Jashwanthi Katta - Network Engineer
Jashwanthi Katta - Network Engineer
Email: [email protected]
Jashwanthi Katta
CCNA Certified Network Engineer
PROFESSIONAL SUMMARY:
CCNA Certified Network Engineer with 5 years of experience. Worked extensively with multiple Clients in
Switching, Routing, Network Security Firewalls and Proxies, Application Delivery Controllers, Authentication,
Wireless, Collaboration and VOIP environments. Experience in Campus and Data Center topologies in multi-
vendor equipment. Deployment/Implementation, lab testing, assisting Architecture and Design.
Career Highlights:
· Experience with legacy and latest switching technologies in Campus and Data Center environments.
Worked on Cisco, Juniper, and Aruba/HP gear in campus environments. Worked on Cisco, Arista, Dell,
Cumulus, Juniper gear in Data Center environment.
· Experience with Interior and Exterior routing protocols that includes RIP, OSPF, EIGRP, IS-IS and BGP.
Worked on Cisco, Juniper and Arista routers.
· Experience in Network Security that includes perimeter security for Internet, Extranet, DMZ, Internal Server
farms, Web-traffic security with Proxies, Web Application firewalls. Worked and migrated multi-vendor
equipment and Next generation firewall technologies. Worked on ASA, Firepower, Checkpoint and Palo
Alto firewalls. Experience on MWG, Bluecoat and Zscaler proxies.
· Experience and high-level understanding in application delivery controllers, local and global load balancing
techniques, redundancy solutions, high availability options for mission critical internal, vendor and public
facing applications. Experience with F5 LTM, GTM, APM, NetScaler’s, Cisco ACE and A10.
· Worked on Campus Wireless environments with 1000+ access points, Wireless LAN controllers, Anchor
Controllers, Authentication policies, BYOD policies, Integration with RADIUS. Experience with Aruba and
Cisco WLAN.
· Worked extensively on Cisco ASA 5500(5510/5540) Series. Experience with Palo Alto 5K series.
Migration from ASA to PA.
· Experience with TACACS/RADIUS servers, migration from ACS and Aruba ClearPass to ISE. Experience
with windows and Infoblox DNS and DHCP servers, IPAM, internal and external grids.
· Experience with WAN connectivity, MPLS circuits, leased Lines, Metro Ethernet, Site to Site IPSec tunnels,
ISP circuits, Customer Edge configurations. Experience with SD-WAN solutions that include Viptella and
Versa.
· Install, manage, and monitored Palo Alto Firewalls in Panorama.
· Knowledge and operational experience with SDN, Cisco ACI, VXLAN, VTEPS, VNI, Bridge Domain,
Arista Cloud Vision, EVPN, MP-BGP, Spine and Leaf Architecture.
· Experience with Zscaler Cloud Proxy Architecture with ZIA, traffic forwarding using GRE tunnels to
ZCLOUD, Azure AD Authentication, Access policies, ZAPP. Experience migration from IronPort’s and
Bluecoat Proxies to Zscaler.
· Worked on Cloud platforms that include Azure, AWS and Meraki. Experience working with connecting
multiple sites to cloud using SD-WAN solutions, Cloud Connections, Load Balancing and Security with
Cloud traffic.
· Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
Configured and maintained IPSEC and SSL VPNs on Palo Alto Firewalls.
· Experienced Network Engineer with a proven track record in network monitoring, incident management,
and hands-on expertise in routing, switching, firewalls, and load balancing, ensuring high availability
and performance of critical infrastructure.
· Experience with Network Monitoring tools, SNMP, Log collectors, Splunk, ticketing tools and thorough
understanding of workflows in corporate environment.
· Very enthusiastic to explore and implement innovative ideas in Network Automation in configuration,
documentation, troubleshooting, workflow integration, API integration with multiple tools using Python
and Ansible.
EDUCATION:
Masters in Cybersecurity, University of Houston, Houston, TX
Bachelor’s in Computer Science Engineering, Vidya Jyothi Institute of Technology, INDIA.
