From:                              route@monster.com

Sent:                               Friday, September 30, 2016 12:53 PM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: CCVP SIP Cloud

 

This resume has been forwarded to you at the request of Monster User xapeix03

Mathias Mulumba 

Last updated:  06/15/15

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Westmount, QC  H3Y2X6
CA

Home: (949) 424-6680   
mmulumba@lanwanprofessional.com
Contact Preference:  Telephone

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Mathias's Resume

Resume Value: tfed84vaunk3taia   

  

 

Mathias Mulumba

MMulumba@lanwanprofessional.com | (949) 424–6680

Summary

·   IT professional with over 15 years of experience in design, engineering, senior administration, implementation, network monitoring and management, project/change management analysis, testing, escalation support, documentation, configuration and troubleshooting for various network technologies for medium to global enterprise environments which includes proficiency in routing protocols (BGP, RIP, OSPF, EIGRP), switching, voice (VOIP), wireless, data center technologies and firewall management (ASA).

·   Proven strength in LAN design, implementation and administration with know-how in WAN, messaging systems, overseeing the troubleshooting, configuring, architectural design and re-engineering of infrastructure environments; security, routing/switching, multicasting, remote access, VoIP, and firewall solutions.

·  Organized, take-charge professional with exceptional follow-through abilities and detail orientation; skilled in planning and overseeing projects from inception to successful completion in a timely and proficient manner.

 

Technical Certifications & Skill sets

§ Cisco Certified Network Professional – Routing/SwitchingCCNP – R&S

§ Cisco Certified Voice ProfessionalCCVP

§ Certified WAN ProfessionalCWP

§ Certified WAN Enterprise AdministratorCWEA

§ Cisco Security Administrator / Data Center AdministratorCSA / CDCA

§ Cisco Wireless TechnicianCWT

§ Cisco Certified Network Associate – Routing/SwitchingCCNA – R/S

§ Master Certified Novell EngineerMCNE

§ Microsoft Certified Systems EngineerMCSE

§ Microsoft Certified Professional + InternetMCPI

§ Certified Novell EngineerCNE

§ Internet Security Management with Border ManagerISMBM

§ TCP/IP for Networking ProfessionalsNPTCP/IP

 

Technical Skills Detail

Routing/Switching Products - Cisco Routers (3900, 2900, 1900, 800 Series), Cisco Catalyst Switch (6500, 5500, 4900, 4500, 3750, 3560-X, 3100), HP Routers (8800/6800/6600), Alcatel/Lucent Multilayer Switches (OmniSwitch 10K, 6800), Alcatel/Lucent Routers (7750/7705/7450 WAN Core), HP Branch Routers (MSR4000/3000/2000/1000/ 900/50/30), OmniAccess ESR, HP Multilayer Campus/SM Switches (5500EI/HI, 5400Rzl2, 3500, 2900, 1900)

Routing Protocols & Standards - WAN, LAN, TCP/IP, Spanning Tree, BPDU, CDP, ACL, NAT, PAT, RIP, RIPv2, OSPF, OSPFv6, EIGRP, BGP, MPLS, VTP, SNMP, SMTP, ARP, TCP, UDP, Static Routing, Stub Routing, VLAN, VLAN Trunking, VXLANs, multicast routing, HSRP,  SVI, CEF, Etherchannel, Portfast,. VSS, vPC.             

Data Center Technologies - Products - Cisco Nexus 1kv, 2k, 5k, 7K & 9k Series, Cisco Catalyst Switch 6500, Cisco Routers 3900, HP Multilayer Core Switches (12900/11900/7900), Juniper (QFabric System, QFX 3000 Series), Alcatel/Lucent Multilayer Switches (OmniSwitch 10K, 6800), VMware VSphere, VCenter Server Appliance, VMware ESXi Hypervisor, F5 Big-IP load balancing (GTM/LTM), Cisco AnyConnect VPN management, Riverbed WAN Optimization device management, Cisco IPS/IDS, Meraki cloud based, Rackspace private cloud or public network cloud, 10G/40G Ethernet, FCoE, SAN, Port-channels, VXLANs, vPC Port-Profiles, Routing Profiles, and Service Profiles, SFP+, NAS, RDX, DB

Security/Firewalls Technologies - Cisco Security Manager Suite, Cisco ASA 5500 series firewalls, Cisco FWSM, Cisco IPS/IDS, Cisco ACS, Fortinet, checkpoint, Advanced Firewall Manager (AFM), BlueCoat /policy, Sonic Wall Router/Firewall combos, Cisco ASA 1000V cloud firewall, Juniper vSRX &SRX series, Protocols & Standards - AAA, TACACS+, RADIUS, SSH, VPN, IPsec, SSL/IPSec, Data Loss Prevention, IPSec, Data Management Zone, Pretty Good Protection (PGP), Public Key Infrastructure (PKI),  Internet Key Exchange Policy, Port Security, MAC Address Filtering

Voice/Wireless Technologies - Products -Cisco WLC, Aironet, Bluetooth, CUCM, UCCM, UCCX, Avaya AURA Communication Manager, Avaya Definity, Avaya IP Office, Protocols & Standards - VoIP, VoIP/SIP, MGCP, RTP, SCCP, SRTP, QoS, PoE, IEEE 802.1x & 802.11, WLAN, WAP, AP, SSID, LWAPP, CSMA/CA, MMDS, LMDS, CCK, DSSS

Monitoring/APPS - Zenoss, Finisar, Wireshark, Remedy, OpNet, Cacti, Nagios, VMware, Solarwinds, Riverbed, Cisco Works, LogicMonitor, Cisco Security Manager Suite, Server, Sniffer, Ethereal, Solarwinds, SNMPv2c, SNMPv3, RMON, Syslog, tcpdump, DNS, DHCP, FTP, Telnet, HTTP(S), SMTP, tunneling protocols, point-to-point, SFTP

Network Apps, Languages, Messaging Systems - ArcServe, Veritas, NT Backup, Altris, Ghost, MS Visio Pro, Visual C++, Visual Basic, Java, Clipper, dBASE, SAS, Epi Info, SPSS, Novell NetWare 4.11/5.0, Windows 95/98/NT/XP/2000/2003, OS2, Macintosh, satellite links, Unity/Connection/Express, GroupWise 4.1/5.5, Microsoft, Exchange 5.5/2000/2003, Outlook.

 

Education

Certified WAN Professional ProgramLANWAN Professional

Bachelor of Statiistics (Major in Data Processing, Systems Analysis & Design, & Advanced Programming)Makerere University
Professional Experience Detail

Canadian Financial Consultant, Inc.Network Systems Manager (DPM)2012-2014

Company Overview – Canadian Financial Consultant is a Canadian based company who works in financial engineering and real estate development. Responsibilities handled:

·   Responsible for senior administration, software updates/development, hardware implementation/upgrades, documentation/change management and troubleshooting for various networking technologies.

·   Technologies handled include routers, switches, WAN infrastructure, and various network based applications.

·   Additional responsibilities included client /vendor relationships, verbal and written communications with management, technical and not technical staff and task and project management to name a few.

 

Certifications2006-2010

·   Studied and worked on upgrading my CCNA – Routing & Switching, and acquired CCVP and CCNP –  Routing & Switching Cisco Certifications.  This was accomplished by self study and using the Cisco official study materials.

 

Corporate NetworksNetwork Support Analyst2005-2005

Company Overview – Corporate Networks is located in Fort McMurray who delivers the ideal technology solutions to Alberta businesses through our combination of knowledge, service and experience. They offer Surric, their managed cloud platform, voice over IP telephone systems cost-effectively connect co-workers, office, partners and customer with rich features and superior uptime.  Responsibilities handled:

·   Member to a team responsible for 1st and 2nd tier network support and management, design, configuration, installation and troubleshooting, documentation, providing strategies, testing and implementation for various LAN/WAN network infrastructures which include  but not limited to Cisco switches, PIX firewalls, Cisco routers,.

·   Additional technologies handled include but not limited to servers and network enterprise applications.

·   Professional responsibilities included maintenance, support, administration, and following corporate policies and procedures.

 

 

Department of International Development (DFID)IT Manager/IT Network Supervisor1999-2005

Company Overview –  DFID in Uganda funds many organizations who are working to end poverty through open competition.   Their top priorities are to improve the quality of essential services and protecting the most vulnerable, and increasing growth through investment in infrastructure, financial services, business development and trade.  Responsibilities handled:

·   Manager to a team of professionals responsible for the day-to-day support, installed, upgraded, merged, and troubleshooting activities for various LAN/WAN infrastructures.

·   Technologies handled by the team include but not limited to maintenance of the IT infrastructure to include onsite network operations and system integrity, hardware and software specs, backups, disaster recovery, cabling installation, server racks, patch cabling, optimized space usage, for various enterprises including VPN link, wireless carrier segment to the internet, point-to-point satellite links, voice and central power supply.

·   Special projects included replacing all the hubs with switches that ensured operational efficiency and optimal utilization of LAN bandwidth, networked all printers and photocopiers, and replaced firewall servers to BorderWare firewalls.

·   Professional responsibilities included mentor, IT budget, IT contracts, drafting and updating IT Service Level Agreement, IT Recovery Plan, documentation and retention.

·   Supervised a professional technical team responsible for support, analysis, implementation, workarounds, training, backups, and data recovery and implementing and maintaining IT security for various IT infrastructures.

 

 

Aid Liaison Department, Ministry of FinanceAdvisor, Data Management1999-1999

Company Overview – The Ministry of Finance Uganda is responsible for the supervision of the overall financial affairs and budgeting policies for the Republic of Uganda.   The principal objective of the Finance Ministry of Uganda is to build a healthy and strong Uganda with the help of steady economic and financial growth.  Responsibilities handled:

·   Supervised the transfer of Information Technologies resources between client and vendors.

·   Lead for professional projects that included but not limited to client /vendor’s relationships, corporate standards, change management and implementation to systems and network environments.

 

 

 


Summary of Technical Accomplishments

 

Routing & Nexus & Catalyst Switching

·               Configure trunk ports and implement granular control of VLANs and VXLANs using NX-OS to ensure virtual and flexible subnets that can extend further across the network infrastructure than previous generation of switches.

·               Configure port-profiles as part of the NX-OS command structure that allows for configuration of multiple ports and port-types via inherited configurations applied via a single command that reduces administrative error and allows for better configuration readability.

·               Integrate a virtual version of Nexus: Nexus1000v into VMWare to extend Nexus capabilities directly adjacent to virtual machines so that they benefit from Cisco switching capabilities and network topology consistency ensuring VMs maintain their subnet/VLAN relationships during failover.

·               Configure secure privileged administrative access to the Cisco IOS system.  Enable the encryption of system passwords to prevent unauthorized users access to passwords in the system configuration.

·               Configure secure access to the console and vty ports, and set the interval that the EXEC command interpreter waits until user input is detected on the Console and vty ports.  Also, configure the console and vty ports log messaging to not interfere with active device configuration.

·               Configured and administrated VLAN Trucking Protocol to reduce administrative overhead.  Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switches ports following Layer 2 security best practices. 

·               Administrated Local VLANs based on department function, and configure ports with static VLAN assignment, static 802.1Q trunks, and dynamic ISL trucking using Pap for layer 2 forwarding.  Utilize VLAN Spanning-Tree in conjunction with PVST+ for compatibility between Cisco and Juniper switches.  Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.  Modify spanning-tree parameters for manual root bridge assignment.  Implement ether-channels between each switch using Pap for negotiation.  Modify ether-channel load balancing method.

·               Integrated WAN links between sites using frame-relay point-to-point and multipoint connections to establish connectivity between each of the four sites as required.  Establish two frame-relay point-to-point connections between a central site and two remote sites.  Configured multipoint connections between three of the sites forming a full-mesh.

·               Configured EIGRP MD5 Message Authentication between sites to prevent unauthorized insertion of routes into the domain.  Integrate manual EIGRP route summarization to reduce routing protocol demand on CPU resources, memory, and bandwidth used to maintain the routing table. 

·               Configure and administrated OSPF routing with multiple areas for networks between sites.  Implement OSPF MD5 Authentication between each OSPF enabled subnet to prevent unauthorized insertion of routes into the domain. 

·               Integrated static NAT/PAT to provide access to services located on a server in the private network to the public network.  Implement standard and extended access-lists to filter network traffic.

·               Configured backup and recovery of Cisco IOS Images.  Perform password recovery on Cisco IOS routers/switches and a Juniper EX2200 Series switch to restore administrative access.  Backup and Restore startup-comfit file for disaster recovery.

 

 

Security

·               Configured and administrated an IPSec Site-to-Site VPN between the Cisco ASA5505 at small office location and Cisco 1841 ISR with a security IOS image at the main office.  Implementation of the VPN includes the following configurations:  Internet Key Exchange Policy using DES and SHA for encryption and authentication, access-lists to define VPN traffic, transform set using esp.-des esp-sha-hmac to define how the traffic is protected, crypto-map to associate the previously configured elements to a peer, and application of the crypto map to appropriate interface or VPN endpoint. 

·               Configured and administrated Zone-Based Policy Firewall on the Cisco 1841 ISR with the following components:  three zones, class-maps specifying traffic that must have policy applied as it crosses a zone-pair, policy maps to apply action to the class-maps’ traffic, zone-pairs, and application of policy to zone pairs.

 

 

Voice

·               Configure Cisco 2811 ISR (VoIP) with a Cisco Unity Express Network Module (NM-CUE) installed, Cisco Communications Manager Express, a standard Cisco 3550 Switch, and a Cisco 3550 switch with Power-over-Ethernet.  Create and manage Data and Voice VLANs, and configure ports with static VLAN assignment and 802.1Q trunks for layer 2 forwarding.  Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.

·               Configure Fast Ethernet main and sub-interface assignments as required for intervlan routing.  Implement static routes for local connectivity.  Configured NTP server, DHCP server, and TFTP server for support of the VoIP network.  Modification of system level parameters including max phones, max directory numbers, display format for date and time, and setting the Time-Zone. 

·               Integrate Unity Voicemail on the Cisco Unity Express Network Module.  Configure a dial-peer on the Cisco 2811 ISR to define the attributes of the packet voice network connection to the Cisco Unity Express Network Module.  Enable call forwarding on busy or no answer.  Implement Message Waiting Indicators and Voicemail access via SMTP.  Daisy-chain PCs to VoIP phones to reduce network cabling costs.  Utilize PoE ports for VoIP phones to reduce power infrastructure costs.

 

 

Wireless

·               Administrated a wireless network infrastructure providing access to wired LANs to increase mobility and productivity utilizing the following network elements:  Cisco Wireless LAN Controller (WLC) 2106, a Cisco 3550 switch, a Cisco 1130AG series Access Point, and a Cisco 1121G series Access Point.  Create wireless LANs and configure interface association, security parameters, and radios used.  Utilize the Wireless LAN Controllers web GUI to configure and manage the wireless network.  Configure internal DHCP scopes for WLANs. 

·               Prepare configuration for AP registration on same subnet as management VLAN and for AP registration on different subnet.  Implement option 43 for DHCP where necessary.  Configure AAA AP policies to allow Self Signed Certifications for APs shipped without a Manufacturer Installed Certificate. Implement AP Grouping to ensure WLAN SSIDs are only broadcast by the APs desired.

 

 

Data Center 

·               Set up VLANs and access ports connecting virtual machines using the NX-OS CLI on a Cisco Nexus 1000v virtual machine and VMWare vSphere Client networking. 

·               Configured routing policies and service profiles for separate levels in an organizational hierarchy using a Cisco Prime Network Services Controller virtual machine.  These policies and profiles were applied to Cisco Cloud Service Router 1000v (CSR 1000v) virtual routers.

·               Configured a CSR 1000v router using the Cisco IOS 15.4 CLI.

 

 



Additional Info

BACK TO TOP

 

Current Career Level:

Manager (Manager/Supervisor of Staff)

Work Status:

Canada - I am authorized to work in this country for any employer.
US - I am authorized to work in this country for any employer.

 

 

Target Company:

Company Size:

 

Target Locations:

Selected Locations:

Canada-QC-Montreal
US