VIJENDER
Email: **********@*****.***
SUMMARY:
Having around 10+ years of experience in Network domain. CCNP certified engineer with experience in routing and switching technologies, system design, implementation and troubleshooting of complex network systems including high-end routers: Cisco ASR series; 1921, 1941, 2900, ISR 4461, NCS 520, and Catalyst 2960, 3560, 3650, 3750, 3850, 4500, 9200, 9300 and 6500 switches and Fortinet’s Firewall.
Hands on experience of data center environment and implementation of VPC, VDC and Fabric path on Nexus 7K, 5K, & 2K Switches.
Working experience on various firewalls of different vendors which include Palo Alto PA-5220, PA220 &Panorama, Fortinet and Cisco ASA 5585-X.
Having good hands-on experience in working with monitoring and managing the nodes within the network using Network monitoring tools like SolarWinds Orion NPM.
Given support for RADIUS and TACACS+ servers for network device access control.
Implemented Cisco ISE for delivering consistent, highly secure access control across wired and wireless multivendor networks and remote VPN connections.
Understanding of Wireless authentication methods including 802.1x., EAP, RADIUS, LDAP and Active Directory
Experience with different Network Management Tools and Sniffers like Wireshark, HP-Open view, RSA envision, and Cisco works to support 24 x 7 Network Operation Center.
Hands on experience in troubleshooting and deploying of various IP Routing Protocols like EIGRP, OSPF & BGP.
Implemented security policies using ACL, Firewall, IPsec, GRE tunneling, VPN, AAA Security TACACS+, and Radius on different series of routers.
Created MOP’s for different network tasks in the environment.
We use juniper MIST to boost the network performance.
Ability to manage all phases of network installation and administration.
Experience using Python scripting to automate basic networking tasks
Experience with Change management, Project documentation & implementing and maintaining network monitoring systems and experience with developing network design documentation and adept in preparing Technical Documentation, MOPS and presentations using Microsoft VISIO/Office.
Excellent skills to implement VLANS, private VLANS, Voice VLANS, Installing VOIP capable wares, Port security, dot1x, STP and RSTP (802.1W), standard and extended access lists for managing access-based security, creating root views for administrative privileges.
Extensive knowledge of deploying & troubleshooting TCP/IP, Implementing IPv6, Transition from IPv4 to IPv6, Multilayer Switching, UDP, Fast Ethernet, Gigabit Ethernet, Voice/Data Integration techniques.
Well organized, Self-starter, Quick learner, Self-Motivated, Team player with analytical, technical and communication skills.
TECHNICAL SKILLS:
Routing Technology
RIPV1, RIPV2, IGRP, EIGRP, IS-IS, OSPF, BGP.
Network Products
CISCO Routers 1921, 1941, 2900, ISR 4461, NCS 520. CISCO Catalyst Switches 2960, 3560, 3650, 3750, 3850, 9200, 9300 and ASR 1k, 9k Core Catalyst 4503, 4507 RE, 6500/6503/6507, Nexus 2K, 5K, 7K series
Cloud Platforms
AWS (VPC, Direct Connect), Azure (ExpressRoute, Virtual WAN), Google Cloud (Interconnect, Cloud VPN)
Security & VPN
Cisco ASA 5580,5585-X Firepower, Palo-Alto PA 5220, Cisco Any connect-VPN, Global Protect-VPN, ACL-Access Control List, IPS/IDS, NAT, PAT, Cisco ISE, Fortigate.
LAN Technology
IEEE 802.11, Token Ring, Ethernet, Workgroup, Domain, HSRP, DNS, Static, VLAN, STP, VTP, Ether Channel, Trunks.
WAN Infrastructure
Leased Line, ISDN/Dial-Up, Metro Ethernet, MPLS
WAN Technologies
DM-VPN, GET-VPN, VPN, IPsec-VPN.
Wireless & Wi-Fi
CISCO Wireless Access Points 1142, 1242, 3702I, 3702E and 1572 external, Cisco WLAN controller 5508 and 5520, Cisco Unified Wireless Deployment.
Operating Systems & Tools
Cisco IOS, Cat-OS, Windows 2000/2003/2008 Server, Windows XP/Windows 7/8,10, Active Directory, NX-OS, PAN-OS
Load balancers
F5 Big IP LTM - Viprion 2000 series,3000 series, Citrix Netscaler MPX series
Management tools
SNMP, Syslog, Sniffer, Netflow, and Wire shark, Cisco Prime, Solar winds Orion, NetBrain
Cable Management
Cat 6,5e,5, Single/Multi Mode Fiber (1G, 10G), Fiber Connector types SC, LC, FC, CWDM/DWDM Fiber Multiplexers.
EDUCATION:
Masters in computer science from Northwestern Polytechnic University.
Bachelors in computer science from JNTU.
CERTIFICATION:
Cisco Certified Specialist - Enterprise Advanced Infrastructure Implementation.
PROFESSIONAL EXPERIENCE:
Huntington Bank - Columbus, OH March 2023 – Till Now
Role: Sr Cloud Network Engineer
Responsibilities:
Designed, deployed, and optimized secure and scalable cloud network infrastructures across AWS, Azure, and Google Cloud platforms.
Developed hybrid and multi-cloud network architectures to ensure seamless integration with on-premises environments.
Developed and maintained Information Security Management Plans (ISMP) in accordance with FISMA guidelines.
Collaborated with third-party assessors (3PAOs) for security assessments and audit preparations under FedRAMP.
Configured virtual private networks (VPNs), subnets, and network access control lists (NACLs) for enhanced security and performance.
Create all required technical documentation in accordance with Huntington's Change Control and project management processes and procedures.
Designed and implemented scalable, high-performance enterprise network infrastructures, ensuring seamless communication across global locations.
Architected network solutions for hybrid cloud environments (public/private), integrating with on-premises systems to optimize connectivity.
Configure and maintain all Palo Alto Networks Firewall models (PA-3k, PA-5k & PA-7k) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.
Replacing of faulty Palo alto firewalls with new RMA and troubleshooting of critical and priority issues.
Performed software upgrades of palo alto firewalls to keep the firewall environment up to date versions to reduce the security vulnerability risk and compliance.
Provided application-level redundancy and accessibility by deploying F5 load balancers long-term memory.
Configure and troubleshooting of F5 load balancers & performed SSL certificate renewals.
Working with vendors like Palo alto, F5, Cisco to find the root cause of the issues and recommendations for major and critical issues.
Performed cisco catalyst 9K switch software upgrades and RMA replacements for fault switches, configured and installed stack switches for new deployments.
Provided end to end support for major and critical issues related to palo alto and F5 load balancers.
Automated network configurations and deployments using Infrastructure as Code (IaC) tools like Terraform, Ansible, or CloudFormation.
Monitored and optimized network performance using tools such as CloudWatch, Azure Monitor, and DataDog.
Reduced cloud networking costs by implementing bandwidth management and optimizing inter-region data transfer.
Scheduled and Implemented change records using service-now tool and documented evidences pre and post implementation.
Worked on different monitoring tools like NDL, Zenoss.
Maintains current knowledge of hardware, software and network technology and recommends modifications as required.
Maintains documentation and updates the network and security infrastructure, tests and implements vendor security patches, implements workarounds for unpatched security vulnerabilities.
Troubleshoots problems with applications, network and security infrastructure, including routers, switches, firewalls, VPN appliances, proxy servers, DNS appliances and Wireless devices.
Takes corrective actions when necessary following change control guidelines and polices.
Resolves the most complex issues in the environment with little to no supervision, relying on his/her ability to pull together technical resources to gather accurate information to provide data driven solutions.
Configured and troubleshooted network services such as SSH, NFS, Samba, and FTP on RHEL platforms.
Partnered with federal agencies to ensure adherence to OMB directives and support annual FISMA reporting.
Developed and maintained Information Security Management Plans (ISMP) in accordance with FISMA guidelines.
Hardened RHEL servers by implementing security controls such as firewalld, iptables, and system auditing tools like auditd.
Working on Components of SD-WAN are vBond, vManage, vSmart, and vEdge.
