Manikanth

  • Uploaded by: kirti
  • 0
  • 0
  • January 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Manikanth as PDF for free.

More details

  • Words: 4,920
  • Pages: 9
Loading documents preview...
Manikanth G [email protected] Sr. Network Engineer +1 (224) - 484 0339 Professional Summary:  8 years of experience in Network design, Security, Tier support of Networks in various environments.  Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.  Experience working on Cisco Catalyst Series 3750, 4500, 3800, 6500, 9300 Nexus 2000, 5000, 6000 and 7000 series switches.  Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1900 series Routers and Cisco 2900, 3500, 4500, 5500, 6500 and Nexus 5K series switches and Sound knowledge of Routing and Switching concepts and MPLS design.  Expert in dealing with Networking Protocols and Standards such as TCP/IP, OSI, UDP, Layer 2 (VLANs, STP, VTP), Routing Protocols (RIP, EIGRP, OSPF, BGP), WAN technologies (Frame relay, IPSec, VPNs, MPLS), QoS.  Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.  Experience in troubleshooting NAT configurations, Access - Lists (ACL), and DNS/DHCP related issues within the LAN network.  Foundationally solid at developing and delivering technologies, services and solutions for business and manufacturing industrial process automation control systems. Data gathering and analyses from plant  Experience in installing and configuring DNS, DHCP server.  Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.  Experience working on Cloud Computing Virtualization using VM ware ESXi 4.0 and Windows Hyper-V.  Installed and implemented & troubleshoot the Network Virtualization through VM Ware and NSX.  Experience on Network Monitoring & Testing tools such as Wireshark/Ethereal, Cisco Works, and IXIA.  Troubleshoot end-to-end call flow issues in enterprise market involving various VoIP elements.  Intensive applications of Network automation tools and testing for network automation and configuration management using Ansible, Python scripting.  Working Experience on web content filter and gateways like Blue Coat, Websense  Extensive working experience in AAA protocols such as RADIUS, TACACS+ and Cisco ACS. Implemented VSS on Cisco catalyst 6509 and 6513 switches.  Experience on Monitoring and Management tools such as HP Open view, Splunk, TCP dump, Solar Winds and Wireshark, Cisco Prime, NetFlow, Riverbed.  Extensively used TCP/IP tool like TELNET for remote login to the routers and SSH for secure login.  Working experience performing Incident, change management using ticketing tools such as ServiceNow, Remedy.  Utilize Remedy ticket system to update network status. Exposure to Cisco WAAS, WCS.  Installed and configured Cisco Unified Communications Manage (UC).  Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.  Responsible for Configuration and administration of firewalls, which includes Checkpoint, Juniper, and Cisco ASA firewalls.  Experience in risk analysis, security policy, rules creation and modification of Cisco ASA networks.  Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.  Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.  Designed security policies on Palo Alto network firewall for controlling what traffic needs to be allowed or blocked based on customer requirements.

        

Configure and implementing Fortinet Security systems Firewall. Assisted in managing global Fortinet FortiGate firewall infrastructure. Experience in configuration of Juniper security appliances SRX 220, SRX 240, SRX 550, NS 50, SSG 550M, SSG 520M. Familiar with products such as Cisco ISE, Cisco ASA 5500 series firewalls and Cisco ACE 4710 Load balancers. Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture. Used Cisco ACI Fabric which is based on Cisco Nexus 9000 series switches and Cisco Application Virtual Switch (AVS). Experience in F5 Load balancers such a BIG-IP LTM and GTM modules. Mapped, Network Diagrams and physical identification in MS Visio. Provide hands on management of Data Center services, including rack and cable management. Great team player with an ability to work under pressure on a 24x7 duty rotation

Education: Bachelor’s in Computer Science, Certification: Cisco Certified Network Associate (CCNA) Technical Skills: Operating Systems: Windows (Server 2003/2008, Vista, Windows 7), Linux OS Routers: Cisco GSR12016, ASR1001, 2900, 3900, 7200, 7600 & ASR9000 Switches: Cisco 3750, 3850, 4507, 4510 & 6500 series switches, Nexus 5010, 7010, 5548 Routing: MPLS, OSPF, EIGRP, BGP, IS-IS, Route Filtering, Redistribution, Summarization, Static Routing Switching: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging. Network security: Cisco (ASA, PIX) 5510, Palo Alto, juniper SRX, ACL, IPSEC VPN, GRE VPN, NAT/PAT, Filtering, Load Balancing, IDS/IPS Load Balancer: F5 Networks (Big-IP) LTM Module, Cisco ACE 30 load balancer LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet. WAN: Leased lines 128k - 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ISDN, and Load Balancing. Various Features & Services: IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP Management AAA Architecture: TACACS+, RADIUS, Cisco ACS Network Management: SNMP, Solar Winds, HP open view, Wire shark, PRTG and Observium Reports and Network Diagrams: Microsoft (Visio pro.) Languages: JAVA (Rest API, spring boot) Python.

Professional Experience: JLL, Chicago, IL, August 2019 – Till date Role: Sr. Network Engineer Description: Working in a responsible position which includes designing, implementing and troubleshooting. Responsible for Infrastructure project delivery by working with the project managers on both internal and client side. Responsibilities:  Installing and configuring new Cisco equipment including new Cisco catalyst switches 9300, wireless 9130 access points Nexus 5548 and Nexus 7k as per the requirement of the Organization.

                                

Design, Install, Configure, Maintain, and troubleshoot VOIP (SIP) servers, infrastructure, and applications. Involved in designing and implementation of wireless IPT devices. Design Voice solutions for business applications and infrastructure technology. Administration and diagnostics of LAN and WAN with in-depth knowledge of TCP/IP, NAT and associates network protocols and services. Migration to virtual servers in F5 Load balancer as part of web. Configured and installed Meraki router, switches and access points by creating network in Meraki cloud. Expertise in configuration of checkpoint firewall rules, NAT, site to site VPN connections, IPS, OSPF, BGP, EIGRP, RIP, QoS, Active-Active and Active-Passive fail over, smart view tracker. Experience with administration, implementation and troubleshooting of Checkpoint firewalls. Configured Multiprotocol Label Switching (MPLS) VPN with Routing Information Protocol (RIP) on the customer’s site. Implemented device configuration changes and administration for F5 BigIP LTM/GTM. Knowledge in implementing and configuring F5 Big-IP LTM-6400 load balancers. Experience in Configuring, upgrading and verifying the NX-OS operation system. Racking, Stacking, configuring, Nexus 7K, 5K & 2K. Supported on Cisco Nexus 5000 and Nexus 7000 series switch fabric links. Installation and configuration of CISCO VPN concentrators 3000 for VPN tunnel and implementation of SDM for IPSec VPN Upgrading Riverbed steelheads and steelFusion including ESXi hosts in them. Configured and deployed BGP between all sites and WAN service provider, design allowed for dynamic rerouting of traffic in the case of a WAN outage Working on Wi-Fi Portfolio by Configuring and Troubleshooting Wireless Access Points (WAP) and Wireless Controllers (WLC) for limited connections issue in Wireless Local Area Network (WLAN). Configured and troubleshooting Riverbed WAN optimization software to improve the network acceleration at the user end. Worked in a Multi-Protocol environment including Routing Protocols such as RIP, OSPF, EIGRP, MPLS and BGP on Cisco Routers. Experience working with BGP attributes such as Weight, Local-Preference, MED and AS-PATH to influence inbound and out bound traffic. Installed and Configured DNS server and Checkpoint Firewall with IPS feature in Internet Edge. Creating Virtual IP address, Pools and Persistence profiles on F5 LTMs. Worked with MPLS to improve Quality of Service (QoS) by defining LSPs that can meet specific service level agreements (SLAs) on traffic latency, jitter, packet loss and downtime. Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers. Worked on Checkpoint firewalls migration to Palo Alto. Responsible for creating policy rules and NAT rules on checkpoint firewall and also have experience in creating multiple Static NAT's, Dynamic NAT's. Hands on experience in troubleshooting and deploying of various IP Routing Protocols EIGRP, RIP v1/2, OSPF, IS-IS & BGP. Performing troubleshooting on slow network connectivity issues, routing issues that involves OSPF, BGP and identifying the root cause of the issues. Deployment and Management of Bluecoat proxies in forward proxy scenario as well as for security in reverse proxy scenario. Designed and configured the commands for QoS and Access Lists for Nexus 7K and 5K, 9k. Implementing traffic engineering on top of an existing Multiprotocol Label Switching (MPLS) network using Frame Relay and Open Shortest Path First (OSPF). Monitored and resolved network device issues identified by Observium in a timely manner. Responsible for simulating network operations with usage of monitoring tools like Wireshark, Observium thereby resolving tickets as per the issue allotted in the ServiceNow. Apply policy to inbound connections based on different parameters such as IP address, user agents, client location using bluecoat proxy.

