Summary
Overview
Education
Skills
Certification
Timeline
Work History
OFFICIAL PRESS BOOKS REFERRED
Hobbies
Hi, I’m

Arvind Kumar

Senior Network and Cloud Engineer
Hyderabad

Summary

Results-driven Network Engineer with over 10 years of hands-on experience in designing, deploying, and maintaining secure, scalable, and highly available enterprise network infrastructures across on-premises, cloud, and hybrid environments.

Expertise in configuring and managing Cisco routers and switches (ISR, ASR, Catalyst, Nexus), ASA firewalls, Firepower Threat Defense (FTD), Cisco Wireless LAN Controllers (WLC), and Meraki SD-WAN platforms. Proficient in implementing core Layer 2/3 technologies including VLANs, STP, EtherChannel, BGP, OSPF, EIGRP, HSRP, and site-to-site/remote access VPNs (IPsec, GRE).

Hands-on experience supporting multi-vendor networks encompassing Cisco, Juniper (MX/PTX), Arista, and Lanner devices. Successfully contributed to Microsoft datacenter projects, overseeing rack and stack operations, initial device provisioning, onboarding and decommissioning, and providing remote support for smart hands teams.

Strong background in console access and out-of-band (OOB) management, leveraging Perle IOLAN servers, terminal emulators (Putty, SecureCRT), and serial infrastructures for device recovery and base configurations.

Actively participated in network automation initiatives by collaborating with Python teams to deploy infrastructure-as-code, manage Git repositories, and validate automation outputs for switch/router provisioning and policy deployment.

Experienced in change management, including Method of Procedure (MOP) drafting, Change Request (CR) handling, and leading incident lifecycle ownership in high-availability environments.

Skilled in network performance monitoring and diagnostics using tools like Wireshark, SolarWinds, NetFlow, PRTG, and ThousandEyes, with a strong focus on root cause analysis and preventive action.

Certified in Red Hat Certified Architect (RHCA) and Cisco CCNA Security, and pursuing Microsoft Azure certifications (AZ-104, AZ-305) to expand capabilities in cloud networking, Zero Trust architecture, DNS/DHCP, NAT, ACLs, and security policy enforcement.

Actively seeking opportunities in roles such as l2/ l3 Network Engineer , Team Lead , Subject Matter Expert (SME) , Technical Trainer , Incident Manager , or Assistant Manager – Infrastructure/Networks , NOC, Azure Cloud Computing where I can lead operations, mentor teams, and deliver resilient network solutions aligned with business goals.

Overview

3
Certificates
10
years of professional experience
3
years of post-secondary education

Education

Osmania University
Hyderabad, India

Bachelor of Science from Computers
01.2011 - 01.2014

University Overview

Skills

Networking Technologies: LAN/WAN, TCP/IP, TACACS, Radius, Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Port- channel, VLANS, VTP, STP, RSTP, 8021Q, HSRP, DHCP, Static, Trunks, Access-lists, Sub netting, Designing, CSU/DSU, IPsec, VLAN, VPN, WEP, WAP, VoIP, IKE, IPSEC, SSL-VPN, IPS/IDS, NAT, PAT, ACS,

Certification

Azure 104, 305 - In Progress

Timeline

Senior Service Engineer
Allyis Techmahindra
09.2021 - Current
Senior Software Engineer
Mindtree Deputed by Mspring Infotech
11.2020 - 08.2021
Senior Network Engineer
Smart IMS Deputed by NiTDATA
06.2019 - 03.2020
Trainee Network Engineer
Network Bulls
01.2018 - 02.2019
Sr. Associate Technical Support
Tech Mahindra
04.2017 - 11.2017
Senior Process Executive
Google Deputed by Cognizant
06.2016 - 02.2017
Technical Support Representative
IBM
01.2015 - 06.2016
Osmania University
Bachelor of Science from Computers
01.2011 - 01.2014

