Network Engineer Engineering - Phoenix, AZ at Geebo

Network Engineer

Required Knowledge and
Experience:
o Stacks of Cisco Catalyst 9300 access switches, including upgrading IOS-XE on stacked switches, configuring stacking data and power, port-channels, L2 VLANs, access/trunk port assignment, rapid-pvst, VLAN pruning, etc.
o Cisco Catalyst 6500 and 9600 chassis core and distribution switches, including upgrading IOS/IOS-XE on redundant supervisor engines, configuring OSPF, BGP, VSS, HSRP, port-channels, L2 VLANs, L3 SVIs, access/trunk port assignment, rapid-pvst, VLAN pruning, etc.
o Cisco Nexus 7700 and 9300 data center switches, including upgrading NX-OS, configuring Client, VDC, VPC, high availability and failover, resilient connections to VMware host server farms, OSPF, BGP, HSRP, port-channels, L2 VLANS, L3 SVIs, rapid-pvst, VLAN pruning, etc.
o Large MPLS networks, including configuring MPLS VPNs, RD/RT values, VRFs, P/PE/CE devices, eBGP/iBGP peering, route reflectors, BFD, etc.
o Cisco ASR 1000 Internet edge routers, including upgrading IOS-XE, configuring eBGP peering with multiple ISPs for high availability of Internet routes, load balancing with IP prefix-list, NetFlow, etc.
o Cisco 9800 Wireless LAN Controllers, including configuring SSIDs, policies, policy tags, site tags, CAPWAP tunnels, etc.
Preferred Knowledge and
Experience:
o Cisco Industrial Ethernet 1000 and 4000 access switches, including upgrading IOS, configuring port-channels, L2 VLANs, access/trunk port assignment, rapid-pvst, VLAN pruning, etc.
o Hardware and software life cycle of network equipment, including planning, working with vendors, submitting purchase requests, inventory management, customer coordination, configuring, deploying in a manner that minimizes network down time, documenting, monitoring, troubleshooting, patching, decommissioning, etc.
o Solarwinds modules to monitor network environments, including NPM, NCM, IPAM, UDT, NTA and SAM.
o Proficiency troubleshooting connectivity issues using tools such as Wireshark or other packet analyzers.
o Proficiency with using MS Visio to diagram and document detailed network designs and configurations.
o MS Azure network infrastructure resources such as Vnet, Application Gateway, Private DNS Zone and Resolver, Key Vault, Application Service Plan, Application Programming Interface Management (APIM), Azure Firewall, Network Security Group, Virtual and Local Network Gateway, Connections, Public IPs and Private Endpoints.
Preferred/Desirable knowledge:
o Cisco Secure Firewall running in ASA mode, including configuring routed and transparent deployments, single and multiple contexts, firewall rules, NAT, service policies/inspection, site-to-site and remote access VPN, etc.
o Cisco Secure Firewall running in Threat Defense mode, including configuring IPS.
o Cisco Client running in a medium distributed deployment, including configuring PAN, MNT and PSN nodes, policy sets, device administration policies, external identity sources, TACACS, RADIUS, etc.
o Cisco VOIP and QoS o Cisco Spaces o Cisco Catalyst Center o Cisco SD-Access o Cisco ACI Ability to:
o Comprehend and make inferences from material written in the English language.
o Learn job-related material through oral instruction, observation, structured lecture, and reading in the English language.
o Produce written documents in the English language with clearly organized thoughts using proper sentence construction, punctuation, and grammar.
o Develop and implement plans, policies, and procedures for hardware and software installations and operation.
o Utilize specialized technical software in support of hardware and software operational systems.
o Remain in a sitting position for extended periods of time.
o Analyze, interpret, summarize, and report research findings.
o Identify, plan, and conduct training sessions for other technical staff.
o Enter data or information into a terminal, PC, or other keyboard device.
o Work cooperatively with other employees.
o Work safely without presenting a direct threat to self or others.
o Use standard computer word processing, spreadsheet, database, and messaging software.
o Review and/or check the work products of others to ensure conformance to standards.
o Analyze situations accurately and suggest an effective course of action.
Additional Requirements:
o Appointments to this position are subject to appropriate background standards.
o Some positions require the use of personal or City vehicles in City business.
Individuals must be physically capable of operating vehicles safely, possess a valid driver's license and have an acceptable driving record.
Use of a personal vehicle for City business will be prohibited if the employee is not authorized to drive a city vehicle or if the employee does not have personal insurance coverage.
o Working hours for this position will require rotating on-call status with varying shifts and days, as assigned.
Required Experience and Training:
o Five
years of progressive experience in the field of network engineering managing large scale environments.
o Current Cisco CCIE, CCNP, or CCNA certifications are required - no candidates will be considered without certification.
Acceptable Experience and Training:
o BA or BS degree in Computer Science, Information Security, or related field.
Other combinations of experience and education that meet the minimum requirements may be substituted.
o Additional experience and certifications related to Cisco and Microsoft Azure networking and information security are desirable.
Recommended Skills Api Administration Amazon Virtual Private Cloud (Vpc) Chassis Cisco Cisco Certified Network Associate Apply to this job.
Think you're the perfect candidate? Apply on company site Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.