 Upgrading and troubleshooting Cisco IOS to the Cisco Switches and routers.  Being part of L3 escalation team, receive the form L2 team during the on-call time Environment: Cisco Nexus 9Ks,7Ks, 5Ks, 2Ks, Cisco and Juniper Routers, Switches, BGP, OSPF, EIGRP, Application Visibility and Control (AVC), NetFlow, Access Control Server (ACS), DMVPN, VPN, LAN, WAN, Observium, Lighthouse console manager, Struxureware, Cisco Prime, VMware, Cisco ISE, Inflobox. NetMRI, Meraki cloud

AT & T, Dallas, TX, NOV 2018 – July 2019 Role: Sr. Network Security Engineer Description: Responsible for designing, testing, implementing, and supporting network services infrastructure. Provide consultation and direct technical support in life cycle planning, problem management, integration, and network configuration. Responsible for project planning and designing a scalable network infrastructure solution to meet business requirements for a high availability network. Responsibilities:  Installing and configuring new Cisco equipment including Cisco catalyst switches 3850, 3750, Nexus 5548 and Nexus 2k as per the requirement of the Organization.  Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel on CISCO Catalyst Switches 3500, 3650, 3850 6500, 7600.  Configuring, Monitoring and Troubleshooting Cisco’s ASA 5500 security appliance, Failover DMZ zoning and configuring VLANs/routing/NAT with the firewalls as per the design.  Established IPSEC VPN tunnels with ASA 5500 series Firewall between some branch offices & headquarters.  Successfully Design and installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/ switches/ firewalls.  Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.  Experience with working on Palo Alto Next-Generation Firewalls Security profiles  Worked with the installation of Palo Alto firewall, migrated with a team from predominantly checkpoint environment to Palo Alto global solution.  Modified and reconfigured two factor authentication BIG-IP APM authentication.  Created Access policies on APM module using AD and LDAP authentication for external clients.  Worked on F5 Enterprise Manager 3.1 version to manage multiple F5 LTM devices from single-pane view.  Hands on Experience configuring and testing F5 I Rules using Browser (IE), HTTP watch.  Worked on F5 LTM series like 1600, 6400 and Viprions for the corporate applications and their availability.  Configured Local & Central Bypass list for blue coat proxy server.  Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 and Juniper J series J230, M 320 and MX960 routers. Worked on Juniper EX4200 & EX4550 switches.  Responsible for installing and configuring Juniper QFX3500 switch. Rebuilt old HQ with core and distribution with new Juniper QFX core switches and EX 4300 distribution switches.  Worked on Juniper SRX 5800 firewalls to create policies using J-Web User Interface.  Develop and coach team of automation controls, networking & data center engineers to build out converged plant floor networks, plant floor virtual, and video, mobility & security solutions.  Dealt with implementation of Cisco ASA 5585 devices and Juniper SRX 550 devices to apply security policies on it.  Worked with the installation of Palo Alto firewall, migrated with a team from predominantly checkpoint environment to Palo Alto global solution.  Migration from Cisco firewalls to Palo Alto firewalls platforms PA 4000 and PA 500 and PA- 200 firewalls network technologies including Optical VoIP VPN SAN switching and routing.  Assisting with the design and deployment of a Cisco Firepower cluster in the core.