CERTIFICATIONS :
· Cisco Certified Network Associate (CCNA)
· PCNSE – Palo Alto Networks Certified Network Security Engineer.
TECHINCAL SKILLS:
Router and VoIP Cisco Routers series ASR9k, 7300, 4000, 3800, 2000, 1900; Juniper MX, Arista
Platforms 7000 series.
Routing Fundamentals Routed and Routing protocols RIP, EIGRP, IS-IS, OSPF, BGP, IPX; MPLS, Static
and Protocols. routing, ICMP, ARP, HSRP, VRRP, Route Filtering, Multicast, Policy-Based
Routing, Redistribution, Port forwarding.
Switch Platforms Cisco Catalyst series 2960, series 3560, 3850, 4500, 6500, 7000; Nexus series 2K,
5K, 7K; Juniper EX, QFX, Aruba 2000, 3000 series.
Switching Ethernet technologies, LAN networks, MAC, VLAN and VTP, STP, PVST+,
Fundamentals and Multicast,
Protocols RSTP, Multi-Layer Switching, 802.1Q, EtherChannel, PAGP, LACP, CDP, HDLC,
RARP
Firewall Platforms Checkpoint (NGX R65, 3100, 5100, 5900), Cisco Firewalls (ASA 5505, 5506-X,
5585), Palo Alto Networks (PA series 2K, 3K and 5K) with panorama 8.0, WAF
Security Protocols Standard and Extended ACLs, IPsec, VPN, Port-security, SSH, SSL, IKE, AAA,
Prefix-lists, Zone-Based Firewalls, NAT/PAT, HIPAA standards, Ingress & Egress
Firewall Design, Content Filtering, Load Balancing, IDS/IPS, URL Filtering, L2F,
IDS, TCP Intercept, Router Security, SNMP trap
Network Management Wireshark, Infoblox, HP OpenView, Cisco Prime, Splunk, Security Device Manager
and Monitoring (SDM), Cisco Works; TCP Dump and Sniffer, SolarWinds Net Flow Traffic Analyzer,
NetScout, Network Performance Monitor (NPM), Network Configuration Manager
(NCM), SAM, IP Address Manager, Additional Polling Engine, Service Now
Load Balancers and F5 (BIG-IP) LTM 2000, 3900, 6400, 6800, AV 510, Citrix NetScaler, MWG, Zscaler
Proxies Proxies, Bluecoat Proxies.
WAN and SD-WAN MPLS, ISP Leased Lines, SONET, Viptella, Versa.
technologies
Other Networking DHCP and DNS server, Active Directory Management, NTP, NDP, TCP, UDP, FCP,
Protocols and Network Implementation, Troubleshooting techniques, NHRP, NetBIOS, NFS, FTP,
Fundamentals TFTP, HTTP, PAP, PPTP, SIP Trunking, SNMP logging, SMTP, RADIUS and
TACAS+, PBX servers, SDN, IPV4.
CISCO APs, Aruba wireless and APs, Cisco Meraki, Prime Infrastructure, Air
Wireless and Radius Magnet, AirWatch and WLC’s (8510, 5508, 5706), Cisco Aironet AP’s (2600, 3600,
Technologies 3700), ISE, MSE, Aruba 225, Aruba 3000 controller & Airwave, ISE, Clear Pass
6.0,6.2,6.5, 802.11a.
Scripting Basic understanding in Python, Ansible and TCL (F5)
PROFESSIONAL EXPERIENCE:
Responsibilities:
Worked in FedEx Global Deployment and operations team to support multiple migrations in switching,
routing, firewalls, LB and Proxies.
Palo Alto design and installation (Application and URL filtering, SSL decryption, SSL Forward Proxy).
Configured and maintained IPSEC and SSL VPNs on Palo Alto Firewalls. Successfully installed PA-
5000 series firewalls in Data Center as perimeter Firewalls.
