Career Experience Details


VPLSSolutions.png

VPLS SOlutions

Solutions Engineer
Nov 2018 - Present

  • Time split between both pre-sales (20%) and post-sales (80%)

  • Pre-sales engagements:

    • Acting as VPLS’ Fortinet Architect and/or Systems Engineer (SE)

    • Determining customer needs and an appropriate solution

    • Providing recommendations for equipment, sizing, and network/security design

    • Creation of project BOM, SOW, and time estimates

    • Providing Fortinet product and feature demos

  • Post-sales engagements:

    • Acting as VPLS’ Fortinet Professional Services (PS) Engineer

    • Onsite or remotely assisting customers with technical configuration, installation, and/or troubleshooting of both Fortinet and non-Fortinet equipment

    • Majority of projects have been replacing incumbent firewall with FortiGates, including config conversions, config best practices and hardening, and physical installation/cutover

    • Notable projects include a 35+ international site FortiGate and Ruckus ICX switch deployment for a publicly traded social media company (name cannot be disclosed)

  • Wrote 4 technical articles for VPLS’ blog (see Technical Writing)

  • Discovered and and credited for FortiGate vulnerability FG-IR-19-127


fortinet.jpg

Fortinet

Technical Account Manager
Sep 2018 - Nov 2018

  • Built a relationship and provided premium technical support for my assigned Fortinet enterprise-level customers

  • Technical aspect of the job was similar to Technical Support Engineer III experience listed below

  • Created and presented weekly/quarterly status reports to customers’ engineering teams and management


Fortinet

Technical Support Engineer III
Feb 2018 - Sep 2018

Technical Support Engineer II
Mar 2017 - Feb 2018

Technical Support Engineer I
Sep 2015 - Mar 2017

  • Provided technical support on escalated tickets for the following products:

    • Core: FortiGate, FortiAnalyzer, FortiManager

    • Additional Products: FortiSwitch, FortiAP, FortiClient & EMS, FortiAuthenticator, FortiWeb, FortiADC, FortiMail

  • Reproduced and reported over 75 customer-affecting bugs to development teams

  • 1 of 4 on-call engineers that provided 24x7 support for US federal government customers and their enterprise-class Fortinet devices

  • Troubleshot, configured, researched, and instructed our customers on all aspects of device setup, operation, troubleshooting, and migration

  • Wrote 4 how-to configuration guides for Fortinet’s “cookbook” website (see Technical Writing)

  • Wrote 11 KB articles for Fortinet’s knowledge base (see Technical Writing)

  • Packet capture and OSI layer 2-7 analysis using tcpdump and Wireshark

  • NGFW functions: intrusion prevention (IPS), data loss prevention (DLP), antivirus, web filtering, application control, SSL/TLS inspection (deep packet inspection)

  • Stateful firewall policies based on IP, port, protocol, user ID, or application signature

  • Authentication – SSO, RADIUS, LDAP, TACACS+, 802.1x

  • IPsec and SSL VPNs in site-to-site and remote access configurations, including ADVPN

  • Secure SD-WAN with multiple ISPs and/or IPsec tunnels, SD-WAN SLAs and traffic rules

  • Static routing, policy-based routing (PBR), and dynamic routing (OSPF, BGP), including redistribution and route filtering

  • High availability protocols (VRRP, FGCP, FGSP), link redundancy protocols (LACP, MCLAG, vPC), load-balancing techniques

  • X.509 certificates, OpenSSL, XCA

  • FIPS and PCI compliance, security audit vulnerability remediation

  • Securing/hardening web applications


ITT Technical Institute

Adjunct Instructor

Sep 2015 - Dec 2015

  • Instructed a software development course on social networking

  • Gave lectures, facilitated labs, conducted discussions, and assigned and graded assignments

  • Students’ final project was building and hosting a blog using the WordPress platform.

  • Students’ blog was required to utilize code from other social networks’ APIs – e.g. Facebook Graph API and Twitter REST APIs


Headquarters_of_GM_in_Detroit.jpg

GENERAL MOTORS

Data Center Network Engineer

June 2014 - Aug 2015

  • Network engineering in GM’s two $150M data centers, as well as global caching sites

  • Analyzed requirements, engineered solutions, and implemented 100+ change controls

  • Changes involved Cisco Nexus 7K, 5K, and 2K FEXs and were to support new server or storage deployment and migration projects

  • Specifically, changes involved port activation, vPC/port-channel creation, VLAN/SVI creation and assignment, HSRP, STP, ACLs, routing (EIGRP, OSPF, redistribution), and Netflow

  • Assisted with DC standup by prepping several $M of Cisco Nexus gear for deployment

  • Hosted project meetings with local and remote teams to coordinate efforts

  • Scheduled, coordinated, and implemented work orders using strict change processes

  • Reviewed, maintained, and updated network diagrams and documentation

  • Assisted NOC with escalated data center related incidents

  • Created and emailed daily metric reports on incidents


General Motors

Network Operations Engineer

June 2013 - May 2014

  • Worked in Network Operations Center (NOC) responding to global GM network incidents and trouble tickets

  • Troubleshooting Cisco Nexus devices in GM’s redundant data centers

  • Troubleshooting Cisco switches and routers, wireless LAN controllers (WLCs) and LWAPs

  • Troubleshooting F5 load balancers, Checkpoint firewalls, Bluecoat proxies

  • Performed packet captures using Wireshark on host machines as necessary

  • Engaged 3rd party vendors when need to resolve tickets, such as Cisco TAC and ATT

  • Utilized networking monitoring tools from HP - ITSM, NA, BSM, and NNMi

  • Assisted NOC L1s with monitoring, incidents, and technical help

  • Worked with remote NOC teams daily (GM NOCs in Texas, Michigan, and Brazil)

  • First member of Austin team and responsible for training two employees


Seminole Electric Cooperative

System Operations Intern

May 2012 - May 2013

 

  • Worked with cross-functional team supporting network infrastructure and servers

  • Assisted with rule creation and monitoring of Cisco ASAs

  • Performed changes on Cisco Catalyst iOS switches

  • Worked in the lab with Checkpoint firewalls

  • Participated in security audit to meet NERC CIP requirements

  • Security audit included open port scanning, analyzing firewall rules, analyzing running services and user accounts

  • Installed network taps and spanned switch ports to perform packet captures

  • Built log collection server to collect and monitor Windows Event Logs and Syslogs

  • Microsoft Windows and third party patching

  • Troubleshooting and maintaining computers and servers

  • Troubleshooting and maintaining SCADA system databases and OSI SCADA software