Network Engineer - Computer Hardware Resume Search
Network Engineer - Computer Hardware Resume Search
My Spider Scam Awareness Contacting Us F. A. Q.
Job Seekers
Search Jobs
Browse Jobs
Post a Resume
Job Alerts
Search Resumes
Browse Resumes
Post a Job

Network Engineer Resume

Desired Industry: Computer Hardware SpiderID: 72920
Desired Job Location: San Diego, California Date Posted: 7/6/2014
Type of Position: Full-Time Permanent Availability Date:
Desired Wage:
U.S. Work Authorization: Yes
Job Level: Experienced with over 2 years experience Willing to Travel: Yes, 50-75%
Highest Degree Attained: Bachelors Willing to Relocate: Undecided

An IT professional with over 15 years of experience in configuration, engineering, installing, implementation, consulting, administration, documentation, maintenance, remote technical support and troubleshooting of various technologies for medium to corporate enterprise environments.

LANWAN Professional Technology Associate 2013-Present

Company Overview - LAN/WAN Professional is a nationwide membership organization of LAN/WAN professionals including administrators, engineers, consultants, analysts, architects located throughout the continental United States. The services it provides to its members include but not limited to technical and professional support and mentoring on any and all activities relating to performing the duties within LAN/WAN. The following is list of responsibilities personally handled:

 Responsible for assessing, supporting and mentoring LAN/WAN professionals and contractors located throughout the continental United States on various professional and technical issues relating to local area networks (LAN) and Wide Area Networks (WAN) including routing, switching, voice, wireless and security.
 Primary activities included technical assessment of a candidate’s qualification to perform the duties of various LAN/WAN positions including escalation support, administration, engineering, analysis and project management.
 Secondary responsibilities included facilitating and supporting any and all escalated Tier 2/3 technical issues including installation, configuration, design and troubleshooting activities for LAN/WAN engineers located nationwide.
 Additional responsibilities included reviewing configuration, implementation activities to ensure proper functionality and providing necessary mentoring to engineers engaged in these activities to ensure proper implementation.
 Other activities included as needed and schedule reports to senior management on the status of technical implementation activities, professional/technical review on LAN/WAN Professionals and its overall success.

Burleigh Point Ltd Technical Lead (RAM) 2006-2012

Company Overview – Burleigh Point Ltd, otherwise known as Billabong International, is an international company with a complex global network with over 6,000 users spread over 80 locations in 6 continents including North America, Australia, Asia, Africa, South Africa, and Europe. Below will be a list of responsibilities personally handled:

 Lead to a team of professionals responsible for the day-to-day administration and support of various mission-critical technologies located in over 80 locations.
 Technical responsibilities include the installation, configuration, and troubleshooting of servers, administration, maintenance, software/hardware, setup of databases for stores, and escalation support.
 Professional responsibilities include change management, project management, technical training of end-users, documentation, following company policies and procedures.
 Administrative activities include add moves/changes, onsite support, maintenance of various mission-critical technologies, onsite support, and troubleshooting client issues.
 Installation and configuration activities include several operating systems, POS, remote access and anti-virus software, servers, and other devices connected to the network.
 Troubleshooting activities included various network devices and peripheral devices connected to the network.
 Special projects and achievements include, but are not limited to, building and maintaining several servers, writing work object scripts, and was key member in committee for selecting a replacement services provider.

SalePoint, Inc. Technical Support Manager 1998-2006

Company Overview – SalePoint, Inc. is a leading provider of high value business solutions to the retail, healthcare, higher education, and public sector industries. SalePoint, Inc. maintains a complex network that provides PA-DSS Validated and PCI compliant Point-of-Sale, Enhanced Cashiering, Store Automation, Revenue Cycle automation, Inventory Management, Document Management, and other solutions to Retail, Healthcare, Higher Education, and Public Sector clients. Below will be a list of responsibilities personally handled:

 Technical lead to a team responsible for the day-to-day administration, support, and troubleshooting of various client issues and mission-critical technologies.
 Technical responsibilities included, but were not limited to, escalation support, technical training of end-users, administration, maintenance, troubleshooting/resolution of ticket issues, configuration/implementation of POS systems.
 Professional responsibilities included, but were not limited to, client relations/support, following corporate policies and procedures, documentation, and scheduling as needed reports to management.
 Administration activities included add moves/changes, onsite support, maintenance of various mission-critical technologies, troubleshoot client issues, facilitated meetings, and disaster recovery procedures.
 Installation and configuration activities included add moves/changes, client support, POS systems, software and hardware, and tested/certified hardware for compatibility with POS systems.
 Troubleshooting activities included various network devices and peripheral devices connected to the network.

• Cisco Certified Network Professional – Routing & Switching CCNP – R&S
• Cisco Certified Network Professional – Security CCNP – Security
• Cisco Certified Network Professional – Wireless CCNP – Wireless
• Cisco ASA Specialist CASAS
• Cisco Firewall Security Specialist CFSS
• Cisco IOS Security Specialist CIOSSS
• Cisco IPS Specialist CIPSS
• Cisco VPN Specialist CVPNS
• Certified WAN Engineer CWE
• Certified WAN Professional CWP
• Cisco Certified Network Associate – Routing & Switching CCNA– R&S
• Cisco Certified Network Associate – Voice CCNA – Voice
• Cisco Certified Network Associate – Wireless CCNA – Wireless
• Cisco Certified Network Associate – Security CCNA – Security
• Certified WAN Associate CWA
• Microsoft Certified Professional MCP

Additional Information:
Routing & Switching
• Implement VLAN Trunking Protocol to reduce administrative overhead. Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switchports following Layer 2 security best practices.
• Create and manage Local VLANs based on department function, and configure ports with static VLAN assignment and 802.1Q trunks for layer 2 forwarding. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.
• Configure frame-relay point-to-point and multipoint connections to establish connectivity between each of the four sites as required. Establish frame-relay point-to-point connections three of the sites creating a full mesh. Implement hub and spoke network between three of the sites with the main office as the hub for redundant connections.
• Implement EIGRP routing for point-to-point and Non Broadcast Multi-Access networks. Ensure that the spoke routers are receiving routing information about each other from the hub. Configure EIGRP unequal-cost load balancing to also use the lower capacity multipoint links when routing packets.
• Prevent neighbor adjacencies from being formed as well as the sending and receiving of routing updates on unnecessary interfaces. Configure EIGRP MD5 Authentication between sites to prevent unauthorized insertion of routes into the domain. Implement manual EIGRP route summarization to reduce routing protocol demand on CPU resources, memory, and bandwidth used to maintain the routing table.
• Implement OSPF routing with multiple areas for networks between sites. Implement totally stubby areas to lower the system resource utilization of routing devices for the network. Implement NSSA area to allow injection of external routes into the area and propagation into the OSPF domain.

• Implement a local voice network with the following network elements: Cisco 2811 ISR (VoIP) with a Cisco Unity Express Network Module (NM-CUE) installed, Cisco Communications Manager Express, a standard Cisco 3550 Switch, and a Cisco 3550 switch with Power-over-Ethernet. Create and manage Data and Voice VLANs, and configure ports with static VLAN assignment and 802.1Q trunks for layer 2 forwarding. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.
• Configure Fast Ethernet main and sub-interface assignments as required for intervlan routing. Implement static routes for local connectivity. Implement NTP server, DHCP server, and TFTP server for support of the VoIP network. Modification of system level parameters including max phones, max directory numbers, display format for date and time, and setting the Time-Zone.
• Implement Unity Voicemail on the Cisco Unity Express Network Module. Configure a dial-peer on the Cisco 2811 ISR to define the attributes of the packet voice network connection to the Cisco Unity Express Network Module. Enable call forwarding on busy or no answer. Implement Message Waiting Indicators and Voicemail access via SMTP. Daisy-chain PCs to VoIP phones to reduce network cabling costs. Utilize PoE ports for VoIP phones to reduce power infrastructure costs.

• Implement an IPSec Site-to-Site VPN between the Cisco ASA5505 at small office location and Cisco 1841 ISR with a security IOS image at the main office. Implementation of the VPN includes the following configurations: Internet Key Exchange Policy using DES and SHA for encryption and authentication, access-lists to define VPN traffic, transform set using esp-des esp-sha-hmac to define how the traffic is protected, crypto-map to associate the previously configured elements to a peer, and application of the crypto map to appropriate interface or VPN endpoint. Additional implementations include PAT with NAT exemptions for the VPN traffic on the Cisco ASA5505, and PAT using a route-map to exclude VPN traffic from translation on the Cisco 1841 ISR.
• Implementation of Zone-Based Policy Firewall on the Cisco 1841 ISR with the following components: three zones, class-maps specifying traffic that must have policy applied as it crosses a zone-pair, policy maps to apply action to the class-maps’ traffic, zone-pairs, and application of policy to zone pairs.

• Implementation Create and configure dynamic interfaces for VLAN and WLAN association. Create wireless LANs and configure interface association, security parameters, and radios used. Utilize the Wireless LAN Controllers web GUI to configure and manage the wireless network. Configure internal DHCP scopes for WLANs.
• Prepare infrastructure for AP registration on same subnet as management VLAN and for AP registration on different subnet. Implement option 43 for DHCP where necessary. Configure AAA AP policies to allow Self Signed Certifications for APs shipped without a Manufacturer Installed Certificate. Implement AP Grouping to ensure WLAN SSIDs are only broadcast by the APs desired.

Candidate Contact Information: has chosen not to make contact information available on this page.
Click "Contact Candidate" to send this candidate a response.


© 2022 Job Spider
Privacy Policy | CC Marketing Sites | Site Map | Links