Excellent communications skills (written and verbal) and ability to work both independently and in a group.
Ability to effectively multi-task and prioritize. Self-directed and accountable.
Environment: Cisco ISE, EIGRP, BGP, LAN, WAN, DM-VPN, Site to Site VPN, Cisco ASR, ISR, Nexus 2K,5K,7K, Firesight, Wireless Lan Controllers 5508,5520, Solar Winds, Cisco Prime, Net Brian, Cabling, Visio, Azure.
Microsoft - Seattle, WA June 2022 - February 2023
Role: Cloud Network Engineer
Responsibilities:
Design, implement, and support network infrastructure for large scale networks.
Implemented advanced enterprise security measures including VPNs (IPSec, SSL), IDS/IPS, and network segmentation to safeguard sensitive data and improve compliance.
Experience with network access control (NAC) and security policies for users and devices.
Implement network segmentation (experience with Palo Alto firewalls and good understanding of systems and application security models).
Administrate Network Access Control Solutions such as Cisco ISE and Cisco DUO.
Experience with Cisco Nexus and Catalyst Series switches and Arista switches.
Responsible for documenting requirements and come up with network device configuration for various network hardware that is part of the solution.
Deep understanding of various network protocols and technologies such as OSPF, BGP, MP-BGP, VRFs, multicast, DMVPN, VxLAN, BGP/EVPN, 802.1x and RADIUS.
Perform POC tasks as assigned by MS project team.
Deployed and managed virtualized environments using KVM, Red Hat Virtualization (RHV), and libvirt.
Configured and managed advanced networking features such as Direct Connect, ExpressRoute, and Cloud Interconnect.
Deployed and managed load balancers (ALB, NLB, and ELB) to ensure high availability and fault tolerance.
Utilized DNS services (Route 53, Azure DNS) for domain and traffic management.
Integrated RHEL systems with public cloud platforms such as AWS, Azure, and Google Cloud Platform (GCP). Escalation points for network support engineers.
Excellent troubleshooting skills and ability to work independently.
Performed NX-OS upgrades on all nexus platform, Experience in Configuring VDC, vPC (single sided and double sided) on N7K and N5K.
We use Meraki for our small networks are small and consist of an MX68, MX120-xx, MR42. The dashboards are setup as one network under one org. On one of new locations, the vendor setup the dashboard as one org and then two networks (wired and wireless). In order for me to correct the VLAN's, group policies, etc.
Azure provides a managed firewall that controls traffic between the VNet and internet. This firewall is meant to protect internet facing conversation. It is important to note that this firewall requires in its own subnet, and forwards traffic to other resources using internal routing.
Writing ACL's as per the request of customers on ASA/SRX firewalls.
Implemented advanced network security measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and security groups to safeguard data.
Ensured compliance with industry standards such as SOC 2, GDPR, HIPAA, and ISO 27001.
Conducted regular security audits and penetration testing to identify and remediate vulnerabilities.
Experience with Aruba WLAN infrastructure in large scale global deployments.
Experience with 802.1x, RADIUS, EAP-TLS WLAN standards.
Worked on maintaining the system, code upgrades, reviews, configuration changes, and monitoring. Backup cycles and security reviews are performed on an ongoing basis
Coordinate Citrix related implementation activities across various functional groups to help prioritize and schedule appropriate resources.
Configured Citrix NetScaler responder policy and to maximize the performance and availability of all applications and data and also provide secure remote access to any application from any device.
Installed and configured Firewall in Internet Edge and Firepower Series using Cisco ASA.
Firepower Series using Cisco ASA for additional vulnerability scanning.
Environment: Cisco ISE, EIGRP, BGP, LAN, WAN, DM-VPN, Site to Site VPN, Cisco ASR, ISR, Nexus 2K,5K,7K, Firesight, Wireless Lan Controllers 5508,5520, Solar Winds, Cisco Prime, Net Brian, Cabling, Visio, Azure
FannieMae - Dallas, TX July 2021 - May 2022
Role: Cloud Network Engineer
Responsibilities:
Configured and managed AWS Direct Connect to establish high-speed, secure connections between on-premises data centers and AWS cloud environments.
