Summary
Overview
Work History
Education
Timeline
Generic

Praveen Kumar Dantala

Summary


· With over 6 years of experience in telecommunications and networking, I have specialized in medium to large-scale enterprise and data center networks. My skill set includes expertise in switching, routing, network security, application delivery, wireless technologies, VoIP, virtualization, and software-defined networking (SDN).

· Hands-on experience installing, configuring, and maintaining Cisco switches, including 3850, 6500, 6800, 9200, 9300, 9400,9410,9500, and 9600 series in enterprise environments, as well as Nexus3k, 5k, 7k, and 9k in data center environments.

· Proficient in network monitoring using SolarWinds NetFlow Traffic Analyzer, Network Performance Monitor (NPM), Network Configuration Manager (NCM), Cisco Prime, Security Device Manager (SDM), Cisco Works, Infoblox, HP OpenView, and Wireshark.

· Extensive experience with Palo Alto Next-Gen Firewalls (PA-5420, PA-800 series, PA-3200 series, and VM series), managing internal and internet traffic filtering, Panorama (M100 series), and maintaining up to 75 firewalls in large networks. Expertise in SSL forward proxy, URL filtering, and policy management.

· Skilled in using diagnostic tools like Wireshark, TCPDump, SSLDump, firewall session logs, and Splunkfor network and application troubleshooting.

· Experience in Virtual Port Channel (VPC), Virtual Device Context (VDC) technologies, and Gateway redundant protocols like HSRP, VRRP, and GLBP. Well-versed in Access, Distribution, and Core Layer architecture in data centers, as well as Spine-Leaf architecture.

· Extensive knowledge of Cisco ASA 5500Xseries firewalls (5505, 5510, 5512-X) with Firepower modules, Palo Alto firewalls, Panorama, and Check Point firewalls (NG, NGX). Experience converting Check Point VPN rules to Cisco ASA solutions.

· Hands-on experience migrating applications from CIS private cloud to Azure cloud environments.

· Experience configuring F5 LTM (10000 & 20000 series) for corporate applications, high availability, and DMZ/internal network deployments. Expert in LTM, GTM, VIPs, SNAT, SSL offloading, iRules, and iAPPs. Migration experience from ACE to F5.

· Experience in installing, configuring, and troubleshooting Juniper EX switches, including EX9200, EX4600, EX4400, EX4300, EX4100, EX3400, and EX9250 series.

· Experience with Zscaler Internet Security(ZIA) and Zscaler Private Access, including migrating from IronPort to Zscaler ZIA for secure web traffic.

· Experience in installing, configuring, and managing AAA servers (RADIUS, TACACS+), DNS, and DHCP servers, using Infoblox and Active Directory databases.

· Skilled in troubleshooting high-priority network issues and executing Proof of Concepts (PoCs) for installations, migrations, and the adoption of new technologies. Proficient in IDF and MDFarchitecture, data center support roles, iOS upgrades, and migration projects across different vendor equipment.

· Hands-on experience with SCIMprovisioning from Azure AD to Zscaler ZIA for user and group synchronization.

· Expertise in manipulating BGP attributes like Local Preference, MED, Extended Communities, route reflectors, route maps, and implementing route policies.

· Experience with FortiGate appliances, including 3200D, 1500D, and 1200D, running the latest FortiOS 5.2.

· Proficient in configuring and troubleshooting Cisco routers, including ASR 1000, ASR 9000, ISR 4000, and ISR 1000 series.

· Worked on Proof of Concept (PoC) projects involving Cisco ACI and Arista Cloud Vision, with knowledge of Spine-Leaf architecture, EVPN, VXLAN, VTEPs, bridge domains, and MP-BGP.

· In-depth knowledge of OSPF, EIGRP, RIP, and BGP routing protocols. Proficient in Layer 1/Layer 2 troubleshooting in complex environments, MPLS over BGP, and edge router upgrades, including ISP circuit failover.

· Experience with McAfee Web Gateways and Bluecoat proxies for internet traffic filtering, and expertise in configuring IPS sensors and proxies in DMZ and internal networks, including WCCP.

· Experience working with Aruba and Cisco Wireless LAN controllers, configuring and provisioning access points(APs), SSIDs, virtual APs, remote and campus APs, and managing wireless LAN infrastructure with active/active controllers.

· Proficient in network traffic analysis and troubleshooting using tools like ping, traceroute, Gigamon, Wireshark, TCPDump, and Linux servers.

Overview

6
6
years of professional experience

Work History

Senior Network Engineer

Wawa
11.2023 - Current
  • Deploy and maintain SD-WAN solutions, including Cisco ASR routers, Juniper SRX, and Fortinet firewalls
  • Configured and managed Cisco Catalyst 9410 switches, ensuring efficient and scalable network infrastructure for enterprise environments
  • Set up Layer 2 VLANs, inter-VLAN routing, and Layer 3 routing protocols on Cisco Catalyst 9410 switches to optimize network segmentation and routing performance
  • Implemented Stack Wise Virtual and redundant power supplies on Cisco Catalyst 9410 to ensure high availability and continuous operation of the network
  • Successfully implemented and configured Cisco DNA Center for centralized network management and automation, enhancing operational efficiency across multiple sites
  • Collaborated with cross-functional teams to educate and train staff on Cisco DNA Center functionalities, fostering a culture of continuous improvement in network management practices
  • Deployed Versa SD-WAN appliances or virtual instances across multiple branch locations, data centers, and cloud environments
  • Integrated Versa SD-WAN with existing MPLS, Internet, and other transport links to create a hybrid WAN architecture
  • Involved in the deployment of Meraki SD-WAN solutions across corporate offices and implementing traffic engineering in Meraki SD-WAN to support intelligent traffic flow
  • Deploy and manage SD-WAN networks (Cisco Meraki and Viptela solutions) for WAN connectivity, including the rollout of 40 sites in a hub-and-spoke setup
  • Designed and deployed Cisco ACI in a multi-site environment, configuring APIC controllers and fabric switches for application-based network policies and centralized management
  • Integrated Cisco ACI with VMware vSphere for automated network provisioning and management of virtualized workloads, ensuring consistent and secure connectivity
  • Designed and deployed SD-Access solutions using Cisco DNA Center, leveraging policy-based segmentation to enhance network security
  • Configured and tested NAT policies and implemented security measures on Palo Alto firewalls, including migration from Cisco ASA to Palo Alto
  • Implement and maintain Sourcefire IDS/IPS systems and hardened protection standards on firewalls
  • Designed and implemented Palo Alto Networks PA-5k,3k,7k Series NGFWs, configuring advanced security policies and application control features to protect against cyber threats
  • Integrated Palo Alto Networks PA-7050 with LDAP and Active Directory to enforce user-based policies, utilizing user identification features to apply security measures based on user identity
  • Integrated SDN with security tools (e.g., Palo Alto Networks, Fortinet) to enable dynamic and context-aware security policies, enhancing threat detection and mitigation
  • Configured STP on Fortinet Forti Switches to prevent loops and ensure reliable Layer 2 connectivity in enterprise network environments
  • Daily support of F5 environment, including the creation of new VIPs/WIPs and iRules
  • Worked with Load Balancing teams to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers
  • Designed and implemented F5 BIG-IP LTM version 15.x to optimize application delivery and ensure high availability
  • Configured virtual servers, pools, and load balancing algorithms to distribute traffic efficiently across backend servers
  • Implemented F5 AFM version 15.x to enhance network security with advanced firewall capabilities, protecting against network-layer threats such as DDoS attacks and IP spoofing
  • Integrated Citrix NetScaler with Citrix Virtual Apps and Desktops to provide secure and high-performance access to virtualized applications and desktops, improving user experience
  • Integrated Citrix NetScaler with Citrix Virtual Apps and Desktops to provide secure and high-performance access to virtualized applications and desktops, improving user experience
  • Managed and optimized network services using Infoblox for DNS, DHCP, and IP address management (DDI) across a large-scale enterprise environment, resulting in a 30% reduction in IP conflicts and a 25% improvement in service uptime through enhanced automation and monitoring
  • Configured proactive alerting and notification policies within ScienceLogic for performance degradation, downtime, or security incidents
  • Performed network monitoring and analysis using tools like NS3, Wireshark, and SolarWinds
  • Configured SolarWinds NetFlow Traffic Analyzer to analyze network traffic patterns, identify bandwidth utilization trends, and detect potential bottlenecks, enhancing network visibility and performance
  • Developed automation scripts using Python and Cisco ISE’s RESTful APIs to streamline the management of network access policies and device onboarding
  • Configured Cisco ISE to support device administration using TACACS+, providing centralized authentication and authorization for network devices and enhancing administrative control
  • Implemented automation workflows within Cisco DNA Center to streamline network operations and enhance overall efficiency
  • Developed Python scripts to automate network configuration and management tasks, integrating with RESTful APIs of Cisco, Juniper, and Arista network devices to streamline operations and reduce manual effort
  • Utilized Ansible playbooks to automate the deployment and management of network devices, configuring VLANs, interfaces, and routing protocols across multi-vendor environments
  • Automated cloud resource management using Terraform, reducing deployment time by 40% and ensuring consistent configurations across AWS and Azure environments
  • Hands-on experience with AWS, including RDS, EC2, S3, VPC, IAM, security policies, and Cloud Formation
  • Experience in provisioning, configuring, and troubleshooting various AWS cloud services such as EC2, S3, RDS, ELB, and VPC
  • Launched and configured Amazon EC2 Cloud servers using AMI, setting up private networks and sub-networks using VPC
  • Established IPSEC site-to-site VPN tunnels between AWS VPCs and on-prem network devices
  • Worked with AWS IAM to create and manage users and groups and set permissions for AWS resources
  • Designed and implemented Azure Virtual Networks (VNets) to create isolated network environments, configuring subnets, route tables, and network security groups to secure and optimize network connectivity
  • Implemented Azure ExpressRoute to establish dedicated network connections between on-premises data centers and Azure, providing low latency and high bandwidth for critical applications
  • Collaborated with engineering teams to support cloud-native networking in GCP.

