Summary
Overview
Work History
Education
Skills
Accomplishments
Additional Information
Certification
Websites
Timeline
Generic

Chandani Gohil

Houston,TX

Summary

Network Engineer with 9+ years of experience in assisting multiple clients with Switching, Routing, Network Security (Firewalls and Proxies), Application Delivery Controllers, Authentication and Wireless environments. Experienced with Campus and Data Center topologies in multi-vendor equipment. An affable team player with good communication and collaborative abilities. Motivated to innovate and introduce new ideas to enhance the network architecture of an organization. Experience with legacy and high-end switching technologies in Campus and Data Center environments. Worked on Cisco, Juniper, and Aruba/HP gear in campus environments. Worked on Cisco, Arista, Dell, Cumulus, Juniper gear in the Data Center environment. Established AWS, Azure technical credibility with customers and external parties. Experience with Interior and Exterior routing protocols that includes RIP, OSPF, EIGRP, IS-IS and BGP. Worked on Cisco, Juniper, and Arista routers. Worked with different models of Cisco/Juniper/Arista switches, routers, firewalls, load balancers, VPNs, and wireless systems. Experience in designing and implementing F5 web-based solutions. Experience in writing F5 iRules. Experience in implementing F5 solutions in Azure cloud. Daily Support of F5 environment to include Creation of new VIPs/WIPs and iRules. Worked on Campus Wireless environments with 1000+ access points, Wireless LAN controllers, Anchor Controllers, Authentication policies, BYOD policies, Integration with RADIUS. Experience with Aruba and Cisco WLAN. Experience with TACACS+ /RADIUS servers, migration from ACS and Aruba ClearPass to ISE. Experience with windows and Infoblox DNS and DHCP servers, IPAM, internal and external grids. Knowledge and operational experience with SDN, Cisco ACI, VXLAN, VTEPS, VNI, Bridge Domain, Arista Cloud Vision, EVPN, MP-BGP, Spine and Leaf Architecture. Experience with Zscaler Cloud Proxy Architecture with ZIA, traffic forwarding using GRE tunnels to Zcloud, Azure AD Authentication, Access policies, ZAPP.

Overview

10
10
years of professional experience
1
1
Certification

Work History

Senior Network Engineer

Tango
, TX
03.2023 - Current
  • Working closely with customers on the technical requirements to provide technical solutions Designing multifaceted solutions using latest technologies in the field
  • Restructuring of Migration on Data Centers as per the client requirement
  • Working as a subject matter expertise across various enterprise identity authentication technologies ranging from AAA (RADIUS/TACACS), 802.1X technologies (Wired/Wireless), RSA and token-based systems
  • Experience working with SSL Certificate Authorities, and certificate management
  • Experience with Proxy and Malware-mitigation (Zscaler), and Perimeter Security (Checkpoint firewalls, Palo alto Firewalls, IDS/IPS systems)
  • Worked on Arista Cloud Vision (CVP) & Cloud Vision Exchange (CVX) Deployed on VMs
  • Design expertise for the SD-WAN (Versa & Viptela), SD-LAN and WAN optimization technologies for efficient delivery of the application data across LAN and WAN
  • Configure Cisco 4500 routers, 2900 switches, Cisco 5500(WLC) & Wisms2, 3800 2900 switches, Aruba 7200 3600s (Cisco, Aruba, & Ruckus AP’s)
  • Expertise with Installation of Arista 7250QX series switches on Spine Platform
  • Proficient in Palo Alto Next-Generation Bluecoat web proxy, HP ArcSight, Splunk Enterprise, Wireshark, FireEye, and various internet tools to assist in analysis
  • Implemented SD-WAN for smooth traffic management and security purpose
  • Making ISP Configuration changes on cisco Routers and SD-WAN Devices
  • Design and deploy MPLS VPNv4, Layer 2/3, OSPF, static routing, VLAN, dot1q trunks
  • Utilize Forti Manager, FortiClient and Forti Analyzer to maintain and optimize FortiGate firewalls
  • Back up, Restore and upgrade of FortiGate firewall appliances
  • Aruba wireless solution for international company
  • Virtual Controllers' ,Clustered AP's Access points, Airwave management
  • Design, configuration, and maintenance of Cisco wireless hardware
  • Providing L2/L3 technical support for ACI, APIC technologies
  • Troubleshoot OSPF, Cisco ACI, OTV, Cisco ISR 4431, L2/L3 DCI issues, layer 2 issues, MPLS
  • Deployed Cisco wireless 802.1X infrastructure across the enterprise network
  • Designed and worked on VXLAN BGP-EVPN Cisco 9000 and Extended Leaf in CISCO ACI
  • Configure IPSEC and SSL VPN between Palo-alto and Cisco Router
  • Configure FortiGate firewall to authenticate users based on user identity, user group, session, and PC-User Authentication
  • Configured WAN connections with Meraki and FortiGate SD-WAN
  • Deployed and Manage SD-WAN network (Cisco Meraki Solution) for WAN connectivity
  • Heavily involved with data center migration from Cisco to primarily Arista with minimal downtime utilizing VxLAN
  • Deployed, configured, and implemented Imperva Secure Sphere WAF and DAM, Web Inspect, AppScan, OWASP for Web-based application vulnerability analysis and code review process
  • Conduct periodic network monitoring and intrusion detection analysis to determine if there have been any attacks on the system
  • Analyze network traffic to identify anomalies and test the information security controls for weaknesses
  • Respond to threats if malicious activity has been detected in the system by taking actions to mitigate/contain the activity and minimize damage and may also facilitate forensics analysis to determine the source of the threat
  • Design and implement new safeguards to protect the system by working with other IT teams to implement the new safeguards, whether it is in the form of software, hardware, or new operating procedures
  • Plan and appraise ongoing assessment of application control, firewall, VPN, SSL, NAC, intrusion detection or intrusion prevention and other network component policies
  • Daily Support of F5 environment to include Creation of new VIPs/WIPs and iRules
  • Engineering and configuring Virtual Server, Pools, iRules, Profiles, Persistence, and monitor on F5 LTM
  • Migrating applications from cisco ACE/CSM to F5LTM, and GSS configurations to F5 GTM wide-Ip’s
  • Configured and troubleshooting the F5 LTM and APM and providing level 2 support for the customers
  • Worked extensively and responsible for the migration from Fortigate to Palo alto firewall
  • Palo alto Cluster for HA and fail-over for network reliability
  • Aruba wireless solution for international company
  • Virtual Controllers' ,Clustered AP's Access points, Airwave management
  • Configure and manage LDAP User management with Palo alto
  • Configure and manage User ID agents with palo alto to IP user management
  • Implemented the policy rules and DMZ for multiple clients of the state on the Palo alto firewall
  • Created and Managed Site VPN (IPSEC) and Client VPN (IPSEC, SSL) on Palo alto PA5220
  • Ensure network security best practices are executed through auditing: router, change control, switch, firewall configurations, and monitoring
  • Provides consulting services and products - Developing projects' scopes (SOW, scope of work) Coordinating with Vendor TAC and escalation to solve the problem within mentioned SLA
  • Project Management & Implementation of various Network security projects Support for the most complex network support activities Designs and performs Network Engineering/Administration maintenance tasks and analyzes processes for improvement
  • Performs the most complex network changes and implementations
  • Use of the Remedy trouble ticketing system resolving customer issues daily Cisco Router and switches upgrades
  • Using internal network monitoring tools such as Solar Winds, ExtraHop to ensure network connectivity and Protocol analysis tools to assess the network issues causing service disruption
  • Maintaining Corporate Firewalls & Analysis of firewall logs using various tools like Tufin security analyzers
  • Planning & implementation of information security guidelines as per the security standards
  • Designing and implementing different connectivity solutions to various customers with S2S VPN and Remote site VPN across the globe
  • Worked on Orion (Solar Winds) for mapping network diagrams, updated Orion with commissioned and decommissioned network devices
  • Designing and testing Business Continuity Plan (BCP) and Disaster Recovery
  • Managing Global Network Security Operations
  • Provides direction and guidance to more junior associates

Network Security Engineer

Cisco
, NY
09.2021 - 03.2023
  • IOS experience on 3600/7200 class hardware in a complex WAN environment and experience on Cisco OS and IOS on CAT6500 in a complex data center environment
  • Involved in configuring IP Quality of service (QoS)
  • Involved in designing L2VPN services and VPN-IPSEC authentication & encryption system
  • Experience in designing, installing & configuring Cisco ASA & FWSM (Firewall service module)
  • Worked on Checkpoint firewalls R70, R75, R77.20 Gaia and Provider-1/MDM
  • Evaluate, Analyze & Implement firewall policies to meet business requirements
  • Experience in creating and maintaining Checkpoint and ASA firewall configurations, updating documentation and log analysis
  • Worked extensively in configuring, monitoring, and troubleshooting Cisco's ASR 5500
  • Applying crypto maps and security keys for the branches, ISAKMP (Internet security association key management protocol) for establishing Security associations (SA) cryptographic keys
  • Provided WAN/LAN Cisco router/switch configuration, implementation, and support to internal customer tickets involving BGP, OSPF, EIGRP
  • Managing multiple AWS instances, assigning the security groups, Elastic Load Balancer and AMIs
  • Experience in configuring routing protocols like EIGRP, RIP v2, OSPF & BGP and Cisco ACS protocols like RADIUS and TACACS
  • Experienced in WAN environments, installing and troubleshooting data circuit problems (MPLS, T1)
  • Worked on Layer 2 protocols such as STP, VTP, STP, RSTP, PVST+, MST and other VLAN troubleshooting issues and configuring switches from scratch and deployment
  • Involved in designing and applying QOS and policy map to 2800 series routers for all the branches., Worked for the Global Deployment and Operations team to support multiple migrations in switching, routing, firewalls, LB and Proxies
  • Work on wildfire malware analyze the threat log and create rules for DDOS Attacks, Phishing, Malware and Brute force
  • Performed Palo Alto design and installation (with Application and URL filtering, SSL decryption, SSL Forward Proxy)
  • Configured and maintained IPSEC and SSL VPN on Palo Alto Firewalls
  • Successfully installed PA-5000 series in Data Center as perimeter firewall
  • Migrated ASA firewalls to PA next gen using the migration tool in PA
  • Migrated all IPSEC tunnels, ACL’s, NAT rules and policies
  • Deployed Cisco and Aruba wireless 802.1X infrastructure across the enterprise network
  • Installed and maintained Aruba switches
  • Network security including NAT/PAT, ACL, VPN and IPSEC on DMVPN
  • Configured WAN connections with Meraki and FortiGate SD-WAN
  • Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine
  • Used Cisco ACI Fabric which is based on Cisco Nexus 9000 series switches and Cisco Application Virtual Switch (AVS)
  • Experience with data center technologies that include spine leaf, cisco ACI, Arista cloud vision
  • Well versed with Nexus family switches to implement VPC and VDC
  • Deployed and Manage SD-WAN network (Cisco Meraki Solution) for WAN connectivity
  • Design and implement MPLS and BGP, using BGP and EIGRP for layer 3 routing protocols
  • Troubleshooting SD-WAN queries through Router based SD-WAN technologies
  • Experience in Making ISP Configuration changes on cisco Routers and SD-WAN Devices
  • Tuning and configuring rate control parameters for complex protocol methods in Akamai WAF
  • Configured and designed OSPF, EIGRP and BGP at Distribution and Core layers
  • Configured OTV layer 2 connection between Data centers on Nexus (Cisco ASR 9K, Nexus 7k and 9K) Worked on Juniper devices like M, MX, T routers on advanced technologies like MPLS VPNs, TE and other service provider technologies (EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240)
  • Analyzing Network Management Tools (Cisco Prime, Aruba Airwave) and generate Reports
  • Installing, configuring, Deploying, and troubleshooting Cisco/Aruba
  • Worked Extensively with Wireless planning and Management Tools like Aruba Airwave
  • Experience with configuring BGP, OSPF in M and MX series routers
  • Worked on several BGP attributes like MED, AS-PATH, Local Preference for route optimization
  • Worked on Route-Reflector, Route-Redistribution among routing protocols
  • Expertise in troubleshooting network traffic and its diagnosis using tools like ping, traceroute, Wireshark, TCP dump and Linux operating system servers
  • Extensive experience on deploying compute and storage in Azure cloud
  • Managed AD Domain Controller, DNS and DHCP Servers and configurations
  • Worked on Cisco ISE for user Authentication, Security Group Tags, MAC based authentication for Wireless and Wired users, 802.1X, EAP, PEAP etc
  • Worked with multi-vendor devices (Cisco, Juniper, Checkpoint, Arista,etc.) of the AWS Responsible for the IPAM (IP Address management) system for a very large WAN/LAN network (QIP) using SolarWinds IPAM and Infoblox DNS/DHCP servers
  • Experience with DHCP scopes, IP reservations, DNS host entries, pointers, delegations, Zones, DNSSEC etc
  • Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2960, 3500 ,7600, 3750, 3850 series, 6500 series) Cisco Routers (4800, ASR 9K, 800), Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, Zscaler Proxy and Versa SD-WAN appliances
  • Conducted a POC on Versa and Viptela SD-WAN solution as a team and worked on evaluating the solutions
  • Migrated Nexus 7Ks & Nexus 5Ks to an ACI Fabric consisting of 9336PQ Spines & 9332PQLeafs in a brownfield Data Center
  • Worked on PAC file updates, Internet proxy migration from IronPort to Zscaler cloud
  • Access policies, AD based, user based, location-based access
  • (Tools: ZAPP client)
  • Worked on Bridge Domains, VXLANs, VTEPS, VNID
  • Configuration of routing using BGP among multiple Leaf to spine switches
  • Thorough understanding of Application Profile, Tenants, End Point Group, Inter Subnet Tenant Routing, Routing within Tenants, Router Peering and Redistribution
  • Worked on Migration project from traditional Data Center Architecture to Spine Leaf
  • Creating a Managing Virtual Machine in Windows Azure and setting up communication Network Security Groups
  • Worked on connections handoff using Bridged Interface to an External Route
  • L3- EPG configurations, AEP configurations
  • Integrated existing Layer 2 and Layer 3 networks with ACI Play a key role in the company’s direction towards Cloud Computing platforms by creating a strategy for transition plans
  • (Tools: Azure AD and AWS, Office 365)
  • Analyze and provide courses of action on current as well as emerging security threats like ransomware attacks by research and recommendation of other security solutions to help mitigate network security threats while preventing their outbreak across the network
  • Worked on network design improvements involving BGP, EIGRP, OSPF, IP metric tweaking and load balancing
  • Design, implement, and develop network designs for applications used in TMO
  • Worked on Checkpoint Firewall to create new rules and allow connectivity for various Applications
  • Checkpoint is used as an internal firewall for application security in Kodiak network
  • Implemented Firewall rules and NAT rules by generating precise methods of procedure (MOPs)
  • Responsible for packet capture analysis, syslog and firewall log analysis
  • Experience in F5, Cisco ACE 4710 Load balancers
  • Migration Experience from ACE to F5 and NetScaler to F5
  • Worked on critical applications on Layer 4 and layer 7 load balancing
  • Experience with Virtual server, Pool, Node, Profiles – TCP, http, https, ftp, fastl4, Persistence – Source IP, SSL, Cookie, SNAT, iRules, iAPP, SSL offloading
  • Experience with F5 GTM and in-depth knowledge of DNS, Global level load balancing, Wide IP’s, Zones, Prober pools, Delegation from Windows DNS server to listener IP
  • Troubleshooting of Linux and Unix servers for application delivery servers
  • Install Dockers, Cisco and HP servers
  • High-level network troubleshooting and diagnostic experience using Packet capture tools like Wireshark
  • Configured network using routing protocols such as EIGRP, BGP and OSPF and troubleshooting L2/L3 issues
  • Designing, configuring, and troubleshooting QoS, SIP, H.323, RTP, SCCP, Session Border Controllers, Voice Gateways, Voice circuits IP /TDM, Cisco Telepresence Infrastructure, QoS, NAT, PAT, and multicast
  • Worked on Riverbed steelhead appliance to troubleshoot delay, jitter issues
  • Captured traffic and analyzed for root cause
  • Wrote policies and rules in steelhead
  • Assist in creating network design standards for hardware and software
  • Developing and maintaining Network Documentation (Visio diagrams, Excel spreadsheets, Word documents, etc.) Configure and troubleshoot network elements in a test/dev environment
  • Responsible for the IPAM (IP Address management) system for a very large WAN/LAN network (QIP) using SolarWinds IPAM and Infoblox DNS and DHCP servers
  • Used tools WireShark, Packet Sniffer and Microsoft Network Analyzer for monitoring LAN’s and WAN’s for Network connection and failure issues.

Network Specialist

Mizuho
New York, NY
06.2018 - 08.2021
  • Worked for State clients with various government departments which include DOT, DOH, DOE to configure site to site connectivity, troubleshoot issues, application load balancing, Network security
  • Configure the layer 2 and layer 3 on Cisco Nexus 9k,7K, 5K, 6509, 9710, 5596 UP, 4500, 3850, 3950, ASR and 2960

Network Engineer

IP Infusion INC
, CA
03.2017 - 05.2018
  • Installation and configuration of Cisco Routers 3600, 3900 and Switches 3550, 3560, 3560E, 3750, 6500, 7200 for VLANs, Routing Protocols (OSPF, BGP), VPNs etc
  • Implemented Cisco ACS for wired and wireless user authentication utilizing certificates and MAB for all known company assets
  • Installed WAN and LAN access for internet and intranet access
  • Configured Ether channels, Trunks, VLANs, HSRP in a LAN environment
  • Worked on Access, Core and Distribution layers
  • Implemented route redistribution between OSPF and EIGRP
  • Experience in AWS cloud platform and its features which includes EC2, VPC,EBS,SNS,RDS,EBS,Cloud Watch, Cloud Trail, Cloud Formation, AWS Config, Auto Scaling, Cloud Front, IAM, S3 and Route53
  • Provided end-user technical support for LAN and remote users in a 24/7 environment
  • Assisted in deploying WAN projects
  • Connectivity and configuration of routers, switches, end to end monitoring in new campuses
  • Provided WAN/LAN Cisco router/switch configuration, implementation, and support to internal customer tickets involving BGP, OSPF and EIGRP
  • Configuration and Maintenance of ASA 5585 firewalls with firepower, 5540, 5525 Firewalls using Cisco Security Manager (CSM)
  • Perform configuration, deployment and support of cloud services including Amazon Web Services
  • Troubleshooted and worked with security issues related to Cisco ASA/ PIX, Checkpoint, IDS/IPS and Juniper Net screen firewalls
  • Implement and modify DNS entries and manage IP Addresses using Windows DNS and DHCP
  • Experience configuring and troubleshooting on Citrix NetScaler Load Balancer
  • Performed Access Control Lists (ACLs) to set up usage for the intended users
  • Responsible for IOS installations and upgrades using TFTP Server
  • Troubleshooting Routing/Switching/Security Configuration problems/errors encountered to Clients in Head/Remote Campuses
  • Performed subnetting of the IP addresses
  • Configuration and allocating IP and network resources to Storage, Virtualization, Server, and Application teams
  • Responsible for design/implementation/maintenance of Site-to-Site VPNs, and remote access VPN using Cisco solutions (ASA 5520 and 5540), including head-end and remote client-side connections.

Network Engineer

Hutchison Global Services
, India
06.2014 - 02.2017
  • Installation and configuration of Cisco Routers 3600, 3900 and Switches3550, 3560, 3560E, 3750, 6500, 7200 routers for VLANs, Routing Protocols (OSPF, BGP), VPNs etc
  • Implemented Cisco ACS for wired and wireless user authentication utilizing certificates and MAB for all known company assets
  • Installed WAN and LAN access for internet and intranet access
  • Configured Ether channels, Trunks, VLANs, HSRP in a LAN environment
  • Worked on Access, Core and Distribution layers
  • Implemented route redistribution between OSPF and EIGRP
  • Provided end-user technical support for LAN and remote users in a 24/7 environment
  • Assisting in deploying WAN projects
  • Connectivity and configuration of routers, switches, end to end monitoring in new campuses
  • Provided WAN/LAN Cisco router/switch configuration, implementation, and support to internal customer tickets involving BGP, OSPF, EIGRP
  • Configuration and Maintenance of ASA 5585 firewalls with firepower, 5540, 5525 Firewalls using Cisco Security Manager (CSM)
  • Troubleshoot and Worked with Security issues related to Cisco ASA/ PIX, Checkpoint, IDS/IPS and Juniper Net screen firewalls
  • Implement and modify DNS entries and managing IP Addresses using Windows DNS and DHCP
  • Experience configuring and troubleshooting on Citrix NetScaler Load Balancer
  • Performed Access Control Lists (ACLs) to setup usage for the intended users
  • Responsible for IOS installations and upgradations using TFTP Server
  • Troubleshooted Routing/Switching/Security Configuration problems/errors encountered to Clients in Head/Remote Campuses
  • Performed subnetting of the IP addresses
  • Configuration and allocating IP and network resources to Storage, Virtualization, Server, and Application teams
  • Responsible for design/implementation/maintenance of Site-to-Site VPNs, and remote access VPN's using Cisco solutions (ASA 5520 and 5540), including head-end and remote client-side connections
  • Performed network monitoring using tools like Netcool
  • Log collectors using Splunk
  • SNMP V2C configurations.