Deployed and maintained Azure VPN Gateway for secure, scalable cross-premises connectivity and hybrid cloud integrations.
Designed and implemented transit gateway architectures to enable centralized connectivity and routing between multiple Virtual Private Clouds (VPCs) and on-premises networks.
Ensured secure communication by leveraging encryption protocols and configuring site-to-site VPN tunnels for cloud and on-premises integration.
Optimized network performance and reduced latency by provisioning dedicated cloud connectivity with AWS Direct Connect and Azure ExpressRoute.
Monitored and troubleshot cloud network infrastructure, ensuring high availability and compliance with organizational security standards.
Collaborated with cross-functional teams to design and implement hybrid cloud networking strategies tailored to business needs.
Conducted network traffic analysis and performance tuning to enhance the reliability of cloud and on-premises connections.
Cisco 5520 ASA appliance, Wireless LAN upgrade project. Assisted infrastructure team with the installation of 60 cisco 3700 series AP, around the building.
Configured Security policies including NAT, PAT, VPN's and Access Control Lists.
Configured and optimized enterprise-wide WAN networks using MPLS, SD-WAN, and VPN solutions to ensure reliable and secure connectivity between remote sites.
Managed LAN environments, including deployment of switches, routers, wireless APs, and VLAN segmentation.
Configured VDC's on NEXUS 7K for creating multiple logical switches and HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments in data center.
Worked exclusively on designing Data Center as well as Edge side.
Created comprehensive project plans, and coordination of team members, third-party contractors, and consultants.
Assisted with strategic plans and roadmaps for future Infrastructure initiatives; tracking project milestones and deliverables; identifying and mitigating issues; resolving conflicts with the project; and developing/presenting proposals, reports and project plans to management.
Designed & implemented Fortinet network & third-party equipment as per ISP SR (service request) the included Juniper, F5, Cisco Catalyst, Cisco Nexus 7K and higher end FortiGate.
Configured site-to-site IPSec VPN from Cisco ASA to FortiGate firewall.
Troubleshoot and created prevented measure to stop spamming by implementing, spam filtered ACL list, content filtering and configuring recipient variation through LDAP for the (FortiMail) spamming appliance.
Hands on experience with Upgrading and troubleshooting Cisco / Juniper on the edge side.
Configured Juniper EX series Layer2 and Layer3 and supervised equipment installation work
Experienced in develop, deploy, monitor, and improve business processes that make use of these support systems.
Performed NX-OS upgrades on all nexus platform, Experience in Configuring VDC, vPC (single sided and double sided) on N7K and N5K.
Azure provides a managed firewall that controls traffic between the VNet and internet. This firewall is meant to protect internet facing conversation. It is important to note that this firewall requires in its own subnet, and forwards traffic to other resources using internal routing.
Writing ACL's as per the request of customers on ASA/SRX firewalls.
Worked on maintaining the system, code upgrades, reviews, configuration changes, and monitoring. Backup cycles and security reviews are performed on an ongoing basis.
Coordinate Citrix related implementation activities across various functional groups to help prioritize and schedule appropriate resources.
Configured Citrix NetScaler responder policy and to maximize the performance and availability of all applications and data, and also provide secure remote access to any application from any device.
Installed and configured Firewall in Internet Edge and Firepower Series using Cisco ASA.
Firepower Series using Cisco ASA for additional vulnerability scanning.
Environment: Cisco ISE, EIGRP, BGP, LAN, WAN, DM-VPN, Site to Site VPN, Cisco ASR, ISR, Nexus 2K,5K,7K, Firesight, Wireless Lan Controllers 5508,5520, Solar Winds, Cisco Prime, Net Brian, Cabling
Cognier Inc (Fannie Mae) - Dallas, TX April 2020 - June 2021
Role: Network Engineer
Responsibilities:
Worked configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018
Configured and maintained VDCs in 7018 switches, maintained VRFs in those separate VDCs.
Scheduled maintenance of Nexus 2248, 5548 and 7010 switches so that there are no Orphan ports in the network.
Performed upgrade of NXOS from 6.2.2a to a higher version to increase performance and support new features on both N7010 & N7710 chassis.
Proficient in Configuring VPC between the Cisco Nexus 7k, 5k.
Responsible for the conversion of the existing environment from an EIGRP to OSPF setup to facilitate the migration of Core from Cisco to Juniper.
Experience performing troubleshooting on slow network connectivity issues, and Performance issues on F5 load balancers and Cisco ASA Firewalls.
Managed firewall using FortiGate to allow or block IPs, created policies address different interfaces and VLANs. Installations, design, and implementation of Cisco solutions, VPN, Fortinet, VOIP.
Installed new Fortinet firewalls to increase security and network control setup IPS, and Application control, as well as logging for compliance.
Fortinet Firewall administration, configuration of FortiGate 3000, 3815 series as per network diagram.
Installed Fortinet appliances for security and compliance.
Deploying and decommissioning Cisco switches/Firewalls and their respective software upgrades.
Hands on experience in Configuring VPN, routing, NAT, access-list, security contexts, and failover in ASA firewalls.
Maintained TACACS+/RADIUS Servers for AAA authentication and User authentication.
Worked on F5 BIG-IP LTM, configured profiles, provided and ensured high availability
Worked on troubleshooting and resolving issues escalated by the NOC and internal systems, including developing, implementing and deploying emergency hot fixes within a global network
Experience in F5 I Health reports creating and maintaining high quality installation guides, standards documents, diagrams, run books and other engineering documentations.
Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.
Working knowledge and understanding of MAB configuration on ACS & ISE.
Worked with Cisco ISE to identify threats in the network for rapid containment and remediation.
Using Cisco ISE Deployment Assistant (IDA) to validate and document endpoint authentication status during monitor mode deployments.
Worked on configuration of Aruba Controllers (200, 650/651, 800 and 3600).
Worked on Catalyst 4506E, 4507, 6503E and 6506E series switches along with Nexus 5020 switches in change of configurations and maintenance.
Documented migration of data center from legacy switches to nexus switches.
Handled LAN environment involving HSRP, VLANs, Trunking and Spanning Tree protocol.
Upgraded the remote access (VPN) and firewall environment for the entire organization
To ensure that day-to-day Operations run smoothly. Change management and third level incident management being the primary responsibility, participate directly as well as take escalations from the team members as and when required.
Created Visio documentation to give complete picture of network design for each building.
Hands on experience in Troubleshooting IOS related bugs based on history and appropriate release notes.
Environment: Cisco ISE, F5 BIG-IP, LTM, OSPF, EIGRP, RIP, BGP, LAN, WAN, MPLS, Cisco ASR, ISR, Nexus 2K,5K,7K, Palo Alto, Riverbed Steelhead, Visio, Azure
UBS Bank, Union City, NJ September 2017 - March 2020
Role: Network Engineer
Responsibilities:
Experience working with data center deployment where we converted from Cisco 6500 to Nexus.
Experience working with Nexus 5020, 2148, 2248 devices
Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000
Troubleshoot wan related problems including OSPF, EIGRP, BGP routing and design
Supporting EIGRP, OSPF and BGP based network by resolving level 2 & 3 problems of internal teams & external customers of all locations
Deploying Cisco routers and switches such as 7200, 3800, 3600 and 3500, 4500, 5500.
Experience working with Cisco ASA 5585-X with firepower firewalls with Firewall rules, IPSEC VPN, NAT, Active-Standby Failover, OSPF and Any Connect VPN technologies
Designed, configured, implemented site-site VPN on cisco ASA 5585-X firewall.
Troubleshoot and Worked with Security issues related to Cisco ASA, and IDS/IPS firewalls.
Collaborating with Application owners, Network Team, DNS Team, and Firewall Team to migrate websites from Cisco ACE Load Balancer to New F5 BIG-IP Local Traffic Manager.
Deployed code upgrade from version 11.5.1 HF4 to version 11.5.4 on the F5 LTMs.
Configured F5 GTM solutions, which includes Wide IP (WIP), Pool Load Balancing Methods, probers and monitors.
Managed SSL Termination on F5 BIG-IP LTM which entailed creating Cert Request, importing, renewing and applying to Virtual Server hosting the Application.
