Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Prashanthi Band

Glendale Heights,IL

Summary

Adept Network Engineer with a robust background in designing and optimizing networks for top-tier companies like United Airlines. Excelled in deploying Cisco Meraki solutions and leveraging automation tools like Ansible, showcasing technical proficiency and innovative problem-solving. Demonstrated leadership in transitioning to SD-WAN, enhancing network efficiency by 30%. Renowned for meticulous project management and collaborative teamwork.

Overview

10
10
years of professional experience
1
1
Certification

Work History

Network Engineer

United Airlines
05.2023 - Current
  • Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.).
  • Involved in Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter VLAN routing, LAN security etc.
  • Implemented with Cisco Layer 3 switches 3750, 4500, 6500 in multi VLAN environment with the use of inter-VLAN routing, HSRP, ISL trunk, ether channel.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, EtherChannel implementation on ASR 9Kredundant pair.
  • Implementing the necessary changes such as adding, moving and changing as per the requirements of business lines in a data center environment.
  • Installing, configuring Cisco Catalyst switches 9300, 6500, 3750 & 3550 series, Access control lists, ISDN, ATM, load balancing switches and configured IPX/SPX, HDLC, BGP, EIGRP, OSPF and VRRP on various sites.
  • Setup simplified and traditional VPN communities, and Cisco Any connect.
  • Worked on stacking of the devices based on the network requirement with Cisco Catalyst 9300 series depending on the requirement with a stack count of 8, 6, 2, 3.
  • Configuring HSRP between VLANs, Configuring Ether-Channels and Port Channel on Cisco 9300 catalyst switches
  • Experience with Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater visibility and scalability in a data center environment.
  • Worked with Cisco Channel partners to build practices around Cisco ACI, worked on configuring tenant policies, VXLAN, VTEPS, VNI, Bridge Doamins.
  • Responsible for the secure development lifecycle environment form NX-OS to Application Centric Infrastructure (ACI) in Data center, implemented in the lab environment.
  • Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture.
  • Migrated Nexus 7Ks & Nexus 5Ks to an ACI Fabric consisting of 9336PQ Spines & 9332PQ Leafs in a Datacenter.
  • Configured MPLS CE (Customer edge router) and complete support for MPLS POP & Relate dissues in MP& CG
  • Experience with setting up MPLS Layer 3 VPN ax in data center and also working with BGP WAN towards customer
  • Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs.
  • Worked with implementation of FortiGate secured SD-WAN architecture FortiOS 6.0 in creating efficient routing policies.
  • Deployed Viptela SD-WAN, worked with the team in implementing and designing of SD-WAN infrastructure and providing WAN connectivity across the enterprise.
  • Worked on Cisco ISE deployment which was a replacement for the ACS and provided new long term and short-term guest wireless services for the Port Authority.
  • Serve as technical leadership for Cisco Identity Services (ISE) Security Consulting Services projects. Act as a delivery engineer within our strategic Cisco Identity Services Engine (ISE) specialization team.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.
  • Configured and performed software upgrades on Cisco Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE
  • Worked with Tufin secure change-firewall optimization tool to implement rules.
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.
  • Successfully installed Palo Alto PA-3000/PA-5000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls and implemented Zone Based Firewall and Security Rules on the Palo Alto Firewall. Exposure to wild fire feature of Palo Alto.
  • Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.
  • Configured systems log on the Palo Alto firewall and moved the logs to Splunk.
  • Worked with Palo Alto firewalls PA5050 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.
  • Responsible for Palo Alto and Cisco ASA firewall administration across our global networks Maintenance and configuration of Cisco ASR1000 series
  • Configured L2 and L3 security features on devices
  • Experience with design and implementation of Virtual Switching System (VSS) on 9400 Switches
  • Manage a very large DNS environment using Lucent QIP and manual management of DNS for DMZ/External servers broad Hands on Experience in Inter-VLAN routing, redistribution, access-lists, and dynamic NAT.
  • Configured HSRP and VLAN trunking 802.1Q, VLAN routing on catalyst 9300 switches.
  • Has experience in Bash and Python scripting with focus on DevOps tools, CI/CD and AWS Cloud Architecture and hands-on Engineering.
  • Implemented Cisco Meraki Enterprise Wireless solutions for corporate infrastructures.
  • Deployed Cisco Meraki Enterprise Cloud for Corporate HQ, Co-Locations and 500+ branches with distinct SSIDs
  • Implemented Cisco Meraki Enterprise Cloud Wireless Bridge/Repeater to extend the LAN for multiple buildings.
  • Performed upgrade process for Cisco ISE software from version 1.0.4 to 1.1 ADE-OS, patch management and data backup management.
  • Hands on experience installing and configuring Cisco ISE 1.3 and later upgrading to 1.4.
  • Intensive applications of Network automation tools and testing for network automation and configuration management using Ansible , Python scripting
  • Intensive applications of Network automation tools and testing for network automation and configuration management using Ansible , Python scripting.
  • Configured Solar Winds Orion NPM and used it to monitor traffic on a network.
  • Using Solar Winds to generate reports on WAN utilization.
  • Performing daily monitoring and maintenance of Solar winds Orion software.
  • Install, configure and monitors Solar Winds Orion NPM\NCM and Quality of Experience (QOE).
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience
  • Experience CSM, F5 (LTM) Load balancers to provide efficient switching and routing for local and global traffic.
  • Implemented many numbers of security policy rules and NAT policy rules on Palo Alto, created Zones, Implemented Palo Alto Firewall interface, Palo Alto IDS, and VLAN.
  • Worked on the implementation of VXLAN and MLAG pairing of the switches,was involved in configuring & maintaining F5 DNS (Global traffic Manager)
  • Controller and BigIP -LTM (local traffic manager) for wide area load balancing and global redirection using various load balancing techniques.
  • Involved in network integration and support of load balancers across F5 platforms
  • which includes updating to latest version of Operating system with latest hot fixes along with set up of enterprise manager for monitoring all the devices.
  • Deploying, Scaling and troubleshooting many Datacenters across all of AWS network fabrics.
  • AWS data backup (snapshot, AMI creation) techniques, along with data-at-rest security within AWS.
  • Deploying the code to AWS instances and spin new instance depending on the requirement
  • Designed and implemented remote dial-up solution for clients
  • Installed and configured workstations for IP based LAN’s
  • Worked on Palo-alto Next-Gen PA-5000 Firewalls implementing and managing NAT, IPsec, site-to-site and remote VPNs, advanced inspection, anti-spoofing and AAA policies
  • Implemented Meeting place server 7.0 and integrated with CUCM 8.0 through SIP Trunks.
  • Configured VoIP devices and IP phones such as 7940, 7942, 7960, 7961, 7971G-Ge, 7975G.
  • Implemented VoIP solutions using SIP & H.323 for Cisco routers 2851 and practiced sound knowledge of Avaya VoIP products and BroadSoft phone switches.
  • Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x
  • Upgraded the Firmware and Software on WLC 5508 and all Access Points within the building.
  • Manage deployment and testing of code updates for wireless systems, such as WCS, WiSM, and WLC.
  • Configured and managed with Cisco wireless access points 205 series supporting 802.11 ac
  • Configuring Virtual Device Context in Nexus 7010 and Worked on Network support, implementation related internal projects for establishing connectivity between the various field offices and data centers
  • Coordinated with a team to upgrade network by changing primary routing protocol to OSPF from EIGRP and Participated in the modification of BGP from multiple MPLS powered routers
  • Contributed to implementation and configuration of F5 BIG-IP LTM-6400 load balancers, redistribution into OSPF on the core ASA firewall, Working with Checkpoint Support for resolving escalated issues.
  • Extensive Knowledge in configuring and troubleshooting Secure Web Gateway
  • Expert in configuring, implementing and troubleshooting A10 load balancer in the enterprise network
  • Worked on implementation of the basic F5 ASM, F5 LTM and F5 APM.
  • Test and implement cisco ACI based network infrastructure as open stack underlay network
  • Installed and configured DHCP Client/Server
  • Update customer networks by configuring routers, switches, and incorporate the SDWAN into the network design.
  • Managed the network engineering team for the modification of the global wide area network to support Office 365 and Skype for Business using SDWAN
  • Deployed and configure Cisco Meraki SDWAN at 30 sites globally
  • Configured Bluecoat as a forward proxy for all Web URL Filtering.
  • Worked with F5 Load balancing, IDS/IPS, Bluecoat proxy servers annd Administrating.
  • Drafted and installed Checkpoint Firewall rules, ACL on Bluecoats with regular upgrades on firewalls and Bluecoats.
  • Proficient in Palo Alto Next-Generation Bluecoat web proxy, HP ArcSight, Splunk Enterprise, Wireshark, FireEye, and various internet tools to assist in analysis.
  • Used Bluecoat Proxy SG Appliances to effectively secure Web communications and accelerate the delivery of business applications.
  • ENVIRONMENT: L2 AND L3, VSS, DNS, VPN, CSM, PALO ALTO, VXLAN, MLAG, AWS, VDC, VPC, OTV, MPLS, NEXUS 7K, F5 BGP-IP, Checkpoint Firewall, SPLUNK, Wireshark, FireEye. Bluecoat Proxy, SD-WAN, F5 load balancing, DHCP.

