profile-pic
Vetted Talent

Farhan Zahedi

Vetted Talent
Seeking the role of Technical Consulting Engineer at Cisco to leverage my extensive experience in IT infrastructure planning, implementation, and support, particularly in data center switching technologies. Dedicated to providing top-notch technical assistance and driving customer satisfaction on a global scale.
  • Role

    Technology Consultant

  • Years of Experience

    12 years

Skillsets

  • Microwave
  • Ether-Channel
  • ACL
  • IPv4/IPv6
  • WLC
  • Load balancer
  • Cisco Routers
  • Wireless ap
  • Adsl routers
  • fiber
  • Private vlan
  • Servers 2008/2012 installation
  • Configuration & troubleshooting
  • Group Policy
  • Mcafee antivirus
  • Servers
  • Assembly
  • Ladder Logic
  • CyberSecurity - 3 Years
  • Routing Protocols - 10 Years
  • OSPF
  • C++
  • Firewall
  • Google Cloud
  • Java
  • NAT
  • Python
  • Security
  • SQL
  • VLAN
  • C
  • EIGRP
  • RIP
  • BGP
  • VTP
  • STP
  • RSTP
  • PIM
  • IGMP

Vetted For

11Skills
  • Roles & Skills
  • Results
  • Details
  • icon-skill_image
    L3 Senior Network Engineer (Remote)AI Screening
  • 51%
    icon-arrow-down
  • Skills assessed :Disaster Recovery, Project Management, Scripting languages, VERSA SDWAN, Azure/AWS/GCP, Firewall, ITIL v3, Network Infrastructure, Network Performance, RedHat, SIEM
  • Score: 46/90

Professional Summary

12Years
  • Technology Consultant

    Ernst & Young LLP (EY), India
  • Network Engineer as Freelancer

    Freelancer
  • System Engineer

    Zamil LLC.
  • Network Engineer

    MashTechsol
  • ELV Engineer

    Berkeley Services LLC
  • IT Engineer as Freelancer

    Freelancer

Applications & Tools Known

  • icon-tool

    Windows 7

  • icon-tool

    Windows 10

  • icon-tool

    Windows 11

  • icon-tool

    Ubuntu

  • icon-tool

    Mac OS

  • icon-tool

    Visio

  • icon-tool

    Microsoft Office

Work History

12Years

Technology Consultant

Ernst & Young LLP (EY), India
    Delivered IT consulting services to government and public sector organizations and provided advisory services for ICT projects under the pan-city initiative of Smart City Mission. Prepared detailed architecture design, approach, timelines, cost and revenue models, clear funding pattern, implementation methodology, risk mitigation plans were prepared as part of the DPR. Offer technical and expert support in the consultation of the Smart city's new programs with the central ministry, cities, Urban local bodies, policymakers, and relevant stakeholders. Solution Conceptualization, DPR & RFP Preparation, Procurement & Bid Management, Project Implementation, and Management of Pimpri Chinchwad Smart city project. Preparation of DPR, RFP, and Bid management including Pre-bid meetings, Technical & Commercial Evaluation, Bid presentations, Vendor Onboarding, and Contract & Agreements Preparation. Requirement Gathering, FRS, SRS preparation, AS IS & TO BE Process Analysis, GAP Analysis, Business Process Re-Engineering & Automation.

Network Engineer as Freelancer

Freelancer
    Configure, troubleshooting of network device. LAN/WAN network design, implementation, and Monitoring. Extensive layer 2 (MST, PVST, RPVST, etc) and layer 3 routing (static, RIPv2, OSPF, EIGRP, and BGP). Cloud Environment -Azure, VPC. Running & maintaining cisco 6500, 3560, 3750, 2900 & 9300 switches. Design network architecture using Visio and other Tools. Provided customer service & technical expertise in order to ensure that all requests are resolved in a timely manner; ensured timely escalation management of incidents; protected software & hardware by coordinating network security.

System Engineer

Zamil LLC.
    Implementation and troubleshooting complex layer 2 technologies such as VLAN, Trunks, VTP, Etherchannel, STP, RSTP. Implementation of HSRP, VRRP, and GLBP for Default Gateway Redundancy. Providing L2 Support to TAC, Field Engineers, Telecom Operators. Create and maintain documentation as it relates to network configuration, NW mapping, process and service records. Configure, troubleshooting of Cisco, HP, Juniper switches & router. Configure and troubleshooting, Cisco ASA, PaloAlto Firewall. Design Wireless and wired Network Migration, updating, Setup new network. Installation, Configuration and Administration of Windows Servers 2000/2003, Active Directory, FTP, DNS, DHCP, TFTP, Linux OS under various LAN and WAN environments.

IT Engineer as Freelancer

Freelancer
    Implemented ESX/ESXi host features for server migrations and worked with vSphere and vCenter for HA and DRS environments. Resolving infrastructure architecting and troubleshooting issues for clients. Design, implement, and maintain VMware vSphere infrastructure. Resolve hardware and software issues. Establish guidelines and troubleshooting support to offices with Video Conferencing. Designing Network Architecture/ Data Centre architecture.

ELV Engineer

Berkeley Services LLC
    Execute the ICT Projects by maintaining a Proper coordination with client, sales, and technical team by reporting day to day activities to the management, and meeting the challenges to commissioning the project with proper documentation. Analyzes and resolves work problems, or assists technician in solving work problems. Responsible for Data Center Network Security. Prioritizing and troubleshooting complex network and systems issues, ranging from low-level hardware right through to application level. Work on Cases and Troubleshoot Tickets escalated by Network Operation Team (NOC) on various problems from multiple customers. Installation, Configuration and Administration of Windows Servers 2000/2003, Active Directory, FTP, DNS, DHCP, TFTP, Linux OS under various LAN and WAN environments. Administration of VMware vSphere and Microsoft's Hyper-V environments. Troubleshooting of complex LAN/WAN infrastructure, including routing protocols EIGRP, OSPF & BGP.

Network Engineer

MashTechsol
    Design and implementing of the UTP Structured Cabling work-node to rack fixing and patch panel termination & Fiber (SM,MM). Commissioning/Configuration of Fire Alarm, CCTV and Access Control System as per the Consultants/Client requirements. Installation and configure of CCTV, Access control perform subneting to efficient utilization of IP address. Sharing Folder or Drive, Planning and assigning NTFS Permission, System Policies, Backup the Data using external media, Networking using DHCP or Manual TCP/IP Services. Application/Operating system/Hardware installation configuration diagnosis and rectification. Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools Design and implementing of the UTP Structured Cabling work-node to rack fixing and patch panel termination & Fiber (SM,MM). Installation and Troubleshooting of Windows 7, Windows XP, Mac OS and Linux.

Education

  • Bachelor of Technology in Electronics & Communication Engineering (B.Tech ECE)

    RITS affiliated to Jawaharlal Nehru Technological University, Hyderabad

Certifications

  • Palo alto networks certified cybersecurity associate pccsa

  • Ccna (r&s 200-301)

  • Az-900: microsoft certified azure fundamentals

  • Jncia (junos) juniper networks certified internet associate

AI-interview Questions & Answers

Hello. Good afternoon. Myself, I completed my BTech in electronics and communication engineer electronics and communication engineering. After that, I have joined I have joined MS Techsoft as a network engineer. And then I have done my freelancing job. Then after I moved in Dubai in Berkeley Industries where I have worked in Dubai airport, where I have to manage a an enterprise infra structure that include various network device network devices network devices and, uh, server storage along with that. I then I worked in Dubai, then I work in Saudi Arabia in Zaman in various oil and gas plant in Sadara, etcetera, Madin, into IT and network infrastructure where I have to manage the IT and network infra. Along with that, we have a virtual virtualized environment for virtualization. Uh, after that, I joined, I worked for freelancer, and then I joined as an as a tech consultant. We were being a part of the tech consultant. We have to give, um, a deep time understanding to the client in the term of technology transformation along with the the different, uh, framework like, for ITL framework. And, uh, we have a part of IoT and smart city mission. Under that, we we are developing a digital transformation, and we are part of developing a data center, high scale uh, high scale data center and throughout the network in the city. Thank you.

Actually, in Cisco in Cisco environment, there are some Cisco legacy development, like, in either channel, we have, um, l a PAGP. So for multivendor ecosystem, we have to configure the switches, uh, for for open standard. Like, in, uh, ether channel, we have to configure. We have LACP and PGP. In that scenario, we have to configure LACP because Spoo give more flexibility. They have their their legacy protocol, and they they have their parallel open source protocol. They are working both seamlessly. We have we have in that scenario, we have to configure, uh, open standard protocol. Like, in in term of STP, we have to PBST or MSTP in HSRP or in, like, oh, in, like, routing protocol we have to use. Between, uh, Cisco and multi vendor ecosystem. Either it's market or HP or Aruba or

We VRRP, it is used to create virtual virtual, uh, virtual routing protocol. It is pivotal in maintaining network uptime because we we we are creating a different, uh, virtual routing table for, uh, different different type based on the type of the traffic, the application, uh, the the application, the network, the management, whatever the type of scenario. In this case, we are creating a virtual virtual virtual traffic, and that reduce the, uh, that reduce reduce the lookup, uh, route route lookup time. Mhmm. Route lookup time. And that is, uh, the pivotal for the network uptime, or it is, uh, for maintaining the SLA requirement for the client.

