Post Job Free
Sign in

Network Engineer Data Center

Location:
Plano, TX, 75094
Salary:
$70
Posted:
February 27, 2025

Contact this candidate

Resume:

Venkat K

Sr. Network Engineer

Email: ***********@*****.***

Phone: +1-214-***-****

PROFESSIONAL SUMMARY:

• Over 9 years of experience as a Network Engineer with expertise in designing, implementing, and troubleshooting complex network infrastructures in enterprise and cloud environments.

• Certified in CCNP Routing & Switching and Palo Alto Networks Certified Network Security Engineer (PCNSE) with a solid understanding of Cisco technologies including ACI, Nexus switches, DNAC, and Catalyst switches.

• Proficient in routing protocols like OSPF, BGP, EIGRP, and IS-IS, ensuring high network availability and efficient routing solutions.

• Expertise in WAN technologies such as SDWAN, MPLS, and VPNs, ensuring secure and reliable connectivity across multiple locations.

• Extensive experience with firewalls, including Palo Alto, Cisco ASA, and Checkpoint, focusing on security policies, NAT, VPNs, and threat prevention.

• Strong understanding of Data Center LAN technologies, including VPC, VRF, HSRP, LACP, QoS, and Multicast for robust enterprise network setups.

• Hands-on experience with Public Cloud providers (AWS, Azure) for network deployments, integrating cloud-native security solutions and virtual firewalls.

• Skilled in configuring and managing Cisco ACI fabric, including tenants, EPGs, contracts, and fabric policies to optimize data center networks.

• Experienced in end-to-end project delivery, from requirements gathering, BOM creation, design documentation to operational handover.

• Proficient in network automation using Ansible, Terraform, and Python scripting, enabling efficiency and reduced human error in network operations.

• Familiar with load balancers, including F5 BIG-IP, Citrix ADC, and Cisco Meraki, ensuring high availability and load distribution.

• Adept at deploying and managing WiFi solutions, including Cisco Meraki, ensuring seamless wireless connectivity in enterprise environments.

• Expertise in DHCP/DNS management, including Infoblox and Windows DNS servers, ensuring efficient IP address management.

• Strong knowledge of security protocols like IPsec, SSL/TLS, ACLs, NAT/PAT, and AAA services, providing secure network access and policies.

• Hands-on experience with Juniper and Arista routers and switches, including MX series, SRX firewalls, and automation with Junos OS.

• Experience in troubleshooting complex network issues, including latency, packet loss, and routing loops, ensuring optimal network performance.

• Proficient in high- and low-level design documentation, including network diagrams, topology maps, and MOPs (Method of Procedure).

• Familiar with monitoring tools like SolarWinds, PRTG, Cisco Prime, and Splunk, ensuring proactive network monitoring and issue resolution.

• Strong understanding of SDN solutions, including Cisco DNA Center, VMware NSX, and OpenStack, delivering scalable, policy-driven networks.

• Skilled in managing multi-vendor environments, working with Cisco, Juniper, Palo Alto, Fortinet, and Arista platforms.

• Proven track record of leading critical migrations, including firewall replacements, routing protocol upgrades, and data center migrations, ensuring minimal downtime.

• Excellent communication and collaboration skills, working effectively with cross-functional teams, vendors, and stakeholders to achieve project success.

TECHNICAL SKILLS:

Networking Protocols:

• OSPF, BGP, EIGRP, IS-IS, RIP, MPLS, VRF, HSRP, VRRP, GLBP, QoS, IPsec, SSL/TLS, TCP/IP, UDP, SNMP, FTP, TFTP, SSH, DNS, DHCP

Routing & Switching:

• Cisco Nexus (9K, 7K, 5K, 2K), Catalyst switches (6500, 4500, 3850), Cisco ISR/ASR Routers (1000, 4000, 9000 series)

• Routing protocols: OSPF, BGP, EIGRP, Policy-Based Routing (PBR), Route Maps, Redistribution

• Switching technologies: VLAN, VTP, STP, EtherChannel, Port Security, LACP, Trunking, QoS

• WAN technologies: SDWAN, MPLS, DMVPN, VPN (IPsec, SSL), PPP, Frame Relay

Firewall & Security:

• Palo Alto (PA Series), Cisco ASA (5500 Series), Checkpoint (R77, R80), Juniper SRX, Fortinet

• Security protocols: ACL, NAT/PAT, IPsec VPN, SSL VPN, AAA, IDS/IPS, Web Filtering

• Centralized management: Cisco ISE, Panorama, Check Point SmartConsole

Data Center Technologies:

• Cisco ACI (Application Centric Infrastructure), Cisco DNAC (DNA Center)

• Virtual Port Channels (VPC), Virtual Routing and Forwarding (VRF), Multicast (PIM, IGMP)

• Load Balancers: F5 BIG-IP (LTM, GTM), Citrix ADC, Cisco Meraki MX

• Network Storage Protocols: iSCSI, FC, NFS

Cloud Networking:

• AWS: VPC, EC2, RDS, IAM, CloudFormation, S3, CloudTrail, Inspector

• Azure: VNets, Load Balancers, VPN Gateway, NSG, Azure Firewall

• Cloud security: Securing cloud networks using virtual firewalls (Palo Alto VM, Cisco ASAv)

• Hybrid cloud integration and cloud-native services

Network Automation & Scripting:

• Python, Ansible, Terraform, Bash

• Automation of network configurations, device management, and monitoring

• CI/CD tools: Jenkins, GitLab CI/CD

• Infrastructure as Code (IaC): Terraform, CloudFormation

WiFi & Wireless Technologies:

• Cisco Meraki (MR Access Points), Cisco WLC, Aruba Wireless

• 802.1x authentication, WPA2, RADIUS, TACACS+

• Wireless security: rogue detection, BYOD policies

Monitoring & Network Management:

• SolarWinds, PRTG, Splunk, Nagios, Cisco Prime Infrastructure, NetFlow Analyzer

• Troubleshooting tools: Wireshark, TCPdump, NetScout, PingPlotter, QSCOPE

Servers & Virtualization:

• DNS Servers, DHCP Servers, Mail Servers, Proxy Servers

• VMware ESXi, vSphere, NSX, Hyper-V, OpenStack

• Network monitoring using SNMP, NetFlow, and Syslog

Operating Systems:

• Linux (Red Hat, Ubuntu), Windows Server (2008, 2012, 2016)

• Cisco IOS, NX-OS, JUNOS OS

• Automation scripts in Linux/Unix environments

PROFESSIONAL EXPERIENCE:

Fannie Mae, Boston, MA April 2022 to Present

Role: Sr. Network Engineer

Responsibilities:

Designed and implemented Cisco ACI-based Data Center solutions, including configuring tenants, EPGs, contracts, and fabric policies, ensuring scalable and secure network segmentation.

• Migrated legacy network infrastructure to Cisco DNA Center (DNAC) for centralized network management and automation, improving operational efficiency and network visibility.

• Configured and optimized routing protocols such as BGP, OSPF, and EIGRP across multiple data centers and branch offices, ensuring high availability and low latency in WAN connectivity.

• Deployed SDWAN solutions using Cisco vManage, implementing traffic steering policies, QoS, and VPNs for secure and optimized branch-to-branch communication.

• Managed and troubleshot LAN/WAN infrastructure, including VLANs, HSRP, VRFs, and EtherChannel, ensuring redundancy and network stability.

• Implemented and managed firewalls (Palo Alto, Cisco ASA) and VPN solutions to secure both on-premises and cloud-based environments, reducing cybersecurity risks.

• Integrated AWS VPCs with on-premises networks using VPN tunnels and Direct Connect, enabling hybrid cloud connectivity.

• Configured Azure Virtual Networks (VNets) with ExpressRoute for secure, high-speed connectivity between data centers and cloud resources.

• Automated network device configurations using Ansible and Terraform, reducing manual errors and deployment time for network changes.

• Led the migration from MPLS to SDWAN, reducing operational costs and improving application performance through dynamic path selection and link aggregation.

• Deployed Cisco Nexus 9K switches in data center environments, configured VPC, LACP, and Multicast to ensure high availability and load balancing.

• Configured Palo Alto firewalls with GlobalProtect VPN, enhancing remote access security for employees and contractors.

