BENJAMIN JOHN PATER
***** ******* **** **., **, Reston, VA20190
**********@*******.***
Employment History:
Over 15 years of flexible and effective network technology working with all levels of Data Center network operation
OSPF, EIGRP, BGP VTP, VOIP, NAT, SCL, SNMP, Netflow, AlgoSec, ASA, Arista Networks, Linux, Cisco, Checkpoint, Fortinet, DNAC, ISE, PXGRID
Proficient with networking hardware: CISCO Routers (1841, 2600, 2800, 3845,6500) Switches (2950, 3550, 4500, 5500 and 6500) series, Load Balancing, Firewall Configurations Storage Mirroring, HP SAM HP OVPA, HP OCPM, DNS, DHCP Experience in configuration of Cisco Routers and Switches to support a multi – VLAN environment including; Cisco Routers, Switches, Citrix, Hypervisor and VM Ware CCNA
Experience with Microsoft operating systems, MS office, IMS, IDP/IPS, F-5 Load Balancer Experienced with Unix/Linux, Juniper, Brocade, AT&T, Server updates/maintenance, Raid Controllers, Active Directory
Implementation of Risk Assessment Security violation testing Monitoring software (Savvis, Keseya, Solar Winds, Remedy, Open Source), ESP, Sysview, MVS/ESA Tracking and resolving Trouble-Ticket issues
VTP and VLAN Trunk configuration with ISL /802.1Q Layer 2 &3 HSRP PROFESSIONAL SUMMARY:
● Over 15 years of flexible and effective network technology working with all levels of Data Center network operation
● OSPF, EIGRP, BGP VTP, VOIP, NAT, SCL, SNMP, Netflow, AlgoSec, ASA, Ciena, Arista Networks, Linux, Cisco, Fortinet, Nokia, Checkpoint, NX-OS, ACI DNAC, ISE, Aruba, PXGRID
● Proficient with networking hardware: CISCO Routers (1841, 2600, 2800, 3845,6500) Switches
(2950, 3550, 4500, 5500 and 6500) series, Load Balancing, Fortinet, Firewall Configurations
● Storage Mirroring, HP SAM HP OVPA, HP OCPM, DNS, DHCP
● Experience in configuration of Cisco Routers and Switches to support a multi – VLAN environment including Nexus Cisco Routers, Switches, Aruba, Oracle Coherence 14.1.2, Citrix, Hypervisor and VM Ware
● CCNA
● Experience with Microsoft operating systems, MS office, IMS, IDP/IPS, F-5 Load Balancer,
● Experienced with Unix/Linux, Juniper, Brocade, AT&T, Server updates/maintenance, Raid Controllers, Aruba, Active Directory
● Implementation of Risk Assessment Security violation testing,
● Monitoring software (Savvis, Keseya, Solar Winds, Remedy, Open Source), ESP, Sysview, MVS/ESA
● Tracking and resolving Trouble-Ticket issues
● VTP and VLAN Trunk configuration with ISL /802.1Q Layer 2 &3 HSRP and Spanning Tree configurations
● Upgraded Servers and Work Station software, Remote Monitored System Logs for intrusion anomalies: Wire Shark, TCP Dump, Ping, Trace Route, Ubuntu, Red Hat Open Source, Cisco Help Desk
● Tape Backup/Recovery (LTO-4), Storage, Encryption, Library, Maintenance
● Wireless 802.1X configuration
Education
A.S. Degree in Computer Networking
Northern Virginia Community College, Annandale, VA Degree Awarded: Yes — Date: 05/2007
Certifications and Certificates
Palo Alto Certification 2018
AWS Certification 2019
Training:
● Network Devices & Platforms:
Cisco Router and Switch, Aruba, Arista, Juniper, Nokia
● Firewalls & Security Solutions:
Palo Alto, Fortinet, ASA, Checkpoint, Zscaler, Blue Coat
● Configuration & Management Tools:
F-5, Blue Cat, Tufin, ACI, NX-OS
● Telecom & Infrastructure:
Ciena
● Cloud & Software Platforms:
Oracle
● Data Visualization & Analytics:
Tableau
Skills:
● VOIP, Cisco ISE PXGRID, DNAC, Umbrella
● Linux, Solar Winds, Junos SRX/M Series. Wireless
● Networking-cisco/juniper, Blue Coat, F-5 Load Balancer
● Unix/Linux, Windows 2008/12, Juniper, Arista, CI/CD
● Data Center config’s, LAN, WAN, DNS, DHCP
● Network Cabling & Troubleshooting
● SQL Oracle Database, Remedy, Kaseya, Service Now
● Microsoft Azure Tools, Riverbed, Steelhead
● VMWare, Terraform, Virtual Box Implemented and installed Tufin ticketed Checkpoint Firewall Policies through Jump/TAM /NANO
● DNS/Apache Servers, AlgoSec, Power Shell, Python Scripting, F-5, Infoblox, Blue Coat
● Verified DHS/DHCP IP address management through Infoblox appliances, Dev Ops, Meraki, Firemon
● Blocked malicious URLs and IP through TAM servers via DNS/DHCP Blue Coat Proxies
● Wireless Cisco ASA connectivity AD establishment via a servers
● F-5 Load Balancer, ASA Wireless, Fortinet, Palo Alto Panorama, Zscaler, Oracle SQL, DNAC
● Implement secure guest Wi-Fi networks that isolate guest devices from the internal network, ensuring proper access controls and usage policies are enforced
● Riverbed/Steelhead/Wireshark Penetration Testing, troubleshooting applications
● Implemented a Continuous Integration and delivery (CI/CD) framework
● Continuously monitor Wi-Fi network traffic to detect anomalies, unauthorized devices, and potential security threats (such as man-in-the-middle or rogue AP attacks), ensuring early identification and response to incidents
● Continuously monitor WLAN traffic for suspicious activity, unauthorized devices, and potential security breaches, ensuring the integrity of wireless communications
● Build & Deployment usage of Continuous Integration (CI/CD) tools and build configuration. Professional Experience:
Client: IBM (Remote)
March 2020 – April 2025
Role: Securities Engineer
Responsibilities:IBM Securities Engineer.
● Loaded configs remotely, z/OS IMS, REXX, COBOL, VTAM, Puppet, Chef, Puppet
● Firewall Installation, Ciena 6500, Nexus 7K, ISE PXGRID, IBM Mainframe Upgrades
● IBM 8000, Automation, Wireless, z/OS2, Oracle NMS/OUA, DHCP, Tufin, Checkpoint, ASA
● Automation: Remote Firewall Configuration: Nokia, Palo Alto Panorama, Fortinet, Arista Network, Versa Networks, Meraki Fire Wall, Firemon, Ubuntu Linux/Puppet/Chef/Napalm/Nornir, Proxies, Terraform, Load Balancers
● Administered and configured VPN and remote access tools including Fortinet, Palo Alto, Meraki SD- WAN, ensuring secure authentication and endpoint access.
● Designed and implemented secure AWS network architectures using Terraform for automated infrastructure provisioning, ensuring compliance with NIST security standards, Tableau, Configure IP Security protocols (such as VPNs and firewalls) to safeguard data and resources in AWS environments.
● Managed and secured AWS cloud infrastructure by integrating VMware virtualization technologies with network storage solutions, enabling efficient, scalable, and secure data management, while enforcing IP Security policies and applying NIST guidelines for data protection and access control.
● Implemented certificate lifecycle processes including issuance, renewal, and revocation for secure internal and external communication
● Enforced Two-Factor Authentication (2FA) policies using firewall-integrated token systems; familiar with Entrust-type solutions.
