0% found this document useful (0 votes)
28 views8 pages

Hari NetworkEngineer

Harikrishna is a Network & Security Engineer with around 6 years of experience in designing and securing enterprise networks, specializing in various technologies including Cisco and Juniper. He has a proven track record in cloud architecture on AWS and Azure, as well as expertise in managing network security solutions and high-availability infrastructures. Currently, he works at FIS Global, providing networking solutions to banks and managing complex data center architectures.

Uploaded by

ankul kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views8 pages

Hari NetworkEngineer

Harikrishna is a Network & Security Engineer with around 6 years of experience in designing and securing enterprise networks, specializing in various technologies including Cisco and Juniper. He has a proven track record in cloud architecture on AWS and Azure, as well as expertise in managing network security solutions and high-availability infrastructures. Currently, he works at FIS Global, providing networking solutions to banks and managing complex data center architectures.

Uploaded by

ankul kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Harikrishna|469-782-9666|harikrishnanetwork385@gmail.

com|LinkedIn

Professional Summary :
 Around 6 years of experience as a Network & Security Engineer specializing in designing, implementing,
and securing enterprise networks and data center architectures Skilled in routing, firewalls, VPNs, and
security compliance across banking, telecom, and financial sectors, Health care and Expertise in
troubleshooting, optimizing performance, and ensuring high availability.
 expertise in Cisco and Juniper networking and security, I specialize in network design, deployment,
support, and analysis, leveraging cutting-edge tools such as Cisco DNA Center, Junos OS, Nexus and
Catalyst switches, along with security platforms like Cisco ISE and Juniper SRX.
 I have a proven track record in designing and deploying secure, multi-tier applications on AWS and Azure,
utilizing services such as VPC, EC2, Route 53, and CloudFormation to create highly scalable, available, and
cost-efficient cloud architectures.
 I am experienced in developing and managing network security solutions with Palo Alto Networks,
Checkpoint, and Fortinet technologies, implementing advanced features like SSL inspection, intrusion
detection, and micro-segmentation for strong threat prevention.
 I’ve configured and managed Zscaler Internet Access (ZIA) to protect user internet access, utilizing
sophisticated threat protection features to block malware and phishing attacks.
 My expertise also extends to engineering high-availability infrastructures using F5 load balancers,
deploying GSLB, and designing disaster recovery solutions that ensure seamless failover and optimal traffic
distribution across multiple data centers.
 I have successfully deployed and optimized Viptela SD-WAN solutions across global branches, integrating
intelligent traffic steering, dynamic path selection, and application-aware routing to enhance performance
and reliability.
 In the data center space, I’ve designed and implemented Cisco ACI in multi-site environments, setting up
APIC controllers and fabric switches to support application-based network policies and centralized
management.
 I also developed Python scripts to automate network configuration and management tasks, integrating
with RESTful APIs for Cisco, Juniper, and Arista devices to streamline network operations and reduce
manual efforts.
 I’ve designed and deployed AWS VPCs, creating isolated network environments and configuring subnets,
route tables, and security groups to ensure secure and optimized connectivity.
 In network monitoring, I’ve deployed SolarWinds Network Performance Monitor (NPM) to oversee
performance across Cisco, Juniper, and Arista devices, ensuring high availability and rapid troubleshooting.
 I’ve configured and managed Infoblox DNS, DHCP, and IPAM (DDI) solutions, automating IP address
assignments and DNS provisioning to enhance operational efficiency.
 I’ve utilized Cisco ISE profiling capabilities to dynamically identify and classify devices, automating access
policy enforcement and improving network visibility.
 I have extensive experience in VMware vSphere 8.0 environments, configuring ESXi hosts and vCenter
Servers for high availability, resource optimization, and seamless management of virtual machines.
 In wireless networking, I’ve designed high-density solutions using Cisco Catalyst 9800 Series Controllers
and Cisco Aironet 4800 access points, ensuring reliable and high-performance Wi-Fi coverage.
 I’ve managed diverse infrastructure elements, including Cisco Nexus switches (9300, 9500, 9300X, 9500X),
Arista devices (7280R, 7500R, 7280R2, 7500R2), and structured cabling systems, ensuring maximum
reliability and performance.
 I am skilled in troubleshooting complex network issues across Layer 2 and Layer 3 environments using
tools like Wireshark, Splunk, and other network analysis utilities, enabling rapid identification and
resolution of problems.
 Additionally, I’ve integrated Ekahau with Cisco Prime for comprehensive wireless network management
and performance monitoring.
 I am also proficient in deploying and managing wireless LANs across various environments using Cisco,
Aruba, and Meraki access points, conducting site surveys and configuring secure wireless access protocols.
 Lastly, I’ve implemented dynamic routing protocols such as BGP, OSPF, and EIGRP to manage WAN
connectivity, ensuring optimal routing and failover capabilities. I’ve also configured DNS failover and
redundancy with BIND and Windows Server to guarantee reliable DNS services.

TECHNICAL SKILLS:

Routers Catalyst 8300 Series, 8200 Series, ISR 4000 Series, 1000 Series, 900 Series, 800
Series, Catalyst 8300 Series Edge Platforms, ASR 1000 Series, Asr 1013 Router, ASR
901 Series, ASR 9000 Series, 1013 Router. Juniper MX304, MX10008 and MX10004,
SDN-enabled MX10003, SDN-enabled MX2020
Routing Fundamentals Routed and Routing protocols RIP, EIGRP, IS-IS, OSPF, BGP, IPX; MPLS, IPv4, and
and Protocols IPv6 addressing, subnetting, VLSM, Static routing, ICMP, ARP, HSRP, VRRP, Route
Filtering, Multicast, 802.11, Policy-Based Routing, Redistribution, Port forwarding.
Load Balancers F5 (BIG-IP) LTM 2000, 3900Viprion, Cisco ACE, Citrix NetScaler

Switching Fundamentals Ethernet technologies, LAN networks, MAC, VLAN and VTP, STP, PVST+, Multicast,
and Protocols RSTP, Multi-Layer Switching, 802.1Q, EtherChannel, PAGP, LACP, CDP, HDLC, RARP.
Firewall Platforms Checkpoint (NGX R65, 3100, 5100, 5900), Cisco Firewalls (ASA 5505, 5506-X, 5585),
Palo Alto Networks (PA series 2K, 3K and 5K) with panorama 8.0, WAF

Security Protocols Standard and Extended ACLs, IPsec, VPN, Port-security, SSH, SSL, IKE, AAA, Prefix-
lists, Zone-Based Firewalls, NAT/PAT, HIPAA standards, Ingress & Egress Firewall
Design, Content Filtering, Load Balancing, IDS/IPS, URL Filtering, L2F, IDS, TCP
Intercept, Router Security, SNMP trap.
Network Management ServiceNow, Wireshark, Infoblox, HP NView, Cisco Prime, Splunk, Security Device
and Monitoring Manager (SDM), Cisco Works, TCP Dump and Sniffer, SolarWinds Net Flow Traffic
Analyzer, NetScout, Network Performance Monitor (NPM), Network Configuration
Manager (NCM), SAM, IP Address Manager, Additional Polling Engine.
Switch Platforms Cisco Catalyst series 2960, series 3560, 3850, 4500, 6500, 7000, 9000; CISCO Nexus
series 2K, 5K, 3K, 7K, and 9K
Other Networking DHCP and DNS server, Active Directory Management, NTP, NDP, TCP, UDP, FCP,
Protocols and Network Implementation, Troubleshooting techniques, NHRP, NetBIOS, NFS, FTP,
Fundamentals TFTP, HTTP, PAP, PPTP, SIP Trunking, SNMP logging, SMTP, RADIUS and TACACS+,
PBX servers, SDN, SAN.
Operating Systems Windows 10/7/XP, MAC OS, Windows Server, Nexus OS, Cisco IOS XR, Linux, UNIX,
Cumulus.
Canopy Wireless Devices, D-Link Point-to-point Wireless, D-Link APs, CISCO 1200
Wireless Technologies series APs, Clear pass wireless and APs, Cisco Meraki, Linksys Wireless/Wi-Fi
Routers, Prime Infrastructure, Ekahau, Air Magnet, AirWatch and WLC’s (8510,
5508, 5706), Cisco Aironet AP’s (2600, 3600, 3700), ISE, MSE, Aruba 225, Aruba
3000 controller & Airwave, Clear Pass 6.0,6.2,6.5
Scripting Shell Scripting, Python, and Ansible

