Jessica Claire
  • Montgomery Street, San Francisco, CA 94105
  • Home: (555) 432-1000
  • Cell:
Professional Summary

Experienced Network Security Engineer with over 4 years of experience in network design, deployment and operations of Cisco Networks, Firewall Management, IP Address Management, Security and Security Implementation. Capable of applying technical expertise and diagnostic abilities toward solving problems and maintaining usability and performance.

  • Nexus 9K/7K/5K/2K; Cisco Catalyst 6500, 4500, 3850, 3560, 3750, 2960
  • L3 technologies: IP Sub-netting, IP routing, BGP, OSPF, VRRP, HSRP, VRF
  • AAA TACAS RADIUS: ACS 5.5/5.7/5.8, ISE2.4/2.1
  • Firewalls: Cisco ASA 5500, Checkpoint R80 Gaia
  • Switching Technologies(L2): VLAN, VTP, STP, RSTP, MPLS, IEEE 802.1Q, VTP, Inter-VLAN routing
  • Wireless Technology: Cisco 5500, 6500 series controller, Cisco AP, LWAP, Access Points
  • Microsoft Visio, Solar Winds, Splunk, and MS Office applications
  • BYOD Program Implementation, TCPDUMP, Wireshark software
  • AD, Network
  • AP, Networking
  • Backup, Networks
  • BGP, Optimization
  • Cisco Certified Network Associate, Policies
  • CCSA, Prime
  • Change management, Program Implementation
  • Cisco, Protocols
  • Citrix, Reporting
  • Hardware, Routers
  • Controller, Routing
  • Client, Servers
  • Clients, SNMP
  • Designing, Switches
  • Email, Switch
  • Engineer, TCP/IP
  • Ethernet, Technical assistance
  • Firewalls, Phone
  • Firewall, Troubleshoot
  • Frame-Relay, Troubleshooting
  • Gateways, Upgrades
  • Internet Service Provider, Upgrade
  • IP, Upstream
  • LAN, VPN
  • Regulatory Compliance, WAN
  • Access, Wireless LAN
  • MS Office applications
  • Microsoft Visio
  • 2K
  • Enterprise
  • NAC
Work History
Network ISE Engineer, 04/2017 to Current
GranicusDes Moines, IA,
  • Working as Network Access Controls (NAC) ISE Engineer in planning and designing Clients global network for Network Access Solution to support posture, profiling and enforce compliance across remote VPN, wireless, and wired networks.
  • Worked on Enforcement policies for auto-remediation of non-complaint devices and remediating devices that are misconfigured or are missing an 802.1x supplicant.
  • Integrated Cisco ISE with Load balancer (Citrix NetScaler and F5 LTM) to manage traffic between multiple ISE PSN nodes in order to provide AAA services.
  • Upgraded Cisco ISE consisting of 45 ISE servers North America wide from legacy version 2.1 to 2.4 without affecting business operation.
  • Worked on the design and implementation of the Guest Network environment (Visitor, Employee) and BYOD for NAC solution.
  • Managed company Bring Your Own Device program, onboarding employee devices and verifying absence of inherent security threats.
  • Ensure that LAN/WAN configurations are compatible and consistent with the global standards of the company.
  • Worked on Splunk tool to monitor the traffic.
  • Implemented Splunk to drive reporting and search for data collected from Cisco ISE.
  • Utilized system tools TCPDUMP, ping and Wireshark to debug and verify packet integrity.
  • Performed packet capture and TCPDUMP to analyze application traffic to troubleshoot issues related.
  • Monitoring and alert management of all components related to the ISE NAC solution and providing ongoing maintenance and support of solution components (patching, upgrades, capacity reviews and lifecycle management).
  • Provided level 2/3 support for ISE related issues, including off-shift and weekend support functions.
Network Engineer, 08/2016 to 03/2017
Agreeya SolutionsSanford, NC,
  • Managed and implemented Cisco ACS solution to centralize authentication of all networking devices for 802.X authentication on LAN and authentication for WLAN SSIDs.
  • Configuring privilege level and command authorizations using TACACS+ protocol.
  • Monitor logs for any unauthorized login, Password management of users, and ACS Backup.
  • Operated with Network Operations Wireless team to design, configure, management of enterprise wireless hardware, software and management systems.
  • My responsibility included centralizing on-site management, policies and access point deployment to improve performance and visibility by maintaining 101 Cisco Wireless Controllers for supporting 5000 access points worldwide.
  • Improved and enhanced performance of Wi-Fi coverage using heat-maps and signal strength parameters on Cisco WLC and Cisco Prime.
  • Configured and managed AP's, WLC using Cisco Prime Infrastructure.
  • Used Cisco Prime in the network for the management and predictability purpose.
  • Worked extensively on Checkpoint firewalls for analyzing firewall change requests and implementing changes into existing firewall policies, maintaining security standards.
  • Checkpoint issues, Site-to-Site VPN related.
  • Performed upgrades for all IP series firewalls from R77-R81.
  • Actively work with users to convert their firewall port opening requests into firewall change requests and process them through the Service Now change management system.
  • Use Tools such as TUFIN for Firewall Policy optimization and rule base Clean up.
  • Collaborated on a multi-team environment to investigate existing Wireless issues in client and propose its remediation plans for enhanced network performance.
  • Used internal network monitoring tools such as Solar Winds to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption.
Cisco Network Engineer, 08/2015 to 07/2016
CiscoCity, STATE,
  • Worked Extensively on Access Control Policies consisting of VLAN switching through SNMP, applying downloadable ACLs through Cisco ISE, and Configuring Standard and Extended ACLs locally and on upstream switch's for Cisco NAC.
  • Configured probes in Cisco ISE to collect device information connected on to company's switches and external Routers.
  • Implemented TACACS+/ RADIUS authentication/authorization on Cisco ISE for central management of all network devices across three regions.
  • Finalized the design for Guest Network and Mobile Access Network for NAC solution, comprising of an Anchor Wireless LAN controller solution in DMZs/Internet Gateways with ISE for NAC.
  • Configuration of various Policy Configurations, Profile Authorizations, End device Profiling, User Identities, Cisco ISE and AD mapping with various attributes and levels of authorizations and Network Access.
  • Configured VLANS on multiple catalyst switches performed troubleshooting on TCP/IP network problems, Administered Frame-Relay and networks.
  • VLAN implementation, Spanning Tree Implementation, Trunking and port channels creation and support using PVST, R-PVST and MSTP to avoid loops in the network.
  • Experience in configuring to the needs of BGP peering with vendors, configuring OSPF within the client network.
  • Install/Upgrade the Firewalls (ASA) IOS using TFTP.
  • Replaced the old routers and switches with Cisco ASR 1004 and Catalyst 3850 switch and upgrade them to IOS XE Fuji 16.9.4.
  • Analyzed and tested network protocols (Ethernet, TCP/IP) using Wireshark tool.
  • Troubleshooting Routing Protocols, Networking Layer1, 2, 3 Switching concepts, LAN/WAN technologies, Wireless Networking, and TCP/IP concepts.
  • Communicated with Cisco TAC and Internet Service Provider over phone or via email to troubleshoot technical problems.
  • Provided technical assistance for LAN/WAN management & troubleshooting and complex customer issues using Network monitoring tool's such as Solar Winds, Wireshark, TCP Dump, Cisco Prime.
Master of Science: Electrical Engineering, Expected in 05/2015
University of Missouri - Kansas City, MO
  • Cisco Certified Network Associate (CCNA)
  • Checkpoint Certified Security Administrator (CCSA)
  • Palo Alto Networks Certified Security Engineer (PCNSE)
  • By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy


    Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

    How this resume score
    could be improved?

    Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:


    resume Strength

    • Formatting
    • Measurable Results
    • Personalization
    • Strong Summary
    • Target Job

    Resume Overview

    School Attended

    • University of Missouri

    Job Titles Held:

    • Network ISE Engineer
    • Network Engineer
    • Cisco Network Engineer


    • Master of Science

    By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

    *As seen in: