Sr Network Engineer Admin - Information Technology Resume Search
Sr Network Engineer Admin - Information Technology Resume Search
My Spider Scam Awareness Contacting Us F. A. Q.
 
Job Seekers
Search Jobs
Browse Jobs
Post a Resume
Job Alerts
 
Employers
Search Resumes
Browse Resumes
Post a Job

Sr Network Engineer/Admin Resume


Desired Industry: Information Technology SpiderID: 72983
Desired Job Location: Dallas, Texas Date Posted: 7/14/2014
Type of Position: Full-Time Permanent Availability Date:
Desired Wage:
U.S. Work Authorization: Yes
Job Level: Management (Manager, Director) Willing to Travel: Yes, 25-50%
Highest Degree Attained: Masters Willing to Relocate:


Experience:
PROFESSIONAL EXPERIENCE DETAIL
Renier Capital Investments, Inc Sr Admin/Project Manager (CEO) 2009 ¡V Present

Company Overview ¡V Renier Capital Investments, Inc. is a company providing investment portfolio management services. Responsibilities handled:
• Lead to a team of professionals responsible for the day-to-day management, client relations/support, change management, policies and procedures, compliance to meet federal and state regulations.
• Technical financial consultant responsible for improving the existing business model and support of various mission-critical technologies as part of the overall Business Plan.
• Professional Responsibilities include Administration, Management and Technical Consulting for companywide workflow and high-tech business processes along with researching, analyzing, and creating infrastructure business plans to secure the correct applications to achieve needed enterprise training programs, and incorporating appropriate assets needed to improve business sales.
• As needed responsibilities included technical support and training of new professionals, and research and development, regulatory compliance audits, data analysis current/upcoming trends, and negotiating corporate contracts, vendor relations, asset inventory audits and other documentation.

Texas Instruments Sr. Analyst/Project Manager (FPM) 2006 ¡V 2009

Company Overview ¡VTexas Instruments is an American company that designs and makes semiconductors, which it sells to electronics designers and manufacturers globally. They employ over 35,000 personnel globally and utilize a highly complex multi-area global network infrastructure. Responsibilities included:
• Managed a team responsible for multi-national analysis, monitoring, implementing and supporting enterprise business solutions to ensure adherence to the goals of the overall business strategy.
• Technical activities and responsibilities include day to day design, engineering, implementation and support of business systems in additional to project coordination and planning within internal and external teams.
• Professional activities and responsibilities included, consulting technical and non-technical business clients to effectively resolve challenges, research and implement solutions, and while maintaining proper documentation and providing detailed reports to upper management.

Intel Corporation Senior Analyst (SFA) 1995 ¡V 2006

Company Overview ¡V Intel Corporation is an American multinational semiconductor chip maker corporation. They are the world¡¦s largest and highest valued semiconductor chip maker, based on revenue. Intel currently employs over 100,000 people worldwide utilizing a complex global network infrastructure. Below will be responsibilities handled:
• Lead to a group of professionals responsible for the day-to-day overall support of mission-critical LAN/WAN enterprise technologies located within a local area network (LAN).
• General technical responsibilities included the installation, implementation, administration, support, and troubleshooting of various mission-critical technologies, hardware break fixes, software resolutions, technical training of end-users as required, as well as adds moves/changes.
• Specific technical responsibilities include but not limited to development of quality assurance test laboratory for LAN/WAN network technologies, servers and desktop technologies for manufacturing facilities to test utilizing Logic Analyzers, Digital Scopes, Noise parameters measurement Instrumentation.
• Professional responsibilities included interdepartmental communications and coordination, timely reporting to appropriated groups, documentation, administration, following company policies and procedures, and project management.

Philips / Palisades Geophysical Institute Engineer (HDE) 1992 ¡V 1995

• Technical activities and responsibilities include product design, development, engineering, implementation and support of telecommunication products and C-language based software applications and project coordination and management of implementation teams in coordination with in-house client project staff.
• Professional responsibilities included interdepartmental communications and coordination, timely reporting to appropriated groups, documentation, administration, following company policies and procedures, and project management.


Education:
EDUCATION
Certified WAN Engineering Program LANWAN Professional
Master of Science in Finance Oregon Graduate Institute
Master of Engineering in Electrical Engineering University of Puerto Rico
Bachelor of Science in Electrical Engineering University of Puerto Rico


Skills:
TECHNICAL SKILLS SUMMARY
LAN/WAN Hardware: Cisco IOS, Routers (3900, 2900, 1900, 800), Cisco Catalyst (6500, 5500, 4900, 4500, 3000, 3100), Cisco Nexus (1010/1010x, 2000, 5010, 5020, 5548P, 5548UP, 7000), Cisco ASA 5500 Series, Cisco WLC, JUNOS, Juniper Series (E, M, MX, T, TX), Dell PowerConnect, Avaya, Brocade.
Routing/Switching: WAN, LAN, TCP/IP, Spanning Tree, BPDU, CDP, Frame-relay, PPP, ACL, Network Address Translation (NAT), Port Address Translation (PAT), Access Control List, OSPF Virtual links, RIPng, RIP, RIPv2, OSPF, EIGRP, BGP, MPLS, VTP, SNMP, SNMPv3, SMTP, ARP, TCP, UDP, Static Routing, Stub Routing, VLAN Trunking, Multi-Area OSPF, NBMA, Sonet, VLAN, VTP, HSRP, SVI, CEF, BPDU, Portfast, GLBP, VRRP, IPv6, Load Balancing.
Voice Technologies: Computer Telephony Integration (CTI), VoIP, CUCM, QoS, PoE, H.323, SIP, MGCP, RTP, SCCP, SRTP, UCCM, UCCX, JAIN, TAPI, XML, Megaco, DTMF, Codec.
Security Technologies: AAA, IPS/IDS, TACACS+, RADIUS, SSH, Site-to-Site VPN, SSL VPN, Cisco ACS, Data Loss Prevention, IPSec, Data Management Zone, Pretty Good Protection (PGP), Public Key Infrastructure (PKI), Internet Key Exchange Policy, Port Security, MAC Address Filtering, IPS/IDS, NPS, Threat-Detection, Advanced TCP Intercept, Scanning Threat Detection.
Wireless Technologies: IEEE 802.1x & 802.11 a/b/g/n, WLAN, WAP, AP, SSID, LWAPP, CSMA/CA, Bluetooth, HomeRF, MMDS, LMDS, Aironet, CCK, DSSS.
Monitoring Tools/Hardware: Finisar, Wireshark, Remedy, Openview, Cacti, Nagios, VMware, Solarwinds, F5, Cisco Works, LogicMonitor, Cisco Security Manager Suite, DNS Servers, DHCP Servers, NTP Server, TFTP Server, Exchange Server, Blade Servers, Web Servers, Syslog, FTP, SFTP.


Additional Information:
SUMMARY OF TECHNICAL ACCOMPLISHMENTS
Routing & Switching
• Implement VLAN Trunking Protocol to reduce administrative overhead. Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switchports following Layer 2 security best practices.
• Create and manage Local VLANs based on department function, and configure ports with static VLAN assignment, static 802.1Q trunks, and dynamic ISL trunking using PAgP for layer 2 forwarding. Utilize VLAN Spanning-Tree in conjunction with PVST+ for compatibility between Cisco and Juniper switches. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays. Modify spanning-tree parameters for manual root bridge assignment. Implement ether-channels between each switch using PAgP for negotiation. Modify ether-channel load balancing method.
• Implement WAN links between sites using frame-relay point-to-point and multipoint connections to establish connectivity between each of the four sites as required. Establish frame-relay point-to-point connections three of the sites creating a full mesh. Implement hub and spoke network between three of the sites with the main office as the hub for redundant connections.
• Implement EIGRP routing for point-to-point and Non Broadcast Multi-Access networks. Ensure that the spoke routers are receiving routing information about each other from the hub. Configure EIGRP unequal-cost load balancing to also use the lower capacity multipoint links when routing packets.
• Prevent neighbor adjacencies from being formed as well as the sending and receiving of routing updates on unnecessary interfaces. Implement EIGRP MD5 Message Authentication between sites to prevent unauthorized insertion of routes into the domain. Implement manual EIGRP route summarization to reduce routing protocol demand on CPU resources, memory, and bandwidth used to maintain the routing table.
• Implement OSPF routing with multiple areas for networks between sites. Implement totally stubby areas to lower the system resource utilization of routing devices for the network. Implement NSSA area to allow injection of external routes into the area and propagation into the OSPF domain.

Security
• Implement an IPSec Site-to-Site VPN between the Cisco ASA5505 at small office location and Cisco 1841 ISR with a security IOS image at the main office. Implementation of the VPN includes the following configurations: Internet Key Exchange Policy using DES and SHA for encryption and authentication, access-lists to define VPN traffic, transform set using esp-des esp-sha-hmac to define how the traffic is protected, crypto-map to associate the previously configured elements to a peer, and application of the crypto map to appropriate interface or VPN endpoint.
• Implementation of Zone-Based Policy Firewall on the Cisco 1841 ISR with the following components: three zones, class-maps specifying traffic that must have policy applied as it crosses a zone-pair, policy maps to apply action to the class-maps¡¦ traffic, zone-pairs, and application of policy to zone pairs.
• Implement a Clientless SSL VPN (WebVPN) to allow users to establish a secure, remote-access VPN tunnel to the Cisco ASA 5505 using a web browser. Prepare the Cisco ASA with necessary configurations to self-signed certificate generation. Generate a general purpose RSA key-pair for certificate authority identification, configure certificate authority trustpoint for the WebVPN using self enrollment, and configure CA trustpoint interface association.
• Configure Syslog on the Cisco ASA5505 with logging to a host and internal buffer. Forward all logging to an internal Syslog server for monitoring and management. Configure and manage Syslog output generation using custom message lists. Implement FTP backup of internal buffer when it is exceeded.
• Implement Basic Threat-Detection, Advanced TCP Intercept, and Scanning Threat-Detection. Simulate attacks on network to manage threat-detection rates and verify Syslog generation.
• Utilize Cisco ASA5505 Modular Policy Frame-Work to configure and manage layer 3/4 interface service policies, apply inspection and connection limits to services, apply inspection and QoS policing to HTTP traffic. Configure HTTP inspection policy to block restricted sites and file downloads.

Voice
• Implement a local voice network with the following network elements: Cisco 2811 ISR (VoIP) with a Cisco Unity Express Network Module (NM-CUE) installed, Cisco Communications Manager Express, a standard Cisco 3550 Switch, and a Cisco 3550 switch with Power-over-Ethernet. Create and manage Data and Voice VLANs, and configure ports with static VLAN assignment and 802.1Q trunks for layer 2 forwarding. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.
• Configure Fast Ethernet main and sub-interface assignments as required for intervlan routing. Implement static routes for local connectivity. Implement NTP server, DHCP server, and TFTP server for support of the VoIP network. Modification of system level parameters including max phones, max directory numbers, display format for date and time, and setting the Time-Zone.
• Implement Unity Voicemail on the Cisco Unity Express Network Module. Configure a dial-peer on the Cisco 2811 ISR to define the attributes of the packet voice network connection to the Cisco Unity Express Network Module. Enable call forwarding on busy or no answer. Implement Message Waiting Indicators and Voicemail access via SMTP. Daisy-chain PCs to VoIP phones to reduce network cabling costs. Utilize PoE ports for VoIP phones to reduce power infrastructure costs.

Wireless
• Implement a wireless network infrastructure providing access to wired LANs to increase mobility and productivity utilizing the following network elements: Cisco Wireless LAN Controller (WLC) 2106, a Cisco 3550 switch, a Cisco 1130AG series Access Point, and a Cisco 1121G series Access Point. Create wireless LANs and configure interface association, security parameters, and radios used. Utilize the Wireless LAN Controllers web GUI to configure and manage the wireless network. Configure internal DHCP scopes for WLANs.
• Prepare infrastructure for AP registration on same subnet as management VLAN and for AP registration on different subnet. Configure AAA AP policies to allow Self Signed Certifications for APs shipped without a Manufacturer Installed Certificate. Implement AP Grouping to ensure WLAN SSIDs are only broadcast by the APs desired.


Reference:
Available upon request.


Candidate Contact Information:
JobSpider.com has chosen not to make contact information available on this page.
Click "Contact Candidate" to send this candidate a response.


    





© 2019 Job Spider
Privacy Policy | CC Marketing Sites | Site Map | Links