Implemented Cisco Application Centric Infrastructure (Cisco ACI) as a solution for data centers using a Spine and Leaf architecture  Troubleshot complex routing and switching issues in a HSRP and GLBP environment.  Performed Troubleshooting and monitored routing protocols such RIP, OSPF, EIGRP & BGP.  Worked on VM Ware migration from physical servers to virtual servers.  Worked on Python, shell scripting and automation Rest APIs integrations  Coordinate with multiple vendors (Cisco, Juniper, etc.) to troubleshoot network outages and issues  Configuration and troubleshooting of CSM, integration with ASA devices.  Working on security levels with RADIUS, TACACS+.  Create a Virtual Network on Windows Azure to connect all the servers.  Configured inside ACL, outside ACL, inside, outside interfaces.  Configuring Static, BGP and OSPF Routing Protocols on Cisco Routers Environment: Cisco 3850/3750/3500/3650/6500/7600 switches, SÁ 5500 firewall, Palo Alto PA-3060 firewall, ASR router 1002/1006, juniper EX-2200, EX-4200, M-320 router, juniper SRX 5800 Fire wall, F5 LTM 1600/6400, OSPF, BGP, EIGRP, VLANS, LAN, WAN Capital One, Plano, TX, SEP 2017 - OCT 2018 Role: Sr. Network Operations Engineer Description: Responsibilities include support and administration of next-generation firewall, IDS, URL filtering, and other related technologies. Administering next-generation firewalls with advanced features such as NAT, transparent deployments, IDS/IPS, URL inspection, HTTPS decryption, and anti-virus. Responsibilities:  Maintain, upgrade and commission of branch and campus sites connectivity into data centers and create a seamless network hardware standard across all North American branches.  Installing, Configuring and troubleshooting Cisco Routers (ASR1002X, 3945, 3845, 2800, 3600) and Switches to perform functions at the Access, Distribution, and Core layers.  Installing, Maintaining and Troubleshooting of Cisco ASR 1K, 7200, 3925E and 2951E Routers and Cisco 6500, 4510, 4500-X, 4948, 3560X, 3750X and 2960S Switches for deployment on production.  Responsibilities include software upgrade, license activation, configuring/installing new ASR router 1002, 1006, Nexus switch 9000, 5000,3000, 9504, 9300, 3200, 2308, F5-5050 and maintaining network documentation.  Experience working with High performance data center switch like nexus 9000, 7000 series.  Experience in configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018.  Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500.  Contributed to the DevOps to automate the build and deployment process using Jenkins, shell scripting, chef, Python, AWS Lambda, Cloud Formation Template, Terraform  Designed and implemented DMZ for Web, Mail & FTP Servers using Cisco ASA5500 Firewalls.  Configured Nexus 2000 Fabric Extender (FEX), which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.  Configuration of Fabric path and connectivity between Nexus 5K and Nexus 7k.  Worked extensively on Cisco ASA 5500(5510/5540) and experience with deploying rules to the Cisco ASA solution.  Experience with configuring FCOE using Cisco nexus 5548.  Hands-on experience of Python scripting, automation using Python, string parsing, libraries, API's, regexp  Hands-on Experience with CISCO Nexus 7000, Nexus 5000, and Nexus 2000 platforms.  Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018.  Automated network implementations and tasks and designed monitoring tools using python scripting  Worked on F5 BIG IP LTM 3600 load balancers to configure Nodes, Pools and VIP’s on a need basis.  Involved in troubleshooting of DNS, DHCP and other IP conflict problems  Configured DNS and DHCP for servers using Infoblox.



