Samara Simha Reddy
***************@*****.***
Phone: +1-260-***-****
LinkedIn URL: linkedin.com/in/samara-simha-reddy-b-1a55042bb
SUMMARY:
I have over 6 years of experience in network engineering, supporting enterprise and cloud environments with routing, switching, firewalls, SD-WAN, and wireless technologies. I worked on Cisco, Juniper, Palo Alto, Fortinet, and F5 devices, helping manage secure and stable LAN/WAN networks. In my current and past roles, I handled network monitoring, troubleshooting, incident management, and root cause analysis to reduce downtime and improve performance. I also worked closely with internal teams and telecom providers like AT&T and Zayo to resolve routing, latency, and connectivity issues. Along with daily operations, I supported data center, cloud, and security projects while helping improve NOC processes and mentoring junior engineers.Executed remote configuration changes using CLI access on Cisco, Juniper, and Arista devices.
•Supported after-hours maintenance activities to minimize production downtime and service interruptions.
• Interpreted network diagrams, rack layouts, and cabling documentation during infrastructure migrations.
TECHNICAL SKILLS:
1.Routers: Cisco Series,Juniper Routers, Nortel VPN Secure IP Service Gateway .
2.Switching : Cisco Nexus, Catalyst, Nortel Core Switch.
3.Wireless: Catalyst Wireless Services Module, Aruba, Motorola 7000, 5100, 3Com Wireless.
4.Firewalls: Check Point, SideWinder, Blue Coat, Cisco FWSM, Cisco Pix, Cisco ASA, Juniper Firewall
5.Load balancer: Nortel Alteon, F5, Big IP Loadbalancer
6.Routing Protocols: OSPF, RIP, IGRP, EIGRP, BGP, MPBGP, MPLS, QOS, PIM
7.WAN Protocols: IPSEC, VPN, and Cisco Secure ACS.
8.Management Protocols/Software: SNMP, NTP, CiscoWorks, NAPS, Sheer.
9.Monitoring: EMC Smarts,Wireshark,Solar-winds,Thousand Eyes.
PROFESSIONAL EXPERIENCE:
Secure Works – Atlanta, GA
Senior Network Security Engineer Nov 2025 – Present
At my previous company, I was part of the enterprise network team responsible for maintaining and improving LAN/WAN infrastructure across multiple locations. I worked on Cisco and Aruba switching environments, configuring VLANs, STP, EtherChannel, and routing protocols like OSPF, EIGRP, and BGP to ensure stable connectivity. One of the major challenges we handled was frequent WAN and network outages, where I coordinated with providers like Verizon and AT&T to restore MPLS, VPN, and point-to-point circuits quickly.
I also supported wireless networks, monitored access points and controllers, and helped maintain uptime after network upgrades and refresh activities. For critical SCADA and industrial environments, I worked on secure communication between RTUs, PLCs, and HMI systems by implementing redundancy and failover solutions to avoid downtime. We migrated some legacy SCADA networks to modern IP-based infrastructure, which improved monitoring, scalability, and performance.
To improve security, I participated in vulnerability assessments, firewall policy updates, VPN implementation, and Zero Trust initiatives to restrict unauthorized access. I also supported F5 load balancers in both on-prem and Azure environments, creating VIPs, iRules, and troubleshooting traffic flow issues. For monitoring and troubleshooting, I used tools like SolarWinds, ThousandEyes, Airwave, and Wireshark to analyze traffic, detect issues, and improve overall network reliability.
Client: Medica May 2023 – Oct 2025Role: Senior Network Security Engineer
I worked on upgrading and securing enterprise networks across data center, cloud, and branch environments. I migrated Cisco ASA firewalls to Palo Alto firewalls, including VPNs, NAT rules, and security policies. I also helped move legacy WAN networks to SD-WAN to improve connectivity and network performance.
I supported Cisco Meraki deployments for corporate offices and 500+ branch locations with routers, switches, and wireless access points. In data centers, I assisted with high-speed Leaf-Spine network architecture using Arista switches and eBGP routing. I also worked on VMware NSX upgrades and virtual firewall solutions.
For SCADA and industrial networks, I supported disaster recovery planning, patching, audits, and secure remote access using VPN and MFA. I collaborated with cybersecurity teams for penetration testing and Zero Trust implementation to improve network security. I also used Python, TCL, and Bash scripts for automation and used monitoring tools like ServiceNow, ThousandEyes, Airwave, and HP NNMI for troubleshooting and incident management.
Client Ecova INDIA
NOC Network Analyst March-2021 To Sep 2022
In this role, I worked as a NOC Network Analyst and Network Administrator supporting enterprise and data center networks. My daily work included monitoring the network, troubleshooting outages, coordinating with different teams, and helping restore services quickly to reduce downtime. I managed routers, switches, firewalls, servers, and virtual environments while supporting LAN/WAN connectivity, VoIP, video, and other critical services.
I also handled firewall administration, antivirus and anti-spam systems, and overall network security to maintain a secure environment. I supported Microsoft servers such as Exchange, DNS, DHCP, SQL, and backup systems, along with SonicWall and Cisco network devices. I worked on change management, staging, and production deployments for network upgrades and regional projects.
In addition, I monitored SONET/DWDM and cell tower backhaul networks, helped maintain compliance standards like PCI and FISMA, and created SOPs, training documents, and technical presentations for the operations team.
Client –Turtlemint INDIA
Network Analyst June 2019 – Feb-2021
I worked on supporting Cisco, Juniper, and Alcatel network devices in enterprise environments. My daily work included troubleshooting routers, switches, VLANs, and network connectivity issues. I also provided remote support to customers and resolved wireless and performance-related problems.
I used tools like Wireshark and Splunk to analyze traffic, packet loss, and latency issues. I coordinated with ISPs and onsite teams to restore circuits and replace failed hardware like fibers and SFPs. I also supported firewall policies, NAT, and IPSEC VPN configurations to maintain secure connectivity.
In addition, I assisted in migrating Cisco ASA firewalls to Palo Alto firewalls during network upgrades. I worked with Citrix NetScaler load balancers and supported Cisco wireless controllers, Cisco ISE, and wireless site survey activities. I also handled ticket escalations, customer follow-ups, and ensured smooth day-to-day network operations.
CERTIFICATIONS:
Cisco Certified Network Associate (CCNA) – Pursuing / Scheduled