• Monitored and optimized network performance using tools like SolarWinds, PRTG, and Splunk, identifying and resolving latency and packet loss issues.

• Led the implementation of Cisco ISE for 802.1X authentication and TACACS+ access control, improving network access security.

• Implemented load balancing solutions using F5 BIG-IP LTM, ensuring high availability and failover for critical applications.

• Developed network automation scripts in Python to streamline configuration management, device health checks, and log analysis.

• Performed firmware upgrades and security patches on network devices, ensuring compliance with security policies and industry standards.

• Collaborated with cross-functional teams to design and deploy multi-vendor network solutions, including Juniper SRX firewalls, Arista switches, and Fortinet appliances.

• Created high-level and low-level design (HLD/LLD) documents, network diagrams, and MOPs (Method of Procedure) for network changes and migrations.

Environment: Cisco ACI, Cisco DNAC, Nexus 9K/7K/5K, Catalyst 6500/4500, SDWAN (vManage, vBond, vSmart), MPLS, AWS (VPC, Direct Connect, CloudFormation), Azure (VNets, ExpressRoute, Azure Firewall), Palo Alto Firewalls (PA Series, Panorama), Cisco ASA, VPN (IPsec, SSL, GlobalProtect), BGP, OSPF, EIGRP, VRF, VLANs, HSRP, LACP, VPC, Multicast, F5 BIG-IP LTM, Ansible, Terraform, Python, SolarWinds, Splunk, PRTG, Infoblox, Juniper SRX, Arista Switches, Fortinet Firewalls, Cisco ISE, TACACS+, DNS, DHCP, Wireshark, NetFlow, SNMP, SSH, IPv6, QoS.

Citibank, New York, NY January 2020 to March 2022

Role: Network Engineer

Responsibilities:

Designed and implemented Cisco SDWAN solutions to improve branch-to-branch connectivity and application performance, utilizing vManage for policy enforcement and monitoring.

Configured and optimized BGP, OSPF, and EIGRP routing protocols to ensure high availability and redundancy across global data centers and branch locations.

oManaged and deployed Cisco Nexus switches (9K, 7K, 5K), configuring VPC, LACP, and HSRP to ensure load balancing and network stability.

oPerformed firmware upgrades and patch management on Cisco ASA firewalls and Palo Alto firewalls to ensure compliance and protect against vulnerabilities.

oMigrated legacy WAN links to MPLS and SDWAN, reducing operational costs and improving network performance through dynamic path selection.

oConfigured and deployed VPN solutions (IPsec, SSL) using Cisco ASA and GlobalProtect, enabling secure remote access for employees and vendors.

oIntegrated Infoblox DNS/DHCP solutions into the network infrastructure for IP address management and high availability.

oImplemented Cisco ISE for 802.1X authentication and TACACS+ for centralized network access control, enhancing security posture.

oTroubleshot complex WAN and LAN issues, including packet loss, latency, and routing loops, ensuring minimal downtime and optimal performance.

oDeployed AWS cloud networking solutions, integrating VPCs, VPN tunnels, and Direct Connect to establish secure hybrid cloud connectivity.

oImplemented load balancing solutions using F5 BIG-IP LTM, ensuring high availability and failover for critical applications.

oAutomated network configuration tasks using Ansible and Python scripts, reducing manual intervention and deployment time.

oConfigured Cisco DNAC for network automation and policy-based management, improving operational efficiency.

oMonitored network performance using SolarWinds and Splunk, analyzing traffic patterns, logs, and alerts to identify and resolve network issues proactively.

oManaged firewall policies on Palo Alto Panorama, performing NAT, VPN, and URL filtering configurations to enhance network security.

oDeployed and configured Juniper SRX firewalls and Arista switches as part of a multi-vendor network environment.

oConfigured and managed VLANs, trunk ports, EtherChannel, and spanning-tree protocols to optimize switching performance and network stability.

oDocumented network designs, topology maps, and MOPs (Method of Procedure) for ongoing projects and network upgrades.

