Home

Sahithya Voleti - Senior Network Security Engineer
[email protected]
Location: Denton, Texas, USA
Relocation: YES
Visa: GC
Resume file: Sahithya V - Sr. Network Engineer_1765830762368.docx
Please check the file(s) for viruses. Files are checked manually and then made available for download.
Sahithya V
Sr. Network Engineer
Ph No: 940-629-9255
Email Id : [email protected]
Professional Summary:
Senior Network Security Engineer with 10 years of experience designing, securing, and supporting enterprise networks, including hands-on work across LAN, WAN, and MAN environments.
Experience with routing protocols including RIP, OSPF, BGP, EIGRP, IS-IS, and MPLS, covering troubleshooting, route filtering, redistribution, and traffic engineering.
Hands on experience working with Cisco routing platforms including the 2500, 2600, 3000, 6500, 7500, 7200, and ASR 9K series and data center environments.
Deployed and supported F5 BIG-IP v14.1 and Citrix ADC v13 in HA mode, configuring LTM/GTM, SNAT, iRules, persistence, and floating IPs to ensure reliable application delivery.
Proficient in building Zero Trust v3 architectures using Cisco ISE v3.0 for posture-based access, VLAN assignments, and policy enforcement across wired/wireless segments.
Engineered SD-WAN topologies using Silver Peak v9 and Viptela with QoS v6.1, traffic shaping, and application steering across DIA and MPLS circuits.
Managed DNS, DHCP, and IPAM with Infoblox v8.3 across IPv4 (10.0.0.0/8) and IPv6 (2001:db8::/64) networks with full AAAA/A record sync.
Supported Palo Alto, Checkpoint, Cisco ASA, FortiGate, and Citrix ADC platforms to deliver firewall security, SSL inspection, load balancing, and high-availability IPSec connectivity across enterprise networks.
Built IPSec remote access and site-to-site tunnels with Cisco ASA 5525-X, Fortinet FortiGate v7, and Palo Alto PA-5220 using Phase 1/2 profiles and NAT-T.
Assisted IPv4/IPv6 dual-stack routing with DHCPv6, NAT64, and SLAAC, and managed Catalyst and Nexus switches using STP, VLANs, port security, and trunk configurations.
Designed DMZ setups on Cisco ASA 5500 with NAT, access rules, and inspection for web, mail, and FTP services.
Experienced in creating, tuning, and managing WAF policies across Akamai Kona, F5 ASM, and Palo Alto platforms to improve application security, reduce false positives, and maintain compliance.
Worked on traffic segmentation using Checkpoint R80.30 firewall zones, Palo Alto PA-5220 app groups, and Fortinet FortiGate v7 web filters.
Supported Juniper ACX/MX/EX platforms for configuration and routing changes and designed LAN infrastructures using Cisco 4510/4948/4507 switches with uplink design, STP tuning, VLAN segmentation, and high-availability setups.
Deployed Citrix ADC v13 with TLS 1.3 termination, HTTP/2 acceleration, and GSLB for content delivery to users in multiple geographic regions.
Worked on advanced Layer-2/Layer-3 features on Catalyst 9300 switches including OTV, LACP, VPC peers, and VXLAN for scalable and resilient data center network expansions.
Implemented API Integration v3 into GitLab CI/CD pipelines to dynamically deploy rule updates across Fortinet FortiGate v7 and Cisco ASA 5525-X.
Worked with 802.1X (EAP/PEAP), certificate-based and MAC-based authentication, AP groups, ARM profiles, anchor controllers, AP provisioning, and performed RF tuning across 2.4 GHz and 5 GHz bands (802.11a/b/g/n/ac), with additional exposure to Cisco Meraki cloud platforms.
