Suganya Palanisamy
Project Manager Network & Infrastructure
*******.******@*****.*** +1-612-***-****
Summary
Experienced Project Manager with 12+ years of successfully leading and delivering IT and network infrastructure projects, managing cross-functional teams, coordinating multiple workstreams, and ensuring timely, high-quality project outcomes in dynamic, high-pressure environments.
Proven leadership in directing Major Incident Management (MIM) teams, driving service improvement initiatives, and aligning technology strategies with business objectives.
Expertise in program planning and execution, stakeholder engagement, risk mitigation, vendor management, and budget forecasting.
Strong background in Cisco technologies (Routing and switching), SD-WAN, VPN, ITIL processes, cloud platforms (Azure, AWS), and security infrastructure.
Adept at overseeing infrastructure projects from conception to delivery, ensuring compliance, operational excellence, and global collaboration.
Skilled communicator with experience in executive-level reporting, incident escalations, and service governance.
Technical Skills
Project & Service Management Tools:ServiceNow, JIRA, Confluence, Remedy, MS Project, SharePoint, HPSM, SolarWinds, Splunk, Visio, KPI Dashboards, ITIL Framework, Tufin.
Infrastructure & Security:Cisco Routers & Switches (Nexus, ASR, Catalyst), Cisco Meraki, Cisco ISE, VPN, SD-WAN (Viptela), Palo Alto, Checkpoint, Zscaler, F5 Load Balancers (LTM, GTM), Citrix Netscaler
Cloud Platforms: Microsoft Azure (Load Balancers, VNets), AWS (EC2, Networking), GCP, Azure AD, Prisma, Cisco ACI, Cisco Umbrella.
Monitoring & Analysis: Wireshark, NetFlow Analyzer, SNMP, SolarWinds, IBM QRadar, Splunk, Qualys, Rapid7.
Routing & Protocols: BGP, OSPF, EIGRP, RIP, MPLS, IPSEC, NAT, PAT, QoS, HSRP, STP, GRE, AAA (RADIUS/TACACS+).
Documentation: MS Office, MS Visio, Process Documentation, SOPs
Cognizant Technology Solutions, MN
Project Manager – Network Infrastructure Oct 2024 – Present
Responsibilities:
Led a team of 12 infrastructure engineers and analysts supporting 24x7 operations across 3 global data centers.
Managed $2.5M annual IT infrastructure budget including vendor contracts, hardware refresh, and cloud subscriptions.
Partner with other global MIM leads to ensure consistent incident management processes and seamless regional handovers across time zones.
Ensure strict adherence to MIM protocols, including incident declaration, escalation paths, executive communication cadence, and post-incident reviews.
Act as the primary liaison for executive stakeholders during major incidents, ensuring timely, transparent, and effective communication under pressure.
Oversee planning and execution of infrastructure upgrade programs including Cisco Meraki SD-WAN, Cisco ISE, and VPN deployments for a global consumer goods client.
Ensure on-time, within-budget delivery of infrastructure projects while aligning technical solutions with business goals.
Collaborate with internal teams, service providers, and vendors to manage end-to-end project execution, escalations, and delivery.
Manage work intake and prioritization for both project and BAU (Business As Usual) activities.
Create, track, and review service requests and change requests in collaboration with managed service providers.
Develop and maintain KPI dashboards to track project health, performance, risks, and mitigation actions.
Maintain consistent project reporting and governance through performance scorecards and regular stakeholder updates.
Drive service improvement initiatives, root cause analysis sessions, and lessons-learned meetings to continually mature the MIM and infrastructure practices.
Implement ITIL-based process enhancements to increase delivery quality and operational efficiency.
Ensure seamless transition from project to operations teams through structured handoff and documentation.
Review and approve technical solutions, estimations, and delivery timelines provided by suppliers.
Manage project budgets including forecasting, tracking, billing reconciliations, and cost optimizations.
Support procurement and asset tracking processes in collaboration with Asset Management teams.
Lead and manage infrastructure projects with budgets exceeding $2M, ensuring delivery within scope, schedule, and cost constraints.
Coordinate and supervise cross-functional teams of 10+ engineers, contractors, and vendors to execute network and infrastructure upgrades.
Identify and mitigate risks through structured planning and stakeholder communication, achieving a 95% success rate in project delivery.
Streamline procurement and vendor management processes resulting in 10% cost savings year-over-year.
Maintain and report project KPIs to senior leadership, using tools like Jira, MS Project, and Power BI for tracking progress and deliverables.
Drive project lifecycle activities from initiation to closure, ensuring compliance with organizational PMO standards and ITIL practices.
NBC Universal – Studio City, CA Feb 2022 – Sep 2024
Technical Project Manager
Responsibilities:
Led the planning, implementation, and management of enterprise network infrastructure projects including routers, switches, firewalls, wireless, and security appliances, ensuring high availability, compliance, and performance.
Directed the deployment and management of Cisco ACI fabric, including application profiles, EPGs, contracts, and filters, delivering micro-segmentation and zero-trust security across multi-site/multi-pod environments. Oversaw migration from VLAN-based to ACI environments, coordinating cross-functional teams and vendors.
Oversaw redundant MX480/MX960 router deployments for gateway operations, including MPLS, BGP, internet peering, and ISSU OS upgrades, ensuring load-balanced, resilient network operations.
Understand technical requirements, architectures, and constraints, guiding teams through trade-offs to ensure technical feasibility
Build frameworks for cross-team dependency mapping and resolution, enabling scalable, coordinated delivery.
Conduct design reviews and coordination of projects with different vendors and Sales Team, engineering, and production.
Drive consistent agile execution by guiding teams in selecting and applying the right methodologies, rituals, and tools for their maturity and needs.
Prepare and present status reports for executive leadership team.
Proactively identify project risks, issues, and dependencies and implement mitigation plans.
Maintain project documentation including roadmaps, status reports, and postmortems.
Delivered executive-level presentations and status reports, synthesizing complex technical updates into actionable insights.
Led daily stand-up calls to bridge the gap between cross functional teams.
Community Loans of America - Atlanta, GA Sept 2020- Jan 2022
Senior Network Engineer
Responsibilities:
Configured Cisco Catalyst switches for 802.1X support, ensuring IOS compatibility with Cisco Identity Services Engine (ISE).
• Implemented various wireless authentication methods, including PEAP, EAP-FAST, and EAP-TLS. Worked on ISE 802.1X, ISE wired/wireless guest, and ISE TrustSec implementations, ensuring secure access control.
Configured Aruba controllers, integrating with Cisco Access Control Server (ACS) and RADIUS servers for 802.1X authentication.
Worked with Aruba wireless controllers (7000 and 7100 series), implementing various 802.11 standards and configuring authentication methods like WPA3 with GCMP or WPA2 with CCMP.
Demonstrated experience in installing, configuring, and troubleshooting Cisco security technologies, including ISE, IPS/SourceFire, ASA, CSM, VPN, ACS, FTD, ACI, TrustSec, StealthWatch, and Cisco Umbrella.
Mentored partner technical engineers on executing Voucher Guidelines for ISE TrustSec activation and ISE Wireless guest management activation. Implemented secure access solutions utilizing 802.1X and Cisco TrustSec technologies.
Demonstrated knowledge of identity and access control policy-related technologies, including AAA, 802.1X, TrustSec, posture, and profiler. Configured multiple contexts, active/active failover, and redundant interfaces on Cisco ASA firewalls.
Implemented IPsec Site-to-Site VPNs and SSL VPNs using Cisco ASA 5500 Series firewalls. Created ACL policies for Fortinet and Palo alto firewalls, incorporating access control, NAT, and object grouping functions.
Worked with F5 GTM, AFM, ASM, and other F5 components to protect against advanced DDoS attacks. Designed, built, and deployed F5 BIG-IP load balancers (8900s, VIPRIONs, Blades), leveraging F5 BIG-IP TCL, TMOS, LTM, and DNS services.
Configured Aruba access points, including 300 series, 310 series, and Wi-Fi 6 supported 500 and 510 series.
Implemented and troubleshot data center devices like Nexus 7000, 5000, and 2000 Series, including VDC and VRF configurations.
Possessed experience with data center technologies, including spine-leaf architecture, Cisco ACI, and Arista CloudVision, implementing VPC and VDC on Nexus switches.
Demonstrated experience with Viptela SD-WAN for remote site connectivity over MPLS networks, configuring routing and application policies. Migrated remote sites with ISR routers to SD-WAN and Elastic Network Connections through MPLS and Internet.
Conducted testing of new Core SRX zone hardware in a sandbox lab environment, including regression feature testing, performance, and failover.
Configured syslog-ng for Splunk implementation and familiar with monitoring tools like Nagios and Splunk. Possessed experience working with public clouds like GCP and virtualization technologies.
Designed, architected, and implemented scalable cloud-based web applications using AWS and GCP. Set up GCP Firewall rules to allow or deny traffic to and from VM instances based on specified configurations, and utilized GCP Cloud CDN to improve content delivery and user experience.
Demonstrated experience with Zscaler Internet Security and Zscaler Private Access solutions. Worked on Zscaler Internet Access (ZIA) for web traffic security and supported the migration from IronPort to Zscaler ZIA.
Implemented Zscaler policies, cloud app control policies, advanced threat, malware, and sandbox-based policies. Worked on Azure AD SAML authentication for Zscaler and implemented AD group-based policies.
Configured and maintained Palo Alto PA-5260, PA-5410 firewalls, analyzing firewall logs using various tools to ensure optimal security posture. Provided technical support and troubleshooting for PANW products, ensuring optimal performance and customer satisfaction.
Santander Bank - Dallas-TX July 2019 - Aug 2020
Network Engineer
Responsibilities:
Performed network engineering, design, planning (WAN & LAN) & implementation. Studied single point failures & designed WAN structure in such a way that there are no failures in network in case of any device or link failure.
Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches. Configured Cisco ASR routers such as ASR 1013, 1009-X, 1006, 1006-X, 1004, 1002-HX, 1002-X, 1001-X routers.
Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between Switches.
Implemented zone-based firewalling and security rules on the Palo Alto Firewall. Experience with convert Palo Alto VPN rules over from the Cisco ASA solution.
Migration with both Palo Alto and Cisco ASA VPN experience. Network-wide implementation of F5 Traffic steering nodes with TCP acceleration.
Worked with convert Checkpoint VPN rules and helped Migrate with both Checkpoint and Cisco ASA VPN experience.
Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come online or that may have been altered during various planned network changes on the network.
Worked with network services like DNS, DHCP, DDNS, IP4, IP6, IPsec, VPN, etc. Worked with the physical server migration to AWS data center.
Involved in designing and implementation of AWS network and connectivity b/w physical and AWS DC.
Designed and implemented security policies on Palo Alto PA-5280 and PA-7050 firewalls, ensuring robust defense against cyber threats while adhering to industry best practices.
Demonstrated proficiency in networking protocols, including routing, switching, and application layer protocols, enabling reliable network communication.
Exhibited strong communication and documentation skills, facilitating effective collaboration and comprehensive documentation of network configurations and procedures.
Possessed strong understanding of cloud security fundamentals and best practices, with expertise in leveraging Palo Alto Prisma to address cloud security challenges. Implemented Panorama templates to streamline firewall rule deployment and ensure consistent security across the network.
Proficient in identifying and reviewing firewall rule risks, assessing potential security vulnerabilities, and ensuring compliance with industry regulations and best practices.
Utilized FortiGate's logging and reporting features to analyze network traffic patterns, identify anomalies, and generate comprehensive reports for management and auditing purposes.
Possessed experience with high-performance data center switches like Nexus 9000 and 7000 series. Configured and optimized Cisco Nexus switches to enforce network policies, improve traffic management, and enhance overall network performance.
Utilized Junos Space Security Director for centralized management and monitoring of Juniper SRX 5600 and SRX 5800 Series firewalls, streamlining administration and enhancing network security visibility.
Proficient in configuring and managing Global Traffic Manager (GTM) for high availability (HA) designs, including Iquery functionality between Local Traffic Manager (LTM) and GTM.
Competent in working with Juniper networking solutions and infrastructure, applying expertise to enhance overall network efficiency.
Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience. Drafted, installed, and provisioned ASA and Checkpoint firewall rules and policies. Implemented Site to Site connections for third party connectivity using Cisco ASA firewalls.
Skilled in virtualization for testing, deployment and migration of Exchange on premise and Exchange online and migration of user mailboxes in Exchange.
Virtualization using Microsoft Hyper-V in Exchange migrations and client-side apps.
Understand the JUNOS platform and worked with IOS upgrade of Juniper devices. Designed and implemented security policies using Palo Alto firewall. Configured and maintained 26th NOS network security team devices including IDS, Palo Alto firewalls, Bluecoat web proxies, and load-balancers.
Worked extensively on Cisco Firewalls, Cisco (506E/515E/525E) & ASA 5500(5510/5540) series. Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
Configuring and implementation of Juniper Firewall, SSG Series, and Net screen Series ISG 1000, SRX Series. Configured routing policy for BGP. Switching related tasks included implementing VLANs and configuring ISL trunk and 802.1Q on Fast-Ethernet channel between switches.
Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers and Cisco ASR 9K routers. Provided application-level redundancy and availability by deploying F5 load balancers LTM.
Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000. Operation and troubleshooting of Juniper routers, HP/H3C network switches and Riverbed accelerators. Deploying and decommissioning the VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices
CHI Health- Fremont, CA May 2017-June 2019
Network Engineer
Responsibilities:
Configuring, Maintaining the Routers and Switches and Implementation of EIGRP, OSPF, BGP routing protocols and trouble shooting.
Responsible for Design, integration, configuration, maintenance, performance monitoring and security of network infrastructure including Local Area Networks (LAN), Wide Area Networks (WAN), Firewalls, DHCP, and DNS.
Configuration and installation of Cat 6500, Nexus 2k, Nexus 5k and Nexus 7k series switches.
Experience on designing and troubleshooting of EIGRP, OSPF, RIP routing issues.
Enabled STP, RPVST+, BPDU Guard, and Root Guard, disabling all unused ports and putting them in unused VLAN.
Configured VPC, VDC, Ether channel and FEX on Nexus 5K, 7K and 2K devices, worked with F series and M series line cards.
Involved in VPN (IPSEC and GRE) migrations and new designs for the clients.
Designed and implemented security systems including various CISCO IOS ACLs, Context-Based Access Control.
Worked on AAA Cisco Secure ACS (RADIUS/TACACS+) authentications.
Configured ACLs, NAT and Object grouping for users inside the network, servers on ASA Firewalls 5520,5540
Configured ASA firewall on Active/standby mode for High Availability, upgrading IOS images on ASA.
Configured Site-to-Site VPN using IPSec and GRE, NAT/PAT policies between branch sites.
Coordinated installations and followed up with project managers and end used to ensure acceptable system/network performance once changes were completed.
Samsonite- Mansfield, MA Aug 2015-April 2017
Network Administrator
Responsibilities:
Assisted the NETSUPP-TIE2 team and worked on the architecture and functioning of the Cisco 2600 series routers.
Configured VLANS on different impetus switches performed investigating TCP/IP system issues, Administered Frame-Relay and systems.
Worked on configuring and troubleshooting IPSEC Site to Site, DMVPN, and Remote VPN using different encryption methods.
Configuring and troubleshooting QOS involving policing, shaping, shaping and queuing towards Core and towards CE and PE routers.
Implemented firewall rules, policy changes, ACL, NAT and PAT, IPSec, VPNs routing changes on Fortinet Firewalls.
Got familiarized and collaborated with dynamic call routing and its features, multi-provider environment, number portability and Internet routing evolution.
Worked on Cabling in IDF/MDF and in Data centers with Copper and Fiber.
Involved in customer escalations and troubleshooting issues related to connectivity, STP, VLAN, Trunking, VTP, Layer 2/3 switching, Ether channels, Inter-VLAN routing, log messages, high CPU utilization and parameters that can degrade performance of network.
Familiarized with networking tools like CISCO IOS, Wireshark, Ping, Trace route, Speed Test.
Experience in troubleshooting of Layer 2 features (VLAN, STP, RSTP, VRRP, and Ether Channel).
Gained hands-on experience with VLSM, STP, VTP, and VLAN Trunking.
Configuring STP for switching loop prevention and VLANs for data and voice along with configuring port security for users connecting to the switches.
Configured VLANS on multiple catalyst switches performed troubleshooting on TCP/IP network problems, Administered Frame-Relay and networks.
Performed IOS upgrades/Password recovery on 2900, 3500 series Cisco Catalyst switches and 1800, 2600, 3600 series Cisco routers using TFTP.
Implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, and Ether channel, STP, RSTP and MST.
Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.
Worked on installation, maintenance, and troubleshooting of LAN/WAN (ISDN, Frame relay, NAT, DHCP, TCP/IP).
Managed system backup and restoration protocols.
Cognizant India Pvt Limited, Coimbatore May 2010 to Feb 2014
Team Leader
Responsibilities:
Production support for all db2 related application on 24X7.
Built, maintained, and executed 200 + production batch jobs using TWS Automation workload (batch scheduling software).
Organized all jobs into easy to manage schedules.
Performance tuned 100+ jobs for easy and smooth execution.
Assisted dev team with batch framework debug/RCA analysis.
Managed all user accounts and security settings.
Hands on with System admin tasks such as shell scripting, debugging & process monitoring.
Responsible for sending batch execution status reports to the client every morning & publish it to the project.
Provided full range of production DB2 support for all mission critical database.
Database performance monitoring, tuning and capacity planning.
Backup planning and recovery.
Running offline /online utilities for data maintenance.
Planning for VSAM to DB2 conversion.
Data modelling and implementation of database design.
Resolving developer issues with accessing production data from non-mainframe sources.
Support and administer DB2 queue replicate between DB2 Z/OS and distributed environment.
Education & Certifications
ITIL
TIVOL Workload Scheduler
CCNA
Cisco CCNP
CSM
SIX SIGMA