Environment: Cisco SDWAN (vManage, vBond, vSmart), Cisco Nexus 9K/7K/5K, Catalyst 6500/4500, Cisco ASA Firewalls, Palo Alto Firewalls (PA Series, Panorama), VPN (IPsec, SSL, GlobalProtect), AWS (VPC, Direct Connect, CloudFormation), Cisco ISE, Infoblox DNS/DHCP, BGP, OSPF, EIGRP, VRF, VLANs, HSRP, LACP, VPC, Multicast, F5 BIG-IP LTM, Ansible, Python, Juniper SRX, Arista Switches, SolarWinds, Splunk, Wireshark, NetFlow, SNMP, SSH, DNS, DHCP, QoS, IPv6.

UnitedHealth Group, Minnetonka, MN April 2018 to December 2019

Role: Network Engineer

Responsibilities:

Configured various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.

Converted Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience

Worked on implementing, configuring, and supporting Checkpoint and ASA firewalls for multiple clients.

Configured IP Quality of Service (QoS). Configuration of QOS policies for VOIP traffic on Access, Distribution and Core switches. Marking DSCP code points, traffic policing, prioritization, etc.

Implemented and troubleshot the Virtual firewalls (Contexts) solutions in ASA.

Worked on upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800) Cisco Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, Bluecoat Proxy and Riverbed Steelhead appliances

Upgraded Cisco 7200, 3600 Router IOS Software, backup Routers, and Catalyst 3560, 4500 switch configurations.

Supported 24x7 operations and answered calls from the customers on network emergencies and resolved issues.

Installed and managed Cisco Catalyst 3500XL, 2960 series Switches, and Cisco 1800, 3900 series routers.

Configured various BGP attributes such as Local Preference, MED, Extended Communities, Route-Reflector clusters, route maps and route policy implementation.

Worked on configuration and troubleshooting complex Routing Protocols (EIGRP, OSPF, and BGP).

Responsible for configuring and maintaining BGP routing (Route Maps, AS-Path prepend, MED, Local Preference) to load balance traffic across multiple ISP links.

Worked extensively in configuring, monitoring, and troubleshooting Juniper security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.

Converted Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to GetVPN.

Rebuilt data centers and redundant sites for failover, F5 load balancers.

Performed firewall migration from Cisco ASA platforms to Palo Alto firewalls using Palo Alto conversion too

Supported 24x7 operations and answer calls from the customers on network emergencies and resolve issues.

Installed and managed Cisco Catalyst 3500XL, 2960 series Switches and Cisco 1800, 3900 series routers.

Involved with team responsible for network infrastructure and the planning and design of enterprise LAN/WAN solutions. Handled data network issues in and around sites and providing solutions.

Worked on configuration and troubleshooting complex Routing Protocols (EIGRP, OSPF, and BGP).

Responsible for configuring and maintaining BGP routing (Route Maps, AS-Path prepend, MED, Local Preference) to load balance traffic across multiple ISPs links.

Worked on implementation of Check Point and ASA firewall security.

Involved in planning and configuring the routing protocols such as OSPF, RIP, and Static Routing on the routers.

Migrated, created, and managed pools and clusters in F5 BigIP GTM 3DNS load balancers across multiple Datacenters.

Converted CatOS to Cisco IOS Config Conversion on distribution layer switches.

Worked on conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.

Involved in configuration of Access lists (ACL) on Juniper and Palo Alto firewall for the proper network routing for the B2Bnetwork connectivity.

Worked on Switching technologies like VLAN, Inter-VLAN Routing, Ether-channel, VTP, MLS, HSRP, VRRP,

Involved in planning, designing and assisting in deploying enterprise-wide Network Security and High Availability Solutions for ASA. Supported networks, which are comprised of 1000 Cisco devices.

Responsible for analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.

Involved in configuring, monitoring and troubleshooting Juniper security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.

Worked on troubleshooting and management Cisco, Juniper, Huawei, Redback and Extreme devices.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, Palo Alto, Cisco Nexus7K/5K, 2248/3560/5020/6509, ASA, Checkpoint, LAN, WAN, OSPF, BGP, RIP, EIGRP,, Nexus 7K,5K,2K, SolarWinds, Cisco ACS, Cisco Prime Infrastructure

Intense Technologies Ltd., Hyderabad, India January 2016 to August 2017

Role: Network Engineer

Responsibilities:

Deployed and configured Cisco 12000, 7600, 3800 Juniper M series routers Catalyst 6500 series switches for the core, distribution and access layer in an enterprise composite model network infrastructure.