Configured BGP route reflectors, community policies, and MED tuning to improve inter-data center path control.
Managed large, distributed networks using Meraki, FortiManager, and Zscaler, delivering wireless deployments, centralized firewall management, security policy enforcement, Azure AD/Office 365 integrations, WAF/ASM configurations, and secure access via Citrix ADC, cloud proxies, and web/email security gateways.
Supported wireless design with Cisco WLC v9800 and Aruba 300 Series APs, using SSID-to-VLAN mapping and 802.1X auth via Cisco ISE v3.0.
Troubleshot network issues using Wireshark and SolarWinds, performed RCA on routing and Layer-2 traffic, and integrated firewalls with FortiSIEM for alerting and compliance.
Designed AWS VPCs and deployed resources such as Amazon EC2, Amazon S3, EBS, IAM roles, RDS, Auto Scaling groups, and security groups as part of cloud migration and expansion projects.
Created and maintained CloudFormation templates for automated deployment of AWS infrastructure, including VPC builds, instance deployments, and networking components.
Managed Azure transit firewalls, routing, IPsec VPN tunnels, identity services (Azure AD/Office 365), and storage/backup setups, while deploying IaaS and PaaS workloads into secured VNets and segmented subnets.
Built Python and PowerShell automation for monitoring, configuration checks, reporting, and firewall policy updates, supporting secure remote access with Cisco ASA, MFA, and Cisco ISE policies.
Technical skills:
Router and VoIP Platforms & Network Configuration Cisco ASR9K, 7300, ISR-4000/3800/2000/1900; Juniper MX and ACX series; Arista 7000series.
Advanced IOS configuration including ACLs, route redistribution, IPv4/IPv6, HSRP/VRRP.
Routing Protocols RIP, EIGRP, IGRP, OSPFv2/v3, IS-IS, BGPv4, MP-BGP, MPLS, Static routing, ICMP, ARP, HSRP, VRRP.
Switch Platforms and switching protocols Cisco Catalyst 2960, 3650, 3850, 4500, 6500, 6880, 7000; Nexus 2K/3K/5K/7K/9K;
Juniper EX3300/EX3400/EX4300/EX4600, QFX; Aruba 2000/3000 series.
Technologies: VLANs, VTP, STP, RSTP, PVST+, Multicast, 802.1Q, EtherChannel (PAgP/LACP), MAC, CDP, HDLC, RARP, Multi-layer switching.
Cisco Routers Cisco ISR-1000, ISR-4000, ASR-1000, ASR-9000, ASR-5500, Meraki vMX100;
Juniper T4000, MX10, MX40, ACX2200, ACX5000.
Firewall Platforms and security protocols Cisco ASA/PIX/FWSM/ASDM, Cisco FirePOWER, Palo Alto, Check Point, IDS/IPS, Blue Coat Proxy, Akamai CDN, DHCP Snooping, Port Security, IP Source Guard, Standard/Extended ACLs.
Network Management and Monitoring Ekahau, AirMagnet, LogicMonitor, Wireshark, Infoblox, HP OpenView, Cisco Prime, Splunk, SolarWinds, Cisco SDM, CiscoWorks, TCPdump, NetScout, NPM, NCM, SAM, IPAM, Additional Polling Engine.
Load Balancers and Proxies F5 BIG-IP LTM (2000/3900/6400/6800), GTM, iRules; Citrix NetScaler; McAfee Web Gateway;
Zscaler Proxies; Blue Coat Web Security.
WAN Protocols and SD-WAN technologies HDLC, PPP, MPLS, DS1, DS3, OC3, T1 /T3 lines, SONET OC3-OC192, SDH, POS, PDH
MPLS, ISP Leased Lines, SONET, Viptella, Versa. Circuit switched WAN -T1/E1 T3/E3/OCX
Other Networking Protocols and Fundamentals DHCP, DNS, Active Directory, NTP, NDP, TCP/UDP, SNMP, SMTP, SIP, PAP, PPTP, FTP/TFTP, NHRP, NetBIOS, NFS, HTTP, Radius, TACACS+, PBX systems, SDN, IPv4/IPv6.

