Bharath Parupalli
Ph : 203-***-****
https://www.linkedin.com/in/p-bharath-562248bb/ *******************@*****.*** PROFESSIONAL SUMMARY:
● Around 7+ years of experience in IP network design, network integration, deployment, automation and troubleshooting.
● Extensive knowledge in configuring and troubleshooting Layer 3 Interior and Exterior Gateway Routing protocols such as OSPF, EIGRP and BGP.
● Provided on-call support for network systems, ensuring 24x7x365 availability and timely resolution of critical issues.
● Regularly updated SOPs to reflect new technologies, configurations, and operational changes, ensuring compliance with corporate and regulatory requirements.
● Conducted business continuity testing for critical network infrastructure to ensure minimal downtime during disaster recovery scenarios.
● Configured and deployed switch stacking on Cisco Catalyst series to ensure high availability and redundancy across network layers.
● Implemented Multi-Factor Authentication (MFA) solutions to enhance security for network access, integrating with Cisco ISE and firewall policies
● Applied knowledge of telecommunications standards and protocols in the design and implementation of network architectures.
● Gained familiarity with FAA and TSA networking standards through research and collaboration with industry experts.
● Thorough experience in configuring Virtual Local Area Networks (VLAN) with IEEE 802.1Q, VLAN trunking protocol (VTP), shortest path bridging, Multiple VLAN Registration Protocol and VLAN Cross Connect (CC).
● Strong hands-on experience on Cisco Catalyst (series 3850, 3560, 4500, 6500), Cisco Nexus (series 2K, 5K, 7K), Cisco Routers (series 7300, 4000, 3800, ASR 9000), Firepower (4100), Load Balancers (Citrix NetScaler, Cisco ACE,F5 BIG-IP LTM/GTM, Virpion), IDS/IPS (HIDS, NIDS, NIPS, HIPS), Fire eye, Splunk, Palo Alto Networks Firewalls (PA- 820, series PA-3K, 5K), Checkpoint IP Appliances (NXG R60, R70, 3100, 5900), FortiGate (7060E and 7030E)
● Experience in working with Cisco Nexus Switches like 5000, 7000 and 9000 series and configuring VDC, VPC, VRF, and OTV on the Nexus switches.
● Thorough understanding and experience in IDF/MDF Architecture, Data center Architecture and Spine Leaf Architecture.
● Migration from local cloud to hybrid cloud architecture with AWS, Azure. Exposure to Cloud Migration experience to Azure, AWS. Experience with EC2 instances, Security policies. Experience in Python Scripting for Network Automation.
● Migration Experience from Cisco ACS to Cisco ISE.
● Experience on EVPN, MLAG, Symmetric and Asymmetric routing in Spine Leaf, VXLAN, VTEPS, VNI, MAC flood lists updates using BGP Route distinguishers, RT1,2,3 and 5 updates.
● Installed, configured, deployed Network Virtualization (NSX) VMware platform for the software defined data center.
● Proficient in monitoring and managing networks using SolarWinds NetFlow Traffic Analyzer, Network Performance Monitor (NPM), Network Configuration Manager (NCM); SAM, IP Address Manager, Additional Polling Engine, Cisco Prime, Security Device Manager (SDM), Cisco Works; Infoblox, HP OpenView, and Wireshark.
● Knowledge and configuration of redundant router protocols like HSRP, VRRP, and GLBP.
● Experience in testing Cisco routers and switches in lab scenarios and deploy on site for production.
● In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, NAT, DHCP, DNS.
● Design interfaces, define integration workflows and solutions using vArmour products and other systems within the customer environments
● Experience in migrating from metro ethernet to MPLS circuit for the remote site connectivity.
● Completed project to evaluate Cisco Next-Generation Firepower 4100 Series security appliances for both the virtual Firepower Threat Detection and the Virtual ASA modules to increase security in a production environment
● Hands on experience with IXIA Packet generator. Developing TCL scripts for automation
● Implemented traffic filters using standard and extended access-lists, distribute-lists and route maps.
