From: route@monster.com
Sent: Friday, September 30, 2016 12:52 PM
To: hg@apeironinc.com
Subject: Please review this candidate for: CCVP SIP Cloud
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
Mathias Mulumba mmlanwan@gmail.com | (949) 424–6680 Summary IT professional
with over 15 years of proven experience in design, engineering,
configuration, implementation, troubleshooting, network monitoring and
management, project/change management, analysis, 2nd/3rd tier escalation support for various network technologies from medium
to global enterprise environments which includes proficiency in
routing/switching protocols & technologies, security (firewalls, IPS,
VPN), voice (VoIP), wireless, multicast, messaging systems and enterprise
applications. Technical Certifications & Skill sets §
Cisco Certified
Design ProfessionalCCDP §
Cisco Certified
Network Professional – Routing/SwitchingCCNP – R&S §
Cisco Security
Implementation/Integration EngineerCSIIE §
Certified WAN
ProfessionalCWP §
Microsoft
Certified Systems Engineer / Microsoft Certified Professional + InternetMCSE
/ MCP + I §
Cisco Certified
Voice ProfessionalCCVP §
Master
Certified Novell Engineer / Certified Novel EngineerMCNE / CNE §
Data Center
Administrator/Cisco Wireless TechnicianDCA/CWT §
Cisco Certified
Network Associate - Routing/SwitchingCCNA – R/S §
Internet
Security Management with Border ManagerISMBM Technical
Skills Detail Routing/Switching
Products - Cisco Routers (4000/3900/2900/2800/1900/800 ISR,
ASR 1k & 9k Series, CRS-1/CRS-3), Cisco Catalyst Switch (6500, 5500,
4900, 4500, 3750, 3560-X, 3100), Cisco Nexus 1kv, 2k, 5k, 7k & 9k Series,
Juniper Routers & Switches, HP Routers & Switches, Alcatel/Lucent
Routers & Switches (OA 5800/5700 ESR, 7750/7705/7450 SR, OS10k/9000
Series/6900/6860/e). Routing/Switching
Protocols & Standards –LAN Technologies
-IPv4/v6, Spanning Tree, CDP, Access/Prefix/Distribution/Offset lists,
NAT/PAT, Route-maps, RIPv1/v2/ng, OSPFv2/v3, MOSPF, EIGRP/v6, BGP/MBGP,
IS-IS, MPLS, ARP, NHRP, Static/Stub Routing, VLAN/VTP, MVRP, PIM-SM/DM, MSDP,
FHRPs (HSRP/VRRP/GLBP), CEF, VSS, WAN Technologies - Frame Relay, PPP,
Satellite links, T1, T3, E1, E3, OC3, OC12, OC48, DS3. Security/Firewalls
Technologies - Cisco Security Manager Suite, Cisco ASA 5500
series firewalls, Cisco FWSM, Cisco IPS/IDS, Cisco ACS, Fortinet, Checkpoint,
Advanced Firewall Manager (AFM), BlueCoat /policy, Sonic Wall Router/Firewall
combos, Cisco ASA 1000v, Cisco PIX firewall, Palo Alto, cloud firewall,
Juniper vSRX & SRX series, Protocols & Standards – IEEE
802.1x, AAA, TACACS+, RADIUS, SSH, SSL/IPsec L2/L3 VPNs, DMVPN, VPLS,
FlexVPN, Data Loss Prevention, Data Management Zone, Pretty Good Protection
(PGP), Public Key Infrastructure (PKI), Internet Key Exchange Policy,
Port Security, MAC Address Filtering. Data Center
Technologies - VMware vSphere, vCenter Server Appliance, VMware
ESXi Hypervisor, VMware NSX, F5 BIG-IP/Cisco ACE Load Balancers, Cisco
AnyConnect VPN management, Riverbed WAN Optimization device management,
Meraki cloud based, FCoE, SAN, LACP, PortChannels/EtherChannels, ECMP, Cisco
OTV/VXLAN, vPC, Routing and Service Profiles, VDC, Cisco Prime, Cisco UCS,
NAS/iSCSI, RDX, DB, UDLD, DWDM, Sire Recovery Manager (SRM), NetApp
FlexCache, OpenStack, CloudStack. Voice/Wireless
Technologies – Products - Cisco WLC, Aironet, Bluetooth,
Unity/Connection/Express, GroupWise 4.1/5.5, Microsoft Exchange, IP-to-IP
Gateway, Avaya AURA Communication Manager, Cisco Voice Gateways/Gatekeepers,
Avaya, Protocols - SIP, MGCP, RTP, SCCP, H.323, SRTP, QoS, SRST,
PoE, IEEE 802.11, EAP, WLAN, WAP, AP, SSID, LWAPP, CSMA/CA, MMDS, LMDS, CCK,
DSSS. Monitoring/APPS - Zenoss, Finisar, Wireshark, PRTG Network Monitor, Cacti, Nagios,
Solarwinds, Remedy, OpNet, Riverbed, Cisco Works, LogicMonitor Sniffer,
Ethereal, SNMPv1/v2c/v3, RMON, Syslog, tcpdump, DNS, DHCP, FTP, Telnet,
HTTP(S), SMTP, SFTP, sFlow, Spirent, NetFlow, EOAM. Network
Apps/Languages - ArcServe, Veritas, NT Backup, Altris, Ghost, MS
