Post Job Free

Resume

Sign in

Network Engineer Data Center

Location:
Hyderabad, Telangana, India
Posted:
August 11, 2023

Contact this candidate

Resume:

Vamshi Yelagani

Sr. Network Engineer

Email: adyu3a@r.postjobfree.com

Ph No: 908-***-****

Professional Summary:

Over 10+ years of professional experience in Network engineering with Cisco Certified Network Engineer, performing Network analysis, design, Implementing, capacity planning with a focus on performance tuning and support of large Networks.

Strong knowledge in Cisco Routing, Switching and Security with Cisco hardware/software (heavy Cisco shop) experience.

Experience working on Cisco Catalyst Series3750, 4500, 4900, 6500; Nexus 2000, 5000, 6000 and 7000 series switches.

Extensive work experience with Cisco Routers, Cisco Switches, Load Balancers and Firewalls.

Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 2Kseries, Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches.

Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.

Experience working with Pulse secure VPN which includes Pulse connect secure MAG 360,4610 PSA 7000c.

Involved in troubleshooting of DNS, DHCP and other IP conflict problems.

Responsible for Juniper and Cisco ASA firewall administration across global networks.

Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.

Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability.

Configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240, SRX550)

In-depth knowledge on Routing Policies, Network Architecture, IP Subnetting, Multicast, VLSM, TCP/IP, NAT, DHCP, DNS.

Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.

Experience in Designing and assisting in deploying enterprise-wide Network Security and High Availability Solutions for ASA.

Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture Expertise in installing, configuring, and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200, EX4500, EX8200 series

Enterprise Routing experience using protocols RIP v1 & 2, EIGRP, OSPF and BGP

Expertise in installing, configuring, and troubleshooting Juniper Routers (E, J, M and T-series)

Implementing security policies using Cryptography, ACL, ASDM, IPsec, VPN, and AAA Security on different series of routers.

Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.

Experience with different Network Management Tools and Sniffers like Wireshark (ethereal), HP-Open view, RSA envision, and Cisco works to support 24 x 7 Network Operation Center.

Experience with F5 load balancers and Cisco load balancers (ACE and GSS).

Basic and advanced F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers.

Excellent customer management/resolution, problem solving, debugging skills and capable of quickly learning, effectively analyses results and implement and deliver solutions as an individual and as part of a team.

Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.

Knowledge of JUNOS platform and worked with JUNOS upgrade of Juniper devices.

Education:

Master’s in information technology from Valparaiso University, Indiana, USA.

Bachelor’s in Electronics & Communications Engineering from Arjun College of Technology & Science (ACTS), India.

Technical Skills:

Cisco Platforms

Nexus 7K, 5K, 2K & 1K, Cisco routers (7600,7200, 3900, 3600, 2800, 2600, 2500, 1800 series) & Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900 series), CSR/ASR, IOS-XR

Juniper Platforms

SRX, MX, EX Series Routers and Switches

Networking Concepts

Access-lists, Routing, Switching, Subnetting, Designing, CSU/DSU, IPSec, VLAN, VPN, WEP, WAP, MPLS, Multicast, Bluetooth, Wi-Fi

Firewall

ASA Firewall (5525/5510), SRX, Checkpoint, Palo

Network Tools

Solar Winds, SNMP, Cisco Works, Wireshark, Aletheia

Load Balancers

Cisco CSM, F5 Networks (Big-IP), Netscaler.

WAN technologies

Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 /T3 & SONET

LAN technologies

Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 802.1Q

Security Protocols

IKE, IPSEC, SSL-VPN

Networking Protocols

RIP, OSPF, EIGRP, BGP, STP, RSTP, VLANs, VTP, PAGP, LACP, MPLS, HSRP, VRRP, GLBP, TACACS+, Radius, AAA

Languages

Java, Python, HTML/DHTML

Operating System

Windows 7/XP, MAC OS X, Windows Server 2008/2003, Linux, Unix

Professional Experience:

Charter Communications, Denver, CO Feb 2022 – till date

Sr. Network Engineer

Responsibilities:

·Involved in network Architecture, design, configuration, implementation, maintenance and troubleshooting in a multi-vendor environment.

·Involved in the day-to-day operations work which includes critical troubleshooting tickets for network impairments, critical break fixes, LOR's, etc.