Senior Network Security Engineer

Navy Federal Credit Union
01.2023 - 10.2023
  • Implemented Meraki MS Series switches for seamless integration with other Meraki products, configuring VLANs, link aggregation, and QoS policies for efficient network operation
  • Designed and implemented Aruba ClearPass version 6.9 for network access control, enabling dynamic role-based access policies and enhancing overall network security
  • Configured 802.1X authentication and RADIUS-based access policies on Aruba ClearPass, integrating with Aruba 5400R Series switches to enforce user and device identity-based access controls
  • Configured Juniper SRX Series firewalls with Junos OS 20.1, implementing advanced security policies, intrusion prevention, and VPN services for secure network access
  • Deployed Juniper EX Series switches, configuring VLANs, trucking, and spanning tree protocols for efficient and resilient network design
  • Utilized Juniper MX Series routers for high-performance routing and traffic engineering, optimizing network performance and reliability
  • Deployed Arista 7000 Series switches in data center environments, configuring EOS (Extensible Operating System) for high-performance switching and automation
  • Configured advanced RF management features on Cisco Wi-Fi 6 access points to optimize wireless coverage, reduce interference, and improve overall network performance
  • Implemented voice VLANs to isolate VOIP traffic from data traffic, enhancing security and performance for voice communication
  • Configured VOIP monitoring and troubleshooting tools (e.g., Cisco RTMT, SolarWinds VNQM) to track call quality and identify potential issues
  • Configured and deployed Nokia 7750 SR and 7450 ESS switches for a high-availability service provider network, enabling IP/MPLS routing and Ethernet service delivery
  • Experience with Palo Alto and Checkpoint firewalls with next-gen firewall features that include app ID, threat ID, URL filtering, user ID, SSL decryption
  • Implemented Palo Alto 7050 Firewall in HA pairs as an internet firewall, configured rules and zones based on traffic
  • Worked with several network engineers for the understanding of Juniper SRX firewalls along with the changeover to Palo Alto
  • Palo Alto Firewall Management-Panorama
  • Managed network operations across multiple sites using Cisco DNA Center, enabling consistent policy enforcement and streamlined troubleshooting across distributed environments
  • Configured advanced security features on Cisco Catalyst 9410, including 802.1X authentication, Access Control Lists (ACLs), and DHCP snooping to secure network access and prevent unauthorized devices
  • Deployed QoS policies on Cisco Catalyst 9410 switches to prioritize network traffic for latency-sensitive applications such as voice and video
  • Worked extensively in configuring, monitoring, and troubleshooting Cisco's ASA 5500/PIX security appliance, failover DMZ zoning, and configuring VLANs/routing/NAT with the firewalls as per the design
  • Utilized SNMP and Syslog on Cisco ASA to monitor firewall performance and log security events, integrating with SIEM solutions for comprehensive security monitoring
  • Utilized Infoblox Network Insight to discover, map, and inventory network devices and assets, providing visibility into network topology and device configurations
  • Implemented high availability (HA) and disaster recovery (DR) configurations for Infoblox Grid appliances, ensuring continuous availability of DNS, DHCP, and IPAM services
  • Implemented and managed Bluecoat’s DNS, DHCP, and IPAM solutions, improving network visibility and reducing IP conflicts by 30% through centralized management and automation
  • Worked on issues with IPS/IDS servers, Zscaler, and Bluecoat Proxies
  • Deployed Symantec Bluecoat ProxySG appliances for secure web gateway (SWG) solutions, configuring web filtering, threat protection, and SSL inspection to enhance web security
  • Conducted risk assessments and gap analyses to identify security vulnerabilities, threats, and risks to the organization's information assets, prioritizing remediation efforts and implementing controls to mitigate identified risks
  • Established and monitored key performance indicators (KPIs) and metrics to measure the effectiveness and performance of the ISMS, conducting regular internal audits and compliance reviews to ensure adherence to ISO 27001 standards
  • Configured Splunk Enterprise to collect and analyze log data from network devices, providing comprehensive visibility into network operations, security events, and performance metrics
  • Working in identity and access control policy-related technologies such as authentication, authorization, accounting (AAA), and 802.1X
  • Implementation and Configuration (Profiles, iRules) of F5 Big-IP LTM-6400 load balancers
  • Configured and managed APM as an SSL VPN solution for remote management
  • Worked on Zscaler policies, cloud app control policies, advanced threat, malware, and sandbox-based policies
  • Utilized F5 ASM’s automated learning mode to adaptively update security policies based on legitimate traffic patterns, reducing false positives and improving security posture
  • Configured A10 Thunder ADC for advanced load balancing and application delivery, optimizing performance, availability, and security for web applications and services