Visio Pro, Netformx, Visual C++, Visual Basic, Java, Clipper, dBASE, SAS, Epi
Info, SPSS, Novell NetWare 4.11/5.0, Windows NT/2000/2003/ 2008, OS2, SR-OS,
Macintosh, CatOS/IOS/IOS-XE/IOS-XR/NX-OS, JunOS. Summary
of Professional Experience LAN/WAN
ProfessionalNetwork Consultant2014 - Present Canadian Financial
Consultant, Inc.Network Systems Manager2012 - 2014 Corporate NetworksNetwork
Support Analyst2005 - 2011 Dept. of
International DevelopmentIT Manager (Networks)1999 – 2005 Education Bachelor of
Statistics (Major in Systems Analysis & Design, & Advanced
Programming)Makerere University Professional Experience Detail LAN WAN
ProfessionalNetwork Consultant2014-Present Company Overview – LAN WAN Professional is a nationwide technology services
organization that consists of LAN/WAN Professionals including administrators,
engineers, consultants, analysts, and architects located throughout the
continental United States. Responsibilities handled: · Technical responsibilities included, but are not limited
to the configuration, installation, design and implementation, analysis,
testing and troubleshooting for large scale LAN /WAN network infrastructures
including network components with routers and switches, security (firewalls),
wireless, voice and datacenter technologies. · Key technologies regularly handled include but not limited
to various routing/switching technologies and protocols, security including
firewalls, VPN and IPS, wireless, voice and network monitoring/management
applications. · Specific technologies including broad series of Cisco
routers, Catalyst and Nexus switches, Juniper routers and switches, various
firewalls including ASA series, Juniper and Palo Alto to name a few. · Additional activities included configuration
review/validation/edits site assessments/analysis, new technologies review,
business and technical needs analysis and recommendations. Canadian Financial
Consultant, Inc.Network Systems Manager 2012-2014 Company Overview –
Canadian Financial Consultant is a Canadian based
company who works in financial engineering and real estate development. Responsibilities
handled: · Responsible for senior administration, software
updates/development, hardware implementation/upgrades, documentation/change
management and troubleshooting for various networking technologies. · Technologies handled include routers, switches, WAN
infrastructure, and various network based applications. · Additional responsibilities included client /vendor
relationships, verbal and written communications with management, technical
and non-technical staff, and task and project management, to name a few. Corporate
Networks/ContractsNetwork Support Analyst2005-2011 Company Overview – Corporate Networks, located in Fort McMurray, delivers the ideal
technology solutions to Alberta businesses through a combination of
knowledge, service and experience. They offer Surric, their managed
cloud platform, and voice over IP telephone systems cost-effectively connect
co-workers, office, partners and customer with rich features and superior
uptime. Responsibilities handled: · Member to a team responsible for tier 1st and 2nd network
support and management, design, configuration, installation and
troubleshooting, documentation, providing strategies, testing and
implementation for various LAN/WAN network infrastructures which
include but not limited to Cisco routers, Cisco switches, and PIX
firewalls. · Additional technologies handled include but not limited to
servers, network enterprise applications and routing protocols – IS-IS, MPLS
and BGP. · Professional responsibilities included maintenance,
administration, and following corporate policies and procedures. Department of
International Development (DFID)IT Manager (Networks)1999-2005 Company Overview – DFID funds many organizations working to end poverty through open
competition. Their top priorities are to improve the quality of essential
services, protect the most vulnerable, and increase growth through investment
in infrastructure, financial services, business development and trade.
Responsibilities handled: · Managed and supervised a team of professionals responsible
for the day-to-day support, workarounds, maintaining IT security, and
installed, upgraded, merged, and handled troubleshooting activities for
various LAN/WAN infrastructures. · Technologies handled by the team include but not limited
to maintenance of the onsite IT infrastructure network operations and system
integrity, hardware and software specs, backups, disaster/data recovery,
cabling installation, server racks, patch cabling, optimized space usage, VPN
link, wireless carrier segment to the internet, point-to-point satellite
links, voice and central power supply. · Special projects included replacing all the hubs with
switches that ensured operational efficiency and optimal utilization of LAN
bandwidth, networked all printers and photocopiers, installed and maintained
video conferencing equipment, replaced CyberGuard and BorderManager firewall
servers with BorderWare firewall, and finally with Checkpoint firewall. · Professional responsibilities included mentor, training,
drafting and updating IT contracts, IT budgets and Service Level Agreement,
IT Recovery Plan, documentation and retention. Summary
of Technical Accomplishments Routing, Nexus & Legacy Catalyst Switching ·
Configured
trunk and access ports, and implemented granular control of VLANs and VXLANs
using NX-OS to ensure virtual and flexible subnets that can extend further
across the network infrastructure than with previous generation of switches. ·
Integrated a
virtual version of Nexus: Nexus1000v virtual supervisor module (VSM) into the
VMware vSphere 5.5 platform to extend Nexus features directly adjacent to
virtual machines (VMs) so that they benefit from Cisco switching capabilities
and network topology consistency ensuring VMs maintain their subnet/VLAN
relationships during failover. ·
Configured
port-profiles as part of the NX-OS command structure that were dynamically
made available to the virtual ethernet modules (VEMs) controlled by the VSM
and applied to multiple virtual and physical interfaces via a single command
that reduces administrative error and allows for better configuration
readability. ·
Configured
secure privileged administrative access to the Cisco IOS system.
Enabled the encryption of system passwords to prevent unauthorized users
access to passwords in the system configuration. ·
Configured
secure access to the console and vty ports, and set the interval that the
EXEC command interpreter waits until user input is detected on the Console
and vty ports. Also, configured the console and vty ports log messaging
to not interfere with active device configuration. ·
Configured and
administered VLAN Trucking Protocol (VTP) to reduce administrative
overhead. Enabled secure sharing of VLAN information to prevent the
introduction of rogue devices from affecting the VLAN database. Shutdown
unused ports on the switches following Layer 2 security best practices. ·
Administered
Local VLANs based on department function, and configured ports with static
VLAN assignment, static 802.1Q trunks, and dynamic ISL trucking using Pap for
layer 2 forwarding. Utilized VLAN Spanning-Tree in conjunction with
PVST+ for compatibility between Cisco and Juniper switches. Configured
edge ports for fast-transitioning into the forwarding state to fix
workstation startup connectivity delays. Modified spanning-tree
parameters for manual root bridge assignment. Implemented
ether-channels between each switch using Pap for negotiation. Modified
ether-channel load balancing method. ·
Integrated WAN
links between sites using frame-relay point-to-point and multipoint
connections to establish connectivity between each of the four sites as
required. Established two frame-relay point-to-point connections
between a central site and two remote sites. Configured multipoint
connections between three of the sites forming a full-mesh. ·
Configured
EIGRP MD5 Message Authentication between sites to prevent unauthorized
insertion of routes into the domain. Integrated manual EIGRP route
summarization to reduce routing protocol demand on CPU resources, memory, and
bandwidth used to maintain the routing table. ·
Configured and
administered OSPF routing with multiple areas for networks between
sites. Implemented OSPF MD5 Authentication between each OSPF enabled
subnet to prevent unauthorized insertion of routes into the domain. ·
Configured and
administered MPLS VPN for a tier II service provider core/backbone to connect
customer sites. Configured routers in the provider core to authenticate
via LDP MD5 and provide protection against spoofed TCP segments that could be
introduced into the connection streams for LDP sessions. ·
Integrated
static NAT/PAT to provide access to services located on a server in the
private network to the public network. Implemented standard and
extended access-lists to filter network traffic. ·
Configured
backup and recovery of Cisco IOS Images. Performed password recovery on
Cisco IOS routers/switches and a Juniper EX2200 Series switch to restore
administrative access. Backup and Restore startup-config file for
disaster recovery. ·
Designed and
implemented hierarchical NTP in a symmetric active mode with authoritative
time sources and servers, time zones, and prevented accidental or malicious
setting of incorrect time using both the encrypted authentication mechanism
and a time-based access restriction scheme. ·
Configured HSRP
and GLBP and load-shared traffic on the 3640 routers in the core. Implemented
the more secure MD5 authentication to prevent unexpected devices from
spoofing or participating in the FHRP groups. Configured interface tracking
along with preemption to monitor and respectively alter the priority of the
routers. ·
Configured a
Cisco 2500 series router with async ports as an access server, set up a
management network utilizing a computer, access server and switch, which in
turn was used to configure IP addressing, VLANs, access ports, trunk ports,
STP, dynamic and default routing in a multi-vendor environment consisting of
Juniper, Cisco and HP devices. Security ·
Configured and
administered an IPsec Site-to-Site VPN between the Cisco ASA5505 SSL/IPsec
VPN Edition at small office location and Cisco 1841 ISR (with a security IOS
image) at the main office. Implementation of the VPN includes the
following configurations: Internet Key Exchange Policy using DES and
SHA for encryption and authentication; access-lists to define VPN traffic;
transform set using esp-des esp-sha-hmac to define how the traffic is
protected; crypto-map to associate the previously configured elements to a
peer; application of the crypto map to appropriate interface or VPN endpoint.
·
Configured and
administered Zone-Based Policy Firewall on the Cisco 1841 ISR with the
following components: three zones (DMZ, PUBLIC, INTERNAL); class-maps
specifying traffic that must have policy applied as it crosses a zone-pair;
policy maps to apply action to the class-maps’ traffic; application of policy
to zone pairs. ·
Analysed and
deployed DMVPN using Phase 1 Hub-Spoke NHRP over mGRE/GRE tunnels as well as
Phase 3 NHRP, along with IPsec encrypted tunnels using IKEv1 and IKEv2.
Evaluated and implemented FlexVPN using the required IPsec and IKEv2,
including migration from previous Phase 3 DMVPN deployment on later
generation x9 series routers and universal IOS with required feature
licenses. ·
Determined
requirements, configured and deployed a pair of high availability F5 BIG-IP
devices using LTM via a GUI and CLI to provide a virtual web server utilizing
round-robin selection to balance and control traffic on several web servers,
and secured F5 BIG-IP functionality through a HA pair of ASA 5510 firewalls
utilizing proper filtering and failover. ·
Implemented and
tuned management capabilities and basic security features related to PA-2020
security appliance using PAN-OS 6 including SSH and WebGUI access, custom
rules, virtual-wire and routed interfaces, trust/untrust and DMZ zones along
with logging and auditing. ·
Recommended and
deployed, on many network devices, SNMPv3/Syslog/NetFlow to track status,
usage, changes and traffic patterns for better analysis and decision making. ·
Deployed AAA
solutions using RADIUS for centralized authentication and authorization.
TACACS+ was also deployed when preferred by the client. 802.1 x port-based
authentications were typically utilized to restrict VLAN access when AAA was
implemented. ·
Deployed high
availability ASA 5500 series firewalls using modular policy framework to
manage multilayer service policies, including inspection and connection
limits, HTTP download, and anti-virus filtering. IPS features including
IPLog, targeted traffic filtering as well as advanced TCP intercept and
scanning threat detection were commonly deployed as needed. ·
Configures
ISAKMP/IKE, IPsec, and a site-to-site VPN on JunOS and Cisco devices between
the branch and regional office, configured dynamic source network access
translation on the Juniper and Cisco routers, set up chassis clustering and
IDS screens on the Juniper firewalls, allowed protocols and services through
the zone-based firewall on JunOS devices along with configuring zone-based
firewalls on the Cisco devices. ·
Performed password
recovery on Cisco ASA 5505, and then restored it to the factory default
setting. ·
Performed
password recovery, cleared the configuration and set up base configurations
on the Juniper SRX210 firewalls. Voice ·
Configured
Cisco 2811 ISR (VoIP) with a Cisco Unity Express Network Module (NM-CUE)
installed, Cisco Communications Manager Express, a standard Cisco 3550
Switch, and a Cisco 3550 switch with Power-over-Ethernet. Created and
managed Data and Voice VLANs, and configured ports with static VLAN
assignment and 802.1Q trunks for layer 2 forwarding. Configured edge
ports for fast-transitioning into the forwarding state to fix workstation
startup connectivity delays. ·
Configured Fast
Ethernet main and sub-interface assignments as required for inter-vlan
routing. Implemented static routes for local connectivity.
Configured NTP server, DHCP server, and TFTP server for support of the VoIP
network. Modification of system level parameters including max phones,
max directory numbers, display format for date and time, and setting the
Time-Zone. ·
Integrated
Unity Voicemail on the Cisco Unity Express Network Module. Configured a
dial-peer on the Cisco 2811 ISR to define the attributes of the packet voice
network connection to the Cisco Unity Express Network Module. Enabled
call forwarding on busy or no answer. Implemented Message Waiting
Indicators and Voicemail access via SMTP. Daisy-chain PCs to VoIP
phones to reduce network cabling costs. Utilized PoE ports for VoIP
phones to reduce power infrastructure costs. Data Center. ·
Upgraded the
ASR 9912 and 9006 aggregation service routers from IOS-XR release 4.2.3 to
4.3.0, and used the cluster in network virtualization (nV) as the
edge/aggregation node with the ASR 903 as the pre-agg router and the ASR 901
as the cell site router, supporting both Ethernet and E1/T1 ports. The labour
saving features include: single virtual entity management; one-click
software upgrades; integrated analytics offering traffic generation and
reporting capabilities to reduce network care work without using an external
platform. ·
Segmented
virtual machine (VM) networks spanning multiple virtual Ethernet modules
(VEMs) and maintained connectivity between them using the following
configurations: Enabled the VXLAN feature on the Cisco Nexus 1000v virtual
supervisor machine (VSM), configured a port-profile for the VXLAN tunnel
endpoints (VTEPs), created a VTEP VMkernel virtual interface on the VMware
ESXi hosts to implement the encapsulation from the VTEP port-profile,
configured the VXLANs, configured port-profiles for the VXLANs, changed the
network connections for the VMs to use the correct VXLANs, and inspected the
configurations on the Nexus 1000v VSM. ·
Successfully
recovered the Cisco Nexus 5020 switches from a forgotten password and cleared
the startup configurations, implemented VSS on the Cisco 6509 switches to
provide high availability and Multichassis EtherChannel (MEC) connectivity,
setup a port-channel to the Nexus 2148 Fabric Extenders (FEX) to allow
zero-touch provisioning and automatic configuration, and configured a virtual
PortChannel (vPC) on the Cisco Nexus 5020 switches for Layer 2 and Layer 3
connectivity. ·
Solution
engineered two Cisco Nexus C9508 spines, two Cisco Nexus 9396PX leaves, two
VMware ESXi 5.1.0 servers, a standalone bare metal server, and a Cisco ASA
5510 into the existing infrastructure using the following configurations:
Setup the DMZ, vMotion, Internal and External VLANs, trunking and IP
addressing on the leaf switches; Enabled PIM-SM in the transport network and
EIGRP in the control plane for optimal routing of traffic and equal-cost
multipathing (ECMP) in the fabric between the leaf and spine switches; Setup
a vPC for server NIC teaming between the leaves; Enabled VXLAN overlays on
the leaf switches to provide Layer 2 reachability over the underlying Layer 3
infrastructure; Setup secured subinterfaces on the Cisco ASA firewall
appliance as default gateways for the DMZ, Internal and External VLAN web
servers; Installed the Cisco Prime Data Center Network Manager (DCNM) tool to
allow centralized management of all Cisco Nexus 9k switches and Cisco UCS
C-Series servers. ·
Integrated two
data centers using the Cisco overlay transport virtualization (OTV) feature
that included the following configurations: Two Cisco Nexus 7706 switches and
two ASR 1013 routers as the aggregation devices in the respective data
centers; Two Cisco Nexus 7009 switches and two ASR 1006 routers as the OTV
devices in the respective data centers; Configured Internal Interfaces using
F2e line cards to learn MAC address of the site and forward Layer 2 traffic
across the sites for the VLANs that needed to be extended to remote data
center locations; Configured Join Interfaces using M2 modules, as a PortChannel,
to provide redundancy, source OTV encapsulated traffic and perform IP-based
virtualization to send and receive overlay traffic between the sites and also
advertise the reachability of MAC addresses present in the site; Configured
OSPF as the control protocol to provide Layer 3 connectivity and fast
convergence both within and between the two data centers; Enabled a vPC
between the OTV VDCs and the aggregation VDCs in a dual-homed scenario to
provide an extra layer of resiliency and bidirectional connectivity; Created
site VLANs to allow OTV edge devices within each site talk to each other and
determine the authoritative edge device (AED); Enabled site identifiers to
harden multihoming of OTV edge devices within each site; Configured and
associated the Overlay Interface on the OTV edge device with the Join
Interface to provide connectivity to the physical transport network to send
and receive Layer 2 frames encapsulated in IP packets; Extended the data
VLANs and the OTV site VLANs; Filtered FHRP messages across the overlay to
allow the extended VLANs to use their local HSRP gateway so as to optimize
and localize the routing of outbound traffic flows. ·
Configured
routing policies and service profiles for separate levels in an
organizational hierarchy using a Cisco Prime Network Services Controller
version 3.2 (2a) virtual machine. These policies and profiles were
applied to Cisco Cloud Service Router 1000v (CSR 1000v) version 15.4 (1)S
virtual routers. ·
Configured a
CSR 1000v router using the Cisco IOS-XE version 03.11.00.S CLI. Wireless ·
Administered a
wireless network infrastructure providing access to wired LANs to increase
mobility and productivity utilizing the following network elements:
Cisco Wireless LAN Controller (WLC) 2106, a Cisco 3550 switch, a Cisco 1130AG
series Access Point, and a Cisco 1120G series Access Point. Created
wireless LANs and configured interface association, security parameters, and
radios used. Utilized the Wireless LAN Controllers web GUI to configure
and manage the wireless network. Configured internal DHCP scopes for
WLANs. ·
Prepared
configuration for AP registration on the same subnet as management VLAN and
for AP registration on different subnet. Implemented option 43 for DHCP
where necessary. Configured AAA AP policies to allow Self Signed
Certifications for APs shipped without a Manufacturer Installed Certificate.
Implemented AP Grouping to ensure WLAN SSIDs are only broadcast by the APs
desired. Monitoring •
Used the Cisco Configuration Professional GUI to
configure interfaces, passwords, hostnames, DHCP, EIGRP, and SNMP on a Cisco
router. Used the CCP monitoring tool to monitor traffic from that
router. •
Configured the Nagios XI monitoring tool to
monitor routers and switches and customized its dashboard. •
Configured SolarWinds Orion NPM and used it to
monitor traffic on a network. •
Configured the Cacti tool to graph traffic from a
router and to generate alerts based on a threshold traffic level. •
Used the Wireshark tool to study HTTP, telnet,
and SSL traffic. ·
Used PRTG
Network Monitor to support SNMP, sFlow/NetFlow and Syslog protocols in
collecting various statistics from machines, software, and devices, and plan
for network expansion. |
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|