JM

Jay Mistry

available

Last update: 17.03.2023

Network Engineer

Graduation: Bachelor Of Science
Hourly-/Daily rates: show
Languages: English (Limited professional)

Keywords

Border Gateway Protocol Network Engineering Amazon Web Services Data Centers Routing Cisco Nexus Switches Virtual LAN Private Networks Link Aggregation (Ethernet) Amazon Elastic Compute Cloud + 47 more keywords

Attachments

jay-mistry-resume-2023.pdf

Skills

Elastic IP, VPC, Amazon Web Services (AWS), AWS, Antivirus, BGP, iBGP, eBGP, catalyst, CISCO, Nexus, Cisco Nexus, Cisco ASA, cloud computing, network stability, data Center network, Data Center, data centers, data communications, DevOps, DMVPN, Eigrp, EtherChannel, Ethernet, failover, firewalls, GCP, HSRP, IP Addressing, igmp, IP protocol, IPSEC, Juniper, LACP, load balancing, malware, backhaul, Azure, MPLS, Multicast, Network architecture, Network Engineer, Network Engineering, Routers, Network Security, OSPF, Performance monitoring, internal network, Routing, routing protocols, software development, spyware, high availability, system analysis, system integration, TCP, SSL, Authentication, VTP, VLAN, VLANs, VRRP, VOIP, web servers, access points

Project history

12/2021 - 03/2023
Network Engineer
Carnival (Internet and Information Technology, >10.000 employees)

  • Managed and developed network projects designed to strengthen network continuity and deploy security elements to meet and exceed contract requirements, including system analysis & troubleshooting.

  • Manage various Security platforms; Juniper, Cisco ASA, Next-Gen, Check Point firewalls.

  • Implemented Active-Passive cluster setup between two Juniper SRX’s and Active-Active pair on Juniper MX

    960 Routers for high availability.

  • Included security groups, network ACLs, Internet Gateways, and Elastic IP's to ensure a safe area for the

    organization in AWS public cloud.

  • Created new redundant Ethernet interfaces with enabling LACP and created new VLAN’s under each

    interface.

  • Implemented new eBGP relationship between Juniper QFX Spine switches and Firewalls for route

    advertisement.

  • Configured and troubleshooting HSRP, BGP, OSPF, DMVPN, MPLS WAN, QoS and Route Maps.

  • Created Route leaks and Route Filters to advertise routes between multiple virtual routing instances.

  • Installing and Configuring Nexus 9k, Cisco 6500, 4500, 3800 and 3600 switching platforms according to

    deployment plans.

  • Designed IP Addressing schemes, VLANs and Switch port assignments, Ether-channel implementation.

  • Implemented, configured redundancy protocols HSRP VRRP, GLBP for Default Gateway Redundancy.

  • Implementing, configuring, and troubleshooting various routing protocols like OSPF, iBGP, eBGP.

  • Interacted with application owners to understand their application flow for migrating servers to new DR

    Data Center.

  • Performance monitoring of applications and web servers to maintain quality of service and network stability.

  • Maintained core switches, creating VLAN's and configuring VTP.

  • Designed and Implemented PA 7080’s and Migrated workloads from Legacy and Existing DR Data Center SRX Firewalls to Next Gen Palo Alto Firewalls.

  • Created multiple Virtual systems on Palo Alto and connected virtual system-1 to Juniper QFX Spines for supporting Juniper QFabric to QFX Migrations and Connecting virtual system-2 to Cisco Border Leaf’s for supporting workload migration to Vx Block.

  • Involved in simplifying Network architecture by consolidating almost 30 Virtual Routers from legacy devices to 6 virtual routers in new environment.

  • Upgrade and maintenance of all production Juniper, Cisco and Palo Alto network devices.

  • Involved in Application failover testing between data centers and Data Center DR testing.

  • Troubleshooted data Center network issues and WAN backhaul network issues.

  • Created Virtual Routers in Palo Alto Firewalls using Hub Spoke architecture. Route redistribution concept is

    used to advertise routes with route filters on Hub.

  • Configured Firewalls with multiple virtual routers and assigned security zones to respective virtual routers.

  • High availability setup between two Palo Alto devices with Link monitoring enabled and testing in different

    conditions.

  • Connected Enterprise and Data Center Firewalls to Panorama M-600’s for management purposes.

  • Configured different security profiles like Antivirus, Anti-spyware, Vulnerability protection, URL Filtering and

    DOS protection profiles to defend against flood attacks, Reconnaissance attacks, viruses, trojans, malware

    and unauthorized access etc and attaching them to security policies.

  • Created Admin Roles, Server Profiles, Authentication Profiles and log settings, Interface Management and

    Zone protection profiles.

  • Migrated IPSEC Tunnels from Juniper to Palo Alto.

  • Created NAT and Security policies using APP-ID concept on Palo alto and tagging each security policy based

    on application to make management simpler.

  • Suggesting Best Practices for network and security perspective workload migration to make migrations

    smooth.

  • Hands on experience on different F5 load balancing options and features to include Persistence, SSL offload

    functions, HTTP profiles, iRules, etc.

  • Cisco Nexus series devices. Able to maintain internal network structure of a data center and run day to day

    operations seamlessly experience of VPC , VDC , EtherChannel , Eigrp , routing , Multicast , PIM ,Base

    configurations , VRF-Lite, EIGRP, Multicast PIM sparse, igmp, VACL.

  • Excellent understanding in data communications such as TCP and IP protocol stack and applications.

    Switching concepts , STP , Port channel , Stacking , VTP , POE environment , 9300, 9500 , 3850 catalyst series.

  • Excellent understanding of Routing concepts, BGP , Eigrp , DMVPN and VRF.

  • Cisco WLC 8500 , 9800 as well as 3800 , 3700 series access points Palo alto traffic flow, policies, and zones.

  • Excellent interpersonal and Communication skill.

  • Strong experience directly related to cloud computing (i.e. AWS, Azure, Private)

  • Traditional edge networking skills such as F5, Cisco, Juniper, BGP etc

  • Strong experience in the design and deployment of Public Cloud technologies (AWS, Azure, GCP)

Experience with AWS or Azure, DevOps, software development, and system integration, including the

underlying protocols and standards used in the operation of those technologies.

Certifications

Local Availability

Only available for remote work
Profileimage by Jay Mistry Network Engineer from Network Engineer
Register