Configuring and monitoring different modules F5 BIG-IP LTM and DNS traffic Management.
Management of Viprion 2400 chassis for the deployment of Big IP.
Perform Wireless Administration and troubleshooting for the corporate Wireless infrastructure.
Build Logical design and Implementation of Wireless Solution
Acquired strong skills in working with cloud based wireless technologies like 802.11a/n/g, CISCO Meraki
Basic configuration of Cisco Meraki Layer 2 and Layer 3 switches like MS 220, MS 320 and MS 420.
Acquired knowledge in working with Meraki wireless access points MR 12, MR 16, MR 24, and MR 34 etc.
Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
Negotiate VPN tunnels using IPsec encryption standards and configured and implemented site-to-site VPN, Remote VPN on Cisco 5585-x Firewalls.
Management tools, SNMP, Syslog, Sniffer
Managed inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP.
Implemented and configured SNMP, Syslog and traps on Cisco routes to allow for network management.
Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, MPLS
Environment: Cisco 3500,4500,5500 switches, Cisco 3800/3600/7200 routers, VPN, BGP, OSPF, RIP, EIGRP, CML, Nexus Switches 2K/5K/7K, VLAN, VTP.
Aspiring Minds Pvt Ltd, Bangalore, IND January 2013 - May 2015
Role: Network Engineer
Responsibilities:
Responsible in the Configuration of EIGRP, OSPF and BGP Involving in the configuration & troubleshooting of routing protocols on Cisco 2900, 3900, ASR 9010, ASR 1002 devices across locations and datacenters.
Hands on experience with Catalyst L3 switches and Cisco Nexus switches: 2232, 2248, 5548, 6001 and 7018(Sup 2E).
Operated with Sup 2E for 7018 Switch. And F cards for L2 switching and few M cards for L3 proxy routing purposes for F cards.
Functioned in upgrading system images on 5k and 7k Nexus switches using kick start and FTP server.
Experience with configuring FCOE using Cisco nexus 5548.
Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
Perform ISSU upgrade on Nexus 7010 devices by operating the supervisors in active/standby mode on the devices by determining ISSU compatibility.
Responsible for Firewall Administration, Rule Analysis, Rule Modification on ASA 5585, SRX550 devices.
Advance knowledge in installing, implementing, and maintaining Juniper Firewalls SRX series.
Documented new VPN enrolments in a database and create standard procedures for further improvement.
Troubleshoot traffic passing managed firewalls via logs and packet captures.
The functionality with the DNS naming conventions and migrations from old load balancing environments to the F5 environment both 10.x and 11.x.
Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team. The LAN consisted of Cisco campus model of Cisco 3750 at access layer, Cisco 6513 at distribution/core layer.
Created standard access lists to allow SNMP, NTP and logging servers.
Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6509 switches.
Deployed virtualized Network Switch functionality using Cisco Nexus 1000v using VMware vSphere 5.5
Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
Negotiate VPN tunnels using IPsec encryption standards and configured and implemented site-to-site VPN, Remote VPN on SRX 550 Firewalls.
Performed upgrades for all IP series firewalls from previous Checkpoint versions (R75.40, R75.40VS, R75.45, R75.46, R75.47, R76, R77) to R77.10
Implemented all standard and non-standard ISDN and IP-VPN changes to company customer support connections.
Responsible for administrating Bluecoat and dealing with policies for user access like Blocking/Unblocking URL's.
Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.
Co-ordinated with the Data Network and Security team and came up with possible solutions.
Performed Configuration on ASR 9K Pairs includes HSRP, Bundle Ethernet Config, Assigning dhcp profiles.
Creating and Deploying of Virtual Machines from Templates and creating Snapshots and Cloning of Virtual Machines for future Deployments.
Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view) and experience with developing complex network design documentation and presentations using VISIO.
Created MOPS to get approval from peers to perform configuration add/ remove changes following change management process.
Environment: Cisco 2900, 3560 and 6509 switches, Cisco 2600,3600 routers, VPN, BGP, OSPF, RIP, EIGRP, VLAN, VTP, HSRP, GLBP