PROFISSIONAL EXPERIENCE : Enterprise Sr Network Engineer having worked in projects that include Data Center refresh, Campus Redevelopment, Firewall and F5 Installations, with 9 years of experience in routing, switching, Network Security, Next-Gen Firewalls, Load Balancers, Wireless and VOIP systems design, administration and troubleshooting. Excellent communication skills with the ability to interface at all levels. A proactive team player who can also work independently. Resourceful network engineer with several years of on-site network management and support services experience. Develops and implements initiatives to foster corporate objectives. Proven history of providing supplemental and total management support for it systems. Successful establishing and maintaining networks and servers with strong aptitude for identifying solutions to solve client challenges.
Overview
10
10
years of professional experience
1
1
Certification
Work History
Network Engineer
State of Michigan
Lansing, MI
03.2021 - Current
Migration of ASA firewalls to PA next gen Firewalls using migration tool in PA
Migrated all IPSEC tunnels, ACL’s, NAT
rules and policies
Palo Alto design and installation (Application and URL filtering, SSL decryption, SSL Forward Proxy)
Configured and
maintained IPSEC and SSL VPNs on Palo Alto Firewalls
Successfully installed PA-5000 series firewalls in Data Center as
perimeter Firewalls
Spec, design & configure all Fortinet firewalls
Experience working on Cisco ASR 9K, Nexus 7k & 9K
Configured and designed OSPF, EIGRP and BGP at Distribution
and Core layers
Configured OTV layer 2 connection between Data centers on Nexus
Experience with configuring BGP, OSPF in Juniper M and MX series routers
Worked on several BGP attributes like MED
AS-PATH and Local Preference for route optimization
Worked on Route-Reflector, Route-Redistribution among routing
protocols
Experience with Juniper devices - EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240
Managed AD Domain Controller, DNS and DHCP Servers and configurations
Worked on Cisco ISE for user Authentication, Security Group Tags, MAC based authentication for Wireless and Wired users,1X, EAP, PEAP etc
Worked on Juniper M, MX, T routers on MPLS VPNs, TE and other advanced service provider technologies
Troubleshooting of Linux & Unix application delivery servers
Install Dockers, Cisco and HP servers
Maintain shell scripts for RedHat Linux servers and perform patch upgrades for RedHat Linux servers
Provides expert level security & networking knowledge in the planning, researching, designing, and testing of new technologies
for perimeter firewall security, Intrusion Prevention/Protection System (IPS), DNS, DMZ, and Internet Security in
support of established Info Security program initiatives for the next 3 years
Experience in deployment of network monitoring software - SolarWinds and What’sUp Gold
Worked on Orion (Solar
Winds) for mapping network diagrams with commissioned & decommissioned network devices
Configured, troubleshot, and upgraded Checkpoint Firewalls for Manage clients, which included network and/or resource
access, software, or hardware problems
Implemented Citrix Access Gateway & Advance Access Control, web interface into Microsoft Share point portal
Use Aruba Software to manage and Monitor multi sites wireless networking
Responsible for the IPAM (IP Address management) system for a very large WAN/LAN network (QIP) using Solar winds
IPAM and Infoblox DNS and DHCP servers
Experience with DHCP scopes, IP reservations, DNS host entries, pointers,
delegations, Zones, DNS Sec etc
Migration of legacy WAN network to SD-WAN with virtual firewalls on WAN routers
Migration of the company’s 200 sites from legacy hub and spoke legacy WAN network to SD-WAN in order to support a star
topology with virtual firewalls at the remote sites
Technologies we deal with on a daily basis for our many clients are of VMware 5-6.5, VMware View, HP Thin client PC's &
laptops, Microsoft RD Gateway, Microsoft server 2008-2016, SQL server 2008-2012, Fortinet firewalls, Meraki firewalls
Meraki Wi-Fi, Sonic wall firewalls, Citrix XenApp 7.12-7.15, Net scalers VPX 200 versions 10-12 and AWS cloud
environments
Santosh Thanyyala
Phone: +1(216)-600-8360
Email:thanyyalas@gmail.com
Opened, resolved, or updated Tier II Support tickets for Manage Firewall clients
Analyze and provide courses of action on current as well as emerging security threats like ransomware attacks by research
and recommendation of other security solutions to help mitigate network security threats while preventing their outbreak
across the network
Worked on network design improvements using BGP, EIGRP, OSPF, IP metric tweaking and load balancing
This includes dual, separate provider Internet access points, and HA configurations of Fortinet Firewalls that utilize Site to Site
VPN technologies for remote access to the core networks at each remote location
Managed syslog, Solarwinds on various network equipment to monitor, alert, and save network configurations
Worked with the Network planning team on IP allocation scheme for the routers, switches, workstations, phones, APs and
various other devices
Used Infoblox, Net MRI, Solarwinds IP monitor and various tools
Designed perimeter security policy, Implemented Firewall ACL's, allowed access to specified services, Configured Client VPN
technologies including Cisco's VPN client via IPSEC
Worked on Autopilot, an Automation tool used for code upgrades & configuring new devices at data centers
Migration of Palo Alto PA-500, PA-3060, PA-5060, PA-7050, PA-7080 from Cisco PIX and ASA
Worked on BGP routing protocol, configuring BGP sessions and troubleshooting on Nexus 1K, 5K, 7K, Juniper MX-960
routers and cisco ASR routers
The systems I am responsible for and are proficient in include: Citrix XenApp 4 to 7.13, Xen desk top 5.6 to 7.x, Xen server 6
Citrix Net scaler VPX200 & 8500 pair, VMware 5.5, Server 2008 & 2012, DNS, DHCP, SNMP, routing
protocols(BGP&OSPF), Fortinet Firewalls configuration, trouble shooting and all SSL& IPsec VPN tunnels, FortiClient server
Forti Analyzer 1000D and Multiple Forti manager servers to manage 140 firewalls across 3 states
Other applications include
Microsoft AD 2003/2008, Exchange 2010, Microsoft SQL 2005/2008, Cisco switches/routers, also ADP PC Payroll system
support
Santosh Thanyyala
Phone: +1(216)-600-8360
Email:thanyyalas@gmail.com
Installed and configured LAN/WAN Networks, Hardware, Software, and Telecommunication services- Cisco Routers and
Switches like Cisco 3750, 3750 Gig, 6500, Nexus 7k, ASR 9k etc
Migration from NetScaler’s to F5 without any downtime
Documentation of various changes made on devices and submit them for approvals and work along with alerts team and
intimate them the changes to be made
Worked on migration - XenApp 4.5 to XenApp 6.5 - Server 2003 (Legacy) to 2008 R2 (Gen 2) environment
Managed Cisco Voice Mail Unity servers
Worked in Cisco Routing & switching background w/QOS
Implementing IPv6 addressing scheme for routing protocols, VLANS, subnetting and mostly during up gradation of cisco ISR
routers2800/2900/3800/3900 and switches
Worked on service now tickets
on Network issues in data center and Enterprise
Upgradation of IOS for various equipment on a timely basis
Key Responsibilities:
Configuring High Availability using Cluster XL on Checkpoint as well as VRRP and monitor the Sync status for tasteful
replication of traffic between active and standby member
Enterprise and Public Safety Wireless LAN/WAN (802.11, Mesh)
I have developed a seamless failover solution for our remote offices with the Fortinet firewalls for a fraction of the cost of using
Cisco
This was at the request of our board, especially after a few rough and stormy years here in the northeast
Configuration and administration of firewalls, which includes Checkpoint, Juniper, and Cisco ASA
Configured & maintained IPSEC and SSL VPN's, implemented Zone Based Firewall and Security Rules on the Palo Alto
Firewall
Exposure to wildfire is a feature of Palo Alto
Administered Cisco AMP endpoint security infrastructure and monitored endpoints for threats
Configuration and Maintenance of Cisco ASA 5580-20, ASA 5540, ASA 5520, ASA 5510 firewalls
Researched, designed, and replaced Checkpoint firewall architecture with new next generation Palo Alto PA3000 and PA5000
appliances serving as firewalls and URL and application inspection
Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama
Monitoring Traffic and Connections in Checkpoint and ASA Firewall
Provided tier 3 support for Check Point and Cisco ASA
Firewalls to support customers, Backup and restore Firewall policies
Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls
Follow information security policies, methods, standards, NIST standards, and practices to organize information systems, IT
reference material, and interpret regulations
Monitor Intrusion Detection Systems (IDS) console for active alerts and determine priority of response
Configure and Monitor
Cisco Sourcefire IPS for alerts
Manage and maintain Fortinet Firewalls through IPv4 policies, traffic shaping, IPS, web filtering, interfaces, and routing
Creating objects, groups, updating access-lists on Check Point, apply static, hide NAT with smart dashboard
Santosh Thanyyala
Phone: +1(216)-600-8360
Email:thanyyalas@gmail.com
Installed and configured high availability Big IP F5 LTM and GTM load balancers like 6600, 6800 to provide uninterrupted
service to customer applications and monitoring the availability
Provided support for network topologies & connections TCP/IP, ATM, VOIP(Voice-over-IP) and MPLS
Performs router configurations on Dedicated Internet Access (DIA) and VOIP(Voice-over-IP) products
Supported telephony specialist in the phased migration from PBX based systems to VOIP(Voice-over-IP)
Create private VLANs, prevent VLAN hopping attacks, mitigate spoofing with snooping & IP source guard
Installed & configured Cisco PIX 535 series firewall and configured remote access IPSEC VPN
Worked on Cisco routers 7200, 3700 and Cisco switches 4900, 2900
Key contributions include troubleshooting of complex LAN/WAN infrastructure that include configuring firewall logging
DMZs, related security policies, monitoring, documentation and change control
Enabled STP enhancements to speed up network convergence using Port-fast, Uplink-fast and backbone-fast
Installation & configuration of Cisco VPN concentrator 3060 for VPN tunnel with Cisco VPN hardware & software client
and PIX firewall
Documenting and Log analyzing the Cisco PIX series firewall
Troubleshooting of DNS, DHCP and other IP conflict problems
Used various sniffing tools like Wire-shark
Hands on experience working with security issues like applying ACL’s, configuring NAT and VPN
Troubleshoot problems on a day-to-day basis & provide solution for problems within their Network
Configured SITE-TO-SITE VPN on Cisco routers between headquarters and branch locations
Implemented the security architecture for highly complex transport & application architectures addressing well known
vulnerabilities and using access control lists on their core & failover firewalls
Part of Network Operation Center NOC offshore support team from India supporting HP Data Center 24x7
L2 supports
Cisco PIX and ASA Firewalls
Selected and deployed enterprise UTM firewall (Fortinet) for two primary sites and 20 remote sites
Perform daily maintenance, troubleshooting, configuration, and installation of all network components
Assisted in troubleshooting LAN connectivity and hardware issues in the network of 100 hosts
Troubleshoot and support Cisco Core, Distribution and Access layer routers and switches
Managed the IP address space using subnets and variable length subnet masks (VLSM)
Point-to-Point, Frame Relay, T3, ATM, WAN, Active Directory, DNS, and DHCP troubleshooting
Configured BGP for CE to PE route advertisement inside the lab environment
Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP
Configuration of CISCO Routers (2600, 2800 Series) and 3550, 4500 series switches
Creating groups, users and policies in Active Directory
Switches and Extreme network switches in Campus Environments and Nexus 2k, 3k, 5k, 7k and 9k in Data Center
Environment
Configuring Cisco Catalyst Switches for Dot1x support testing the IOS compatibility with cisco ISE
I worked strongly on Juniper Platform QFX, EX, MX services devices (Installation, Upgrade, Migration, and Troubleshooting
on these platforms)
Configured F5 load balancer and Citrix NetScaler to monitor the network, load balancing and GLBP, creating a site for web
interface for the internal clients
Experience working in complex environments which include Switching, Routing, Network
security with perimeter & VPN firewalls, F5 Load balancing & Access policy management, and Wireless LAN Controllers
Experience with setting up AWS direct connect to amazon S3, Amazon EC2, Amazon VPC
Experience working on Security groups in AWS in YPC for traffic flowing between various virtual nets for dev, prod and uat
instances
Worked on traffic flows from on premises to AWS, AWS to internet via virtual palo alto firewalls for services that include
PAAS and IAAS
Experienced in routing - OSPF, MPLS
Switching - VLAN, FHRP, VPC, Fabricpath, STP, and port-channel
Experienced working in complex environments which include Switching, Routing, Network security with perimeter & VPN
firewalls, F5 Load balancing & Access policy management, and Wireless LAN Controllers
Expertise in installing, configuring and troubleshooting Juniper EX Switches (EX2200, EX2500, EX3200, EX4200
EX4500, EX8200 series)
Experience in OSPF, EIGRP, RIP and BGP routing protocols
L1/L2 troubleshooting skills in Routing in complex
environments
Worked with MPLS over BGP
Worked on upgrading Edge routers, failing over ISP circuits for maintenance
Knowledge of EVPN, VXLAN, VTEPS
Experience with Cisco ACI
Configured F5 LTM, series 5000 series for corporate applications and high availability
Implemented LTM and GTM in
DMZ and Internal network
Worked on software versions up to 12.1.2
Experience with upgrading software and hotfix
Experience with APM and ASM modules
Experience in VSS, VRF, VPC, and VDC technologies
Experience in Gateway redundant protocols HSRP, VRRP, and GLBP
Experience with Access, Distribution & Core Layer Architecture
Expertise in installing, configuring, and troubleshooting of Cisco Routers (4000,3800, 3600, 2800, 2600, 1800, 1700, 800, ASR) and Juniper Routers (E, J, M, and T-series)
Worked on APM module integration with RADIUS server & RSA secure ID for 2-factor authentication
Design expertise for the SD-WAN (Versa & Viptela), SD-LAN and WAN optimization technologies for efficient delivery of
the application data across LAN and WAN
Experience with manipulating various BGP attributes such as Local Preference, MED, Extended Communities, Route-
Reflector clusters, Route-maps and route policy implementation
Extensive Knowledge on the implementation of Cisco ASA 5500 series firewalls - 5505, 5510, 5512-X with Firepower module
Palo Alto firewall policies, panorama and Checkpoint firewalls NG, NGX
Experience with converting Checkpoint VPN rules
over to the Cisco ASA solution
Santosh Thanyyala
Phone: +1(216)-600-8360
Email:thanyyalas@gmail.com
Experience with Bluecoat and McAfee Web Gateway Proxies for URL filtering and SSL Decryption, traffic flows from trust
to untrusty and vice versa
Experience with next gen firewall technology like URL Filtering, SSL Forward Proxy, APP ID, Threat ID etc
On Palo Alto
and checkpoint firewalls
Experience with PA 200, 500, 3020 and VM series firewalls for both Internet and internal traffic filtering
Experience
with Panorama M100 series and maintaining up to 23 firewalls in large networks
Experience working with Aruba & Cisco Wireless LAN controllers, Configuring & Provisioning AP’s, Virtual AP’s, RTLS
Wireless SSID’s, remote & campus AP’s, upgrading WLC, worked in Active/Active Local Controllers and Master controller