In in security and firewall or in in the term of security, the intelligence and prevention detection we have, uh, we because our if the system is not designed for multi vendor or some have a legacy protocol integration. In in legacy protocol integration, there exist a preexisting security version. So we have we have to configure in open a standard, or we have to upgrade our, uh, our firewall firewall, or we have to upgrade our firewall system to incorporate the McAfee system if we it if we have to make make our system full, well, you know, full vulnerable, uh, if we have to make make our system full vulnerable, and if our system is unavailable, then we have to upgrade and integrate the system. Uh, if we update with some open standard, then it is easy for us to incorporate the McAfee IPS integration intelligence intelligence system.

If if there is any surge in the network if there is any surge in the network or that is unusual in the network, we have to identify suppose we have a EMS tools or logs tools or SIM or something SIM or or any security tool, we have to analyze the previous traffic and when the spike is going on. In that scenario, we have to check any change configuration happen in the switches itself. And and we we have we have to analyze the, um, analyze analyze the traffic by using, uh, network monitoring monitoring tool. The process step, we have to analyze using, uh, network monitoring tool. Then, uh, we have to look for the unusual unusual, uh, utilization in the term of, uh, throttling throttling of the bandwidth, CPU utilization, or data plane, or where the traffic is, um, traffic where the utilization is from, uh, which which traffic that create that spike. And according to that, uh, by using the different MSO monitoring tool, we have to troubleshoot in that account after we we conclude with conclusion. Um, what is the remedial action for, uh, this, uh, this?

Actually, we have we have different, uh, we have different network policies. We we are implementing for securing the network and, uh, policy in enterprise edition in line with the different framework. Uh, and, uh, we have, like, a ISO 27, double 0, 1, or ISMA or CID. And, um, that assures our network is good provider in the term in the term of of external or internal network, and the different procedure are adopted for setting up the policies in in in line with the guideline provided by c o c value framework that basically enhance. We have to, um, like, um, 0

Yes. Server. Scoring an IS server. Being factored, uh, it didn't work in IS server. I don't have IDM, but, uh, if I got a chance to work on that, definitely, I will, um, on the step and do it.

ST1. ST1 technology is, uh, software software defined, uh, by data network, uh, and different, VM have different command. Like, in Cisco, we have Cisco DNS, Cisco ACI, uh, for different data center in it actually segregate the control plane from data plane. And in the control plane, they give a centralized management flexibility to manage all switch from a single place and, uh, single place. And we create, like, a region wise region wise or province wise. We we we create in multiregional company in multiregional company or multiregional environment. Suppose we have data center in location a and and NDR in location b in other region, and for the in another another region, then SD WAN give give a simplicity or manageability option. We can manage, uh, their data frame from, uh, from a single place by using their SD WAN tools.

Suppose. Uh, here here, the main we have to understand first understand the criticality of the network. After taking after that, we have to, um, do the ARREST assessment. Uh, and after finding the after analyzing the ARRIS assessment in in FH, we we have from we're replacing from HSR, hardware protocol to VRP for device. Actually, HSRP also giving the device wherein we have to move move for, uh, for VRRP. So we we plan it accordingly based on the, uh, based on the our assessment, uh, and based on our assessment, we do first assessment, then talk with the client, uh, their their requirement and their traffic name, and we identify when it's a good time or best time to do do their downtime, and we make one primary switch. In 2nd switch, we configure first that one and then make it one primary. Then we do it for the secondary. And after that, making both the switch up and

Not what's has given. Every certification in IT industry give everyone a confidence, a bit of accomplishment in the term of their hands on experience in that technology because that the OEM or when when vendor specific, uh, they will learn the nitty gritty of that technology along with uh, that standard of operational procedure procedure. And any certification, uh, we are doing that enhance our ability to understand their system in their way or their technology development or the in their way, not any general vendor. That was our hand on experience, uh, and understand the initial, you know, initial understand the core.

We have for, um, ITIL version 3, the chain chain minute and process, uh, we have to first first identify, um, the the first, we have we are doing the network modification. We have to identify by, um, what goal we want to achieve after doing modification. We have to an we have to analyze and we have to do a risk assessment and we have to, um, develop a a hierarchy and we have to develop a model how we are going to, um, do. First way, um, first way, we have to do so first, we have to give a, um, first, we have give a collective view collective view of the system. And then after, we have to, um, we have to dissect, uh, the index section in in a small network while we have to analyze it, and they have we have to make a work plan.