Hari NetworkEngineer
Hari NetworkEngineer
com|LinkedIn
Professional Summary :
Around 6 years of experience as a Network & Security Engineer specializing in designing, implementing,
and securing enterprise networks and data center architectures Skilled in routing, firewalls, VPNs, and
security compliance across banking, telecom, and financial sectors, Health care and Expertise in
troubleshooting, optimizing performance, and ensuring high availability.
expertise in Cisco and Juniper networking and security, I specialize in network design, deployment,
support, and analysis, leveraging cutting-edge tools such as Cisco DNA Center, Junos OS, Nexus and
Catalyst switches, along with security platforms like Cisco ISE and Juniper SRX.
I have a proven track record in designing and deploying secure, multi-tier applications on AWS and Azure,
utilizing services such as VPC, EC2, Route 53, and CloudFormation to create highly scalable, available, and
cost-efficient cloud architectures.
I am experienced in developing and managing network security solutions with Palo Alto Networks,
Checkpoint, and Fortinet technologies, implementing advanced features like SSL inspection, intrusion
detection, and micro-segmentation for strong threat prevention.
I’ve configured and managed Zscaler Internet Access (ZIA) to protect user internet access, utilizing
sophisticated threat protection features to block malware and phishing attacks.
My expertise also extends to engineering high-availability infrastructures using F5 load balancers,
deploying GSLB, and designing disaster recovery solutions that ensure seamless failover and optimal traffic
distribution across multiple data centers.
I have successfully deployed and optimized Viptela SD-WAN solutions across global branches, integrating
intelligent traffic steering, dynamic path selection, and application-aware routing to enhance performance
and reliability.
In the data center space, I’ve designed and implemented Cisco ACI in multi-site environments, setting up
APIC controllers and fabric switches to support application-based network policies and centralized
management.
I also developed Python scripts to automate network configuration and management tasks, integrating
with RESTful APIs for Cisco, Juniper, and Arista devices to streamline network operations and reduce
manual efforts.
I’ve designed and deployed AWS VPCs, creating isolated network environments and configuring subnets,
route tables, and security groups to ensure secure and optimized connectivity.
In network monitoring, I’ve deployed SolarWinds Network Performance Monitor (NPM) to oversee
performance across Cisco, Juniper, and Arista devices, ensuring high availability and rapid troubleshooting.
I’ve configured and managed Infoblox DNS, DHCP, and IPAM (DDI) solutions, automating IP address
assignments and DNS provisioning to enhance operational efficiency.
I’ve utilized Cisco ISE profiling capabilities to dynamically identify and classify devices, automating access
policy enforcement and improving network visibility.
I have extensive experience in VMware vSphere 8.0 environments, configuring ESXi hosts and vCenter
Servers for high availability, resource optimization, and seamless management of virtual machines.
In wireless networking, I’ve designed high-density solutions using Cisco Catalyst 9800 Series Controllers
and Cisco Aironet 4800 access points, ensuring reliable and high-performance Wi-Fi coverage.
I’ve managed diverse infrastructure elements, including Cisco Nexus switches (9300, 9500, 9300X, 9500X),
Arista devices (7280R, 7500R, 7280R2, 7500R2), and structured cabling systems, ensuring maximum
reliability and performance.
I am skilled in troubleshooting complex network issues across Layer 2 and Layer 3 environments using
tools like Wireshark, Splunk, and other network analysis utilities, enabling rapid identification and
resolution of problems.
Additionally, I’ve integrated Ekahau with Cisco Prime for comprehensive wireless network management
and performance monitoring.
I am also proficient in deploying and managing wireless LANs across various environments using Cisco,
Aruba, and Meraki access points, conducting site surveys and configuring secure wireless access protocols.
Lastly, I’ve implemented dynamic routing protocols such as BGP, OSPF, and EIGRP to manage WAN
connectivity, ensuring optimal routing and failover capabilities. I’ve also configured DNS failover and
redundancy with BIND and Windows Server to guarantee reliable DNS services.
TECHNICAL SKILLS:
Routers Catalyst 8300 Series, 8200 Series, ISR 4000 Series, 1000 Series, 900 Series, 800
Series, Catalyst 8300 Series Edge Platforms, ASR 1000 Series, Asr 1013 Router, ASR
901 Series, ASR 9000 Series, 1013 Router. Juniper MX304, MX10008 and MX10004,
SDN-enabled MX10003, SDN-enabled MX2020
Routing Fundamentals Routed and Routing protocols RIP, EIGRP, IS-IS, OSPF, BGP, IPX; MPLS, IPv4, and
and Protocols IPv6 addressing, subnetting, VLSM, Static routing, ICMP, ARP, HSRP, VRRP, Route
Filtering, Multicast, 802.11, Policy-Based Routing, Redistribution, Port forwarding.
Load Balancers F5 (BIG-IP) LTM 2000, 3900Viprion, Cisco ACE, Citrix NetScaler
Switching Fundamentals Ethernet technologies, LAN networks, MAC, VLAN and VTP, STP, PVST+, Multicast,
and Protocols RSTP, Multi-Layer Switching, 802.1Q, EtherChannel, PAGP, LACP, CDP, HDLC, RARP.
Firewall Platforms Checkpoint (NGX R65, 3100, 5100, 5900), Cisco Firewalls (ASA 5505, 5506-X, 5585),
Palo Alto Networks (PA series 2K, 3K and 5K) with panorama 8.0, WAF
Security Protocols Standard and Extended ACLs, IPsec, VPN, Port-security, SSH, SSL, IKE, AAA, Prefix-
lists, Zone-Based Firewalls, NAT/PAT, HIPAA standards, Ingress & Egress Firewall
Design, Content Filtering, Load Balancing, IDS/IPS, URL Filtering, L2F, IDS, TCP
Intercept, Router Security, SNMP trap.
Network Management ServiceNow, Wireshark, Infoblox, HP NView, Cisco Prime, Splunk, Security Device
and Monitoring Manager (SDM), Cisco Works, TCP Dump and Sniffer, SolarWinds Net Flow Traffic
Analyzer, NetScout, Network Performance Monitor (NPM), Network Configuration
Manager (NCM), SAM, IP Address Manager, Additional Polling Engine.
Switch Platforms Cisco Catalyst series 2960, series 3560, 3850, 4500, 6500, 7000, 9000; CISCO Nexus
series 2K, 5K, 3K, 7K, and 9K
Other Networking DHCP and DNS server, Active Directory Management, NTP, NDP, TCP, UDP, FCP,
Protocols and Network Implementation, Troubleshooting techniques, NHRP, NetBIOS, NFS, FTP,
Fundamentals TFTP, HTTP, PAP, PPTP, SIP Trunking, SNMP logging, SMTP, RADIUS and TACACS+,
PBX servers, SDN, SAN.
Operating Systems Windows 10/7/XP, MAC OS, Windows Server, Nexus OS, Cisco IOS XR, Linux, UNIX,
Cumulus.
Canopy Wireless Devices, D-Link Point-to-point Wireless, D-Link APs, CISCO 1200
Wireless Technologies series APs, Clear pass wireless and APs, Cisco Meraki, Linksys Wireless/Wi-Fi
Routers, Prime Infrastructure, Ekahau, Air Magnet, AirWatch and WLC’s (8510,
5508, 5706), Cisco Aironet AP’s (2600, 3600, 3700), ISE, MSE, Aruba 225, Aruba
3000 controller & Airwave, Clear Pass 6.0,6.2,6.5
Scripting Shell Scripting, Python, and Ansible
PROFESSIONAL EXPEREINCE
FIS Global (U.S.A.) – Oct 2023 to Present.
Senior Network Engineer .
Responsibilities :
Managing hosted data centers and providing networking and security solutions to over 200+ banks across
the USA and Working on routing and switching data center architecture, including multiple VRFs and
complex logical setups.
Designed, deployed, and managed Palo Alto Networks firewalls globally, including PA-5000 (5220, 5250), PA-
3000 (3220, 3250), and PA-7000 (7050, 7080) Series, to establish secure networks and enforce detailed
application-based security policies.
Monitoring network traffic using Zabbix for real-time alerts and historical data analysis. Handling scheduled
changes, service requests, and problem incidents through ServiceNow (SNOW) while performing rotational
on-call duties.
Configured high-availability, VPNs, and threat prevention (including IDS/IPS) in Palo Alto firewalls to provide
comprehensive network protection.
Configured Aviatrix Transit Network with Palo Alto VM Network Service for robust firewall traffic inspection
and enhanced network security.
Developed and implemented disaster recovery strategies with AWS services including AWS Backup, Storage
Gateway, and Glacier, and supported Splunk across Unix, Linux, and Windows platforms while adapting to AWS
cloud strategies.
Configuring and troubleshooting firewalls and VPNs, including Cisco ASA, Palo Alto, GlobalProtect, and
AnyConnect.
Managing Cisco ACI switch fabric, Nexus (NX-OS) switches, and ASR routers while overseeing migrations of
end-of-life (EOL) switches and transitioning third-party client connections to new infrastructure.
Implementing and managing firewall policies, compliance configurations, and OS patching while ensuring
PCI compliance by auditing firewall rules and remediating vulnerabilities.
Handling network,F5- load balancer, and firewall configurations for disaster recovery exercises, ensuring
failover for WAN, core, and internet links.
Working with Citrix NetScaler to configure SSL VIP (client SSL) setups and migrating clients from OWA
services to Microsoft Exchange Online.
Handled FortiGate firewalls, local servers, load balancers, LAN, VLAN, switching, and access controllers to
ensure network security and smooth operations.
Configuring firewall policies for new branch setups, DMZ servers, hosted core services, regulatory
compliance, AD and endpoint services, and voice-video applications such as 8x8, MS Teams, and Webex.
Setting up and maintaining remote and IPSec VPNs for clients, SSL certificate renewals, and conditional NAT
rules.
Designed and deployed scalable, fault-tolerant AWS architectures using VPC, EC2, S3, RDS, IAM, Route 53,
and CloudFormation to ensure cloud infrastructure reliability.
Troubleshooting network connectivity issues across priority levels (P1-P4) and coordinating with WAN
engineers, desktop support, and project managers.
Managed Forti Manager for centralized firewall management and Forti Analyzer for detailed security
analysis, log correlation, and reporting to improve network visibility and control.
Configured and managed Zscaler Internet Access (ZIA) for securing user access, blocking threats, filtering
harmful sites, and ensuring policy compliance.
Managed Zscaler Cloud Proxy Architecture, including GRE tunnel traffic forwarding, Azure AD
authentication, and access policies using Zscaler ZCC 3.6 and ZIA 6.2.
Worked with SDN solutions like OpenFlow, OpenStack, Cisco SD-WAN (Viptela), Cisco ACI, DDI (Infoblox),
Cisco Meraki, and VMware NSX to enhance network automation.
Integrated OSPF with BGP on Cisco Catalyst 9600 Series switches to enable route redistribution and improve
routing flexibility.
Configured traffic aggregation, replication, and filtering with SolarWinds Network Performance Monitor,
and optimized monitoring with Cisco DNA telemetry.
Deployed and maintained Arista Network Packet Broker (NPB) solutions, including 7300X Series switches,
Wi-Fi 6E access points, and unified management via CloudVision.
Implemented Viptela SD-WAN policies for application-aware routing and QoS to improve network
performance through centralized management.
Integrated Cisco Meraki with Viptela SD-WAN solutions for a smooth transition, ensuring efficient network
operations.
Configured ClearPass Device Insight for automated device classification and policy enforcement based on
device type and behavior.
Managed CloudVision for centralized Arista device management, including config automation and network-
wide visibility.
Set up EIGRP over DMVPN on Cisco ISR 4000 Series routers for secure and adaptable routing in remote
sites.
Deployed Meraki security appliances for VPNs, site-to-site VPNs, and advanced security features like
content filtering and intrusion prevention.
Utilized Juniper MX Series routers for routing and traffic engineering to optimize network performance and
reliability.
Designed multi-tier applications on AWS with focus on performance, availability, and cost-efficiency
through auto-scaling and load balancing.
Implemented SDN technologies like OpenFlow and OpenDaylight for centralized control and automated
network provisioning.
Configured BGP on Cisco ASR 9000 Series routers for improved routing with multiple ISPs, optimizing
network connectivity.
Conducted network monitoring and analysis with Wireshark, SolarWinds, Dynatrace, and ExtraHop to
diagnose and resolve issues.
Configured VXLAN, EVPN, and Layer 2/3 protocols on Cumulus devices to optimize network performance.
Architected and deployed Cisco ACI in data centers for simplified network management, enhanced
performance, and granular security through micro-segmentation.
Deployed and managed Cisco DNA Center (DNAC) for end-to-end network visibility, automation, and
assurance.
Integrated Cisco Meraki with third-party solutions using APIs to enhance network orchestration and
automation.
Worked with ACI fabric containers using Contrive to ensure policy enforcement at the container level.
Automated network tasks with Ansible playbooks and Python scripts to streamline configurations, updates,
and deployments.
Configured SNMP and Syslog on Cisco ASA firewalls for monitoring performance and integrating with SIEM
tools for comprehensive security analysis.
Proficient with Palo Alto Next-Generation Firewalls, HP ArcSight, Splunk, Wireshark, FireEye, and various
network analysis tools.
Configured DHCP failover on Windows Server and Cisco IOS for continuous IP address management and
minimized network downtime.