Network Engineer - Computer Hardware Resume Search
Network Engineer - Computer Hardware Resume Search
My Spider Scam Awareness Contacting Us F. A. Q.
 
Job Seekers
Search Jobs
Browse Jobs
Post a Resume
Job Alerts
 
Employers
Search Resumes
Browse Resumes
Post a Job

Network Engineer Resume


Desired Industry: Computer Hardware SpiderID: 73093
Desired Job Location: Birmingham, Alabama Date Posted: 7/27/2014
Type of Position: Full-Time Permanent Availability Date: 8-18-2014
Desired Wage: 70,000
U.S. Work Authorization: Yes
Job Level: Experienced with over 2 years experience Willing to Travel: Yes, Less Than 25%
Highest Degree Attained: Bachelors Willing to Relocate: Undecided


Objective:
An IT professional with 10 years of
experience in LAN/WAN technologies
such as routing and switching (BGP,
OSPF, EIGRP), cable making and wiring
services, VPN management, Wireless
network technologies, Nexus Switching
hardware, monitoring with Solarwinds
and Wireshark, Voice over IP (VoIP)
systems, and Network Security
installation and configuration.


Experience:
H. Councill Trenholm State Technical
College Network Technician
2005-Present


• Member to a team of
professionals responsible for the day-
to-day administration and maintenance
of
the IT infrastructure to include
onsite
administration and support, scheduled
installation, configuration activities
and internal/external security
applications.

• Technologies handled by the
team
include but not limited to local area
network (LAN) technologies, wide area
network (WAN) technologies, server and
enterprise applications and desktop
technologies. Specific technologies
include management of fiber-connected
network supporting Windows and Linux
environments, wireless hotspots and
internal phone system.

• Professional responsibilities
included project coordination,
administration, following corporate
policies and procedures,
documentation,
and scheduling as needed reports to
management.

• Provide recommendations on
technologies and software for users to
better perform their duties.


Education:
Certified WAN Engineering Program
LANWAN Professional

Bachelor of Science in Computer
Information Systems
Alabama State University


Skills:
Cisco Routers/Switches: Cisco IOS,
Routers (3900, 2900, 1900, 800), Cisco
Catalyst (6500, 5500, 4900, 4500,
3000,
3100), Cisco Nexus (1010/1010x, 2000,
5010, 5020, 5548P, 5548UP, 7000).

Connectivity & Hardware: Blade
Servers, Web Servers Ethernet, Fast
Ethernet, WAN, LAN, TCP/IP, RAID
systems, Cisco ASA 5500, CDP, Frame-
relay, PPP, ACL, Network Address
Translation (NAT), Port Address
Translation (PAT), OSPF Virtual links,
RIPng, RIP, RIPv2, OSPF, EIGRP, BGP,
MPLS, VTP, SNMP, SNMPv3, SMTP, ARP,
TCP,
UDP, Static Routing, Stub Routing,
VLAN
Trunking, Multi-Area OSPF, NBMA,
Sonet,
VLAN, VTP, HSRP, STP, SVI, CEF,
Etherchannel, BPDU, Portfast, GLBP.

Security Technologies: AAA, IPS/IDS,
TACACS+, RADIUS, SSH, VPN, Cisco ACS,
Data Loss Prevention, IPSec, Data
Management Zone, Pretty Good
Protection
(PGP), Public Key Infrastructure
(PKI),
Port Security, MAC Address Filtering,
IPS/IDS, NPS.

Wireless/VoIP Technologies: 802.11
a/b/g/n, WLAN, WAP, SSID, LWAPP,
CSMA/CA, Cisco ACS, VoIP, IP Phone,
Catalyst, CUCM, QoS, PoE, CME, CUE,
MAC
Address Filtering, SIP, RTP, SCCP,
SRTP,
UCCM, UCCX.

Juniper Technologies: JUNOS, Juniper
E-Series, Juniper M-Series, Juniper
MX-
Series, Juniper T-Series, Juniper
E120,
Juniper E320, Juniper ERX1440, Juniper
M160, Juniper M320, Juniper MX480,
Juniper MX2010, Juniper MX2020,
Juniper
T4000, Juniper TX Matrix, ScreenOS.

Monitoring Tools/Apps: Finisar,
Wireshark, Remedy, Openview, Cacti,
Nagios, VMware, Solarwinds, F5, Cisco
Works, LogicMonitor, Cisco Security
Manager Suite.

Enterprise Technologies:
Windows 98/2000/XP/VISTA/7, Exchange
2003/2008, Active Directory, DNS,
WINS,
PHP, MSSQL, MySQL, Typo3 CMS, Moodle
LMS, Microsoft Office Suite, Linux,
Red
Hat, Ubunto, Desktop and Networked
Printers, MAC, Netcool, LogMeIn
Central,
GPMC, RDP, Internet Information
Services, Security Surveillance
Installation, Digital Signage
Technologies, Emergency Notification
Systems (Microwave Technology)


Additional Information:
Routing & Switching

• Implement VLAN Trunking
Protocol
to reduce administrative overhead.
Enable secure sharing of VLAN
information to prevent the
introduction
of rogue devices from affecting the
VLAN
database. Shutdown unused switchports
following Layer 2 security best
practices.

