I started my career in July 2011 and have over a decade of experience in the network and security domain. I’ve worked with major companies, including Rackspace. My experience includes managing enterprise-scale networks, handling data centers supporting over 12,000 associates, and working with Cisco, Juniper, HP, Palo Alto, Checkpoint, FortiGate, Azure, AWS, and private clouds.
Network Security III
Rackspace TechnologyNetwork Security Lead
Tata Consultancy ServicesSenior Network & Security Engineer
Tata Consultancy ServicesNetwork Administrator
Tata Consultancy ServicesAWS (Amazon Web Services)
Azure
Azure Security
MS Office
MS Visio
Python
Cisco Prime
VMware
GTM
FMC
SIEM
Citrix
WinSCP
TeamViewer
Zoom
Teams
Crowdstrike
Office 365
Zimbra
Uh, myself, Goran. I have started my career back in July 2011. And since then, I've been working in network and security domain. I have worked in, uh, 2 major companies. 1 is services and one in Rackspace. Uh, right now, I'm based in the UK and, uh, looking to relocate back to India. So I have applied for this opportunity. So I do have hands on experience, uh, in various domain at enterprise level enterprise scale of the network. I have, uh, handle the data centers which are capable of 12,000 associates, uh, divided into 2 50 plus projects. I have hands on experience on Cisco, Juniper, HP, Palo Alto, Checkpoint, FortiGate, Azure, AWS, and some of the private clouds where we host our client's applications, uh, which are face to Internet. Uh, we have created the DMZ zone. I have hands on experience on NetScaler, uh, load balances as well. I'm CCNSCCNPPCNSCCSA, CCSA, uh, JNCIA, and ITLV 3 certified. I do have, uh, I'm pursuing CCIE routing and switching, but I'm not certified yet. Thank you.
How would you ensure VPN solution is full portion between us here and on premise environment? I will make sure that there are 2, uh, links are available, and there is 2 service providers are available. So if if any of the VPN goes down, we can switch it to the different service provider with 2 routers and 2 firewalls, and firewalls would be in. Apart from that, uh, autofillor should be enabled between 2 firewalls. Sometimes it happens. Like, if you are using 2 service providers, auto failover will not work sometimes. So you need to make sure that auto failover should work all the time. Uh, apart from that, if there is any express route available like Azure, then it should be there, uh, to AWS. If it is not there, so you can use it as the secondary path apart from the VPN. And bandwidth should be aligned, uh, dedicated. Like, uh, I'm not sure it is not given properly, like, uh, what could be the bandwidth. So I I'm assuming that bandwidth should be there, which, uh, which is suffice to your requirement and, uh, based on your headcount and the applications which you are using. That's how you can ensure that VPN solution is fully resilient.
So software defined network, uh, which is quite handy for VoIP traffic. You can create a different, uh, VLAN for the VoIP over, uh, voice or IP network. And, uh, you can give them, you know, high priority in your SDNs. So, uh, whenever you are going to have that, uh, it's on a voice. WAN side, and SDN will work at the LAN side only. Okay. Yeah. So you can define a different VLAN or WIP. And on LAN side, you can allow that at higher priority traffic, uh, which you can define in if you are using Cisco DNAT, then there is a, uh, what you can say. There is options available for the web traffic. You can give a higher priority to any of the web traffic, whether it is from the teams or you are using any of the phone lines. So it would be, uh, it will tag that wheel and particularly with the wipe and it will give you the highest priority when you have congested when. So that traffic will flow seamlessly when you have higher traffic at the website.
Would use network implementations. So, uh, here you can when you are using a cloud based VPN, uh, you always need to make sure that you have defined, uh, you have put all the security controls like any, uh, access authentications, uh, then you can deploy with I'm solution and, uh, multifactor authentications while connecting VPN, uh, or else you can go for the sick, uh, certificate based authentications when you are deploying any kind of the VPN. So, uh, uh, that's how you can maintain the standards of the CCI security standards, like access authentications, uh, then user authentications and authorizations, and what kind of the authorizations you are going to give the users. So 3 method. Uh, with AAA, you can put AAA solutions. You can identify like next solutions, and you can go for the multifactor authentications.