Designed and deployed EIGRP, OSPF, BGP, MPLS-VPN protocols and routing technologies for connecting data center to remote locations.

Involved in configuring, monitoring and troubleshooting Cisco's PIX firewall, ASA 5500 security appliance, Cisco 4200 IPS appliance, designing and implementation experience in building DMZ, and integration of firewalls with Gateway Anti-Virus and web Filtering applications from Trend Micro and Web sense.

Configured various advanced features Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.

Designed and developed Internet Security policy for the company in order to build a secure and robust network Infrastructure.

Planned, tested and evaluated various equipment's, systems, IOS and procedures for use within the Network / security infrastructure.

Worked with Nexus 7010, 5020, 2148, 2248 devices.

Configured Nexus 2000 Fabric Extender FEX which acts as a remote line card module for the Nexus 5000.

Installed, configured, maintained and troubleshoot JUNOS, Juniper M-Series T-Series routers, Foundry Network L2/L3 Switches.

Worked with vendors Juniper, Cisco, etc. when issues arise and see it through all the way until issue is resolved or a bug has been identified and turned over to development.

Real-time network monitoring using HP Open View by implementing policies and creating custom events. Analysed network traffic using analyser such as Wireshark.

Planned, designed, installed and configured LAN/WAN as per organizational / client requirements.

Responsible for planning and configuring the routing protocols such as OSPF, RIP, and Static Routing on the routers.

Assisted the certification team and perform configuration of LAN WAN technologies such as Ethernet, Fast Ethernet, and Gigabit Ethernet.

Handled data network issues in and around sites and providing solutions.

Worked on configuration of routers, switches, hubs, modems and other networking devices.

Constant testing of ring topology between MSANs for continuous connection.

Maintained end-to-end connectivity for standard E1 and leased lines with backup ISDN.

Worked with development team to solve network problem and improve the network.

Environment: Cisco 3500/3550/2960 series switches and Cisco 1200/2800/3640Series Routers, Cisco ASA 5500, RIP, EIGRP, BGP, VPN, LAN, WAN, Nexus 5K,2K, Wireshark, SolarWinds, Cisco ACS, Cisco Prime Infrastructure

ACS Technologies Limited, Hyderabad, India August 2014 to December 2015

Role: Network Administrator

Responsibilities:

Coordinated timely disaster recovery procedures affecting the stability of data center operations.

Developed and revised departmental procedure manuals to assist staffs in technical operations.

Implemented Quality Control procedures to ensure full compliance with Service Level Agreements.

Monitored and troubleshot LAN, installed and configured routers and switches, and generated weekly reports.

Managing Exchange 2003 servers and troubleshooting issues related to User and group accounts, mail delivery, configuring MX records to enable and disable domain.

Responsible for Security Patch Management and Deployment to all clients using Microsoft WSUS.

Administering DHCP Server creation of reservation and configuration of server options.

Configured Terminal Server to access to the servers using Remote Desktop Protocol.

Installing, troubleshooting and supporting Windows 2003 server administration and Active Directory.

User Support - Monitoring and troubleshooting system performance, server user related problems. Support users to resolve their day-to-day issues related to OS, E-mail, Account issues, hardware etc.

Managed the installation and configuration of Windows 2000 Server/Workstations.

Created user and computer accounts on the Active directory users and computers.

Monitored the servers and trouble shot the server issues.

Resolved the user issues related to Active Directory Users and groups

Environment: VLANs, inter-VLAN routing, VTP, STP, RSTP, PVST, PVST, HSRP, VRRP, EIGRP, OSPF, BGP, IOS update, CISCO LMS, NMS, Firewall Analyzer, SolarWinds Orion, Spice work, DNS, DHCP, FTP, AD Server

EDUCATION:

Bachelor in Electronics and Communication Engineering (ECE), Vidya Jyothi Institute of Technology, Hyderabad, Telangana, India.

CERTIFICATION:

CCNA Routing and Switching (200-125)

CCNP Routing & Switching (300-101, 300-115)

Palo Alto Networks Certified Network Security Engineer (PCNSE)



Contact this candidate