Wireless and Radius Technologies Cisco APs, Cisco Meraki, Cisco Prime, AirMagnet, AirWatch, Cisco WLC (8510/5508/5706),
Cisco Aironet (2600/3600/3700), Aruba APs and controllers (225, 3000, AirWave),
Cisco ISE, MSE, ClearPass; 802.11a/b/g/n/ac.
Scripting and Cloud Computing
Python scripting, Ansible and TCL (F5), AWS, Microsoft Azure, Cisco Meraki, C++, Cloud Migration

Professional Experience:

Corning Inc, Austin, TX Feb 2024 Present
Network Security Engineer

Responsibilities:
Configured advanced routing policies (BGP, OSPF, EIGRP) across MPLS VPNs using Ansible playbooks, significantly reducing deployment times for new customer sites.
Manages LAN/WAN/WLAN issues and helped deploy Cisco routers and switches in the data center.
Configure and maintain VPNs, firewall policies, and NAT across Cisco ASA, Palo Alto, and Fortinet environments.
Work with EIGRP and BGP routing, supported network design, DNS, subnetting, and TCP/IP, and deployed Nexus 2000, 5000, and 7000 series switches
Implement Aruba ClearPass for role-based NAC and device onboarding, and deployed Aruba wireless networks with 802.1X authentication managed through Aruba Central.
Work on FFA and production deployments at multiple customer sites, ensuring zero-downtime cutovers with rollback plans, validation checklists, and automated post-deployment health checks.
Monitor and optimize network performance using tools like PRTG, SolarWinds, and SNMPv3, proactively identifying bottlenecks and managing device health across LAN/WAN infrastructure.
Assist Cloudflare WAF and Akamai Kona Site Defender with custom security rules, DDoS protection, and real-time threat intelligence to secure web applications against SQL injection, XSS, and emerging threats.
Develop data center migrations and network expansions, migrating legacy devices to Cisco Nexus 9000, deploying MPLS VPNs and SD-WAN for scalable connectivity.
Support deployment artifacts equivalent to CSAR templates, maintained gold-standard configurations, ATP test cases, and full documentation including MOPs, JIRA tracking, and risk registers for enterprise change control.
Implement DNS, DHCP, and IPAM services using Infoblox and integrated with Palo Alto firewalls to enable automated threat response for DNS-based attacks.
Experience in Layer 2 switching tasks including VLANs, VTP, STP/RSTP/PVST/RPVST, EtherChannel (LACP/PAgP), and troubleshooting inter-VLAN routing
Develop Cisco SD-WAN (Viptela) and Silver Peak solutions using vManage and Orchestrator, leveraging centralized policy control, encryption, and app-aware routing for secure, optimized WAN connectivity.
Deploy and manage enterprise wireless networks using Cisco Wi-Fi 6, Meraki, and Juniper Mist, optimizing performance through RF tuning, cloud controllers, and security integration.
Install and test Ethernet/fiber cabling and optics for data center performance, used Perl for log parsing during security analysis, and deployed Cisco ISE 3.0 in high availability for resilient authentication services
Support deployment of Cisco ACI multi-site fabric and DNA Center, automating provisioning and policies, and executed a large-scale hardware refresh of Catalyst and Nexus devices to boost network performance and reliability.
Configure and maintain Palo Alto Firewalls (PA-3200, 3400, 5400) with Panorama, migrating from ASA and integrating IPsec tunnels, NAT, ACLs, and security policies.
Implement and manage Citrix ADC (NetScaler) and A10 WAF solutions to deliver high availability, load balancing, SSL offloading, and application-layer protection against OWASP threats.
Deploy and configure F5 BIG-IP APM and ASM (v17.x) to provide secure remote access with SSO, enforce MFA, and protect web applications from threats like SQL injection and XSS.
Implemented Wireless LAN with Cisco ISE for secure, identity-based access and Zero Trust policies, using SolarWinds, Nmap, and Nessus for monitoring, traffic analysis, and compliance.
Work on IPsec, HA VPN, and Meraki Auto-VPN tunnels across Cisco ASA, Juniper SRX, and Google Cloud to enable secure site-to-site and cloud-integrated connectivity.
Built network automation workflows using Python, Ansible, Terraform, and Git, leveraging CI/CD pipelines and REST APIs for policy enforcement, IaC deployments, and config consistency.
Utilize FortiManager and FortiAnalyzer to deploy centralized security policies across FortiGate firewalls, enhancing threat visibility and streamlining access management through SSO with FortiAuthenticator for efficient administration.
Implement VMware Horizon for virtual desktop infrastructure (VDI), delivering secure and efficient desktop and application virtualization to end-users.
Assist Ekahau site surveys for optimal AP placement and coverage, and migrated Internet proxy services from IronPort to Zscaler Cloud with PAC updates and ZAPP integration.
Support SWG and SASE traffic, deploying Symantec Blue Coat ProxySG appliances with web filtering, threat protection, and SSL inspection for enhanced security
Implement TACACS+ on Cisco Firepower 2100 Series firewalls and Cisco Catalyst 9500 Series switches for secure device administration control.
Implement AWS Direct Connect, Azure ExpressRoute, and GCP Interconnect to establish resilient and high-performance hybrid cloud communication between on-premises networks and cloud environments.
Experience in Cisco IP Telephony and Arista EOS, handling call routing, CUCM, and network implementation and troubleshooting.