Discuss your approach to automating network deployment in AWS and Azure environments considering the event segregations. So here, you need to elaborate more like, uh, you want when you are going for if any of the user is connecting their virtual machines from Azure, then it should assign the VLAN automatically based on the user authentications. Like, if I I am logged into the Azure cloud and I'm accessing my machine, then whenever I log in, it will assign the VLAN IP address from the assigned pool or that's how you can automate the process. But you need to elaborate more while providing that questions like it is the servers you want to go for the VLAN segregation. It is the user machines you want to go for the automations or have actually because it's the broad area. You cannot, like, answer the questions not giving that much of the you need to be specific while you ask these questions. So I'll take as, uh, like, uh, any of the users when they are going to log in or accessing any of the Azure machines or virtual machines deployed on AWS Azure environments. So based on the authorizations, we can provide the IP pool from the defined VLAN creating the rules on our automations like you can say. And, uh, you can automate that through the firewall rules as well. Like if this user is coming, then, uh, that kind of the access it would have that user will have, like, some kind of the servers and some kind of the port so you can create the firewalls automations. Apart from that, I, uh, you will need to elaborate the questions uh, and ask in a particular sense so we can answer that.
So, uh, it's also broad area like, uh, CISP compliant network security. So in terms of the network security, you need to give us the details like what kind of the, uh, network devices you are using, whether it is the switch, firewalls, routers. Do you have high availability in that or not? Uh, are you using the next solution for that or not? And, uh, what kind of the, uh, like, CASSP compliance security network framework, uh, we need to provide the next solutions. We need to provide the defined VLAN creations on that. Uh, we need to create the firewalls, rule based reconciliations, what is the firewall ratings, uh, vulnerability assessment, PT assessment of those devices. So that details we need to check and based on that we can go ahead and look into that like how we can approach to provide the or deploy the network security controls without service disruptions or else you can go ahead and have a different IP schema totally different IP schema or whatever you are using. Based you are using, then totally different IP schema creating a different VLAN with the next solutions provided on that, creating a firewall rules on that, creating binding the traffic, creating next solutions and based on that you can create a whole new network which is completely different than what you are using, and IP schema would be completely different. And after creating that, after having the vulnerability assessment, p t assessment of your devices, and then you can move, uh, users from their current VLAN to the different VLAN 1 by 1.
Config current configurations. I'm not sure about that. I guess there is there is issue with the script or the command line which you're using. Because command if it is Cisco, then it should be show host name. So maybe it's a command line or the script itself. I I don't have much idea about that script, but I can say that there is no command. I can see, like, uh, show host name if it is Cisco routers.
Examine the JavaScript function that should print ping if my request takes less than 2. This seems to be logical. What it is actually. Correct. If response time is less than 200. Yeah. Check network response time is it should be 200. It says 150 here.
It's a multi cloud, uh, strategy to ensure and seamless give us prioritization for a global wipe system. Yeah. It would be, uh, difficult to configure the QS when you are using multiple cloud because the VLAN tagging and the traffic tagging process differently when you are using Azure, AWS, or the GCP. So here, we can come out with a totally different solutions where you can use the network segmentations and the network, uh, either proxy. Uh, you are not going to use it. So you can use your firewall to perform the QoS when you are doing any kind of the traffic or the multi cloud, uh, when you are going to have multi cloud strategies because the firewalls can be key feature. And I will suggest we are not going to use any kind of the proxy in between when you are configuring any QoS or that traffic should be bypassed from the proxy completely and then we will go ahead and route that traffic towards firewall. And in firewall we are going to perform that QoS for this kind of the traffic because the firewalls would be the key which are going to connect the what do you say, uh, the different clouds in between whether you are using AWS or TCP. Because whenever you are going to interconnect, like, you are 2 VCPs, you are going to use the firewall. So I would perform that QS configurations on the firewall, and I will prefer that traffic should be bypassed from all the proxies, whether it is Teams or whether you are using Avaya or Cisco U, uh, CUCM. Uh, so I'll bypass that all the traffic and prioritize that towards the firewalls and configure QS on my firewall.
I do not have idea, but I will try to read those questions or brief of my knowledge about that.
In what way would you apply DevOps practice to me? So, uh, you can follow ITL process. Uh, apart from that, uh, network monitoring rigorously using tools and technologies available in the market. Or you can go for the Terraform and Zebesk. So monitor your network, uh, rigorously. And if, uh, act on those monitoring, like, any of the network devices is down, then each automations is the key point. When you're monitoring the network, there should be automatic automation process which should be integrated with your monitoring or the ticketing tools. So any of the network devices are down or something like that, it should trigger alert. Apart from that, it should create a p 1 or p 2 prioritize ticket. Uh, so it should be monitoring automation combined together. Uh, apart from that, you can use the ITL versions 4 or 3 based on the your organization. And you can have a look at incident management, change management, and the problem, uh, problem tickets. And you can improve that. So you will have, uh, you know, a demo practices combined and you can have a agile methodology like Kanban board, uh, monitoring each of the performance, uh, whether it is the devices or your employees.