Summary
Overview
Work History
Education
Additional Information
Timeline
Generic

Jaya Tadikonda

Sr Network Engineer

Summary

  • Dedicated and seasoned Network Engineer with 5+ years of comprehensive industry experience, specializing in Routing, Switching, and Firewall.
  • Successfully deployed Palo Alto PA-3200 and PA-7000 series, ensuring advanced security and threat prevention.
  • Managed and configured Cisco Firepower 2100 and 4100 appliances, delivering scalable security solutions for large enterprise networks.
  • Proficient in utilizing Fortinet Firewall features, including logging, reporting, and tools for traffic analysis, with the ability to identify and mitigate network security threats.
  • Configured and upheld Cisco Nexus switches (7k, 5k, 3k series), providing unified fabric and high-density 10 GbE connectivity.
  • Implemented Cisco ACI across various data center environments, integrating security solutions within the ACI fabric to enforce policies.
  • Demonstrated expertise in optimizing network connectivity through the use of SD-WAN (Viptela) technologies.
  • Worked on managing Infoblox IPAM capabilities for centralized IP address management, subnetting, and tracking.
  • Hands-on experience with F5 LTM and GTM series (6400, 6800, 8800) to ensure the availability of corporate applications.
  • Implemented Security Incident and Event Management System (SIEM) using HP ArcSight and Splunk.



Overview

5
5
years of professional experience

Work History

Senior Network Security Engineer

Delta Airlines
Atlanta, GA
05.2023 - Current
  • Collaborate with Juniper routers, such as the Juniper MX series (MX240, MX480, MX960), and Juniper SRX series (SRX300, SRX550)
  • Manage Fortinet firewall configurations and set up FortiGate 3000 devices according to the provided network diagram
  • Ensure failover and redundancy configurations on Viptela for consistent network availability and minimal downtime during link failures
  • Utilize F5’s iApps templates for streamlined application deployment and automation, reducing deployment time and minimizing errors
  • Activate IPv6 support on PA-7000 series, ensuring compatibility with the latest networking standards, and implement threat prevention capabilities for a cloud-based service to offload security processing and reduce latency
  • Deploy automated patch management solutions to maintain the currency of EC2 instances, efficiently manage SSH key pairs, and regulate secure access through Windows password authentication
  • Apply DNS security features in Palo Alto, including DNS Sinkholing and DNS-based threat detection, to safeguard against DNS-related threats and attacks
  • Harness Palo Alto's DNS security features, including DNS Sinkholing and DNS-based threat detection, for protection against DNS-related threats
  • Investigate and troubleshoot internetworking issues, including eBGP/iBGP, OSPF, EIGRP, VPC, OTV, Cisco Fabric Extender (FEX), STP, VLAN, MPLS – VPN, DMVPN
  • Strategize, execute, and oversee SD-WAN solutions using Viptela architecture, encompassing Viptela vEdge
  • Roll out, configure, and manage ACI Multi-site solutions, establishing connections among distributed data centers and interconnecting ACI fabrics across various locations
  • Implement Nexus Fabric Extenders (FEX) in Nexus 9k device series to extend the switch fabric and consolidate ports from multiple access switches, simplifying the data center's complexity
  • Optimize WAN link utilization based on application requirements and network conditions in SD-WAN Viptela traffic engineering and path selection
  • Deploy F5 Viprion with Web Application Firewall (WAF) to strengthen application security and defend against web-based attacks
  • Implement Authentication mechanisms via Palo Alto LDAP and SAML for individual user identification and map network traffic to specific users based on identities, roles, and privileges
  • Enforce security policies and micro-segmentation within the Cisco ACI fabric through Contracts and Filters to control traffic flows and limit unauthorized access
  • Conduct routine security audits and vulnerability assessments using Cisco Firepower appliances to identify and rectify security risks
  • Devise and implement network architectures using Nexus Switches (9k, 5k, 3k, 2k series) for optimal network performance
  • Engage in Panorama’s High Availability (HA) for active-active or active-passive deployments across multiple Panorama instances
  • Oversee the real-time cut-over phase during migration, transitioning traffic from the old PA-5000 series to the new PA-7000 series firewalls with minimal downtime and ensuring a seamless handover
  • Configure, fine-tune, and oversee firewall policies and security profiles in Cisco Firepower appliances to enforce granular access controls and prevent threats
  • Introduce F5 VIPRION 4400 and 4800 series to enhance application delivery, load balancing, and traffic management; configure Local Traffic Manager (LTM) and Global Traffic Manager (GTM) modules on F5 VIPRION
  • Manage and oversee Fortinet’s site-to-site VPNs (IPsec) to connect remote offices and branches, ensuring smooth and encrypted communication
  • Participate in Panorama’s High Availability (HA) for active-active or active-passive deployments across multiple Panorama instances
  • Deploy automated patch management solutions to maintain the currency of EC2 instances, efficiently manage SSH key pairs, and regulate secure access through Windows password authentication
  • Set up failover and redundancy configurations on Viptela to ensure network availability and minimize downtime during link failures
  • Implement Authentication mechanisms using Palo Alto LDAP and SAML for individual user identification and network traffic mapping based on user identities, roles, and privileges
  • Conduct periodic security audits and vulnerability assessments using Cisco Firepower appliances to identify and rectify security risks.

Senior Network Security Engineer

Accenture
10.2021 - 12.2022
  • Implemented and fine-tuned network security protocols in AWS, encompassing AWS WAF, security groups, and network ACLs for safeguarding applications and data
  • Oversaw and administered the infrastructure for network security, including firewalls (IDS/IPS), VPNs, and web application firewalls (WAFs)
  • Centrally supervised multiple Palo Alto firewalls through the Palo Alto Panorama M-500 centralized Management appliances
  • Integrated Palo Alto Networks firewalls seamlessly with Security Information and Event Management (SIEM) systems to conduct centralized log analysis and correlation
  • Addressed issues related to Cisco Meraki MX series, such as AP disconnections and client connectivity problems, in a prompt manner
  • Maintained and supervised real-time logging, alerting, and reporting capabilities on FortiGate3000 and FortiGate5000 series firewalls
  • Configured custom firewall rules and routing policies on FortiGate3000 and FortiGate5000 series devices to manage traffic flow and enhance network performance
  • Executed Dynamic profiling and endpoint compliance checks within Cisco ISE to ensure that devices meet the necessary security standards before being granted network access
  • Actively employed Cisco ACI’s real-time monitoring tools, including APIC and the Cisco ACI Health Score, for the proactive identification and resolution of issues
  • Executed DNS security features in Palo Alto, including DNS Sinkholing and DNS-based threat detection, to fortify protection against DNS-related threats and attacks
  • Operated on various Cisco devices, encompassing routers (ASR 9K, c7609, 7200, ISR3900, 2900) and switches (Nexus 7k/6k/5k/2k, Catalyst 6500, 4500, 3750, 2950 series)
  • Provided support for F5 LTM, configuring and troubleshooting to address level 2 and level 3 customer concerns
  • Collaborated on the implementation and management of iRules on F5 BIG-IP devices, covering models like BIG-IP 5400, 7400, and 10400
  • Assisted in creating Cisco ACI Network Profiles (ANPs), End Point Groups (EPGs), and Contracts for policy-based automation
  • Deployed, configured, and supervised ACI Multi-site solutions for distributed data centers, facilitating the interconnection of ACI fabrics across diverse locations
  • Skillfully managed the migration cut-over phase in real-time, ensuring the smooth transition of traffic from the old PA-5000 series to the new PA-7000 series firewalls with minimal downtime
  • Strategically designed SD-WAN (Viptela & Versa) technologies to enhance efficiency and scalability across Enterprise LAN and WAN environments
  • Configured and optimized routing protocols like BGP and OSPF within SD-WAN VIPTELA while implementing HA solutions to guarantee uninterrupted SD-WAN and minimal downtime
  • Deployed F5 Viprion with Web Application Firewall (WAF) to reinforce application security and counteract web-based attacks
  • Efficiently managed ICE emergency licensing on Pulse Secure for the optimal utilization of emergency licenses
  • Configured distinct firewall rules and routing policies on FortiGate3000 and FortiGate5000 series devices to regulate traffic flow and optimize network performance.

Network Security Engineer

IBM
Hyderabad
08.2018 - 09.2021
  • Implemented solutions for WAN, LAN, VOIP, and security across various industries, including healthcare, retail, manufacturing, and financial services
  • Managed all WAN connectivity for remote offices through the utilization of a global Checkpoint firewall infrastructure
  • Created IPsec VPN configurations tailored to customer requirements, incorporating standard encryption and encapsulation
  • Examined configurations of network devices and provided recommendations for improvements based on industry best practices
  • Diagnosed and resolved issues related to VPN, DHCP, DNS, and Firewall DMZ, ensuring seamless connectivity
  • Installed and configured different routers such as 800, 1600, 2500, and configured Cisco switches like 2960, 3560.

Education

Masters - Cybersecurity and Trusted Systems

Purdue University

Additional Information

CISCO Routing : CISCO 2900, 3600, 3800, 3945, 4500, 7200, 7600 and ASR 1002, 1006

CISCO Switching : CISCO 2900, 2960, 3570, 3750, 4500 and 6500,

Data Centre : Nexus-9K, 7K, 5K, 3K & Arista 7050SX3, Clear Pass 500, 5K, and 25K

Firewall : Palo Alto 7k (7050, 7080), 5k (5060/5050/5020), 4k (4060/4050/4020) and 3k Checkpoint R76/R77 75+ 15000, 21400, 23000

AWS Cloud : EC2, S3, ELB, EBS, RDS, IAM, Cloud Formation, Cloud Watch, Cloud Front, Cloud Trail

F5 Load Balancers : F5 LTM & GTM, F5 BIG-IP LTM 8900, F5 BIG-IP 3900 and 6900




Timeline

Senior Network Security Engineer

Delta Airlines
05.2023 - Current

Senior Network Security Engineer

Accenture
10.2021 - 12.2022

Network Security Engineer

IBM
08.2018 - 09.2021

Masters - Cybersecurity and Trusted Systems

Purdue University
Jaya TadikondaSr Network Engineer