Sunteți pe pagina 1din 2

Subash Chellappan

Senior Network Engineer


Mr. Chellappan is the lead Network Engineer at Jacobs Technology (Portsmouth, RI) since
December 2008. His primary focus and duties revolve around configuring CISCO,
ENTERASYS, HP PROCURVE, 3COM, BROCADE brand routers, switches and NAC
controllers for SME networks. Redesign aged network architectures by implementing current
protocols such as VLANS, VTP Domains, STP, VRRP, OSPF, LACP, EIGRP and IRDP.
Implement and incorporate security and SSL remote access capabilities utilizing
CISCO/GTA/SONICWALL firewalls. Responsible for planning and implementing VMware
Virtualized Infrastructure (ESXi 4.1 / ESX 4.x / VMWare View Server) for small to large scale
corporations. Additional responsibilities include troubleshooting and configuring Windows
Server 2003/2008, Active Directory, Exchange 2000/2003/2007, DHCP, DNS, Group Policy,
SQL Server 2005 / Express. Incorporate Linux Based Storage Servers (HP LeftHand VSA) and
redundant network failover procedures to achieve cost effective RTO/RPO. Implemented and
supported isolated LAN within a network infrastructure for ip security camera systems in
airports.
Rationale for Selection
Various technical disciplines with faster response on any integration projects revolving
around virtualization, networking and platform products.
Ability to work individually or as a team.
Relevant experience both locally and internationally.
Ability to train junior engineer to facilitate project completion at shorter lengths.
Relevant Project Experience
Lead engineering consultant in medium to large scale deployments for government and
private sector clients. Provided efficient green-centric solutions, capacity planning and site
study for virtualization projects. Provide technical advice and cost-benefit analysis at sales
meetings with clients.
Deployed ESXi 4.1 host clusters, dual P4300 LeftHand SAN, 2GBps MDF to IDF backbone
in accordance to security practices. Deployed ESXi 4.1 hosts between 2 sites connected via a
100 MBps microwave link. The disaster recovery plan utilizes LeftHand VSA appliances for
storage and Veeam for replication with an RTO of 4 hrs. Both hosts are optimized for IMC
law enforcement tools.
Replaced 40 PCs with PANO virtual desktop devices, created robust windows XP and
Windows 7 templates which runs on 512MB RAM and 8GB disk space. Deployed PANO
Manager V4.0 on a dual host cluster with DRS features enabled. Troubleshot CentOS from
CLI. Built VBScripts, WMI Filters and AV batch file deployments. Deployed an isolated
10GBps backbone single-mode fiber security camera network utilizing 2 Procurve 8212
cores and 23 Procurve 2910-al edge switches which supports 600+ IP cameras over multicast
traffic with OSPF, VRRP and PIM-SPARSE. Tested core switches for iSCSI storage and
multicast streams. Configured CISCO ASA firewalls to support remote access into live
camera footage on the isolated network using LDAP and MAC address for authentication.
Recovered critical replication failures in the production datacenter. Conducted in-depth
analysis and optimized internet transport of large CAD drawings worth millions utilizing
Riverbed WAN optimizers. Streamlined IPsec VPN connections and recovered bad
encryption mismatches. Configured CA Servers, Radius Servers, Active Directory for 802.1x
Port Based Authentication. Mentored resident network and system administrators on
monitoring the LAN network via PCM 3.1.and managing the existing virtual environment
with vCenter and Update manager. Trained 2 engineers to update hosts and firmware on a
DELL M1000 enclosure, create iSCSI VLANs, vSwitch and storage configurations.
Managed 3 engineers remotely to configure Cisco 6500 core and 9 Cisco 4500 edge switches
to support L3 VLANs, RSTP, Virtual Router Redundancy, and SNMPV3. Trained engineers
remotely to migrate ESX hosts from 3.5 to 4.1 and perform over 100+ P2V migrations.
Responsible for overall network security, application optimization and incorporation of new
technology into the existing infrastructure. Administered Windows 2003 datacenter of 27
servers, MS Exchange, and File users across LAN and remote WAN. Managed and upgraded
Migration of Exchange 2000 to 2003, Terminal Servers and SQL 2K. Implemented access
gate security with RFID tag systems and networks for mobility tracking. Upgraded a Cisco
1800 router to 3825 model to cope with IPSec VPN tunnels from Customs and Immigration
departments. Planned and executed cable runs, patch panel set up, wire closet placements and
wireless access. Deployed a Cisco pix firewall 515E to introduce inbound security and access
control against WAN attacks and potential virus threats. Implemented SSL, CERTS and
advanced configurations for Outlook Web Access (OWA) and exchange 2003.
Responsible for providing consulting services to small business clients. Built and upgraded
Windows 2003 servers for SQL database, application and file server roles in numerous
datacenters. Managed DHCP, DNS, Active Directory and created initial VPN dial-ins for
remote employees using RRAS and dialup. Configured Cisco Catalyst and Nortel switches
along with application permissions on new PIX firewall appliances. Configured and deployed
Cisco ASAs and WAN optimizers to transfer large CAD files across WAN, eliminating
bottlenecks. Configured IPSEC tunnels, L2 VLANS, Active Directory User Management,
and DNS zone transfers, Exchange mailbox. Troubleshot erroneous DCPROMOs of WIN
2003 servers via dcdiag, netdiag and GPO tools.
Education and Professional Development
VMware Certified Professional (VCP 4.1) # 81434 August 2011
VMware Technical Sales Professional (VTSP) July 2010
Microsoft Certified Systems Engineer (MCSE) # 5806930 November 2007
Microsoft Certified Systems Administrator (MCSA) # 5806930 November 2007
Cisco Certified Network Associate (CCNA) # 11295473 July 2007
B.S in Computer Science (Networking), Oklahoma City University December 2002

S-ar putea să vă placă și