Work History

Allyis Techmahindra
Hyderabad

Senior Service Engineer
09.2021 - Current

Job overview

  • Collaborated with Allyis teams in India and Redmond (USA) to support inter-site network connectivity, infrastructure sync, and operational continuity across on-prem and cloud environments.
  • Participated in daily sync-ups and cross-regional bridge calls to troubleshoot critical network issues affecting WAN links, VPN tunnels, and hybrid Azure connectivity between India and Redmond offices.
  • Supported latency testing, packet analysis, and routing validation to optimize data flow between Allyis India and Redmond data centers.
  • Assisted in updating network diagrams and change logs reflecting real-time updates to infrastructure linking Allyis India and Redmond during WFH and hybrid operations.
  • Executed PowerShell scripts to automate bulk user provisioning across RaveDesk environments, streamlining onboarding processes and reducing manual effort.
  • Resolved mismatched user profiles in RaveDesk and assigned appropriate roles based on approved access requests, ensuring compliance with organizational policies.
  • Used OneCloud's unified communication interface to manage VoIP provisioning, endpoint registration, and user profile mapping.
  • Contributed as a team member to manage Azure Firewall operations for Microsoft cloud environments, supporting secure user access and policy enforcement across virtual networks.
  • Assisted in user onboarding, provisioning Cloud PCs and assigning the correct Azure AD groups, RBAC roles, and Conditional Access policies using Microsoft Entra ID.
  • Participated in the creation and enforcement of Azure Firewall rules (NAT, Network, Application) to restrict access to unauthorized external websites, and control east-west traffic between VNets.
  • Helped in password resets, MID revokes, and access reinstatements for Cloud PC users as part of daily operational tasks through Assist365 and Azure AD portals.
  • Managed policy updates in Azure Firewall using FQDN Tags, Service Tags, and application rule collections, ensuring compliance with organization-wide browsing and data egress restrictions.
  • Collaborated with security and endpoint management teams to block social media, streaming sites, and public IP communications using Firewall DNS Proxy and Application Filtering.
  • Supported Cloud PC re-provisioning and session resets for virtual desktops impacted by firewall or policy misconfigurations, validating traffic paths through Azure Network Watcher and flow logs.
  • Integrated YubiKey into Azure Active Directory Conditional Access policies, enforcing strong hardware-based MFA for high-privilege users and sensitive applications.
  • Imported HAR files into Fiddler Classic and browser dev tools for HTTP traffic analysis, identifying latency spikes and failed requestsLeveraged Edge browser's edge://net-export/ functionality as analternative to HAR for capturing detailed network logs during Assist Desk escalations
  • Managed Assist Desk operations including internal handoff triage and cross-regional coordination between India and Redmond teams, ensuring seamless service continuity.
  • Used Log Analytics and Azure Monitor to trace firewall log events, enabling quick resolution of blocked traffic, failed routing, and DNS mismatches impacting user connectivity.
  • Used AMT (Access Management Tool) within the Assist365 platform to manage end-to-end user access provisioning, modification, and revocation for Microsoft cloud and datacenter resources.
  • Processed MID and UMT access requests, ensuring accurate user-role assignments, metadata validation, and compliance with Microsoft's global access policies.
  • Troubleshot failed AMT requests, including role conflicts, duplicate assignments, or expired approvers, and coordinated with backend support to resolve metadata mismatches.
  • Participated in the successful transition from RaveDesk to Assist365, migrating ticketing, diagnostics, and asset management workflows with zero data loss and minimal downtime.
  • Supported cross-functional collaboration with engineering, PMs,and support leads to drive continuous improvement in Assist Deskoperations

Mindtree Deputed by Mspring Infotech
Hyderabad

Senior Software Engineer
11.2020 - 08.2021

Job overview

  • Worked on Microsoft Azure datacenter infrastructure, handling a wide range of network devices including Cisco (5504, 55A1, NCS5508, NCS5504, NCS6008, ISR4431), Juniper (MX240, MX2010, MX960, PTX10016, PTX10008, PTX1000), and Arista (7516N, 7508N, 7504N). Responsibilities included device onboarding, decommissioning, racking and stacking, and implementing end-to-end routing, switching, and security configurations across hyperscale environments.
  • Created and maintained High-Level (HLD) and Low-Level (LLD) network diagrams using Microsoft Visio for hyperscale datacenter deployments, aligning with Microsoft's global architecture and documentation standards.
  • Performed rack & stack of network devices, executed structured copper and fiber cabling based on LLD diagrams, and applied standardized device and port labeling
  • Conducted validation and testing by verifying hostname, IP, and MAC address against planned inventory, checking interface status and LLDP/CDP neighbors, confirming cable paths and port mappings, and measuring fiber light levels to ensure physical connectivity compliance in Microsoft datacenter deployments.
  • Deployed and validated network devices across RNG (IBR, ICR, CAR), GW (IBR, EAR), and Edge (IER, SWAN) sites, ensuring proper integration of Internet Border Routers, Core Aggregates, and WAN switching infrastructure in compliance with Microsoft's datacenter design standards.
  • Performed comprehensive routing and switching validations across core and edge routers and switches, including protocols such as BGP, OSPF, EIGRP, IS-IS, HSRP, VRRP, STP, RSTP, MSTP, and VLAN/VTP configurations; validated BGP session establishment, prefix advertisements, AS path and community tagging; leveraged SES scripts and Git for automated configuration deployment, and manually configured routing neighbors, policies, and switch-level spanning tree settings when Python automation failed, collaborating closely with the automation team to troubleshoot issues and ensure stable, standards-compliant network deployment across Microsoft datacenter environments.
  • Executed automated and semi-automated configuration workflows using Python, Ansible, and ZTP integrated with Azure DevOps pipelines to deploy base configurations (hostnames, VLANs, interface IPs, SNMP/syslog) across ToR and aggregation switches; when scripts failed, manually configured devices and triaged with the Python automation team to identify root causes, while coordinating with DCS Site Services to resolve physical-layer issues such as faulty cables, missing labels, or unresponsive hardware in Microsoft datacenter deployments.
  • Managed device onboarding through Microsoft's NGS platform, entering metadata and “small data” for each switch or router, enabling successful integration into automation pipelines, AAA systems, and service graphs.
  • Used Jarvis to onboard ISP circuits and update service metadata into Microsoft's Network Graph State (NGS), enabling downstream automation, configuration generation, and compliance tracking for new WAN deployments.
  • Generated CLI-based configurations for ToR, aggregation, and WAN routers using SES (Script Execution System), validated against topology data, and submitted via Git pull requests to trigger automation pipelines for deployment in Microsoft datacenters.
  • Performed Gold Code upgrades across all network devices including WAN routers, ToR switches, and aggregation nodes to ensure alignment with Microsoft's standardized OS versions for production readiness, and conducted secure password resets for access recovery and compliance across datacenter infrastructure.
  • Replaced MACsec encryption cards and inserted new line cards in core and aggregation devices; performed core port reservations, conducted SFP module swaps, and executed safe decommissioning of backbone circuits after successful traffic migrations in Microsoft datacenter infrastructure.
  • Replaced faulty Cisco and Juniper chassis through RMA processes, ensuring seamless recovery of device functionality, and performed secure file transfer, synchronization, and backup operations between hop boxes to support network staging and configuration continuity.
  • Performed comprehensive datacenter troubleshooting across Layers 1–3, including port voltage testing, SFP swaps, patching, password resets, port flapping resolution, chassis replacements, latency testing, and configuration rollback, using tools like WANNETMON, SES, Kusto, and Junos Space; collaborated with DCS and automation teams to restore service across ToR, aggregation, and core network devices.
  • Utilized a wide range of Microsoft internal tools including NDT(Network Design Tool) for network design, NSS (Device & Link Lifecycle State) for tracking device and link lifecycle states, Circuit DB for link provisioning, GDCO for site service coordination, WANNETMON for link health monitoring, Clockwork for provisioning workflows, SES for Python-based config generation, Kusto for log analysis, and Git for managing configuration metadata through version-controlled pull requests.
  • Participated in weekly status reporting calls, updated site deployment and configuration progress in shared documentation platforms, joined bridge calls to support change request implementations, and communicated procedures and updates effectively to stakeholders while maintaining detailed documentation.

Smart IMS Deputed by NiTDATA
Hyderabad

Senior Network Engineer
06.2019 - 03.2020

Job overview

  • Managed the configuration and deployment of Lanner routers running CentOS, integrating 128T Software-Defined WAN (SD-WAN) to establish Secure Vector Routing (SVR) across retail store networks.
  • Participated in Event 6 and Event 7 activities:
  • Event 6: Collaborated with field technicians to rack and stack network hardware and assemble devices as per the data center layout design.
  • Event 7: Executed remote configuration push from the head-end system to store routers, enabling site connectivity within the 128T SD-WAN fabric.
  • Provisioned and supported Cisco Unified Communications systems including CUCM, CME, and CUC across retail locations; collaborated with AT&T for SIP trunk integration over MPLS and 128T SD-WAN.
  • Deployed and troubleshot AudioCodes MP114/MP118 gateways for analog voice and fax services; configured Yealink T48 and W60B DECT phones using MAC-based registration through the UC portal.
  • Handled Layer 2 and Layer 3 troubleshooting involving BGP, MPLS-T1, VLANs, VPNs, WAN, and LAN technologies, implementing necessary configuration changes based on evolving business requirements.
  • Supported diverse WAN connectivity models including MPLS-T1, AT&T LTE, and DSR Broadband circuits, ensuring backbone connectivity, service reliability, and continuity across sites.
  • Implemented Out-of-Band (OOB) Management using Cisco Firepower Threat Defense (FTD), including interface setup, NAT rule configuration, access control lists (ACLs), and enabling remote console access to critical infrastructure.
  • Utilized enterprise-grade monitoring tools such as SolarWinds NPM, PRTG, and Nagios/Icinga to monitor router/switch health, interface utilization, bandwidth consumption, and uptime performance for both branch and corporate sites.
  • Monitored VoIP and collaboration environments using Nectar Diagnostics to gain SIP call path visibility across Cisco and Yealink phones; utilized Cisco RTMT for real-time performance and fault monitoring of CUCM, Unity Connection, and CME systems.
  • Oversaw wireless, SD-WAN, and security infrastructure operations using platforms like Cisco DNA Center, 128T Conductor, Meraki Dashboard, and Cisco FMC, while also leveraging Splunk/ELK Stack for log aggregation and ServiceNow ITOM for incident tracking and CMDB synchronization.
  • Configured and managed Cisco Meraki MX-series SD-WAN appliances MX68, MX67 to establish site-to-site VPN connectivity between Advance Auto Parts retail locations and core data centers.
  • Monitored VPN tunnel health, bandwidth usage, and application performance through the Meraki Dashboard, ensuring secure, reliable, and optimized WAN connectivity.
  • Maintained and monitored Edge-level network infrastructure, including Cisco ASR 1001/1002 routers, Catalyst 4500X switches, and 9800 Series Wireless LAN Controllers (WLCs), supporting regional policy enforcement and aggregation across multiple spokes.
  • Managed core data center network infrastructure, such as Cisco NCS 540/5500, ASR 1000 series routers, Cisco Firepower FTD firewalls, and CUCM/CUC VoIP systems, ensuring centralized routing, firewall security, call control, and authentication services via Cisco ISE.
  • Addressed technical issues related to packet loss, latency, and jitter for global customers and provided onsite support involving hardware/software maintenance and diagnostics.
  • Maintained detailed and up-to-date documentation for current hardware/software configurations, and contributed to planning and documenting future deployments, upgrades, and infrastructure modifications.
  • Served as Incident Manager, leading cross-functional incident response efforts, coordinating MOP execution, managing change approvals, communicating real-time updates to stakeholders, facilitating RCA (Root Cause Analysis), and ensuring SLA compliance through structured incident lifecycle management.

Network Bulls
Delhi

Trainee Network Engineer
01.2018 - 02.2019

Job overview

  • Designed, configured, and troubleshot RIPv1/v2, EIGRP, OSPF (single and multi-area), and BGP (iBGP/eBGP) on Cisco routers.
  • Configured static, default, and floating static routes for WAN/branch connectivity.
  • Implemented route summarization, stub routing, passive interfaces, and route filtering using prefix-lists, distribute-lists, and route maps.
  • Practiced BGP path selection manipulation using Local Preference, MED, Weight, AS-Path prepending.
  • Configured VLANs, VTP (Modes: Server/Client/Transparent), DTP (Manual/Auto/Desirable), and inter-VLAN routing using Layer 3 switches.
  • Implemented Spanning Tree Protocol (STP) and its variants: RSTP, PVST+, and Rapid PVST+ for loop prevention.
  • Configured EtherChannel using PAgP and LACP for redundancy and bandwidth aggregation.
  • Setup port security, BPDU Guard, Root Guard, and other L2 security features.
  • Built and tested GRE tunnels, site-to-site IPsec VPNs, DMVPN, and Easy VPN setups using Cisco ASA and routers.
  • Deployed Remote Access VPNs using Cisco AnyConnect, SSL VPN, and Cisco VPN Client.
  • Troubleshot VPN phase 1 and phase 2 issues using IKE debug, crypto maps, and ISAKMP policy verification.
  • Configured and tested HSRP, VRRP, and GLBP for default gateway redundancy.
  • Verified priority, preemption, and tracking mechanisms for link or interface failover.
  • Hands-on configuration of DHCP, NAT (static, dynamic, PAT), ACLs (standard, extended, named).
  • Used CDP and LLDP for neighbor discovery and topology mapping.
  • Performed ping, traceroute, telnet, and SSH for reachability testing and remote access.
  • Practiced IPv4 and IPv6 subnetting, address planning, and dual stack routing.
  • Deployed Cisco ASA firewall: Interface security levels, zone-based firewall (ZBF), NAT rules, ACLs, failover configuration, and firmware upgrades.
  • Managed Cisco ACS (Access Control Server): GUI-based user authentication, policy creation, and RADIUS/TACACS+ integration.
  • Familiar with Cisco Identity Services Engine (ISE) initial setup, profiling, policy sets, and 802.1X/NAC concepts.
  • Performed IOS upgrades via TFTP, password recovery, startup/config file backup/restore.
  • Implemented banner MOTD, role-based CLI access, and logging to syslog/SNMP server.
  • Used packet captures, debug commands, and show commands (e.g., show ip route, show vlan brief, show interface) for live issue analysis.
  • Integrated basic SNMP and Syslog servers for device and event monitoring.
  • Simulated network issues and resolved real-time layer 1–3 faults as part of lab scenarios.
  • Created topology diagrams, device configurations, and network change documents (MOPs).
  • Used tools like Cisco Packet Tracer, GNS3, Eve-Ng, and live lab gear for practice and testing.

Tech Mahindra
Hyderabad

Sr. Associate Technical Support
04.2017 - 11.2017

Job overview

  • Diagnosed and resolved end-user connectivity issues related to the Public Switched Telephone Network (PSTN), including analog voice lines and broadband service disruptions.
  • Configured new PSTN copper lines and ports on Exchange Servers using Drift2000 provisioning tool deployed in a Windows Server environment, ensuring proper call routing and signal delivery.
  • Conducted voltage-level diagnostics and resistance checks on copper circuits to identify faults such as shorts, opens, or ground loops affecting voice/data quality.
  • Investigated service complaints related to Telstra Broadband internet by analyzing DSL parameters, signal loss, SNR margin, and line attenuation via central systems and field data.
  • Coordinated with multiple internal vendors and service layers using the Service Integration and Management (SIAM) framework to deliver end-to-end incident resolution.
  • Used SIAM-based Incident Management Systems to raise, track, and close faults across Layer 1 (physical) and Layer 2 (link) components within the service provider domain.
  • Engaged in change management tasks, including line provisioning, port shifts, and network reconfiguration based on change requests and work orders.
  • Collaborated with NOC and Field Engineers to validate line integrity, reassign ports or tie pairs, and update circuit design documentation post-fix.
  • Participated in change control activities, scheduling and executing copper pair migrations, new circuit builds, and port shifts within Exchange infrastructure.
  • Performed backend support for port cutovers, IP mapping, and static route validation during migration from legacy copper to hybrid or broadband networks.
  • Supported service testing using loopback and line-test utilities, integrating results into issue logs and RCA reports.
  • Documented all change requests, implemented fixes in compliance with network configuration standards, and ensured alignment with Telstra SLAs.

Google Deputed by Cognizant
Hyderabad

Senior Process Executive
06.2016 - 02.2017

Job overview

  • Provided L1/L2 support for Google's enterprise and data center network infrastructure, ensuring uptime and performance across global offices and labs.
  • Monitored network devices (routers, switches, firewalls) and services using internal Google tools such as Borgmon, Monarch, and Dapper, escalating anomalies per SRE protocols.
  • Investigated and resolved incidents related to connectivity, link failures, interface flaps, and protocol mismatches across L2/L3 networks.
  • Handled IP management tasks including static IP assignment, DNS/DHCP checks, and port/VLAN tagging across Google's corporate network.
  • Coordinated with Google's field tech and SRE teams for racking, cabling, patching, and device replacement activities during rollouts and incident recovery.
  • Logged and triaged incidents using Google's internal ticketing systems, ensuring SLA adherence and proper escalation of critical faults.
  • Participated in change management reviews, supported network upgrades, and validated device health during scheduled maintenance.

IBM
Hyderabad

Technical Support Representative
01.2015 - 06.2016

Job overview

  • Delivered comprehensive support for Carphone Warehouse's enterprise network, ensuring high availability across retail and corporate sites.
  • Maintained and troubleshot Cisco routers, switches, and LAN infrastructure, performing VLAN tagging, port configuration, IP management, and patch panel coordination.
  • Provided hands-on support for Meraki cloud-managed wireless networks, monitoring SSID policies, device health, and wireless availability via Meraki Dashboard.
  • Resolved Layer 1/2 connectivity issues, leveraging CLI tools for ping, trace, and path analysis across physical and logical network layers.
  • Supported VoIP infrastructure, including onboarding and troubleshooting Cisco IP phones (7942, 7911, 6911), addressing firmware, registration, and QoS-related issues.
  • Executed MACD operations in Active Directory, handling user provisioning and access changes across integrated systems.
  • Delivered thin-client and remote access support via Citrix Web Console and RDP, ensuring stable performance for presentation-layer applications.
  • Managed change implementation in PI Server (PL/SQL database), aligning with compliance standards and client deployment cycles.
  • Monitored and maintained network peripherals such as Lexmark/Epson printers, barcode scanners, and data terminals to ensure end-to-end connectivity.
  • Participated in ITIL-based incident, change, and problem management, including RCA documentation, SLA tracking, and MOP creation for network modifications.
  • Provided backend support for field engineers, guiding racking, cabling, and patching procedures during rollouts and escalations.
  • Diagnosed complex network issues involving hardware faults, software errors, and connectivity disruptions across wired and wireless segments.
  • Trained junior engineers on network troubleshooting, VoIP onboarding, and operational procedures to support skill development and service consistency.
  • Provided technical support for peripheral hardware, resolving issues with printers, scanners, and copiers across enterprise endpoints.

OFFICIAL PRESS BOOKS REFERRED

OFFICIAL PRESS BOOKS REFERRED

Toddlammle
Routing (300-101)
Switching (300-115)
T shoot (300-135)
CCNA Security (210-260)
CCNP Security VPN (642-648)
Cisco ASA Configuration
RedHat System Administration 1, 2, 3
Microsoft Server2012R2

Intrusion Alert 

Social: 50 Ways to Improve Your Professional Life

Hobbies

Hobbies

Hobbies: Training students on CCNA, CCNP, CCIE, Ethical Hacking on weekends
Creating Networking Videos on YouTube as per requirement
Playing cricket, swimming, and Badminton

Arvind KumarSenior Network and Cloud Engineer