● Provided support that included resolving day-to-day operational issues with tickets generated by a server.
● Good understanding of SNMP, IP SLA and Network Monitoring with experience in tools like PRTG. Experience For Senior Cisco Wireless Network Engineer Resume
● Experience with Aruba WLAN infrastructure in large scale global deployments.
● Experience with 802.1x, RADIUS, EAP-TLS WLAN standards
● Experience with TCP/IP internals and the ability to analyze packet captures
● Experience with 1100, 1200, 3 700and 3800 series cisco Wireless Access Points TECHNICAL SKILLS:
● Routers & Switches: Cisco Routers (3800, 2800, 2500, 2400 Series), Cisco Switches (6500, 4500, 2960,
● 2950, 2924,3700, 3500), Juniper EX43XX, QFX1XXX series, Cisco NX 9k, ISR, CRS, GRS and ASR
● Protocols:TCP/IP, IS-IS, EIGRP, BGP, HSRP, IPSec, VPN, DMVPN, QoS, Multicast, dot1q, STP, VLANS, VTP,WLAN, DNS, DHCP, ARP, SNMP, NetFlow, TACACS+, VRF,
● Cisco vPC, Ethernet
● Networking: Cisco Routing/Switching, Azure, Office 365
● Operating Systems:Windows 2000/2003/2008/12 Servers, Linux, IOS, AAA Architecture: TACACS+, RADIUS, LDAP, Cisco ACS
● Firewalls & VPN: Checkpoint Firewall UTM Series, Cisco 5500 Series ASAs, FirePower, PALO ALTO firewall
● VoIP Technologies: TDM, PRI, T1, analog, eFax
● Devices: Polycom RealPresence, VVX phones
● UC Products: CUCM, CUC, CME, CER, VCS, Jabber
● Wireless Equipment: Cisco Wireless LAN Controllers (WLC) 4400 Series (4402 & 4404) 5500 Series, (5508), Cisco Aironet Wireless Access Points (1200 3500 Series).
● VMware: ESXi 5.1/4.2, VMware vSphere, VMware Workstation 8, VMware view, Virtual Desktop
● Interface.
● Applications: MS Office 2003/2007- Word, Excel, Power Point, MS Outlook, Outlook Express,Opnet,, Bluecoat, Riverbed, NetBrain.
● Security: Checkpoint Firewall UTM/NGX Series and Cisco PIX 500 Series and Cisco 5500 Series ASAs,
● IPS, IDP
● Juniper Devices: Juniper EX2200,3300,4200 model Switches and MX5,MX10, MX40 model Routers.
● OS & Database: Windows, Linux/Unix, IOS, GAiA, Oracle, SQL
● Programming : C, Java, Python, Shell
CERTIFICATION:
● Cisco Certified Network Associate (CCNA& CCNP).
● Palo Alto Certified Network Security Engineer (PCNSE)
● Aruba Certified Mobility Associate (ACMA)
● Aruba Certified Design Associate/Professional (ACDA/ACDP)
● Network Automation Professional Certificate by Arista Networks EDUCATION:
● Bachelor's degree
Electrical and Electronics Engineering.
GITAM Deemed University Jun 2014 - Apr 2018
● Master’s degree
Computer Science & Information Technology
Sacred Heart University Jan 2022- March 2023
PROFESSIONAL EXPERIENCE:
BEACON INDUSTRIES,NEWINGTON March 2025 – Present
Cloud Network Engineer / Hartford
Responsibilities:
● Installed, configured, maintained, and troubleshot Cisco ASR 1K, 7200, 7750, 7950, 3925E, 2951E routers, and Cisco Catalyst 9000 series, 6500, 4510, 4500-X, 4948, 3560X, 3750X, and 2960S switches for production deployments.
● Efficiently utilized Cisco Nexus 9K, 7K, 5K, and 2K in managing and deploying data center switch upgrades to a 10GB infrastructure, implementing new virtual port channel technology.
● I worked on data center deployment projects, converting from Cisco 6500 to Nexus 9K and upgrading to ACI mode.
● Expert in troubleshooting production issues, resolving incidents, and changing tickets related to ACI.
● Implemented Cisco Application Centric Infrastructure (ACI) using Spine and Leaf architecture for data centers.
Deployed Azure foundational infrastructure, including support for Teams voice traffic and SIP integration with Ribbon and AudioCodes SBCs.
● Monitored VoIP and TDM circuits, using tools like SolarWinds, Cisco Prime, and NetBrain to ensure service continuity.
● Managed VoIP gateways (AudioCodes, Cisco) and configured call routing logic for high-availability voice failover.
● Troubleshoot WAN-related issues, including OSPF, EIGRP, and BGP routing and design.
● Configure Versa SD-WAN devices on Dell hardware as a process of replacing the border routers with Versa SD-WAN software devices.
● Work on day-day troubleshooting calls which include SD-WAN, firewall issues primarily, along with routing and switching as a part of operational team.
● Supported EIGRP, OSPF, and BGP-based networks by resolving Level 2 and 3 problems for internal teams and external customers across all locations.
● Deployed Cisco routers and switches, including 9200, 7200, 3800, 3600, 3500, 4500, and 5500 series.
● Provided root cause analysis and advanced troubleshooting for Teams voice call failures and SBC routing issues.
● Maintained fax servers and integrated eFax solutions for hybrid communications in regulated environments.
● Implemented PowerShell scripts for Intune automation, user/device management, and voice route provisioning.
● Experience with Cisco ASA 5585-X with Firepower, configuring firewall rules, IPsec VPN, NAT, Active-Standby Failover, OSPF, and AnyConnect VPN technologies.
● Designed, configured, and implemented site-to-site VPN on Cisco ASA 5585-X firewalls.
● Responsible for designing and building Azure foundation setups.
● Configured and managed NetScaler High Availability (HA) setups, ensuring seamless load balancing and content switching.
● Troubleshoot security issues related to Cisco ASA and Cisco FTD firewalls; configured and maintained Cisco ISE for authentication, authorization, and accounting.
● Expertise in VLAN, BGP, VXLAN, and GRE on Juniper and Arista platforms.
● Skilled in developing and implementing automation scripts and APIs.
● In-depth understanding of dynamic routing protocols and network topology design.
● Deployed ISE in a wired environment to perform Dot1x port-based authentication and change of authorization for users.
● Executed code upgrades from version 11.5.1 HF4 to 11.5.4 on F5 LTMs.
● Configured F5 GTM solutions, including Wide IP (WIP), Pool Load Balancing Methods, probers, and monitors.
● Managed the installation, configuration, maintenance, and administration of Cisco ASA, Cisco FTD, and Fortinet firewalls.
● Configured and monitored various Fortinet firewall models (100E, 200E, 600D, 900D, 1500D, 3980E, 5001E).
● Utilized Forti Manager to manage large-scale firewall deployments and Forti Analyzer to collect logs from all FortiGate firewalls.
● Implementation, configuration and troubleshooting of Checkpoint Firewall R77.
● Build Site to Site VPNs with Business partners and vendors using Checkpoint on our side with various platforms on the remote side.
● Helped in creating BDs in Cisco ACI that are mapped to Vlan’s in Network centric migrations.
● Worked closely with Nexus 9K migration team in planning of Cisco Application Centric Infrastructure (ACI) implementation as a solution for data centers using a Spine and Leaf architecture.
● Worked, configured, and troubleshot Cisco ACI, Layer 2/Layer 3-out, BGP and OSFP.
● Configured and monitored F5 BIG-IP LTM and DNS traffic management; employed Zscaler ZTNA to replace Cisco AnyConnect VPN.
● Successfully deployed Arista switches, including the Arista 7000 series, for core and edge networking, improving network performance.
● Established and maintained BGP peering relationships with multiple Internet Exchange Points (IXPs) for optimal routing and redundancy.
● Executed scheduled changes on the Aruba OS 8. X platform and ClearPass Policy Manager.
● Assisted the infrastructure team with installing 60 Cisco 3700 series APs throughout the building.
● I used Aruba Airwave and ClearPass Insight for report analysis, contributing to informed decision-making.
● Implemented BGP policies using communities, route tagging, as-path filters, local-pref, and MED.
COMCAST USA, MOUNT LAUREL April 2023 – Feb 2025
SR Network Engineer / New Jersey, US
Responsibilities:
● Supports the architecture, design, development, qualification and deployment of applications consistent with product and technical roadmaps.
● Works with engineering project management and principal engineers to deliver applications that meet or exceed product requirements, project schedules and reliability.
● Develops and applies performance and bandwidth models for interactive applications to document network impacts.
● Designed, deployed, and managed SD-WAN solutions (e.g., Cisco Viptela, VMware VeloCloud, Fortinet, Silver Peak) for multiple small and large businesses those implemented by the commacst business.
● Supported SBC/SBA (Session Border Controllers and Survivable Branch Appliances) to manage SIP trunk routing and high availability for Teams voice services.
● Successfully implemented SD-WAN architecture to replace legacy MPLS or VPN solutions, improving performance and reducing costs by X%.
● Managed end-to-end SD-WAN deployment, from initial planning and configuration to troubleshooting and optimization.
● Configured and maintained SD-WAN routers, controllers, and edge devices across multiple branch locations.
● Monitored and maintained SIP trunk circuits, addressing latency, jitter, and call drops using Wireshark and Intune analytics.
● Deployed Intune Company Portal to streamline mobile onboarding and policy compliance across devices.
● Configured, deployed, and maintained FortiGate firewalls across multi-site enterprise networks, improving perimeter security and traffic control.
● Managed Intune MDM/MAM policies for corporate mobile devices (iOS/Android), enabling secure access to organizational resources.
● Provided the full Implementation services on ISE, ASA 5500X & Palo Alto Next generation firewall and Prime.
● Integrated Intune with Microsoft Defender and Conditional Access policies for hardened endpoint security.
● Conducted end-to-end connectivity tests for IoT devices, verifying secure network integration, reliability, and performance under varying network conditions.
● Designed and implemented test plans for functional, security, and performance testing of IoT endpoints, ensuring device compliance with organizational standards.
● Performed in-depth latency, jitter, and packet loss assessments to confirm IoT device performance aligns with application requirements.
● Managed IoT device onboarding, leveraging protocols like 802.1X and MAC Authentication Bypass (MAB) for secure network access and policy enforcement.
● Verified device authentication, security postures, and access controls in a production-like environment to streamline large-scale IoT deployments.
● Troubleshot connectivity and access issues, reducing downtime and enhancing the reliability of IoT devices across the network.
● Created and managed FortiGate firewall policies, NAT rules, and security zones to enforce segmentation and access control best practices.
● Conducted security posture assessments and compliance checks on IoT devices to ensure adherence to organizational security policies.
● Designed and implemented secure and scalable wireless networks using Aruba Wireless Access Points and Aruba Mobility Controllers, improving overall network performance and reliability.
● Configured and managed Aruba ClearPass for network access control (NAC), enhancing security through RADIUS and TACACS+ authentication.
● Deployed and maintained ArubaOS switches and optimized network performance through VLAN, STP, and link aggregation configurations.
● Monitored and troubleshooted wireless networks using Aruba AirWave and Aruba Central, reducing downtime and improving operational efficiency.
● Implemented role-based access control (RBAC) and dynamic segmentation using Aruba Dynamic Segmentation, ensuring secure user and device connectivity.
● Integrated Aruba solutions with third-party security tools to strengthen network security posture.
● Optimized wireless performance using Aruba RF optimization techniques like band steering, airtime fairness, and adaptive radio management (ARM).
● Performed firmware upgrades and patch management on Aruba devices to ensure the network remained secure and up-to-date.
● Enhanced network security through Aruba ClearPass Policy Manager, configuring 802.1X authentication for wired and wireless clients.
● Conducted vulnerability assessments and implemented policy enforcement for endpoint security using Aruba ClearPass.
● Configured guest access portals and BYOD solutions using Aruba ClearPass Guest and Onboarding, improving secure access for external users.
● Validated network segmentation and access restrictions for IoT devices, preventing unauthorized access and minimizing security risks.
● Simulated network disruptions to evaluate IoT device recovery protocols, minimizing impact and ensuring rapid reconnection. Implemented failover and resilience testing strategies for IoT environments, optimizing device response in various failure scenarios.
● Developed automated testing workflows for routine IoT device connectivity checks, reducing manual effort and increasing testing efficiency. Leveraged data analytics to gain insights into device behavior and optimize network configurations for enhanced IoT performance.
● Maintained comprehensive documentation on testing processes, results, and resolutions, ensuring knowledge sharing and aiding future troubleshooting. Provided detailed reports on IoT device performance, connectivity, and compliance metrics to stakeholders, supporting continuous improvement in network and device management.
● These points showcase your technical skills in IoT testing and support, emphasizing your experience in connectivity, security, automation, and troubleshooting in an IoT environment.
● Implemented IPv4 enterprise network infrastructure utilizing Juniper routers like Juniper MX80, MX 480 and MX960.
● Implemented Point-to-Point Protocol over Ethernet (PPOE+) in multi-layered network architectures to streamline authentication and session management. Experience with Spunk's AI-driven analytics platform for real-time data visualization and decision-making.
● Coordinated with cross-functional teams during after-hours support to troubleshoot and resolve high- priority incidents in a large enterprise environment.
● Configured Intune policies and profiles for secure and streamlined MDM and MAM for both iOS and Android platforms.
● Deployed the Intune Company Portal to ensure a seamless end-user experience for accessing corporate resources on personal and corporate-owned devices.
● Authored and maintained Standard Operating Procedures (SOP) for network configurations, troubleshooting steps, and disaster recovery protocols.
● Developed and tested network failover strategies for LAN/WAN and data center services to ensure seamless continuity of operations.
● Integrated FortiGate with FortiManager and FortiAnalyzer for centralized policy management, logging, and real-time threat analytics.
● Configured Single Sign-On (SSO) systems for seamless authentication across multiple network services and applications, reducing login complexity
● Ensured compliance with industry best practices and regulatory requirements for telecommunications systems, including Ethernet and fiber optics.
● Proficiency in integrating Spunk with other data sources to create comprehensive dashboards.
● Applied knowledge of FAA/TSA requirements in network security and compliance projects, ensuring secure data transmission and system access.
● Experience in Qos on multicast VPN.
● Also configured built-in out of the box applications like Easy-QOS, PNP and IWAN App.
● Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware, software related to IPv4 and IPv6 Networking.
● Designed the migration from Cisco Catalyst 6513 switches with Sup 720 to Nexus 7009 with Nexus 7000 Supervisor 2E, F&M line cards in data center with features like VPC and VDC's.
● Planned and deployed of MPLS Layer 3 VPN cloud, involving VRF, Route Distinguisher
(RD), Route Target (RT), Label Distribution Protocol (LDP) & MP-BGP.
● Provide Load Balancer expertise on F5 BigIP LTM and GTM devices like 7050 and 2200 and Troubleshoot application slowness.
● Implemented IPv4 enterprise network infrastructure utilizing Juniper routers like Juniper MX80, MX 480 and MX960.
