Chinni V

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Chinni V

Email: Chinnivakalapudi9@gmail.com
Phno: +1 614-943-1959
SR. AWS Network Engineer

Summary:
 7 plus years of experience in the area of Networking, Security, Administration, AWS cloud
services and Network support.
 Expertise in cloud networking technologies, including Amazon Web Services (AWS) and its
networking services, such as Amazon VPC, Elastic Load Balancing, Direct Connect, Transit
Gateway, Amazon Route 53 and VPC peering.
 Extensive experience in VPC design and configuration, including subnets, route tables,
network access control lists (ACLs), and security groups, ensuring optimal network
segmentation and access controls.
 Extensive experience in EC2 instance provisioning, including selecting appropriate instance
types, optimizing resource allocation, and managing auto scaling groups to ensure efficient
resource utilization.
 Strong knowledge of cloud migration methodologies, tools, and best practices.
 Strong knowledge of network protocols and technologies, including TCP/IP, DNS, BGP, OSPF,
VLANs, and VPNs, with the ability to troubleshoot and resolve complex network issues.
 Experience in designing, implementation and operational support of routing/switching
protocols in complex environments including BGP, OSPF, EIGRP, Spanning Tree, 802.1q etc.
 Proficient in leveraging automation and infrastructure-as-code (IaC) tools, such as Terraform,
Ansible, Jenkins & CloudFormation, to deploy and manage cloud network resources in a
consistent and scalable manner.
 Familiarity with network monitoring and management tools, such as AWS CloudWatch, VPC
Flow Logs, or third-party solutions, to proactively monitor network performance,
troubleshoot issues, and ensure high availability.
 Extensive work experience on Cisco Routers, Cisco Switches, Load Balancers & Cisco
Firewalls.
 Expertise in deployment and configuration of routing protocols such as OSPF, EIGRP and
BGP.
 Extensive experience configuring and managing NAT in complex network environments,
including on-premises data centers and cloud environments such as AWS
 Deep knowledge on configuration and implementation of F5 BIG-IP load balancer.
 Extensive experience in designing migration strategies and implementing firewall migration
plans, including assessing existing firewall configurations, defining migration scopes, and
mitigating risks.
 Experience with devices Palo Alto Network firewalls such as security NAT, Threat prevention
URL filtering.
 Deep knowledge on configuration of Cisco ASA and Palo alto firewalls like PA-820, PA-1420,
PA-3410, PA-5430, PA-7050.
 Strong knowledge on JSON and YAML data structures.
 Has strong knowledge on scripting languages like Python and Shell Scripting
 In depth knowledge with network monitoring tools like AWS CloudWatch, Solar Winds and
etc.
 Experience with Nexus models like 7K, 5K, 2Kseries, Cisco router models like 7200, 3800,
3600, 2800, 2600, 2500, 1800 series and Cisco catalyst 6500, 4500, 3750, 3500, 2900 series
switches.

Technical Skills:

Firewall Security Cisco ASA, Palo Alto

Switching Aruba, Cisco

Load Balance F5, AWS NLB, AWS ELB

WAN & LAN Technologies MPLS, VPLS, WAN

SMTP, VLAN, Inter-VLAN Routing, Trunking, STP,


RSTP

Network Management Tools Wireshark, Nmap

Routing Protocols Static Routing, MPLS, EIGRP, BGP, OSPF, RIP, IGRP

Monitoring Tools Solar winds, AWS CloudWatch, Nagios, PRTG

Server Operating System Windows 2019, 2016, 2012, Centos - 6, 7

Cloud Environment AWS

OS Products Windows (2012/2016/2019), Linux, MACOS

Configuration Management and IAC Ansible, Terraform

Scripting Python, YAML, JSON

Virtualization VMware ESX/ESXi, Virtual box

Roles and Responsibilities:

BNY Mellon, NY, NY April 2022 - Present


Sr. AWS Network Engineer

 Configured and managed network connectivity options in AWS, including VPN connections,
AWS Direct Connect, or transit gateways, to establish secure and reliable connections
between on-premises networks and AWS resources.
 Designed and implemented secure and scalable VPC architectures, leveraging AWS services
to create isolated virtual networks, subnets, and security groups for applications and
resources.
 Configured VPC components, such as subnets, route tables, and network access control lists
(ACLs), to control inbound and outbound traffic flow, ensuring network segmentation and
enforcing security policies.
 Implemented and optimized network routing and traffic flow within AWS, utilizing AWS
Route 53, Elastic Load Balancing (ELB), and VPC peering to ensure efficient and fault-
tolerant communication between services.
 Designed and implemented a highly available and scalable network architecture using AWS
Transit Gateway to centralize and manage connectivity between VPCs (Virtual Private
Clouds) in a multi-account environment.
 Created Auto Scaling groups in AWS from Instance templates and Auto Provisioning based on
the Project /Testing team needs.
 Configured and deployed transit gateway attachments to establish secure and efficient
communication between VPCs, VPN connections, and on-premises data centres.
 Implemented transit gateway route propagation and route tables to efficiently route network
traffic across multiple VPCs and subnets, optimizing network performance and reducing
complexity.
 Migrated on-premise virtual machines (VMs) or physical servers to AWS using AWS Server
Migration Service (SMS) or other appropriate migration tools, managing replication, testing,
and cutover processes to minimize downtime.
 Implemented cloud-native AWS services, such as AWS Lambda, S3, RDS, or DynamoDB, to
replace or enhance existing on-premise applications, optimizing performance, scalability, and
cost-efficiency.
 Designed and implemented connectivity options for VPCs, including VPN connections, AWS
Direct Connect, or transit gateways, to establish secure connections between on-premises
networks and AWS resources.
 Conducted post-migration testing, performance tuning, and optimization activities in AWS,
worked closely with stakeholders to validate the success of the migration and address any
remaining issues or improvements.
 Collaborated with cross-functional teams, including developers, system administrators, and
network engineers, to identify and address application-level dependencies and optimize the
architecture for AWS, leveraging services like AWS Elastic Beanstalk, ECS, or EKS.
 Designed and implemented a hybrid cloud connectivity solution leveraging technologies such
as VPN (Virtual Private Network) and direct interconnects to establish secure and reliable
connectivity between on-premises infrastructure and public cloud providers like AWS.
 Orchestrated the deployment and management of hybrid cloud connectivity using
automation tools like Ansible and Terraform.
 Conducted thorough network assessments and performance tests to identify and resolve
bottlenecks, latency issues, or bandwidth constraints in the hybrid cloud connectivity
architecture, optimizing performance for critical applications.
 Utilized AWS Elastic IP addresses and Network Address Translation (NAT) gateways to
enable internet access for resources within private subnets while ensuring security and
compliance.
 Implemented VPC Endpoint services, such as Amazon S3 to securely access AWS services
without traversing the public internet, enhancing performance and reducing data transfer
costs.
 Designed and implemented highly available and scalable architectures using AWS Elastic
Load Balancer (ELB) services, such as Classic Load Balancer (CLB), Application Load Balancer
(ALB), and Network Load Balancer (NLB).
 Configured and managed load balancers to distribute incoming traffic across multiple EC2
instances or containers, optimizing resource utilization and ensuring high availability and
fault tolerance for applications.
 Implemented SSL/TLS termination on load balancers, securing communication between
clients and backend instances, and enabling end-to-end encryption for sensitive data.
 Implemented and configured Palo Alto Networks firewalls in AWS, ensuring robust network
security and traffic filtering capabilities within the cloud infrastructure.
 Configured Palo Alto Panorama management platform to centrally manage and monitor
multiple Palo Alto firewalls deployed across AWS accounts and regions, streamlining firewall
policy management and log analysis.
 Integrated Palo Alto firewalls with AWS Transit Gateway or VPN connections to establish
secure and encrypted communication between VPCs, on-premises networks, and external
resources.
 Designed and implemented IAM policies, roles, and permissions to enforce least privilege
access controls and secure authentication for AWS resources and services.
 Implemented multi-factor authentication (MFA) for IAM users and roles, enhancing security
by adding an additional layer of authentication for accessing AWS resources.
 Conducted load testing and performance optimization activities, analysing load balancer
metrics and utilizing AWS CloudWatch or third-party monitoring tools.
 Implemented network security measures in AWS, such as implementing security groups,
network ACLs, and AWS Web Application Firewall (WAF).
 Worked closely with application teams to understand their networking requirements and
ensure proper network design and configurations to support their applications.
 Designed and implemented network monitoring and troubleshooting solutions in AWS,
utilizing AWS CloudWatch, VPC Flow Logs, or third-party monitoring tools to proactively
detect and resolve network issues.
 Conducted ServiceNow upgrades and patch management, ensuring system stability, security,
and compatibility with AWS environments and integrations.
 Worked on ServiceNow dashboards, reports, and analytics to provide insights into service
performance, SLA compliance, and resource utilization within AWS environments.
 Conducted documentation reviews and audits to identify areas for improvement, update
outdated information, and ensure documentation aligns with current AWS services and best
practices.