● Led the deployment of network security measures in AWS using Terraform to automate security group configurations and
● IP Security measures, while leveraging VMware for virtualized environments and network storage management, all within the framework of NIST cybersecurity standards to ensure compliance and protect sensitive data
● Installed Operating System, Routing Protocol; Port Channels and port Assignments, Penetration Testing
● Set certificates, DNS, DHCP, NANO DNS
● Security Policies, Nscaler, DHCP, BGP, Oracle NMS/OUA, OSPF, EIGRP Protocols Source)
● Developed/Implemented maintenance Trouble shooting / Documentation Performance IPD/IDS- DNS/DHCP, Log Files--Wire Shark, TCP Dump, Snort
● Networking equipment
● Performed routine maintenance procedures
Loaded configs remotely, z/OS IMS, REXX, COBOL, VTAM, Puppet, Chef, Puppet
Firewall Installation, Nexus 7K, ISE PXGRID, IBM Mainframe Upgrades
IBM 8000, Watsonx Automation, Wireless, z/OS2, DHCP
Automation: Remote Firewall Configuration: Palo Alto Panorama, Arista Network, Fortinet,Versa Networks, Meraki Fire Wall, Firemon, Ubuntu Linux/Puppet/Chef/Napalm/Nornir, Proxies, Load Balancers
Configure and manage security protocols, such as VPNs, firewalls, and encryption methods, on LAN/WAN environments to safeguard against unauthorized access and data breaches
Installed Operating System, Routing Protocol; Port Channels and port Assignments, Penetration Testing
Set certificates,DNS, DHCP, NANO DNS
Security Policies, Nscaler, DHCP, BGP, OSPF, EIGRP Protocols. Client: FDIC, Arlington, VA
March 2019 – November 2019
Role: Securities Engineer
Responsibilities:
● Worked with engineers, both remote and on site to resolve Service Now data center ticket issues
● Configured and installed 2Cisco ASR 1002hx routers, Dev Ops, Splunk, F-5, Blue Cat
● Designed wiring/port assignment schematics on spreadsheet, Infoblox, Blue Cat, Blue Coat
● Configured and maintained secure VPN tunnels and firewall policies (Juniper SRX, Cisco, Palo Alto) for remote federal access.
● Installed and managed DHCP/DNS services with Blue Cat and Infoblox to support remote access and certificate-based IP resolution.
● Monitored and responded to unauthorized access attempts and anomalies in authentication logs using Splunk and CLI tools.
● Installed Juniper SRX 4200 firewall policies, DHCP, Wireless Arista, Fortinet, Meraki, Firemon, Zcaler
● 4 Cisco NXIS 7706 refresh operations, DNAC, ISE
● Infoblox DDI installation/operations, SRX Firewall policies, Cisco Meraki Cloud
● Splunk/CLI troubleshooting to resolution, SolarWinds, Penetration Testing
● Monitor, performance, and security status of routers, switches, and network traffic across LAN and WAN infrastructure, identifying and resolving security vulnerabilities and performance issues
● Troubleshoot, and resolve security incidents related to WLAN and VPN systems, identifying and mitigating vulnerabilities, attacks, or unauthorized access
● Implement and align IT security processes with ITIL frameworks, ensuring that security incidents, changes, and problem management follow best practices and are integrated with broader IT service management
● Leverage Lean IT’s focus on identifying and addressing the root causes of recurring security issues, implementing long-term fixes to reduce repeat incidents and improve security effectiveness
● Palo Alto Firewall hot-cut refresh operations, Panorama configuration
● Wiped configs from various decommissioned data center equipment
● FDIC Public Trust Clearance
● Cookbook creation, testing, and CI/CD, Apache Servers, Python. Client: Freddie Mac, Reston, VA
January 2018 – March 2019
Role: Securities Engineer
Responsibilities:
● Service Now ticketing
● Implemented and installed Tufin ticketed Checkpoint Firewall Policies through Jump/TAM
/NANO DNS/Apache Servers, AlgoSec, Power Shell, Python Scripting, F-5, Infoblox, Blue Coat
● Verified DHS/DHCP IP address management through Infoblox appliances, Dev Ops, Meraki, Firemon
● Blocked malicious URL’s and IP through TAM servers via DNS/DHCP Blue Coat Proxies
● Wireless Cisco ASA connectivity AD establishment via a servers
● Implemented 2FA policy enforcement through DNS/DHCP-based Blue Coat proxy and firewall access control layers
● Administered certificate revocation and renewal processes via Infoblox appliances and F5 Load Balancer systems.
● Detected and resolved wireless authentication and rogue device issues, ensuring secure WiFi network compliance.
