Senior Network Engineer
Yale University
- Designed, implemented, and managed enterprise-grade wired and wireless networks, covering LAN, WAN, campus, and branch connectivity using modern switching, routing, and security platforms.
- Strong hands-on expertise with Cisco, Juniper, Aruba (HPE), Extreme Networks, and next-generation security platforms including Palo Alto Networks and Fortinet (NGFW/UTM).
- Extensive experience with software-defined and controller-based networking, including Cisco DNA Center, Cisco ISE (NAC), and SD-WAN architectures for scalable and policy-driven network operations.
- Designed and implemented IP addressing, routing, switching, and security architectures, supporting high availability, segmentation, and secure enterprise communications.
- Deep hands-on experience configuring and troubleshooting BGP and OSPF, including enterprise and service-provider MPLS VPN expansion and migration strategies.
- Hands-on experience with VXLAN and EVPN architectures for scalable Layer-2/Layer-3 overlay networks, enabling network segmentation, multi-tenancy, and control-plane learning over IP underlay fabrics.
- Expertise in VLAN architecture and inter-VLAN routing using Layer-3 switches and firewalls, including 802.1Q trunking, SVIs, EtherChannel (LACP), and loop-prevention mechanisms such as STP/RSTP/MST.
- Strong understanding and implementation of modern Layer-2 technologies including STP, RSTP, MST, and advanced troubleshooting of spanning-tree and VLAN-related issues.
- Designed and supported MPLS VPN and QoS-based architectures to ensure traffic prioritization for business-critical applications.
- Proficient in Juniper switching and security platforms, including Junos OS and SRX firewalls, with hands-on configuration and troubleshooting.
- Hands-on experience deploying secure tunneling and VPN technologies, including:
- Site-to-Site IPsec VPN
- GRE tunnels
- DMVPN
- Policy-based and route-based VPNs
- Strong protocol knowledge across enterprise networks:
OSPF, BGP, EIGRP, HSRP, VRRP, GLBP, NAT/PAT, ACLs, VTP, SNMP, SSH, DNS, DHCP, NTP, ARP, and EtherChannel. - Implemented high-availability and redundancy designs, including gateway redundancy protocols, ISP failover using object tracking, and link aggregation for maximum uptime.
- Advanced experience with network security policies, including:
- URL/Web filtering and application control
- Department-based access control
- Content filtering and threat prevention using UTM/NGFW features
- Designed and managed NAT architectures (Static NAT, Source NAT, Destination NAT, Port Forwarding) for secure public–private network integration.
- Implemented centralized network monitoring and observability, using Syslog, SNMP, packet analysis tools, and proactive fault isolation techniques.
- Actively involved in network testing, validation, and migration planning, developing test plans and executing LAN/WAN deployment strategies with minimal downtime.
- Provided enterprise-level operational support, troubleshooting complex network issues, improving stability, and maintaining 99.99% infrastructure availability.
- Experience with modern Cisco campus platforms, including:
- Catalyst 9400 – Inter-VLAN routing, ACLs, LACP, port-based security
- Catalyst 9300 – Wireless AP integration, user-based access control
- Legacy WLC Aruba 7240 - Client monitoring and MAC-based policies and moving on Cisco 9300 WLC
- Legacy WLC environments (5508) – Client monitoring and MAC-based policies