Environment:

AWS Direct Connect, Transit Gateways, VPC architectures, AWS Route 53, Elastic Load Balancing
(ELB), VPC peering, Terraform, AWS Server Migration Service (SMS), AWS Elastic Beanstalk, AWS
Elastic Load Balancer (ELB), Network Load Balancer (NLB), Palo Alto firewalls, AWS CloudWatch, VPC
Flow Logs, Ansible, ServiceNow.

Zen3 info solutions, Hyderabad, India March 2018 - Dec


2021
Sr. Network Engineer

 Establishing connectivity between AWS cloud with Aws direct connect, VPC peering.
Etc.
 Coordinate with regional network teams for implementation of the voice and data
network design.
 Created CloudWatch Log filters and Nagios to monitor virtual private cloud (VPC)
changes and EC2 Splunk Light
 Responsible for maintaining AWS Networks and Firewall networks as well as
troubleshooting problems and making recommendations for future system upgrades.
 Operational support for AWS project and maintaining all VPC’s in AWS network.
 Configured application load balancing using F5 LTM and deployed BIG IP 8900
provisioning with LTM and GTM Modules. Also, IPAM and DNS
reservation/assignment via Infoblox.
 Experience with cloud networking design and configuration of Amazon Web Service
(AWS).
 Implement security standards in AWS to match current Data Centre Services
standards
 Experience with configuring VIP, Pools on F5 LTM and working with iRule
management on LTM
 Successfully deployed AWS Transit Gateway and configured VPC attachments,
enabling seamless communication and resource sharing between multiple VPCs
within the organization's network infrastructure.
 Implemented automated Transit Gateway route table updates and propagation using
AWS Lambda functions and event-driven triggers, ensuring dynamic and efficient
routing changes based on network and application requirements.
 Developed Ansible playbooks for automating network device configuration,
including interfaces, VLANs, routing protocols, and access control lists (ACLs).
 Automated network device provisioning, streamlining deployment processes and
reducing manual errors by utilizing Ansible playbooks for initial settings,
management access, and baseline configurations. Also utilized Ansible playbooks for
network audits, ensuring compliance with established standards and generating
reports.
 Setup of Virtual Private Cloud (VPC), Network ACLs, Security Groups, and
route tables across AWS accounts and configured/administered Load Balancers
(ELB), Route53, Network, and Auto-scaling for high availability
 Implemented AWS solutions using EC2, S3, RDS, EBS, Elastic Load Balancer,
Auto scaling groups, Optimized volumes, and EC2 instances.
 Created templates for AWS infrastructure as a code using Terraform to build staging
and production environments.
 Developed Python scripts to maintain the data in AWS S3 buckets, also to transfer
the data from all the EDLs based on the requirement.
 Worked on Auto Scaling for providing high availability of applications and EC2
instances based on a load of applications by using Cloud Watch in AWS.
 Documented procedures and business process and shared information with
appropriate stakeholders.
 Experience in installing, configuring, supporting, and troubleshooting Unix/Linux
Networking services and protocols.
 Maintained the Route 53, VPC, IAM, and SNS services in AWS.
 Provide detailed costs to the client engagement teams.
 Expertise in L2/L3 protocols like VLAN’s, STP, RSTP, PVSTP+, VTP, MPLS and
Trunking protocols.
 Implement configurations on devices that fall within the team's purview.
 Installed & Configured Cisco Routers 7200, 3600, 2800, 2600, 2500, Catalyst
Switches: 6500, 5500, 4900, 3550, and 2900s and Nexus 7K, 5K and 2K switches.
 Designed and Implemented WAN, LAN, DMZ, vendor access zones and SD-WAN
(i-WAN) solutions in datacenters and field sites
 Built an accruing network via MPLS circuits to split the trusted and un-trusted traffic
via a Cisco ASR Router.
 Establishing VPN Tunnels using IPsec encryption standards and also configuring and
implementing site-to-site VPN, Remote VPN.
 Implementation and deployment of VPN technologies IPsec, L2TP, PPTP tunnelling.
 Migration and implementation of Palo Alto Next-Generation Firewall series PA-820,
PA-1420, PA-3410, PA-5430, PA-7050.
 Upgrading the code from Pan OS. Experience working on Panorama M100. Migration
from Cisco ASA to PA firewalls.
 Establishing VPN Tunnels using IPsec encryption standards and also configuring and
implementing site-to-site VPN, Remote VPN.
 Experience with enterprise-class security products such as load balancing, IDS/IPS,
DLP, Firewall, IPsec/SSL VPN, WAN/LAN, wireless and remote connectivity.
 Worked on Palo Alto (PA-1420, PA-3410) Next Gen Firewalls and implemented
Security Policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS.
 Good experience with implementing and deploying NMS tools like SolarWinds.
 Experience with troubleshooting, network monitoring, network analysis, and process
improvement.
 Implemented Jenkins as a continuous integration and delivery (CI/CD) tool for
network infrastructure projects.
 Configuring and managing Cisco Meraki wireless infrastructure and access points
and access controllers.

Environment:
Cisco Routers 7200, 3600, 2800, 2600, 2500, VLAN Routing, F5 Load Balancing, Cisco
Meraki, IDS/IPS, DLP, Palo Alto Firewall, IPsec/SSL VPN, WAN/LAN, Cloud Watch,
Monitoring System, Solar Winds, SD-WAN, IAM, CI/CD, Jenkins, Linux, Route 53, Ec2,
VPC, S3, RDS, EBS, WLAN.

IWS, Hyderabad, India June 2016 - March


2018
Network Engineer

 Successfully handled the Installation and Configuration of various Network Devices


such as Cisco ASA 5510 and 5540 Series, Cisco 1841, 3845 ,7609 E, Cisco switches
3550, 6513 and 6509.
 Configuration of Site-to-Site VPN, Easy VPN, DMVPN, GET VPN.
 Planning and implementation of Routing, Switching, and application delivery
controller.
 Responsible for setting up/down LAN/WAN for new site and establishing
connectivity of external partner with Client`s Network.
 Involved in the configuration and troubleshooting of routing protocols like OSPF,
BGP and IP access filter policies.
 Managed Network Security policies & respond to security events and managing
multi-vendor Network Security infrastructures like Cisco &HP followed by ITIL v3
processes.
 Practiced network asset management, including maintenance of network component
inventory and related documentation and technical specifications information.
 Installed & Configured Cisco Routers 7200, 3600, 2800, 2600, 2500, Catalyst
Switches: 6500, 5500, 4900, 3550, and 2900s and Nexus 7K, 5K and 2K switches.
 Worked on various Wi-Fi access points like Meraki MR56, MR46, Aruba 300, 303
series, 802.11x -Aruba Wireless.
 Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels,
and Spanning tree for creating Access/distribution and core layer switching
architecture.
 Configure AAA RADIUS server.
 Knowledge of authentication protocols such as AD, RADIUS and LDAP.
 Performing the ACL requests change for various client’s requests given by
application or business team.
 Documenting the Health and server report on Cisco ASA.

Environment:
Cisco switches 6513, 3750,3725,4705,3560, Nexus 7K, 5K and 2K switches Ether-
channel, port-security, NAT, PAT, STP, VLANs, Network monitoring, BGP, OSPF,
Trunk, AAA RADIUS server, Cisco ASA Firewall, Meraki, ACL, AD, RADIUS and
LDAP.

You might also like