|
|
Desired Industry: Computer Hardware |
SpiderID: 73093 |
Desired Job Location: Birmingham, Alabama |
Date Posted: 7/27/2014 |
Type of Position: Full-Time Permanent |
Availability Date: 8-18-2014 |
Desired Wage: 70,000 |
|
|
U.S. Work Authorization: Yes |
Job Level: Experienced with over 2 years experience |
Willing to Travel: Yes, Less Than 25% |
Highest Degree Attained: Bachelors |
Willing to Relocate: Undecided |
Objective: An IT professional with 10 years of experience in LAN/WAN technologies such as routing and switching (BGP, OSPF, EIGRP), cable making and wiring services, VPN management, Wireless network technologies, Nexus Switching hardware, monitoring with Solarwinds and Wireshark, Voice over IP (VoIP) systems, and Network Security installation and configuration.
Experience: H. Councill Trenholm State Technical College Network Technician 2005-Present
• Member to a team of professionals responsible for the day- to-day administration and maintenance of the IT infrastructure to include onsite administration and support, scheduled installation, configuration activities and internal/external security applications.
• Technologies handled by the team include but not limited to local area network (LAN) technologies, wide area network (WAN) technologies, server and enterprise applications and desktop technologies. Specific technologies include management of fiber-connected network supporting Windows and Linux environments, wireless hotspots and internal phone system.
• Professional responsibilities included project coordination, administration, following corporate policies and procedures, documentation, and scheduling as needed reports to management.
• Provide recommendations on technologies and software for users to better perform their duties.
Education: Certified WAN Engineering Program LANWAN Professional
Bachelor of Science in Computer Information Systems Alabama State University
Skills: Cisco Routers/Switches: Cisco IOS, Routers (3900, 2900, 1900, 800), Cisco Catalyst (6500, 5500, 4900, 4500, 3000, 3100), Cisco Nexus (1010/1010x, 2000, 5010, 5020, 5548P, 5548UP, 7000).
Connectivity & Hardware: Blade Servers, Web Servers Ethernet, Fast Ethernet, WAN, LAN, TCP/IP, RAID systems, Cisco ASA 5500, CDP, Frame- relay, PPP, ACL, Network Address Translation (NAT), Port Address Translation (PAT), OSPF Virtual links, RIPng, RIP, RIPv2, OSPF, EIGRP, BGP, MPLS, VTP, SNMP, SNMPv3, SMTP, ARP, TCP, UDP, Static Routing, Stub Routing, VLAN Trunking, Multi-Area OSPF, NBMA, Sonet, VLAN, VTP, HSRP, STP, SVI, CEF, Etherchannel, BPDU, Portfast, GLBP.
Security Technologies: AAA, IPS/IDS, TACACS+, RADIUS, SSH, VPN, Cisco ACS, Data Loss Prevention, IPSec, Data Management Zone, Pretty Good Protection (PGP), Public Key Infrastructure (PKI), Port Security, MAC Address Filtering, IPS/IDS, NPS.
Wireless/VoIP Technologies: 802.11 a/b/g/n, WLAN, WAP, SSID, LWAPP, CSMA/CA, Cisco ACS, VoIP, IP Phone, Catalyst, CUCM, QoS, PoE, CME, CUE, MAC Address Filtering, SIP, RTP, SCCP, SRTP, UCCM, UCCX.
Juniper Technologies: JUNOS, Juniper E-Series, Juniper M-Series, Juniper MX- Series, Juniper T-Series, Juniper E120, Juniper E320, Juniper ERX1440, Juniper M160, Juniper M320, Juniper MX480, Juniper MX2010, Juniper MX2020, Juniper T4000, Juniper TX Matrix, ScreenOS.
Monitoring Tools/Apps: Finisar, Wireshark, Remedy, Openview, Cacti, Nagios, VMware, Solarwinds, F5, Cisco Works, LogicMonitor, Cisco Security Manager Suite.
Enterprise Technologies: Windows 98/2000/XP/VISTA/7, Exchange 2003/2008, Active Directory, DNS, WINS, PHP, MSSQL, MySQL, Typo3 CMS, Moodle LMS, Microsoft Office Suite, Linux, Red Hat, Ubunto, Desktop and Networked Printers, MAC, Netcool, LogMeIn Central, GPMC, RDP, Internet Information Services, Security Surveillance Installation, Digital Signage Technologies, Emergency Notification Systems (Microwave Technology)
Additional Information: Routing & Switching
• Implement VLAN Trunking Protocol to reduce administrative overhead. Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switchports following Layer 2 security best practices.
• Create and manage Local VLANs based on department function, and configure ports with static VLAN assignment and 802.1Q trunks for layer 2 forwarding. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.
• Configure frame-relay point- to- point and multipoint connections to establish connectivity between each of the four sites as required. Establish frame-relay point-to-point connections three of the sites creating a full mesh. Implement hub and spoke network between three of the sites with the main office as the hub for redundant connections.
• Implement EIGRP routing for point-to-point and Non Broadcast Multi- Access networks. Ensure that the spoke routers are receiving routing information about each other from the hub. Configure EIGRP unequal-cost load balancing to also use the lower capacity multipoint links when routing packets.
• Prevent neighbor adjacencies from being formed as well as the sending and receiving of routing updates on unnecessary interfaces. Configure EIGRP MD5 Authentication between sites to prevent unauthorized insertion of routes into the domain. Implement manual EIGRP route summarization to reduce routing protocol demand on CPU resources, memory, and bandwidth used to maintain the routing table.
• Implement OSPF routing with multiple areas for networks between sites. Implement totally stubby areas to lower the system resource utilization of routing devices for the network. Implement NSSA area to allow injection of external routes into the area and propagation into the OSPF domain.
Voice • Implement a local voice network with the following network elements: Cisco 2811 ISR (VoIP) with a Cisco Unity Express Network Module (NM-CUE) installed, Cisco Communications Manager Express, a standard Cisco 3550 Switch, and a Cisco 3550 switch with Power- over- Ethernet. Create and manage Data and Voice VLANs, and configure ports with static VLAN assignment and 802.1Q trunks for layer 2 forwarding. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.
• Configure Fast Ethernet main and sub- interface assignments as required for inter-vlan routing. Implement static routes for local connectivity. Implement NTP server, DHCP server, and TFTP server for support of the VoIP network. Modification of system level parameters including max phones, max directory numbers, display format for date and time, and setting the Time- Zone.
• Implement Unity Voicemail on the Cisco Unity Express Network Module. Configure a dial-peer on the Cisco 2811 ISR to define the attributes of the packet voice network connection to the Cisco Unity Express Network Module. Enable call forwarding on busy or no answer. Implement Message Waiting Indicators and Voicemail access via SMTP. Daisy-chain PCs to VoIP phones to reduce network cabling costs. Utilize PoE ports for VoIP phones to reduce power infrastructure costs.
Security • Implement an IPSec Site-to- Site VPN between the Cisco ASA5505 at small office location and Cisco 1841 ISR with a security IOS image at the main office. Implementation of the VPN includes the following configurations: Internet Key Exchange Policy using DES and SHA for encryption and authentication, access- lists to define VPN traffic, transform set using esp-des esp-sha-hmac to define how the traffic is protected, crypto- map to associate the previously configured elements to a peer, and application of the crypto map to appropriate interface or VPN endpoint.
• Additional implementations include PAT with NAT exemptions for the VPN traffic on the Cisco ASA5505, and PAT using a route-map to exclude VPN traffic from translation on the Cisco 1841 ISR.
• Implementation of Zone-Based Policy Firewall on the Cisco 1841 ISR with the following components: three zones, class-maps specifying traffic that must have policy applied as it crosses a zone-pair, policy maps to apply action to the class-maps’ traffic, zone-pairs, and application of policy to zone pairs.
Wireless • Implementation Create and configure dynamic interfaces for VLAN and WLAN association. Create wireless LANs and configure interface association, security parameters, and radios used. Utilize the Wireless LAN Controllers web GUI to configure and manage the wireless network. Configure internal DHCP scopes for WLANs. • Prepare infrastructure for AP registration on same subnet as management VLAN and for AP registration on different subnet. Implement option 43 for DHCP where necessary. Configure AAA AP policies to allow Self Signed Certifications for APs shipped without a Manufacturer Installed Certificate. Implement AP Grouping to ensure WLAN SSIDs are only broadcast by the APs desired.
Reference: Available upon request.
Candidate Contact Information:
JobSpider.com has chosen not to make contact information available on this page. Click "Contact Candidate" to send this candidate a response. |
|
|
|
|
|