Post Job Free
Sign in

Network engineer

Location:
Edison, NJ
Salary:
55
Posted:
April 04, 2025

Contact this candidate

Resume:

Tulasi Konam

Sr. Network Security Engineer

Ph. No: 908-***-****

Email: *************@*****.***

Professional Summary:

11+ years of professional experience in planning, implementing, configuring, troubleshooting of networking system on Cisco, Palo Alto, AWS, Juniper, and Google Cloud. Expertise in Networking, Security, Administration and Network support.

Troubleshot various issues relating to adjacencies in OSPF, advertising of networks in Border routers through BGP, fine-tuning network parameters for efficient convergence and uptime.

Designed and implemented Google Cloud solutions to facilitate scalable and efficient cloud-based infrastructure for applications, data storage, and computing resources.

Hands-on experience on Cisco Catalyst (3850, 3650, 6500) series switches, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers, ASA Firewall (5505/5510), Load Balancers using Cisco ACE, F5 LTM/GTM, Security Device Manager (SDM), Cisco Works, HP Open View, Solar Winds, Sniffer, Palo Alto Networks Firewall models (PA-2k, PA-3K and PA-5K).

Worked on configuring the Nexus 5K Aggregation Switch and Nexus 2K Fabric Extenders. And Implemented VDC, VPC, and OTV on the Nexus 5K and 7K switches. Hands on experience on Up-gradation of Cisco IOS & Firmware of different Cisco devices & modules.

Experience in implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether-channel (LACP), RSTP, and MST. Strong knowledge of networking concepts like TCP/IP, Routing and Switching.

Participated actively in proof-of-concept projects implementation which included storage and backup solutions from private cloud providers Amazon AWS & Microsoft Azure.

Designed and implemented VMware NSX-T solutions to establish and manage virtualized networks, delivering enhanced network agility, security, and scalability in complex multi-cloud and hybrid cloud environments.

Designed, implemented, and managed Cisco ACI solutions to streamline network operations and enhance data center efficiency through centralized policy-driven automation. Hands on experience in implementation and deploying BIG-IP F5 LTM, GTM load balancers for load balancing and network traffic management for business applications.

Deployed and managed virtual machines using VMware vSphere, ensuring high availability and optimal performance.

Experienced with Cisco Unified Communication Portfolio, Cisco Unified Communications Manager (CUCM), (CUCME).

Proficient in working with various SD-WAN vendors, including Cisco, VMware, Fortinet, and others, to meet specific business needs.

Experience in configuration of Palo alto firewalls like PA2020, PA3050, PA5050. Migration of Palo Alto firewalls from ASA.

Worked on Application traffic security with WAF, F5 ASM, F5 APM for Authentication, Citrix NetScaler’s for ICA proxy, Citrix VDI, Microsoft Office 365, Azure AD, AWS, Zscaler Cloud-based proxies, Cisco IronPort, and Blue Coat proxies.

Implementing, configuring, and troubleshooting Cisco Wide Area Application Service (WAAS) for wan bandwidth optimization.

Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS).

Experience in Designing and assisting in deploying enterprise-wide Network Security and High Availability Solutions for ASA.

Migration with both Checkpoint and Cisco ASA VPN. Migrated Virtual Machines and applications from on-premises cloud to AWS.

Provided administration and support on Bluecoat Proxy for content filtering and internet access between site and VPN client users.

Experience in Data Center Design with Cisco Nexus in troubleshooting of DNS, DHCP and other IP conflict problems.

Proficient in using Solar Winds Network Management tools like Network Performance Monitor (NPM), NetFlow Traffic Analyzer, Putty, and Cisco Prime Infrastructure. Experience in configuration of AAA with ACS protocols TACACS+, RADIUS and LDAP.

Expertise in deployment and configuration of routing protocols such as OSPF, EIGRP and BGP.

Experience in Layer 3 Routing Protocol configurations: OSPF, BGP, EIGRP and MPLS.