  • Utilized A10’s SSL/TLS offloading capabilities to reduce the load on application servers, enhancing overall performance and security by centralizing encryption and decryption processes
  • Implemented A10 Thunder TPS for DDoS protection, leveraging advanced threat detection and mitigation technologies to safeguard network and application infrastructure
  • Implementing large data center infrastructures with Cisco ACI, Cisco N9K, N7K, N5K, N3K, Cisco Cat 9500/9300, 6500, 4500/4900, Cisco ISR 4451, Cisco ASR1001
  • Implemented Cisco ACI’s Tenant and VRF (Virtual Routing and Forwarding) features to provide network segmentation and isolation for different business units and applications
  • Deployed Cisco ACI Service Graphs to automate the deployment of network services such as firewalls and load balancers, ensuring efficient and consistent service delivery
  • Deployed and managed Cisco DNA Center for network automation and assurance, streamlining network operations and reducing manual configuration tasks by 35% through automated provisioning and policy enforcement
  • Configured device provisioning and software image management in Cisco DNA Center, automating network device deployment and maintenance tasks
  • Integrated Cisco DNA Center with ITSM platforms (e.g., ServiceNow) to streamline network operations, automating incident and change management processes
  • Configuration management and infrastructure automation tooling – Jenkins, Terraform, Ansible/Tower, Puppet/Chef, vRA/vRO, and other orchestrators and configuration management frameworks
  • Design expertise for the SD-WAN (Versa & Viptela), SD-LAN, and WAN optimization technologies for efficient delivery of application data across LAN and WAN
  • Migration of legacy WAN network to SD-WAN with virtual firewalls on WAN routers
  • Implemented Silver Peak Unity Edge Connect for SD-WAN and WAN optimization, leveraging dynamic path control, application acceleration, and WAN hardening to enhance performance and security
  • Implemented Silver Peak’s WAN hardening features to secure traffic and protect against threats, ensuring robust and reliable connectivity for enterprise applications
  • Migrated to Juniper EX series switches from Cisco 3500, 3700 series and 6500 series switches
  • Worked on setting up Cisco ASR as edge routers
  • Worked on BGP for inter-data center connectivity
  • Configured and managed Access Lists and policy mapping on Juniper routers installed in each branch across all the states
  • Worked on issues with IPS/IDS servers, Zscaler, and Bluecoat Proxies
  • Utilized OSPF sham-link on Cisco ASR 9000 Series to support MPLS VPNs and maintain optimal routing within the network
  • Designed and implemented LAN/WAN architectures to support scalable and resilient network connectivity, utilizing MPLS, Ethernet, and broadband technologies to ensure high performance and reliability
  • Implemented BGP path manipulation techniques such as AS path prepending and MED on Cisco ISR 4451 routers to influence route selection
  • Utilized BGP Flow spec on Juniper SRX Series firewalls to mitigate DDoS attacks by dynamically filtering malicious traffic
  • Utilized OSPF authentication and MD5 hashing on Arista 7050X Series switches to secure routing updates and prevent unauthorized route injections
  • Integrated OSPF with BGP on Cisco Catalyst 6800 Series switches to provide seamless route redistribution and enhanced routing flexibility
  • Deploying AWS Solutions using EC2, S3, EBS, Elastic Load Balancer (ELB), auto-scaling groups, RedShift, and OpsWorks
  • Planning and development of designs for migrating to AWS cloud
  • Utilized AWS CloudWatch and AWS CloudTrail for monitoring and logging network activities, providing visibility into network performance and security events
  • Implemented Google Cloud Interconnect to establish dedicated network connections between on-premises data centers and GCP, ensuring low latency and high performance for critical applications
  • Configured Interconnect with VLAN attachments to extend on-premises networks to the cloud
  • Integrated Python and Ansible automation workflows with monitoring and alerting systems, enabling proactive network management and rapid response to incidents
  • Implemented continuous integration and continuous deployment (CI/CD) pipelines for network automation using Python and Ansible, improving agility and reducing deployment times
  • Automated infrastructure provisioning with Terraform, reducing cloud deployment time by 40% and ensuring consistent configurations across multiple environments
  • Utilized Cisco Clean-Air technology to mitigate RF interference and enhance wireless network reliability, ensuring consistent performance in challenging environments
  • Implemented seamless roaming and fast transition features on Cisco wireless networks to ensure uninterrupted connectivity and optimal performance for mobile users
  • Configured site-to-site and remote access VPNs on Cisco ASA 5525-X, utilizing IPsec and SSL VPN protocols to ensure secure communication
  • Configured IPsec VPN with multi-factor authentication (MFA) on Palo Alto Networks firewalls to enhance access security for remote users
  • Implemented dynamic IPsec VPN with DMVPN (Dynamic Multipoint VPN) on Cisco ISR 4451 routers, providing scalable and flexible connectivity for branch offices
  • Configured Aruba Instant On devices using the mobile app and cloud portal, enabling easy network administration and monitoring from anywhere.

