Post Job Free
Sign in

Network Engineer Security

Location:
Austin, TX
Posted:
May 14, 2025

Contact this candidate

Resume:

Chandana Muddam

Sr. Network Engineer

**************@*****.*** 512-***-****

Professional Summary

Certified Network engineer with over 8 years of professional experience in Routing, Switching, Load Balancing, Network Designing, Security, Deployment, Configuring and Troubleshooting of multi-vendor equipment such as Cisco, Juniper, Arista, Palo Alto, Fortinet, Checkpoint, F5 and A10 Networks.

Worked on projects that include deployment of new devices, life cycle projects, migration from legacy to new solutions, Engineering, Operations, and Software upgrade procedures in various client environments.

Thorough Understanding of Switching and Routing protocols in Campus and Data Centers environments with multi-vendor equipment.

Experience in managing and securing remote access through designing and implementing various VPN technologies including IPsec, SSL, MPLS, Frame relay.

Extensive knowledge/experience in implementing, maintaining, and troubleshooting LAN/WAN, Network security including Cisco and Juniper devices to perform functions at the Access, Distribution, and Core layers.

Expertise with Python scripting using Netmiko and Jinja to implement config automation, audit checks, config drifts etc.

Recognized for performance excellence and contributions to success in network design projects. Strength in Cisco ISE and DNAC backed by extensive training in routing/switching.

Expertise in installing, configuring, and maintaining Cisco Catalyst 2960, 3560X,3750X, 3850, Cat 9K, 4500-X, 6509, Nexus 2k, 5K, 7K and 9K. Juniper Switches that include EX and QFX series. Aruba Campus Switches.

Experience with Interior and Exterior routing protocols that includes RIP, OSPF, EIGRP, IS-IS and BGP. worked on Cisco, Juniper and Arista routers.

Experience in implementing large scale OS deployments and migrations using endpoint management tools like SCCM, Altiris, Symantec Ghost, and LANDesk (Ivanti).

Knowledge and operational experience with SDN, Cisco ACI, VXLAN, VTEPS, VNI, Bridge Domain, Arista Cloud Vision, EVPN, MP-BGP, Spine and Leaf Architecture.

Extensive experience in configuring and troubleshooting of protocols RIP v1/v2, EIGRP, OSPF, BGP and MPLS and SDWAN and ACI.

Experience working on Spine Leaf Architecture with VXLAN overlay, BGP underlay. Implementation of VTEPS, VNI, Bridge Domains, Tenants, EPG, EVPN, Symmetric IRB. Configuration experience in Cisco ACI and Arista Cloud Vision.

Hands-on experience in Microsoft Teams Enterprise Voice, including Direct Routing, Calling Plans, and PSTN integration.

Experience with Zscaler Cloud Proxy Architecture with ZIA, traffic forwarding using GRE tunnels to Zcloud, Azure AD Authentication, Access policies, ZAPP. Experience migration from IronPort’s and Bluecoat Proxies to Zscaler.

Integrated Okta IAM solutions with network infrastructure to streamline secure access management, facilitating seamless user authentication and authorization across the enterprise network.

Enhanced network security by implementing Okta’s Multi-Factor Authentication (MFA) and IAM policies for critical network devices and applications, significantly reducing the risk of unauthorized access

Worked on Cloud platforms that include Azure, AWS and Meraki. Experience working with connecting multiple sites to cloud using SD-WAN solutions, Cloud Connections, Load Balancing and Security with Cloud traffic.

Skilled in deploying Microsoft Intune MDM for managing mobile devices, enforcing security compliance, and integrating with Azure AD.

Worked on AWS and Azure cloud configurations with respect to network connectivity and Security. Worked on configuring VNETs, Security Groups, Direct Connect, Express Routes, troubleshooting EC2 instances, Installation of Infoblox, Palo Alto firewalls in different AZs.

Worked on Campus Wireless environments with 1000+ access points, Wireless LAN controllers, Anchor Controllers, Authentication policies, BYOD policies, Integration with RADIUS. Experience with Aruba and Cisco WLAN.

