0% found this document useful (0 votes)
104 views7 pages

Venkat - Network Engineer

yui

Uploaded by

Madhava Rao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views7 pages

Venkat - Network Engineer

yui

Uploaded by

Madhava Rao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Venkat K

Sr. Network Engineer


Email: [email protected]
Phone: 972-428-7626

PROFESSIONAL SUMMARY:
 9+ years of experience as Network Engineer with extensive experience in various technologies such as Palo Alto, Cisco,
switching (STP, Ether Channel, VDC, VPC, FHRP, LLDP, CDP, SPAN, LACP), routing (EIGRP, BGP, OSPF, VRF, PBR, IS - IS,
redistribution, route-maps, etc.), deployment, IOS upgrading, etc. on both Catalyst and Nexus platforms.
 Professionally trained in CCNP-level routing and switching curriculum.
 Excellent Hands-on experience with Cisco ISE and the Migration of Wireless and TACACs to ISE.
 Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
 Expertise in installing, configuring, and troubleshooting of Cisco Routers (3800, 3600, 2800, 2600, 1800, 1700, 800).
 Successfully designed and delivered secure cloud solutions for some Major organizations on AWS Cloud.
 In-depth knowledge on various AWS Services including EC2, VPC (NAT, Peering, VPN), IAM, EC2 Container Service,
Elastic Beanstalk, Lambda, S3, Cloud Front, Glacier, RDS, DynamoDB, ElasticCache, Redshift, Direct Connect, Route 53,
cloud watch, Cloud Formation, Cloud Trial, Opsworks, Amazon Elastic Map Reduce (EMR), AWS IoT, SNS, SQS, Lambda,
API Gateway, AWS Alexa etc.
 Experience working on administering various AWS Services using AWS Console, AWS CLI.
 Experience in designing and configuring of OSPF, BGP on Juniper Routers (MX960, MX480) and SRX Firewalls (SRX240,
SRX550).
 Extensive experience in configuring and testing Verizon ARC BA850 Cradle Point as the turnkey networking solution
for 4G/LTE failover. Experience on MWG, Bluecoat and Zscaler proxies.
 Experience working on Load BalancerF5 LTM, GTM series like 6400, 6800, and 8800.
 Strong knowledge of TACACS+, RADIUS implementation in Access Control Network.
 Good experience on Firewall technologies including general configuration, risk analysis, security policy, rules creation
and modification of Checkpoint R65, R70, R77, Palo Alto and Cisco ASA.
 Experience in configuring all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized
management system (Panorama) to manage large scale Firewall deployments.
 Experience on dealing with VoIP information deployment including troubleshooting protocols like Session Initiation
Protocol (SIP), Real-Time Transport Protocol (RTP), Media Gateway Routing Protocol (MGRP) and Session Description
Protocol (SDP).
 Advanced knowledge in Cisco ASA 5500 series and PIX installation, configuration and maintenance, configuration and
installation of IOS security features and IPS, security risk analysis, attack mitigation & penetration tests based on LPT
methodology.
 Experienced in handling and installing Palo Alto Firewalls
 Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether
channel, STP, RSTP and MST. Implementation of HSRP, VRRP for Default Gateway Redundancy.
 Experience working with Nexus 7K, 5K and 2K and experience using Qualcomm tools like QXDM, QPST, QMICM, QCAT
