Post Job Free
Sign in

Network Engineer Communication Systems

Location:
San Diego, CA, 92101
Salary:
$75
Posted:
July 30, 2025

Contact this candidate

Resume:

Mounika Koritala

+1-815-***-****

*******************@*****.***

Sr. Network Engineer

PROFESSIONAL SUMMARY:

·Over 9+ years of experience in Networking, including hands - on experience in providing network support, installation and analysis for broad range of LAN/WAN/MAN communication systems.

·Expertly managed and supported a wide range of LAN/WAN/MAN communication systems, enhancing network reliability and performance.

·Successfully deployed Gigamon appliances onsite to meet specific network requirements and objectives.

·Configured and troubleshot complex routing protocols including MP-BGP, OSPF, LDP, EIGRP, RIP, and BGP v4 on Cisco IOS/IOS-XR/NX-OS and Juniper JUNOS platforms.

·Implemented and maintained Data Center environments using Cisco Nexus series (9K, 7K, 5K, and 2K), focusing on VPC, VDC, and FabricPath technologies.

·Designed, implemented, and troubleshot network solutions using Cisco Routers (2800, 2900, 3900, 3800, 7600) and Cisco Catalyst series switches.

·Configured gateway redundancy protocols such as HSRP, GLBP, PPP, and SNMP to ensure high availability and failover capabilities.

·Managed IP addressing and DNS configurations using Infoblox and SolarWinds, enhancing network management efficiency.

·Added new networks and configured DHCP ranges using Infoblox, streamlining network expansion and support.

·Demonstrated expertise in the installation, configuration, and troubleshooting of various Cisco routing and switching equipment.

·Developed Tier II ISP Routing Policies and architected robust network infrastructures based on thorough knowledge of IP subnetting, VLSM, TCP/IP, NAT, DHCP, and DNS.

·Implemented TACACS+ and RADIUS for network access control, significantly improving security posture and access management.

·Assisted in deploying network security and high availability solutions across enterprise environments using Cisco ASA and other security technologies.

·Provided remote support for Citrix NetScalers, Cisco CSS, and F5 LTM/GTM series, ensuring optimal performance and availability.

·Created and applied iRules using Tickle Script on F5 BIG-IP virtual servers for service port inspection and redirection, enhancing custom network application delivery.

·Deployed QKview files on iHealth for enhanced monitoring and proactive management of network health.

·Troubleshot complex network issues on Citrix NetScaler, CSM, and F5 LTM, addressing service disruptions and optimizing configurations.

·Exhibited expert-level troubleshooting capabilities for static and dynamic routing protocols, resolving intricate route table issues and optimizing network routes.

·Advanced understanding of the TCP/IP and OSI models, applying this knowledge to improve network designs and troubleshooting methodologies.

·Provided Layer 3 support for Cisco ASA and Palo Alto firewalls, enhancing security measures and response capabilities.

·Conducted extensive work on Cisco ASA 5500 series firewalls, migrating PIX firewall rules to Cisco ASA configurations.

·Converted VPN rules from Checkpoint and Juniper over to Cisco ASA solutions, integrating RSA Secure IDs for VPN token distribution.

·Developed and implemented access rules on ASA firewalls in line with PCI requirements and managed DMZ environments.

·Configured Juniper firewalls, establishing rules and address objects within Junos Space for secure network zones.

·Upgraded PIX firewall OS from version 6.3 to 7.0 and performed migrations to ASA firewalls, maintaining continuity and security.

·Utilized network monitoring tools such as Packet Sniffer, TCP DUMP, Wireshark, Cisco Works, and Riverbed to analyze and optimize network traffic and performance.

TECHNICAL SKILLS:

Category

Technologies and Tools

Networking Technologies

LAN/WAN Architecture, TCP/IP, SD-WAN, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP

Networking Hardware

Cisco Switches, Cisco Routers, ASA/Pix Firewalls, Palo Alto, VMware NSX, Cisco Meraki, Gigamon-TA10, HC2 Devices

Routing Protocols

OSPF, IGRP, EIGRP, RIP, MPLS, IS-IS, BGP, Multicasting

Security Technologies

PAP, CHAP, Cisco PIX, Cisco ASA, Fortinet, Blue Coat, Zscaler

Network Monitoring

Cisco DNA Center, SolarWinds, Nagios, StealthWatch, Wireshark, Zabbix, Splunk

Operating Systems

Windows 10, Linux (Ubuntu, CentOS), Cisco IOS, IOS XR, macOS

Routers

Cisco 2600, 2800, 3600, 3800, 7200, Juniper M & T Series, Cisco CRS-1, CRS-3, GSR

Load Balancers

Cisco CSM, F5 BIG-IP, Citrix Netscaler, AWS Elastic Load Balancing, Azure Load Balancer

Capacity & Performance

IXIA, Spirent, Cisco Works, IPerf, IXChariot, NetFlow Analyzer

Switches

Nexus 9k, 7k, 5k, 2k, Cisco 2900, 3500, 3850, 4500, 5000, 6500, 9300, Aruba Switches

Switching

LAN, VTP, STP, PVST+, RPVST+, Inter VLAN Routing, Multi-layer Switch, EtherChannels

Gateway Redundancy

HSRP, GLBP, VRRP

Firewalls

Juniper SRX, NetScreen (500/5200), Cisco Firepower, Palo Alto Networks, McAfee Web Gateway, Check Point (15400, 12k Series)

AAA Architecture

TACACS+, RADIUS, Cisco ACS, RSA SecurID, Duo Security

Features & Services

IOS Features, IPAM, IRDP, SNMP, SYSLOG, NTP, DHCP, DNS, TFTP, FTP Management, Ansible, Terraform, Puppet

PROFESSIONAL EXPERIENCE:

Client: FHLB,Whittier, CA Jan 2024 to Till date

Role: Sr. Network Engineer

Roles & Responsibilities:

·Administered Nexus 9K, 7K, 6K, 5K, and 2K FEX switches and Cisco Catalyst 3560 switches, ensuring optimal network performance.

·Deployed and decommissioned VLANs on core ASR 9K, Nexus series, and downstream devices, enhancing network segmentation.

·Configured 2K, 3K, and 7K series Cisco routers to support complex network topologies.

·Managed a network lab environment that included a variety of routers and L2/L3 switches to simulate real-world network configurations for testing.

·Configured and maintained Cisco 2500, 2600, 2800 series routers and 1900, 2900, 3560, 3750 series switches.

·Implemented Spanning Tree Protocol (STP) configurations such as PVST and RSTP to prevent switching loops.

·Set up VLANs for data and voice services and enforced port security to prevent unauthorized network access.

·Deployed EIGRP on Cisco 2600 and 2800 routers and configured static routing on 3750 switches to streamline network traffic flow.

·Managed RA and L2L VPNs using IPsec, GETVPN, SSL Anyconnect, and webvpn methods for secure remote access.

·Implemented Quality of Service (QoS) on Provider Edge (PE) and Customer Edge (CE) devices based on predefined templates to prioritize traffic.

·Automated firewall rule deployments and configurations using Python scripts, enhancing security measures efficiently.

·Performed stacking and firmware upgrades on 3550 and 3750 series switches to maintain hardware integrity and feature set.

·Administered intranet and extranet services over an MPLS backbone, troubleshooting connectivity issues between sites.

·Conducted VLAN migrations and configured High Availability settings on ASR 9K pairs using HSRP and Ethernet Bundling.

·Configured Layer 2 & Layer 3 interfaces and port channels on Nexus 9508 switches for improved bandwidth and redundancy.

·Managed software upgrades and downgrades on Cisco 3850, 3750, and 9300 series switches to align with network requirements.

·Supported network load balancing and WAN acceleration using Citrix Netscalars, F5 LTM/GTM, and BIG-IP solutions.

·Applied F5 best practices, including iHealth checks, SSL offloading, and managing route domains and GTM Sync Groups.

·Collaborated with major vendors like Cisco, Palo Alto, Juniper, and others to maintain a stable and secure network environment.

·Designed and implemented data center technologies such as VPC and VDC on Nexus 7010 Core Switches to optimize data center operations.

·Handled network outages and change implementations to resolve issues related to timeouts, latency, and asymmetrical routing.

·Configured and managed virtual private networks and instances on Azure, and secured applications on AWS and Azure platforms.

·Utilized network and security management tools like JUNO Space, NSM, and Panorama for comprehensive network monitoring and management.

·Upgraded catalyst switches and managed image files using third-party tools like WinSCP to ensure correct firmware installations.

·Designed and configured OSPF and BGP on Juniper routers and SRX firewalls, establishing secure and efficient network routes.

Environment:Cisco Nexus,9K,7k,6K,5k, Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 / 7200/3845/3600/2800 routers, Cisco ASA5510, Firepower, Juniper,PaloAlto, 2248/3560/5020/6509 ASA, Checkpoint, F5 LTM/GTM, LAN, OSPF, BGP, RIP, EIGRP.

Client: StateFarm, Boerne, TX Sep 2021 to Dec 2023

Role: Network Engineer

Roles & Responsibilities:

Configured Cisco Nexus 7010 Core Switches with Virtual Port Channel (VPC) and Virtual Device Contexts (VDC) to enhance data center capabilities.

Implemented Nexus 2000 Fabric Extenders (FEX) as remote line cards for Nexus 5000 series switches to optimize data throughput.

Upgraded network infrastructure by stacking and updating Cisco 3550 and 3750 series switches, improving network efficiency and resilience.

Regularly managed Palo Alto and Juniper firewall technologies, addressing daily operational tickets and ensuring network security.

Conducted a comprehensive migration of enterprise network firewalls from Juniper to Palo Alto, enhancing network security protocols.

Played a pivotal role in launching the Spectrum Mobile project, providing L2 technical approval for critical network changes.

Administered a multi-vendor network environment including Cisco ASA, Juniper JUNOS, and Fortinet firewalls, maintaining high connectivity standards.

Installed Palo Alto PA-3060 firewalls in Data Centers and provided Level 3 support for routers, switches, and firewalls.

Managed F5 (LTM) Load Balancers to optimize local and global traffic routing and switching, improving application delivery.

Executed network protocols such as OSPF, BGP, DHCP Profiles, HSRP, IPV6, and Bundle Ethernet on ASR 9K routers for enhanced redundancy.

Automated network configuration deployments using Python scripts, reducing manual intervention and potential human errors.

Troubleshot and configured VLANs, VTP, STP, Trunking, and EtherChannels to support complex network setups.

Designed and implemented LAN/WAN configurations on Cisco Catalyst 6500 switches and ensured proper routing protocols like OSPF, EIGRP, and BGP were in place.

Updated and verified NX-OS operations across network devices to ensure reliability and up-to-date functionality.

Oversaw security solutions implementation using Palo Alto PA-5000/3000 series, Cisco ASA, and Checkpoint firewalls.

Configured and maintained network security measures including ACLs on wireless networks and managed associated access points.

Designed and administered network security strategies involving Palo Alto, Pfsense, and Cisco's SourceFire, strengthening intrusion detection and prevention.

Set up and troubleshoot both Site-to-Site and Remote Access VPNs on Cisco ASA and Checkpoint firewalls, securing remote communications.

Advanced threat defenses were proactively provided through Cisco ASA configurations, stopping attacks in DMZ environments before propagation.

Collaborated with the level-2 support team to deploy and install Palo Alto firewalls, ensuring seamless network integration.

Participated in firewall review meetings to approve changes, maintaining network integrity and compliance.

Designed and configured secure Virtual Private Cloud (VPC) architectures in AWS, linking private and public networks securely.

Analyzed and resolved complex networking and firewall issues, particularly with Juniper and Palo Alto devices, utilizing NSM and Provider 1 management stations for effective network management.

Environment:juniper SRX Firewalls, Juniper NSM Firewalls, Palo Alto firewalls, Panorama,Cisco 4400/7200/3900/7600 Routers, Cisco3650, 6800/6500/3560 Switches, Nexus 7k/5k RIP, OSPF, BGP, EIGRP, LAN, WAN, Gigamon,CISCO ASA 5500, HSRP, VRRP, GLBP, VLAN, QoS, Wireshark, Solarwinds.

Client: Peraton(CMS), Jackson, MI Jun 2020 to Aug 2021

Role: Network Engineer

Roles & Responsibilities:

Designed and implemented network infrastructure upgrades using Cisco Nexus 9000 series switches and ISR 4000 series routers to enhance enterprise network performance.

Configured and managed high-availability environments using Cisco's Application Centric Infrastructure (ACI) and SD-Access for streamlined operations across data centers.

Led the migration of legacy load balancers to advanced F5 BIG-IP Local Traffic Manager (LTM) systems, enhancing load balancing capabilities and network efficiency.

Deployed Palo Alto Next-Generation Firewalls (NGFWs) for improved network security, intrusion prevention, and traffic visibility across corporate and branch locations.

Administered cloud-based network strategies using Cisco Meraki for centralized management of wireless networks, security appliances, and mobile device management.

Managed Virtual Extensible LAN (VXLAN) implementations on Nexus switches for scalable network segmentation and reduced broadcast traffic.

Utilized SolarWinds Network Performance Monitor for real-time network monitoring, performance analysis, and proactive fault identification.

Performed network automation tasks using Ansible and Python scripts to streamline configurations, backups, and updates, reducing manual intervention by 30%.

Engineered and maintained Software-Defined Wide Area Network (SD-WAN) solutions to optimize connectivity and bandwidth management between multi-cloud environments.

Executed security protocols and configurations including SSL/TLS, VPNs, and IPSec to secure data transmission across networks.

Enhanced network resilience and disaster recovery strategies by configuring and testing Cisco HSRP and VRRP for failover capabilities.

Upgraded and maintained enterprise DNS, DHCP, and IPAM using Infoblox to improve IP address management and network reliability.

Conducted network analysis and troubleshooting using advanced Wireshark techniques and packet capture tools to diagnose and resolve complex network issues promptly.

Implemented Quality of Service (QoS) policies on Cisco routers and switches to prioritize critical applications and ensure bandwidth allocation meets business requirements.

Oversaw the decommissioning of outdated VLANs and network devices, ensuring a streamlined and updated network infrastructure.

Collaborated with IT security teams to enforce network security measures, including configuring firewalls, IDS/IPS systems, and conducting regular vulnerability assessments.

Transitioned network operations to a hybrid cloud model using VMware NSX to facilitate seamless integration between on-premises and cloud-based resources.

Coordinated with vendors and stakeholders during major network projects to ensure specifications and timelines were met.

Provided technical leadership and mentoring to junior network engineers and support staff, enhancing team skills and performance.

Documented all network configurations and changes in a comprehensive manner, maintaining compliance with industry best practices and regulatory standards.

Environment:Cisco,Juniper m5, m7, mx104, mx480, ex4200, ex4600, srx240, MAG. Cisco ASA 500, Checkpoint, Palo alto, windows server 2003/2008: Palo Alto, checkpoint, F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP,VRRP.

Client:PK Technoworld, India Sep 2017- Nov 2019

Role: Network Engineer

Roles& Responsibilities:

·Configuring Static, IGRP, EIGRP, BGP and OSPF Routing Protocols on Cisco1600, 2600, 2800, 3600, 7300 series Routers.

·Responsible for entire company network infrastructure that includes Cisco Switches, Routers, Firewalls, Access Points, Servers and PBX.

·Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.

·Vast knowledge of WIN OS/MAC OS services, directories/sub-directories, and networking services.

·Working experience with Load Balancers F5 LTM like 3900, 6900, 4200V over various environments.

·Worked on configuration, maintenance and administration of Palo Alto PA3000,5260,7000.

·Firewalls and migrating our environment from Cisco ASA to Palo Alto.

·Allocation and designing appropriate virtual IP for F5 ADC through IPAM InfloBox.

·Handling various trouble tickets, firewall rule changes, assisting other teams to bring the device to production, making DNS changes in InfloBox and routing changes.

·Firewall Design and Implementation Cisco ASA 5506, 5508, 5515 Palo Alto.

·Proficient in design, implementation, management and troubleshooting of Check Point Security Gateways (including GAIA), Palo Alto Firewalls as well as Cisco ASA firewalls.

·Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between Switches.

·Implemented Positive Enforcement Model with the help of Palo Alto Networks.

·Worked on Enterprise scale Management Platforms Multi-Domain Security Smart console on Checkpoint as well as Panorama on Palo Alto and Cisco Security Manager CSM for Cisco ASA.

·Experience with deploying Fabric Path using Nexus 7k Devices.

·Designed & Deployed Cisco ISE 1.2/1.3 for Enterprise RADIUS Authentication with Active Directory, RSA Secure ID, Proxy Radius Services to Cisco ACS and Radiator Radius.

·Troubleshoot Network flow and application performance with Wireshark Gigamon and net flow.

·Gigamon configuration for map updates on new TAP ports, Gigamon OS upgrades from v2.8 to v4.7.DoS.

·Ability to analyze, configure and troubleshoot networks Configuring and deploying Cisco NAC & Cisco ISE.

·Troubleshoot end-to-end call flow issues in enterprise market involving various VoIP elements.

·Configuring VLANs/routing/NATing with the firewalls as per the network design.

Environment:Cisco 2948/3560/4500/3560/3750/3550/3500/2960/6500 Switches and Cisco 3640/1200/ 7200/3845/3600/2800 routers, Cisco 1200 Aironet Access Points, Cisco Nexus 7K/5K/2K, Cisco ASA 500, Checkpoint, Gigamon, Palo Alto, windows server 2003/2008: F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP.

Client: Eclerx Service LTD, India Jun 2015- Aug 2017

Role: Network Administrator

Roles & Responsibilities:

·Troubleshoot traffic passing managed firewalls via logs and packet captures.

·Configured and resolved various OSPF issues in an OSPF multi area environment. Managed fast Layer 3 switched/routed LAN/WAN infrastructure as a part of Network team.

·The LAN consisted of Cisco campus model of Cisco 3550 at access layer, Cisco 6513 at distribution/core layer.

·Worked with telecom vendors in regards to network fault isolation. Hands-on experience with WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing Protocols (BGP/OSPF), and IP addressing.

·Configured CIDR IP RIP, PPP, BGP and OSPF routing. Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, MPLS, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.

·Management and Deployment on Checkpoint Firewall.

·Use Checkpoint to establish Point-to-Point tunnels.

·Ability to use NAT and Firewall security policies in Checkpoint.

·Experience In working on Configuring Multicast.

·Identify, design and implement flexible, responsive, and secure technology services Modified internal infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.

·Deployed 7613 as PE and CE router and Configured and troubleshoot the Edge Routers.

·Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems.

·Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.

·Experience with implementing and maintaining network monitoring systems (Cisco works and HP Open view) and experience with developing complex network design documentation and presentations using VISIO.

·Estimated Project costs and created documentation for project funding approval.

Environment:Net Flow, TACACS, EIGRP, RIP, OSPF, BGP, VPN, MPLS, CSM, SUP720, Ether Channels, Cisco 7200/3845/3600/2800 routers, Fluke and Sniffer, Cisco 6509/ 3750/3550/3500/2950 switches, Checkpoint firewalls (SPLAT).

Education:

·Bachelor of Technology (B.Tech) in Information Technology from Anna University Tamil Nadu, India. - 2015



Contact this candidate