Post Job Free
Sign in

Network Engineer Hands-On

Location:
United States
Posted:
March 03, 2025

Contact this candidate

Resume:

SAIDI REDDY CHENNU

NETWORK ENGINEER

************@*****.*** 201-***-**** linkedin.com/in/chennusaidir PROFESSIONAL SUMMARY:

• Over 5 years of hands-on experience in designing, configuring, deploying, maintaining and supporting broad range of Network Enterprise and Security Infrastructure.

• Strong hands-on experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 9K,7K, 5K,2K series, Cisco router models like 7200, 4400, 3900, 3800, 2900, 2800, 1900, 1800 series and Cisco catalyst 6500,4500, 3750, 3500, 2900 series switches, WLCs, WAPs, Proxies.

• Experienced in Deploying Wireless Network Infrastructure and Wireless Survey Best Practices. Experience with Cisco wireless solutions including 2504, 5508, 5520, 8500 WLCs.

• Advanced knowledge in TCP/IP suite and IPAM, routing protocols, such as OSPF, EIGRP, ISIS, and BGP.

• Experience in monitoring, debugging, and resolving Cisco infrastructure issues like routing, Network Hardware/Software failure, configuration, WAN outages, and performance issues.

• Performed firewall change management, analyzed and configured a wide variety of firewalls (Checkpoint R77 R80, NSX, Juniper SRX, Palo Alto with Panorama, Cisco ASA, FTD and Fortinet), performed firewall rules risk assessment, designed and optimized firewall rules/Policies.

• Managed application micro-segmentation project with VMWare NSX T to create secure zone in data centers and cloud deployments.

• Configuring/Managing Intrusion Prevention System (IPS): Cisco IPS/Fortinet& Checkpoint UTM. Responsible for overall firewall configuration implementations and policy installations across all platforms during maintenance windows including Juniper, Check Point, and Fortinet for the major enterprise networks.

• Configuring, maintaining, and troubleshooting with Fortinet firewall and security.

• Support of firewall technologies includes Fortinet firewalls. Administration, troubleshooting.

• Experience in performing system administration for Red Hat Linux, Microsoft Windows 2008 Enterprise Server, Windows 2003 Standard/ Enterprise Server, Windows 2000 Standard/ Advanced Server, Windows98/XP/Vista/7.

• Experience with working on latest Cisco switches like Nexus 2000, 5000, 6000 and 7000 series switches while implementing advanced features like VDC, VPC, OTV and Fabric Path.

• Implement network architecture and design using NGN virtualization, storage, MPLS-VPN, MPLS-BGP network architecture design, integration and troubleshoot networking issues.

• Handled diverse projects with IP/MPLS and Metro Ethernet architectures. Design, build and integrate Cloud Computing/Contrail.

• Managing and configuring Aruba Wireless devices and Cisco Access Points.

• Experience with TACACS/RADIUS servers, migration from ACS and Aruba ClearPass to ISE.

• Provide testing expertise for various technology environments. Responsible for developing, executing and evaluating Network test plans.

• Strong troubleshooting skills using Packet capture in Cisco devices and FW monitor and TCP dump in Checkpoint devices and analyzing them in Wireshark & NetScout.

• Experience in configuring and troubleshooting BIG-IP F5 load balancer LTM & GTM.

• Experience in Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480).

• Demonstrated experience in developing, implementing, auditing Checkpoint firewall (R77.30) configurations and analyzing, optimizing rule sets.

• Complete understanding of basic and advanced F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 load balancer and general troubleshooting of the F5 load balancers.

• Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.

• Installed and implemented & troubleshooted the Network Virtualization through VMware and NSX. Configure, Manage, Analyze, and Optimize Network Performance, Traffic, SDWAN, VPNs, Security, Firewalls, & Policies.

• Experience with converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Palo Alto rules.

• Experience in provisioning, configuring and troubleshooting various AWS cloud services such as EC2, S3, RDS, ELB (Load Balancers), ASG, SNS, VPC, Route53, Application discovery service, Security Groups, IAM, Cloud Watch, Cloud Front, Cloud Trail, Cloud Formation Templates, Ops Work.

• Experience with AWS Cloud Formation and Terraform and Packer to create IAC.

• Responsible for the secure development lifecycle for Cisco's Nexus line of products, including Application Centric Infrastructure (ACI), Application Policy Infrastructure Controller (APIC) - Cisco's Software Defined Network (SDN) solution, as well as the Cisco Nexus 9000, 7000, 6000, 5000, 4000, 2000.

• Involved in standardizing Splunk forwarder deployment, configuration and maintenance across UNIX and Windows platforms.

• Experience in Physical cabling, IP addressing, configuring and supporting TCP/IP.

• Hands-on experience with ACI (Application Centric Infrastructure) with spine and leaf architecture.

• Responsible for maintenance and utilization of VLANs, Spanning tree, HSRP, VTP of the switched multi-layer backbone with catalyst switches.

• Hands-on experience with packet sniffer, TCP DUMP and Wireshark for packet monitoring.

• Written Python and PowerShell scripts for the automation of deployments and integrating with the CI tool.

• Deploy, scale and automate network across multiple global data centers supporting Amazon Web Services (AWS).

• Great exposure to SDN and network function virtualization (NFV) technologies like Cisco ACI.

• Troubleshooting and problem resolution of Virtualization (vSphere 4.1\5.1\5.5) Infrastructure.

• Provided second/third level technical support for ACI (Application Centric Infrastructure) technologies. TECHNICAL SKILLS:

Networking Technologies LAN/WAN Architecture, TCP/IP, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP Networking Hardware Cisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls Routing Protocols OSPF, ISIS, EIGRP, RIP, MPLS, IS-IS, BGP, Multicasting Security Technologies PAP, CHAP, Cisco PIX, Blue Coat, Palo Alto, ASA, Fortinet, Checkpoint Network Monitoring SolarWinds, Wireshark, HRping, WhatsUp Gold, Infoblox Operating Systems Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR, IOS-XE, NX-OS Routers 1800, 2611, 2800, 3600, 3845, 3900,4300, 4400, 4500, ASR 1000X, 7206VXR, Juniper M & T Series Load Balancers F5 Networks (BIG-IP), NetScaler (Citrix) Capacity & performance Cascade Riverbed (Flow Monitor), WAN Killer Switches CISCO 2960,3750,3850, CAT 9300, CAT9400, CAT 9500,4500,6500,6800 Nexus 7k,5k,2k WAN AND SD- WAN

Technologies

MPLS, ISP Leased Lines, SONET, Viptela, Versa

Programming Languages C, C++, Perl, Power Shell, Python Wireless and Radius

Technologies.

Canopy Wireless Devices, CISCO 1200 series APs, Aruba wireless and APs, Cisco Meraki, Linksys Wireless/Wi- Fi Routers, Prime Infrastructure, Cisco ISE, MSE, Aruba 225, Aruba 3000 controller & Airwave, ISE, Clear Pass 6.0,6.2,6.5, 802.11a, b,c,g,n,ac

Simulation Tools GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence Firewalls Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580), McAfee Web Gateway, Checkpoint, Palo Alto firewalls

AAA Architecture TACACS+, RADIUS, Cisco ACS

Features & Services IOS and Features, HSRP, GLBP, VRRP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR’s, HLD and LLD documents, Dell equal logics EDUCATION:

Master of Science, Computer Science, Montclair State University, Montclair, New Jersey Bachelor of Engineering, Electrical and Electronics, Osmania University, Hyderabad, India CERTIFICATION:

• (CCNA) – Cisco Certified Network Associate

• (CCNP) – Cisco Certified Network Professional

• (PCNSE)- Palo Alto Certified

PROFESSIONAL EXPERIENCE:

Client: BP Jan’23 – Till Date

Location: Houston, TX

Role: Sr. Network Engineer

• Managed and developed network projects designed to strengthen network continuity and deploy security elements in an attempt to meet and exceed contract requirements, including system analysis & troubleshooting.

• Implemented new eBGP relationship between Juniper QFX Spine switches and Firewalls for route advertisement.

• Configured and troubleshooting HSRP, BGP, OSPF, DMVPN, MPLS WAN, QoS and Route Maps.

• Installing and Configuring Nexus 9k, Cisco 6500, 4500, 3800 and 3600 switching platforms according to deployment plans.

• Implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, and Ether channel, STP, RSTP and MST.

• Configuring STP for switching loop prevention and VLANs for data and voice along with configuring port security for users connecting to the switches.

• Configured Cisco IOS Feature Set, NAT and Simple Network management protocol (SNMP) for Network security implementation.

• Involved in troubleshooting aspects of complex network infrastructure using routing protocols like EIGRP, OSPF and BGP.

• Designed IP Addressing schemes, VLANs and Switch port assignments, Ether-channel implementation.

• Implemented, configured redundancy protocols HSRP VRRP, GLBP for Default Gateway Redundancy.

• Implementing, configuring, and troubleshooting various routing protocols like OSPF, iBGP, eBGP.

• Implemented application-centric policies and service profiles within ACI fabric, ensuring optimized performance and consistent application delivery.

• Configure the layer 2 and layer 3 on Cisco Nexus 7K, 5K, 6509, 9710, 5596 UP, 4500, 3850, 3950, ASR and 2960.

• Switching related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.

• Involved in providing access to user machines and partners outside our network by SSL and IPSec VPN tunneling.

• Performance monitoring of various applications and web servers to maintain quality of service and network stability.

• Involved in configuring and implementing of composite Network models consists of Cisco7600, 7200, 2811,2901, CSR-1 series routers and Cisco 2950, 3500, 5000, 6500 Series switches, Connected Grid Router (CGR 2010) and Cisco 2520 Connected Grid Switch (CGS 2520)

• Tuned BGP internal and external peers with manipulation of attributes such as metric, origin and local Preference. Involved in Configuring and implementing of Composite Network models consists of Cisco7600, 7200, 3800 series and ASR 9k, GSR 12K, CSR1 routers and Cisco 2950, 3500, 5000, 6500 Series switches.

• Deploying and managing SD-WAN solutions(Viptela, Citrix) for large-scale enterprises Experience with configuring FCOE using Cisco nexus 5548 Part of the New Product development team and responsible for User Acceptance Testing (UAT), SDWAN, Viptela, Versa, Meraki

• Configured and troubleshooting Riverbed WAN optimization software to improve the network acceleration at the user end.

• Adding security rules and pushing the security policy on Checkpoint and Fortinet consolidated.

• Fortinet Firewall administration, the configuration of FortiGate 3000, 3815 series as per network diagram.

• Managed firewall using FortiGate to allow or block IPs, created policies added different interfaces and VLANs.

• installations, design, and implementation of Cisco solutions, VPN, Fortinet, VOIP

• Installed Fortinet appliances for security and compliance Managing and Supporting Cisco, Fortinet, Checkpoint/Kemp routers and switches, LB, Foundry, and firewalls

• Implementation of Palo Alto, Fortinet, and SonicWALL firewalls

• Checkpoint, Cisco ASA, Fortinet, and Palo Alto installation, upgrade, Monitoring, and patch management.

• Configuration and management of Cisco ASA firewall (5510, 5520), Fortinet 3061C, 400,800,300c, 100,40C, 80cfirewalls, Checkpoint N- 70,75, 76, SRX Juniper

• Implemented Cisco ISE 2.4 for Wireless 802.1x Authentication and Authorization with Flex Connect Experience in the support and administration of the SolarWinds product for both Network and Server/Application monitoring

• Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.

• Design, test & implement VIPTELA SD-WAN, SDWAN role integration with Multiple Cloud Providers.

• Expertise in wide area networking (LAN,WAN,WLAN,SDWAN), wireless networking, and industrial Ethernet Implements Network and Routing Technology based on Cisco: ASR1k, ISR4k, ENCS, CSR Cloud Services Router, CSP Cloud Services Platform, Viptela SDWAN Software Defined Networks

• Knowledge and experience of Network and Routing Technology based on Cisco ASR1k, ISR4k, CSR Cloud Services Router, CSP Cloud Services Platform, Viptela SDWAN Software Defined Networks (SDN), Cisco APIC

• Worked on Cisco Layer 2 switches (spanning tree, VLAN).

• Performance monitoring of applications and web servers to maintain quality of service and network stability.

• Maintained core switches, creating VLAN's and configuring VTP.

• Designed and Implemented PA 7080’s and Migrated workloads from Legacy and Existing DR Data Center SRX Firewalls to Next Gen Palo Alto Firewalls.

• Involved in simplifying Network architecture by consolidating almost 30 Virtual Routers from legacy devices to 6 virtual routers in new environment.

• Upgrade and maintenance of all production Juniper, Cisco and Palo Alto network devices.

• Involved in Application failover testing between datacenters and Datacenter DR testing.

• Troubleshooted data center network issues and WAN backhaul network issues.

• Created Virtual Routers in Palo Alto Firewalls using Hub Spoke architecture. Route redistribution concept is used to advertise routes with route filters on Hub.

• Configured Firewalls with multiple virtual routers and assigned security zones to respective virtual routers.

• High availability setup between two Palo Alto devices with Link monitoring enabled and testing in different conditions.

• Installed, maintained, and administered storage area network servers in a VMware environment.

• Performed sizing calculations of VMware environments based on current systems and future growth. Designed and recommended architecture of virtualization and private cloud environments based on VMware technologies.

• Design and Implement ESX Clusters, HA, DRS, Vswitches, Distributed Switches. Troubleshoot and Resolve VMware issues from Performance to Configuration. Provided Desktop Support for Local Applications, Logon issues, accessing resources such as printers, files, and email. Replace and repaired Hardware such as Hard drives, Memory System Boards, and Printer Parts.

• Serve as a System Administrator for the Washington Office. My duties consisted of providing support in configuring, troubleshooting and maintaining Linux VMware 5.5 infrastructure for a mid-sized Network Enviroment. Provide ongoing management, performance-tuning and Tier3 support for approximately 100 Virtual Linux Servers running CentOS 6.7, Red Hat Linux 6.5 Enterprise, and about 10 Physical servers.

• Configured New Client connectivity via Site-to-Site/Remote/SSL VPN on Checkpoint firewall. Hands on experience and demonstrated knowledge with the VMware Workstation and the management of different virtual machines.

• Installed and configured Firepower Management Center 6.0 on VMware and added ASA Sourcefire Agents as well as Firepower NGIPS for monitoring and management.

• Connected Enterprise and Data center Firewalls to Panorama M-600’s for management purposes.

• Configured different security profiles like Antivirus, Anti-spyware, Vulnerability protection, URL Filtering and DOS protection profiles to defend against flood attacks, Reconnaissance attacks, viruses, trojans, malware and unauthorized access etc and attaching them to security policies.

• Created Admin Roles, Server Profiles, Authentication Profiles and log settings, Interface Management and Zone protection profiles.

• Worked on AWS IAM to create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources.

• Created an AWS Lambda function and configured it to receive events from your S3 bucket and automatically notified code to deploy to the deployments on the Amazon EC2 instances.

• Worked on different AWS accounts which includes creating S3 buckets for static website hosting and redirecting applications using Route 53.

• Established IPSEC site-to-site VPN tunnels between AWS VPCs and On-Prem network devices.

• Created NAT and Security policies using APP-ID concept on Palo alto and tagging each security policy based on application to make management simpler.

• Suggesting Best Practices for network and security perspective workload migration to make migrations smooth.

• Hands on experience on different F5 load balancing options and features to include Persistence, SSL offload functions, HTTP profiles, iRules etc.

• Change management, monitoring network performance with network tools.

• Prepared and maintained documentation using MS Visio. Environment: Nexus 9k, 7k Cisco 6800, 6500, 4500, 3800 and 3600 switches, Juniper MX 960, MX 480, Juniper EX 4600, 9200, QFX 10008, SRX 3600, 5800, 240, F5 BIG-IP, Palo Alto 7080, PAN M-600, VRRP, iBGP, eBGP, OSPF, DMVPN, MPLS WAN, QoS, Route Maps, VTP, Proxy ARP’s, Route based Forwarding, PBF, Route Filtering, Route Reflectors, Route Re-distribution, Port Forwarding. Client: PepsiCo Jul’20– Jul ’21

Location: Hyderabad, India

Role: Network Engineer

Responsibilities:

• Designing and supporting the consolidation of data centers utilizing Cisco 6500, Nexus 2K, 5K and 7K infrastructure.

• Configure and maintain all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system

(Panorama) to manage large scale Firewall deployments.

• Hands on experience on all software blades of Check Point Firewall. 24x7 on-call step-up support as a part of the safety operations team.

• Working closely with knowledge center management to investigate the information center sites for cabling necessities of assorted network instrumentation.

• Migration from Checkpoint firewall cluster to Cisco ASA 5580 firewalls in a failover pair configuration.

• Provided application-level redundancy and accessibility by deploying F5 load balancers long-term memory.

• Experience with converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.

• Provided Level-3 Network support for Cisco Switches and Cisco ASA 5500 Series Security.

• Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewalls.

• Experience in converting PIX rules over to the Cisco ASA solution.

• Designing and assisting in deploying enterprise-wide Network Security and High Availability Solutions for ASA.

• Worked extensively in Configuring, observation and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover demilitarized zone socialization & configuring VLANs/routing/NAT.

• Exported VMWare images and Rackspace instances to AWS VPC containing EC2 instances with S3 storage.

• Managing a TACACS server for VPN user authentication and network devices authentication.

• Performed Imperva Secure Sphere DAM on WAF Health Checks.

• Integrated and evaluated Cisco ACI, VMware NSX, and Arista CVX SDN solutions

• Managing and providing support to numerous project groups with regards to the addition of recent instrumentation like routers switches and firewalls to the DMZs.

• Implementing traffic engineering on existing Multiprotocol Label Switching (MPLS) network and Open Shortest Path First (OSPF).

• Familiar with setting up the network connections with multiple cloud providers such as AWS, Azure, Oracle etc.

• Worked on the configuration of BGP and advertisement of routes to the ISP network.

• Experience in creating and monitoring high availability, scalable, networks in AWS using EC2, Lambda, VPC and other AWS services.

• Configuring Aruba Controllers integrating with Cisco ACS and RADIUS severs for Dot1x authentication.

• Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.

• Configured and performed software upgrades on Cisco Wireless LAN Controllers 2504, 4404,5508 for Wireless Network Access Control integration with Cisco ISE.

• Provided redundancy in a very multi homed Border Gateway Protocol (BGP) network by tunings AS-path.

• Handling enterprise outages effectively and driving towards the resolution. Coordination of fault escalations in conjunction with the first high-level technical management of high priority or technically complicated calls.

• Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.)

• Involved in upgrading Rios Riverbeds and IOS upgrade of switches and routers.

• Earlier efforts included verification of DOCSIS upstream logical channels, proprietary RF spectrum.

• management algorithms, system high availability etc.

• Support vendors with product and service requirements based on Charter business needs and internal customer requests. My position requires technical skills and working knowledge of DOCSIS Specifications including the following technologies DOCSIS 2.0, DOCSIS3.0, DOCSIS 3.1, Packet Cable 1.0, Packet Cable 1.5 and Packet Cable 2.0.

• Demonstrated expertise in MPLS, routing protocols, and QoS principles, leveraging the capabilities of the Nokia 7705 SAR to enhance network efficiency and reliability.

• Collaborated closely with cross-functional teams, including network architects and service providers, to deliver customized solutions leveraging the capabilities of the Nokia 7705 SAR.

• Deploy, scale and automate network across multiple global datacenters supporting Amazon Web Services (AWS).

• Knowledge and skill on 802.11 a/b/g/n LAN normal for wireless Technology.

• Used Cisco ACI Fabric which is based on Cisco Nexus 9000 Series Switches and the Cisco Application Virtual Switch (AVS).

• Configurations of Check Point, Palo Alto, Cisco, Juniper, Fortinet FortiGate, and SonicWall UTMs.

• Maintain secure network infrastructure with Cisco, Brocade, and Fortinet switches.

• Maintain current network posture with Fortinet Fortigate firewalls 300, 1000, 2000, and 3700 appliances.

• Maintain deployed and replace Wi-Fi network using Fortinet APs. Work with Cisco ASA Firewalls as well as Fortinet FortiGate Appliances.

• Manage Cisco ASA Firewalls using CLI, CSM (Cisco Security Manager).

• Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager. Manage the company's MX and A records. Implemented DKIM and DMARC records for primary domains.

• Hands-on experience in configuring Viptela devices and creating device and feature templates on vManage required for SD-WAN implementation.

• Assisted in the migration from DMVPN to Cisco Viptela SDWAN, consisting of V-SMART controllers, V-BOND edge routers.

• Worked on implementing lab for SDN using Cumulus Linux for test-driving part of DC migration to SDN.

• Coordinating, documenting and managing cases and routing support calls with the Tier 1, Tier 2, and Tier 3 Support engineers at HPE and AT&T.

• Configure best route map configurations in the new Cisco IOS XR Routing Protocol Language (RPL).

• Supporting EIGRP and BGP supported network by partitioning level two & three issues of internal groups & external customers of all locations.

• Performing troubleshooting on slow network property problems, routing problems that involves OSPF, BGP and distinctive the foundation reason for the problems.

• Extensive active expertise with complicated routed local area network and WAN networks, routers and switches.

• Design and Building Software-Defined Data Center environment, including Vmware, VCenter, NSX and Cisco ACI.

• Hands-on expertise with Ether Channel, Spanning Tree, Trucking, ACLs, Syslog. Expertise with the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.

• Proficiency in configuration of VLAN setup on varied Cisco Routers and Switches.

• Work allotted tickets to see the purpose of failure and resolve issues remotely utilizing obtainable tools and different Operation Center resources.

• Monitor the network using cisco prime, HRping.

• Provide step-up support to L1 members of network team.

• Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

• Configured Windows Clusters, Windows NLB, H/W Load Balancers (F5, Netscaler). Deployed, configured and troubleshooting runtime errors related to .Net applications on 7.0/7.5 Web Servers and Windows Server 2008/2008 R2 in Dev, QA & Pre-prod environments. Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, Juniper SRX100, Fortinet Next Generation Fire Walls, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, VPN, Checkpoint, Cisco ASA, AWS, TCL, Riverbed, Clustered SQL server 2014/2012/2008R2/2008/2005, DC migration, Active-Active& Active-Passive Clustering, Windows 2012/2008R2/2008/2003 Client: Barclays May ’18– Jun’ 20

Location: Hyderabad, India

Role: Network Engineer

Responsibilities:

• Managing and configuring Cisco Switches and Routers independently.

• Managed VPN, IPSec, Endpoint-Security, status policy, and Application control, IPS, Monitoring, Anti-Spam, Smart Provisioning and DLP using Checkpoint Firewalls.

• Responsible for design and implementation/migration from Cisco wireless platform to Aruba wireless platform.

• Migration of existing IPSEC VPN tunnels from pre-Shared key to Certificate Authority for purpose of scaling.

• Design, support and configure Cisco legacy wireless and WLSE networks and devices using Cisco Prime.

• Standardized Splunk agent deployment, configuration and maintenance across a variety of UNIX and Windows platforms.

• Experience using Bash Shell, PowerShell and VMware-PowerCLI Scripting Tools.

• Implementation and troubleshooting of 802.11a/b/g/n technology with primary focus on Cisco Unified Wireless Network /Configure Aruba wireless Controller 7210

• Troubleshoot WAN, LAN, security, access, and Cisco wireless connectivity using BBSM for guest wireless access and Sniffer software for troubleshooting, Cisco Works, HP Openview, Tivoli or related tools.

• Experience with wireless survey tools (AirMagnet or Ekahau Site Survey).

• Experience with wireless survey methodologies for office, factory, warehouse, outdoor, and mesh designs.

• Maintenance and configuration of Cisco ASR1000 series and 7200VXR routers at data center and deployment of 3900, 3800, 2951 and 2821 for branch connectivity.

• Configuring and implementing F5 BIG-IP, LTM, GTM load balancers to maintain global and local traffic.

• Hands on experience with troubleshooting and configuring terminal servers.

• Experience in Cisco switches and routers: IP addressing, WAN configurations, LAN cabling in compliance with CAT6 standards.

• Implementation of Active Directory infrastructure and Network fundamentals, protocols (such as TCP/IP, DHCP, DNS), Group Policy and Profile Management.

• Co-ordinate with end users and departments in configuring special applications to use Active Directory authentication.

• Configuration and troubleshooting link state protocols like OSPF in multiple areas.

• Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches.

• Installed, configured and set security policies on Cisco and checkpoint firewalls, VPN.

• Experience working with Nexus 7010, 5020, 2148, 2248 devices.

• Monitoring Network infrastructure using SNMP tools HPNNM, Solar-winds and Opnet.

• Escalation of procedures and customer notifications.

• Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.

• Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.

• Configuring ASA Firewall and accept/reject rules for network traffic.

• Designing, implementing LAN/WAN configurations on Cisco 5K, catalyst 6500 switches.

• Experienced working on network monitoring and analysis tools like, SOLAR WINDS, CISCO works and SDWAN by Riverbed steelhead, L3VPN over network, multi-tenant segment routing, Cisco ASA firewall 9.x, OSPFv3, EIGRP classic and name-mode (wide metrics), VxLan, SDWAN, VRF and VRF-lite, VMWare NSXVDC.

• Modify and implement ACL changes on store routers and assist the user when there are any issues using Network Authority. Authentication to this is also done through TACACS.

• Expertise in maintenance of layer2 switching tasks which advocate VLAN, VTP, STP, RSTP, PVST, RPVST, configuring of ether channel with LACP and PAGP along with troubleshooting of inter-VLAN routing.

• Performed Network Security Assessment and implemented security improvements such as network filtering, SSH, AAA, SMTP, SNMP access lists, VTY access lists, EIGRP MD5 authentication, and HSRP authentication.

• Installing, configuring Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.

• Packet capturing, troubleshooting on network problems with Wireshark, identifying and fixing problems.

• Worked on Cisco ISE to prevent unauthorized access to the network.

• Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.

• Deploying Service Packs and Security patches bi-monthly on BGIT Application servers (Product Studio and VSTFS), which include windows 2008, 2012 R2 and MS SQL server 2008 and 2012R2 Servers.

• Implementing, configuring, and troubleshooting various routing protocols like RIP, EIGRP, OSPF, and BGP.

• Integrate with business owners and



Contact this candidate