● Performed Nexus In-Line Service upgrades and deployed advanced nexus features VPC and VDC.
● Performed Route Filtering and Route Manipulation by applying distribute-lists, route-maps, administrative distance and offset-lists.
● Installing and configuring Palo Alto firewall devices on the network.
● Troubleshooting and configuring access lists on Palo Alto firewall.
● Monitor and manage network devices using Cisco Prime LMS, Cisco Prime Infrastructure manager Tools.
● Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware, software related to IPv4 and IPv6 Networking.
● Works with the product development and operations teams to define technical requirements to accompany existing product and operation requirements. Designs and develops use cases in support of the technical requirements.
● Experience with Extra Hop’s real-time network analytics for monitoring and troubleshooting network performance.
● Experience in writing and performing skits for various events, showcasing creativity and public speaking skills.
● Transforms technical requirements into architectures.
● Defines and documents a detailed design to meet technical requirements and architecture.
● Assists in vendor technical selection and management including input to specifications and vendor evaluation. Interfaces with outside teams in the development of internal and third-party software to support the detailed designs.
● Interfaces with Company test teams to validate Company test plans and procedures are representative of fully exercising and validating the product features and capabilities
● Works closely with development, integration and test teams to ensure product quality. Prepares deliverables fortrial and market readiness.
● Drives the continuous improvement of deployed systems by consistently looking for ways to reduce costs and improve efficiency.
● Performed extensive manual testing of IEEE 802.11 protocols, including 802.11a, b, g, n, ac, ax, d, h, i, k, v, and r, ensuring compliance with WLAN standards.
● Leveraged Intune reporting and analytics to monitor device compliance, app usage, and security status for proactive incident management.
● Automated routine management tasks using PowerShell and Graph API integrations to streamline Intune operations and policy deployment.
● Worked closely with security teams to design Intune configurations that aligned with corporate security and compliance requirements.
● Integrated Intune with Microsoft Defender and Conditional Access policies to enhance mobile security postures.
● Stayed updated on Intune best practices and enhancements, ensuring the mobile management solution is aligned with industry standards.
● strong problem-solving and debugging skills to improve network stability and performance.
● Collaborated with cross-functional teams to troubleshoot and resolve connectivity problems, ensuring minimal disruption and optimal system efficiency.
● Developed and maintained test plans and test cases for WLAN features, driving the effective identification of issues and quality assurance.
● Integrated Python scripting to assist in test automation and to enhance efficiency in repetitive testing scenarios, improving test coverage and accuracy.
● Developed and maintained Ansible playbooks and roles to automate provisioning, configuration management, and application deployment across multiple environments.
● Implemented and managed infrastructure as code (IaC) using Ansible to ensure consistency, scalability, and reliability of system configurations.
● Configured and optimized Ansible Tower/AWX for job scheduling, access control, and centralized logging to streamline automation workflows.
● Automated security compliance checks and enforced security policies using Ansible, ensuring adherence to organizational and regulatory standards.
● Troubleshot and resolved issues related to Ansible deployments, enhancing the performance and reliability of automation scripts and configurations.
● Managed secrets and sensitive data using Ansible Vault, ensuring secure automation processes.
● Collaborated with DevOps and development teams to integrate Ansible into CI/CD pipelines, automating testing and deployment processes for faster delivery.
● Monitored and maintained server configurations to prevent configuration drift, employing Ansible for regular updates and auditing.
● Documented infrastructure automation processes and maintained version control using Git to ensure transparent and efficient team collaboration.
● Trained and mentored team members on best practices for writing efficient Ansible scripts and managing infrastructure automation.
● Familiarity with NetBrain's network automation and management platform for simplifying complex network operations.
● Configured SD-WAN security features, including end-to-end encryption, secure segmentation, and integrated next-gen firewall policies.
● Worked with network security teams to ensure SD-WAN architecture complied with corporate security policies and industry best practices.
