Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Bluecoat proxy technical interview questions

01/12/2021 Client: muhammad11 Deadline: 2 Day

Praharsha Kanna Muddana
Email: muddanakanna@gmail.com
Objective: Securing a position which will allow me the opportunity to display exceptional analytical, problem-solving and technical skills within Network and Information Security.

Technical Skills Summary:

Functional Areas

Endpoint Security Management, Network Security and Information Security Management, System Administration, Desktop Support, Active Directory, Help Desk Support, DNS.DHCP

Monitoring & ticketing tools

Remedy, Nagios, HP service manager, Tufin, Hp NNMI, Kibana, Easy IP

Routers & Switches

Cisco 3640, Cisco 3600, 3800, ASR, ACI

Catalyst 6500, 4500, 3700, 3500, Nexus 1k, 2k, 5k, 7k, 9k

Routing Protocols

RIP, IGRP, EIGRP, OSPF, BGP V4, MP-BGP.

Vulnerability management

Nessus 4.8, Splunk

Firewalls

Checkpoint (R75, R77), Cisco ASA, Palo Alto

Antivirus

Symantec Endpoint protection, MacAfee

Proxy Servers

Bluecoat

Load Balancer

F5 (BIGIP) LTM VIPRION

Programming Skills

C, C++, SQL, python, bash script, HTML

Others

RSA two factor authentications 7.1

Certifications:

· Cisco Certified Network Associate

· Checkpoint Certified Security Administrator

· Microsoft Certified Technology Specialist: Windows 7 Configuration

Academic Experience:

· Master’s in computer science 2015-2016

University of Alabama in Huntsville

· Bachelor of Technology in Computer Science 2008-2012

GITAM University

Experience Summary:

6+ years’ experience within Information Technology, specializing in Information Security and Network Administration, including both Professional and Academic applications.

Employer: Cardlytics

Designation: Network Engineer II

Period: September 2018 – Present

Responsibilities

• Designed and implemented BGP/OSPF based connectivity solutions for AWS and Extranet. • Maintain and manage ASA, Juniper SSG, FTD, Palo alto & Zone based firewalls. • Designed and implemented partner router setup for B2B IPSEC VPNs. • Manage Cisco Nexus & Juniper based data canters. • Designed and implemented Meraki wireless network solution for HQ and remote sites. • Lead a team of Engineers and generate reports to management. • Build and troubleshoot IKEv1/IKEv2 IPSEC and GRE tunnels. • Maintain Big-IP F5 LTMs & GTMs, NAC solutions- ISE & Forescout. • Currently working on ACI and Silver peak SD-WAN data centre build. • Escalation point for complex network issues and participate in on-call rotation.

Client: Capital one

Designation: Network and Security Engineer

Period: June 2016 – September 2018

Responsibilities

· Troubleshoot Routers and Switches Configuration and work on incident, problem and change management.

· Manage all Datacenter Network Operations.

· Write and implement scripts/configuration on network devices during fault incident, Service improvement Plan, Urgent maintenance activities.

· Maximizing network performance by monitoring performance, troubleshooting network problems and outages; scheduling upgrades; collaborating with network architects on network optimization.

· Troubleshoot the proxy servers and firewalls, Packet capturing to resolve operational issues.

· Troubleshooting network link/device/configuration issues, isolating the problem, fixing the problem.

· Ability to packet capture using tools such as Wireshark and tcp dump. Track the top talkers using riverbed tool.

· Ability to Prioritize, execute tasks and make sound decisions in high pressure situation.

· Undertake routine preventative measures and implement, maintain and monitor network security

· Configure, support, and troubleshoot Checkpoint firewalls and Palo Alto firewalls.

· Tenaciously manage network security environment to ensure it is operating at optimal levels through proactive monitoring.

· Configure, support, and troubleshoot Checkpoint firewalls and Palo Alto firewalls.

· Configure, support and troubleshoot F5 Local Traffic Manager (LTM).

· Configure, support and troubleshoot Blue Coat Proxy SG servers.

· Identifying whether a host is behind a firewall using scripts and other resources.

· Working on firewall traffic logs to determine whether a firewall is allowing or blocking traffic between any given hosts

· Using Tufin to analyse firewall policies to determine whether a firewall is allowing or blocking traffic between any given hosts

· Compare firewall policies from different dates to determine when a specific rule change occurred and who made the change

· Using Tufin Secure Track to compare firewall policies from different dates to determine when a specific rule change occurred and who made the change

· Working on firewall failover events and troubleshooting the issues that caused them and restore them.

· Using Splunk to solve firewall failover issues reviewing firewall system logs in Splunk

· Evaluating the severity of incidents and determining when and how to implement an emergency change to resolve the incident

· Performing all tasks on the Check Point High Severity Checklist

· Running tcpdumps on Check Point firewalls as per client requirements to solve issues.

· Performing firewall pre/post validations during network maintenances

· Opening a support case with Check Point

· Reviewing firewall & proxy traffic logs in Kibana to monitor the health of the company and troubleshoot the issues as per requirement

· Write iRules to assign certain behaviors to individual application-specific connections. iRules can search the content of a traffic, such as an HTTP request or response, and direct the traffic accordingly.

· Insert header data into application-specific requests, such as HTTP requests, and then direct the request based on that header data.

· Using the BIG-IP tools to configure session persistence, based on data such as HTTP cookies, source IP addresses, destination IP addresses, and SSL session IDs.

· Monitor the health or performance of servers in a pool.

· Implementing load-balancing algorithm to assess the current load on a server.

· Enhancing traffic-management performance by configuring the system’s traffic management microkernel service.

· Balancing traffic to tune and distribute server load on the network for scalability.

· Off-loading standard server tasks, such as HTTP data compression, SSL authentication, and SSL encryption to improve server performance.

· Monitoring the health and performance of servers on the network for availability.

· Establishing and managing session and connection persistence.

· Handling application-traffic authentication and authorization functions based on user name/password and SSL certificate credentials.

· Managing packet throughput to optimize performance for specific types of connections.

· Improving performance by aggregating multiple client requests into a server-side connection pool.

· Applying configuration settings to customize the flow of application-specific traffic (such as HTTP and SSL traffic).

· Content filtering management of Controlled access to the Internet as per the company IT Security Policy with Bluecoat Proxy

· Provide Conditional & specific Internet access to specified groups and users as per client requirements in Bluecoat Proxy.

· Inbound & outbound scanning of Emails for virus, Spam & other infections

· Content filtering solution to reduce the unwanted mail volume,

School: University of Alabama in Huntsville

Course: Master’s in computer science

Period: January 2015 – May 2016

Projects

· Computer Networks: Application to measure the sound levels of the things around us and transmit it to another device in the same network to show it graphically - spring 2016.

· Computer Security: Chat application to implement (RSA, DES) algorithms both build-in and programmer implementation - spring 2016.

· Database: An online shopping cart is an e-commerce web application which provides a platform for users to purchase a wide range of products online - spring 2015.

· Computer graphics: Developing a 2D drawing program which allows users to draw 2D objects, programing a 2D robot and animating its motion using 3D camera on OPEN GL and GLUT - fall 2015.

Company: Wipro Technologies

Client: Southern Water Services

Designation: Network and Security Administrator/ System Administrator

Period: June 2012 – December 2014

Responsibilities

· Management of NAV Primary server for Symantec Antivirus Server and updates.

· Ensure all clients are enforced with the EPS policy configuration with Symantec Antivirus

· Management of quarantine and prevent the other systems from getting infected with virus.

· Virus removal on the infected systems by automated or manual process.

· Advice to desktop and server team on virus detection and procedure for clean-up.

· Content filtering management of Controlled access to the Internet as per the company IT Security Policy with Bluecoat Proxy

· Provide Conditional & specific Internet access to specified groups and users as per client requirements in Bluecoat Proxy.

· Inbound & outbound scanning of Emails for virus, Spam & other infections

· Content filtering solution to reduce the unwanted mail volume

· Communicating to the users about new vulnerabilities and patches available

· Monitoring security logs to report events and provide utilization report.

· Authentication Mechanism to Citrix through RSA Server.

· Working on the issues on the RSA Server and resolving them.

· Assigning of RSA hardware tokens to user accounts.

· Complete installation of RSA software token on windows, android, iPhone, desktop, laptops.

· Monitoring logs and generating reports on expired tokens and providing them with new RSA tokens.

· Logging service requests with RSA and working with them to resolve the issue.

· Secure the network traffic over LAN & WAN and access to the applications through company firewall.

· Experience on installing, maintaining and troubleshooting Check Point R75, R77.30 Gaia.

· Demonstrated experience in developing, implementing, auditing Checkpoint firewall (R77.30) configurations and analyzing, optimizing rule sets.

· Hands on experience and good working knowledge with Checkpoint Firewall policy provisioning.

· Upgraded the data center network environment from Cisco ASA 5520 to Checkpoint R77 firewalls.

· Performed routine monitoring of Checkpoint firewall from security perspective and troubleshooting the connectivity issues.

· Involved in configuring Checkpoint (R77) Firewall rule base and objects as per the requirements.

· Troubleshooting checkpoint firewall connectivity related issues using Smart view tracker.

· Experience in reviewing and recertification of rule sets and involved in creation, validation and maintenance of enterprise check point (R77.30) firewall policies.

· Configured ACL's in Cisco 5520 ASA firewall for internet Access requests for servers, Protocol Handling, Object Grouping and NAT.

· Good experience with checkpoint VSX, IDS, IPS as well as encryption techniques.

· Worked on Checkpoint firewalls in creating and implementing the policies required by the company.

· Migrated legacy Cisco ASA firewalls to Checkpoint firewalls using migration tools in the enterprise environment.

· Preparing and providing the Quarterly, Monthly reports.

· Managing Dashboard of vulnerability management tools like Nessus.

· Vulnerability analysis and reporting

· Secluding scans and implementing new scan templates

· Monitor IP address management, network utilization for routers and switches.

· Preparing and publishing network daily health Checks report on critical links.

· Well versed in Vendor Management on Logging WAN (ADSL, ISDN, IP-VPN, Leased Lines, PSTN) link faults/Service Requests, Hardware replacements on any failures.

· Experienced upgrading Firmware Versions of ADSL Routers.

· Administering network services & troubleshooting network problems

· Administering NetFlow Analyser on all the sites (ADSL, IP-VPN), by observing the traffic and accordingly publishing the report on high Bandwidth Utilization.

· Experienced with switching – duplex, speed changes, port-security requests, VLAN creation, addition & user moves, PCI compliance configurations changes, etc.

· Activating / deactivating ports as per the requirement.

· Providing WAN & LAN connectivity to new customer location.

· Cabling and Patching the PCs to the Network switches.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Phd Writer
Writing Factory
High Quality Assignments
Financial Hub
Coursework Helper
Write My Coursework
Writer Writer Name Offer Chat
Phd Writer

ONLINE

Phd Writer

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$40 Chat With Writer
Writing Factory

ONLINE

Writing Factory

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$30 Chat With Writer
High Quality Assignments

ONLINE

High Quality Assignments

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$45 Chat With Writer
Financial Hub

ONLINE

Financial Hub

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$36 Chat With Writer
Coursework Helper

ONLINE

Coursework Helper

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$42 Chat With Writer
Write My Coursework

ONLINE

Write My Coursework

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$47 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

The curious researcher 9th edition - Capella writing center - 7 1 final project part one submission critical analysis portfolio - Persuasion social influence and compliance gaining 5th ed pdf - Human resource management in australia strategy people performance 5th ed - 20200902 - How has contemporary culture influenced the humanities - Compare and contrast - The probability that a cellular phone company kiosk - Web Design - Static power dissipation in nmos inverter - Essays guru only - Minerals that crystallize directly from seawater are examples of - Unit 8 mobile apps development assignment - Forex income tax canada - Writing 3 - Enotes oedipus rex - Chap4,5 discussion - Truth about university of phoenix - Brookfield global relocation services - Ethical autobiography outline - Phillip lopate we who are your closest friends - Psychological theory(ies) of crime - Deliverable 6 - Corporate Memo on Ethical and Legal Concerns - Flipkart supply chain case study - Binocular esterman visual field test - Reverse engineering computer science - Improving Porter Paper Draft - Fry steel for sale - Bio rad bio dot - Auditing it infrastructures for compliance - Muslim Molvi 7340613399 OnLine No 1 FaMOUs VashIKaraN sPecIaLIsT IN Muzaffarpur - Pressure altitude conversion chart - Create your own country assignment - Baroque Art - Howbo - Project report on supply chain management of amul - Chapter 1 animal farm questions and answers - Discussion Question - Sfia professional skills list - 9/11 - The major physiologic manifestation of anemia is - There will come soft rains questions and answers - 400 cubic inches to cubic centimeters - Nfpa 99 2012 chapter 15 - Discussion--Rising Savings during the Pandemic - Gale force surfing case study - Iron core downlight transformer - Trade Regulations and Industrial Policies Discussion - A government that is formally limited by laws and rules - You manage the intranet servers for eastsim corporation - Service oriented software engineering ppt - Who determines the currency exchange rates - Worldwide paper company case study answer - Microarray analysis allows researchers to examine which of the following - The client has a budget of AUD$500,000 and is looking to build their new home within the next 12 months. - Steps involved in nervous coordination - STATE FIREFIGHTERS ASSOCIATION CASE STUDY - Aged care standards accreditation agency - Roband bain marie spare parts - Significance of the title of waiting for godot - Week 5 Project: Program or Policy Initiation Plan - Which of the following statements most appropriately describes scenario analysis - In what pursuit is solmization useful or important - Mundane realism definition psychology - Find projection of u onto v - Electron geometry vs molecular geometry - Does the center hold an introduction to western philosophy - Satan is not omnipresent - Security architecture - Rough outline for research paper - Following are the transactions of a new company called pose-for-pics. - What is the scholar practitioner model - Ethica and Legal Aspects of Nursing Practice . DQ 1 - Microsoft strategic management - Umuc network design proposal part 1 - Abandon all hope ye who - Assessment and plan for organizational culture change at nasa - Save smog city 2 from ozone answer key - Bill nye earth's crust worksheet answers pdf - Katch mcardle formula bodybuilding - Bcd to 7 segment converter - Cmos layout design rules ppt - Two tier email architecture - Bradford city clinical commissioning group - Waltham allure pearl pole top panel pair - Rpm to rad s - Software Development History Presentation (6-8) slides - Extravasation of immune cells depends on - Custom units in excel - Katy perry firework lyrics - Pdf cloud computing concepts technology & architecture - Assignment 1. - The market allocates capital to companies based on - Frida kahlo elements of art - Cloud Computing and Digital Forensics - Limit process to find area under curve - Image actual size magnification - Br electron configuration full - Literature Search, Rapid Critical Appraisal, and Summary