 Experience working on Juniper Net Screen Firewalls like, NS50, SSG 550M, SSG520M, ISG 1000, and ISG 200.
 Experience on implementation of Juniper Firewall, SSG Series, Net Screen Series ISG 1000, and SRX Series.
 Extensive experience in managing and maintaining 200+ Palo Alto, Cisco ASA, Juniper firewalls and IPS/IDS deployed
across the site.
 Extensively used Splunk for Log review, event correlation and threat analysis and successfully mitigated threats by
applying best practices.
 Successfully updated operating system for Next generation firewalls (Palo Alto, Checkpoint and Cisco).
 Successfully completed App-ID project -Converted all the rules App Id based which resulted in granular traffic control.
 Assisted customers with troubleshooting their networks, security devices, operating systems, e-mail system.
 Strong knowledge of firewalls, DLP, IDS/IPS, Web application firewalls (WAF), anti-virus, URL filtering.
 Strong understanding of information system security vulnerability assessment/testing on a wide variety of
technologies and implementations utilizing both automated tools and manual techniques such as: XSS/CSRF, SQL
Injection, Buffer Overflow, and DoS attacks.
 Hands on experience on Cisco PIXASA Firewalls, Juniper SRX series, Palo Alto, VPN, Troubleshooting Skills, Log Analysis
and Review, Compliance Audit.
TECHNICAL SKILLS:
Network Protocols RIP, RIP V2, EIGRP, OSPF, IS-IS, IGRP, HSRP, VRRP, GLBP, LACP, PAGP, DNS, SMTP, SNMP,
FTP, TFTP, LPD/TDP, WLAN, WEP, POP3 LADP
Routing Protocols QoS, IPsec/SSL, HSRP, EIGRP, OSPF, RIP, BGP, TCP/IP, Multicast, VOIP, Riverbed,
Wireshark, tcpdump, TACACS, Wireless
Switching Protocols VTP, STP, RSTP, MST, VLANs, 802.1q trunking and tunnelling
CISCO Routers 1700, 1800, 2500, 2600, 2800. CISCO High End Router 3600, 3800, 7200, 12010
CISCO Switches 1900, 2950, 2960. CISCO Campus switches 3550XL, 3548, 4984 Core Catalyst 4503, 4507
RE, Catalyst F5 load balancer, Juniper ISG/SRX
Firewall Platforms Checkpoint (NGX R65, 3100, 5100, 5900), Cisco Firewalls (ASA 5505, 5506-X, 5585), Palo
Alto Networks (PA series 2K, 3K and 5K) with panorama 8.0, WAF
Security Protocols Standard and Extended ACLs, IPsec, VPN, Port-security, SSH, SSL, IKE, AAA, Prefix-lists,
Zone-Based Firewalls, NAT/PAT, HIPAA standards, Ingress & Egress Firewall Design,
Content Filtering, Load Balancing, IDS/IPS, URL Filtering, L2F, IDS, TCP Intercept, Router
Security, SNMP trap
Network Management and Wireshark, Infoblox, HP OpenView, Cisco Prime, Splunk, Security Device Manager
Monitoring (SDM), Cisco Works; TCP Dump and Sniffer, SolarWinds Net Flow Traffic Analyzer,
NetScout, Network Performance Monitor (NPM), Network Configuration Manager
(NCM), SAM, IP Address Manager, Additional Polling Engine
Load Balancers and Proxies F5 (BIG-IP) LTM 2000, 3900, 6400, 6800, AV 510, Citrix NetScaler, MWG, Zscaler Proxies,
Bluecoat Proxies
Servers Domain servers, DNS servers, WINS servers, Mail servers, Proxy Servers, Print Servers,
Application servers, FTP servers, NTP
Operating Systems Windows NT 4.0 (Desktop/Server), Windows server, Windows XP/7, LINUX, Solaris, Red
Hat, Active Directory, UNIX
Security/Firewalls Cisco ASA Firewalls, IPSEC & SSL VPNs, IPS/IDS, DMZ Setup, Cisco NAC, ACL, IOS Firewall
features, checkpoint

PROFESSIONAL EXPERIENCE:
Fannie Mae, Boston, MA April 2022 to Present
Role: Sr. Network Engineer
Responsibilities:
 Designed and performed configuration of Cisco Identity Services Engine (ISE) Server to migrate of services from Cisco
Secure Access Control System (ACS) version 4.2(used for Wireless Client Access), Cisco Secure ACS Agent, Cisco
Network Admission Control (NAC) Guest server version 2.0.3 and Cisco Secure ACS version 5.5.0.46 (Used for Terminal
Access Controller Access Control System (TACACS+) to Network Devices) to the new Cisco ISE server.
 Performed support, configuration, testing and documentation for ISE rollout for CenterPoint Energy which includes
making configuration changes in access and distribution layer switches, wireless controllers and ISE nodes.
 Used AWS Cloud platform with features EC2, VPC, ELB, Auto-Scaling, Load Balancing, Security Groups, IAM, EBS, AMI,
RDS, S3, SNS, SQS, Cloud Watch, and Cloud Formation.
 Experience building VPC's for specific environments, and subnetting for private or public needs.
 Developed an AWS security roadmap which included the AWS Services and 3rd party tools to be utilized in the AWS
Cloud for Security monitoring.
 Implemented continuous integration automated build pipelines using Jenkins.
 Deployed Chef Dashboard for configuration management to existing infrastructure.
 Developed an AWS Security Group strategy. Determined naming conventions, owners, and approval process for
Security Group change requests in a promote-to-production environment.
 Configured Terraform to architect and deploy scalable and secure network infrastructure components, including
Virtual Private Clouds (VPCs), subnets, route tables, security groups, Palo Alto Networks (PAN) firewalls, and load
balancers.
 Deployed Palo Alto Virtual Appliances in Azure cloud for Edge security and DMZ deployments.
 Enabled and configured CloudTrail logs for 26 AWS accounts. Created and managed an encrypted S3 Bucket for all
CloudTrail logs and adjusted bucket policy for each account CloudTrail to access.
 Installed and configured Amazon's Inspector. Created Targets and Templates and scheduled Assessment runs on all
EC2 instances in the AWS account.
 Provided ISE deployment services for migration of users from Cisco NAC to Cisco ISE platform for the following
locations.
 Configured and deployed Next Generation Firewalls including Palo Alto, Cisco ASA and Checkpoint Firewalls.
 Profound working knowledge of administration and management of Palo Alto firewalls using centralized Panorama M-
100 and M-500 devices.
 Configured VLANs, Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer
switching architecture.
 Configured ACLs in Juniper SRX 3400 and Palo Alto PA-5050 firewalls for Internet Access requests for servers, Protocol
Handling, Object Grouping, and NAT.
 Upgraded Cisco 7200, 3600 Router IOS Software, backup Routers, and Catalyst 3560, 4500 switch configurations.
 Used the ISE Endpoint Analysis Tool (ISEEAT) to analyze data and design new ISE Profiling Policies.
 Performed operational Moves/Adds/Changes in Integrated Services Engine (ISE) 2.3 including but not limited to
network devices, Identity Groups, Local Hosts, Local Users, Administrator Policies, etc.
 Performed evaluation and analysis of the environment for NSX deployment, including NSX manager, Distributed
Firewall, Distributed Logical Router.
 Addressed technical issues and questions regarding Cisco ISE including troubleshooting and feature changes and
modifications.
 Implementation of Cradle point with 3G/4G LTE as Backup Solution for Clients WAN. Connections and using Enterprise
Cloud Manager for Monitoring.
 Tested 7750 for bandwidth, packet loss, Jitter, latency using network diagnostic tools, QSCOPE before the site is being
integrated to LTE. Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN.
 Consisted of ISE Deployment, Authentication with Active Directory and Microsoft Certificate Authority.
 Responsible for F5 design for few clients, also did migrations as per MOP by our design lead.
 Designed, managed and troubleshoot EIGRP and OSPF routing environment comprised of multiple areas.
 Provided network administration services such as authentication, web filtering and deployment secure gateway using
Bluecoat proxy and Zscaler Cloud solution Proxies.
 Designed and Configured Cisco Identity Services Engine (ISE v2.3) to support corporate connectivity to a new wireless
environment utilizing Active Directory Authentication.
 Worked on IP networking and network security as well as good knowledge in Peripheral Component Interconnect PCI.
 Established and implemented network policies, procedures and standards and ensures their conformance with
information systems and company's objectives, trains users on network operation.
Environment: Checkpoint, Nexus, Cisco 3500, 1400, 1500, 5400, ASA firewall -- ASA5545, ASA5585-SSP-20, firewall PIX-
525, VPN concentrator -- Cisco 3060, check point firewall -- r77, F5 Local Traffic Managers (LTM) 5000, 7000 series, (ISE)
2.3, VLANs, STP, DNS/DHCP issues, Bluecoat proxy, Zscaler, Palo Alto firewalls, Cradle Point, FortiGate TACACs, BGP, AWS,
MPLS, Firewall analyzer, Wireless LAN, service desk, Cisco ISE, Cisco Prime, JUNOS