Completed basic configurations on the F5 Big-IP LTMs and GTM load balancer on existing network to split traffic on webservers.  Configured one-time password for BIG-IP APM to add more security at the time of initialization of the application  Experience with Using GTM, APM & LTM F5 component to provide 24"7 access to applications.  Configure EPG, update APIC, implement access and fabric policies in Cisco ACI environment.  Provisioning ports in Cisco ACI to support SAN, VoIP, and hypervisors.  Provided proactive threat defense with ASA that stops attacks before they spread through the network.  Configured and created wireless sites using the Cisco Meraki System dashboard.  Implemented site to site VPN on Cisco Meraki MX67, MX65, MC84, and MX400.  Implementing Cisco Meraki Wireless network.  Experience with LAN protocols like VSS, STP, RSTP, MST, VTP, and VLAN.  Administrated LAN and WAN with of TCP/IP, NAT, PPP, ISDN and associates network protocols and services.  Configured Cisco ISE for Domain Integration and Active Directory Integration.  Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.  Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.  Configured and troubleshooting Aruba Wireless products like Access Points and Mobility Access Switches.  Performed site refreshes on Cisco switching and Aruba wireless infrastructure.  Experience with Virtualization technologies like installing, configuring, VMWare vSphere. Creation, management, administration and maintenance of virtual servers and clients  Experience with deployment of Palo Alto firewalls for different NAT, video conferencing traffic.  Integrating Panorama with Palo Alto Firewalls, managing multiple Palo Alto Firewall using Panorama.  Extensive Packet level debugging and troubleshooting on Palo Alto Firewalls to resolve numerous network issues.  Implementation of L3 MPLS-VPN and Migration of branches to the new MPLS cloud4.  Building the VPN tunnel and VPN encryption.  Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.  Configured Easy VPN server and SSL VPN to facilitate various employees’ access internal servers and resources with access restrictions  Configured EBGP load balancing and Ensured stability of BGP peering interfaces  Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.  Maintain and configure L2 and L3 services in MPLS. Configured RT, RD and VRF for L3 MPLS services.  Worked with engineering team to resolve tickets and troubleshoot L3/L2 problems efficiently.  Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support. Environment: Cisco 6500/4510/4500 X/4948/3560X switches, Nexus 9000, 5000,3000, 9504, 9300, 3200, 2308, Cisco ASR 1k/7200/3925E/2951E Routers, Cisco ISE, Aruba 7200/3600 wireless controller, Nexus 2k/5k/9k, Cisco Nexus 7000, ASA 5500/5510/5540 fire walls.

Cerner Corporation, Malvern, PA, SEP 2016 - AUG 2017 Role: Network Engineer Description: As a Network Engineer, design, support, install, and maintain Cerner's internal network infrastructure, related technologies and equipment. In addition, maintain local area network and wireless network components. As a member of this team, working on and maintain hardware components, including firewalls, load balancers, routers, switches and access points as well as troubleshoot network connectivity issues

Responsibilities: Installed and configured Juniper MX480- 960 Routers, EX2200, 4300 Switches, PTX3000 routers, QFX5100, 3500 and QFabric platforms, SRX200 Branch platforms  Configured OSPF, BGP protocols on Juniper routers (MX960, MX480) and troubleshooting them.  Responsible for configuring and troubleshooting the Juniper SRX100 and 110 series, Juniper Net Screen Firewalls like NS50, SSG 550M, SSG520M, ISG 1000, and ISG 2000 with Site-Site VPN for client companies.  Upgraded existing network to Juniper QFX5100 and QFX10k switches, as well as Juniper PTX routers also Provide support installing, configuring, and troubleshooting hardware and software.  Implementing Juniper MX240, 480, and 960 routers into the IP/MPLS core network, along with EX4200 switches.  Configuring switches (Cisco 3650) and routers (Cisco ASR1002-x) that will replace the old devices so that they are compliant with PCI DSS.  Worked on AWS, High Availability Practices and deploying backup/restore infrastructure.  Management of Infoblox Grid Manager to manage DNS Forward and Revers Lookup Zones  Performed Remote Install of Juniper Firewall.  Configuration 7609, 7606 with OSPF and juniper (EX, QFX, and QFabric) switches with various VLAN.  Day to Day task when on Jobs has included Network monitoring with Solarwinds, using Solarwinds/Infoblox IPAM, utilizing Solarwinds, NCM for configuration and Solarwinds NetFlow to view TCP traffic  Revitalized project management processes using ITIL and PMP standards through automation and/or training.  Hardware/Software platforms in production: Cisco, F5, Palo Alto, Infoblox, NetOptics and Solarwinds  Implementation of Access Lists for allowing/blocking desired traffic.  Responsible for Cisco ASA firewall administration, Rule Analysis, Rule Modification  Experience working in Datacenter environment, configuration changes as per the needs of company  Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls  Configured and performed troubleshooting on link state protocols like OSPF in single area and multiple areas  Design and configuring of OSPF, BGP on Juniper Routers.  Configuring, implementing and troubleshooting VLAN's, VTP, STP, Trunking, Ether channels  Designing, implementing LAN/WAN configurations on Cisco 5K, catalyst 6500 switches  Configuring and testing Multicast for both IPv4 and IPv6 routing in Data Center Environment  Extensive knowledge in implementing and configuring F5 Big-IP Local Traffic Manager 3900, and 6900 Load balancers.  Configure, manage, and troubleshoot Palo Alto firewalls to for remote deployment.  Configure, manage, and troubleshoot Palo Alto firewalls IPSec VPN's.  Migrated Juniper SRX firewalls to Palo Alto Network firewalls.  Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls per design.  Troubleshoot issues with network connectivity and issues related to neighbor relationship and peers.  Experience configuring Virtual Device Context in Nexus 5k series switch.  Designed and configured the commands for QoS and Access Lists for Nexus 3K and 5K.  Implemented, configured redundancy protocols HSRP, VRRP, GLBP for Default Gateway Redundancy  Working with Juniper Junos operating system and working on M and MX series routers.  Maintenance and troubleshooting of LAN, WAN, IP Routing, Multilayers Switching  Configuration and troubleshooting of many link types i.e. SONET Controllers for sub E1/T1, E3/T3 and POS controllers for STM1 links  Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches, fixes, and all around technical support of 24*7  Configuration the access-list rules, network object-service group based on well-known port the port i.e. FTP/ SFTP, SSH, HTTPS/HTTPS (SSL) and etc.  Performing network monitoring, providing analysis using various tools like Wire Shark, Solar winds, TAPs etc.  Worked on change management documentation of Network infrastructure design using Microsoft Visio.

Environment: Juniper EX, QFX series Switches, Juniper ACX, PTX, MX Series routers and Nexus 2k,3k,5k, Checkpoint firewall, Cisco ASA 5500, BGP, EIGRP, OSPF, MPLS, VPN, F5 load balancer, HSRP, QoS, VPN, Wire Shark, Solar Winds. Walgreens, Deerfield, IL, SEP 2015 - AUG 2016 Role: Network Engineer Description: Worked as a Network Engineer to maintain the end to end connectivity and assuring the reliable transport of data for the users. Responsibilities:  Supported the Data center network infrastructure consisted of multiple Nexus 9Ks, 7Ks, 5Ks, 2Ks, FWs, Security systems, F5, and VMware environment by maintaining and deploying new technologies.  Worked with F5 Balancers and their Implementation in various Networks.  Providing Level 3 support to customers, resolving issues by attending to conference calls.  Translating Cisco IOS Route maps to Cisco IOS XR routing policies.  Working with Cisco Nexus 2148 Fabric Extender and Nexus 5500 series to provide a Flexible Access Solution for datacenter access architecture.  Evaluate, Plan, Test, and Deploy migration of DNS and DHCP to Infoblox Appliances.  Rewriting existing Java and JavaScript applications in Python  Installation of Palo Alto (Application and URL filtering, Threat Prevention, Data Filtering).  Successfully installed Palo Alto PA-3060 firewalls to protects Data Center  Implemented Positive Enforcement Model with the help of Palo Alto Networks  Configuring RIP, OSPF and Static routing on Juniper M and MX series Routers  Providing Level 3 Engineering and Support to other internal network engineers and contractors.  Designing and installing new branch network systems, resolving network issues, running test scripts and preparing network documentation.  Setup Inflobox for local DHCP & DNS configuration.  Implemented Positive Enforcement Model with the help of Palo Alto Networks.  Deployed Palo Alto Networks PAN-5050.  Working with Cisco Nexus 7000, Nexus 5000, and Nexus 2000 platforms.  Working with BGP, OSPF, EIGRP protocols in MPLS Cloud.  Hands-on experience with iBGP & EBGP.  Worked with network services like DNS, DHCP, DDNS, IP4, IP6, IPsec, VPN etc.  Assisted in a global firewall software upgrade project for 100+ Cisco ASA firewalls  Used VLAN Trunk Protocol (VTP) while configure a new VLAN on one VTP server  Performing OTV to extend L2 VLANs between data centers over IP on Nexus7018 switches.  Worked extensively on BGP4 routing protocol, and configuring BGP, route maps.  Support third party technologies within the ACI ecosystem such as VMware ESX, OpenStack.  Configuration of routing protocols EIGRP and BGP4 for little to medium sized branches supported company branch standards, together with distribution and route maps. Migration of ACS product line onto ISE.  Integration of Cisco ISE with client AD, LDAP, RSA, and Token Servers.  Providing documentation including but not limited to High Level Design (HLD) and Low Level Design (LLD).  Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site  Configuring GLBP, VLAN, VTP's, Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.  Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support  Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning and configuring VLANs/routing/NATing with the firewalls as per the design  Converting Cisco IOS to Cisco IOS XR configurations. Configuring BGP4, MPLS in Cisco IOS XR.



Involved in L2/L3 Switching technology administration including creating and maintaining VLANs, Port security, Trunking, STP, Inter VLAN Routing, LAN security.  Working on security levels with RADIUS, TACACS+. Configuring multiple route reflectors within a cluster.  Gained a high level understanding and operated a multitude of different software, such as (but not limited to): Solarwinds NPM, Solarwinds TFTP Server, Cisco Prime Infrastructure, VSphere client, VMWare Client, Wire Shark, Secure CRT, and FileZilla FTP Client.  Experienced working with Cisco Virtual Switching System (VSS) Environment: Cisco Nexus 9Ks,7Ks, 5Ks, 2Ks, Cisco and Juniper Routers, Switches, BGP, OSPF, EIGRP, Application Visibility and Control (AVC), NetFlow, Access Control Server (ACS), DMVPN, VPN, MPLS, LAN, WAN, Solarwinds, Cisco Prime, VMware, Cisco ISE, Inflobox. TATA Tele Services, Hyderabad, India, June 2012 – July2015 Role: Network Engineer Description: The role of this position is responsible for designing, testing, implementing, and supporting network services infrastructure. This position provides consultation and direct technical support in life cycle planning, problem management, integration, and network configuration. Responsibilities:  Firewall Policy Provisioning and troubleshoot connectivity issues through the firewall.  Worked on Check Point Security Gateways and Cisco ASA Firewall.  Firewall Clustering and High Availability Services using Cluster XL on Check Point.  Troubleshoot User connectivity issues on Checkpoint and Cisco ASA using CLI utilities.  Packet capture on firewalls and analyzing the traffic using Wire shark utilities.  Troubleshot Clustering issues on Check Point and Sync issues monitoring and fix.  Upgrade of Checkpoint Gateways in Cluster with Minimal downtime.  Implemented Active/ Standby HA configuration on Cisco ASA Firewalls.  Configuring Cisco ASA firewalls in Single and Multiple Context Mode firewalls.  Generated property list for every application dynamically using Python  Skilled in using collections in python for manipulating and looping through different user defined objects  Upgrade of Cisco ASA Firewall in Active/Standby mode with no down time.  Designed and built SOAP and RESTful Web service interfaces implemented in Java.  Configuring VPN both B2B and remote access SSL and centralized policy administration using FortiManager, building Fort iGATE High Availability using Fort iGATE Clustering Protocol (FGCP).  Firewall Compliance and Rule remediation for compliance such as SAS 70 Audit.  LAN/WAN level 3 support (diagnose and troubleshoot layer 1, 2, 3 problems)  VLAN design and implementation, Spanning Tree Implementation and support using PVST, R-PVST, and MSTP to avoid loops in the network. Trunking and port channels creation.  Working with OSPF as the internal routing protocol and BGP as exterior gateway routing protocol.  Configuring static NAT, dynamic NAT, inside Global Address Overloading, TCP overload distribution, Overlapping Address Translation on Cisco ASA Firewalls.  Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay).  Deployed a Syslog server to allow proactive network monitoring.  Configured Firewall logging, DMZs and related security policies and monitoring.  Switching related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.  Documentation and Project Management along with drawing network diagrams using MSVISIO. Environment: CISCO routers and switches, Access Control Server, VLAN, Trunk Protocols, CISCO ASA, DHCP, DNS, Spanning tree, Nimsoft.

Related Documents

Manikanth
January 2021 2

More Documents from "kirti"