(555) 432-1000,
, , 100 Montgomery St. 10th Floor

Over 7 years experience as a senior Network/Security Engineer having worked with multiple clients with Global Network presence. Worked in various teams which includes Operations, Deployment and Engineering/Architecture. Multi-Vendor equipment experience in verticals that include LAN, WAN, Data centre and Campus Switching and Routing, Remote site connectivity, Firewalls, Proxies, SSL VPN, Application Delivery Controllers, Wireless Networks, Automation, Cloud Connectivity and Cloud Security. Master’s Degree focused in Telecommunications and Network Engineering and Passionate to learn new technologies and implement ideas to enhance various Data Connectivity and security Schema in Networks. Actively looking for a Challenging role in Network/Network Security Engineering.

  • Routers: Cisco based MX, EX,2950,2960,3600,3750,4500,6500,1700,1800,2600,880.
  • Switches: Cisco 3850, 3550, 3750, 4500, 4900, 6500 and Cisco Nexus 2k, 5k, 7k Series.
  • Firewalls: Cisco ASA, Brocade Vyatta, Juniper SRX -100, Palo Alto.
  • Load Balancers: Cisco ACE, F5, Citrix NetScaler.
  • Cloud Technologies: Meraki, Azure.
  • Virtualization: VMware.
  • Routing: OSPF, EIGRP, BGP, RIP, PBR, Route Filtering, Redistribution, Summarization, Static routing.
  • Switching: VLANs, Dot1Q, VTP, STP, RSTP, VLAN Maps, HSRP, GLBP, CEF, DCEF, Port Security.
  • LAN/WAN Technologies: Ethernet, Frame relay, MPLS, HDLC, PPP, T1, T3, OC Standard, ISDN.
  • FHRP: VRRP, HSRP, GLBP, Active-Standby.
  • VPN Technologies: IPSEC, SSL, DMVPN, OPEN VPN, MPLS over VPN, Split tunnel, Tunnel all.
  • Tools: PowerShell, Wireshark, GNS3, Infoblox, IPAM, Ipplan, Netbox, Device Expert, Solar Winds, OSM, Netflow, Visio, KIWI.
  • Programming Languages: C, MATLAB, Python.
  • Operating System: Windows, Linux.
Education and Training
Southern Methodist University Dallas, TX, Expected in 05/2015 Master of Science : Telecommunications And Networking - GPA :

3.7 GPA

St.Martin's Engineering College Hyderabad, INDIA, Expected in 05/2013 Bachelor of Science : Electronics And Communications Engineering - GPA :