PROFESSIONAL EXPEREINCE
FIS Global (U.S.A.) – Oct 2023 to Present.
Senior Network Engineer .
Responsibilities :
 Managing hosted data centers and providing networking and security solutions to over 200+ banks across
the USA and Working on routing and switching data center architecture, including multiple VRFs and
complex logical setups.
 Designed, deployed, and managed Palo Alto Networks firewalls globally, including PA-5000 (5220, 5250), PA-
3000 (3220, 3250), and PA-7000 (7050, 7080) Series, to establish secure networks and enforce detailed
application-based security policies.
 Monitoring network traffic using Zabbix for real-time alerts and historical data analysis. Handling scheduled
changes, service requests, and problem incidents through ServiceNow (SNOW) while performing rotational
on-call duties.
 Configured high-availability, VPNs, and threat prevention (including IDS/IPS) in Palo Alto firewalls to provide
comprehensive network protection.
 Configured Aviatrix Transit Network with Palo Alto VM Network Service for robust firewall traffic inspection
and enhanced network security.
 Developed and implemented disaster recovery strategies with AWS services including AWS Backup, Storage
Gateway, and Glacier, and supported Splunk across Unix, Linux, and Windows platforms while adapting to AWS
cloud strategies.
 Configuring and troubleshooting firewalls and VPNs, including Cisco ASA, Palo Alto, GlobalProtect, and
AnyConnect.
 Managing Cisco ACI switch fabric, Nexus (NX-OS) switches, and ASR routers while overseeing migrations of
end-of-life (EOL) switches and transitioning third-party client connections to new infrastructure.
 Implementing and managing firewall policies, compliance configurations, and OS patching while ensuring
PCI compliance by auditing firewall rules and remediating vulnerabilities.
 Handling network,F5- load balancer, and firewall configurations for disaster recovery exercises, ensuring
failover for WAN, core, and internet links.
 Working with Citrix NetScaler to configure SSL VIP (client SSL) setups and migrating clients from OWA
services to Microsoft Exchange Online.
 Handled FortiGate firewalls, local servers, load balancers, LAN, VLAN, switching, and access controllers to
ensure network security and smooth operations.
 Configuring firewall policies for new branch setups, DMZ servers, hosted core services, regulatory
compliance, AD and endpoint services, and voice-video applications such as 8x8, MS Teams, and Webex.
 Setting up and maintaining remote and IPSec VPNs for clients, SSL certificate renewals, and conditional NAT
rules.
 Designed and deployed scalable, fault-tolerant AWS architectures using VPC, EC2, S3, RDS, IAM, Route 53,
and CloudFormation to ensure cloud infrastructure reliability.
 Troubleshooting network connectivity issues across priority levels (P1-P4) and coordinating with WAN
engineers, desktop support, and project managers.
 Managed Forti Manager for centralized firewall management and Forti Analyzer for detailed security
analysis, log correlation, and reporting to improve network visibility and control.
 Configured and managed Zscaler Internet Access (ZIA) for securing user access, blocking threats, filtering
harmful sites, and ensuring policy compliance.
 Managed Zscaler Cloud Proxy Architecture, including GRE tunnel traffic forwarding, Azure AD
authentication, and access policies using Zscaler ZCC 3.6 and ZIA 6.2.
 Worked with SDN solutions like OpenFlow, OpenStack, Cisco SD-WAN (Viptela), Cisco ACI, DDI (Infoblox),
Cisco Meraki, and VMware NSX to enhance network automation.
 Integrated OSPF with BGP on Cisco Catalyst 9600 Series switches to enable route redistribution and improve
routing flexibility.
 Configured traffic aggregation, replication, and filtering with SolarWinds Network Performance Monitor,
and optimized monitoring with Cisco DNA telemetry.
 Deployed and maintained Arista Network Packet Broker (NPB) solutions, including 7300X Series switches,
Wi-Fi 6E access points, and unified management via CloudVision.
 Implemented Viptela SD-WAN policies for application-aware routing and QoS to improve network
performance through centralized management.
 Integrated Cisco Meraki with Viptela SD-WAN solutions for a smooth transition, ensuring efficient network
operations.
 Configured ClearPass Device Insight for automated device classification and policy enforcement based on
device type and behavior.
 Managed CloudVision for centralized Arista device management, including config automation and network-
wide visibility.
 Set up EIGRP over DMVPN on Cisco ISR 4000 Series routers for secure and adaptable routing in remote
sites.
 Deployed Meraki security appliances for VPNs, site-to-site VPNs, and advanced security features like
content filtering and intrusion prevention.
 Utilized Juniper MX Series routers for routing and traffic engineering to optimize network performance and
reliability.
 Designed multi-tier applications on AWS with focus on performance, availability, and cost-efficiency
through auto-scaling and load balancing.
 Implemented SDN technologies like OpenFlow and OpenDaylight for centralized control and automated
network provisioning.
 Configured BGP on Cisco ASR 9000 Series routers for improved routing with multiple ISPs, optimizing
network connectivity.
 Conducted network monitoring and analysis with Wireshark, SolarWinds, Dynatrace, and ExtraHop to
diagnose and resolve issues.
 Configured VXLAN, EVPN, and Layer 2/3 protocols on Cumulus devices to optimize network performance.
 Architected and deployed Cisco ACI in data centers for simplified network management, enhanced
performance, and granular security through micro-segmentation.
 Deployed and managed Cisco DNA Center (DNAC) for end-to-end network visibility, automation, and
assurance.
 Integrated Cisco Meraki with third-party solutions using APIs to enhance network orchestration and
automation.
 Worked with ACI fabric containers using Contrive to ensure policy enforcement at the container level.
 Automated network tasks with Ansible playbooks and Python scripts to streamline configurations, updates,
and deployments.
 Configured SNMP and Syslog on Cisco ASA firewalls for monitoring performance and integrating with SIEM
tools for comprehensive security analysis.
 Proficient with Palo Alto Next-Generation Firewalls, HP ArcSight, Splunk, Wireshark, FireEye, and various
network analysis tools.
 Configured DHCP failover on Windows Server and Cisco IOS for continuous IP address management and
minimized network downtime.

