SlideShare a Scribd company logo
Job Title Network Administrator
Reporting
Structure Reports to the Project Manager
Education Bachelor’s Degree in Engineering, Master’s degree in engineering preferred
Experience/
Qualifications
Minimum of 2 – 6 years of total experience
Minimum of 2 years in Network administration.
Location Mumbai/ Nagpur
Industry Preferably from a Technology, ITES, Shared Services or Banking organization
Responsibilities
 Experienced Professional with strong knowledge in Routing/
Switching/ Firewall/ NAC/etc.
 Minimum 2 years’ experience in IT infrastructure services and have
technical background in Network Technology.
 Excellent hands-on technical experience with the ability to understand
the issues and solution requirements and savvy about networking and
connectivity best practices, to guide and set the direction for the team
 Hands on & design expertise of various IT Infra component and
Network component (Firewall, VPN, Proxy, Wireless, switching, WAF
Load balancer & Network Policies, SDN, DNAC technologies).
 Understanding of Cloud, Virtualization Network Architecture & security
 Experience in implementing small & large-scale network projects.
 Strong analytic and problem-solving skills, and experience on root
cause analysis and define corrective measures.
 Good understanding of ITIL process
 Experience on Network security, compliance, and audits. Experience in
performance, capacity, and vendor management.
Certifications Certifications on CCNA/ CCNP/ CCDP/ CISSP or equivalent.
Contract Types All positions are on fixed term contract on a full-time basis exclusively for
ReBIT. Initially for a period of five years. extendable by mutual consent.
Network Administrator.docx

More Related Content

Similar to Network Administrator.docx

Network Engineer
Network EngineerNetwork Engineer
Network Engineer
Martina Kristianova
 
Resume shridhar rathod v1
Resume shridhar rathod v1Resume shridhar rathod v1
Resume shridhar rathod v1Shri Rathod
 
Ram's Networking Resume 9
Ram's Networking Resume 9Ram's Networking Resume 9
Ram's Networking Resume 9Ram Kumar varma
 
Network engineer cv_template
Network engineer cv_templateNetwork engineer cv_template
Network engineer cv_templatepavel0808
 
VIKAS AHUJA CV(1)
VIKAS AHUJA CV(1)VIKAS AHUJA CV(1)
VIKAS AHUJA CV(1)vikas ahuja
 
VIKAS AHUJA CV(1)
VIKAS AHUJA CV(1)VIKAS AHUJA CV(1)
VIKAS AHUJA CV(1)vikas ahuja
 
Mohammed Hammad resume
Mohammed Hammad resumeMohammed Hammad resume
Mohammed Hammad resume
hammad01
 
Hammad__resume
Hammad__resumeHammad__resume
Hammad__resumehammad01
 
Md riyazuddin network engineer cv_2016
Md riyazuddin network engineer cv_2016Md riyazuddin network engineer cv_2016
Md riyazuddin network engineer cv_2016
Md Riyazuddin
 
Anand Kumar Sahani
Anand Kumar SahaniAnand Kumar Sahani
Anand Kumar SahaniAnand Sahani
 

Similar to Network Administrator.docx (20)

Network Engineer
Network EngineerNetwork Engineer
Network Engineer
 
jg_resume_public
jg_resume_publicjg_resume_public
jg_resume_public
 
anmol1
anmol1anmol1
anmol1
 
Resume shridhar rathod v1
Resume shridhar rathod v1Resume shridhar rathod v1
Resume shridhar rathod v1
 
Omede Daniel CV
Omede Daniel CVOmede Daniel CV
Omede Daniel CV
 
odai cv
odai cvodai cv
odai cv
 
Ram's Networking Resume 9
Ram's Networking Resume 9Ram's Networking Resume 9
Ram's Networking Resume 9
 
Network engineer cv_template
Network engineer cv_templateNetwork engineer cv_template
Network engineer cv_template
 
Resume
ResumeResume
Resume
 
VIKAS AHUJA CV(1)
VIKAS AHUJA CV(1)VIKAS AHUJA CV(1)
VIKAS AHUJA CV(1)
 
VIKAS AHUJA CV(1)
VIKAS AHUJA CV(1)VIKAS AHUJA CV(1)
VIKAS AHUJA CV(1)
 
CV_Sahadat
CV_SahadatCV_Sahadat
CV_Sahadat
 
Mohammed Hammad resume
Mohammed Hammad resumeMohammed Hammad resume
Mohammed Hammad resume
 
Hammad__resume
Hammad__resumeHammad__resume
Hammad__resume
 
jagdeep singh
jagdeep singhjagdeep singh
jagdeep singh
 
Sanjay_Agrawal_CV
Sanjay_Agrawal_CVSanjay_Agrawal_CV
Sanjay_Agrawal_CV
 
Md riyazuddin network engineer cv_2016
Md riyazuddin network engineer cv_2016Md riyazuddin network engineer cv_2016
Md riyazuddin network engineer cv_2016
 
new resume
new resumenew resume
new resume
 
UMASHANKAR KARN
UMASHANKAR KARNUMASHANKAR KARN
UMASHANKAR KARN
 
Anand Kumar Sahani
Anand Kumar SahaniAnand Kumar Sahani
Anand Kumar Sahani
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Network Administrator.docx

  • 1. Job Title Network Administrator Reporting Structure Reports to the Project Manager Education Bachelor’s Degree in Engineering, Master’s degree in engineering preferred Experience/ Qualifications Minimum of 2 – 6 years of total experience Minimum of 2 years in Network administration. Location Mumbai/ Nagpur Industry Preferably from a Technology, ITES, Shared Services or Banking organization Responsibilities  Experienced Professional with strong knowledge in Routing/ Switching/ Firewall/ NAC/etc.  Minimum 2 years’ experience in IT infrastructure services and have technical background in Network Technology.  Excellent hands-on technical experience with the ability to understand the issues and solution requirements and savvy about networking and connectivity best practices, to guide and set the direction for the team  Hands on & design expertise of various IT Infra component and Network component (Firewall, VPN, Proxy, Wireless, switching, WAF Load balancer & Network Policies, SDN, DNAC technologies).  Understanding of Cloud, Virtualization Network Architecture & security  Experience in implementing small & large-scale network projects.  Strong analytic and problem-solving skills, and experience on root cause analysis and define corrective measures.  Good understanding of ITIL process  Experience on Network security, compliance, and audits. Experience in performance, capacity, and vendor management. Certifications Certifications on CCNA/ CCNP/ CCDP/ CISSP or equivalent. Contract Types All positions are on fixed term contract on a full-time basis exclusively for ReBIT. Initially for a period of five years. extendable by mutual consent.