·Upgraded ASR 9k's manually and using Cisco BPA tool (Automation tool) In a high availability environment.

·Involved in the designing and deployment for migrating F5 load balancers from the old 5000 series to the new i7000 series.

·Upgraded F5 devices organization wide from older firmware version to the latest approved versions as per the organization's requirement.

·Experienced in creating Virtual Servers, Nodes, Pools, I apps and I rules on BIG-IP F5 in LTM module. Maintained organization wide F5 LTM and GTM devices.

·Involved in implementing Big-IQ F5 centralized management to add all the F5 LTM and GTM devices for centralized management of the devices.

·Maintained organizations wide firewalls which include Cisco ASA’s and SRX. This included creating Access Control lists, creating access groups, creating and troubleshooting S2S VPN tunnels, NAT, PAT, troubleshooting, etc. as per the requirements.

·Involved in migration of Cisco 4900 switches to Nexus 9800 series switches.

·Was part of upgrading more than 1500 nexus 5k and 7k series devices without any downtime.

·Was part of the team in designing, configuring, and maintaining two data center HA implementation for four Pulse devices from scratch using Citrix Load balancers and Citrix GSLB.

·Experience in maintaining Palo Alto Global Protect SSL VPN.

·Used Splunk to investigate different issues related to access issues, routing issues, etc.

·Hands on experience using Splunk, Aletheia, Solar Wind etc. for log monitoring, device management and deployments on large number of devices at the same time.

·Hands-on experience working with different ticketing tools like Cherwell, Service now, Jira etc.

·Experience working Infoblox for Ip address management. Reserving IP and Subnets.

·Experience working with Microsoft authentication manager.

Environment: ASR 9K series, Nexus 2k, 5k, 7k and 9k. F5 LTM and GTM 5020 and i7800. Cisco ASA 5506, 5585 etc. Splunk, Aletheia ACL’s, Remote VPN (SSL), NAT, PAT, Site-to-Site VPN.

Sutter Health, Sacramento, CA Feb 2020 – Jan 2022

Sr. Network Security Engineer

Responsibilities:

·Involved in network security Architecture, design, configuration, implementation, maintenance and troubleshooting in a multi-vendor environment.

·Involved in the designing and deployment of new ASA firewalls for new locations from scratch with NIST cyber security compliance.

·Maintained organizations wide firewalls which include Cisco ASA’s, FTD, FXOS and Palo Alto.

·Maintained Cisco ASA in multi-context mode using CSM which are used as DMZ firewalls. Which include creating new contexts, creating new sub interfaces, and assigning them to contexts, configuring interfaces, creating Access Control lists, creating access groups etc. as per the requirements.

·Upgraded all the Cisco firewalls from lower versions to 9.6 Image without causing any down time.

·Took the Responsibility of designing, implementing, maintaining and troubleshooting organization wide Remote Access VPN with Juniper’s Pulse connect secure.

·Worked on Pulse connect secure with MFA Authentication Manager for multifactor authentication using soft tokens.

·Was part of the project moving the networks from Fabric Path to Cisco ACI (Application Centric infrastructure.

·Expert in Troubleshooting issues related to Site-to-Site VPN’s, remote VPN’s, ACL’s, latency, asynchronous routing etc. on ASA firewalls using various inbuilt and other log monitoring tools like Splunk.

·Upgraded Pulse connects secure hardware on PSA 3000 and PSA7000f from 8.3R7.2 to 9.0R1 with very minimal down time using active/passive and active/active configurations.

·Was port of the design implementation and maintaining Pulse connect secure environment both Test and Prod. This includes upgrading the Pulse secure devices at one data center in active/passive mode and configuring them as Active/Active devices as per the requirement due to increase in number of users because of Covid.

·Was part of the team in designing, configuring, and maintaining two data center HA implementation for four Pulse devices from scratch using Citrix Load balancers and Citrix GSLB.

·Testing and troubleshooting F5 BIGIP LTM load balancing for test environment in process of migrating from Citrix to F5 environment.

·Successfully implemented load balancing for Pulse Secure using F5 LTM and GMT to distribute the traffic between two datacenters.

·Single handedly maintained organization wide remote access VPN using Pulse Connect secure.

·Used Splunk to investigate different access issues related to firewalls access, VPN connection issues (SSL)

·Worked on creating policies, troubleshooting access issues monitoring and maintaining Cisco Firepower FMC

·version 6.0.0 and newer.

·Hands on experience using Splunk, SolarWinds Orion, etc. for log monitoring, device management and deployments on large number of devices at the same time.

·Hands-on experience working with different ticketing tools like Cherwell, Service now, etc.

·Experience working Infoblox for Ip address management. Reserving IP and Subnets.

·Experience working with Microsoft authentication manager.

Environment: Cisco ASA 5506,5507,5585. Pulse Secure PSA 3000 PSA 7000F. Microsoft Authentication manager. Splunk. Cisco Firepower FMC series appliances. Firewalls. windows server 2003/2008, Linux. ACL’s, Remote VPN (SSL), NAT, PAT, Site-to-Site VPN.

Bridgestone Americas, Nashville, TN Jul 2018 – Jan 2020

Sr. Security Analyst / Network Security Engineer

Responsibilities:

·Involved in network security Architecture, design, configuration, implementation, maintenance and troubleshooting in a multi-vendor environment.

·Involved in the designing and deployment of new ASA firewalls for new locations from scratch with NIST cyber security compliance.

·Maintained organizations wide firewalls which include Cisco ASA’s, McAfee Sidewinder’s, and Palo Alto.

·Configured and maintained Cisco ASA 5585 in multi-context mode. Which include creating new contexts, creating new sub interfaces, and assigning them to contexts, configuring interfaces, creating Access Control lists, creating access groups etc. as per the requirements.

·Upgraded all the Cisco firewalls from lower versions to 9.6 Image without causing any down time.

·Took the Responsibility of designing, implementing, maintaining, and troubleshooting organization wide Remote Access VPN with Juniper’s Pulse connect secure.

·Integrated Pulse connect secure with RSA Authentication Manager for multifactor authentication using soft tokens and On Demand Authentication.

·Expert in Troubleshooting issues related to Site-to-Site VPN’s, remote VPN’s, ACL’s, latency, asynchronous routing etc. on ASA and Palo Alto firewalls using various inbuilt and other log monitoring tools like Splunk.

·Upgraded Pulse connects secure hardware from SM360 to PSA7000c in two locations which are standalone without any down time.

·Upgraded Pulse connects secure firmware from 8.2R to 9.0R on two devices (PSA7000c), and from 8.2R7 to 8.3R7 on MAG4610’s.

·Single handedly maintained organization wide remote access VPN using Pulse Connect secure.

·Used Splunk to investigate different threats from all the network and security devices to determine actual threats and malware infections on endpoints.

·Experience managing enterprise class Citrix F5 for Web Hosting. Creating Irules, Virtual servers, Pools, Nodes with health, Profiles, SNAT, SSL, NAT, Traffic Policies and QoS

·Maintained Firepower Appliance 7100’s using Firepower Management center 4500. Worked on configuring the interfaces inline pairs to monitor and block malicious traffic.

·Reviewed and documented all the work done for future reference and created Knowledge base articles for future employees to refer.

·Hands on experience using Splunk, SolarWinds Orion, Zabbix etc. for log monitoring, device management and deployments on large number of devices at the same time.

·Experience working with RSA authentication manager 8.3 for user account creation, setting up user pin, assigning and distributing software and hardware tokens and creating different administrator roles and assigning administrators.

·Part of the deployment in configuring, testing and deploying of Cisco Umbrella in various locations to granularly monitor and restrict user traffic to external websites.

Environment: Cisco ASA 5506,5507,5585. Pulse Secure MAG 360, 4610 PSA 7000c. RSA Authentication manager 8.3. Splunk. Cisco Firepower FMC 7000 series, 4110 series appliances. F5 LTM, GTM. Palo Alto Firewalls. windows server 2003/2008, Linux. ACL’s, Remote VPN (SSL), NAT, PAT, Site-to-Site VPN.

G&K Services, Minnetonka, MN Dec 2016 – Jun 2018

Sr. Network Engineer/ Admin

Responsibilities:

·Worked in an environment which has more than 200 locations in USA and Canada with over 2000 network devices which includes CISCO switches, routers, firewalls, wireless controllers, access points, etc. Checkpoint firewalls, VPN client, Symbol wireless controllers and AP’s etc.

·Involved in complete LAN, WAN development (including IP address, installation, configuration, testing, maintenance).

·Replaced cisco 2960x and 2960s switch stack with Catalyst 3750 in a multi VLAN environment in the process of upgrading Datacenter equipment.

·Experience with monitoring tools like SolarWinds, Cisco Prime and learnt new organization owned monitoring tool within days. Responsible to Create and maintain a record of all SolarWinds reports (Monthly, quarterly).

·Implemented Cisco AP's (Access Points) for specific locations designated for corporate as well as plant and branch locations. Configured and Managed organization’s wireless infrastructure which include 5520,8500 series WLC and over 1500 AP’s. And upgraded more than 400 APs from 3502 to 3702.

·Worked with Datacenter switches which include nexus 5k’s and 9k’s in installation and configuration. Experience with a wide range of switches 2950’s, 2960’s, 3650’s, 3750’s, Nexus 5k, 7k, FEX, etc. Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus.

·Headed a project of testing, planning, implementing upgrades to over 1500 switches in various locations with very less down time.

·Configuring and troubleshooting F5 BIGIP LTM load balancing and implementing, Creating Irules, Virtual servers, Pools, Nodes with health, Profiles, SNAT, SSL, NAT, Traffic Policies and QoS.

·Load Balancing Engineer with hands-on experience with F5 Big IP GTM and LTM. This highly dynamic position will interact with application teams to create a load balancing solution unique to their application requirements.

·Experience with hosting SSL certificates on F5 platform, F5 Big IP GTM Wide IP configuration. Experience managing enterprise class Citrix NetScaler and F5 for Web Hosting.

·Experience working with DMVN, OSPF, BGP, MPLS in present project. Configured Cisco Wireless access points.

·Experience working with Cisco routers 819, 1921, 1941, 2811, 2921, 2951, 4431, ISR 1002, etc. Experience in configuring and troubleshooting OSPF, EIGRP, BGP, Access Control Lists HSRP, etc.

·Tested, implemented, verified, and upgraded over 150 routers (2921) to a proper CISCO verified IOS versions. Deploy Cisco ISE on Nexus 5000/7000 routers, Cisco switches, and Cisco ASA. Intergrade Cisco ISE with Cisco Fire POWER to enable automated remediation.

·Upgrade Cisco 6500-E, 3560, and 2960 switches to IOS software that is on the ISE compatibility matrix Was part of a team of two for implementing, maintaining, and troubleshooting “Wide Area Application Services” (UCSE and SRE) on all the 2921’s and 2951’s within the organization.

·Experience in Creating, Maintaining, and troubleshooting WAAS modules in WAAS Central Manager. Experience is setting up, maintaining, and troubleshooting VPN tunnels (Site to Site and Remote) on Cisco ASA 5525’s. Configuration and Support of Checkpoint (NGX R65, R70 and R71), Cisco Firewalls (ASA 5505, 5506-X, 5585).

·Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.

·Experience in Upgrading Active-Active and Active standby setup of ASA firewalls both through ASDM and CLI.

·Experience in creating, maintaining, and troubleshooting VPN on Cisco ASA and Checkpoint Firewalls. Experience in working with different vendors for raising tickets, escalating issues with ISP’s, coordinating with different levels of vendors to ensure the issue is resolved, etc.

·24/7 On call support for organization wide network issues and conducted many off-hour deployments to minimize the effect of down time.

Environment: Cisco 3560/3750/3550/3500/2960 6500 switches and Cisco: 819/1921/1941/2921/2951/4431/2811 routers, Cisco Nexus 7K/5K, Cisco ASA 500, Arista, ASR1K, CRS-1/4/8, Checkpoint, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP

New Century Health, Miramar, FL Sep 2014 – Nov 2016

Sr. Network Engineer

Responsibilities:

·Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.). Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trunking, STP, Inter Vlan routing, LAN security etc.

·Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.

·Possess good experience in configuring and troubleshooting WAN technologies like MPLS, T1, T3, DS3 and ISDN. Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment. Monitoring the network traffic with the help of Qradar and Cisco IPS event viewer.

·Managing and implementation of PORs (port open requests) based on the requirements of various departments and business lines. Implementing and troubleshooting (on-call) IPsec VPNs for various business lines and making sure everything is in place.

·Installing and configuring new Cisco equipment including Cisco catalyst switches 6500, Nexus 7010, Nexus 5548, and Nexus 2k as per the requirement of the Organization. Worked as a part of data center deployment where we converted from Cisco 6500 to Nexus.

·Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018 Experience with configuring FCOE using Cisco nexus 5548. Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices. Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration.

·Configuring & managing around 500+ Network &Security Devices that includes Juniper SRX Firewalls, F5 Big IP Load balancers and Nexus Devices. Managed Streaming NetScaler ADC architectures in a complex infrastructure.

·Designed, implemented, and managed Citrix NetScaler Load balancers. Implement and manage Citrix NetScaler Integrated Caching requests. Experience with Firewall Administration, Rule Analysis, Rule Modification

·Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms. Cisco ISE implementation for Guest access with Cisco Wireless Controllers using EOIP guest wireless services. Responsible for Cisco ASA firewall administration across the network. Setup simplified and traditional VPN communities, and Cisco Any connect, Support customer with the configuration and maintenance of ASA firewall systems.

·Creating Virtual Servers, Nodes, Pools, I apps and I rules on BIG-IP F5 in LTM module. Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS).

·Experienced in implementing and managing F5 BIG-IP load balancing, including GTM, APM, and custom iRule development. 24x7 on-call escalation support as part of the security operations team.

·Working configuration of new VLANs and extension of existing VLANs on/to the necessary equipment to have connectivity between two different data centers. Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs. Adding and removing checkpoint firewall policies based on the various project requirements.

·Implementing IPsec and GRE tunnels in VPN technology. Supporting project test teams in analyzing the bandwidth utilization. Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design. Designed, configured, implemented site-site VPN on Cisco ASA 5500 firewall.

Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960 6500 switches and Cisco 3640/12000/7200/ 3845/3600/2800 routers, Cisco Nexus 7K/5K, Cisco ASA 500, Arista, ASR1K, CRS-1/4/8, Checkpoint, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP.

General Electric, India July 2013 – Aug 2014

Network Engineer

Responsibilities:

·Provided estimated bandwidth requirements for data replication, to best determine adequate timing for migration service levels. Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalysts. Switches. Replace branch hardware with new 2851 routers and 2960 switches.

·Implemented Cisco Wireless Access Points and WLC’s at various corporate sites fort 11n Infrastructure and its legacy technologies. Experience in working with Cisco Nexus 5000 series switches for data center.

·Configured OSPF on CISCO devices with multiple routing processes and redistributed them. Tested and hands on experience in multi area OSPF topologies. Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.

·Assisted in network engineering efforts consistent with the infrastructure of an Internet Service Provider and support of such network services. Helped in designing and implementation of VLAN for the new users.

·Installation and Configuration of various types of Personal Computers and Printers. Installation of different operating systems on Intel based PC's.

·Installed Hard disks, Floppy drives, CD Drives, Sound Blaster cards, CPU, Memory, Power supply unit, Network card, Video graphics card, Hard disk controller card on PC systems. Troubleshooting of personal computers. Online Support to customers concerning their computer problems.

·Configuring, managing, and troubleshooting networks using routing protocols like RIP, EIGRP and OSPF (Single Area and Multi Area). Assisted with troubleshooting all network issues with routers and switches when necessary and consulted with on call tech as needed for client. Monitor, troubleshoot, test and resolve Frame Relay, ATM, MLPPP, PPP, and Dial-up.

·Configuring/Troubleshoot issues with the following types of routers Cisco (7200, 6500, 4500, 1700, 2600 and 3500 series), to include: bridging, switching, routing, Ethernet, NAT, and DHCP, as well as assisting with customer LAN /MAN, router/firewalls. Wrote IOS and CAT OS upgrade procedures and Pre/Post checks for customer production upgrades. Excellent Troubleshooting Skills and Customer Centric approach.

·Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550. Configuring Vlan’s, VTP’s, enabling trunks between switches.



Contact this candidate