Senior Network Engineer

Prodapt Solutions Pvt Ltd
05.2020 - 07.2022
  • Configured ASR 9K Pairs, including HSRP setup, Bundle Ethernet Configuration, and DHCP profiles
  • Performed regular IOS XE firmware upgrades and troubleshooting on Cisco Catalyst 9410 switches to maintain optimal performance and security standards
  • Automated switch configuration and monitoring for Cisco Catalyst 9410 using tools like Cisco DNA Center and integrated SNMP-based monitoring for real-time insights
  • Experience working with Nexus 7010, 5548, 5596, 2148, and 2248 devices
  • Deployed and decommissioned VLANs on core ASR 9K, Nexus 9K, 7K, 5K, and its downstream devices, also configuring 2k, 3k, and 7k series Routers
  • Served as a subject matter expert (SME) and consultant for communication network and SCADA/RTU implementation across business units
  • Proficiently configured VPC (Virtual Port Channel) and VDC (Virtual Device Context) on Nexus 7010/7018 devices
  • Proficient in configuring and managing networks using Aruba OS 8.X for seamless operations
  • Created documents for various platforms, such as Nexus 7k, ASR9k, and ASR1k, to support new device deployments
  • Managed Cisco 6500 VSS in the Data Center's Distribution layer
  • Managed and configured Aruba Wireless devices and Cisco Access Points
  • Configured and managed F5 ASM (Application Security Manager), including the development of security policies
  • Configured and troubleshooted Juniper EX series switches
  • Integrated and configured Cisco Wireless LAN Controllers (WLC) with Identity Services Engine (ISE) for Dot1x authentication
  • Designed, deployed, and managed Cisco ISE for comprehensive guest access management
  • Oversaw end-to-end communication network design, encompassing wireless, wireline, and optical networks for RTU communications
  • Managed software upgrades on Cisco Wireless LAN Controllers 5508 to enable Wireless Network Access Control integration with Cisco ISE
  • Proficient in providing user support and troubleshooting issues related to Aruba OS 8.X environments
  • Experienced in documenting procedures and guidelines for efficient management of Aruba OS 8.X
  • Implemented Amazon Web Services (AWS) F5 ASM for blockchain cloud application protection
  • Conducted network monitoring and analysis using tools like GNS3, Wireshark, SolarWinds, and more
  • Planned and developed migration designs for transitioning to AWS cloud
  • Managed network redundancy through HSRP, VRRP, and various monitoring tools like Wireshark, SolarWinds, SNMP, Cisco Works, GNS3, and Riverbed
  • Conducted WLAN validation of newly installed APs with NetScout Survey Pro analytical software
  • Effectively addressed security issues by applying ACLs, configuring NAT, and implementing VPN solutions
  • Led the design and implementation/migration from Cisco wireless to Aruba wireless platform
  • Collaborated with energy delivery departments, including Distribution, Transmission, and System Control, to meet communication needs
  • Installed and configured Cisco Catalyst switches (6500,9410,3750, 3550 series) and implemented routing protocols like OSPF, EIGRP, and BGP