Migration of ASA firewalls to PA next gen Firewalls using migration tool in PA. Migrated all IPSEC
tunnels, ACL’s, NAT rules and policies.
Experience working on Cisco ASR 9K, Nexus 7k and 9K. Configured and designed OSPF, EIGRP and
BGP at Distribution and Core layers. Configured OTV layer 2 connection between Data centers on
Nexus.
Worked on Juniper devices like M, MX routers on advanced technologies like MPLS VPNs, TE and other
service provider technologies.
Experience with configuring BGP, OSPF in Juniper M and MX series routers. Worked on several BGP
attributes like MED, AS-PATH, Local Preference for route optimization. Worked on Route-Reflector,
Route-Redistribution among routing protocols.
Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650,
SRX240.
Managed AD Domain Controller, DNS and DHCP Servers and configurations.
Worked on Cisco ISE for user Authentication, Security Group Tags, MAC based authentication for
Wireless and Wired users, 802.1X, EAP, PEAP etc.
Responsible for the IPAM (IP Address management) system for a very large WAN/LAN network (QIP)
using Solarwinds IPAM and Infoblox DNS and DHCP servers. Experience with DHCP scopes, IP
reservations, DNS host entries, pointers, delegations, Zones, DNS Sec etc.
Provides expert level security and networking knowledge in the planning, researching, designing, and
testing of new networking technologies for perimeter firewall security, Intrusion Prevention/Protection
System (IPS), DNS and DMZ security, and Internet Security in support of established Info Security
program initiatives for the next 3 years.
Regular upgrade and maintenance of Infrastructure, Installing, configuring, and maintaining Cisco
Switches (2960, 3500 ,7600, 3750, 3850 series, 6500 series) Cisco Routers (4800, ASR 9K, 800),
Juniper Routers and Firewalls, Nexus 7k,5k & 2k, f5 BIG IP, Palo Alto Firewalls, Zscaler Proxy and
Versa SD-WAN appliances.
Conducted a POC on Versa and Viptella SD-WAN solution as a team and worked on evaluating the
solutions.
Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes
to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and
complex customer issues
Migrated Nexus 7Ks & amp; Nexus 5Ks to an ACI Fabric consisting of 9336PQ Spines & amp;
9332PQLeafs in a brownfield Datacenter.
Worked on PAC file updates, Internet proxy migration from IronPort to Zscaler cloud. Access policies, AD
based, user based, location-based access. ZAPP client.
Worked on Bridge Domains, VXLANs, VTEPS, VNID. configuration of routing using BGP among multiple
Leaf to spine switches. Thorough understanding of Application Profile, Tenants, End Point Group, Inter
Subnet Tenant Routing, Routing within Tenants, Router Peering and Redistribution. Worked on
Migration project from traditional Data Center Architecture to Spine Leaf.
Worked on connections handoff using Bridged Interface to an External Route. L3- EPG configurations,
AEP configurations. Expert in GUI of ACI.
Strong hands-on experience on ASA Firewalls, Palo Alto Firewalls. Implemented Security Policies
using ACL, Firewall, IPSEC, SSL VPN, IPS/IDS, AAA (TACACS+ & RADIUS).
Worked on integrating existing Layer 2 and Layer-3 networks with ACI.
Play a key role in the company’s direction towards Cloud Computing platforms by creating a strategy for
transition plans. Azure AD and AWS, Office 365.
Analyze and provide courses of action on current as well as emerging security threats like ransomware
attacks by research and recommendation of other security solutions to help mitigate network security
threats while preventing their outbreak across the network.
Worked on network design improvements involving BGP, EIGRP, OSPF, IP metric tweaking and load
balancing.
Worked with several network engineers for the understanding of Juniper SRX firewalls along with the
changeover to Palo Alto. Palo Alto Firewall Management-Panorama.
Design, implement, and develop network designs for applications used in TMO.
Worked on Checkpoint Firewall to create new rules and allow connectivity for various Applications.
Checkpoint is used as an internal firewall for application security in Kodiak network.
Implemented Firewall rules and Nat rules by generating precise methods of procedure (MOPs).
Responsible for packet capture analysis, syslog and firewall log analysis.
Experience with F5 load balancers LTM and GTM and reverse proxy design and setup. Migration from
ACE to F5.
Experience in F5, Cisco A10 Load balancers. Migration Experience from ACE to F5 and NetScaler to
F5. Worked on critical applications on Layer 4 and layer 7 load balancing. Experience with Virtual server,
Pool, Node, Profiles – TCP, http, https, ftp, fastl4, Persistence – Source IP, SSL, Cookie, SNAT,
iRules, iAPPs, SSL offloading.
Experience with F5 GTM and in-depth knowledge of DNS, Global level load balancing, Wide IP’s, Zones,
Prober pools, Delegation from Windows DNS server to listener IP.
Gained hands-on experience in network routing, switching, firewall configurations, and load
balancing, ensuring optimal performance and reliability of network infrastructure.
Streamlined service requests and troubleshooting, ensuring rapid turnaround for network changes,
hardware replacements, and configuration updates.
Worked on Orion (Solar Winds) for mapping network diagrams, updated Orion with commissioned and
decommissioned network devices.
Experience with configuration of Cisco call manager, Installing and worked on ICM management.
Environment: Cisco 3500, 3700, 3900 series Routers, Cisco ASA Firewalls, F5 ADC, Cisco ACI, VTP, Juniper
SSG-140, Palo Alto. Juniper EX series switches, Cisco Firepower, Bluecoat, Nexus 9k, 7k, 5k, ASR 9k, ASR 1k,
Nexus 2000 FEX, Juniper SRX, Routing Protocols: BGP, OSPF, AAA (TACACS+ & RADIUS), TCL Scripting,
Responsibilities:
Involved in complete LAN, WAN development (including IP address planning, designing, installation,
configuration, testing, maintenance etc.). Design of DMZ in primary and redundant data centers with Next
Gen Firewalls, IPS/IDS sensors, Switching and routing.
Experience in deployment of Nexus 7010, 5548, 2148T, 2248 devices
Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 5000 series to provide a
Flexible Access Solution for datacenter access architecture.
Installation and maintenance of Cisco Layer 3 switches 3750, 4500X, 6500 in multi VLAN
environment.
Maintenance and configuration of Cisco ASR1000 series and 7200VXR routers at data center and
deployment of 3900, 3800, 2951 and 2821 for branch connectivity.
Involved in migration from Site-to-sire GRE tunnels network to MPLS-based VPN for customer’s WAN
infrastructure.
Implementing security Solutions using Palo Alto PA-5000/3000, Cisco 5580/5540/5520.
Configuration and administration of firewalls, which includes Checkpoint, Juniper, and Cisco ASA fire-
walls.
Migrated Checkpoint firewall architecture with new next generation Palo Alto PA3000 and PA5000 ap-
pliances serving as firewalls and URL and application inspection.
Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.
Successfully installed Palo Alto PA-3000/PA-5000 firewalls to protect Data Center and provided L3 sup-
port for routers/switches/firewalls.
Configured and maintained IPSEC and SSL VPNs on Palo Alto Firewalls and implemented Zone
Based Firewall and Security Rules on the Palo Alto Firewall. Exposure to Palo Alto Wildfire.
Involved in Switching Technology Administration including creating and managing VLANS’s, Port
security, Trunking, STP, Inter VLAN routing, LAN security etc.
Configured BGP, EIGRP and OSPF and Policy based Routing.
Configuring OSPF and Static routing on Juniper M and MX series Routers
Configuring VLAN, Spanning tree, VSTP, SNMP on EX series switches
Configured Cisco 7200 routers which were also connected to Cisco ASA 5508 security appliances
providing perimeter-based firewall security.
Managed the F5 Big IP GTM/LTM appliances to include writing iRules, SSL offload and everyday task
of creating WIP and VIPs.
Collaborated with circuit providers and hardware vendors by raising tickets, facilitating rapid
resolution of connectivity and equipment issues.
Extensive hands-on experience with network routing, switching, firewalls, and load balancing,
optimizing network performance and security.
Environment: Cisco ASA Firewalls, F5, Cisco 3900 Routers, Cisco Catalyst switches 6500, 3750, 3550, 2960
Switches, Palo Alto, Nexus 9k, 7k, 5k, ASR 9k, ASR 1k, Nexus 2000 FEX, Routing Protocols: BGP, OSPF, AAA
(TACACS+ & RADIUS), TCL Scripting.
Responsibilities:
Experience working with Cisco ASA 5585-X firewalls with Firewall rules, IPSEC VPN, NAT, Active-
Standby Failover, OSPF and Any Connect VPN technologies
Configured, implemented site-site VPN on cisco ASA 5585-X firewall.
Troubleshoot and Worked with Security issues related to Cisco ASA, and IDS/IPS firewalls.
Acquired knowledge in working with Meraki wireless access points MR 12, MR 16, MR 24, and MR 34
etc.
Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree
for creating Access/distribution and core layer switching architecture.
Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
Negotiate VPN tunnels using IPsec encryption standards and configured and implemented site-to-site
VPN, Remote VPN on Cisco 5585-x Firewalls.
Collaborating with Application owners, Network Team, DNS Team, and Firewall Team to migrate
websites from Cisco ACE Load Balancer to New F5 BIG-IP Local Traffic Manager.
Deployed code upgrade from version 11.5.1 HF4 to version 11.5.4 on the F5 LTMs.
Configured F5 GTM solutions, which includes Wide IP (WIP), Pool Load Balancing Methods, probers and
monitors.
Experience working with data center deployment where we converted from Cisco 6500 to Nexus.
Experience working with Nexus 5020, 2148, 2248 devices
Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card
(module) for the Nexus 5000
Troubleshoot wan related problems including OSPF, EIGRP, BGP routing and design.
Supporting EIGRP, OSPF and BGP based network by resolving level 2 & 3 problems of internal teams
& external customers of all locations
Deploying Cisco routers and switches such as 7200, 3800, 3600 and 3500, 4500, 5500.
Managed SSL Termination on F5 BIG-IP LTM which entailed creating Cert Request, importing, renewing
and applying to Virtual Server hosting the Application.
Configuring and monitoring different modules F5 BIG-IP LTM and DNS traffic Management.
Management tools, SNMP, Syslog, Sniffer
Experience configuring and troubleshooting on Citrix NetScaler Load Balancer.
Performed Access Control Lists (ACLs) to setup usage for the intended users.
Responsible for IOS installations and upgradations using TFTP Server.
Troubleshooted Routing/Switching/Security Configuration problems/errors encountered to Clients in
Head/Remote Campuses.
Performed subnetting of the IP addresses. Configuration and allocating IP and network resources to
Storage, Virtualization, Server and Application teams.
Responsible for design/implementation/maintenance of Site-to-Site VPNs, and remote access VPN's
using Cisco solutions (ASA 5520 and 5540), including head-end and remote client-side connections.
Performed network monitoring using tools like Netcool. Log collectors using Splunk. SNMP V2C
configurations.
Proactively monitored network traffic and alerts, utilizing tools to detect anomalies and initiate first-
level troubleshooting for quicker resolutions.
Effectively managed change requests and service orders within ServiceNow, ensuring seamless
execution of network configurations and upgrades.
Coordinated with third-party vendors and ISPs to resolve circuit outages and hardware failures,
ensuring timely delivery of replacement equipment and restoration of services.
Played a key role in root cause analysis during major incidents, documenting findings and providing
actionable recommendations to prevent future occurrences.
Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco
ASA5510, Checkpoint, F5 Load Balancer Cisco Nexus7K/5K, Checkpoint, Cisco ASA