Network Engineer

Apple
10.2020 - 04.2023
  • Configured L2 and L3 security features on devices
  • Experience with design and implementation of Virtual Switching System (VSS) on 9400 Switches
  • Manage a very large DNS environment using Lucent QIP and manual management of DNS for DMZ/External servers broad Hands on Experience in Inter-VLAN routing, redistribution, access-lists, and dynamic NAT.
  • Configured HSRP and VLAN trunking 802.1Q, VLAN routing on catalyst 9300 switches.
  • Has experience in Bash and Python scripting with focus on DevOps tools, CI/CD and AWS Cloud Architecture and hands-on Engineering.
  • Implemented Cisco Meraki Enterprise Wireless solutions for corporate infrastructures.
  • Deployed Cisco Meraki Enterprise Cloud for Corporate HQ, Co-Locations and 500+ branches with distinct SSIDs
  • Implemented Cisco Meraki Enterprise Cloud Wireless Bridge/Repeater to extend the LAN for multiple buildings.
  • Performed upgrade process for Cisco ISE software from version 1.0.4 to 1.1 ADE-OS, patch management and data backup management.
  • Hands on experience installing and configuring Cisco ISE 1.3 and later upgrading to 1.4.
  • Intensive applications of Network automation tools and testing for network automation and configuration management using Ansible , Python scripting
  • Intensive applications of Network automation tools and testing for network automation and configuration management using Ansible , Python scripting.
  • Configured Solar Winds Orion NPM and used it to monitor traffic on a network.
  • Using Solar Winds to generate reports on WAN utilization.
  • Performing daily monitoring and maintenance of Solar winds Orion software.
  • Install, configure and monitors Solar Winds Orion NPM\NCM and Quality of Experience (QOE).
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience
  • Experience CSM, F5 (LTM) Load balancers to provide efficient switching and routing for local and global traffic.
  • Implemented many numbers of security policy rules and NAT policy rules on Palo Alto, created Zones, Implemented Palo Alto Firewall interface, Palo Alto IDS, and VLAN.
  • Worked on the implementation of VXLAN and MLAG pairing of the switches,was involved in configuring & maintaining F5 DNS (Global traffic Manager)
  • Controller and BigIP -LTM (local traffic manager) for wide area load balancing and global redirection using various load balancing techniques.
  • Involved in network integration and support of load balancers across F5 platforms
  • which includes updating to latest version of Operating system with latest hot fixes along with set up of enterprise manager for monitoring all the devices.
  • Deploying, Scaling and troubleshooting many Datacenters across all of AWS network fabrics.
  • AWS data backup (snapshot, AMI creation) techniques, along with data-at-rest security within AWS.
  • Deploying the code to AWS instances and spin new instance depending on the requirement
  • Designed and implemented remote dial-up solution for clients
  • Installed and configured workstations for IP based LAN’s
  • Worked on Palo-alto Next-Gen PA-5000 Firewalls implementing and managing NAT, IPsec, site-to-site and remote VPNs, advanced inspection, anti-spoofing and AAA policies
  • Implemented Meeting place server 7.0 and integrated with CUCM 8.0 through SIP Trunks.
  • Configured VoIP devices and IP phones such as 7940, 7942, 7960, 7961, 7971G-Ge, 7975G.
  • Implemented VoIP solutions using SIP & H.323 for Cisco routers 2851 and practiced sound knowledge of Avaya VoIP products and BroadSoft phone switches.
  • Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x
  • Upgraded the Firmware and Software on WLC 5508 and all Access Points within the building.
  • Manage deployment and testing of code updates for wireless systems, such as WCS, WiSM, and WLC.
  • Configured and managed with Cisco wireless access points 205 series supporting 802.11 ac
  • Configuring Virtual Device Context in Nexus 7010 and Worked on Network support, implementation related internal projects for establishing connectivity between the various field offices and data centers
  • Coordinated with a team to upgrade network by changing primary routing protocol to OSPF from EIGRP and Participated in the modification of BGP from multiple MPLS powered routers
  • Contributed to implementation and configuration of F5 BIG-IP LTM-6400 load balancers, redistribution into OSPF on the core ASA firewall, Working with Checkpoint Support for resolving escalated issues.
  • Extensive Knowledge in configuring and troubleshooting Secure Web Gateway
  • Expert in configuring, implementing and troubleshooting A10 load balancer in the enterprise network
  • Worked on implementation of the basic F5 ASM, F5 LTM and F5 APM.
  • Test and implement cisco ACI based network infrastructure as open stack underlay network
  • Installed and configured DHCP Client/Server
  • Update customer networks by configuring routers, switches, and incorporate the SDWAN into the network design.
  • Managed the network engineering team for the modification of the global wide area network to support Office 365 and Skype for Business using SDWAN
  • Deployed and configure Cisco Meraki SDWAN at 30 sites globally
  • Configured Bluecoat as a forward proxy for all Web URL Filtering.
  • Worked with F5 Load balancing, IDS/IPS, Bluecoat proxy servers annd Administrating.
  • Drafted and installed Checkpoint Firewall rules, ACL on Bluecoats with regular upgrades on firewalls and Bluecoats.
  • Proficient in Palo Alto Next-Generation Bluecoat web proxy, HP ArcSight, Splunk Enterprise, Wireshark, FireEye, and various internet tools to assist in analysis.
  • Used Bluecoat Proxy SG Appliances to effectively secure Web communications and accelerate the delivery of business applications.
  • ENVIRONMENT: L2 AND L3, VSS, DNS, VPN, CSM, PALO ALTO, VXLAN, MLAG, AWS, VDC, VPC, OTV, MPLS, NEXUS 7K, F5 BGP-IP, Checkpoint Firewall, SPLUNK, Wireshark, FireEye. Bluecoat Proxy, SD-WAN, F5 load balancing, DHCP.

Network Engineer

WellPoint
08.2016 - 09.2020
  • Recommended Security considerations for the Intranet data center, integrating security, providing solution design details and configuration details Developed Automated reports from shell script as per Client requirement.
  • Manage a very large DNS environment using Lucent QIP and manual management of DNS for DMZ/External servers broad Hands on Experience in Inter-VLAN routing, redistribution, access-lists and dynamic NAT
  • Defining the application security class in the associate that to the local traffic pool in ASM, APM.
  • Experience deploying ACI in Network-Centric model, Data center Architecture; SDN/ACI.
  • Installation, configuration and OS upgrade of Sun Solaris 8, 9, 10 and Red hat Linux.
  • We used Unix/Linux shell environment. Typically, in Unix we create "bash" shell scripts, but I can also create shell scripts using python, and it's simple. We have named shell scripts with the .sh extension and run as any bash shell script.
  • Scripting for automation of processes for Windows Servers. Familiarity with main script languages like Power Shell, PHP, Shell, Perl, Python.
  • Developed a python script, which will parse all trace files and calculate throughput, latency and drop rate
  • Experience in Openstack Liberty environments in volume management using network and port management using Neutron and image management using Glance.
  • Implemented, analyzed and recommended appropriate system for the out of band management monitoring. utilizing Solarwinds for primary and disaster recovery site.
  • Monitored and responded to network anomalies utilizing Solarwinds/Orion's software and recommended appropriate network solutions for issues.
  • Hands on experience in deployment of projects for network monitoring software like Solarwinds and Whatsapp Gold.
  • Maintained, and expanded current Solarwinds deployment
  • Worked with the Network planning team on IP allocation scheme for the routers, switches, workstations, phones, APs and various other devices in the c us environment. Used Infoblox, Net MRI, Solarwind IP monitor and various tools.
  • Upgraded IOS, and Junos images on Cisco and Juniper Devices. Build Clusters on SRX240, EX4200, 4500 Juniper series and Cisco 3750 switches.
  • Experience with working on firewalls like CISCO ASA 5500 series (5510,5540), JUNIPER SRX series and also PALO ALTO (pa-3060, pa-5060), etc.,
  • Experience with working on Juniper switches like ex2200, ex2500
  • Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
  • Configured VLAN, Spanning tree, VSTP, SNMP on Juniper EX series switches.
  • Designed and implemented remote dial up solution for clients. Blue Coat Admin Experience.
  • Increasing business speed, agility, and efficiency by taking charge of core network and security using Infoblox.
  • Created many security policies depends on the requirement using Deployment wizard in ASM.
  • Worked on implementing 802.1X through cisco ACS and ISE. Migrated policies from ACS to ISE. Implemented end point security for wired and wireless users using certificate based and MAC bases authentication.
  • Worked with Juniper SRX550 and Palo-alto Next-Gen PA-5000 Firewalls implementing and managing NAT, IPsec, site-to-site and remote VPNs, advanced inspection, anti-spoofing and AAA policies.
  • Implemented VoIP solutions using SIP & H.323 for Cisco routers 2851 and practiced sound knowledge of Avaya VoIP products. Design and Architecture of F5 LTM, GTM, APM, ASM and application delivery network.
  • Securing the applications from threats by offloading the SSL in ASM.

Network Support Engineer

DVR
06.2014 - 07.2016
  • Configuring and troubleshooting multi-customer network environment.
  • Involved in network monitoring, alarm notification, and acknowledgment.
  • Implementing new/changing existing data networks for various projects as per the requirement.
  • Troubleshooting complex networks layer 1, 2to layer 3 (routing with MPLS, BGP, EIGRP, OSPF protocols) technical issues.
  • Performing troubleshooting for IOS related bugs by analyzing history and related notes.
  • Carrying out the documentation for tracking network issue symptoms and large-scale technical escalations.
  • Managing the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and providing all-around technical support.
  • Worked with scripting Automation for JavaScript, Linux/Unix toolbox, Python, Perl, Bash, ESX, VMware Virtual Switch with Design/Implementation
  • Monitor the traffic of the network via NTA and IPAM
  • Provided Technical Support to customers and partners on Palo Alto security appliances
  • Commissioning and Decommissioning of the MPLS circuits for various field offices.
  • Preparing feasibility report for various upgrades and installations.
  • Ensure Network, system and data availability and integrity through preventive maintenance and upgrade.
  • Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, Inter-VLAN routing, LAN security.
  • Worked on the security levels with RADIUS, TACACS+.
  • Completed service requests (i.e. – IP readdressing, bandwidth upgrades, IOS/platform upgrades, etc.)
  • Identify, design and implement flexible, responsive, and secure technology services
  • Created scripts to monitor CPU/Memory on various low-end routers in the network.
  • Installed and maintained local printer as well as network printers.
  • Handled installation of Windows NT Server and Windows NT Workstations.
  • Environment: MPLS, BGP, EIGRP, OSPF, NTA, IPAM, VLAN, Port Security, Trunking, LAN, RADIUS, TACACS+, LAN, WAN, MPLS, Solar Winds.

Education

Bachelor of Science - Computer Science

JNTU
Hyderbad-India
06-2013

Skills

  • Routing protocols RIP, EIGRP, IS-IS, OSPF, BGP, IPX; MPLS, IPv4 and IPv6 addressing, subnetting, VLSM, Static routing, ICMP, ARP, HSRP, VRRP, Route Filtering, Multicast, 80211, Policy Based Routing, Redistribution, Port forwarding
  • Switch Platforms :Cisco Catalyst series 2960, series 3560, 3850, 4500, 6500, 7000, 9000; Nexus 9k
  • Firewall Platforms: Juniper Net screen 6500, 6000, 5400, Juniper SSG, SRX5600, SRX5800, Checkpoint (NGX R65, 3100, 5100, 5900), Cisco Firewalls (ASA 5505, 5506-X, 5585), Netgear Firewall, Fortinet, Palo Alto Networks (PA series 2K, 3K and 5K), WAF, ACI
  • Security Protocols : Standard and Extended ACLs, IPsec, VPN, Port-Security, SSH, SSL, IKE, AAA, Prefix-lists, Zone-Based Firewalls, NAT/PAT, HIPAA standards, Ingress & Egress Firewall Design, Content Filtering, Load Balancing, IDS/IPS, Blue Coat URL Filtering, L2F, IDS, TCP Intercept, Router Security, SNMP trap
  • Network Management and Monitoring Wireshark, Infoblox, HP OpenView, Cisco Prime, Security Device Manager (SDM), CiscoWorks; TCP Dump and Sniffer; SolarWinds NetFlow Traffic Analyzer, Network Performance Monitor (NPM), Network Configuration Manager (NCM), SevOne, SiteScope
  • Load Balancers F5 (BIG-IP) LTM 2000, 3900, 6400, 6800, AV 510, ASM, Citrix NetScaler, APM
  • Cloud Computing and Automation AWS, Microsoft Azure, Cisco Meraki, C, Python scripting, Shell, Cloud Migration
  • DHCP and DNS server, Shell, Active Directory Management, NTP, NDP, TCP, UDP, FCP, Network Implementation, Troubleshooting techniques, NHRP, NetBIOS, NFS, FTP, TFTP, HTTP, PAP, PPTP, SIP Trunking, SNMP logging, SMTP, RADIUS and TACAS
  • Operating Systems Windows, MAC OS, Windows Server, Nexus OS, Cisco IOS-XR, Linux, UNIX
  • Wireless Technologies CISCOseries APs, Aruba wireless and APs, Cisco Meraki, Wireless/Wi-Fi Routers
  • Microsoft Office Visio, Excel, PowerPoint, Word
  • Change Management ServiceNow

Certification

  • Cisco Certified Network Associate (CCNA)
  • Cisco Certified Network Professional (CCNP)
  • Palo Alto Networks Certified Network Security Administrator (PCNSA)
  • Tufin Certified Security Expert (TCSE)

Timeline

Network Engineer

United Airlines
05.2023 - Current

Network Engineer

Apple
10.2020 - 04.2023

Network Engineer

WellPoint
08.2016 - 09.2020

Network Support Engineer

DVR
06.2014 - 07.2016

Bachelor of Science - Computer Science

JNTU
Prashanthi Band