Professional Profile

Title:

F5 Product and DevOps Automation Consultant

Education: F5 BIG-IP Essentials, Seattle WA

F5 Certified BIG-IP v.9 Essentials

F5 BIG-IP Advanced Topics, Seattle WA

F5 Certified BIG-IP LTM Product Consultant

F5 3-DNS, Seattle WA

F5 Certified 3-DNS

Core Competency: F5 APM: 9.x 10.x, 11.x, 12.x, 13.1.0

BIG-IP 2.x 3.x 4.x 9.x 10.x 11.x 12.x 13.1.0 (LTM, ASM)

GTM 3.x 4.x 9.x 10.x 11.x 12.x 13.1.0 (3-DNS)

iRules: v.9 TCL rules language, 4.x and prior

iControl: Development using Java, Ruby, shell

A10: Thunder 4.x

Citrix Netscaler: 8.0 9.0 10

Imperva: SecureSphere

Protocols: TCP/IP, UDP, XML, SNMP, HTTP, FTP, 802.1q, RTSP, MMS, SIP

Operating Systems: Solaris 2.5.1-11, Windows NT/2003, Linux, BSD, HP/UX

Caching: SQUID, BlueCoat, F5 Fast Cache Module

Routing Protocols: RIP v1 v2, OSPF, ISIS, BGP, HSRP, EIGRP, VRRP

Caching systems: Web Acceleration, Compression, Web Aggregation, Pipelining, QOS
Platform Experience: Sr. Consultant for projects related to F5, Citrix, AppviewX, A10 Networks, Akamai, Radware, Cisco, Checkpoint, Juniper
Origins at F5 Networks: 1999-2000 Region Regional SE for TOLA
Area of specialty: IP Network Engineering                               SSL Encryption

Application Delivery                                     Application Performance Tuning

DevOps Network Service Automation         iRules Programming

Web Application Firewall                             CDN & Streaming media

 Additional expertise:
  • Migrated running configurations of F5 to A10, Citrix to F5, A10 to F5, F5 to Citrix
  • Complex upgrades using custom derived methods
  • APM: Deployment for SSL VPN and various authentication/authorization for SSO
  • WAF: Installation and traffic mapping with template building for the following web application firewalls, F5 ASM, Citrix App Firewall
  • Creation of ADC architectures with traffic flows for audit compliance (PCI)
  • Created WAF access policies for geo-location and IP reputation
  • Define security policies to facilitate blocking mode, policy violation review
  • Define traffic flows; frames, packets, sessions, applications
  • Install\implement latest attack signatures, templates, application mappings
  • Create custom iRules using TCL for the purposes of:
    • Bi-directional SSL authentication
    • Persistence using universal inspection engine
    • Server redirection based upon SNI or host header parsing
    • Binary streams using bitwise operations of proprietary protocols
  • Complete documentation of client infrastructure, including Visio diagrams
  • Create iControl scripting for the integration into content publishing and automation

Abbreviated Client List:

Projects completed for clients: American Airlines, Apollo, AT&T, AARP, First Marblehead, Webster Bank, Gap, FedEx, Kinko’s, Thompson Financial, Bank of America, Citi Group, 1st Global, Active Network, Aetna, Alliance Resources, Atos, Cardinal Health, Brinks, Digital River, Epsilon, Equinix, GM Financial, Hachette, Heritage Auctions, IBM, Intuit, Karma Automotive, Legal Shield, Lexis Nexis, LifeLock, M&T Bank, Marriott, Mary Kay, Medtronic, MotivAction, Guitar Center, Nokia, Nordam, Petersons, Pioneer Energy, Plainview Capital, Plains Capital Bank, Rent-A-Center, Reliance, Sepracor, Sheetz, SUNY, TJ Maxx, T-Mobile, Vivendi, Wells Fargo, Verizon, and many more…

Project Sample:

Client: Large Defense Contractor

SR. F5 Consultant

Led team to complete migrations of Cisco ACE to F5 BIG-IP (LTM, GTM) platforms. This includes an assessment and revisions to existing application architecture, traffic flows and network segmentation to fulfill ITAR and EAR regulations. Project completed with full documentation and staff training.

Client: National Entertainment Retailer

Citrix Consulting

  • Review the Citrix Netscaler deployment of App Firewall.
  • Revised security policies to control and restrict access to ecommerce sites and PCI compliance.
  • Define new rules logic to correct access for partner integration.

Client: State Power Company

F5 Consulting

Design and deploy new F5 ASM product to restrict access to customer facing web sites. Defined policies following discovery process and block unauthorized client access as well as restrict access based upon geo-location. Deployed solutions to secure externalized enterprise resources.

Client: Major Toll Authority

WAF Consulting

  • Assessed feasibility of existing Imperva WAF solution
  • Identify gaps in PCI compliancy testing
  • Offer alternative solution utilizing F5 ASM
  • Project includes deployment of ASM with application maps, rules and access controls with geolocation. Recovery of crippled F5 environment with redesign deployment of BIG-IP with LTM, GTM, ASM.

Client: Global Auction Service

F5 Viprion Consulting

  • Replace rival consultant who crippled F5 environment as result of prior failed attempt to upgrade Viprion
  • Recreated environment using our in-house F5 lab
  • Modified configuration files using custom technique and prepared configuration for migration
  • Completed upgrade Viprion with zero downtime and resolved all outstanding issues

Client: Large Bank

F5 Consulting

  • Led the completion of the largest deployment of MS Link
  • Led the completion of >50 F5 upgrades and >40 RMA replacements of production BIG-IP devices

Client: Wireless Carrier

F5 Consulting

Created a method for routing and transformation of Diameter messaging using iRules