● Integrated SD-WAN with existing security infrastructure (firewalls, IDS/IPS, VPN) for comprehensive security across distributed networks.
● Conducted log analysis and threat investigations using FortiGate logs and FortiAnalyzer to respond to incidents and fine-tune security policies.
● Supports operations by providing deployment and sustained engineering support for all responsible systems and technologies. Diagnoses and resolves escalated field issues.
● VMD capacity management & clean up
● Versa Patch Testing
● OpenStack Security Groups management, Reviewing and Analysis
● Develop Code to Automate the Cadabahn Cada -client package to upgrade to Cada – client
-secure package.
● Expertise in using Spunk's machine learning algorithms to predict trends and optimize business processes.
● Collaboration with teams to develop skits that effectively communicate messages or themes.
● Proficiency in leveraging NetBrain's visualization tools to map and analyze network topologies.
● Expertise in integrating ExtraHop with other security tools to enhance overall network visibility and protection.
Infoblox,July 2022 – April 2023
Senior Network Engineer/ Brooklyn, New York
Responsibilities:
● Involved in managing Client’s global network services (GNS) and implemented network management and
● Firewall services, Wireless, and Load balancing technologies.
● Provided the full Implementation services on ISE, ASA 5500X &, Palo Alto Next generation firewall and Prime.
● Implemented IPv4 enterprise network infrastructure utilizing Juniper routers like Juniper MX80, MX 480 and MX960.
● ARUBA Networks Wireless Mobility Controllers, ClearPass Server, Airwave and Instant Access Points
● Managed Microsoft Teams environments with integrated voice and conferencing solutions.
● Aruba Switch s3500 & 1200 Complex Stacking topologies and profile configurations
& Aruba Controllers 531, 7211, 3200.MS Windows Servers 2003, 2000 and NT 4.
● and performance under varying network conditions.
● Deployed SSL VPN and IPSec VPN tunnels on firewalls and routers for secure remote access by employees and third-party vendors.
● Designed and implemented test plans for functional, security, and performance testing of IoT endpoints, ensuring device compliance with organizational standards.
● Performed in-depth latency, jitter, and packet loss assessments to confirm IoT device performance aligns with application requirements.
● Configured dynamic routing protocols (OSPF, BGP) on FortiGate for seamless integration with enterprise routing environments.
● Managed IoT device onboarding, leveraging protocols like 802.1X and MAC Authentication Bypass (MAB) for secure network access and policy enforcement.
● Verified device authentication, security postures, and access controls in a production-like environment to streamline large-scale IoT deployments
● Experience in Qos on multicast VPN
● Monitored and maintained Voice Gateway infrastructure including PRI, T1, analog circuits, and eFax delivery channels.
● Manage and configure Bluecoat, Zscaler proxy devices.
● Also configured built-in out of the box applications like Easy-QOS, PNP and IWAN App.
● Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware,software related to IPv4 and IPv6 Networking.
● Deployed the Intune Company Portal to ensure a seamless end-user experience for accessing corporate resources on personal and corporate-owned devices.
● Designed and architected highly available, scalable SD-WAN solutions to support [company size, locations, and/or services].
● Evaluated and recommended SD-WAN vendors based on business needs, technical requirements, and cost-effectiveness.
● Configured MDM profiles using Intune, enabling BYOD and corporate compliance across device fleets.
● Developed SD-WAN topology designs, including hub-and-spoke, full-mesh, and hybrid network models, to meet business objectives.
● Created comprehensive network architecture diagrams, integrating SD-WAN with existing LAN/WAN, cloud services, and security tools.
● Delivered end-to-end design and deployment of SD-WAN solutions, from site-to-site connectivity to edge device configuration.
● Defined performance benchmarks and SLAs for SD-WAN implementations, ensuring optimal network performance for critical business applications.
● Implemented QoS and traffic shaping policies to prioritize high-bandwidth and latency-sensitive applications (e.g., VoIP, video conferencing).
● Applied