West Pharmaceuticals, Exton, PA Nov 2022 Jan 2024
Sr. Network Engineer

Responsibilities:
Installation and Configuration of Composite Network models consisting of Cisco7600, 7200, 3800 series routers and ASR 9k, GSR 12K routers and Cisco 2950, 3500, 5000, 6500 Series switches.
Configured routing protocols such as OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy. It also includes the configuration of the port channel between core switches and server distribution switches.
Worked on self-healing projects to remediate missing VLANS issue for Mist and cisco, where issue will be detected and auto corrected by self-healing
Performed pilot sites new code validations.
Developed metrics and validated new solutions required to support our complex ecosystems of robotics, mobile devices, end user equipment and workstations.
Designed, installed, and supported LAN/WAN routing, switching, and VPN technologies, troubleshooting complex networks with EIGRP, OSPF, and BGP.
Supported network audits for APs and port issues, configured VDCs and vPCs on Nexus 7010, and supported Zero Trust initiatives by updating access policies.
Implemented HSRP troubleshooting, Cisco IOS configuration and upgrades, implemented OSPF on 7600-router networks, and configured BGP policy-based routing for complex systems.
Developed Multiprotocol Label Switching (MPLS), VPN with Routing Information Protocol (RIP) on the customer s Site.
Deployed F5 LTM for application redundancy, upgraded Nexus 5/7 switches, configured multicast with PIM/IGMP, and managed Microsoft VPN access for remote customer resources.
Responsible for turning up BGP peering and customer sessions, as well as debugging BGP routing problems.
Assisted incident response using Cisco FTD to detect and remediate threats, minimizing business impact, and trained IT staff on FTD operations and best practices for effective firewall management
Implemented emerging trends in network security, proactively evaluating new features and updates released for Cisco FTD platforms to enhance protection and stay ahead of potential threats.
Supported to the enhancement of security policies and procedures, leveraging insights gained from Cisco FTD analytics and reporting capabilities to drive continuous improvement in network defense strategies.
Assisted in development work related to self-healing, ex: missing VLANS, mist ap down, WLAN site health check, memory utilization check.
Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel.
Worked on SWG routing and security enforcement for remote and on-site users.
Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
Implemented and maintained Data Loss Prevention (DLP) solutions to proactively identify, monitor, and prevent unauthorized access and transmission of sensitive information across the network.
Supported networks using routing protocols such as RIP, OSPF, BGP and manipulated routing updates using route-map, distribute list and administrative distance for on-demand Infrastructure.
Implemented Hot Standby Router Protocol (HSRP) by tuning parameters like preemption.
Supported device onboarding through network configuration and troubleshooting, managed Windows/Linux servers, VMware, and storage systems, collaborated with ITS Network teams, and created Visio diagrams and engineering design documents.
Automated recurring network health checks using Python to review routing tables, Wi-Fi performance, and firewall connectivity.
Worked network access issues and infrastructure failures, implemented LTE tertiary coverage, and configured switches for site launches and decommissions
Assisted firewall rules for least-privilege access, maintained devices with latest updates, and responded to on-call client issues within SLA.
Implemented Perl scripts for cleaning and formatting network data collected during windows and audits.
Worked the latest network security threats and participated in incident management to identify root causes and produce after-action reports
Environment: Cisco 3500, 3700, 3900 series Routers, Cisco ASA Firewalls, F5 ADC, Cisco ACI, VMware, Aruba, VTP, Juniper SSG-140, Palo Alto Wildfire, Juniper EX series switches, Cisco Firepower, Bluecoat, Aruba Wireless, WLC, Juniper SRX, Routing Protocols: BGP, OSPF, AAA (TACACS+ & RADIUS), TCL Scripting, ACL Configuration.