Worked on Cloud platforms that include Azure, AWS and Meraki. Experience working with connecting multiple sites to cloud using SD-WAN solutions, Cloud Connections, Load Balancing and Security with Cloud traffic.

Utilized the CMDB to systematically track and manage network assets, configurations, and dependencies, leading to improved network reliability and streamlined change management processes.

Integrated the CMDB with network monitoring and management tools, automating data synchronization and improving the accuracy and timeliness of network configuration information, resulting in reduced downtime and faster incident resolution.

Experience with NAT/PAT, static and dynamic NAT, access lists, security zones, policies on SRX firewalls.

Experience with next gen firewall technology like URL Filtering, SSL Forward Proxy, APP ID, ThreatID etc. on Palo Alto and checkpoint firewalls.

Worked on Zscaler Private Access- ZPA for app based per user VPN. Experience with APP connectors, access policies, APP segments, LSS connectors in ZPA.

Maintaining and updating inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP, NTP.

Proficiency in the configuration and troubleshooting of Layer 2 technologies: VLANs, VTP, STP, RSTP and PVST.

Hands on experience with the Bluecoat Proxy and Infoblox for the DNS, DHCP, and IPAM (DDI).

Knowledge and hands-on experience on blue cat Servers to resolve DNS errors.

Experience in Network Management Tools and sniffers like SNMP, SolarWinds, HP-Open view, Wireshark and Cisco works to support troubleshooting issues

Experience and high-level understanding in application delivery controllers, local and global load balancing techniques, redundancy solutions, high availability options for mission critical internal, vendor and public facing applications. Experience with F5 LTM, GTM, APM, NetScaler’s, Cisco ACE and A10.

Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability

Experience in configuration of VLAN with private VLANS, Voice VLANS, Port security, STP and RSTP (802.1W), standard and extended access lists for managing access-based security, creating root views for administrative privileges.

Ability to manage all phases of network installation and administration.

Excellent customer management/resolution, problem solving and debugging skills with good verbal/written communications and presentation skills.

Good team player, excellent communication skills, analytical skills, and eagerness to learn new technologies.

Educational Details

Bachelor’s in Computer Science from Spoorthy Institute, Hyderabad

Master’s in Information Technology from Pittsburg State University.

Certifications

Cisco certified Network Associate (CCNA)

Cisco Certified Network Professional (CCNP).

CompTIA Network+.

Technical Skills

Switching Platforms: Juniper EX, QFX, Cisco Switches Catalyst 2800, 2900, 3750, 3500,4500, 6500,Cisco ACI, Nexus 9K/7K/ 5K/ 2K – vDC, vPC.

Routing Platforms: Juniper MX, SRX, ISRs/ ASRs/ VXRs/ GSRs family (1700, 1800, 2500, 2600, 3600, 3700, 4000, 7200 & 7600, Meraki MX.

Networking Terminologies: OSI Model, ARP, ICMP, TCP/IP, VLAN’s, Spanning Tree, DNS, DHCP, SNMP, SSH, Telnet, HTTP, IPv4, IPv6, GRE Tunneling, Ethernet, ATM.

Network automation: Ansible, GitHub, Puppet, C, Linux, XML API, NETCONF, YAML, JSON, Python, Perl, SD-WAN.

Virtualization: VMware NSX-V, NSX-T, vSphere 6.7, VXLAN, vRealize Orchestration, Site Recovery Manager, vCenter, Service Mesh.

Voice: SIP, POTS,INMP,CUCM 8.5,CUC,CER,PBX,VOIP,MGCP&H323 Voice gateways, Voice mail, Call accounting, Voice recording, IMPACT.

Load Balancers: F5 Big IP LTMs, GTMs, Big IP Virtual editionv12&v13 Riverbed Stingray, I Rules, Custom checks, Cisco ACE/ CSS LB, Open API.

Protocols: TCP,IP,OSPF, BGP, RIP, EIGRP, IGRP, IS-IS, IPv4/ IPv6, VTP, STP, PVST+, RSTP, MSTP, HSRP, GLBP, TCP/ IP, SCCP,PPP, HDLC, FTP, Telnet, SNMP, DHCP, DNS,SMTP, NTP, 802.1q,802.1D&802.1W, BPDU guard, PVST.