  • Proficiently configured, installed, and maintained VeloCloud SDWAN systems at customer offices, remote sites, and data centers
  • Oversaw Business to Business VPN Tunnels, fixed-line connections, and client remote access solutions
  • Handled Blue Coat and IronPort proxy content management, as well as Citrix NetScaler Load Balancing
  • Implemented changes on switches, routers, load balancers (F5 and CSS), and wireless devices as per engineering instructions, troubleshooting any related issues
  • Configured and implemented Cisco Firepower Services for advanced security defenses with Cisco ASA 5500-X
  • Facilitated communication with different customers and IT teams to gather project details
  • Managed various switching tasks like VTP, ISL/802.1q, IP Sec, GRE Tunneling, VLANs, Trunking, Port Security, STP, and RSTP
  • Collaborated with Palo Alto firewalls (PA250, PA4050, PA3020) using Panorama servers to monitor, block, and allow traffic as required
  • Provided technical assistance for LAN/WAN management and resolved complex customer issues
  • Designed and implemented layer 2 security measures, including dedicated VLAN IDs for trunk ports, non-trunking settings for user ports, and port security
  • Demonstrated expertise in ASA Firewalls and Palo Alto Firewalls, implementing security policies with ACLs, Firewalls, IPSEC, SSL VPN, IPS/IDS, and AAA (TACACS+ & RADIUS).

Network Engineer

NCR Corporation India Pvt Ltd
06.2018 - 04.2020
  • Worked on Routing Protocols like OSPF, EIGRP for maintaining the networks using Cisco Routers and redistribution of the networks from EIGRP to OSPF
  • Implemented Cisco Stack wise using up to 4 cisco 3750 switches
  • Responsible for building a new LAN using Cisco routers and layer2 & 3 catalyst switches for the hospital and School Environment and created VLAN’s, Port Security, RPVST+ on the switches
  • Worked on Installing Cisco IP phones and Access points using PoE feature to the layer 3 switches
  • Configure and Support multiple Cisco 5505 ASA (Firewalls) for INTERNET access, Site-to-Site VPN
  • Creating Zone based Firewalls on a router and creating DMZ on Cisco ASA for web and FTP servers
  • Implementation and Configuration of HSRP/VRRP on multilayer switches for first hop redundancy
  • Involved in troubleshooting of DNS, DHCP and IP conflict problems
  • Managed inventory of all network hardware, Management and Monitoring by use of PRTG tool using SNMP v2c protocol
  • Working with security issues like configuring ACL’s, NAT/PAT, VPN on the Routers
  • Experience working on Windows server 2012 with creating Active directory, DHCP and DNS services
  • Used ticketing system to resolve INCIDENTS, CHANGES, TASKS and PROBLEMS
  • Responsible for day-to-day management of Cisco devices, Traffic Management and Monitoring.

Education

Gannon University
Erie, PA
05-2024

Timeline

Senior Network Engineer

Wawa
11.2023 - Current

Senior Network Security Engineer

Navy Federal Credit Union
01.2023 - 10.2023

Senior Network Engineer

Prodapt Solutions Pvt Ltd
05.2020 - 07.2022

Network Engineer

NCR Corporation India Pvt Ltd
06.2018 - 04.2020

Gannon University
Praveen Kumar Dantala