Education

Bachelor of Science - Computer and Information Sciences

Mahatma Gandha Kashi Vidyapeeth
06-2014

Skills

  • TECHINCAL SKILLS: -
  • Routers and VoIP Platforms:
  • Cisco Routers series ASR9k, 7300, 4000, 3800, 2000, 1900; Juniper MX, Arista 7000 series
  • Routing Fundamentals and Protocols:
  • RIP, EIGRP, IS-IS, OSPF, BGP, IPX; MPLS, Static Routing, ICMP, ARP, HSRP, VRRP, Route
  • Filtering, Multicast, Policy-Based Routing, Redistribution, Port forwarding Cisco Catalyst switches (6500, 4900, 3750, 3500, 4500, 2900, 6807 series)
  • Switch Platforms:
  • Cisco Catalyst series 2960, series 3560, 3850, 4500, 6500, 7000; Nexus series 2K, 5K, 7K,9k; Juniper EX, QFX, Aruba 2000, 3000 series
  • Switching Fundamentals and Protocols:
  • Ethernet technologies, LAN networks, MAC, VLAN and VTP, STP, PVST, Multicast, RSTP, Multi-Layer Switching, 8021Q, EtherChannel, PAgP, LACP, CDP, HDLC, RARP
  • Firewall Platforms:
  • Checkpoint (NGX R65, 3100, 5100, 5900), Cisco Firewalls (ASA 5505, 5506-X, 5585,ASAv), Fortinet, Palo Alto Networks (PA series 2K, 3K and 5K) with Panorama 80, WAF
  • Security Protocols:
  • Standard and Extended ACLs, IPsec, VPN, Port-security, SSH, SSL, IKE, AAA, Prefix-lists, Zone-Based Firewalls, NAT/PAT, HIPAA standards, Ingress & Egress Firewall Design, Content Filtering, Load Balancing, IDS/IPS, URL Filtering, L2F, IDS, TCP Intercept, Router Security, SNMP 10trap
  • Network Management and Monitoring:
  • Wireshark, Infoblox, HP OpenView, Cisco Prime, Splunk, Security Device Manager (SDM), Cisco Works, TCP Dump and Sniffer; SolarWinds NetFlow Traffic Analyzer, NetScout, Network Performance Monitor (NPM), Network Configuration Manager (NCM), SAM, IP Address Manager, Additional Polling Engine
  • Load Balancers and Proxies:
  • F5 (BIG-IP) LTM 2000, 3900, 6400, 6800, AV 510, Citrix NetScaler, MWG, Zscaler, Proxies, Bluecoat Proxies
  • WAN & SD-WAN Technologies:
  • MPLS, ISP Leased Lines, SONET, Viptella, Versa
  • Wireless and Radius Technologies:
  • Canopy Wireless Devices, Cisco 1200 series APs, Aruba wireless and APs, Cisco Meraki, Linksys Wireless/Wi-Fi Routers, Prime Infrastructure, Ekahau, Air Magnet, AirWatch and WLC’s (8510, 5508, 5706), Cisco Aironet APs (2600, 3600, 3700), ISE, MSE, Aruba 225, Aruba 3000 controller & Airwave, ISE, ClearPass 60,62,65, 80211a, b, c, g, n, ac
  • Other Networking Protocols and Fundamentals:
  • DHCP and DNS server, Active Directory Management, NTP, NDP, TCP, UDP, FCP, Network Implementation, Troubleshooting techniques, NHRP, NetBIOS, NFS, FTP, TFTP, HTTP, PAP, PPTP, SIP Trunking, SNMP logging, SMTP, RADIUS and TACACS, PBX servers, SDN, IPV4, IPv6

Accomplishments

  • CERTIFICATIONS:
  • (CCNA) – Cisco Certified Network Associate
  • (CCNP) – Cisco Certified Network Professional
  • Microsoft Azure Fundamental, Worked with Checkpoint, Cisco ASA, and Palo Alto Networks solutions
  • Experience in HSRP standby troubleshooting & Experience in configuring & upgrading of Cisco IOS
  • Implementing & troubleshooting of T1, MUXES, CSU/DSU and data circuits
  • Experience on designing and troubleshooting of complex BGP and OSPF routing problems, Have sound knowledge of Firewall architecture, routing, and VPN
  • Perform troubleshooting and monitoring of the Linux server on AWS using Zabbix, Nagios and Splunk
  • Have experience working on HP Open view Network Node Manager
  • Upgrade firewalls in accordance with change management & Document changes to firewalls
  • Monitor traffic and access logs to troubleshoot network access issues
  • Have experience with Cisco Works LAN Management Solution
  • Implemented Positive Reinforcement Model with the help of Palo Alto Networks Experience in migration of Frame-relay based branches to MPLS based technology using multi-layer stackable switches like 6500 series and 2800 series routers
  • Testing VPC, BGP, OSPF, EIGRP, RIP, SPAN, Sflow, Vlan Trunking, SVI and power supplies on Nexus and ASR devices
  • Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks
  • Hands-on experience with Cisco 3500, 3750, 4500, 6500 series equipment and configuring and deploying and fixing them with various modules like Gig card, VPN SPA card, WIC card.

Additional Information

  • Experience in Network Security that includes perimeter security for Internet, Extranet, DMZ, Internal Server farms, Web-traffic security with Proxies, Web Application firewalls. Migrated multi-vendor equipment and next generation firewall technologies. Worked on ASA, Firepower, Checkpoint and Palo Alto firewalls. Experience on MWG, Bluecoat and Zscaler proxies. Experience with WAN connectivity, MPLS circuits, leased Lines, Metro Ethernet, Site to Site IPsec tunnels, ISP circuits, Customer Edge configurations. Experience with SD-WAN solutions that include Viptela and Versa. Responsible for developing traffic engineering in Meraki SD-WAN to support intelligent traffic flow across the networks Involved in deployment of Meraki SD-WAN solution across the corporate offices. Working Knowledge and demonstrated experience on the Cisco Juniper, HP Aruba, Avaya, and Arista switches & Routers. Worked on Cisco Catalyst (3550, 3750, 6500) series switches, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers, ASA Firewall (5505/5510), Load Balancers using Cisco ACE, F5 LTM/GTM, Security Device Manager (SDM), Cisco Works, HP OpenView, Solar Winds, Sniffer, Palo Alto Networks Firewall models (PA-2k, PA-3K and PA-5K). Aruba 802.11ac wireless access points deliver superb Wi-Fi performance, Aruba 330 series, 501 wireless client bridge, 7220, 7010 MOBILITY CONTROLLER. Experience and high-level understanding in application delivery controllers, local and global load balancing techniques, redundancy solutions, high availability options for mission critical internal, vendor and public facing applications. Experience with F5 LTM, GTM, APM, NetScaler, Cisco ACE and A10. Performed security operations on ASA firewalls. Support Cloud security and Cyber security controls, including but not limited to security incident and event management (SIEM), malware, intrusion prevention system (IPS), intrusion detection (IDS), TACACS, net flow-based tools, URL filtering, Imperva Web Application firewall (WAF). Configure, Manage and Monitor Palo Alto firewall models (Specifically the PA-5050 and the PA-5260) Design and implement Cisco ACI in datacenters, create a strategy that allows use of containers, cloud orchestration tools for end users and developers. Collaborate with application owners to define dependencies, map dependencies for better application workflow within ACI or public cloud use.

Certification

  • CCNA-Cisco Certified Network Associate.
  • CCNP-Cisco Certified Network Professional.
  • Microsoft Azure Fundamental.

Timeline

Senior Network Engineer

Tango
03.2023 - Current

Network Security Engineer

Cisco
09.2021 - 03.2023

Network Specialist

Mizuho
06.2018 - 08.2021

Network Engineer

IP Infusion INC
03.2017 - 05.2018

Network Engineer

Hutchison Global Services
06.2014 - 02.2017

Bachelor of Science - Computer and Information Sciences

Mahatma Gandha Kashi Vidyapeeth
Chandani Gohil