• Create and manage Local VLANs
based on department function, and
configure ports with static VLAN
assignment and 802.1Q trunks for layer
2
forwarding. Configure edge ports for
fast-transitioning into the forwarding
state to fix workstation startup
connectivity delays.

• Configure frame-relay point-
to-
point and multipoint connections to
establish connectivity between each of
the four sites as required. Establish
frame-relay point-to-point connections
three of the sites creating a full
mesh.
Implement hub and spoke network
between
three of the sites with the main
office
as the hub for redundant connections.

• Implement EIGRP routing for
point-to-point and Non Broadcast
Multi-
Access networks. Ensure that the
spoke
routers are receiving routing
information about each other from the
hub. Configure EIGRP unequal-cost
load
balancing to also use the lower
capacity
multipoint links when routing packets.

• Prevent neighbor adjacencies
from being formed as well as the
sending
and receiving of routing updates on
unnecessary interfaces. Configure
EIGRP
MD5 Authentication between sites to
prevent unauthorized insertion of
routes
into the domain. Implement manual
EIGRP
route summarization to reduce routing
protocol demand on CPU resources,
memory, and bandwidth used to maintain
the routing table.

• Implement OSPF routing with
multiple areas for networks between
sites. Implement totally stubby areas
to lower the system resource
utilization
of routing devices for the network.
Implement NSSA area to allow injection
of external routes into the area and
propagation into the OSPF domain.

Voice
• Implement a local voice
network
with the following network elements:
Cisco 2811 ISR (VoIP) with a Cisco
Unity
Express Network Module (NM-CUE)
installed, Cisco Communications
Manager
Express, a standard Cisco 3550 Switch,
and a Cisco 3550 switch with Power-
over-
Ethernet. Create and manage Data and
Voice VLANs, and configure ports with
static VLAN assignment and 802.1Q
trunks
for layer 2 forwarding. Configure
edge
ports for fast-transitioning into the
forwarding state to fix workstation
startup connectivity delays.

• Configure Fast Ethernet main and
sub-
interface assignments as required for
inter-vlan routing. Implement static
routes for local connectivity.
Implement NTP server, DHCP server, and
TFTP server for support of the VoIP
network. Modification of system level
parameters including max phones, max
directory numbers, display format for
date and time, and setting the Time-
Zone.

• Implement Unity Voicemail on
the
Cisco Unity Express Network Module.
Configure a dial-peer on the Cisco
2811
ISR to define the attributes of the
packet voice network connection to the
Cisco Unity Express Network Module.
Enable call forwarding on busy or no
answer. Implement Message Waiting
Indicators and Voicemail access via
SMTP. Daisy-chain PCs to VoIP phones
to
reduce network cabling costs. Utilize
PoE ports for VoIP phones to reduce
power infrastructure costs.

Security
• Implement an IPSec Site-to-
Site
VPN between the Cisco ASA5505 at small
office location and Cisco 1841 ISR
with
a security IOS image at the main
office.
Implementation of the VPN includes the
following configurations: Internet
Key
Exchange Policy using DES and SHA for
encryption and authentication, access-
lists to define VPN traffic, transform
set using esp-des esp-sha-hmac to
define
how the traffic is protected, crypto-
map
to associate the previously configured
elements to a peer, and application of
the crypto map to appropriate
interface
or VPN endpoint.

• Additional implementations
include PAT with NAT exemptions for
the
VPN traffic on the Cisco ASA5505, and
PAT using a route-map to exclude VPN
traffic from translation on the Cisco
1841 ISR.

• Implementation of Zone-Based
Policy Firewall on the Cisco 1841 ISR
with the following components: three
zones, class-maps specifying traffic
that must have policy applied as it
crosses a zone-pair, policy maps to
apply action to the class-maps’
traffic,
zone-pairs, and application of policy
to
zone pairs.

Wireless
• Implementation Create and
configure dynamic interfaces for VLAN
and WLAN association. Create wireless
LANs and configure interface
association, security parameters, and
radios used. Utilize the Wireless LAN
Controllers web GUI to configure and
manage the wireless network.
Configure
internal DHCP scopes for WLANs.
• Prepare infrastructure for AP
registration on same subnet as
management VLAN and for AP
registration
on different subnet. Implement option
43 for DHCP where necessary.
Configure
AAA AP policies to allow Self Signed
Certifications for APs shipped without
a
Manufacturer Installed Certificate.
Implement AP Grouping to ensure WLAN
SSIDs are only broadcast by the APs
desired.


Reference:
Available upon request.


Candidate Contact Information:
JobSpider.com has chosen not to make contact information available on this page.
Click "Contact Candidate" to send this candidate a response.


    





© 2022 Job Spider
Privacy Policy | CC Marketing Sites | Site Map | Links