Job Description
A financial firm is looking for a Cisco Network Engineer to join their team in Iselin, NJ.
Compensation: $135-150k
No visa candidates and MUST be local!
Responsibilities:
- Proficiency in configuring, maintaining, and troubleshooting enterprise, data center & cloud network architecture.
- Perform day-to-day operation tasks that require solving operations tickets by troubleshooting any connectivity issues.
- Adhere to strict change management process to deploy firewall rule change requests, scheduled firmware upgrades and other network build, changes, or maintenance activities.
- Participate in alert monitoring of the network infrastructure using SolarWinds, and monthly on-call rotation.
- Act as the primary contact for network incidents, perform diagnostics, and collaborate with L3 Engineering, other cross-functional teams and vendors for resolution and RCA.
- Develop and maintain operational documentation, including runbooks, network diagrams, and configuration records.
- Contribute to team KT sessions to brainstorm ideas, to foster an environment of team growth and help achieve operational excellence.
- Use troubleshooting tools and CLI commands to resolve operational issues.
Skills and Experience:
- Possess exceptional technical problem-solving skills in high-pressure scenarios, combined with strong collaboration and communication abilities.
- Solid knowledge of traditional LAN/WAN technologies including routing protocols, route redistribution, manipulation, and filtering, L2 loop avoidance, as well as datacenter clos fabric using spine-leaf architecture (Cisco ACI).
- Proven experience with deploying and troubleshooting issues related to WLAN, in a centralized (controller) as well as cloud-based model.
- In-depth experience of working in a multi-vendor firewall environment (Checkpoint, ASA, Fortinet), that involves implementing & troubleshooting firewall rule changes, NAT & VPN in a segmented network with multiple layers of firewalls.
- Good knowledge of cloud networking (AWS and Azure) components, including VPC design and hybrid connectivity.
- Familiarity with SaaS-based security and SASE architecture, Zero Trust principles.
- Familiarity with monitoring tools like SolarWinds and Dynatrace.
- Familiarity working with ServiceNow or other ticketing systems.
- Proficiency in creating technical documents, runbooks, and network diagrams.
- Prior experience of working in an NOC environment would be a plus.
Specialized Skills & Knowledge:
Extensive knowledge of configuring and troubleshooting the following technologies:
- Security & Firewall Management : Multi-vendor firewalls (Firepower, ASA & Checkpoint) that leverage management tools for rule deployment, network segmentation in a multi-context/multi-zone firewall environment, IPS, encryption techniques (IPSEC, MACsec), VPN (Site-to-Site) NAC (Cisco Client) and access security appliance (RSA).
- Enterprise Infrastructure : Routing & Switching, including routing protocols (OSPF & BGP), PBR, MPLS, VPN, SDWAN, STP, ACL, advanced L2/L3 switching technologies and QoS.
- Cloud Integration : Hybrid connectivity into AWS VPCs using various options (AWS Direct Connect, DX Gateway, NAT Gateway, Transit Gateway and VPN), manage cloud security options using security groups.
- Datacenter Infrastructure : Spine and Leaf architecture, VxLAN fabric (Cisco ACI deployment) and other datacenter technologies (Cisco NX-OS, RSA appliance & NetScaler).
- Wi-Fi Solutions : Centralized and cloud-based WLAN solutions. Any experience with Meraki solutions would be preferred.
- Monitor : SolarWinds for alert monitoring.
- Troubleshoot : Using firewall packet capture, CLI commands and other methodologies, tools like Dynatrace.
Education & Certifications:
- Bachelor's degree in Computer Science, Information Technology, or a related field (or equivalent work experience).
- Preferred certifications: Cisco CCNA/CCNP/CCIE, AWS Advanced Networking, Fortinet NSE, Checkpoint CCSA/CCSE.
Job Tags
Work experience placement, Local area, Night shift,