Daksh Prafulkumar Patel
Network Engineer
9096435009 | dakshpatel.1294@[Link] | Green Card
Professional Summary :-
An IT expert having 8+ years of experience in Network design, Security, Tier support of Networks in various
environments.
Expertise in planning, design, implementation and maintenance of Ethernet based Local Area Networks
(LANs), Wireless Networks (WLANs) and Wide Area Networks (WANs).
Extensive experience working on Cisco and Juniper routers/switches in complex environments with multiple
ISPs.
Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, 6500
and Nexus 5K series switches and Sound knowledge of Routing and Switching concepts and MPLS design.
Expert in dealing with Networking Protocols and Standards such as TCP/IP, OSI, UDP, Layer 2 (VLANs, STP,
VTP), Routing Protocols (RIP, EIGRP, OSPF, BGP), WAN technologies (Frame relay, IPsec, VPNs, MPLS), QoS.
Expertise in Configuration of Virtual Local Area Networks (VLANS) using Cisco routers and multi-layer
Switches and supporting STP, RSTP, PVST, RPVST along with trouble shooting of inter-VLAN routing and VLAN
Trunking using 802.1Q, MLFR, MLPPP, Metro Ethernet.
Familiar with products such as Cisco ISE, Cisco ASA 5500 series firewalls and Cisco ACE 4710 Load balancers.
A working knowledge of T1/DS1 (PPP, ATM, ISDN), DS3, and SD-WAN.
Experience with AWS (IAM, VPC, Object Storage and CDN - S3, Glacier and CloudFront, Route 53), Docker,
Nagios, Ansible, exposure to Terraform.
Experience in troubleshooting NAT configurations, Access-Lists (ACL), and DNS/DHCP related issues within
the LAN network.
Experience setting up Cisco ASA firewalls Cisco ASA 5510, Cisco ASA 5512 & Cisco ASA 5505 with restricted
security policies, NAT implantation, configured DMZ interfaces to restrict traffic flow.
Experience in configuring and troubleshooting NAT and PAT.
Managed inventory of all network hardware, Management and Monitoring using SSH, Syslog, SNMP.
Excellent in L2/L3 Switching Technology Administration including creating and managing VLANs, Port
security, Trunking, STP, Inter-VLAN routing, LAN security.
Experience working with F5 Load Balancing in a Lab Environment.
Highly motivated with the ability to work independently or as integral part of a team and committed to the
highest levels of professionalism.
In-depth knowledge and hands-on experience on IP Addressing, Sub netting, VLSM and ARP, reverse & proxy
ARP.
Knowledge of Subnetting IPv4/IPv6 addresses and Coordinated over IP address management and Checkpoint,
Cisco ASA, Fortinet and Palo Alto installation, upgrade, Monitoring and patch management.
Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for
local routing only) which involves new wan links.
Experience on Network Monitoring & Testing tools such as Wireshark/Ethereal, Cisco Works, and IXIA.
Experience on Monitoring and Management tools such as HP OpenView, Solar Winds and Wireshark
Good understanding of VoIP implementation and protocols such as H.323, RTP, and SIP.
In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN
architecture and good experience on IP services.
Hands-on experience with TCP/IP, LANs, WANs, and WLANs (WIFI) Cisco VPN Concentrators, F5 Fire pass SSL
VPN, 6509 Core Datacenter designs.
Good knowledge on SDN-NFV & open flow.
Worked on Multi-vendor platform with checkpoint, Fortinet and Cisco firewalls requesting net flow for security
compliance, coding, and pushing firewall rules after approval and troubleshoot incidents as required.
Maintain Non-Microsoft mail gateways (SPAM Filter, Malware check), DKIM, DMARC, SPF & DNS.
Troubleshoot and configured FortiGate CPE 40/60/80/100 series firewalls, FortiGate cloud series 5101C
firewalls, FortiAnalyzer series 4000 (logging and reporting server), FortiManager series 3000/4000
(centralized control), and Cisco FWSM.
Configure and maintain security policies on Fortinet firewall and manager/ Forti Analyzer
Technical Skills
PROTOCOLS: OSI, TCP/IP, DHCP, UDP, RIP v1, RIP v2, IGRP, EIGRP, TACACS+, RADIUS, OSPF, BGP, SSH, TFTP, FTP,
SMTP, NTP, LDAP, Active Directory, Kerberos, L2F, SLA, L2TP, PPP, Frame Relay, ATM, Sonnet, Fast/Gig Ethernet,
HSRP, Token Ring, ISDN, AAA, DES, 3DES, AES, and MD5, VPN (IPsec and SSL),VRRP, HSRP, DNS (BIND, DJBDNS,
Infoblox), CARP, SNMP.
NETWORK MONITORING TOOLS: HP openview, Cisco Works, McAfee EPO, Netscout, Ethereal, tcpdump, netcat,
Sniffer, SIEM, Snort & Snortsnarf, MRTG, AOTS.
OPERATING SYSTEMS: Windows NT/200/2003, windows 7, Juniper SEAX, Netsctt, Junos, UNIX, SPLAT (Secure
Platform), Linux, RedHat, Debian, Cisco IOS
FIREWALLS: Checkpoint NGX (R65-R75), Cisco PIX 515E, Cisco PIX 535 Firewall, Cisco ASA 5510,Cisco ASA
5520,Cisco ASA 5540,Cisco ASA 5550, Cisco ASA 5580-20, Cisco FWSM, Check Point NGX R52, R54, R61, R62, R65,
R 75,Nokia IP690, Nokia IP530, Checkpoint provider 1, Checkpoint Firewall 1, SPLA, Palo Alto 5000series, PA 3000
series, VM-300, ATT FW
ROUTERS: Cisco 810 series 4G router, Cisco 2811, Cisco 2921, Cisco 6509-E (Multi-layer Switch), Cisco7200,
Cisco3800, Cisco 3640, and Cisco 3745.
SWITCHES: Cisco Multi-layer Switch 6500, Catalyst 4500, Catalyst3750, Catalyst2900 and Catalyst 3500XL.
VOIP: SIP H.323, MGCP, TDM, SS7, Avaya Voice gateways.
LAN/WAN TECHNOLOGIES: T1, DS3, OC3, SONNET, MPLS, DSU/CSU, Metro Ethernet Technology
NETWORK EQUIPMENT: CISCO 2950,3500,4500,6500 series Switches, CISCO 800, 1600, 2500,
2600,3700,3800,7200 series Routers, Cisco wireless access points.
HARDWARE PLATFORM: Cisco Routers, Ethernet Switches, F5 LTM, GTM
CLOUD TECHNOLOGY: ATT NetBond, Microsoft Azure, AWS EC2, VPC, IAM, S3, Route 53, ELB, EBS
CERTIFICATIONS:
CCNP (Routing & Switching)
CCNA (Routing & Switching)
Work Experience
LA Care Healthplan, Los Angeles, CA Nov 2021 to till date
Information security Specialist/ Cloud Network Engineer
Performed network engineering, design, planning (WAN & LAN) & implementation. Studied single point
failures & designed WAN structure in such a way that there are no failures in network in case of any device or
link failure.
Analyze network protocol and traffic using tool like Wireshark, Extrahop.
Maintained the following Cisco platforms 7600, 7500, 7200, 4500, 3600, 2600, 2500, 1600, 800, 766, AS5300,
Catalyst 6000, and Catalyst 9000, 5000, 3000, 2900, and 1912.
Performed setup, configuration, testing and monitoring of Cisco Catalysts 6000, Catalyst 9000 and Cisco
Routers
Managing and Support Cisco, Fortinet, Checkpoint/Kemp routers and switches, LB, Foundry, and firewalls
Implementation of Palo Alto, Fortinet, and SonicWALL firewalls
Join troubleshooting call with vendor to resolve issues and documents them for future references.
Configurations of Check Point, Palo Alto, Cisco, Juniper, Fortinet FortiGate and SonicWall UTMs.
Installed/upgrade OS on Cisco phone using Cisco Unified Communications solutions.
Configuration of Cisco Nexus 5k/7k Series switches.
Configured Aruba Wireless Access Points, Controllers, and captive portal functionality to assist sales team in
product demonstrations for Confidential and Federal Customers
Network Segmentation is applied for the Rating Application users.
Develop designs, Proof of Concept and implementations for FortiGate and Forti Authenticator.
Documented the user test cases for the low-level design.
Added Domain Controllers manually in Forti Authenticator to collect user login data, which will be used to
authenticate users at Firewall.
Applied group policies on FortiGate Authenticator to filter the traffic.
Implemented VDC (Virtual Device Contexts) to enable virtualization and to present the physical switch as
multiple logical devices.
Created layer 3 to layer 2 bridges in the firewall.
Implemented approved changes to Cisco ASA appliances in a multi-context configuration, FortiGate, and
Fortinet firewalls, created access rules based on IP address, port, and protocol to meet the customer’s access
requirements
Installation, deployment, Analysis and troubleshooting of Firewall Technologies i.e. Checkpoint, Fortinet, Palo -
alto, Cisco ASA, F5 (LTM).
Experience with AWS (IAM, VPC, Object Storage and CDN - S3, Glacier and CloudFront, Route 53), Docker,
Nagios, Ansible, exposure to Terraform.
Documented the implementation of Fortinet, Forti Authenticator and Nexus switches.
Working knowledge of F5-LTM Load Balancer and BIG IP.
Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between Switches.
Performed the maintenance of Active Directory and replication scheme, DNS/DHCP services and time services;
wrote step-by-step procedures for implementing upgrades.
Configured VLANs on a switch for inter-VLAN communication. Configured VLAN Trunking Protocol (VTP) on
Core Switches. Configured various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches for STP,
VTP Domain, VLAN, Trunking, Fast Ether Channel configuration.
Configured routing policy for BGP. Switching related tasks included implementing VLANs and configuring ISL
trunk and 802.1Q on Fast-Ethernet channel between switches.
Installed, configured and repaired Level 2 network equipment, including: Brocade FCX648S switches, Brocade
wireless Access Points (APs)
Configured and maintained DSLAMs, IADs and firewall.
Troubleshooting on network problems with Wire shark, identify problem and fix.
Configuring and troubleshooting type of routing to route traffic flow per customer requirement as primary,
backup/load balanced and load splitting.
Documented all the work done by using Visio, Excel & MS word.
USAA, San Antonio, TX Jan 2020 to Oct 2021
Network security Engineer
Worked in Network building and Network infrastructure management team.
Hand on Experience in configuration and implementation of various Cisco Routers and L2 Switches.
Experience with Remedy ticketing system in resolving tickets related to routing and Switching.
Configuration of EIGRP and OSPF as interior gateway protocol with route filtering and route redistribution.
Coordinated with senior engineers with BGP/OSPF routing policies and designs, worked on implementation
strategies for the expansion of the MPLS VPN networks
Installed and configured the High Availability redundancy pairs for Cisco Wireless LAN controllers and NAC
Guest Servers for load balancing and failover services over the L2TP tunnel across the secure internet gateways
of private MPLS WAN.
Managed firewall using FortiGate to allow or block IPs, created policies added different interfaces and VLANs.
installations, design, and implementation of Cisco solutions, VPN, Fortinet, VOIP
Experience in implementing Next Generation Firewalls (NGFW) such as Bluecoat ProxySG and other vendors
such as Palo Alto networks NGFW for URL filtering.
Installing Webproxy rule on BlueCoat Webproxy as per business user requests.
Upgrade BlueCoat Webproxy OS to latest as per Vendor suggestions.
Installed new Fortinet firewalls to increase security and network control setup IPS, and Application control, as
well as logging for compliance
Configurations and troubleshooting issues on Nexus platforms like 3k/5k/7k Nexus including licensing and
upgrading OS and hardware replacement.
Experienced in using network monitoring and analysis tools to debug Ethernet/Wireless/IP layer problems for
the Wireless router.
Fortinet Firewall administration, configuration of FortiGate 3000, 3815 series as per network diagram.
Installation and administration of Checkpoint R 75.40, R80 Firewall.
Currently work with network engineering to design, build, and support SD- WAN site implementations.
implementation and administration of Next - Generation FIREWALLS of Palo Alto (PAN-OS/Panorama 7.11 & 8),
Check Point (SPLAT & GAIA R8.10), Fortinet (FortiGate FortiOS), Cisco (Firepower) and Juniper (SRX).
Installed Fortinet appliances for security and compliance
Diagnosed network errors to the DMARC/DKIM/SPF for NOC operations.
Checkpoint Firewall Log review and analysis and troubleshoot connectivity issues.
Layer 2 switching technology architecture, implementation and operations including L2 and L3 switching and
related functionality. This includes the use of VLANS, STP, VTP and their functions as they relate to networking
infrastructure requirements including internal and external treatment, configuration and security.
Layer Three routing protocol configurations include but are not limited to distance vector and link state
protocols such as: Directly Connected Interfaces, Static Routing, RIP, RIP2, IGRP, EIGRP, OSPF and other
proprietary protocols used by Cisco.
Worked on Frame Relay, ISDN, PPP, HDLC, Network Troubleshooting using CLI Show commands, PING, Trace
route, telnet.
Migrated, Upgrade and Patch Management of Cisco ASA, Checkpoint, Palo alto and Fortinet Firewalls.
Configuring STP for switching loop prevention and VLANs for data and voice along with Configuring port
security for users connecting to the switches.
Varkaniyan Infotech., India, Oct 2016 to Dec 2019
Network Engineer
Initially worked on mathematical modelling of electro dynamic vibrator (shaker) which is a test platform used to
test transportation profile, mechanical stress and more.
Implemented wireless, LAN diagrams in MS VISIO & maintained documentations in Office, MS Project.
Maintain secure network infrastructure with Cisco, Brocade, and Fortinet switch.
Maintain current network posture with Fortinet Fortigate firewalls 300, 1000, 2000, and 3700 appliances.
Maintain deploy and replace Wi-Fi network using Fortinet AP’s.
Work with Cisco ASA Firewalls as well as Fortinet FortiGate Appliances. Manage Cisco ASA Firewalls using CLI,
CSM (Cisco Security Manager).
Deeply explained NetBond functions to customer during service activation call.
Hands on experience in installing and configuring Cisco and Juniper MX series routers.
Configurations and troubleshooting issues on Nexus platforms like 3k/5k/7k Nexus including licensing and
upgrading OS and hardware replacement.
Help customers to control and manipulate their routing from customers MPLS VPN to cloud service providers
and from cloud service providers to customers MPLS VPN via ATT tool kit called Route Management Tool Kit
(RMTK).
Design, configure and troubleshoot FortiAnalyzer, Fortimail, Fortiweb, Fort client, Forti DDOS, Forti sandbox,
Forti SIEM, Forti authenticator and Forti ADC
Firewall policy provisioning on Fortinet FortiGate appliances using FortiManager.
Worked in NOC to monitor and analyze the network. Troubleshooting on network problems with Wire shark,
identify problem and fix.
Responsible for the configuration of Cisco Routers (7000, 5300, 4000, 2500, 3000, 2600) using RIP, IGRP, OSPF,
EIGRP, BGP
Managed office network with Cisco devices with network devices including 2500 and 3600 series routers and
6500, 3500, 2900 series switches
Extensive experience in configuring and implementing OSPF and BGP.
Supported core network consisting of Cisco 7200 series routers running multi area OSPF.
Configured EIGRP and OSPF as interior gateway protocol with route filtering and route redistribution, installed
and maintained Cisco 3600, 2600 and 7200 backbone routes with HSRP
Implemented stub/Totally stub areas and various OSPF features like route-summarization and SPF throttling.
Configured Security policies including NAT, PAT, VPN, Route-maps and Access Control Lists.
Implemented Cisco Secure Access Control Server (ACS 3.0) for TACACS+/RADIUS
Knowledge with redistribution of routing protocols and Frame-Relay configuration
Handled Network Migration from RIP to OSPF.
Implementation of TCP/IP and related Services-DHCP/ DNS.
Configured, maintained and troubleshot routing protocols such as OSPF, EIGRP and BGP.
Assisted with escalation procedures and customer notifications.
Configured Cisco Routers for OSPF, IGRP, RIPv2, EIGRP, Static and default route
Yash Technologies,India Apr 2014 – Sep 2016
Network Engineer
Responsibilities
Responsibilities included not limited to upgrading, maintaining Infrastructure, Installing, configuring various Cisco, Arista,
Juniper Routers, Switches, Checkpoint, Palo Alto's FW, Citrix NetScaler Gateways, Bluecoat Proxy SG, Riverbed
Steelhead appliances.
Configuring and troubleshooting CISCO catalyst 6509, 7609, 7613 with Supervisor cards, Cisco 3640, Cisco GSR 12416,
21418(with PRP and RPR processors).
Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco
2811 ISR routers and switches at access level to 2950, 3550
Experience working with Nexus 7010, 7018, 5020, 2148, 2248 devices.
Experience working with High performance data center switch like nexus 7000 series
Configuring HSRP between VLANs, Configuring Ether-Channels, Port Channel on 6500 catalyst
Data center migration was involved in Access, Distribution and Core layers.
Configured various Router interfaces like ATM interface, T3 & Channelized T1 interface
Setup of a new Cisco Secure ACS server for secure login to remote equipment using TACACS + and SSH connected in
disturbed deployment mode and migrated devices between two active directories.
Working experience on performing Incident, change management using ticketing tools such as ServiceNow.
Supported the network operation and the incidents troubleshooting based on ServiceNow ticket system
Working knowledge of RADIUS/TACACS authentication mechanisms and configuration of Cisco ISE/ACS.
Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating
Access/distribution and core layer switching architecture.
Configured Vlan’s, VTP’s, enabling trunks between switches.
Configuration and extension of VLAN from one network segment to another segment between Different
vendor switches (Cisco, Juniper).
Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local
routing only) which involves new wan links.
Convert Branch WAN links from point to point circuits to MPLS and to convert encryption from IPSec/GRE to Get VPN.
Plan Design and assist in deploying enterprise wide Network Security and High Availability Solutions for ASA.
Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover
DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525/) &ASA 5500(5510/5540) Series.
Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general
troubleshooting of the F5 load balancers
Configure virtual servers, nodes and pools on F5 on 4800v Load balancers for high availability of applications
Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
Strong Knowledge in working with F5 Load Balancers and their Implementation in various Networks.
Provided Load Balancing towards access layer from core layer using F5 Network Load Balancers.
Environment: Cisco 3750/3550/3500/2960 /2950 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco
ASA5510, Checkpoint, F5 Load Balancer LTM, GTM 6400/6800/8800, Cisco Nexus7K/5K/2K, Checkpoint.
Education:
Bachelor of Engineering - BE, Computer Engineering From Gujarat Technological University. 2014