Citibank, New York, NY January 2020 to March 2022


Role: Network Engineer
Responsibilities:
 Worked on Routing network supported by Cisco 6500, 4500, 3500 routers and gateways 2800, 3800 and 7200 and
Voice Network was supported by Cisco Unified Call Manager and Cisco Unified Unity Connection and wireless
networks with Cisco WLANS, WLC’s of varied series.
 Part of team in data centre responsible for F5 design for few clients, also did migrations as per MOP by our design
lead.
 Design, manage and troubleshoot EIGRP and OSPF routing environment comprised of multiple areas.
 Configuration, Management, Troubleshooting of Network devices (Routers, Switches, Firewalls, Servers, DSL Modems
etc.). Maintained the Telecommunication Connectivity using DSL and T1 Lines.
 Worked on Routers Cisco 2620, Cisco 3750, and Cisco 2950 Switches Link sys wireless access points.
 Faced the Bluecoat proxies for perimeter internet security. Worked on Whitelist and blacklist policies, Proxy
enforcement on end points, WCCM, Proxy Bypass etc.
 Worked on ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS,
ACS (TACACS+ & RADIUS).
 Maintained complex LAN/WAN networks with several VLANS and provided support for routing protocols.
 Worked on Palo Alto (5060, 3060), Checkpoint Firewall R77, juniper and Cisco ASA 5585 firewall.
 Managed multiple Palo Alto firewalls centrally through the Palo Alto Panorama M-500 centralized Management
appliance. Worked with Nexus 9k, 7k, 5k, 2k devices.
 Cisco Meraki Appliance MX (400, 80, 60) and Meraki wireless Access points (MR66, MR18), Installed and configured
Meraki (MX80, MX60) Appliance via Meraki MX400 Cloud.
 Responsible for regular upgrade and maintenance of Infrastructure including Cisco Router and Switches, Juniper
Routers and Firewalls, Nexus 7k, 5k & 2k, F5 BIG IP and Palo Alto Firewalls.
 Troubleshot complex networks layer 1, 2 (frame relay, ATM, Point to Point, ISDN) to layer 3 (routing with MPLS, BGP,
EIGRP, OSPF and RIP protocols) technical issues.
 Performed troubleshooting for IOS related bugs by analyzing history and related notes.
 Carried out documentation for tracking network issue symptoms and large-scale technical escalations.
 Managed the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and
providing all-round technical support.
 Worked on configuration and troubleshooting of Cisco ASR 1002, ASR 9000, 2500, 2600, 6500, 7500, 7200 Series
routers.
 Managed IP addressing and implemented IP Access Lists.
 Knowledge of IP traffic flow, sniffing, capturing and monitoring of live traffic streams. Track current security advisories,
determine core network vulnerability and then provide rapid guidance in order to minimize core network exposure.
 Configured and troubleshoot VLAN, VTP, STP and Trunks.
 Responsible for procurement and installation of H/W, network drives and other IT infrastructure.
 Evaluated and recommended inter-connectivity hardware, software, and services to fulfil various businesses needs as
requirements develop.
 Worked with the Data Centre migration team to provide all the IP requirements, VLAN information, network related
suggestions and provided all the network related suggestions and information.
 Configured various Router interfaces like ATM interface, T3 Channelized T1 interfaces
 Configured and troubleshoot CISCO catalyst 6509, 7609, 7613 with Supervisor cards, Cisco 3640, Cisco GSR 12416,
21418 with PRP and RPR processors. Deployed the first Checkpoint firewall to utilize 12 physical interfaces.
 Configured Nexus 2000 Fabric Extender FEX which acts as a remote line card module for the Nexus 5000.
 Installed new equipment to RADIUS and worked with MPLS-VPN and TACACS configurations.
 Worked on IP Addressing, Sub netting, VLSM and ARP, reverse proxy ARP, Ping Concepts.
 Created new load balancing policies by employing BGP attributes including Local Preference, AS-Path and Community,
MED. Monitored the network with Cisco Works 2000
 Worked with the Data Centre migration team to provide all the IP requirements, VLAN information, network related
suggestions and provided all the network related suggestions and information.
 Configured 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN's.
 Worked on configuration of Access lists (ACL) on Juniper and Palo Alto firewall for the proper network routing for the
B2Bnetwork connectivity.
 Configured VLAN's, configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and
core layer switching architecture.
 Worked on configuration and troubleshooting of Cisco ASR 1002, ASR 9000, 2500, 2600, 6500, 7500, 7200 Series
routers.
 Configured and troubleshoot CISCO catalyst 6509, 7609, 7613 with Supervisor cards, Cisco 3640, Cisco GSR 12416,
21418 with PRP and RPR processors
 Responsible for procurement and installation of H/W, network drives and other IT infrastructure.
 Evaluated and recommended inter-connectivity hardware, software, and services to fulfil various businesses needs as
requirements develop.
 Implemented and troubleshoot complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and
MST.
 Provided Technical Support to clients and on-site engineers during their installations on various products and opened
tickets for the clients documenting the issue and escalating to the respective teams if it cannot be resolved.
 Worked on preparing documents such as BOM, RFP, Floor Plans, Installation guides, Network Flow Diagrams and
documentation using MS Visio, Excel and Word.
 Performed backups and upgrades from time to time on different type of firewalls mostly on Palo Alto, Checkpoint and
Cisco ASA firewalls. Provided support to networks containing more than 2000 Cisco devices.
 Performed firewall migration from Cisco ASA platforms to Paloalto firewalls using Paloalto conversion tool.
 Worked on implementation, administration, maintenance, troubleshooting, and end-user support of all company
Systems/Network/Security primarily in a Windows NT/2000 Servers platform, Windows XP, Cisco, Symantec
environment.
Environment: Cisco3750/3550/3500/2960 switches and Cisco 3640/120007200/3845/3600/2800 Routers, Cisco ASA5510,
Checkpoints, VoIP, MPLS and Cisco Switches and Routers, Junos, RIP, OSPF, EIGRP, BGP, VPN, LAN, WAN, Nexus 7K, 5K, 2K,
SolarWinds, Cisco Prime LMS Version 4.2.4, Palo Alto, Cisco Prime Infrastructure Version 2.2, Cisco Secure ACS Version

UnitedHealth Group, Minnetonka, MN April 2018 to December


2019
Role: Network Engineer
Responsibilities:
 Configured various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs,
HA on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, executed various
migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
 Converted Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience
 Worked on implementing, configuring, and supporting Checkpoint and ASA firewalls for multiple clients.
 Configured IP Quality of Service (QoS). Configuration of QOS policies for VOIP traffic on Access, Distribution and Core
switches. Marking DSCP code points, traffic policing, prioritization, etc.
 Implemented and troubleshot the Virtual firewalls (Contexts) solutions in ASA.
 Worked on upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2900,
3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800) Cisco
Router and Switches, Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, Bluecoat Proxy
and Riverbed Steelhead appliances
 Upgraded Cisco 7200, 3600 Router IOS Software, backup Routers, and Catalyst 3560, 4500 switch configurations.
 Supported 24x7 operations and answered calls from the customers on network emergencies and resolved issues.
 Installed and managed Cisco Catalyst 3500XL, 2960 series Switches, and Cisco 1800, 3900 series routers.
 Configured various BGP attributes such as Local Preference, MED, Extended Communities, Route-Reflector clusters,
route maps and route policy implementation.
 Worked on configuration and troubleshooting complex Routing Protocols (EIGRP, OSPF, and BGP).
 Responsible for configuring and maintaining BGP routing (Route Maps, AS-Path prepend, MED, Local Preference) to
load balance traffic across multiple ISP links.
 Worked extensively in configuring, monitoring, and troubleshooting Juniper security appliance, Failover DMZ zoning &
configuring VLANs/routing/NATing with the firewalls as per the design.
 Converted Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to GetVPN.
 Rebuilt data centers and redundant sites for failover, F5 load balancers.
 Performed firewall migration from Cisco ASA platforms to Palo Alto firewalls using Palo Alto conversion too
 Supported 24x7 operations and answer calls from the customers on network emergencies and resolve issues.
 Installed and managed Cisco Catalyst 3500XL, 2960 series Switches and Cisco 1800, 3900 series routers.
 Involved with team responsible for network infrastructure and the planning and design of enterprise LAN/WAN
solutions. Handled data network issues in and around sites and providing solutions.
 Worked on configuration and troubleshooting complex Routing Protocols (EIGRP, OSPF, and BGP).
 Responsible for configuring and maintaining BGP routing (Route Maps, AS-Path prepend, MED, Local Preference) to
load balance traffic across multiple ISPs links.
 Worked on implementation of Check Point and ASA firewall security.
 Involved in planning and configuring the routing protocols such as OSPF, RIP, and Static Routing on the routers.
 Migrated, created, and managed pools and clusters in F5 BigIP GTM 3DNS load balancers across multiple Datacenters.
 Converted CatOS to Cisco IOS Config Conversion on distribution layer switches.
 Worked on conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used
for local routing only) which involves new wan links.
 Involved in configuration of Access lists (ACL) on Juniper and Palo Alto firewall for the proper network routing for the
B2Bnetwork connectivity.
 Worked on Switching technologies like VLAN, Inter-VLAN Routing, Ether-channel, VTP, MLS, HSRP, VRRP,
 Involved in planning, designing and assisting in deploying enterprise-wide Network Security and High Availability
Solutions for ASA. Supported networks, which are comprised of 1000 Cisco devices.
 Responsible for analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
 Involved in configuring, monitoring and troubleshooting Juniper security appliance, Failover DMZ zoning & configuring
VLANs/routing/NATing with the firewalls as per the design.
 Worked on troubleshooting and management Cisco, Juniper, Huawei, Redback and Extreme devices.
Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco
ASA5510, Checkpoint, Palo Alto, Cisco Nexus7K/5K, 2248/3560/5020/6509, ASA, Checkpoint, LAN, WAN, OSPF, BGP, RIP,
EIGRP, , Nexus 7K,5K,2K, SolarWinds, Cisco ACS, Cisco Prime Infrastructure

