireEYE appliances for the upcoming financial year

Implemented Aruba WLAN Infrastructure over Canada Remote site supporting Licenses assessment and site survey.

Configure all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale firewall deployments

Configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.

Involved in Installing and Configuring a Cisco secure ACS server for AAA authentication.

Excellent Hands on experience with Cisco ISE and the Migration of Wireless and TACACs to ISE.

Implement and produce the supporting documentation and diagrams for the installation of CISCO Nexus 7010, 5548 switches and 2232PP fabric extenders to replace legacy network hardware.

Performed upgrade on Cisco ISE from version 1.4 to version 2.0. After performing upgrade took advantage of TACACS and onboarded new network equipment into ISE instead of the unsupported Cisco ACS server.

Monitoring radius accounting Syslogs for the devices which are connected to Wireless network using CISCO ACS.

Troubleshooted and implemented ample of incident/change tickets in ITSM like Remedy and ServiceNow.

Hands on experience with CISCO Nexus 7k, 5k, and 2k series equipment including configuration of protocols.

Supported Infoblox Applinace grid environment for DNS, DHCP and IP Address Management tools (IPv4), for the state farm enterprises as IBCLI(infoblox command line interface).

Troubleshooting and configuration of Versa FlexVNFSD-WANappliances including Versa 100, 500 and 800 series Advantech devices via CLI, appliance context and Versa director contexts.

Managed WLAN environment with Aruba Networks gears mobility controllers deploying RAPs, IAP clustering for small offices and integration with HA Airwave solution to monitoring coverage’s.

Managing the changes through export/import of CSV spreadsheets on infoblox web interface.

System level monitoring on linux and infoblox appliances to watch process and services status like performance monitoring and tunning NFSSTAT etc.

Assisted with support of the following systems: Cisco (ISRs, IOS, ACS), Juniper (EX switches, SRX firewalls, Space).

Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers.

Experience with different Network Management Tools and Sniffers like Wireshark (ethereal), HP- Open view, RSA envision, and Cisco works to support 24 x 7 Network operation center.

Implemented and used SDM to configure Cisco IOS security features and network connection.

Configured and hardened CISCO Nexus 7000 data center switches.

Design, implement and provide second level support for host load-balancing solutions at SWA.

Mosaic, Lithia, Florida

October 2018 – November 2020

Network Engineer

Responsibilities:

•Troubleshoot IPSEC overlay connectivity from SD-WAN appliance to Versa SD-WAN controllers via Internet, MPLS and WBS transports.

•Deployment of Prisma Access (Palo Alto Cloud Solution)

• Prisma Cloud integration with QRadar and AWS for webhooks.

• Provisioning Prisma Cloud (Palo Alto).

•Working on Aruba Wireless LAN Implementation for 11n Infrastructure across the Corporate Network.

•Worked on escalations and activates new turn up for new clients and advance troubleshooting for the SD-WAN deployment in both ISP and Network infrastructure on both versa and Cisco Viptela SD-WAN Solution

•Continuous industry knowledge upgrade per the SD-WAN products, Cloud resources and firewall for enterprise and service provider to ensure SD-WAN clients/ISP expectations are met.

•Installation, configuration and troubleshooting of Cisco ASR 1k, ASR 9k series routers and Catalyst 6500, 3500 series switches.

Primary WAN Engineer configuring, maintaining, and implementing networking infrastructure solutions on a day to day basis. Also led WAN MPLS migration project from major ISP to new ISP.

Coordinate activities with vendors infoblox/F5/Cisco and other state ram services teams like network services, security, cloud services,wind inventory management etc.

Upgraded the core WAN routers from Cisco ISR 3800 to ASR 1001-X.

Deployed Cisco ISE as an internal enterprise NAC solution to enhance and centralize network policy management.

Implementing SNMP and AAA (Radius & TACACS) on various devices, allowing for Network management and access.

Handling Clients VPN connections establish new connections and troubleshoot.

Upgrade Versa components by automation and post configurations.

Implemented and configured Prisma Access & Panorama

Deployment of Prisma Access, Prisma Cloud.

Configured, monitored and troubleshoot Cisco's ASA 5500 security appliance Firewall, integrated firewalls with Gateway Anti-Virus and web filtering applications, like IDS.

Incorporated Cisco Nexus 9000 NXOS to ACI fabric to work in concert with existing Nexus 7000s and ASRs for MPLS.

Assisted with providing requirements for implementing SD-WAN across various State Parks.

Led WAN Ethernet upgrade project where various state parks were upgraded from a single T1 to an Ethernet circuit where availability permitted. If Ethernet was not available, we upgraded to a bonded T1 multilink in rural areas.

Experience with Meraki switches, access points and Meraki dashboard.

Utilizing secure access (VPN, SSH) and QoS to ensure client satisfaction.

Configured VLANs with 802.1q tagging, configured trunk groups, ether channels, and spanning tree for creating access/distribution and core layer switching architecture.

Monitored and identified capacity and performance issues for VoIP traffic to ensure uninterrupted operation of telephony systems.

Designed and deployed Clear Pass Policy Manager Policies - Aruba CPPM in order replace old architecture Cisco ACS for all Layer 2 and Layer 3 platform across Hotel and Casinos Data Centers.

Designed a secured wired network using Network Access Control (NAC) centered around a multi-site redundant solution with Cisco ISE and Windows Active Directory.

Specific responsibilities included handling AAA, LDAP and Linux based devices.

Configured 3850,3650,2960 switches and 1921,4321,4331,4451 routers

Maintained and Supported Multiprotocol Label Switching (MPLS) on WAN network.

Experience with Network Automation using Python.

Worked on reconfiguring BGP with new AS numbers over WAN connections that connect multiple locations.

Strong knowledge on leveraging advanced firewalls features like APP-ID, User-ID, Global Protect, Wild Fire, NAT policies and Security Profiles.

Implement the Global Protect VPN, IPSec VPNs and SSL VPNs through IKE and PKI on Palo Alto firewalls for site-to-site VPN Connectivity.

Cengage Learning, Mason, Ohio

August 2017- September 2018

Network Engineer

Responsibilities

Design, deployment and maintenance of enterprise networks, NOC and datacenters.

Configured, maintained, and troubleshot routers and switches ranging from the 2960 series through the 7200 series routers and the 2900 series through the 6500 series switches and ASR 1000 series routers in a redundant environment.

Improve scalability and ease of deployments of the Open stack underlay network by migrating from Standalone Nexus to Cisco ACI platform.

Used Cisco ACI Fabric which is based on Cisco Nexus 9k series switches and Cisco Application Virtual Switch (AVS).

Focused on working with Cisco Channel partners to build practices around Cisco ACI.

Scripted, Configured and Monitored the HP NNMI NMS system for different Network Alerts.

Hands on experience with F5 LTM installation/support and used HA proxy for Layer4 load balancing.

Configuring and managing F5Web Accelerator module and Application Security Module (ASM) technology.

Supporting EIGRP based network by resolving level 2 &3 problems of internal teams & external customers of all locations.

IOS up gradations on Switches and Routers, Migrated to SSH from telnet for more secure remote connections.

Configuring BGP, MPLS in Cisco IOS XR. Configuring Virtual Device Context in Nexus 7010.

Implemented VDC, VPC, VRF and OTV on the Nexus 5505 and 7009 switches.

Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, BGP, MPLS.

Worked on MPLS while ensuring secure networking, improving the network performance by prioritizing network traffic and allocating bandwidth according to usage and service requirements.

Responsible for Checkpoint and Palo Alto Firewall administration across our global networks.

Worked in migration of Cisco ASA & Checkpoint firewalls to Palo Alto firewalls using a migration tool.

Understanding different types of NAT on Cisco ASA & Checkpoint firewalls and applied them.

Configured routing protocols in relation to Checkpoint firewalls (61000 and 21400).

Configure the access policies and VPN policies in checkpoint firewall.

Upgrading Panorama to latest version for optimizing performance.

Performed network scans for security vulnerabilities and provide solutions and taking necessary actions for risk mitigation.

Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network

Implemented an IP telephone network with 200+ IP phones. Configured data network to support voice including VoIP VLAN, interVLAN routing and QoS tagging. Included 4 PCX system, voice mail server, my teamwork server and a management server. This project included 7 wireless AP and LAN bridging through a wireless link.

Configured all aspects of CUCM and Unity Connection including: SRST, MoH, TAPS, Extension Mobility, IPMA, etc.

Implementing SIP Trunking using CUBE router (CGI Group).

Configuration of Access List ACL (Std, Ext, Named) to allow users all over the company to access different applications and blocking others.

Configured Cisco 2702/3702I/E Access points, Bridges and 2504/5520 WLC’s and designed wireless networks accordingly in a harsh plant environment. (choosing suitable antennas for Moving equipment in the plant)

Worked on the security levels with RADIUS, TACACS+ and could establish secure identity management using Net IQ identity manager.

Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security.

Wireless Technology implementation, maintenance, and security (WEP 40bit, WPA2, AES). Management and configuration of wireless Cisco Wi-Fi hardware

Optimized wireless networks for Crane PLC’s in harsh/High noise environments by analyzing RF parameters (SNR, RSSI).

Hands on experience with Cisco Prime for configuration and real-time tracking of alarms in support of LAN and wireless networks

Create vPC domain, design double-sided vPC, design vPC peer-keep alive, vPC peer- link, and vPC member port, and configure single and dual home FEX.

Troubleshooting of DNS, DHCP and other IP conflict problems. Implementation of name resolution using WINS & DNS in TCP/IP environment

Maintained and Updated the HP open view map to reflect and changes made to any existing node/object

Used python scripts for generating network alerts and automation.

Python Automation scripting for Cisco IOS/IOSXR platforms.

Resolving and Closing tickets using IBM Service Now.

Handled SRST and implemented and configured the Gateways, Voice Gateways.

Manage Cisco Routers and troubleshoot layer1, layer2 and layer3 technologies for customer escalations

Worked on a broad range of topics such as routing and switching, dedicated voice access, planning and implementation, large-scale high-visibility outages, change management coordination, proactive monitoring and maintenance, disaster recovery exercises, and core network repairs.

Worked on Linux, Unix and windows platforms.

Gilead Sciences, Inc. Foster City, CA

March 2015 – July 2017

Network Engineer

Responsibilities:

Design, deployment and maintenance of enterprise networks and datacenters.

Worked extensively in configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.

Configured, maintained, and troubleshot routers and switches ranging from the 1720 series through the 7200 series routers,ASR 1000 series and the 2900 series through the 6500 series Catalyst switches in a highly redundant dual-homed environment.

Monitoring the NMS system for different Network Alerts.

Worked on multiple projects related to Branch networks, Campus networks, extranet clients and Data Center Environments involving in data center migrations from one data center to another.

Provisioning ports in Cisco ACI to support SAN, VoIP, and hypervisors.

Worked with other network engineers to deploy the Cisco ACI fabric.

Configuration of Cisco 6500 (sup 720), 4500 (SUP 6) & 3750 Catalyst Switches for network access. Worked extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) & ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.

Configuring RIP, OSPF and Static routing.

Configuration of F5 LTM 8950, 6900, VIPRION 2400 models.

Member of project involving transitioning all load balancing off Cisco Content Switches onto new F5 LTM hardware

Provide Tier III Level Load Balancer expertise onF5 Big IPLocal Traffic Managers (LTM). Designing F5 solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 Big IPLoad Balancers.

Provided load balancing towards access layer towards core layer using F5 load balancers and used SPOC for troubleshooting.

Hands on experience with F5 GTM/LTM installation/support and used HA proxy for Layer4 load balancing.

Performed Wireless RF Surveys for determining AP positions and Antenna directions/placements and setting RF parameters.

Configured Cisco Wireless Hardware (WEP, WPA2) and designed WLAN for business networks.

Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.

Once trouble ticket has been created keep customer informed of status of ticket and estimated time to repair.

Coordinating with service providers for WAN link outages.

Checking and configuring Cisco 7600 and 7200 routers at data center for remote sites’ issues.

Configuring RIP, OSPF and Static routing on Juniper M JunOS x 480 and MX series Routers

Juniper Net Screen Firewalls like NS50, SSG 550M, SSG520M, ISG 1000, ISG 2000, JCL with Site-Site VPN for client companies.

Working on Cisco 6509 and 4507 series switches for LAN requirements that include managing VLANs, Port Security and troubleshooting LAN issues.

Experience working with OTV & FCOE on the nexus between the datacenters.

Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for Datacenter access architecture.

Supporting EIGRP and BGP based network by resolving level 2 &3 problems of internal teams & external customers of all locations.

Upgrading WAN link using PPP Multilink and by implementing Cisco WAAS.

Performed switching technology administration including VLANs, inter-VLAN routing, Trunking, STP, RSTP, port aggregation & link negotiation.

Experience with converting campus WAN links from point to point to MPLS and to convert encryption

from IPsec/GRE Tunneling to another data center

Configuration of Access List ACL (Std, Ext, Named) to allow users all over the company to access different applications and blocking others.

Worked on Bluecoat proxy server, Tipping Point Intrusion Protection System management, and reporting tool Algosec

Responsible for Cisco ASA and Checkpoint firewall administration across our global networks.

Deployed both Zscaler and Cisco web security for multiple remote sites.

Troubleshooting network traffic and its diagnosis using tools like ping, trace route, Gigamon, Wireshark, TCP dump and Linux operating system servers.

Providing daily network support for national wide area network consisting of MPLS, VPN and point-to point site.

Worked extensively in configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.

Experience configuring Virtual Device Context in Nexus 7010.

Install and configure various VoIP systems at customer sites to include Cisco Callmanger, Unity Connections, CER and voice gateways.

Responding to alerts from various information security monitoring tools, including SIEM, IDS/IPS, WAF, DAM, log aggregators.

Reviewed possible replacements to corporate SIEM and IPS/IDS solutions and provided feedback and opinions

Designed QoS policies for critical applications based on business requirements and traffic patterns.

Responsibilities also include technical documentation of all upgrades done. Attending meetings and technical discussions related to current project.

Created VDC’s and vPC’S and ensure that those vPC’s are formed between those VPC’s.

Upgrading WAN link using PPP Multilink and by implementing Cisco WAAS.

Configuring HSRP between the 3845 router pairs for Gateway redundancy for the client desktops.

Configure VRRP & GLBP and VLAN Trunking 802.1Q, STP, Port Security on Catalyst 6500 switches.

Negotiate VPN tunnels using IPsec encryption standards and also configured and implemented site-to-site VPN, Remote VPN.

Change Requests, Resolving and Closing tickets using Altria Service Now



Contact this candidate