Citi Group, New Jersey Aug 2021 Oct 2022
Network Engineer

Responsibilities:
Configured ASR 9K pairs with HSRP, Bundle Ethernet, and DHCP profiles, and worked with Nexus 7010, 5548, 5596, 2148, and 2248 devices.
Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices and configured 2k, 3k, 7k series Routers.
Experienced in cloud WLAN (Cisco, Meraki, Aruba), network monitoring (SolarWinds, Wireshark), and configuring VPC/VDC on Nexus 7010/7018 and FCoE on Nexus 5548.
Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network.
Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.
Experienced in configuring Cisco 6500 VSS in data center distribution layers and managing Aruba and Cisco wireless access points.
Used Perl for syslog analysis during troubleshooting, configured and troubleshooted Juniper EX switches, and integrated Cisco WLC with ISE for 802.1X authentication.
Designed & Deployed Cisco ISE and Provided comprehensive guest access management for Cisco ISE administrators.
Support Open config introduction into provisioning systems.
Involved in writing test automation for network manageability features such as ZTP (Zero Touch Provisioning), various Open config Models, Netconf over TCP.
Configured Cisco ISE with Active Directory, upgraded and managed Cisco WLC 5508 for network access control, and performed network monitoring and analysis using NS3, Wireshark, and SolarWinds
Managed HSRP/VRRP redundancy and monitored networks using Wireshark, SolarWinds, SNMP, GNS3, and Riverbed; validated WLAN deployments with Netscout SurveyPro.
Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP.
Integrated existing Layer 2/Layer 3 networks with ACI and led the design, implementation, and migration from Cisco to Aruba wireless platforms.
Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
Experienced in configuring HSRP, GLBP, PPP, PAP, CHAP, and SNMP, and collaborated with the Load Balancing team to connect production and DR servers via F5 Big-IP LTM.
Performed WLAN testing of new controllers and APs, interfacing with customers and NOC for reporting, and configured Cisco Firepower services with ASA 5500-X for advanced security.
Switching tasks include VTP, ISL/ 802.1q, IP Sec and GRE Tunneling, VLANs, Ether Channel, Trucking, Port Security, STP and RSTP.
Assisted with SASE and SWG migrations, including proxy and DNS security updates, and implemented PCI policies and ITIL practices in customer environments
Convert Branch WAN links from TDM circuits to MPLS and convert encryption from IP Sec/GRE to Get VPN.
Implemented Layer 2 security using VLANs, non-trunked user ports, and port security, and configured Juniper SSG-140 and Cisco ASA firewalls.
Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using Spine and Leaf architecture.
Strong hands-on experience on ASA Firewalls, Palo Alto Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
Supported ZTNA access and remote-user traffic, and managed AWS cloud environments including EC2, Route53, RDS, and Lambda.
Built Python scripts to simplify device onboarding, VLAN audits, and configuration reporting across large Cisco/Meraki deployments.
Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configured and maintained IPSEC and SSL VPNs on Palo Alto Firewalls.
Environment: Cisco ASA Firewalls, F5 ADC, Cisco 3900 Routers, Cisco Catalyst switches 6500, 3750, 3550, 2960 Switches, Juniper SSG-140, Palo Alto Wildfire, Juniper EX series switches, Riverbed, Cisco Firepower, Aruba Wireless, WLC, Nexus 9k, 7k, 5k, ASR 9k, ASR 1k, Nexus 2000 FEX, Juniper SRX, Routing Protocols: BGP, OSPF, AAA (TACACS+ & RADIUS), TCL Scripting, ACL Configuration.

Polaris, India Jul 2018 May 2021
Sr. Network Engineer

Responsibilities:
Working with Network Design and implementation teams on various projects related to Branch, Campus and Data Center.
Implemented and maintained various WAN equipment such as Cisco 2800, 3800 and 7200 routers, ASR 1006.
Designing and deployment of Partner IPSEC VPN tunnels.
Design, implementation and operational support of routing/switching protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1q, etc.
Involved in the configuration & troubleshooting of routing protocols: BGP, OSPF, EIGRP, RIP. Configured IP access filter policies.
Deploying and commission of core ASR 1K, Nexus 7K, 5K and its downstream devices.
Experience in Configuring, upgrading and verifying the NX-OS operation system.
Performing troubleshooting on slow network connectivity issues, routing issues that involve OSPF, BGP and identifying the root cause of the issues.
Configure Corporate, Wireless and Lab Devices which includes Bandwidth Upgrade, Adding New Devices, Decom the Devices, Testing (Pilot).
Implemented DHCP, DNS and IPAM configuration on the servers to allocate, resolute the ip addresses from Subnet.
Monitoring the network traffic with the help of Qradar and Cisco IPS event viewer.
Configuring rules and maintaining Palo Alto Firewalls & Analysis of Firewall logs.
Performing the ACL requests change for various clients by collecting source and destination information from them.
Familiar with various MSIT Tools to check Networking Connectivity, Testing, Configuration and Adding or Removal of IP address blocks, Decoming or Adding the Devices.
Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (L2TP), Internet Protocol Security (IPsec)
Performed Break Fix support through driving to different buildings, identifying the root cause of the hardware issues with switches and routers.
Troubleshoot the Network Issues onsite and remotely depending on the severity of the issues.
Created Visio Dean / Visio Documentation to give complete picture of network design for each building.
Environment: Nexus 7K/5K/2K, Cisco 3750/3550/3500/2960 switches, F5 BIGIP, Cisco ASA5510, Checkpoint, OSPF, BGP, VLAN, HSRP, LAN, WAN, IPV4.

Yash Technologies, India Oct 2015 Jun 2018
Network Engineer

Responsibilities:
Worked as part of a team to manage Enterprise Network Infrastructure as a Tier 3 Support Engineer.
Involved in configuring and implementing of Composite Network models consists of Cisco 7600, 7200, 3800 series routers and Cisco 2950, 3500, 5000, 6500 Series switches.
Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
Configuring and troubleshooting OSPF routing protocol on the corporate network.
Replace branch hardware with new 3900 routers and 2960 switches.
Configuring firewall switch module on Cisco 6506 distribution layer switches, configuring VTPs, trunking, inter-vlan routing, port fast, uplink fast, backbone fast on access layer switches.
Enable STP attack mitigation (BPDU Guard, Root Guard), Using MD% authentication for VTP
Planned and installed Frame Relay WAN links to the branch offices.
Assisted in MPLS migrations, implemented a backup for the existing WAN connection using IP sec VPN tunnels.
Worked on Network Traffic sizing of cloud to network through security firewalls.
Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation.
Configuring ASA 5510 Firewall and accept/reject rules for network traffic.
Worked on migration of Frame Relay based branches to MPLS based VPN for customer s WAN infrastructure.
I have good experience working with Trouble Tickets on F5 Load Balancers.
Scaling of BGP and IGRP in the core, dealt with implementation of deployment related to Cisco devices and applying security policies on it.
Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.
Managed data back-ups, scheduled data back-up, and preparation for disaster recovery files.
Planning for upgrade of IOS on devices and performing the upgrade.
Assisted in the architecture, evaluation and recommendations related to purchasing and installing hardware, software related to IP Networking.
Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, F5 Load Balancer Cisco Nexus7K/5K

Technical Enhancements & Projects
Designed and deployed SD-WAN solutions to optimize branch connectivity and reduce MPLS dependency.
Implemented network automation using Ansible and Python to streamline configuration management.
Integrated cloud networking components in AWS and Azure, enabling hybrid cloud environments.
Configured and managed Palo Alto firewalls including policy creation, NAT rules, and Panorama integration.
Administered load balancers such as F5 and NGINX for application delivery and traffic optimization.
Integrated Cloudflare with backend APIs for bot protection and TLS configuration.
Built GitLab CI/CD pipelines to automate CDN deployment with IaC.
Keywords: cplusplus continuous integration continuous deployment sthree active directory information technology ffive hewlett packard Idaho Maryland Pennsylvania South Dakota Texas Wisconsin

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];6526
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: