Manish Reddy - Senior Cloud Network Engineer |
[email protected] |
Location: Remote, Remote, USA |
Relocation: |
Visa: |
Manish Reddy
CISCO Certified Cloud Network Engineer Phone: (678)249-9158 Email: [email protected] PROFESSIONAL SUMMARY: Senior Network Engineer experience designing and managing enterprise, Data Center, and hybrid cloud networks. Skilled in Cisco routing/switching (Catalyst, Nexus, ISR), BGP, OSPF, EIGRP, and SD-WAN solutions (Viptela, Meraki, Versa). Proficient in firewall technologies (Palo Alto, FortiGate, ASA/FTD), Zscaler ZIA/ZPA, Cisco ISE, and Aruba ClearPass. Experienced in cloud networking across AWS, Azure, and GCP, with strong automation skills in Python, Ansible, and Terraform. Proven ability to deploy ACI, DNAC, and secure wireless solutions using Ekahau Pro, with end-to-end visibility via SolarWinds and Splunk. Hands-on experience in designing, integrating, deploying, maintaining and supporting broad range of Network and security infrastructure. Strong hands-on experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 9K,7K, 5K,2K series, Cisco router models like 7200, 4400, 3900, 3800, 2900, 2800, 1900, 1800 series and Cisco catalyst 6500,4500, 3750, 3500, 2900 series switches, WLC s, WAP s, Proxies. V Experienced in Deploying Wireless Network Infrastructure and Wireless Survey Best Practices. Experience with Cisco wireless solutions including 2504, 5508, 5520, 8500 WLCs. In-depth knowledge and hands-on experience with Zscaler's cloud-native security solutions, including ZPA, ZIA, and ZZZ. Strong troubleshooting skills using Packet capture in Cisco devices and FW monitor and TCP dump in Checkpoint devices and analyzing them in Wireshark & NetScout. Experience in configuring and Troubleshooting BIG-IP F5 load balancer LTM & GTM. Experience in Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480). Demonstrated experience in developing, implementing, auditing Checkpoint firewall (R77.30) configurations and analyzing, optimizing rule sets. Complete understanding of basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 load balancer and general troubleshooting of the F5 load balancers. Deployed Cisco ACI with APICs and spine and leaf topology; configured bridge domains, contracts, filters, L3Outs, and micro-segmentation; enabled integration with VMware vCenter and L4-L7 service graphs for traffic redirection. Installed and implemented & troubleshoot the Network Virtualization through VM Ware and NSX. Configure, Manage, Analyze, and Optimize Network Performance, Traffic, SD-WAN, VPNs, Security, Firewalls, & Policies Experience with converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Palo Alto rules. Experience in provisioning, configuring and troubleshooting various AWS cloud services such as EC2, S3, RDS, ELB (Load Balancers), ASG, SNS, VPC, Route53, Application discovery service, Security Groups, IAM, Cloud Watch, Cloud Front, Cloud Trail, Cloud Formation Templates, Ops Work. Experience with AWS Cloud Formation and Terraform & Packer to create IAC. Launched and configured the Amazon EC2 Cloud servers using AMI. Involved in setting up private networks and sub-networks using Virtual Private Cloud (VPC) Worked on AWS IAM to create and manage AWS users and groups and use permissions to allow and deny their access to AWS resources. Setup resource groups, Vnets, NSGs, Vnet Peering s, and Network Load Balancers in Azure Cloud. Created Security groups and NACLs at EC2 instance and subnet levels respectively. Managed multiple security devices to protect the Enterprise s network Vulnerability Scanners, Malware Detection, Intrusion Detection; Host-based Firewalls, SIEM, Web Application Firewall. Experience with AWS (VPC, Transit Gateway, EC2, CloudFormation Stacks, Cloud Watch logs, Cloud Trail, IAM policies, Route 53, Direct Connect, Global Accelerator, CloudFront, Network Load Balancers, and Application Load Balancers) Great exposure to SDN and network function virtualization (NFV) technologies like Cisco ACI. Troubleshooting and problem resolution of Virtualization (vSphere 4.1\5.1\5.5) Infrastructure. Provided second/third level technical support for ACI (Application Centric Infrastructure) technologies. CERTIFICATION: Cisco Certified Network Professional (CCNP). Cisco Certified Network Associate (CCNA). Palo Alto Certified (PCNSE). Education: Master s in computer information systems, Christian Brothers University, United States. Bachelor s in computer science engineering from JNTUH, India. TECHNICAL SKILLS: Networking Technologies LAN/WAN Architecture, TCP/IP, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP, QoS, VXLAN, EVPN Networking Hardware Cisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls. Routing Protocols OSPF, EIGRP, RIP, MPLS, IS-IS, BGP, Multicasting, Route Redistribution Security Technologies PAP, CHAP, Cisco PIX, Cisco Umbrella, Blue Coat, Palo Alto, ASA, Fortinet, Checkpoint, ZTNA, ZIA, ZPA v3.2+ Network Monitoring SolarWinds, Wireshark, HRping, Whatsup Gold, Infoblox, Splunk, Grafana, SNMPv2/v3. Operating Systems Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR, IOS-XE, NX-OS, Ubuntu 25.04 Routers 1800, 2611, 2800, 3600, 3845, 3900,4300, 4400, 4500, ASR 9000,1000X, 7206VXR, Juniper M & T Series, Cisco Catalyst 8200, 8300, 8500 series, Load Balancers F5 Networks (BIG-IP), A10 Thunder ADC, NetScaler (Citrix), AWS-ALB Capacity & performance Cascade Riverbed (Flow Monitor), WAN Killer Switches CISCO 2960,3750,3850, CAT 9300, CAT9400, CAT 9500, 9600, 4500,6500,6800 Nexus 9k,7k,5k,2k WAN AND SD- WAN Technologies MPLS, ISP Leased Lines, SONET, Viptella, Versa, Cisco DMVPN Programming Languages C, C++, Perl, Power Shell, Python, Bash Wireless and Radius Technologies. Canopy Wireless Devices, CISCO 1200 series APs, Aruba wireless and APs, Cisco Meraki, Linksys Wireless/Wi-Fi Routers, Prime Infrastructure, Cisco ISE, MSE, Aruba 225, Aruba 3000 controller & Airwave, ISE, Clear Pass 6.0,6.2,6.5, 802.11a,b,c,g,n,ac, Ekahau pro, Air Magnet Pro Simulation Tools GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence Firewalls Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5500-X,5520/5550/5580), McAfee Web Gateway, Checkpoint, Palo Alto firewalls, Cisco FirePower AAA Architecture TACACS+, RADIUS, Cisco ACS Cloud Technologies GCP, AWS, Azure, Google Cloud Platform, Pub/Sub, Dataflow, Big Query, Oracle Automation Tools Terraform, Ansible PROFESSIONAL EXPERIENCE: Client: American Express, Phoenix, AZ Jun 24 Present Role: Cloud Network Engineer Responsibilities: Provisioned and managed Azure resources using Azure Resource Manager (ARM) templates and Azure CLI, configuring VNets, NSGs, Azure Firewall, Application Gateway, and monitoring solutions like Azure Monitor and Log Analytics for secure and observable cloud operation Deployed and maintained GCP infrastructure using Google Cloud Deployment Manager, configuring VPC networks, firewall rules, Cloud Load Balancing, IAM roles, and Cloud Logging to support secure and resilient multi-tier applications. Integrated BGP with MPLS and OSPF to enable seamless route redistribution and efficient traffic engineering across hybrid WAN topologies; leveraged technologies such as Route Reflectors, LDP, TE (Traffic Engineering) tunnels, VRFs, and Route Maps to ensure high availability, loop prevention, and granular policy control across enterprise and service provider-grade networks. Configured VPC Peering and AWS Transit Gateway to enable inter-VPC and cross-account communications with route filtering and segmentation best practices.. Developed Terraform scripts for Aviatrix-based cloud networking automation. Deployed virtual Palo Alto Networks VM-300 firewalls in AWS and Azure, ensuring consistent security policies across on-premises and cloud environments. Configured Palo Alto NGFWs with App-ID, User-ID, Threat Prevention, and Global Protect VPN; integrated with Panorama for centralized logging and policy management; enabled Wildfire and DNS Security subscriptions for zero-day threat detection. Automated VPC provisioning using Infrastructure as Code (IaC) tools. Deployed and configured Fortinet FortiGate firewalls across multiple branch locations, implementing IPsec VPN, high availability (HA), and centralized policy management using Forti Manager to ensure secure and resilient connectivity. Integrated Palo Alto Networks Panorama with Cortex Data Lake to enable centralized log collection, advanced analytics, and automated threat correlation across multiple firewalls, enhancing incident response and visibility in large-scale deployments. Established secure hybrid cloud connections using AWS VPN and Direct Connect. Configured Aviatrix FireNet for advanced security and compliance across cloud environments. Deployed F5 BIG-IP GTM version 12.x to manage global traffic and ensure high availability across multiple data centers. Configured DNS load balancing and global server load balancing (GSLB) to direct users to the best-performing sites. Deployed F5 BIG-IP ASM version 14.x to protect web applications from threats such as SQL injection, cross-site scripting (XSS), and DDoS attacks. Configured security policies and application layer firewalls to safeguard critical applications. Deployed Citrix NetScaler ADC to optimize application delivery, configuring load balancing, SSL offloading, and application firewall features to enhance performance and security. Automated DNS and DHCP provisioning using Infoblox Grid Manager and RESTful APIs; implemented IPAM workflows, DNS zone delegation, DHCP failover, and integration with Active Directory Sites and Services. Implemented SolarWinds Orion NPM, NTA, and SAM modules to monitor network health and app performance; configured SNMPv3, NetFlow, Syslog integration, and threshold-based alerting; correlated events in Splunk for incident response. Maintained VPC peering, Transit Gateway, and Direct Connect to ensure secure and low-latency network connectivity across hybrid environments Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), sniffers and malware analysis tools. Established VPN connections and AWS Direct Connect for seamless hybrid cloud integration. Designed and implemented Cisco ISE version 2.7 for network access control, integrating TACACS+ for secure admin authentication and centralized authorization of CLI commands across routers, switches, and firewalls. Automated multi-vendor network configuration using Ansible playbooks, Python (Netmiko, NAPALM), and REST APIs; tasks included interface config, routing protocols, SNMP, and ACLs; integrated with Git for version control and CI/CD workflows. Implemented Infrastructure as Code (IaC) using Terraform to provision AWS networking components including VPCs, subnets, security groups, and route tables, ensuring consistent and repeatable cloud deployments. Designed and deployed scalable AWS infrastructure using VPC, EC2, ELB, S3, Route 53, CloudTrail, IAM, Auto Scaling, and CloudWatch Logs; implemented Transit Gateway, Security Groups, NACLs, and Infrastructure as Code (IaC) using Terraform and CloudFormation. Implemented multi-tier VPC architectures, segmenting workloads using public/private subnets, NAT Gateways, and route tables for secure and scalable deployments. Configured Kubernetes networking using Calico CNI to implement network policies, manage pod-to-pod communication, and enforce microsegmentation within containerized workloads, integrating with external firewalls and load balancers for east-west and north-south traffic control. Implemented Cisco SD-WAN (Viptela) on ISR 1000 Series routers with centralized configuration via vManage; deployed traffic policies, control policies, app-aware routing, direct internet access (DIA), and segmentation using BFD and TLOC extensions for hybrid WAN optimization. Configured application-aware routing and next-gen firewall features in Versa SD-WAN, enabling granular traffic steering based on SLA policies and enhancing security posture through integrated threat prevention at branch edges. Implemented Cisco ACI using Nexus 9000 Series switches and APIC controllers to automate network provisioning, enforce intent-based policies, and enable micro segmentation within the data center fabric. Configured Cisco Software-Defined Access (SD-Access) on Cisco Catalyst 9000 Series switches and integrated WLAN with Catalyst 9800 WLCs, enabling secure, fabric-based segmentation for both wired and wireless networks. Configured and maintained BGP and MBGP across enterprise and service provider networks, implementing route filtering, path selection policies, and multicast VPN support for efficient, loop-free inter-domain routing and application-aware traffic delivery. Designed and implemented OSPF in multi-area environments with route summarization and authentication, optimizing internal routing performance and ensuring high availability across data center and branch office links. Hands-on expertise with Ether Channel, Spanning Tree, Trucking, ACLs, Syslog. Expertise with the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations. Deployed and troubleshooted EIGRP in large-scale LAN environments, configuring route redistribution between OSPF and EIGRP, and fine-tuning metrics for optimized path selection and convergence. Integrated VPC with AWS Network Firewall and Traffic Mirroring for deep packet inspection and real-time threat analysis in production environments. Engineered secure and scalable branch connectivity using Cisco Meraki MX firewalls, MR access points, and MS switches, leveraging centralized dashboard for real-time monitoring, policy enforcement, and auto VPN configuration. Designed and implemented secure branch connectivity using Cisco Meraki MX and MR series devices, leveraging Auto VPN, content filtering, and client analytics to enable centralized cloud-managed networking with zero-touch provisioning. Orchestrated end-to-end wireless and switching solutions across enterprise campuses using Aruba Mobility Controllers, Juniper EX/QFX, and Arista EOS platforms, incorporating dynamic VLAN assignment, 802.1X authentication, and RF tuning for optimal coverage and performance. Deployed Aruba ClearPass with 802.1X and RADIUS for role-based access control, integrated with Active Directory for identity enforcement, and enabled guest onboarding with dynamic VLAN assignment and posture assessment Performed predictive and post-deployment RF surveys using Ekahau Pro and Sidekick; validated 802.11ax (Wi-Fi 6) deployments; tuned AP transmit power, channel plans, and SSID design for seamless roaming and spectrum efficiency.. Implemented Cisco DMVPN Phase 2 with IPsec for scalable and secure multipoint communication across branch networks, reducing configuration complexity. Led the deployment of Zscaler Private Access (ZPA) v3.2.1 to secure internal application access across multiple banking data centers, serving over 10,000 remote users with high availability and Zero Trust enforcement. Automated ZTNA policy deployment using Python scripts and APIs within Zscaler ZPA, streamlining application segmentation and access controls to enforce least-privilege access in regulated environments. Implemented VMware NSX-T 3.1 for network virtualization, providing micro-segmentation, distributed firewall, and advanced security policies across virtualized workloads. Integrated ZIA with Cisco ASA and Fortinet firewalls, enforced HIPAA-compliant DLP policies, and automated policy management to enhance data protection and reduce configuration errors. Configured QoS policies on Cisco Catalyst 9500 Series switches to prioritize critical applications and ensure optimal network performance, utilizing classification, marking, and queuing techniques. Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco Switches (2960, 3500 ,7600, 3750, 3850 series, 6500 series) Cisco Routers (4800, ASR 9K, 800), Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, Zscaler Proxy and Versa SD-WAN appliances. Client: UCLA Health, Jun 23 May 24 Role: Senior Network Engineer Responsibilities: Designed and implemented Palo Alto Networks PA-5k,3k,7k Series NGFWs, configuring advanced security policies and application control features to protect against cyber threats Integrated Palo Alto Networks PA-7050 with LDAP and Active Directory to enforce user-based policies, utilizing user identification features to apply security measures based on user identity. Utilized Cisco ASA clustering to provide high availability and load balancing, ensuring uninterrupted security services and optimal performance. Integrated Cisco ASA with Cisco ISE (Identity Services Engine) for context-aware security policies and dynamic access control. Managed custom route tables, VPC endpoints (Interface and Gateway), and NAT Gateway configurations to control east-west and north-south traffic flow securely. Deployed BlueCat DNS and DHCP solutions to optimize IP address management, ensuring efficient network provisioning and seamless scalability in a dynamic enterprise environment. Implemented Blue Coat ProxySG for advanced web filtering, SSL interception, and bandwidth optimization, enhancing security and performance across the organization s internet traffic. Integrated Splunk with network devices and firewalls to centralize log collection, enabling real-time monitoring and rapid threat detection with customizable dashboards and alerts. Deployed and managed VPN connections (IPSec) using AWS Virtual Private Gateway and Customer Gateway to establish hybrid connectivity with on-premises networks. Configured Cisco ISE to enforce ZTNA-aligned network access policies based on user identity, device posture, and context, providing granular control and minimizing implicit trust within the enterprise network. Implemented F5 BIG-IP LTM for intelligent load balancing, ensuring optimal traffic distribution and high availability for mission-critical applications while minimizing downtime and enhancing user experience. Deployed A10 Thunder ADC to enhance application performance and scalability, providing high-efficiency load balancing and advanced traffic management across hybrid cloud environments. Developed Terraform and CloudFormation templates for VPC provisioning and management. Automated Cisco ACI fabric onboarding using Python and REST APIs, streamlining tenant creation, policy deployment, and health monitoring across multi-tenant data centers. Implemented Cisco ACI Microsegmentation to enhance security by enforcing granular access controls within the data center, isolating workloads based on security policies. Deployed Cisco DNAC for centralized network automation and management, streamlining network provisioning, policy enforcement, and real-time monitoring across campus and branch environments, resulting in improved operational efficiency, enhanced security, and simplified network troubleshooting. Implemented Silver Peak Unity EdgeConnect for SD-WAN and WAN optimization, leveraging dynamic path control, application acceleration, and WAN hardening to enhance network performance, reduce latency, and improve security across branch office environments. Utilized Viptela vEdge routers to establish secure and scalable SD-WAN fabric, ensuring seamless connectivity across distributed sites and enhancing network resilience. Integrated FortiGate firewalls with FortiSandbox for advanced threat detection and mitigation, leveraging sandboxing technology to analyze and block zero-day threats. Deployed and configured Cisco Meraki MR access points and MX security appliances using the Meraki Dashboard for centralized wireless management, Auto VPN setup, client tracking, and 802.1X-based access control for secure WLAN access. Implemented MPLS-based VPNs to deliver secure, high-performance connectivity across geographically dispersed sites, enabling traffic engineering, improved bandwidth utilization, and seamless application delivery with minimal latency. Configured and optimized BGP and MBGP for inter-domain routing, enabling multicast route advertisement over MPLS VPNs and ensuring efficient path selection, redundancy, and scalability across ISP and data center links. Configured OSPF on Cisco Catalyst 9500 Series switches, ensuring efficient route propagation and fast convergence within the enterprise network, while optimizing routing performance. Integrated OSPF with BGP on Cisco Catalyst 6800 Series switches to provide seamless route redistribution, enhancing routing flexibility and supporting dynamic inter-domain communication. Implemented reflexive ACLs on Cisco ASA 5500-X Series firewalls to manage dynamic traffic flows, securing outbound and inbound traffic and preventing unauthorized access. Deployed AWS VPCs and integrated AWS Transit Gateway to connect multiple VPCs and on-premises networks, simplifying network architecture while ensuring high scalability, optimized routing, and secure communication across hybrid environments. Designed and implemented Azure Virtual Networks (VNets) integrated with Azure Firewall, VPN Gateway, and Network Watcher to create secure, isolated, and monitored network environments, ensuring optimized connectivity, traffic control, and proactive troubleshooting in hybrid cloud deployments. Implemented Google Cloud VPC with Interconnect, Load Balancing, and HA VPN to build a secure, high-performance hybrid cloud architecture, integrating Google Cloud Armor and Network Intelligence Center for enhanced security, visibility, and performance optimization. Configured VMware Site Recovery Manager (SRM) for disaster recovery, automating failover and failback processes to ensure business continuity. Configured SNMPv2/v3 on Cisco and Juniper devices for secure network monitoring and integrated with SolarWinds for event alerting and performance tracking. Utilized Puppet to enforce network baseline configurations across Cisco and Juniper devices using manifest files. Developed Python scripts to automate configuration and performance monitoring across Cisco, Juniper, and Arista devices using RESTful APIs, reducing manual tasks and improving operational efficiency. Utilized Ansible playbooks and Ansible Tower to automate multi-vendor network deployments, including VLANs, routing protocols, and software upgrades, ensuring consistent configurations and streamlined management. Implemented Terraform to automate the provisioning and management of cloud network infrastructure across AWS and Azure, using infrastructure as code (IaC) to ensure consistency, scalability, and version-controlled deployments. Designed and implemented a high-density wireless network using Cisco Catalyst 9800 Series Wireless Controllers and Cisco Aironet 4800 access points, delivering reliable, high-performance Wi-Fi coverage across enterprise environments. Integrated wireless LAN with Cisco Identity Services Engine (ISE) for secure access and policy enforcement, dynamically managing user and device access while enhancing wireless network security through context-aware policies. Configured IPsec VPNs with IKEv2, PSK and certificate-based authentication on Cisco ASA, ISR, and FortiGate firewalls; implemented DMVPN Phase 2 with spoke-to-spoke routing, IP SLA tracking, and VRF-aware VPN segmentation. Deployed Cisco DMVPN using Phase 2 with IPsec encryption, enabling scalable and secure branch-to-branch communication without the need for static tunnels, optimizing WAN performance and management. Configured Zscaler Internet Access (ZIA) as part of a SASE-aligned architecture to secure healthcare endpoints, enabling full SSL inspection, advanced URL filtering, and cloud sandboxing for real-time threat prevention against malware, phishing, and APTs. Configured RADIUS-based 802.1X authentication on Cisco Catalyst 9000 Series switches and Aruba APs to secure wired and wireless network access, enforcing identity-based policies. Designed and implemented Aruba ClearPass version 6.9 for network access control, enabling dynamic role-based access policies and enhancing overall network security. Client: Virtusa Mar 19 Apr 23 Location: IND Role: Network Engineer Responsibilities: Integrated BGP with VPN on Cisco ASR 1000 Series to provide scalable and secure virtual private networks for enterprise customers. Implemented multi-area OSPF across Cisco ASR and Nexus platforms, integrating route summarization, authentication, and OSPF redistribution with BGP to enable scalable, secure, and efficient routing across hybrid enterprise networks. Configured EIGRP over DMVPN (Dynamic Multipoint VPN) on Cisco ISR 4000 Series routers to enable secure and dynamic routing for remote sites. Worked on Nexus platform 7018, 5K series (5548, 5020 and 5010) and FEX (2248, and 2232) and deployed VPC, VDC and OTV and successfully implemented VSS on the Cisco switches. Implemented MST (Multiple Spanning Tree Protocol) on Juniper EX4300 switches to manage multiple VLANs with a single instance of spanning tree, optimizing network performance and scalability. Deployed DNS services using BIND and Windows Server DNS to manage domain name resolution, providing reliable and scalable DNS infrastructure for enterprise networks. Configured DHCP services on Cisco IOS and Windows Server to dynamically assign IP addresses and network configurations to client devices, ensuring efficient IP address management and reducing administrative overhead. Configured and managed SNMPv2 and SNMPv3 on Cisco and Juniper devices to enable secure and efficient network monitoring, integrating with SolarWinds NPM to provide real-time visibility, alerting, and performance analytics. Utilized Wireshark for deep packet inspection and protocol analysis to troubleshoot complex network issues, identify performance bottlenecks, and detect security anomalies across enterprise LAN and WAN environments. Implemented DMVPN Phase 2 on Cisco ISR 4000 Series routers using IPsec for secure, scalable, and dynamic routing between multiple remote sites, reducing configuration overhead and improving network flexibility. Deployed Site-to-Site IPsec VPN on Cisco ASA and firewalls to securely interconnect data centers and branch locations, ensuring encrypted data transmission and business continuity across geographically distributed networks. Designed and implemented LAN/WAN architectures to support scalable and resilient network connectivity, utilizing MPLS, Ethernet, and broadband technologies to ensure high performance and reliability. Integrated SD-WAN with cloud services (AWS, Azure) to provide secure and optimized connectivity for cloud-based applications, improving performance, reliability, and scalability for enterprise networks. Integrated Meraki SD-WAN with Cisco Umbrella for cloud-based content filtering, malware protection, and improved internet security posture Deployed Versa Networks SD-WAN solution, configuring secure and resilient connectivity for branch offices with advanced traffic steering, application optimization, and analytics. Configured Cisco ISE to enforce endpoint posture assessments and guest access policies, leveraging 802.1X and TACACS+ to manage device compliance, secure visitor access, and centralize administrator control across multi-vendor network infrastructure. Configured ACLs on Cisco Nexus 9000 Series switches to enforce security policies and control traffic flow in data center environments, enhancing overall security and compliance. Configured and managed Cisco DNA Center (DNAC) to automate network provisioning, apply policy-based segmentation, and monitor real-time network health, enhancing operational efficiency and security across enterprise LAN environments. Integrated Palo Alto Next-Generation Firewalls with LDAP and RADIUS for centralized user authentication, and configured IPSec VPN and security profiles to protect remote access and defend against advanced threats. Configured and managed Palo Alto firewalls using Panorama for centralized policy management, log correlation, and streamlined deployment across multiple sites, ensuring consistent security enforcement and operational efficiency. Configured and managed Cisco ASA firewalls with site-to-site VPN, NAT, and access control policies to secure perimeter traffic and enable secure communication between branch and data center networks. Configured Cisco ASA with FirePOWER Services to provide advanced threat protection, including intrusion prevention (IPS), URL filtering, and malware defense, enhancing visibility and security across enterprise network perimeters. Implemented DiffServ (Differentiated Services) and traffic shaping on Cisco ASR 1000 Series routers to manage bandwidth and reduce latency for mission-critical applications. Designed and deployed spine-leaf architecture using Cisco Nexus 9000 and Arista 7000 Series switches, integrating VXLAN overlays and BGP EVPN control plane to enable scalable, low-latency Layer 2/Layer 3 fabric across data centers. Configured and managed Aruba ClearPass and Mobility Controllers to implement role-based access control, secure enterprise WLAN connectivity, and centralized 802.1X authentication with dynamic VLAN assignment. Conducted comprehensive wireless site surveys using Ekahau Pro and AirMagnet Survey Pro to design, validate, and optimize Wi-Fi networks, ensuring optimal AP placement, RF coverage, and minimal interference in enterprise environments. Implemented and optimized F5 and Azure load balancers to distribute traffic across application servers, ensuring 99.99% uptime, secure SSL termination, and intelligent Layer 7 routing for high-performance service delivery. Monitored and troubleshooted Infoblox services for DNS and DHCP issues, implemented high availability configurations, and ensured compliance with security best practices, enhancing network reliability and uptime. Integrated Meraki network infrastructure with Cisco Umbrella for enhanced security and content filtering, protecting users from malicious websites and threats. Utilized VMware vRealize Operations for monitoring and optimizing the performance of virtualized environments, providing actionable insights and predictive analytics. Keywords: cprogramm cplusplus continuous integration continuous deployment sthree information technology ffive microsoft Arizona Idaho Pennsylvania South Dakota Wisconsin |