Experience in Layer 2 routing Protocol Configurations: ARP, ATM/FRAME RELAY.

Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway with other vendor security appliances devices.

In depth knowledge with network mplsing and performance tools such as Solar Winds, Wireshark, Nagios.

Strong hands-on experience implementing and troubleshooting Switch technologies such as STP, RSTP, MSTP and VTP along with troubleshooting of inter-VLAN routing. Experience in Wireless LAN (IEEE 802.11) and deployment of light weight access point.

Hands on Experience configuring and testing F5 I Rules using Browser (IE), HTTP watch.

Knowledge of network security protocols such as IPSEC tunnels, GRE tunnels, NAT/ PAT, ACLs, and VPN– MP-BGP.

Experience with configuring Spanning Tree Protocol, BPDU Guard, Port-Fast, Up-Link Fast, Trunking (dot1q and ISL) and Ether channel on Campus Network Design Architecture.

Managed Google Cloud Platform (GCP) services, including Google Compute Engine, Google Cloud Storage, Google Kubernetes Engine, and Google App Engine, to support the development and deployment of various applications and workloads.

Strong hands-on experience on configuring Cisco Catalyst 2900,2960, 3560, 3750, 4500, 4900, 6500 series and Nexus 7000, 5000 and2000 switches. Worked on various blades like IDS/IPS, URL filtering on Cisco ASA.

Working knowledge of routing protocols for voice: VoIP, IPSEC, Multicast, MPLS, DSCP/QoS, Cisco IOS and Wireless security protocols (I.E., 802.1x, EAP, WPA2). Experience with Solar Winds Orion monitoring.

Worked on Enterprise security implementation and support using Cisco Pix/ASA Firewalls (515 /525 & 5510, 5520), Fortinet Firewalls 3950B/ 3810A/Enterprise 5000 series, Checkpoint R80.20/R80.10/R70.30 and Palo Alto Firewall. Skillful on Radius and TACAS protocols (AAA), security vulnerability & sniffing tools like: Nmap, TCP dump, Ethereal.

Experience in installation, configuration, and Administration of windows server 2003/2008, Active Directory, Linux, Unix OS under various LAN and WAN environment.

Technical Skills:

Routers

Cisco Routers series 7600, 7200, 3900, 3600, 2800, 2600, 2500, 1800; Cisco ISR series 1900, 2900, 3800, 4000; Cisco ASR series 900 and 1000; Juniper T1600, MX2020, M10i, M120, J2350, J4350

Routing Fundamentals and Protocols

Routed and Routing protocols EIGRP, OSPF, BGP, IPX; MPLS, IPv4, subnetting, VLSM, Static routing, ICMP, ARP, HSRP, VRRP, Route Filtering, Multicast, 802.11, Policy Based Routing, Redistribution, Port forwarding.

Switch Platforms

Cisco Catalyst series 2960, 3560, 3750, 3850, 4500, 6500, 7000; Nexus series 2K,

5K, 7K; Juniper EX3300, EX4200, EX4600

Switching Fundamentals and Protocols

Ethernet technologies, LAN networks, MAC, VLAN and VTP, STP, PVST+, Multicast,

RSTP, Multi-Layer Switching, 802.1Q, Ether Channel, PAGP, LACP, CDP, HDLC, RARP

Firewall Platforms

Juniper Net screen 6500, 6000, 5400, Juniper SSG, SRX5600, SRX5800, Checkpoint (NGX, R65, R70 and R71), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo Alto Networks (PA series 2K, 3K,5K)

Security Protocols

Standard and Extended ACLs, IPsec, VPN, Port-security, SSH, SSL, IKE, AAA, Prefix-lists, Zone-Based Firewalls, NAT/PAT, Ingress & Egress Firewall Design, Content Filtering, Load Balancing, IDS/IPS, URL Filtering, L2F, IDS, TCP Intercept, Router Security, SNMP trap.

Network Management and Monitoring

Wireshark, HP Open View and NNMi 8xi, Cisco Prime, Security Device Manager (SDM), Cisco Works; TCP Dump and Sniffer; SolarWinds NetFlow Traffic Analyzer, Network Performance Monitor (NPM), Network Configuration Manager (NCM)

Load Balancers

F-5 (BIG-IP) LTM 2000, 3900, 6400, 6800, Bluecoat SG8100, AV 510, Citrix NetScaler, GTM

Networking Protocols and Fundamentals

DHCP and DNS server, Active Directory Management, NTP, NDP, TCP, UDP, FCP, Network Implementation, Troubleshooting techniques, NHRP, NetBIOS, NFS, FTP, TFTP, HTTP, PAP, PPTP, SIP Trunking, SNMP logging, SMTP, RADIUS and TACAS+, PBX servers, SDN, SAN

Operating Systems

Windows 10/7/XP, MAC OS, Windows Server 2012R2/2008/2003, Linux, UNIX

Wireless Technologies

Canopy Wireless Devices, D-Link Point-to-point Wireless, D-Link APs, CISCO 1200 series APs, Aruba wireless and APs, Cisco Meraki, Linksys Wireless/Wi-Fi Routers

Professional Experience:

State Street Bank, Boston, MA Aug 2021 - Present

Senior Network Engineer

Orchestrated complex network projects encompassing Palo Alto Firewalls, Cisco Nexus switches, and Arista solutions, emphasizing advanced VPN technologies and dynamic routing protocols. Successfully managed network security, troubleshooting, and administration, ensuring seamless data flow and optimal performance across various network elements, including wireless access points and load balancers.

Responsibilities:

Hands-on technical experience working with VPN technologies like (IPSEC, SSL VPN, and DMVPN,)

Responsible for the implementation, organization and operation of Palo Alto Firewalls based on perimeter security network (PA-3020, PA-5220). Create and maintain documentation of standards, best practices for supported technologies.

Working knowledge of dynamic network routing protocols such as EIGRP, OSPF and BGP.

Implemented and configured Nagios for comprehensive monitoring of network services, servers, and applications, ensuring proactive issue identification and resolution.

Worked on wireless controller upgrade 5508 and involved in cisco Prime infrastructure upgrade as well.

Leveraged Cisco ACI's policy-based automation framework to simplify the deployment of network services and applications, reducing manual configuration efforts and ensuring consistent policy enforcement.

Supported and administered with 3750 and 3850 stacks, ISR WAN 4551-X, 4331 and CSR routers.

Skilled in integrating SD-WAN solutions with cloud platforms like AWS, Azure, and Google Cloud for enhanced connectivity.

Troubleshoot remote access services like Citrix NetScaler, Cisco VPN clients and for the users to access their enterprise network.

Planning, designing and implementation of moving DMZ’s on FWSM’s to ASA’s by creating Multi-Context Environments on the ASA.

Utilized Google Cloud's networking services, such as Virtual Private Cloud (VPC) and Cloud Load Balancing, to establish secure and high-performance network configurations, ensuring reliable connectivity and traffic management across cloud-based environments.

Utilized NSX-T's micro-segmentation capabilities to create and enforce granular security policies, effectively isolating workloads, and applications to prevent lateral movement and unauthorized access within the network.

Collaborated with cross-functional teams to develop and maintain Ansible-based infrastructure as code (IaC) practices, fostering collaboration and alignment between development and operations.

Proficient in implementing traffic engineering and load balancing through SDN controllers for optimal resource utilization.

Involved in LAN, WAN development (including IP address planning, designing, installation, configuration, testing and maintenance).

Deployed Impulse network access controller and policies to prevent unknown devices from connecting to the internal network.

Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls. Deploying of Cisco ISE on Nexus 5000/7000 routers, Cisco switches, and Cisco ASA and Firepower firewalls.

Executing RADIUS pre-deployment tasks like ISE setup, loading templates into Cisco Prime.

Configured and maintained the Application Policy Infrastructure Controller (APIC) to orchestrate network policies, simplify network segmentation, and enable seamless integration with various virtualization and cloud platforms.

Implemented Google Cloud's data analytics services, such as BigQuery and Dataflow, to process and analyze large datasets, extracting valuable insights and supporting data-driven decision-making.

Involved in Switching Technology Administration including creating and managing VLAN’s, Port security, Trunk, Inter-VLAN routing, LAN security etc. Configured HSRP and VLAN trunk 802.1Q, VLAN routing on catalyst 6500 switches.

Implementing and Maintaining Network Management tools (Solar Winds, Zenoss, Infoblox, IPAM).

Designed, validated, and implemented LAN, WLAN & WAN solution to suite client’s needs.

Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.

Automated configuration using Ansible to streamline and standardize system setups across multiple servers and environments.

Implemented Google Cloud's storage solutions, including Cloud Storage and Cloud SQL, to ensure secure and efficient data storage and retrieval for various applications.

Providing Level-2/3 support and troubleshooting to resolve issues and I have been on 24/7 on-call rotation support.

Work on Nexus 7010, 9396,5548, 5020, 2148, 2248 devices, configuring vdc, fex pinning, fex port-channel, port-channel, peer keep alive, peer link. Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers.

Working knowledge and providing support with Cisco Nexus 7K, 5K, 2K, VPC, VDC, Port-channels and 802.1q trunks.

Worked as lead engineer for VPN performance to identify client bandwidth issues and worked for VPN bandwidth capacity planning for Super bowl event. Responsible for troubleshooting network and firewall problems, specifically Palo Alto and Cisco ASA’s.

Created network diagrams and proper documentation for the network architecture.

Investigated and resolved technical issues related to VMware virtualization, ensuring smooth and uninterrupted operations.

Implemented dedicated VLAN ID for all trunk ports, set user ports to non-trunk, and deployed port security, when possible, for user ports for layer 2 security. Network security including NAT/PAT, ACL, and ASA/SRX/Palo Alto/Fortinet Firewalls.

Configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.

Designing and implementing data center networks using Arista solutions for high performance and reliability.

Proficient in implementing SDN solutions with Arista switches to improve network agility and automation.

Integrated NSX-T with VMware vSphere and other cloud management platforms to streamline network virtualization across various virtual infrastructure components, facilitating seamless communication and orchestration between virtual machines and the underlying network architecture.

Successfully designed and deployed secure guest Wi-Fi networks with Cisco Meraki access points.

Experience with Cisco ACI on VXLAN’s, VTEPS, VNID’s, EVPN, Bridge Domains, Tenants, Application profiles, Contracts etc. on ACI. Thorough understanding of Spine Leaf Architecture.

Configured and maintained VPCs with 7010/7018 and 5548 in the network and maintained VDCs in 7k switches, maintained VRFs in those separate VDCs. Paired Nest devices on IPv6 Thread mesh network manually and using Python automation scripts.

Upgrading the IOS on Network Devices including cisco 6800, 6500 and Palo Alto VM-300 devices.

Designed and maintained Palo Alto Network's Next-Generation Firewall (NGFW) policies, ensuring compliance with industry best practices and regulatory requirements.

Worked on ACE, A10 load balancers. Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability. Effective project management skills in Aruba technology deployments.

Environment: Cisco routers, Cisco switches, Juniper Switches, Juniper Routers, F5 ADC, ASR 9000, Juniper SSG-140, Cisco Nexus Switches, Checkpoint Firewall. Nexus (7k, 5k, 2k), cisco Meraki, Cisco firewall (5525-X, 5545-X), Cisco campus switches (4500, 6508-XL), Cisco catalyst switches (3850, 9300), SolarWinds, GTM, FortiGate firewalls (60E, 80E, 100E), Infoblox, routing protocols (EIGRP, OSPF, BGP), GCP, Ansible.

State of MD, Remote Nov 2019 – Jul 2021

Network Engineer / Network Security Engineer

Executed comprehensive network infrastructure projects involving the configuration of Cisco Nexus switches, Palo Alto firewalls, and Zscaler cloud proxies, ensuring seamless data protection and secure network operations. Facilitated successful deployment and migration of various security solutions, including Cisco ISE, AWS, and Juniper, while actively participating in network automation and configuration management using Python scripting and Ansible. Additionally, contributed to the smooth transition from EIGRP to OSPF setup and the establishment of robust BGP peering configurations..

Responsibilities:

Configured Nexus 7010 including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer links.

Worked on Palo Alto firewalls (50+ firewalls Pairs) PA-2050, PA-3050, PA-5020, PA-5050, PA-5060 series.

Experience with network segmentation using Palo Alto firewalls for traffic filtering and applying policies on central manager.

Working on Deploying and migrating customer to Zscaler Cloud Proxy.

Collaborated with cross-functional teams to integrate VMware solutions with existing infrastructure, facilitating seamless operations and enhanced productivity.

Provided training and support to network teams on Cisco ACI best practices and methodologies, ensuring a smooth transition to the new networking paradigm and maximizing operational efficiency.

Utilized Zabbix for real-time monitoring of networks, servers, and applications, enabling the detection of performance bottlenecks and ensuring system stability.

Created Terraform modules and templates to standardize infrastructure configurations and promote code reusability, streamlining the deployment process and facilitating the management of complex infrastructure environments.

Worked on ASA 8.x and Cisco FWSM 2.x/3.x upgrades and network refresh projects and troubleshooting IOS Security Configurations, IPsec VPN implementation and troubleshooting DMZ/ASZ Implementation and Troubleshooting.

Worked on configuration of ACLs in Cisco 5540 series ASA firewall for Internet Access requests for servers in LAN and DMZ and for special user requests as authorized by management.

Integrated and evaluated Cisco ACI, VMware NSX, and Arista CVX SDN solutions

Implemented URL policies, URL Categories, Cloud policies in Zscaler.

Leveraged NSX-T's VPN features to establish secure, encrypted connections between on-premises data centers and public or private cloud environments, ensuring secure data transmission and communication between distributed resources.

Configured Ansible for continuous integration and continuous deployment (CI/CD) pipelines, enabling the automation of the entire software delivery process.

Utilized Google Cloud Platform (GCP) services such as Compute Engine, App Engine, and Kubernetes Engine for the deployment and management of scalable and reliable applications.

I have used DLP technology works by identifying sensitive data in need of protection, and then protecting it.

Configured PRTG Network Monitor to oversee network infrastructure, bandwidth usage, and device health, ensuring the smooth and efficient operation of critical systems.

Key contributions include troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.

Involved in Scoping new layer 2 and layer 3 devices like Meraki wireless switches as per client's requirements and testing them to meet the organization standards before deployments

Troubleshooting path control by checking ACLs, Prefix-List, Vlan-access-list, Distribute-list, Route-Map and analyzing the traffic flow by using packet capture feature (Wireshark).

Developed automation scripts and templates using Google Cloud Deployment Manager or Terraform to facilitate the deployment and management of infrastructure as code (IaC).

Implemented Contracts, Multi-tenants between Endpoint groups using SDWAN in ACI.

Perform data migration from on premises environments into AWS.

Managed infrastructure as code using Terraform's version control system, enabling collaboration among team members, and ensuring the maintenance of a centralized and synchronized configuration repository for infrastructure deployments.

Created new servers in AWS using EC2 instances, configured security groups and Elastic IPs for the instances.

Function as part of a Firewall and Security team in support of Cisco Firewalls, Zscaler Proxy, Juniper Portals, SecAuth, Open LDAP, and Active Directory. Designed and implemented virtual infrastructure solutions using VMware technologies, including VMware ESXi, vCenter Server, and vSAN, to support business-critical applications.

Migrating 4000+ UDN (Utility device Network) to cisco ISE in the first phase of the project. Second phase is to migrate 6000+ ODN (Operation device Network) to ISE.

Collaborated with cross-functional teams to design and implement complex network topologies and service chaining using Cisco ACI, supporting the diverse needs of various business applications.

Interacted with Network SME for the NextGen Datacenter Cloud Architecture, using Cisco ACI and Nexus. Working with Cisco Account team onsite for creating and testing the POC.

Designed 10/40-gigabit networks using Cisco Nexus 9000 series switches, and Cisco 3800 series routers.

Replaced Checkpoint VPN and Bluecoat proxy with Zscaler and worked on deploying Zscaler in Production.

Experience with convert Cisco ASA VPN rules over to the Palto Alto solution. Migration with Cisco ASA VPN experience.

Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN.

Supported the Data center network infrastructure consisted of multiple Nexus 9Ks, 7Ks, 5Ks, 2Ks, FWs, Security systems, F5, and VMware environment by maintaining and deploying new technologies.

Ability to work with end users to troubleshoot and solve their Pulse Secure VPN problems.

Configuring and managing F5 ASM (Application security manager). Developed security policies.

Created documents for various platforms including Nexus 9K,7k and ASR1k enabling deployment of new devices on the network.

Configured and managed SolarWinds for network performance monitoring and diagnostics, facilitating the optimization of network infrastructure and minimizing downtime.

Provided design and Contrail SDN/NFV networking support using Cisco ACI, Cisco wireless controllers, Open-Stack.

Handled Service-Now tickets related to Cisco ASA & Zscaler, & VPN along with the connectivity issues and provide support to issues.

Implemented High Availability (HA) configurations using Palo Alto firewalls, ensuring continuous network uptime, and minimizing the risk of network downtime due to hardware failures or maintenance activities.

Creating or Modifying Firewall rules on Cisco 5555, 5520 and Palo alto VM-300 devices.

Involved in deployment of Meraki SDWAN solution across the corporate offices.

Conversion of the existing environment from an EIGRP to OSPF setup to facilitate the migration of Core from Cisco to Juniper.

Maintained Palo Alto Firewalls Creating zones, adding rules and maintained the policies on PA 220series,3020,522

Worked along with a team on the network automation through Ansible.

Environment: Python Scripting, Ansible, Palo Alto Firewalls, Cisco ISE, Juniper, Ansible, NSX, SecAuth, Arista, Meriki SDWAN, VMware, Cisco ASA, Cisco ISE, Zscaler, AWS, Azure, GCP, Nexus, LDAP, Wireshark, ACLs, DMZ, Nexus.

Oracle, Seattle, WA Jun 2017 – Oct 2019

Network Security Engineer

To establish enterprise-wide information-security program; oversee companywide efforts to identify and evaluate all critical systems. Design and implement security processes, procedures, and presenting results to senior management. Develop curricula and facilitate awareness training. Supervise daily activities of Computer Security Assistant and Internet Administrator. Data center wide IOS refresh for multi-vendor equipment.

Responsibilities:

Extensive involvement in designing and implementing Virtual Switching System VSS for both User segment and server segment utilizing 6509-V-E catalyst switches.

Configured and managed VMware clusters for high availability and fault tolerance, minimizing.

Handling configuration, monitoring, and troubleshooting of Cisco's PIX firewall and ASA 5500.

Managing VPN IPSEC and GRE migrations and creating new designs for clients, alongside configuration and troubleshooting of the Network Routing protocols BGP and EIGRP during migrations and new client connections.

Active support provided on Cisco Nexus 5000 and Nexus 7000 Series Switch fabric links.

Implemented and managed global traffic management (GTM) solutions to distribute network traffic effectively across multiple data centers or cloud regions.

In-depth experience with Checkpoint Firewall policy provisioning, ensuring high resource availability with F5 BIG-IP Load balancer for diverse load balancing needs.

Leveraged Terraform's state management capabilities to track and manage the state of infrastructure resources, enabling efficient updates, modifications, and deletions of resources while maintaining consistency and integrity within the infrastructure.

Conducted regular health checks and performance monitoring of the Cisco ACI fabric, identifying potential issues, and implementing proactive measures to maintain optimal system performance.

Integrated Ansible with cloud platforms such as AWS, Azure, and Google Cloud to automate the provisioning and management of cloud

Implemented Google Cloud Monitoring and Logging to proactively monitor system performance and identify potential issues, ensuring timely resolution and minimizing downtime.

Implemented Google Cloud's data management and analytics tools, including Big Query and Dataflow, to enable the processing, analysis, and visualization of large datasets, facilitating data-driven decision-making processes and insights. Stayed informed about the latest developments and updates within the Google Cloud ecosystem, actively participating in training and certifications.

Administering Check Point and Cisco ASA firewalls, including physical assembly of Firewalls, IDS/IPS, and Nexus 7ks, and assisting in Data Center Rack-n-stack operations.

Configured and managed virtual networks, subnets, and firewall rules in Google Cloud to establish secure and high-performing networking architectures.

Provided technical support and troubleshooting for Palo Alto devices, resolving complex network issues for seamless operations.

Contributed to the development of Terraform automation scripts and playbooks for continuous integration and continuous deployment (CI/CD) pipelines, enabling the automation of infrastructure deployments and updates to support agile development practices and DevOps principles.

Design installation, management, and routine upgrades of VMware infrastructure.

Configuring network access servers for AAA Security using Juniper IC Intranet Controllers MAG-SM360, MAG-4610.

Hands-on in Data Center Design, installation, and Configuration of Network Devices, including cable patching in the Patch Panel.

Integrated Terraform with management tools to automate software deployment and streamline infrastructure orchestration.

Expertise in configuring routers and switches in various network configurations supporting VLANs, QoS, VoIP, and access-lists.

Implementing VLANs with 802.1q tagging, along with configuration of Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.

Implemented Graylog for centralized log management and analysis, facilitating the aggregation and visualization of log data for comprehensive system monitoring and troubleshooting.

Configuring VDC, VPC, and FCOE, and upgrading NX-OS for Nexus Family Switches, specifically working on Port Groups on M series Module and F Series Module for Nexus 7000.

Handling and troubleshooting various OSPF issues in an OSPF multi-area environment, as well as configuring various BGP attributes such as Local Preference, MED, Extended Communities, Route-Reflector clusters, Route-maps, and route policy implementation.

Setting up Bluecoat SG9000 WAN acceleration appliances, including WCCP, CIFS, and creating/updating overlays, while implementing IDS/IPS on dedicated IDS/IPS 4260 and software-based IOS based IPS on Cisco 1921.

Orchestrated infrastructure deployments using Terraform, enabling efficient provisioning and management of cloud resources across multiple platforms.

Utilized Palo Alto's User-ID feature to enforce granular access controls based on user identity, enhancing the overall security posture, and minimizing the risk of unauthorized access.

Utilized Datadog for cloud-scale monitoring and analytics, providing visibility into the performance of cloud infrastructure, applications, and logs for effective troubleshooting. Working on Juniper T-Series, M-Series, MX-Series, J-Series, and SRX-Series Routers, including experience with JUNOS OS on Juniper Routers and Switches.

Involved in Configuration of Access lists ACL on checkpoint firewall for the proper network routing for the B2B network connectivity, alongside troubleshooting of OSPF, BGP, and EIGRP.

Implemented Terraform best practices and guidelines for securing and managing sensitive information within Terraform configurations, ensuring the protection of credentials, access keys, and other confidential data used for infrastructure provisioning.

Experienced in BGP Route Reflectors deployment and Removal of BGP from the core, and testing various BGP features such as as-override, Local preference, MED, AS-PATH, and EBGP load balancing.

Proficient in working with ACE and F5 load balancers, including troubleshooting IOS related bugs based on history and appropriate



Contact this candidate