Career Experience Details


fortinet.jpg

Fortinet

Technical Account Manager
Sep 2018 - Present

  • Building a relationship and providing premium technical support for my assigned Fortinet enterprise-level customers

  • Technical aspect of the job is similar to Technical Support Engineer III experience listed below

  • Creating and presenting weekly/quarterly status reports to customers’ engineering and management teams


Fortinet

Technical Support Engineer III
Feb 2018 - Sep 2018

Technical Support Engineer II
Mar 2017 - Feb 2018

Technical Support Engineer I
Sep 2015 - Mar 2017

  • Providing technical support for Fortinet’s customers, specializing in FortiGate, FortiAnalyzer, FortiManager, FortiWeb, FortiSandbox, FortiADC, and FortiMail support

  • Rotating on-call supporting Federal customers and their enterprise-class Fortinet devices

  • Troubleshooting, configuring, researching, and instructing our customers on all aspects of device setup, operation, troubleshooting, and migration

  • Reporting bugs to development/engineering by providing detailed analysis and reproduction steps

  • 4 published "cookbook" articles linked here

  • 10 published KB articles - FD38641, FD37759, FD38790, FD38995, FD39276, FD39976, FD40479, FD40277, FD41258, FD40714

  • Traffic captures with tcpdump and review with Wireshark at OSI layers 2-7

  • PCI and FIPS compliance, security audit vulnerability remediation

  • Stateful firewall policies based on IP, port, protocol, user ID, or application signature

  • Explicit and implicit/transparent proxy

  • IPsec and SSL VPNs in site-to-site and remote access configurations, including ADVPN/DMVPN

  • NGFW functions: intrusion prevention (IPS), data loss prevention (DLP), antivirus, web filtering, application control, SSL inspection (deep packet inspection)

  • X.509 certificates, OpenSSL

  • Authentication – SSO, RADIUS, LDAP, TACACS+, 802.1x

  • High availability protocols (VRRP, FGCP, FGSP), link redundancy protocols (LACP), load-balancing

  • WiFi implementation using the FortiGate as a WLC and multiple FortiAPs

  • Static routing, policy-based routing (PBR), and dynamic routing (OSPF, BGP), including redistribution and route filtering via route maps

  • VoIP protocols (mostly SIP and RTP) and session helpers/ALGs

  • Web application firewall (WAF), reverse proxy


ITT Technical Institute

Adjunct Instructor

09/2015 - 12/2015

  • Instructed a software development course on social networking

  • Gave lectures, facilitated labs, conducted discussions, and assigned and graded assignments

  • Students’ final project was building and hosting a blog using the WordPress platform.

  • Students’ blog was required to utilize code from other social networks’ APIs – e.g. Facebook Graph API and Twitter REST APIs


Headquarters_of_GM_in_Detroit.jpg

GENERAL MOTORS

Data Center Network Engineer

06/2014 - 08/2015

  • Network engineering in GM’s two $150M data centers, as well as global caching sites

  • Analyzed requirements, engineered solutions, and implemented 100+ changes

  • Changes required advanced knowledge of layers 2-4 of the OSI model, and have involved port activation, vPCs, port-channels, LACP, vFCs, FCoE, VLANs, SVIs, HSRP, STP, ACLs, EIGRP, OSPF, Netflow, and route redistribution

  • Frequently worked with Cisco Nexus 7K, 5K, 2K, and FEXs to support new server or storage deployment and migration projects

  • Racked/configured several $M of Cisco Nexus gear in lab before production deployment

  • Assisted with IP address, subnet, and VLAN number management

  • Hosted and attended project meetings with multiple teams to coordinate efforts

  • Scheduled, coordinated, and implemented work orders using strict change processes

  • Worked remotely in Austin with team in Detroit – 3+ times traveled to Detroit

  • Reviewed, maintained, and updated network diagrams and documentation

  • Assisted NOC with escalated data center related incidents

  • Created and emailed daily metric reports on incidents


General Motors

Network Operations Engineer

06/2013 - 05/2014

  • Worked in Network Operations Center (NOC) responding to global GM network incidents and trouble tickets

  • Troubleshooting Cisco Nexus devices in GM’s redundant data centers

  • Troubleshooting Cisco iOS switches and routers

  • Troubleshooting Cisco wireless LAN controllers (WLCs) and LWAPs

  • Troubleshooting F5 load balancers, Checkpoint firewalls, Bluecoat proxies

  • Performed packet captures using Wireshark on host machines

  • Created and implemented data center network changes

  • Collaborated and worked with remote teams daily - Texas, Michigan, and Brazil teams

  • First member of Austin team and responsible for training two employees

  • Interacted with and engaged vendors such as Cisco, TCS, ATT, F5, Checkpoint

  • Utilized HP tools such as ITSM, NA, BSM, and NNMi

  • Assisted L1s with monitoring, incidents, and technical help


Seminole Electric Cooperative

System Operations Intern

05/2012 - 05/2013

 

  • Worked with cross-functional team supporting network infrastructure and servers

  • Assisted with rule creation and monitoring of Cisco ASAs

  • Performed changes on Cisco Catalyst iOS switches

  • Worked in the lab with Checkpoint firewalls

  • Participated in security audit to meet NERC CIP requirements

  • Security audit included open port scanning, analyzing firewall rules, analyzing running services and user accounts

  • Installed network taps and spanned switch ports to perform packet captures

  • Built log collection server to collect and monitor Windows Event Logs and Syslogs

  • Microsoft Windows and third party patching

  • Troubleshooting and maintaining computers and servers

  • Troubleshooting and maintaining SCADA system databases and OSI SCADA software