Citi Bank India | Aug 2021 to Aug 2022 .


B2B & Data Center Migration Engineer
Responsibilities :
• Implemented new B2B builds and migrated existing B2B connections (parallel run or hot-cutover) as per
project requirements.
• Worked on data center migration projects, ensuring seamless transitions and minimal downtime and
Coordinated with third-party vendors, business teams, telecom infrastructure, and application teams to
define and finalize network scope.
• Prepared network design documents and obtained approvals from core SMEs, addressing their feedback
before implementation. Conducted failover testing of applications on backup paths and restored
connectivity before executing changes.
• Raised Layer 1 (physical connectivity) and Layer 3 (logical connectivity) change requests, aligning with
application and network device green zones.
• Used Zscaler Internet Access (ZIA) for advanced threat protection, blocking malware and phishing attacks,
and enhancing security against zero-day vulnerabilities.
• Designed cloud solutions on AWS and Azure, configuring VPCs, VPNs, and security groups to build scalable
infrastructures.
• Worked and implemented network connectivity solutions based on third-party/client infrastructure, circuit
ownership, co-location presence, and architecture type (campus, data center, branch, etc.),Prepared bill of
materials (BOMs) for procuring network devices, modules, optics, and connectors.
• Configured routing protocols such as RIP, EIGRP, static, and BGP on perimeter devices to connect vendor
networks, using route filtering (distribution lists, route maps) and redundancy mechanisms (HSRP).
• Configured BGP attributes (AS-path prepend, community-list, weight, local preference) and performed route
manipulation (offset-list for RIP, EIGRP k-values for primary/secondary/tertiary paths) and designed GRE and
encrypted tunnels (GRE over IPSec) for WAN connectivity between branch offices, in-country HQ, and data
center aggregators.
• Led the deployment of Zero Trust Network Access (ZTNA) for secure remote work access without a
traditional VPN and Worked with various Wi-Fi solutions like Arista, Cisco Meraki, and Ruckus to ensure
reliable wireless connectivity in complex environments.
• Managed data center switching, connecting FEX switches for terminal server connectivity, configuring VPCs
for L2 multihoming, and implementing overlay protocols (L2VPN, L3VPN) using BGP eVPN and VXLAN.
Configured VLAN mapping and 802.1Q tagging where required.
• Handled firewall rule configurations, including conditional NAT, IKEv1/IKEv2 IPSec tunnels for secure third-
party WAN connectivity.
• Managed multicast configurations (PIM Sparse Mode, IGMP, PIM-SSM, Multicast Boundary Filtering,
Anycast RP). Developed hardware and logical designs, including cable plans for multiple data center PODs
(Multicast, B2B-1G, B2B-10G, Shared Infra Service, Global Service).
• Utilized ServiceNow (SNOW) for change and incident management, Skybox for firewall rule reviews, HPNA
for network configuration analysis, NetInfo for inventory tracking, and SecureCRT/SSH Tectia for network
device access.
• Integrated Palo Alto firewalls with VMware NSX SDN, ensuring secure traffic inspection and communication
between cloud and on-premises environments.
• Set up IPsec VPN on Juniper MX routers with QoS to prioritize critical traffic and optimize secure
connections.
• Managed Cisco ASA firewalls, setting up security policies, intrusion prevention, and VPN services to protect
network assets.
• Configured Checkpoint Smart Directory for LDAP user management and implemented policies for multiple
clients on Checkpoint firewalls and Migrated from Checkpoint to Palo Alto firewalls, ensuring minimal
disruption and a smooth transition then used to Managed migrations to ACI, ensuring smooth transitions
and seamless L2/L3 connectivity.
• Utilized ZPA to monitor access patterns, adjusting security policies based on analytics to mitigate risks.
• Designed disaster recovery solutions with F5 GTM, ensuring high availability across multiple data centers.
• Deployed and optimized Palo Alto firewall features like App-ID and User-ID for better threat prevention
and application visibility.
• Implemented BGP multipath on Juniper QFX5100 switches for load balancing and redundancy across
network links.
• Configured Access Control Lists (ACLs) on Checkpoint firewalls for secure B2B network routing and also
configured Blue Coat proxies for URL filtering, DLP, and prevention of zero-day exploits.
• Managed network compliance with ClearPass OnGuard’s reporting tools, ensuring endpoint security.
• Configured EIGRP and MPLS on Cisco routers to improve routing and scalability in virtualized networks.
• Deployed Arista’s cognitive Wi-Fi solutions, optimizing wireless performance and integration.
• Automated network management with tools like Puppet and Chef for configuration and compliance
tracking.
• Managed Aruba Central’s AI analytics to optimize network performance and troubleshoot issues.
• Integrated NPBs with security tools to provide network visibility and performance monitoring.
• Led SD-WAN deployment with Viptela, ensuring 99.9% network uptime and efficient management of
remote connections.
• Managed hybrid environments with both Cisco Meraki and Viptela SD-WAN, balancing network loads for
continuous service.
• Configured F5 GTM and LTM for load balancing, traffic management, and high availability.
• Optimized SSL offloading, load balancing, and traffic health checks for improved application performance.
• Led the design and implementation of Azure cloud services, incorporating IaaS, PaaS, and SaaS solutions.
• Automated configuration management and backups for multi-vendor devices using SolarWinds NCM.
• Deployed Blue Coat SSL Visibility Appliances to decrypt traffic and improve threat detection.
• Configured OSPF for routing migration to Cisco Firepower platforms.
• Implemented Arista EOS for network automation and integration with orchestration tools.
• Designed and deployed Arista networking solutions with spine-and-leaf architecture for low-latency data
center connectivity then Integrated DNAC with third-party tools for streamlined network management and
automation.
• Developed custom scripts by Python and Bash and applications using DNAC APIs to enhance platform
functionality and Automated infrastructure management using Ansible for network provisioning and
configuration.
• Replaced ISA Proxy servers with Blue Coat proxies and implemented Websense content filtering for
improved security.

Bank of Maharashtra | June 2020 to Aug 2021.


Role : Firewall & Network Security Operations Engineer
Responsibilities :
 Configured and managed next-generation firewalls (NGFWs), including Palo Alto (PAN-OS NGFW PA-5260)
and Cisco Firepower Threat Defense (FTD), to secure data center environments and administered
Panorama M500 for centralized firewall management and policy enforcement.
 Troubleshot routing and VPN issues, including Site-to-Site and GET VPN on Cisco routers, resolving complex
issues with OSPF, BGP, HSRP, IP-SLA, route maps, policy maps, and ACL and Managed VLANs, VTP, LACP,
and Port Security configurations.
 Ensured security compliance by performing device hardening, disabling hit-count zero rules, mapping port-
based to App-ID rules, and scheduling OS upgrades, Managed Citrix NetScaler for load balancing in one-
arm mode (LTM deployment).
 Leveraged Cisco Tetration for application dependency mapping, identifying external bogus IPs, managing
Active Directory alerts, and applying forensic rules for issue analysis. Utilized Python scripts for monitoring
and detecting malicious processes.
 Monitored and maintained network links with CA Spectrum and e-Health, generating performance reports,
updating network diagrams, and maintaining SOPs post-implementation to ensure consistent network
operations.
 Managed daily service tasks and incident resolution using Unicenter Helpdesk, ensuring quick response to
network security issues and minimizing downtime.
 Configured SD-WAN solutions using Meraki MX Series security appliances, enhancing traffic routing,
performance, and secure network connectivity and Integrated SD-WAN solutions with MPLS for improved
hybrid WAN architecture.
 Configured IPsec VPN tunnels on Cisco ASA 5500-X firewalls, securing site-to-site and remote access
connectivity with strong encryption for data confidentiality and integrity.
 Utilized SolarWinds Network Configuration Manager (NCM) for automated configuration management,
compliance auditing, and backup across multi-vendor network devices, improving operational efficiency
and security.
 Integrated Viptela vEdge routers to establish a secure and scalable SD-WAN fabric, ensuring seamless
connectivity across distributed sites and enhancing network resilience.
 Performed network troubleshooting using tools like Wireshark, tcpdump, and Gigamon for packet analysis
and traffic diagnosis, maintaining optimal network performance.
 Established BGP peering with external ASNs on Arista 7500R Series switches, optimizing inbound and
outbound traffic flow, and utilized BGP route reflectors on Cisco Nexus 7000 Series for efficient route
advertisement.
 Configured OSPF and EIGRP protocols for optimal traffic distribution and reducing routing table size.
Implemented OSPF route summarization and EIGRP unequal-cost load balancing for improved efficiency.
 Deployed SolarWinds IP Address Manager (IPAM) to efficiently manage IP address allocation, ensuring
proper utilization and avoiding conflicts within the network.
 Configured Rapid Spanning Tree Protocol (RSTP) on Cisco Catalyst 9500 Series switches to prevent
network loops and ensure fast convergence, ensuring reliable Layer 2 network stability.
 Implemented Multiple Spanning Tree Protocol (MST) on Juniper EX4300 switches to manage multiple
VLANs and improve network performance and scalability.
 Configured NAT policies on Cisco ASA 5516-X to secure network traffic by managing IP address translation
and preventing unauthorized access.
 Integrated Palo Alto Networks PA-7050 with LDAP and Active Directory for user-based security policies,
using user identification features to enhance security measures based on user identity.
 Configured zone-based firewall policies on Palo Alto Networks PA-5220 to segment network traffic and
enforce security controls based on data sensitivity, minimizing the attack surface.
 Performed evaluations and testing of next-generation firewalls to prevent sophisticated cyber threats and
enhance overall network security.
 Experienced with advanced networking concepts such as SD-WAN, MPLS, LAN/WAN, VLAN, IPsec, VPN,
Ethernet, Spanning Trees, and key routing protocols (EIGRP, BGP, OSPF).
 Assisted with the migration from IPv4 to IPv6, ensuring smooth transition and full compatibility with next-
gen internet standards.
 Worked with enterprise-level Wi-Fi configurations, troubleshooting IP routing, network design, and
wireless networking protocols (including SIP, VoIP, and Unified Communications).
Telstra | -July 2018 to June 2020
Role : Network Engineer – Operations & Support
Responsibilities :
• Monitored network performance using Netcool and managed ticketing through Amdocs CRM (SIIAM).
Coordinated with customers to diagnose on-site faults, provided assurance for link restoration within SLA,
and engaged the appropriate resolver groups for resolution.
• Managed network end devices, including routers, switches, firewalls, WAN accelerators, Meraki access
points, and Meraki switches.
• Configured and troubleshot Cisco ASA firewalls, handling access-list rules, NAT configurations, IPSec &
AnyConnect VPNs, and HA clustering.
• Ensured HIPAA compliance, maintained high availability for EHR/EMR systems, and implemented security
protocols for HL7 data integration and patient data protection.
• Conducted initial troubleshooting on issues such as link failures, BGP active/idle states, OSPF adjacency,
HSRP failures, internet outages, latency concerns, and customer LAN issues.
• Adjusted BGP attributes to optimize incoming and outgoing route selection as per customer requirements.
• Tested copper lines (ADSL, BDSL, etc.) using JDSU Modem, OATS, and GMACS tools.
• Performed Layer 2 and Layer 3 configurations, including EtherChannel, VLANs, VTP, DHCP, port security,
UDLD, and storm control.
• Handled Wavelength Division Multiplexing (WDM) devices, such as ADVA (FSP 3000, FSP 2000) and Nortel,
in collaboration with IBM and HITACHI vendors.
• Conducted router and switch diagnostics, initiated IOS upgrades when recommended by Cisco TAC, and
processed RMA requests for defective Cisco hardware replacements.
CERTIFICATIONS
· Cisco Certified Network Associate (CCNA)
· Palo Alto Certified Network Security Engineer (PCNSE)
· CCNA Security Training by Imedita Pune.
· Master Network Automation with Python for Network Engineers - Udemy
EDUCATION
Masters in CS at WSU -OH,USA.
Bachelor’s in ECE at JNTUH.

You might also like