● F-5 Load Balancer, ASA Wireless, Fortinet, Palo Alto Panorama, Zscaler, Oracle SQL, DNAC
● Implement secure guest Wi-Fi networks that isolate guest devices from the internal network, ensuring proper access controls and usage policies are enforced
● Riverbed/Steelhead/Wireshark Penetration Testing, troubleshooting applications
● Implemented a Continuous Integration and delivery (CI/CD) framework
● Continuously monitor Wi-Fi network traffic to detect anomalies, unauthorized devices, and potential security threats (such as man-in-the-middle or rogue AP attacks), ensuring early identification and response to incidents
● Continuously monitor WLAN traffic for suspicious activity, unauthorized devices, and potential security breaches, ensuring the integrity of wireless communications
● Build & Deployment usage of Continuous Integration (CI/CD) tools and build configuration. Client: CSC, Chantilly, VA
February 2015 – September 2017
Role: Network Engineer
Responsibilities:
● Team effort in migrating two 10 pod data centers to targeted location
● Configured Cisco DNAC, ISE PXGRID, Netscaler, Fortinet, Iron Mountain, Blue Coat, Blue Cat, Arista, ASA, Checkpoint, AlgoSec, Load Balancing, Meraki, DNS, Encryption, Windows 2012, Juniper MX series, Cisco NX – OS and Log Documentation
● Configured Cisco ISE PXGRID and DNAC for secure identity-based access control across multi- tenant environments.
● Mapped wiring, Static/DHCP, Blue Cat DNS, F-5
● Design and implement secure guest Wi-Fi networks that isolate guest devices from the internal network, ensuring proper access controls and usage policies are enforced
● Track key performance indicators (KPIs) for security operations, focusing on Lean IT's goal of continuous improvement by using metrics to measure efficiency, response times, and incident resolution effectiveness
● Assisted with SDWAN/firewall integration using Checkpoint and Fortinet to enable remote branch authentication
● Enforced security zoning and firewall rules with AlgoSec and Meraki to segment remote users from core networks.
● Replaced blades and line cards as was deemed necessary prior to tear down/shipping. Client: Verizon Business, Ashburn, VA
June 2013 – March 2015
Role: Network Engineer
Responsibilities:
● Team lead of seven engineers in router/ups installation of DHS sites
● Provisioned for DHS/CBP Router refresh w/ managed UPS at U.S. government DHA/CBP Program
● Supervised technical personnel in installation of router/ups equipment
● Engineered cabling from data centers to government sites
● Provisioned routers with VPN and encryption policies for DHS/CBP sites, supporting secure certificate-authenticated access.
● Designed and validated remote connectivity using tunneling protocols and dynamic IP assignment via DHCP.”
● Maintain a knowledge base of IT security incidents, solutions, and best practices, making sure that knowledge sharing is aligned with ITIL’s knowledge management process to support efficient problem resolution
● Perform site surveys and signal analysis to optimize Wi-Fi coverage, performance, and security, ensuring that the wireless network provides reliable and secure connectivity throughout the designated area
● Configured Router Protocols, Encryption/Licensing, Kaseya, Tunneling Configurations, DNS/DHCP, AlgoSec, Meraki, Servers, Tacacs, Convergence, Fail Over, F-5, DMZ, ACLs and Firewall Configurations
● Troubleshooting methodologies, Ping and Trace Route, ISE PXGRID, Umbrella
● Memos Updates
Client: Orion Capital Management/The Washington Group, Arlington, VA June 2010 – June 2013
Role: Network Administrator/NOC
Responsibilities:
● NOC-TCP/IP Networking- Cisco/Juniper/AT&T Routers/Firewall, IBM Mainframe
● Cisco ASA 5505/A-10 Series Load Balancing, SQL, IBM z/OS, MVS, JES
● Upgraded Servers and Work Station software, Remote Monitored System Logs for intrusion anomalies: Wire Shark, TCP Dump, Ping, Trace Route, Red Hat Open Source, Cisco Help Desk
● Tape Backup/Recovery (LTO-4), Storage, Encryption, Library, Maintenance
● Wireless 802.1X configuration.
● Experience with LAN/WAN T1, T3 and Optical Cabling
● Cisco NX-OS, Juniper MX, TCP/IP Protocol Suite, VM Ware, EIGRP, OSPF, BGP, Frame Relay, IP Security, Windows 2012
● Racked/Stacked/
IT Tech
Pyle & Associates
May 2005 – Sep 2010
Washington, DC
● Configured LAN system for lobbyist office
● Implemented Juniper SRX router/firewall with Checkpoint failover
● Set up VLAN, TACACS, domain controller architecture, and blade server configurations Network Operations Specialist MCI
Feb 2002 – Apr 2005
Tysons Corner, VA
● Provisioned Cisco router architecture and installations through detailed memo documentation
● Tested circuit connectivity to various remote sites
● Managed remote site configurations using out-of-band management with failover mechanisms