Intense Technologies Ltd., Hyderabad, India January 2016 to August 2017


Role: Network Engineer
Responsibilities:
 Deployed and configured Cisco 12000, 7600, 3800 Juniper M series routers Catalyst 6500 series switches for the core,
distribution and access layer in an enterprise composite model network infrastructure.
 Designed and deployed EIGRP, OSPF, BGP, MPLS-VPN protocols and routing technologies for connecting data center
to remote locations.
 Involved in configuring, monitoring and troubleshooting Cisco's PIX firewall, ASA 5500 security appliance, Cisco 4200
IPS appliance, designing and implementation experience in building DMZ, and integration of firewalls with Gateway
Anti-Virus and web Filtering applications from Trend Micro and Web sense.
 Configured various advanced features Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA
on F5 BIGIP appliances SSL termination and initiation, Persistence, Digital Certificates, executed various
migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
 Designed and developed Internet Security policy for the company in order to build a secure and robust network
Infrastructure.
 Planned, tested and evaluated various equipment's, systems, IOS and procedures for use within the Network /
security infrastructure.
 Worked with Nexus 7010, 5020, 2148, 2248 devices.
 Configured Nexus 2000 Fabric Extender FEX which acts as a remote line card module for the Nexus 5000.
 Installed, configured, maintained and troubleshoot JUNOS, Juniper M-Series T-Series routers, Foundry Network L2/L3
Switches.
 Worked with vendors Juniper, Cisco, etc. when issues arise and see it through all the way until issue is resolved or a
bug has been identified and turned over to development.
 Real-time network monitoring using HP Open View by implementing policies and creating custom events. Analysed
network traffic using analyser such as Wireshark.
 Planned, designed, installed and configured LAN/WAN as per organizational / client requirements.
 Responsible for planning and configuring the routing protocols such as OSPF, RIP, and Static Routing on the routers.
 Assisted the certification team and perform configuration of LAN WAN technologies such as Ethernet, Fast Ethernet,
and Gigabit Ethernet.
 Handled data network issues in and around sites and providing solutions.
 Worked on configuration of routers, switches, hubs, modems and other networking devices.
 Constant testing of ring topology between MSANs for continuous connection.
 Maintained end-to-end connectivity for standard E1 and leased lines with backup ISDN.
 Worked with development team to solve network problem and improve the network.
Environment: Cisco 3500/3550/2960 series switches and Cisco 1200/2800/3640Series Routers, Cisco ASA 5500, RIP,
EIGRP, BGP, VPN, LAN, WAN, Nexus 5K,2K, Wireshark, SolarWinds, Cisco ACS, Cisco Prime Infrastructure

ACS Technologies Limited, Hyderabad, India August 2014 to December


2015
Role: Network Administrator
Responsibilities:
 Coordinated timely disaster recovery procedures affecting the stability of data center operations.
 Developed and revised departmental procedure manuals to assist staffs in technical operations.
 Implemented Quality Control procedures to ensure full compliance with Service Level Agreements.
 Monitored and troubleshot LAN, installed and configured routers and switches, and generated weekly reports.
 Managing Exchange 2003 servers and troubleshooting issues related to User and group accounts, mail delivery,
configuring MX records to enable and disable domain.
 Responsible for Security Patch Management and Deployment to all clients using Microsoft WSUS.
 Administering DHCP Server creation of reservation and configuration of server options.
 Configured Terminal Server to access to the servers using Remote Desktop Protocol.
 Installing, troubleshooting and supporting Windows 2003 server administration and Active Directory.
 User Support - Monitoring and troubleshooting system performance, server user related problems. Support users to
resolve their day-to-day issues related to OS, E-mail, Account issues, hardware etc.
 Managed the installation and configuration of Windows 2000 Server/Workstations.
 Created user and computer accounts on the Active directory users and computers.
 Monitored the servers and trouble shot the server issues.
 Resolved the user issues related to Active Directory Users and groups
Environment: VLANs, inter-VLAN routing, VTP, STP, RSTP, PVST, PVST, HSRP, VRRP, EIGRP, OSPF, BGP, IOS update, CISCO
LMS, NMS, Firewall Analyzer, SolarWinds Orion, Spice work, DNS, DHCP, FTP, AD Server

EDUCATION:
 Bachelor in Electronics and Communication Engineering (ECE), Vidya Jyothi Institute of Technology, Hyderabad,
Telangana, India.

CERTIFICATION:
 CCNA Routing and Switching (200-125)
 CCNP Routing & Switching (300-101, 300-115)
 Palo Alto Networks Certified Network Security Engineer (PCNSE)

You might also like