3.2 GPA

Career Highlights
  • Experience with legacy and high-end switching technologies in Campus and Data Center environments. Worked on Cisco, Juniper and Aruba/HP gear in campus environments. Worked on Cisco, Arista, Dell, Cumulus, Juniper gear in Data Center environment.
  • Experience with Interior and Exterior routing protocols that includes RIP, OSPF, EIGRP, IS-IS and BGP. Worked on Cisco, Juniper and Arista routers.
  • Experience in Network Security that includes perimeter security for Internet, Extranet, DMZ, Internal Server farms, Web-traffic security with Proxies, Web Application firewalls. Worked and migrated multi-vendor equipment and Next generation firewall technologies. Worked on ASA, Firepower, Checkpoint and Palo Alto firewalls. Experience on MWG, Bluecoat and Zscaler proxies.
  • Experience and high-level understanding in application delivery controllers, local and global load balancing techniques, redundancy solutions, high availability options for mission critical internal, vendor and public facing applications. Experience with F5 LTM, GTM, APM, NetScaler’s, Cisco ACE and A10.
  • Worked on Campus Wireless environments with 1000+ access points, Wireless LAN controllers, Anchor Controllers, Authentication policies, BYOD policies, Integration with RADIUS. Experience with Aruba and Cisco WLAN.
  • Experience with TACACS/RADIUS severs, migration from ACS and Aruba ClearPass to ISE. Experience with windows and Infoblox DNS and DHCP servers, IPAM, internal and external grids.
  • Experience with WAN connectivity, MPLS circuits, leased Lines, Metro Ethernet, Site to Site IPsec tunnels, ISP circuits, Customer Edge configurations. Experience with SD-WAN solutions that include Viptella and Versa.
  • Experience with setting up and troubleshooting SSL VPN solution using Cisco AnyConnect, Juniper Pulse Secure, Zero Trust Network Access.
  • Knowledge and operational experience with SDN, Cisco ACI, VXLAN, VTEPS, VNI, Bridge Domain, Arista Cloud Vision, EVPN, MP-BGP, Spine and Leaf Architecture.
  • Experience with Zscaler Cloud Proxy Architecture with ZIA, traffic forwarding using GRE tunnels to Zcloud, Azure AD Authentication, Access policies, ZAPP.
  • Experience with Network Monitoring tools, SNMP, Log collectors, Splunk, ticketing tools and thorough understanding of workflows in corporate environments that include Financial, Healthcare, Retail clients.
  • Very enthusiastic to explore and implement innovative ideas in Network Automation in configuration, documentation, troubleshooting, workflow integration, API integration with multiple tools using Python and Ansible. Basic Exposure to Python and Ansible.
  • Support Jenkins to integrate with Ansible playbooks.
  • Performed POC on building SDDC (software defined DC) using VMware NSX-V and NSX-T.
  • Worked on building GCP VPCs, cloud routers, VPNs and security
Colsa Corporation - Network/Cloud Engineer Consultant
, , 08/2020 - Current
  • Worked with AWS cloud networking and security. Experience with Cloud Exchange providers like Equinix. Worked on Direct Connect and IPSEC tunnels. Configuration of BGP o peer with On-premises and Internet.
  • Experience setting up Direct connect. Worked on Cross Connects, Virtual interfaces, Routing Policies and BGP Communities, Gateways, LAGS, accessing remote AWS site using IPSEC tunnels etc.
  • Worked on installation of F5 LB and Palo alto firewalls in Shared services to control traffic flow from on premises to cloud and cloud to internet.
  • Worked on VPC configuration end to end, subnets, internet gateways, Carrier Gateways, NAT devices, DHCP, Route Tables, VPC Peering, VPN connections etc.
  • Worked on Security Groups and Network ACLS in VPC, Configuration of private and public subnets. Worked on High Availability features using Availability Zones, Network Firewalls, rule groups and Firewall Policies.
  • Worked on Route53 in AWS to register domain names, route internet traffic to resources in AWS, Health monitoring of resources and DNS failover. Experience with DNS resolution between VPCs and On premises.
  • Worked on elastic load balancing options in AWS. Configuring load balancing in Availability Zones, updating Security Groups, configuring Listeners, Tags, Target groups, expertise with AWS CLI.
  • Experience with AWS global accelerator. Worked on standard and global accelerators using routing customizing, DNS addressing and domains, Preserving Client IP addresses.
  • Document, design and manage wired and wireless networks for multiple campuses and sites of Callaway Golf all over the country for seamless Data Connectivity, accessibility and security.
  • Work with various teams and vendors for wireless network connectivity, perform wireless surveys, and recommend best practices for wireless network environment with several Access points and end points.
  • Achieve connectivity to various campuses using switching, routing and firewall devices. Design and operate redundancy and failover topologies for remote site and ISP connectivity.
  • High level and low level design methodology for wireless network that includes extensive work and skills in understanding and configuring wireless LAN Controllers, Wireless Access Points, Authentication using RADIUS, RF parameter configuration, end point and end systems configuration, 802.11 standards, Enterprise Radio Frequencies that include 2.4 and 5GHz.
  • Provide detailed engineering skills in Data Center Architecture and operations that include multi-vendor switches, routers, firewalls, Load balancers, Wireless LAN controllers, and Network Monitors and logging servers.
  • Operations include regular and frequent software upgrade procedures, troubleshooting connectivity issues, application delivery mechanisms that include Callaway’s proprietary and vendor based applications for internal and external access.
  • Implement various security and authentication mechanisms and strategies to protect Data transfers and connectivity for proprietary and BYOD devices.
  • Coordinate with management, CAB, Business units, Server team, application team, Data Base team on mission critical changes, implementations and deployment of network engineering projects that include life cycle of devices, deployment of new strategies, migration to new devices etc.
Pae Government Services Inc - Network Engineer - Tech Lead
Hartford, CT, 01/2017 - 07/2020

Role - Worked in Network Operations and Deployment as a Tech lead for multiple clients of IPSoft on switching, Routing, Firewalls, Load Balancers, Wireless LAN, Riverbed, remote site setup and connectivity issues, Proxies, DNS, DHCP and Monitoring. Worked on Global networks on various migration projects, Software upgrades, Installations, Lifecycle projects, Data Centre Builds.

  • Design and manage network infrastructures for Fortune 500 companies across the globe in Network Engineering and Network security Engineering.
  • Worked on Cisco, Juniper, Arista, Palo Alto, Check Point, FortiGate, F5, A10, Citrix, Aruba, Bluecoat, Zscaler, Riverbed, Infoblox, SolarWinds, Splunk vendor equipment in various verticals of Network and Security domains.
  • Worked on cisco catalyst 3750, 3850, 9K series, 4500-X, 6500, Nexus 2K, 5K, 7K, 9K, ASR 1K and 9K switches and Routers in Campus and Data center Topologies. Worked in LAN and WAN networks and ISP connectivity.
  • Worked on Layer protocols setup and troubleshooting which includes STP, RSTP, MST, HSRP, VRRP, GLBP, LACP, PAGP, VPC, VSS, VLAN, 802.1Q, VTP.
  • Worked on Layer 3 Protocols configuration and troubleshooting which includes OSPF, BGP, EIGRP, Static Routing, MPLS, Route Redistribution, Prefix Lists, IS-IS, VXLAN overlay, GRE Tunneling, MP-BGP.
  • Worked on traditional 3 Tier Architecture in Access, Distribution and Core Layers and also spine leaf Architecture with Nexus 9k and Arista 7000 series. Good understanding of overlay and underlay networks.
  • Worked on Software Defined networks which includes cisco ACI. Experience with Overlay tunneling using VXLAN. Worked on VTEPS, VNI, Bridge Domains, MP-BGP, Tenants, Application profile, VRF’s for multi-tenant network and EPG.
  • Worked on Firewalls in perimeter and server Farm. Very well versed with traffic flows in Inside, DMZ, Outside, extranet with respect to Zones. Worked on Security policies that include ACL, NAT, URL filtering, APP ID, Threat ID, User ID.
  • Worked on Palo Alto 5000, 500, 300 Series Firewalls, Panorama M100, Check point series, Fortinet series, Cisco ASA 5500 series and Firepower series for next gen firewall features.
  • Worked on Centralized managers in Firewalls that include Panorama, Central manger in Juniper, Forti Manager. Experience with Config templates, Software upgrade procedures, logging, management of firewall policies using centralized management.
  • Troubleshooting experience with IPSEC tunnels and SSL VPN for remote access. Worked on Phase 1 and Phase 2 IPSEC tunnel setup, worked on Juniper pulse and Cisco AnyConnect SSL VPN.
  • Worked on F5 LTM, GTM modules in Load balancing various internal and external applications. Migrations from ACE to F5 and NetScaler’s. Worked on Virtual servers, Pools, Health Monitors, SNAT, Persistence, SSL, Profiles, irules, iQuery, wideIP, Listeners, Zones and various Load balancing algorithms.
  • Experience with integrating LTM and GTM modules, Delegations from DNS server to GTM. Worked on windows and Infoblox DNS and DHCP to configure various DNS Zones, Sub domains, delegations, forwarding etc. Worked on configuration of DHCP scopes and options.
  • Worked on Cisco WLAN controllers for configuration of AP profiles, Access points, RF parameters, 802.1x integration with ISE, SSID, BYOD policies, wireless VLANs on Distribution switches.
  • Worked on deploying site to site VPN tunnels, Security policies, NAT policies, URL filtering, VDOM, Forti Manager, User ID based Security policies, SSL forward proxy, SSL decryption.
  • Worked on SD-WAN for remote site connectivity over MPLS. Worked on Viptela Solution in assisting architecture team in deploying vManage, vEdge, vBond and vSmart components.
  • Worked on Bluecoat and Zscaler Internet Access Proxies. Manage polices, User group-based whitelist and blacklist policies, integration with Azure AD for SAML auth and assertions, PAC file changes, traffic logs, Splunk, explicit proxy setup.
  • Experience with Documentation, Network monitoring using SolarWinds, log collection and analyzing using Splunk, DNS, DHCP, Diagramming using Visio and Netbrain, Inventory reports, Change management, Ticketing tools like Service now and remedy.
  • Worked on Automation using Ansible Scripting and Python to automate inventory reports, back of configs, config templates, integration of tools.
Custom Computer Specialists, Inc. - Network Engineer
Mount Vernon, NY, 08/2015 - 01/2017

RoleWorked on McKesson global network in Engineering team. Worked on Data centre refresh project with cisco and juniper devices, ASA and Checkpoint/Fortigate firewalls. Worked on Load Balancer migration project from NetScaler and ACE to F5.

  • Configuring EIGRP, OSPF and BGP on cisco routers. L3 switches as well as Nexus environment.
  • Implemented the Policy Rules, DMZ and Multiple VDOM's for Multiple Clients of the State on the FortiGate Firewall.
  • Extensive use of Cisco Routers and Switches by using LAN & WAN routing protocol EIGRP, OSPF and BGP to manage network infrastructure worked with any complex routing and switching issues.
  • Experience working with Nexus 7010, 5020, 2148, 2248 devices.
  • Setup separate ESX 3.0 environment to facilitate the migration from NSX 2.5.1
  • Configured and maintained F5 load balancing Big-IP devices for Local Traffic Management (LTM) and WAN Optimization (WOM)
  • Blacklisting and White listing of web URL on Panorama.
  • Knowledge on different kinds of cables used to connect different devices in data centers and within the industry.
  • Experience in VSS, VRF, VPC, and VDC technologies. Experience in Gateway redundant protocols HSRP, VRRP, and GLBP. Experience with Access, Distribution & Core Layer Architecture.
  • Work on the Ironport for the log files, routing protocols.
  • Experience with the Infoblox Installation.
  • Extensively worked on TCP/IP protocols and transport protocols like TCP and UDP.
  • Implemented Site-to-Site VPNs over the internet utilizing security standards such as 3DES, AES/AES-256 with ASA 5580 Firewalls.
  • Knowledge on Juniper SRX220, SRX240 and SRX550, Fortinet 200D series firewalls.
  • Troubleshot documented and installed a variety of equipment Arista switching fabric, Fortinet firewalls.
  • Worked on implementation of the basic F5 LTM (Local Traffic Manager)
  • Excellent customer management/resolution, Organizational, analytic, problem solving, debugging skills and capable of quickly learning, effectively analyses results and implement and delivering solutions as an individual and as part of a team.
  • Creating a priority list of what type of attacks to focus on vs. what can be accomplished and identifying timeline on how to accomplish all the functionality ASM can provide.
  • Install, configure and maintain Fortinet Version 4.0. to 6.0.
  • Managed multiple Fortinet Firewalls using Forti-manager.
  • Researched, designed, and replaced Checkpoint firewall architecture with new next generation Palo Alto PA3000 and PA5000 appliances serving as firewalls and URL and application inspection.
  • Managed companies Wireless Infrastructure includes to create new SSID, Flex/HREP in WLC.
  • Managed Palo Alto/ASA Firewall for security policies and rule base of security control points, device mapping using network address translation, objects management, other administrative tasks.
  • Worked with LAN protocols (VLAN, VTP, STP, RSTP, MST) & Port Channel Protocols (LACP, PAGP).
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture Expertise in installing, configuring and troubleshooting Juniper EX Switches EX2200, EX2500, EX3200, EX4200, EX4500 series
  • Worked with LAN protocols (VLAN, VTP, STP, RSTP, MST) & Port Channel Protocols (LACP, PAGP).
  • Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a Flexible Access Solution for a datacenter access architecture Expertise in installing, configuring and troubleshooting Juniper EX Switches EX2200, EX2500, EX3200, EX4200, EX4500 series
  • Proficient with F5 LTM and Cisco CSM load balancer in-between the servers inside the server farm and DMZ.
  • Assisted with the transition from the current Cisco ASA FW platform to the Cisco Firepower FPR 4150 NGFW.
  • ASA/PA firewall Log Maintenance and Policy Maintenance. Troubleshooting complex Checkpoint issues, Site-to-Site VPN related.
  • Implemented the Inter VDOM Routing through the Fortigate Firewalls and the Router.
  • Responsible for enabling BGP peering relationships and debugging BGP routing problems.
  • Experience with LTM F5 component to provide High Availability with providing services across data centers.
  • Experience with Wireless Aruba and Cisco Controllers based Enterprise networks.
