Raja G
Certified Network Engineer
Email: ***********@*****.***
Contact: 361-***-****
Professional Summary:
Around 5+ years of experience in designing, architecting, deploying and troubleshooting Network & Security infrastructure on routers.
Experience in deploying and troubleshooting Network & Security infrastructure on routers, switches (L2/L3) & firewalls of various vendor equipment.
Working Knowledge on Cisco IOS & basic Nexus (7K, 5K&2K).
Efficient designing experience in IP Addressing Scenario using VLSM and Sub netting.
Good at OSI Layers concepts.
Strong experience in layer-3 Routing and layer-2 Switching.
Experience with designing, building / rebuilding, administering, troubleshooting lab or data center network infrastructures (either spread L2 or standard L3 [spine / leaf] architectures)
Experience supporting a multi-vendor, multi-topology networking environment that includes Arista or Cisco equipment
Help to designs, develops, test and trouble-shoot variety of RF/Analog/Digital control circuitries depending on project needs
Design and implement Cisco ACI in datacenters, create a strategy that allows use of containers, cloud orchestration tools for end users and developers
Collaborate with application owners to define dependencies, map dependencies for better application workflow within ACI or public cloud use.
Experience with medium scale (hundreds of switches) IPv4/IPv6 topologies running BGP v4 and OSPF v2/v3
Excellent experience with Confidential ISE and the Migration of RADIUS and TACACS to ISE.
Experience with High Availability Design using MLAG / VPC / LACP / MST/PVST combined with VRRP/HSRP/ VARP
Experience with deploying, configuring, and troubleshooting firewall infrastructures (including NAT deployments)
Experience using scripting languages like Python, Ruby, Perl, bash
Experience supporting Windows environments (standard configuration, application of patches)
Knowledge of common application protocols like DNS, LDAP, NFS, SNMP, NTP
Experience in configuration, troubleshooting, and solving IP connectivity issues.
Experience in Layer 3 Routing protocol configurations: RIP, EIGRP, OSPF, MPLS, BGP.
Experience in design, implementation, support for L2 and L3 customer support.
Experience working with Nexus 7010, 5020, 2148, 2248 devices.
Strong knowledge of IP Address Management, and network services including DHCP and DNS.
Experience working with ACLs, VLANs, DHCP and DNS.
Hands-on experience with WAN network topologies and hardware Knowledge of caching technology, RADIUS and TACACS useful.
Strong knowledge in Cisco Routers, switches and IP Telephony products including Call Manager and other UC products.
Proficient in setting up IT infrastructure including wide area networks (WAN) local area networks (LAN), security management systems network device administration.
Technical Skills:
Cisco Routers
Cisco L2 & L3 Switches
(2500, 2600, 3600, 3800, 7200,7600)
(2900, 3560, 3750, 4500, 4900, 6500, Nexus 5K/7K/9K)
Firewalls
Forti-Gate 100F, 200E, 80E, Palo Alto 800 series, Cisco ASA, Checkpoint
OS products/Services
DNS, DHCP, Windows (2000/2003, XP), UNIX, LINUX.
Protocols/Services
Gateway Load Balancing
Routing Protocols (RIP v1 & v2, OSPF, EIGRP, BGP)
Certifications:
CCNA: Cisco Certified Network Associate
AWS Certified
Education
Campbellsville University, Louisville May 2021
Master of Science, IT GPA: 3.5
Texas A&M University, Kingsville May 2016
Master of Science, Electrical GPA: 3.41
RVR&JC College of Engineering, India May2014
Bachelors of Tech, Electrical GPA:3.7
Work Experience:
Client: Amazon, Austin, TX
Duration: Sep 2022 – Till Date
Role: Network Security Development Engineer
Responsibilities:
Lead the technical discussion with the customer to discuss the current/expected network design to
ensure, high availability, scalability, performance to the customer’s network.
Configure and troubleshoot HA Cluster Backup, Upgrade, Patch and Migrate Firewalls and
Systems
Responsible for driving vision and laying out roadmap for security technologies Responsible for developing overall strategy and implementing different security technologies including VPN audit security gap analysis and working with vendors to implementing desired security controls.
Assist in the administration of user access and privileges to applications/systems, ensuring that access requests are properly authorized, appropriately documented, and accurately fulfilled.
Troubleshoot user access issues, including determining cause and implementing resolution.
Assist in the implementation of logical user access policies, standards, and guidelines that balance business requirements, risk tolerance, and the client's policies.
Assist users and managers in their efforts to establish and maintain adequate audit trails so that sufficient evidence of computerized business activities exists to reconcile accounts, to detect frauds, to quickly resolve problems, and to otherwise maintain secure and reliable information systems.
Responsible for preforming firewall vulnerability testing and reporting.
Perform special projects and participates as a technical advisor for a variety of information security and logical user access projects that will be dictated by current business and technological developments.
Worked with Aruba WLAN infrastructure in large scale global deployments
Replaced aging Cisco ASA 5500-X series with next generation Palo Alto 5000 series appliances serving as firewalls and URL and application inspection in Panorama management tool
Responsible for the installation and configuration of the Palo Alto firewalls Troubleshooting and configuring PA 7050, PA 5060, PA 3060.
Created incident tickets with the Palo Alto Networks to troubleshoot and diagnose cases.
Implemented and Configured Palo Alto Networks Firewall models and centralized management system to manage large scale firewall deployments.
Designing, deploying and troubleshooting IP and wireless networks, which includes enterprise IP
networking, Aruba ClearPass, Aruba AirWave, and RF analysis
Experience with Cisco and/or Aruba Controller/AP configuration experience
Worked on AWS services like VPC, Direct Connect, Transit Gateways, VPN
Use CLI to configure Cisco ASA Firewall, and Cisco Meraki
Worked on PaloAlto FW S2S Virtual Private Network (VPN) for operating Network and Data
Center
Working experience with content load balancing F5, CSS.
Experience working with the following series/models – Catalyst 9300, Catalyst 9200, Meraki
switches (MS or MX).
Hands-on experience deploying Nexus 9000/7000/5000/3000 Data
Designed and built MDF/IDF rooms
Manage Palo alto, Cisco ASA and Fortinet policy and network.
Lead the technical discussion with the customer to discuss the current/expected network design to ensure, high availability, scalability, performance to the customer’s network.
Configure and troubleshoot HA Cluster Backup, Upgrade, Patch and Migrate Firewalls and Systems
Worked with Aruba WLAN infrastructure in large scale global deployments
Client: Dish Wireless, Littleton, CO
Duration: Mar 2022 – Aug 2022
Role: Network Engineer II
Responsibilities:
Lead the technical discussion with the customer to discuss the current/expected network design to
ensure, high availability, scalability, performance to the customer’s network.
Configure and troubleshoot HA Cluster Backup, Upgrade, Patch and Migrate Firewalls and
Systems
Worked with Aruba WLAN infrastructure in large scale global deployments
Designing, deploying and troubleshooting IP and wireless networks, which includes enterprise IP
networking, Aruba ClearPass, Aruba AirWave, and RF analysis
Experience with Cisco and/or Aruba Controller/AP configuration experience
Worked on AWS services like VPC, Direct Connect, Transit Gateways, VPN
Use CLI to configure Cisco ASA Firewall, and Cisco Meraki
Worked on PaloAlto FW S2S Virtual Private Network (VPN) for operating Network and Data
Center
Working experience with content load balancing F5, CSS.
Experience working with the following series/models – Catalyst 9300, Catalyst 9200, Meraki
switches (MS or MX).
Hands-on experience deploying Nexus 9000/7000/5000/3000 Data
Designed and built MDF/IDF rooms
Manage Palo alto, Cisco ASA and Fortinet policy and network.
Lead the technical discussion with the customer to discuss the current/expected network design to ensure, high availability, scalability, performance to the customer’s network.
Configure and troubleshoot HA Cluster Backup, Upgrade, Patch and Migrate Firewalls and Systems
Worked with Aruba WLAN infrastructure in large scale global deployments
Client: CATERPILLAR, Peoria, IL
Duration: Aug 2021 – Mar 2022
Role: Information Security Engineer
Responsibilities:
Experience with Forti-Gate, Cisco ASA, or Palo Alto firewalls
Experienced working with Nexus OS, IOS, Jun-OS and Nexus 9k, 7K, 5K & 2K Switches.
Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route summarization, route-feedback, BGP attributes) on Cisco routers 7613, 7201, and 3945e.
Firewall Troubleshooting and Support of multiple firewall and security vendor’s solutions, including Palo Alto and Forti-Gate Firewalls
Utilize Forti-Manager, Forti-Client and Forti-Analyzer to maintain and optimize Forti-Gate firewalls.
Experience with IT security devices such as F5 Load balancers, site to site VPN and Network IPS
Experience with web application firewalls (WAF) and strong knowledge of web application security, web-related protocols (HTTP, HTTP/2, SSL, Web-Sockets, etc.)
Deployed, configured, managed and implemented Juniper Firewalls SSG, SRX, NSM, and Juniper SSL VPN, LAN-LAN IPSEC VPN and Cisco IDS/IPS on high volume critical production environment.
Worked in Network security products such as checkpoint firewall, Palo Alto Firewall, Cisco ASA
Worked in F5 modules such as LTM, GTM (DNS)
Designed and built MDF/IDF rooms
Manage Palo alto, Cisco ASA and Fortinet policy and network.
Lead the technical discussion with the customer to discuss the current/expected network design to ensure, high availability, scalability, performance to the customer’s network.
Configure and troubleshoot HA Cluster Backup, Upgrade, Patch and Migrate Firewalls and Systems
Worked with Aruba WLAN infrastructure in large scale global deployments
Applied routing changes including BGP, OSPF, RIP, PIM, and EIGRP, which improved network/system performance by 40%
Client: Amazon
Duration: Sep 2020 – Aug 2021
Role: Support Engineer - Network
Responsibilities:
Experienced working with Nexus OS, IOS, Jun-OS and Nexus 9k, 7K & 4KSwitches.
Worked in migrating Cisco catalyst 4500 access switches to 9410 catalyst switches.
Created MCM's for the Replacement of Old hardware Agg switches, Access switch(SUP7), WLC, ASA and AP.
Troubleshoot networking, routing and inter-connectivity problems - including troubleshooting of network device hardware failures
Collaborate with internal teams to diagnose problems, and return devices/configurations to a healthy state
Escalate to external vendors (Cisco, Aruba, etc) to diagnose problems and facilitate part replacement
Working with business units to define feature need/wants within ACI and Open stack. Document procedures to implement new feature sets within classic and Clos fabrics.
Create ACI migration plans (brownfield) create L2/L3 transitions. Map traffic flows for EPGs and BDs. Handle drivers for ML2 and GBP OpenStack integrations
In corporate use of containers in ACI fabric using Contiv to ensure polices are applied at container level.
In corporate Cisco Nexus 9000 NXOS to ACI fabric to work in concert with existing Nexus 7000s and ASRs for MPLS
Designed ACI fabric to ensure each tenant is secured and has separation from other tenants. Use L3/L2 outs via common tenant to reduce TCAM and RAM utilizations
Working with stake holders to define features and recommend best practices
Work with ISPs to diagnose problems between local network and their infrastructure
Plan, deploy, scale and automate our network across multiple global datacenters. This includes existing footprints and greenfield locations
Updating network equipment to the latest firmware releases.
Maximizing network performance through ongoing monitoring and troubleshooting.
Configure and troubleshoot routing protocols like BGP and OSPF.
Experience with Cisco and/or Aruba Controller/AP configuration experience
Worked on AWS services like VPC, Direct Connect, Transit Gateways, VPN
Analyzing existing hardware, software, and networking systems.
Testing and troubleshooting installed Cisco Hardware.
Resolving technical issues with networks, hardware, and software.
Applying network security upgrades.
Upgrading/replacing hardware and software systems when required.
Creating and presenting networking reports.
Worked in Migrating of Aggregate switches from 4500 series to 9500 series switch.
Designed and built MDF/IDF rooms
Worked on upgrading the version of UPS, PDU and Netbotz.
Client: ICE Consulting, Milpitas, CA
Duration: Jan 2019 – Aug 2020
Role: Network Security Engineer
Responsibilities:
Experience with Forti-Gate, Cisco ASA, or Palo Alto firewalls
Experienced working with Nexus OS, IOS, Jun-OS and Nexus 9k, 7K, 5K & 2K Switches.
Responsible for configuration, maintenance, and troubleshooting of dynamic routing protocols: BGP, OSPF & EIGRP (route redistribution, distribute lists, route-maps, offset-lists, prefix lists, route summarization, route-feedback, BGP attributes) on Cisco routers 7613, 7201, and 3945e.
Firewall Troubleshooting and Support of multiple firewall and security vendor’s solutions, including Palo Alto and Forti-Gate Firewalls
Utilize Forti-Manager, Forti-Client and Forti-Analyzer to maintain and optimize Forti-Gate firewalls.
Experience with IT security devices such as F5 Load balancers, site to site VPN and Network IPS
Experience with web application firewalls (WAF) and strong knowledge of web application security, web-related protocols (HTTP, HTTP/2, SSL, Web-Sockets, etc.)
Deployed, configured, managed and implemented Juniper Firewalls SSG, SRX, NSM, and Juniper SSL VPN, LAN-LAN IPSEC VPN and Cisco IDS/IPS on high volume critical production environment.
Worked in Network security products such as checkpoint firewall, Palo Alto Firewall, Cisco ASA
Worked in F5 modules such as LTM, GTM (DNS)
Designed and built MDF/IDF rooms
Manage Palo alto, Cisco ASA and Fortinet policy and network.
Lead the technical discussion with the customer to discuss the current/expected network design to ensure, high availability, scalability, performance to the customer’s network.
Configure and troubleshoot HA Cluster Backup, Upgrade, Patch and Migrate Firewalls and Systems
Worked with Aruba WLAN infrastructure in large scale global deployments
Applied routing changes including BGP, OSPF, RIP, PIM, and EIGRP, which improved network/system performance by 40%
Involved in the troubleshooting aspects of complex network infrastructure using the routing protocols like EIGRP, OSPF & BGP.
Experience with Cisco and/or Aruba Controller/AP configuration experience
Worked on AWS services like VPC, Direct Connect, Transit Gateways, VPN
Hands-on experience deploying Nexus 9000/7000/5000/3000 Data Center switches, designing 10G core infrastructure consolidating/migrating Catalyst 6500's to Nexus 9000 platforms.
Configuring Cisco Catalyst 9K Switches for Dot1x authentication.
Worked on layer two and layer three concepts (CDP, LLDP, STP, VLANs, routing protocols, QoS, HSRP, BGP.)
Supported end user network cisco ACI infrastructure and trouble shot several implementations of LTM and APM configuration
Implementing BGP policies using communities, route-tagging, as-path filters, local-pref, MED etc.
Configuring features like Spanning-Tree, PortFast, UplinkFast, BackboneFast, VTP, VLANs, HSRP, CDP, LLDP, Port-Channel, VPCs, 802.1q Trunking, LACP, SNMP, NTP, SSH, NAT, QoS etc.
Environment: Cisco catalyst 2960 switches, Forti-Gate 80E, 100F, 200E, Palo alto PA-820, PA-500, Meraki MX-100, Meraki MX, MS series Switches, MR Access points, MV21 Camera Cisco ASA, Cisco Nexus9K, Arista 7160 series switches.
Client: Cisco Systems, San Jose, CA
Duration: Jan 2018– Jan 2019
Role: Network Test Engineer
Responsibilities:
Configured Routing protocols such as OSPF, EIGRP, static routing and policy-based routing.
Team member of Configuration of Cisco 7206 router with VPN and Configuration of Catalyst switches.
Configuration 7500, 7200 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
Create and test Cisco router and switching operations using OSPF routing protocol, ASA 5500 Firewalls, and MPLS switching for stable VPNs.
Troubleshooting the Network Routing protocols (BGP, EIGRP and RIP) during the Migrations and new client connections.
Good understanding of SDN and network virtualization techniques like Cisco ACI.
Experience managing Datacenter technologies such as Nexus switches or ACI.
Deploying and commission of core ASR 1K, Nexus 7K, 5K and its downstream devices
Experience configuring, installing and supporting SDN technologies like Cisco ACI a plus.
Working on smart view monitor get statistics for the checkpoint hardware/software CPU's, memories and overall health of the devices.
Configured and Implemented Confidential Identity Services Engine (ISE) with connectivity to Microsoft Active directory for Authentication including Certificate Based Authentication.
Deploying ISE Wired and Wireless Authentication, Authorization and Accounting.
IP addressing and design schemas for a variety of IP Pools using DHCP scope or local IP pools for NAC Controls.
Configure and deploy enterprise-class networks including the following products: Cisco Nexus 9k, 7k, 5k, 3k Switches, Cisco Catalyst Switches and Cisco ASR / ISR Routers.
Configure and troubleshoot routing protocols like BGP and OSPF.
Maintain the ACI fabric infrastructure.
The Next Generation Data Center project consists of planning and implementing new Cisco Firepower firewalls
Configured TCP/IP Ethernet interface, Created Virtual Router and Verify Network Connectivity
Managing different Firewalls and their security policies using Panorama M-100.
Environment: Cisco 3500/3550/4500/6500 switches and Cisco 2500/2600/3000/6500/7500/7200 routers, Cisco ASR 1000 series and 9000 series, Cisco ASA, Cisco Nexus7K/5K/2K, LAN, OSPF, BGP, RIP, EIGRP.
Client: Signature It, Fremont, CA
Duration: June 2016 – Dec 2017
Role: Entry Level Network Engineer
Responsibilities:
Racking and Stacking of Cisco 3750 Switches.
Work on different networking concepts and routing protocols like BGP, EIGRP, OSPF and other
LAN/WAN technologies.
Responsible for scripting, setting up and programming Checkpoint devices
Managed corporate Checkpoint Firewall implementing security rules and mitigating network
attacks
Experience in supporting optimization projects on radio network design & performance matters
Experience in radio network swap projects and optimization
Help to designs, develops, test and trouble-shoot variety of RF/Analog/Digital control circuitries
depending on project needs
Checkpoint firewall deployment at multiple sites with fine tuning
Review Firewall rule conflicts, unused rules and misconfiguration and clean up.
Provides support in the design, development, and testing of radio frequency (RF) and/or
microwave systems architecture, components, circuits or products. Efforts may include analog and
digital circuits or products, frequency synthesizers, amplifiers, transmitters and receivers, down
converters, frequency multipliers, digital logic, demodulators, Land Mobile Radio systems,
SATCOM, commercial communication systems, Wi-Fi, cellular, Tactical Communications, down
converters, filters, and antenna systems ranging from arrays to parabolic reflectors
Apply technical knowledge to analyze, investigate, and resolve assigned engineering problems in
the areas of Beyond Line Of Sight (BLOS) satellite datalinks and Line-Of-Sight (LOS) datalinks
for Unmanned Aerial System (UAS). Perform integration/testing with aircraft and ground control
stations for RF design, analysis, and IP networking over a RF environment
Deployed Site to Site and Client to Site VPNs utilizing Checkpoint Firewall-1/VPN-1
Experience in Configuration, Management, Deployment, Optimization and Troubleshooting
Checkpoint VSX
Systems support experience with Windows Server 2012/2016
Worked on NTFS/share permissions
Implemented VTP and Trunking protocols (802.1q and ISL) on 3560, 3750 and 4500series Cisco
Catalyst switches
Perform risk assessments and execute tests of data processing system to ensure functioning of data
processing activities and security measures
Developed detailed designs surrounding WAN/LAN architectures.
Experience with Active Directory.
Experience working with Global ServiceNow in an ITIL environment
Maintained redundancy on Cisco 2600, 2800 & 3600 series router, cisco catalyst switch 6500,
4500 and Nexus 5K & Nexus 7K switch with HSRP.
Environment: LAN, WAN, Subnetting, VLAN, Switches, Routers.