Mr. Chellappan is the lead Network Engineer at Jacobs Technology (Portsmouth, RI) since December 2008. His primary focus and duties revolve around configuring CISCO, ENTERASYS, HP PROCURVE, 3COM, BROCADE brand routers, switches and NAC controllers for SME networks. Redesign aged network architectures by implementing current protocols such as VLANS, VTP Domains, STP, VRRP, OSPF, LACP, EIGRP and IRDP. Implement and incorporate security and SSL remote access capabilities utilizing CISCO/GTA/SONICWALL firewalls. Responsible for planning and implementing VMware Virtualized Infrastructure (ESXi 4.1 / ESX 4.x / VMWare View Server) for small to large scale corporations. Additional responsibilities include troubleshooting and configuring Windows Server 2003/2008, Active Directory, Exchange 2000/2003/2007, DHCP, DNS, Group Policy, SQL Server 2005 / Express. Incorporate Linux Based Storage Servers (HP LeftHand VSA) and redundant network failover procedures to achieve cost effective RTO/RPO. Implemented and supported isolated LAN within a network infrastructure for ip security camera systems in airports. Rationale for Selection Various technical disciplines with faster response on any integration projects revolving around virtualization, networking and platform products. Ability to work individually or as a team. Relevant experience both locally and internationally. Ability to train junior engineer to facilitate project completion at shorter lengths. Relevant Project Experience Lead engineering consultant in medium to large scale deployments for government and private sector clients. Provided efficient green-centric solutions, capacity planning and site study for virtualization projects. Provide technical advice and cost-benefit analysis at sales meetings with clients. Deployed ESXi 4.1 host clusters, dual P4300 LeftHand SAN, 2GBps MDF to IDF backbone in accordance to security practices. Deployed ESXi 4.1 hosts between 2 sites connected via a 100 MBps microwave link. The disaster recovery plan utilizes LeftHand VSA appliances for storage and Veeam for replication with an RTO of 4 hrs. Both hosts are optimized for IMC law enforcement tools. Replaced 40 PCs with PANO virtual desktop devices, created robust windows XP and Windows 7 templates which runs on 512MB RAM and 8GB disk space. Deployed PANO Manager V4.0 on a dual host cluster with DRS features enabled. Troubleshot CentOS from CLI. Built VBScripts, WMI Filters and AV batch file deployments. Deployed an isolated 10GBps backbone single-mode fiber security camera network utilizing 2 Procurve 8212 cores and 23 Procurve 2910-al edge switches which supports 600+ IP cameras over multicast traffic with OSPF, VRRP and PIM-SPARSE. Tested core switches for iSCSI storage and multicast streams. Configured CISCO ASA firewalls to support remote access into live camera footage on the isolated network using LDAP and MAC address for authentication. Recovered critical replication failures in the production datacenter. Conducted in-depth analysis and optimized internet transport of large CAD drawings worth millions utilizing Riverbed WAN optimizers. Streamlined IPsec VPN connections and recovered bad encryption mismatches. Configured CA Servers, Radius Servers, Active Directory for 802.1x Port Based Authentication. Mentored resident network and system administrators on monitoring the LAN network via PCM 3.1.and managing the existing virtual environment with vCenter and Update manager. Trained 2 engineers to update hosts and firmware on a DELL M1000 enclosure, create iSCSI VLANs, vSwitch and storage configurations. Managed 3 engineers remotely to configure Cisco 6500 core and 9 Cisco 4500 edge switches to support L3 VLANs, RSTP, Virtual Router Redundancy, and SNMPV3. Trained engineers remotely to migrate ESX hosts from 3.5 to 4.1 and perform over 100+ P2V migrations. Responsible for overall network security, application optimization and incorporation of new technology into the existing infrastructure. Administered Windows 2003 datacenter of 27 servers, MS Exchange, and File users across LAN and remote WAN. Managed and upgraded Migration of Exchange 2000 to 2003, Terminal Servers and SQL 2K. Implemented access gate security with RFID tag systems and networks for mobility tracking. Upgraded a Cisco 1800 router to 3825 model to cope with IPSec VPN tunnels from Customs and Immigration departments. Planned and executed cable runs, patch panel set up, wire closet placements and wireless access. Deployed a Cisco pix firewall 515E to introduce inbound security and access control against WAN attacks and potential virus threats. Implemented SSL, CERTS and advanced configurations for Outlook Web Access (OWA) and exchange 2003. Responsible for providing consulting services to small business clients. Built and upgraded Windows 2003 servers for SQL database, application and file server roles in numerous datacenters. Managed DHCP, DNS, Active Directory and created initial VPN dial-ins for remote employees using RRAS and dialup. Configured Cisco Catalyst and Nortel switches along with application permissions on new PIX firewall appliances. Configured and deployed Cisco ASAs and WAN optimizers to transfer large CAD files across WAN, eliminating bottlenecks. Configured IPSEC tunnels, L2 VLANS, Active Directory User Management, and DNS zone transfers, Exchange mailbox. Troubleshot erroneous DCPROMOs of WIN 2003 servers via dcdiag, netdiag and GPO tools. Education and Professional Development VMware Certified Professional (VCP 4.1) # 81434 August 2011 VMware Technical Sales Professional (VTSP) July 2010 Microsoft Certified Systems Engineer (MCSE) # 5806930 November 2007 Microsoft Certified Systems Administrator (MCSA) # 5806930 November 2007 Cisco Certified Network Associate (CCNA) # 11295473 July 2007 B.S in Computer Science (Networking), Oklahoma City University December 2002