  • Experience with Aruba/Ruckus Wireless Controllers, Access Points and IAP
  • Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trucking, deployed port security when possible for user ports
  • Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN.
  • Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewalls, CISCO PIX 506, and PIX 515.
  • Experience with migrating the Partner IPSEC VPN tunnels from one data center to another.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500 with ACL, NAT, Object Groups, Failover, Multi-Contexts.
  • Implemented VMWare management software Virtual Center 2.0 to manage the new environment.
  • Connected NSX 3.0 Servers in the three different lab environments to EMC External storage space. Publix also used Compaq's MSA1000 Modular SAN Array for the Supply Chain test environments.
Southern Methodist University - Network/System Administrator
City, STATE, 05/2014 - 04/2015
  • Worked as a system and network Admin in SMU to configure various access, Distribution and Core Switches in Campus IDF/MDF, Troubleshooting and setting up Wireless LAN.
  • Worked on Cisco Wireless LAN infrastructure in multiple campuses, configured SSID, Authentication, RF parameters, Wireless Survey, Heat maps, BYOD policies, GUEST WIFI access.
  • Worked on Cisco 3750 and 6500 series switches. Configured Gateway redundancy, OSPF routing.
  • Worked on end user computing on pushing GPO policies. System level software upgrades. Provisioning access to various AD groups to system level requirements.
  • Worked on Layer 1 copper and Fiber cabling. Worked on Single Mode, Multi-Mode, Cat 5, Cat 6 cabling in campus.
Bharat Sanchar Nigam Limited (BSNL) - Junior Network Administrator
City, STATE, 07/2012 - 07/2013
  • Learned various aspects of the telecom industry and gained valuable experience.
  • Assisted the NETSUPP-TIE2 team and worked on the architecture and functioning of the Cisco 2600 series routers.
  • Configured VLANS on different impetus switches performed investigating on TCP/IP system issues, Administered Frame-Relay and systems.
  • Got familiarized and collaborated with dynamic call routing and its features, multi-provider environment, number portability and Internet routing evolution.
  • Worked on Cabling in IDF/MDF and in Data centers with Copper and Fiber.
  • Involved in customer escalations and troubleshooting issues related to connectivity, STP, VLAN, Trunking, VTP, Layer 2/3 switching, Ether channels, Inter-VLAN routing, log messages, high CPU utilization and parameters that can degrade performance of network.
  • Familiar with Networking tools like CISCO IOS, Wireshark, Ping, Trace route, Speed Test.
  • Experience in troubleshooting of Layer 2 features (VLAN, STP, RSTP, VRRP, and Ether Channel).
  • Support Network Technicians as they require training & support for problem resolution including performing diagnostics & configuring network devices.
  • Having strong Knowledge with Cisco 1921/k9, 3750, 1800 series routers & 2950, 2960 series switches, Nexus 2k, 5k, 7k.
  • Configuring STP for switching loop prevention and VLANs for data and voice along with configuring port security for users connecting to the switches.
  • Configured VLANS on multiple catalyst switches performed troubleshooting on TCP/IP network problems, Administered Frame-Relay and networks.
  • Implemented VTP and Trunking protocols (802.1q and ISL) on 3560, 3750 and 6500 series Cisco Catalyst switches.
  • Managed system backup and restoration protocols. Escalating issue to higher network teams.

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy


Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

How this resume score
could be improved?

Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:


resume Strength

  • Formatting
  • Length
  • Personalization
  • Strong Summary
  • Target Job

Resume Overview

School Attended

  • Southern Methodist University
  • St.Martin's Engineering College

Job Titles Held:

  • Network/Cloud Engineer Consultant
  • Network Engineer - Tech Lead
  • Network Engineer
  • Network/System Administrator
  • Junior Network Administrator


  • Master of Science
  • Bachelor of Science

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in: