Post Job Free

Resume

Sign in

Network Engineer Security

Location:
St. Louis, MO
Posted:
September 11, 2023

Contact this candidate

Resume:

JAMES EDWARDS

Contact #: 615-***-****

Email: adzmhq@r.postjobfree.com

SUMMARY:-

Iam a Cisco Certified Network Administrator, F5 load balancer and Firewall Specialist with over 30 years total IT experience specializing in network support and security. I provided remote and onsite day to day firewall/VPN support for over 30 customer environments including Cisco PIX/ASA, Juniper Netscreen, and Checkpoint. I handled the implementation and operations of firewall management systems and integrated logs and performed analysis pertains to Advanced Threat Protection. I performed and reviewed firewall policy, workflow and system settings following established change process. He assisted in the development of DLP alerts and IPS alerts to maximize information value from each system. I administered over 100 Netscreen firewalls using Netscreen Security Manager and worked with DNS, WINS, DHCP and networking protocols such as TCP/IP. Experience and proficiency working with the cutting edge of the networking world through deploying all high end level platforms of networking equipment, specializing in Nexus/MDS, ASR 1000 and 9000 platforms. I possess excellent communication and analytical skills.

Servers:

Lotus Domino, Exchange 2003, HPDL360 G2, G3, G5, HP DL380, Dell, Compaq

Hardware:

Cisco routers (2, 3, 5, and 7 series) and Cisco Catalyst switches (1900s to 7600s), citrix wanscalers, netscalers, shunra enterprise network appliance, i Afterpath console server 16-32-48 ports, Routers, Switches, Bridges, Hubs, PC’s, Cabling, CRT, POS machines (card USA)

Routers and switches:

Metro Ethernet Routing Switch (MERS 8600 and various ESU flavors),

MPE9500 multi service switch (Nortel’s edge routing platform), Nortel SER5500 (Shasta Broadband service node), Cisco 7500 and GSR, Nexus 5000 and Nexus 7000 switches, Juniper M Series (M40,M20, M7i), Juniper

TECHNICAL SKILLS:

Jseries 4300 enterprise routers

Traditional Class 5 Switches: Nortel Networks' DMS 100

Softswitches: Nortel CVX 1800 SS7 Signaling Gateway (CSG), Nortel Communication

Server 2K/3K (CS2K/CS3K), Lucent Softswitch

Media Gateways:

CVX 1800 multi-service access switch, Lucent TNT Media Gateway

Firewalls:

Cisco PIX 501, 506, 515, 525, Astaro 6.1, Checkpoint FW-1

Software/Email:

Word, Excel, PowerPoint, Access, Frontpage, WordPerfect, Lotus 1-2-3, Quattro Pro, Flash, DB IV, SAS, MarkIV, C++, Visual Basic, Lotus Notes,

CCMail, Active Directory/Exchange, MS Vizio TCL/Tk, HTML

Protocols/ Misc:

TCP/IP,SPX, IPX, IPSec, PPTP, VOIP, RIP, IGRP, OSPF, EIGRP, BGP, OSPFP, ISIS, PPPoE, PPPoA, L2TP, RADIUS, Layer 2 VPNs (VPWS and

Psedowires over PBT) and Layer 3 VPNs (RFC 2547)

Network Monitoring Tools:

Kaseya ( Courtesy Computers), Solarwinds, PCAnywhere, SMS, Cisco Works 2000, Syslog,

SNMP, HP Open View, Web trends, WebSense Spirent’s Test Center, Smartbits and Adtech AX4000 protocol and traffic testers, IXIA 1600T,

Ethereal/Wireshark packet analyzers, Spectra INET and Telesoft

Technologies' Triton SS7 protocol analyzers, Ameritec Crescendo Bulk call generator and Hammer/Empirix SledgeHammer traffic generators

Telephony/Wireless:

POTS, ISDN, X.25, Frame Relay, ATM, SMDS, T1, T3, xDSL, Dial-up modem, Cable modem, Terrestrial wireless, Satellite wireless, SONET, telecom circuits from DS-O through OC-3, IP telephony, softswitches, PSTN gateways, SS7, QoS, SIP, H.323, and MGCP over a range of broadband, PBX, VOIP SoftSwitch/Call controller with Media gateway topologies as well as traditional circuit switching call-processing using PRI

and SS7 signaling (ISUP and MTP) on Ulticom OMNI SS7 stack, RAS, pen, MGCP/SDP and SIP supported Voice over IP (VoIP) DSLAM

January 2020 – Present(contract)

PROFESSIONAL EXPERIENCE:

St. Louis

Sr. Network Engineer

Tech Mahindra Inc. (Barnes Jewish Community)

1.Maintain networks for several enterprise hospitals

2.Work with netscalers for load balancing

3.Work with citrix for VPN so home users can connect

4.Netscout SME

5.Troubleshoot all network related issues

6.Work with outside vendors

7.Order equipment

8.Work in a team environment

9.Travel to many hospitals

10.Work with wireless system (Prime)

11.Prepare reports for management

12.Mentor junior engineers

13.In Azure worked on creating and monitoring systems alert dashboards, reviewing critical event and system logs, accessing customer instances that underpin their production databases and performing server administration duties including performance troubleshooting.

January 2019 – January 2020(contract)

Herndon VA 20170

Sr. Network Engineer

Tech Mahindra Inc. (Exostar Inc.)

1.Palo Alto-

a.Managed 18 devices

b.Changed and created policies

c.Cleanup and created objects

d.Updated licenses

e.Monitored traffic

f.Created users

g.Monitored active and passive devices

h.Created tunnels

i.Monitored threats

j.Checked blocked activity

k.Monitored content filter

l.Monitored network activity

F5 Load balancer

2.Palo Alto-

a.Managed 18 devices

b.Changed and created policies

c.Cleanup and created objects

d.Updated licenses

e.Monitored traffic

f.Created users

g.Monitored active and passive devices

h.Created tunnels

i.Monitored threats

j.Checked blocked activity

k.Monitored content filter

l.Monitored network activity

3.F5 Load balancer

a.Created Web application firewall (WAF)

b.Put policies in learning mode

c.Put policies in blocking mode

d.Created good and bad file types

e.Created good and bad URL’s

f.Managed attack signatures

g.Created and managed policies

h.Managed IRules

i.Created and managed pools

j.Created and managed nodes

k.Created virtual server lists

l.Managed logs

4.Nexxus 09.0

a.Managed and configure

b.Created vlans

c.Created port channels

5.Panarama

a.Monitored and configured policies

b.Administered and created objects

c.Updated licenses

d.Administered device deployment

6.NSX

a.Implement firewall and load balancers to help traffic flow

b.Prevent east west traffic in the event of intrusion

7.Jira

a.Used this ticketing system

8.VRF

1. Configured VLANS for each network interface. If necessary, both network and VLAN interfaces are combined with Ethernet bundled interfaces. The characteristics of each of these interface types are assigned to a virtual router.

April 2018 – June 2018 (3 month contract)

Boca Raton, FL

Network Engineer

Kyra Solutions Inc. (Florida Turnpike)

1. Identified network traffic by application, user, or the source/destination and treat it differently 2. Configured traffic around last-mile congestion on connections to the Cloud.

3.Establish the number and type of network elements, applications and users.

4.Compare the baseline to the production network to evaluate improved or degraded performance.

5.Implement vmware NSX with a Palo Alto Panamera management console.

6.Monitored network with solarwinds

SD-WAN:

1.Supported connections through hybrid links (including MPLS, Internet, and LTE links).

2.Supported dynamic path adjustment for load balancing of traffic across WAN connections.

3.Simplified management and service provisioning, and enables zero touch provisioning (ZTP) of branch networks as easy as home Wi-Fi networks.

4.Supported virtual private networks (VPNs) and other value-added services (VASs), such as WAN optimization controllers (WOCs) and firewalls.

April 2017 – March 2018 (9 month contract)

Columbus, OH,

Network Engineer

Management Consulting Group (GAP Inc.)

1.Worked with design implementation and operational experience with Enterprise/carrier-class routers and switches (Juniper and Cisco preferred).

2.Worked with design, implementation and operational experience in Palo Alto Firewall and Juniper SRX

3.Worked with Load Balancers; preferably F5

4.Experience in network security features (ACLs, VPN, L2VPN, L3VPN, IPSEC, GRE) with a focus on Cisco and Juniper

5.Worked with operational familiarity on BGP, OSPF, and other network routing protocols.

6.Worked with Cisco/Meraki wireless

7.Worked with network tools such as Nagios, Solarwinds and flow analytics.

8.An understanding and implementation of network traffic analysis, remote access methods and systems, stateful inspection firewalls, (ASA) encryption, authentication and authorization technology

Understand the rigors of operating a global, 24x7x365 large scale network, and act as a tiered support for high-severity and business impacting issues.

January 2017 – March 2017 (3 month contract)

Columbus, OH

Network Engineer NSC Global

Switch refresh and added GNAC (Global Network Access Center) Remote access

Connect to various sites and make the changes

Communicate with client and explain changes

Develop and maintain all changes through the change request process. Aruba wireless network maintenance.

March 2016 – December 2016 (9 month Contract)

Columbus, OH

Network Engineer

Cognizant Technologies Services

July 2015 – September 2015 (3 month contract)

Nashville TN

Network Engineer

CHS (Community Health Systems)

Project experience connecting rural hospitals to corporate network through SMARTS system. IP configuration and NOC experience with ticket system for trouble shooting.

Experience configuring servers with RAID controllers

Worked with various systems management applications and application platforms such as; Enterprise Virus Protection, Back-up exec 10d, and systems monitoring solutions (Kaseya)

Used my written and verbal skills to document everything that was done to a client in connectwise Worked with DNS, WINS, DHCP and networking protocols such as TCP/IP

April 2014 – April 2015 (12 month contract)

Chattanooga, TN

Network Engineer/Firewall Specialist

CHI (Catholic Health Initiative)

Project experience in deploying, configuring, and managing large and complex networks for widely diverse and large enterprises. Leverages extensive knowledge of Cisco and Microsoft devices to create robust, scalable, highly available and secure wired and wireless infrastructure and architecture.

Specialties:

-Cisco Networking: - Routing & Switching

-Network Engineering: - WAN Migrations, Network refreshes, Network Designs

-Windows Networking: - Windows Server 2008 & 2003 network infrastructure and services

-Experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 7K, 5K, 2K series, Cisco router models like 7200, 3800, 3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series switches

Technical Skills:-

-Routing: - EIGRP, OSPF, BGP, RIP, Static and Default Routing, NAT, Load Balancing, Circuit provisioning, Route Redistribution, MLPPP, PPP, ACL, Inter-VLAN routing

0s 5000 and Nexus 7000 switches, 802.1q, SVI, HSRP, VRRP, VTP, 802.11a/b/g

-Security: - 802.1x, GRE and IPSec tunnels, Cisco ASA 5510 Firewall Palo Alto checkpoint, F5 load balancers

-Protocols: - TCP/IP, HTTP, FTP, TFTP, ARP, ICMP, CSMA/CD, CSMA/CD, DNS, DHCP, NTP, SNMP

-Tools: - MS Visio, Wireshark, HPNA

-Operating systems: - IOS, XOS, CAT OS - CommVault backup system

May 2013 – December 2013 (6 month contract)

Nashville TN

Network Engineer/Firewall Specialist

HCA (Hospital Corporations of America)

Responsible for the delivery of global network security in support of key business operations

Worked within a multiple disciplined global security team in support of network security and operations

Responsible for the daily monitoring and maintenance of enterprise network security systems and the ability to work with Legal, Privacy, Global Information Protection Assurance and Security, Incident Response and Networking professionals

Responsible for the implementation and operations of firewall management systems

Integrated logs and performed analysis pertains to Advanced Threat Protection

Assisted in the development of DLP alerts and IPS alerts to maximize information value from each system Recommended and implemented hardware OS and security application updates

Performed and reviewed Firewall policy, workflow and system settings following established change process

Worked with DNS, WINS, DHCP and networking protocols such as TCP/IP

Telecommunications Network Security Team as a Network Security Specialist specializing in Firewall Security - specifically with CISCO ASA and checkpoint firewalls.

Responsible for the delivery of global network security in support of key business operations. Work within a multiple disciplined global security team in support of network security and operations. Primary responsibilities are for the daily monitoring and maintenance of enterprise network security systems and the ability to work with Legal, Privacy, Global Information Protection Assurance & Security, Incident Response and Networking professionals.

Other responsibilities include the implementation and operations of firewall management systems, integrating logs and performing analysis that pertain Advanced Threat Protection, assisting in the development of DLP alerts and IPS alerts to maximize information value from each system, recommending and implementing hardware OS and security application updates, and performing and reviewing Firewall policy, workflow and system settings following established change process.

December 2012 – March 2013 Techzilla, Margate, FL

Tier 3 Advanced Tech Support

Handled more complex problems and calls

Responded to inquiries from their organization’s computer users and may run automatic diagnostics programs to resolve problems

Installed, modified, cleaned, and repaired computer hardware and software

Wrote training manuals and trained computer users on how to use new computer hardware and software

Oversaw the daily performance of the company’s computer systems and evaluate how useful software programs are

Documented and communicated problems, solutions, and the implementation process in a clear and concise manner

Created contingency plans, following the organization's format and procedures Worked with DNS, WINS, DHCP and networking protocols such as TCP/IP

Firewall Security - specifically with CISCO ASA and checkpoint firewalls.

February 2012 – May 2012

BoomTech, Inc., Boca Raton, FL

Network Engineer

Provide remote day to day firewall/VPN support for over 30 customer environments, which spans across multiple firewall platforms, including Cisco PIX/ASA, Juniper Netscreen, and Checkpoint.

Performed daily administration of over 100 Netscreen firewalls using NSM (Netscreen Security Manager)

Responsible for configuration, implementation, and problem determination across the major firewall platforms and understanding each customer environment at a detailed level. Responsibilities include rule implementations, VPN setups, upgrades, new builds.

Configured routers (Cisco Catalyst, Nexus), switches (HP) and firewalls (Astaro) Nexus 7000 switches, Cisco 5010, 5020, 6513

Experience configuring servers with RAID controllers

Worked with various systems management applications and application platforms such as; Enterprise Virus Protection, Back-up exec 10d, and systems monitoring solutions (Kaseya)

Used my written and verbal skills to document everything that was done to a client in connectwise Worked with DNS, WINS, DHCP and networking protocols such as TCP/IP

Used scripting when configuring logon scripts (C++, VB) Worked with Citrix, Exchange 5.5, Exchange 2000/2003

Performed daily routine consisted of integrating and supporting NT/W2K/W2K3 servers in a large environment (100 or more servers) onsite and remotely.

Installed and configured server2008 with hyper V to handle email and applications

Used shell scripting to make automation a part of daily routine

Worked with SONET, telecom circuits from DS-O through OC-3

January 2009 – February 2012

Safetrust Financial, Fort Lauderdale, FL Information Technology Manager

Managed IT and telephony operations for Armored Knight Technology including call center, vendor relationships, technical support, application development, financial monitoring and disaster recovery planning

Managed operating budget and direct activities of 20+ staff

Improved productivity and reduced costs through improved uses of technology

Utilized methodologies and collaborated with department managers to analyze and document process and system workflows

Authored plan to improve software development process, consolidate/upgrade servers and establish consistent hardware/ software standards to eliminate unstable, highly mixed operating environment

Installed redundant servers and increased line capacity. Implemented change control and process documentation for all aspects of the business including new software and telephony upgrades

Deployed hardware monitoring system including multi-tiered paging alerts of system issues Initiated Knowledge Repository to store all documentation in centralized location

Consolidated and stabilized servers improving hardware uptime from 70% to 99% Reduced software downtime from 50% to <2%

Implemented using a NAS server for system wide backups

Implemented rigorous development and testing processes decreasing software defects by 60% Slashed manual processes by 50% with resultant reduction in overhead costs

Reanalyzed network traffic, eliminated unnecessary routing and equipment and reduced costs by 33%

Completed migration of all servers from RedHat Linux to Microsoft Server 08 with hyper V

Implemented Centralized system for Corporate Quality Assurance group to monitor call center activity decreasing call rejection rate by 5%.

Configured the SONET controller

Configured and maintained Cisco Identity Services Engine (ISE) is an identity-based network access control and policy enforcement system. ISE allows a network administrator to centrally control access policies for wired and wireless endpoints based on information gathered via RADIUS messages passed between the device and the ISE node, also known as profiling.

To add an APS group with a specified number and enters APS group

Configuration mode. Created a protect channel for the APS group, where 0 designates a

Protect channel. Created an active channel for the APS group, where 1 designates an

Active channel.

Installed Windows 2003/2008 and managed multiple servers

Performed Active Directory management used to maintain security in the domain

Handled VMware Esx 3.x/4.x –used to access development servers

Performed Citrix Administration—Used for virtual access Handled Exchange 2003--- Current mail server

Handled Active Directory Group Policies—used to keep users from changing backgrounds on desktops Handled Microsoft Office 2007 Professional—Daily use

Handled SharePoint 2003, 2007 and Windows Sharepoint Services-Installed and administered server 204.10.157.170

Provided systems administration services for DSL Broadband Operations server and network systems

Worked with Layer l & Layer ll networking devices as well as Linux/Unix Server systems in providing Internet, IPTV and Transparent Ethernet services

Firewall Security - specifically with CISCO ASA, Fortinet and checkpoint firewalls.

Provided end user technical assistance for PC & LAN services to Naval personnel on a Windows network domain

Responsible for the implementation and upkeep of network ready PC clones for rapid deployment and trouble resolution and the reorganization and implementation of ADP equipment inventory systems

Worked with DNS, WINS, DHCP and networking protocols such as TCP/IP

Configure and support F5 load balancers, Barracuda Spam Firewall Monitor network with Solarwinds Orion

June 2008 – December 2009

Apex Systems Inc., Miami, FL Network Analyst

Consulted with users and evaluate requirements, recommend designs, provide cost analyses, plan projects, and coordinate tasks for installation of data networks

Analyzed and resolved technical problems for established networks

Planned, tested, recommended, and implemented network, file server, mainframe, and workstation hardware and software

Provided network documentation, training, and guidance to computing system clients and programmers. Acted as technical specialist in network problems and emergencies.

Troubleshoot and resolve network production problems

Conducted technical research on network upgrades and components to determine feasibility, cost, time required, and compatibility with current system

Recommended network solutions for short-, medium-, and long-range network projects

Installed, configured and maintained network components

Determined plan layout for new hardware or modifications to existing layout

Installed, upgraded, and configured network printing, directory structures, user access, security, software, and file services.

Established user profiles, user environments, directories, and security for networks being installed

Firewall Security - specifically with CISCO ASA and checkpoint firewalls.

Worked as a team member with other technical staff, such as systems to ensure connectivity and compatibility between systems.

Worked with vendors to resolve complex network problems

Maintained confidentiality with regard to the information being processed, stored or accessed by the network

Handled SONET, telecom circuits from DS-O through OC-3

Configured, maintained and troubleshot existing network infrastructure at first data center consisting of: Cisco 12000 series routers; Cisco Catalyst 6500 and 3550 series switches in routed mode; Hewlett-Packard 2600 series switches. Design, implement, maintain and troubleshoot network infrastructure at second data center consisting of: Cisco Catalyst 6500 switches in routed mode and Cisco Catalyst 2950 switches in switched mode. Maintain internal and external routing protocols, EIGRP and BGP respectively. Balancing outbound traffic using BGP route maps over AT&T, MCI and Savvis OC-12 and Level3 OC-48 lines Configure and support F5 load balancers

Troubleshot a wide variety of customer server issues such as applications not running properly, Dealing with traffic floods (DDoS), design solutions to help customers scale applications and firewall rules

Handled Telecommunication equipment, design/drawing (Visio), implementation, upgrades, support (Level

1/2/3), router configurations (Cisco 1601, 2600, 3400), switch configuration (Cisco Catalyst 2900XL, 6500CORE). Installation of Cat3/5/6E multi-pair cables

Worked with DNS, WINS, DHCP and networking protocols such as TCP/IP

April 2008 – June 2008 CardUSA, Miami, FL

Network Engineer

January 2008 – April 2008

Online Technologies, Deerfield Beach, FL Director of Technology

August 2007 – October 2007

Citrix, Ft. Lauderdale, FL Sr. Network Engineer

May 2007 – August 2007

Cross Country Home Warranty, Ft. Lauderdale, FL Sr. Network Engineer

January 2007 – April 2007

Cal-Am Properties Inc., Orange County, CA Sr. Systems Engineer

January 2006 – September 2006

Courtesy Computers Inc., Davie, FL Network Engineer

March 2005 – September 2007

The Computer Merchant, Norwell, MA Network Engineer (On Call)

March 2004 – September 2007 Tek Source, Tampa, FL

Field Technician (On Call)

PREVIOUS PROFESSIONAL EXPERIENCE:

(Details will be provided upon request)

The Answer Group, North Lauderdale, FL 09/2002 –

12/2003

Technical Support Engineer

Miami Beach Hispanic Community Center, Miami Beach, FL 12/2001 – 08/2002

Network Administrator

Miami-Dade Community College, Miami, FL 08/2000 – 12/2001

Information Specialist

Siegfried Rivera Lerner Et Al, Coral Gables, FL 03/1999 –

08/2000

Network Administrator

Provision Technologies, Pittsburgh, PA 1997 – 1999

Network Engineer

AMP Inc., Harrisburg, PA 1995 – 1997

Network Engineer

Commonwealth of PA, Harrisburg, PA 1990 – 1995

Systems Maintenance Group Manager

EDUCATION:

BS in Network Management, DeVry University, Ft Lauderdale, FL (not completed)

BS in Information Technology, American Intercontinental University, Plantation, FL 2004 AS in Computer Information Services, Miami-Dade Community College, Miami, FL 2002 Masters of Human Services, Lincoln University, Lincoln, PA 1997

BS in International Relations, George Mason University, Fairfax, VA 1983

CERTIFICATIONS:

Microsoft Certified Systems Engineer

Cisco Certified Network Administrator

CISSP (currently achieving)



Contact this candidate