Network security: DMVPN, IPsec, Remote VPN, Blue Cat Proxy, Ivanti for patching, IKE, ISAKMP, HTTP, HTTPS, ACL, AAA, 2FA, Dell secure works, Defense center IPS/IDS, Source fire 3D3500.

Firewalls: Palo Alto, Cisco ASA 5585-X/ 5520, Site-site VPN, Web VPN, NAT, Juniper Net screen SSG/ SRX, Blue coat, Check point, Sonic wall.

Operating Systems: Linux, Unix, Windows 10

Network Monitoring: PRTG,HP Network Node Manager, Solar Winds, wire shark, Splunk, Net XMS, Microsoft Network monitor, Omni, NetScout.

Wireless devices: Cisco 5508, 4404 and WISM wireless controllers, Airo net access points, Aruba network wireless 3600&650 controllers, WCS.

Cloud: AWS, Azure and O365.

Documentation: Visio, Slack, Lucid charts, Web sequence diagrams, Jira.

Professional Experience

Client: AMC Networks, NYC NY January 2024 – Till Date

Sr. Network Engineer

Responsibilities:

Worked on varieties of troubleshooting related to network issues such as Security (IPSEC, NAT, UTM, ALG, Authentication)

Palo Alto design and installation (Application and URL filtering, SSL decryption, SSL Forward Proxy). Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls. Successfully installed PA-5000 series firewalls in Data Center as perimeter Firewalls.

Automated QFX fabric provisioning and configuration using Python, Ansible, and Junos automation scripts, ensuring zero-touch deployment and proactive monitoring.

Migration of Cisco ASA firewalls to PA Next-Gen Firewalls using migration tool in PA. Migrated all IPSEC tunnels, ACL’s, NAT rules and policies.

Configured Solar winds Network Performance Monitor(NPM) 10.5

Deployed a highly available Cisco infrastructure based on Cisco DNAC, Cisco ISE, switches, routers, and access points.

Experience working on Cisco ASR 9K, Nexus 7K and 9K. Configured and designed OSPF, EIGRP and BGP at Distribution and Core layers. Configured OTV layer 2 connection between Data centers on Nexus.

Hands on experience of SDWAN technology (VMware Velocloud, ATT Flex ware).

Hands on experience with Velo cloud SDWAN, Activation of new Edge through zero touch provisioning.

Worked on Juniper devices like M, MX routers on advanced technologies like MPLS VPNs, TE and other service provider technologies.

Experience with configuring BGP, OSPF in Juniper M and MX series routers. Worked on several BGP attributes like MED, AS-PATH, Local Preference for route optimization. Worked on Route-Reflector, Route-Redistribution among routing protocols.

Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240.

Managed AD Domain Controller, DNS and DHCP Servers and configurations.

Worked on Cisco ISE for user Authentication, Security Group Tags, MAC based authentication for Wireless and Wired users, 802.1X, EAP, PEAP etc.

Led the deployment of Microsoft Teams Enterprise Voice by configuring Direct Routing with certified SBCs (AudioCodes/Sonus) and connecting to the PSTN.

Responsible for the IPAM (IP Address management) system for a very large WAN/LAN network (QIP) using SolarWinds IPAM and Infoblox DNS and DHCP servers. Experience with DHCP scopes, IP reservations, DNS host entries, pointers, delegations, Zones, DNSSec etc.

Provides expert level security and networking knowledge in the planning, researching, designing, and testing of new networking technologies for perimeter firewall security, Intrusion Prevention/Protection System (IPS), DNS and DMZ security, and Internet Security in support of established Info Security program initiatives for the next 3 years.

Migrated 500+ users from legacy PBX and Cisco CUCM systems to Teams Calling Plans with minimal downtime.

Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2960, 3500,7600, 3750, 3850 series, 6500 series) Cisco Routers (4451, ASR 9K, 8000 series), Juniper Routers and Firewalls, Nexus 9K,7K,5K & 2k, F5 BIG IP, Palo Alto Firewalls, Zscaler Proxy and Versa SD-WAN appliances.

Migrated Nexus 7Ks, Nexus 5Ks to an ACI Fabric consisting of 9364C Spine and Leafs in a brownfield Datacenter.

Designed and implemented Auto Attendants, Call Queues, and Voice Routing Policies to improve call management.

Worked on PAC file updates, Internet proxy migration from IronPort to Zscaler cloud. Access policies, AD based, user based, location-based access. ZAPP client.

Worked on Bridge Domains, VXLANs, VTEPS, VNID. configuration of routing using BGP among multiple Leaf to spine switches. Thorough understanding of Application Profile, Tenants, End Point Group, Inter Subnet Tenant Routing, Routing within Tenants, Router Peering and Redistribution. Worked on Migration project from traditional Data Center Architecture to Spine Leaf.

Worked on connections handoff using Bridged Interface to an External Route. L3- EPG configurations, AEP configurations. Expert in GUI of ACI.

Worked on integrating existing Layer 2 and Layer-3 networks with ACI.

Designed and enforced IAM policies using Okta, improving compliance with security standards and reducing unauthorized access risks.

Conducted incident response and troubleshooting for IAM-related issues within Okta, resolving complex authentication and authorization problems swiftly and effectively.

Worked on network design improvements involving BGP, EIGRP, OSPF, IP metric tweaking and load balancing.

Worked on Checkpoint Firewall to create new rules and allow connectivity for various Applications. Checkpoint is used as an internal firewall for application security in Kodiak network.

Implemented Firewall rules and Nat rules by generating precise methods of procedure (MOPs). Responsible for packet capture analysis, syslog and firewall log analysis.

Experience with F5 load balancers LTM and GTM and reverse proxy design and setup. Migration from ACE to F5.

Troubleshot voice signaling issues (SIP, TDM) at Layer 1-7 using packet captures and circuit diagnostic tools.

Experience in F5, Cisco ACE 4710 Load balancers. Migration Experience from ACE to F5 and NetScalers to F5. Worked on critical applications on Layer 4 and layer 7 load balancing. Experience with Virtual server, Pool, Node, Profiles – TCP, http, https, ftp, fastl4, Persistence – Source IP, SSL, Cookie, SNAT, iRules, iAPP, SSL offloading.

Worked on the implementation of Infoblox DNS, DHCP, and IPAM (DDI) for the network.

Improved uptime of critical telephony services by proactively identifying and replacing failing circuits.

Experience with F5 GTM and in-depth knowledge of DNS, Global level load balancing, Wide IP’s, Zones, Prober pools, Delegation from Windows DNS server to listener IP.

VLAN implementation, Spanning Tree Implementation and support using PVST, R-PVST and MSTP to avoid loops in the network. Trunking and port channels creation.

Troubleshooting of Linux and Unix servers for application delivery servers. Install Dockers, Cisco and HP servers.

High-level network troubleshooting and diagnostic experience using Packet capture tools like Wireshark.

Designing, configuring, and troubleshooting QoS, SIP, H.323, RTP, SCCP, Session Border Controllers, Voice Gateways, Voice circuits IP /TDM, Cisco Telepresence Infrastructure, QoS, NAT, PAT, and multicast.

Worked on Riverbed steelhead appliance to troubleshoot delay, jitter issues. Captured traffic and analyzed for root cause. Wrote policies and rules in steelhead.

Integrated Cisco Voice Gateways with legacy PBX systems during migration to IP-based voice infrastructure.

Adding and modifying the servers and infrastructure to the existing DMZ environments based on the requirements of various application platforms.

Integrated Teams Voice with Microsoft 365 compliance features like Call Recording and E-discovery.

Assist in creating network design standards for hardware and software. Developing and maintain Network Documentation (Visio diagrams, Excel spreadsheets, Word documents, etc.) Configure and troubleshoot network elements in a test/dev environment.

Worked on Orion (Solar Winds) for mapping network diagrams, updated Orion with commissioned and decommissioned network devices.

Experience with configuration of Cisco call manager, Installing and worked on ICM management.

Developed and implemented comprehensive disaster recovery plans for network infrastructure to ensure business continuity.

Created and maintained documentation for disaster recovery procedures, including network configuration, backup strategies, and recovery steps.

Client: Eli Lilly, Ashburn VA September 2022 – December 2023

Sr. Network Engineer

Responsibilities:

Configuring and troubleshooting routers and switches Such as Juniper SRX and MX

Configured BGP load balancing and ensured stability of BGP peering interfaces.

High Performance Computing (HPC and Cloud Services) / Service Oriented Architecture.

Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.). Design of DMZ in primary and redundant data centers with Next Gen Firewalls, IPS/IDS sensors, Switching and routing.

Experience in deployment of Nexus 7010, 5548, 2148T, 2248 devices

Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for datacenter access architecture.

Experience configuring Virtual Device Context in Nexus 7010.

Installation and maintenance of Cisco Layer 3 switches 3750,4500X, 6500 in multi VLAN environment.

Maintenance and configuration of Cisco ASR1000 series and 7200VXR routers at data center and deployment of 3900, 3800, 2951 and 2821 for branch connectivity.

Involved in migration from Site-to-site GRE tunnels network to MPLS-based VPN for customer’s WAN infrastructure.

Monitored firewall health and interface traffic for Palo Alto, Cisco ASA/FTD, Fortinet, and Check Point firewalls using SolarWinds NPM, Nagios, and FMC/SmartEvent dashboards, enabling proactive response to network events and improving MPLS and VPN tunnel reliability across distributed WAN sites.

Deployed Microsoft Intune for MDM across 2000+ mobile and Windows devices to enforce corporate security standards.

Implementing security Solutions using Fortinet, Cisco 5580/5540/5520.

Migration experience from Cisco ASA 5500 to Fortinet.

Experience with RIVERBED Steelhead appliance for WAN optimization.

Configuring High Availability using Cluster XL on Checkpoint as well as VRRP and monitor the Sync status for tasteful replication of traffic between active and standby member.

Enabled enrollment for BYOD (Bring Your Own Device) and company-owned devices with dynamic group assignments.

Installed and configured Telecom circuits including E-fax services, PRI trunks, T1 lines, and analog fallback lines for high-availability environments.

Reduced mobile device security incidents by 30% after full rollout.

Basic configuration of Cisco Meraki Layer 2 and Layer 3 switches like MS 220, MS 320 and MS 420.

Migrated Checkpoint firewall architecture with new next generation Fortinet appliances serving as firewalls and URL and application inspection.

Configuring rules and Maintaining Fortinet Firewalls & Analysis of firewall logs using Forti Manager.

Successfully installed Fortinet 1801F, 2601F and 4800F firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.

Configured and maintained IPSEC and SSL VPN's on Fortinet Firewalls and also implemented Zone Based Firewall and Security Rules on the Fortinet Firewall.

Involved in Switching Technology Administration including creating and managing VLANS’s, Port security, Trucking, STP, Inter VLAN routing, LAN security etc.

Configured BGP, EIGRP and OSPF and Policy based Routing.

Configuring OSPF and Static routing on Juniper M and MX series Routers.

Coordinated with ISPs and telecom carriers to provision new voice and data circuits, ensuring SLA compliance.

Administration, policy management and reporting for CrowdStrike Endpoint Protection for on-prem and AWS devices/instances.

Implemented configuration drift detection using Python and Cisco APIs to compare running configurations against compliance baselines, ensuring network consistency.

Worked with our infrastructure team to deploy the CrowdStrike agent to all assets. Created IR plan and documentation.

Daily CrowdStrike tasks include Assessing alerts that are displayed within the CrowdStrike console.

Provide Tier II Load Balancer expertise on F5 Big IP Local Traffic Managers (LTM). Designing F5 solutions/support for migration work of applications and websites from Cisco ACE Load Balancers to the F5 Big IP Load Balancers.

Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches.

Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.

Configured Cisco 7200 routers which were also connected to Cisco ASA 5508 security appliances providing perimeter-based firewall security.

Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.

Configuring ASA 5510 Firewall and accept/reject rules for network traffic.

Extensive knowledge and troubleshooting in data communication protocols and standards including TCP/IP, UDP, IEEE 802.3, Token Ring, Cable Modem, PPPOE, ADSL, Multilayer Switching, DoD standards.

Managed the F5 Big IP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs

Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes and route filtering using Route-maps.

Working knowledge of juniper SRX240, SRX220 and SRX550 series Firewalls

Design and configuration of OSPF, BGP on Juniper Routers and SRX Firewalls.

Led integration projects, incorporating Okta with various cloud and on-premises applications, ensuring seamless SSO (Single Sign-On) and MFA (Multi-Factor Authentication) experiences.

Successfully deployed and managed Okta for enterprise-level IAM, enhancing security and streamlining user access across multiple applications.

Administering checkpoint firewall - manipulating policies, troubleshooting, Firewall change requests

Involved in End-to-End development, design, and requirement Analysis.

Installation and Configuration of Cisco switch 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control list implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of the port channel between core switches and server distribution switches.

Manage Cisco Routers and troubleshoot Layer 1, Layer 2,and Layer 3 technologies for customer escalations.

Monitoring network performance using Logic Monitor tool, Load Balancing experience (Citrix NetScaler).

Executed recovery operations following network failures or security breaches, including system restoration and data recovery.

Analyzed post-incident reports to identify root causes and improve disaster recovery processes.

Uber, San Jose CA January 2021 – June 2022

Sr. Network Analyst

Responsibilities:

Installation, configuration and maintenance of Cisco Routers like 2600, 2800 and 3600 series.

Developing and maintaining the baseline Cisco IOS. Provide upgrade instruction to the Network O&M team on new Cisco IOS.

Designing Networks for voice and data networks over LAN and WAN. Designing, Implementing and Managing WLAN Distribution Network.

Installing and configuration and troubleshooting of various Cisco switches like 2900 series, 2950 series, 3550 series, Nexus 5000 and Nexus 7000 series and Juniper EX series.

Experience working with implementing and configuring checkpoint VSX for security gateways.

Configuration of checkpoint firewalls in MDS and VSX environment. Worked with creating firewall policies.

Configuration, Troubleshooting and Maintenance of firewalls PA200, PA2000 series, PA3000 series, PA4000 series, PA 5000.

Designed and supported VoIP and TDM circuit installations including SIP trunks, PRI lines, T1 links, and analog circuits for enterprise locations.

Installed and configured Cisco Meraki (MR66, MR18) wireless Access points in the warehouse.

Troubleshooting Cisco routers, APs, Switches, Fortinet Devices and Meraki appliances.

Working with carrier Ethernet technologies like L2vpn, VPLS, VPWS. Operating, administrating, managing & testing of carrier Ethernets.

Conducted SIP and RTP packet analysis using Wireshark for troubleshooting call quality and latency issues.

Used F-5Load balancers to increase capacity (concurrent users) and reliability of applications.

Configuring, troubleshooting, and managing Networks of over 1000 devices by monitoring health of routers, switches and load balancers and working with team to fix any configuration or hardware issue.

Configuring and monitored different monitor modules F5 BIG-IP LTM F5 and DNS traffic Management.

Implemented QoS (Quality of Service) for prioritizing VoIP traffic and reducing jitter across WAN links.

Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come online or that may have been altered during various planned network changes on the network.

Experience on managing Network-based Intrusion Detection/Prevention Systems (IDS/IPS).

Working on Wi-Fi Portfolio by Configuring and Troubleshooting Wireless Access Points (WAP) and Wireless Controllers (WLC) for limited connections issue In Wireless Local Area Network (WLAN)

Microsoft, Seattle WA October 2018 – December 2020

Network Engineer

Responsibilities:

Worked on 2900, 3900, 7613 Routers, implemented OSPF and BGP and performed route filtering and route manipulation by applying distribute-lists, route-maps & offset lists.

Translating Cisco IOS Route maps to Cisco IOS XR Routing policies.

Configuring HSRP between the 3845 router pairs of Gateway redundancy for the client desktops.

Upgrading the IOS on the ASA 5550, 5585 and have done IOS upgrades on Cisco routers and switches.

Involved in Configuring and implementing of Composite Network models consists of Cisco7600, 7200, 3800 series and ASR 9k, GSR 12K routers and Cisco 2950, 3500, 3550, 3750, 5000, 6500 Series switches.

Mutual redistribution of OSPF and BGP routes using route maps for WAN optimization.

Configuring VLAN, STP, VSTP, SNMP on EX series switches.

Working Knowledge and demonstrated experience with the Cisco Firepower Next Generation Firewall (NGFW).

Worked on the configuration of VPN tunnels for the DMVPN and remote access on the Cisco ASA firewall.

Worked on the configuration of QoS, URL filtering, and other features on the Cisco ASA firewalls.

Creating object, groups, updating access-lists on Check Point Firewall, apply static, hide NAT using smart dashboard.

Experience working with migration from 4500 series devices to 6500 Series switches in Campus deployments at Core and Distribution Layers.

Configuring High Availability using Cluster XL on Checkpoint as well as VRRP and monitor the Sync status for tasteful replication of traffic between active and standby member.

Provided tier 3 support for Check Point and Cisco ASA Firewalls to support customers, Backup and restore of checkpoint and Cisco ASA Firewall policies.

Monitoring Traffic and Connections in Checkpoint and ASA Firewall.

Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls.

Worked with team on the migration from Citrix NetScaler to F5 Load Balancer.

Experience in the deployment & Troubleshooting F5 Load Balancer Includes BIGIP Series 5050V, 10000V, 8900, 6900, and 3900.

Experience on F5 BIG-IP LTM 11.2, F5 BIG-IP GTM, F5 BIG-IP APM and F5 BIG-IP ASM and configuring virtual server and load balancing in F5 Networks BIG-IP LTM.

Worked on F5 Load Balancer for managing F5 LTM Application Load Balancing.

Worked on the implementation of Inflobox DNS, DHCP, and IPAM (DDI) for the network.

Assisted Voice team in the configuration of Cisco Unified Communications Manager (CUCM).

Hands on experience with the working of protocols such as SIP, RTP, RTSP, IGMP, and IP Multicast for supporting the Voice, Data, and Video networks.

Assisted the networking team on the installation of 7800, 6900, and 3900 series IP phones.

Moved Core switches and several non-Cisco devices under strict deadlines without compromising the existing parameters to maintain network functionality.

Advanced command line troubleshooting on Checkpoint, Fortinet Firewalls, Palo Alto NGFW.

Upgrading system images on Nexus 5k and 7k multi-layer switches using kick start and FTP server.

Worked on the configuration of BGP and advertisement of routes to the ISP network.

IPSoft, Bengaluru India September 2016 – October 2018

Network Admin

Responsibilities:

Implementing Local Area Network Solutions and its remote support.

Network Troubleshooting, basic system & Network Security support 24x7.

Configured F5 hardware load balancers to work with WebLogic Server.

Worked on Cisco routers 2600, 2800, 3700, 7200 and Cisco switches 3550,4500, 2900, 4900.

Key contributions include troubleshooting of complex LAN/WAN infrastructure that include.

Configured firewall logging, DMZs, related security policies and monitoring.

Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.

Creating groups, users, and policies in Active Directory.

Troubleshoot and support Cisco Core, Distribution and Access layer routers and switches.

Documenting and Log analyzing the Cisco PIX series firewall.

Configured BGP for CE to PLINUXE route advertisement inside the lab environment.

Networking: TCP/IP, Troubleshooting client network connectivity in SIMS Buildings, DNS Troubleshooting, Remote Access - Virtual Private Network (VPN).

Built IPsec based Site-to-Site VPN tunnels between various client locations.

Maintenance and troubleshooting of connectivity problems using Ping, Trace route.

Managed the IP



Contact this candidate