network ise engineer resume example with 5+ years of experience

(555) 432-1000,
Montgomery Street, San Francisco, CA 94105
Professional Summary

Experienced Network Security Engineer with over 4 years of experience in network design, deployment and operations of Cisco Networks, Firewall Management, IP Address Management, Security and Security Implementation. Capable of applying technical expertise and diagnostic abilities toward solving problems and maintaining usability and performance.

  • Nexus 9K/7K/5K/2K; Cisco Catalyst 6500, 4500, 3850, 3560, 3750, 2960
  • L3 technologies: IP Sub-netting, IP routing, BGP, OSPF, VRRP, HSRP, VRF
  • AAA TACAS RADIUS: ACS 5.5/5.7/5.8, ISE2.4/2.1
  • Firewalls: Cisco ASA 5500, Checkpoint R80 Gaia
  • Switching Technologies(L2): VLAN, VTP, STP, RSTP, MPLS, IEEE 802.1Q, VTP, Inter-VLAN routing
  • Wireless Technology: Cisco 5500, 6500 series controller, Cisco AP, LWAP, Access Points
  • Microsoft Visio, Solar Winds, Splunk, and MS Office applications
  • BYOD Program Implementation, TCPDUMP, Wireshark software
  • AD, Network
  • AP, Networking
  • Backup, Networks
  • BGP, Optimization
  • Cisco Certified Network Associate, Policies
  • CCSA, Prime
  • Change management, Program Implementation
  • Cisco, Protocols
  • Citrix, Reporting
  • Hardware, Routers
  • Controller, Routing
  • Client, Servers
  • Clients, SNMP
  • Designing, Switches
  • Email, Switch
  • Engineer, TCP/IP
  • Ethernet, Technical assistance
  • Firewalls, Phone
  • Firewall, Troubleshoot
  • Frame-Relay, Troubleshooting
  • Gateways, Upgrades
  • Internet Service Provider, Upgrade
  • IP, Upstream
  • LAN, VPN
  • Regulatory Compliance, WAN
  • Access, Wireless LAN
  • MS Office applications
  • Microsoft Visio
  • 2K
  • Enterprise
  • NAC
University of Missouri Kansas City, MO Expected in 05/2015 Master of Science : Electrical Engineering - GPA :
  • Cisco Certified Network Associate (CCNA)
  • Checkpoint Certified Security Administrator (CCSA)
  • Palo Alto Networks Certified Security Engineer (PCNSE)
  • Work History
    Granicus - Network ISE Engineer
    Des Moines, IA, 04/2017 - Current
    • Working as Network Access Controls (NAC) ISE Engineer in planning and designing Clients global network for Network Access Solution to support posture, profiling and enforce compliance across remote VPN, wireless, and wired networks.
    • Worked on Enforcement policies for auto-remediation of non-complaint devices and remediating devices that are misconfigured or are missing an 802.1x supplicant.
    • Integrated Cisco ISE with Load balancer (Citrix NetScaler and F5 LTM) to manage traffic between multiple ISE PSN nodes in order to provide AAA services.
    • Upgraded Cisco ISE consisting of 45 ISE servers North America wide from legacy version 2.1 to 2.4 without affecting business operation.
    • Worked on the design and implementation of the Guest Network environment (Visitor, Employee) and BYOD for NAC solution.
    • Managed company Bring Your Own Device program, onboarding employee devices and verifying absence of inherent security threats.
    • Ensure that LAN/WAN configurations are compatible and consistent with the global standards of the company.
    • Worked on Splunk tool to monitor the traffic.
    • Implemented Splunk to drive reporting and search for data collected from Cisco ISE.
    • Utilized system tools TCPDUMP, ping and Wireshark to debug and verify packet integrity.
    • Performed packet capture and TCPDUMP to analyze application traffic to troubleshoot issues related.
    • Monitoring and alert management of all components related to the ISE NAC solution and providing ongoing maintenance and support of solution components (patching, upgrades, capacity reviews and lifecycle management).
    • Provided level 2/3 support for ISE related issues, including off-shift and weekend support functions.
    Agreeya Solutions - Network Engineer
    Sanford, NC, 08/2016 - 03/2017
    • Managed and implemented Cisco ACS solution to centralize authentication of all networking devices for 802.X authentication on LAN and authentication for WLAN SSIDs.
    • Configuring privilege level and command authorizations using TACACS+ protocol.
    • Monitor logs for any unauthorized login, Password management of users, and ACS Backup.
    • Operated with Network Operations Wireless team to design, configure, management of enterprise wireless hardware, software and management systems.
    • My responsibility included centralizing on-site management, policies and access point deployment to improve performance and visibility by maintaining 101 Cisco Wireless Controllers for supporting 5000 access points worldwide.
    • Improved and enhanced performance of Wi-Fi coverage using heat-maps and signal strength parameters on Cisco WLC and Cisco Prime.
    • Configured and managed AP's, WLC using Cisco Prime Infrastructure.
    • Used Cisco Prime in the network for the management and predictability purpose.
    • Worked extensively on Checkpoint firewalls for analyzing firewall change requests and implementing changes into existing firewall policies, maintaining security standards.
    • Checkpoint issues, Site-to-Site VPN related.
    • Performed upgrades for all IP series firewalls from R77-R81.
    • Actively work with users to convert their firewall port opening requests into firewall change requests and process them through the Service Now change management system.
    • Use Tools such as TUFIN for Firewall Policy optimization and rule base Clean up.
    • Collaborated on a multi-team environment to investigate existing Wireless issues in client and propose its remediation plans for enhanced network performance.
    • Used internal network monitoring tools such as Solar Winds to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption.
    Cisco - Cisco Network Engineer
    City, STATE, 08/2015 - 07/2016
    • Worked Extensively on Access Control Policies consisting of VLAN switching through SNMP, applying downloadable ACLs through Cisco ISE, and Configuring Standard and Extended ACLs locally and on upstream switch's for Cisco NAC.
    • Configured probes in Cisco ISE to collect device information connected on to company's switches and external Routers.
    • Implemented TACACS+/ RADIUS authentication/authorization on Cisco ISE for central management of all network devices across three regions.
    • Finalized the design for Guest Network and Mobile Access Network for NAC solution, comprising of an Anchor Wireless LAN controller solution in DMZs/Internet Gateways with ISE for NAC.
    • Configuration of various Policy Configurations, Profile Authorizations, End device Profiling, User Identities, Cisco ISE and AD mapping with various attributes and levels of authorizations and Network Access.
    • Configured VLANS on multiple catalyst switches performed troubleshooting on TCP/IP network problems, Administered Frame-Relay and networks.
    • VLAN implementation, Spanning Tree Implementation, Trunking and port channels creation and support using PVST, R-PVST and MSTP to avoid loops in the network.
    • Experience in configuring to the needs of BGP peering with vendors, configuring OSPF within the client network.
    • Install/Upgrade the Firewalls (ASA) IOS using TFTP.
    • Replaced the old routers and switches with Cisco ASR 1004 and Catalyst 3850 switch and upgrade them to IOS XE Fuji 16.9.4.
    • Analyzed and tested network protocols (Ethernet, TCP/IP) using Wireshark tool.
    • Troubleshooting Routing Protocols, Networking Layer1, 2, 3 Switching concepts, LAN/WAN technologies, Wireless Networking, and TCP/IP concepts.
    • Communicated with Cisco TAC and Internet Service Provider over phone or via email to troubleshoot technical problems.
    • Provided technical assistance for LAN/WAN management & troubleshooting and complex customer issues using Network monitoring tool's such as Solar Winds, Wireshark, TCP Dump, Cisco Prime.

    By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

    Your data is safe with us

    Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

    Resume Overview

    School Attended

    • University of Missouri

    Job Titles Held:

    • Network ISE Engineer
    • Network Engineer
    • Cisco Network Engineer


    • Master of Science

    By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

    *As seen in:As seen in: