Sr.Network Engineer.

Vendor : F5.

Total-TECH Co.

” The Job Descriptions”

1- LTM.

• Architecture of the BIG-IP system as a full proxy device in an application delivery network.

• Configuring Monitor VIP and Pools

• Set up, start/restart/stop, license, and provision the BIG-IP system.

• Create a basic network configuration on the BIG-IP system including VLANs and self IPs.

• Use the Configuration utility and TMOS Shell (tmsh) to manage BIG-IP resources and use as a resource when troubleshooting.

• Create, restore from, and manage BIG-IP archives.

• Understand and implement troubleshooting methodology to find and resolve issues.

• View resource status, availability, and statistical information and use this information to determine how the BIG-IP system is currently processing traffic.

• Use iApps to update BIG-IP configuration.

• Perform troubleshooting and problem determination activities including using the iHealth diagnostic tool, researching known issues and solutions on AskF5, submitting a problem ticket to F5 Technical Support, and view traffic flow using tcpdump.

• Use the tools (ping, netstat, tcpdump, ssldump, WireShark, diff, Kdiff3, Fiddler, BIG-IP logs, etc.) available to use to identify BIG-IP and network issues from bottom to top.

• List log files available, understand log levels, and use the appropriate files, log levels, and filters for troubleshooting.

• Use High Speed Logging (HSL) and SNMP trap implementations to perform troubleshooting and problem determination activities.

• Configuring  iRules and affecting traffic behavior and use them to aid with troubleshooting and problem determination

• Back up the BIG-IP system configuration for safekeeping

2- GTM.

• Configuring DNS Express on the BIG-IP DNS system to accelerate DNS resolution

• Cache DNS query responses on BIG-IP DNS to accelerate DNS resolution

• Load balance DNS queries to a pool of DNS servers and monitor pool health

• Configure the key features of the BIG-IP DNS system to perform intelligent DNS resolution

• Configure the LDNS probes used by BIG-IP DNS to support path-based load balancing

• Configure a wide IP pool to use a path load balancing method

• View and confirm DNS resolution behavior using path load balancing methods

• Use static and dynamic load balancing methods to intelligently resolve DNS queries

• Use persistence to effectively return one or more clients to the same virtual server on each query

• Use manual resume to control certain load balancing behavior in the event of an outage

• Configure and use load balancing decision logs to fine-tune and troubleshoot DNS resolution

• Configure monitors on the BIG-IP DNS system in support of DNS resolution

• Configure BIG-IP DNS to participate in the DNSSEC chain of trust

• Configure limit settings on virtual servers, servers, and wide IP pools to temporarily direct client traffic away from resources that may not be performing at certain thresholds of efficiency

• Configure iRules on a wide IP to customize intelligent DNS resolution

• Configure the other wide IP types provided with BIG-IP DNS

• Configure a BIG-IP DNS sync group

3- AWAF.

• Provision the Application Security Manager

• Deploy ASM using the Rapid Deployment template (and other templates) and define the security checks included in each

• configure learn, alarm, and block settings as they pertain to configuring ASM

• configure attack signatures and explain why attack signature staging is important

• Contrast positive and negative security policy implementation and explain benefits of each

• Configure security processing at the parameter level of a web application

• Use an application template to protect a commercial web application

• Deploy ASM using the Automatic Policy Builder

• Tune a policy manually or allow automatic policy building

• Integrate third party application vulnerability scanner output into a security policy

• Configure login enforcement and session tracking

• Configure protection against brute force, web scraping, and Layer 7 denial of service attacks

• Implement iRules using specific ASM events and commands

• Use Content Profiles to protect JSON and AJAX-based applications

• Implement Bot Signatures

• Implement Proactive Bot Defense.

4- Public SSL and Public Domain.

• Deep administrative level on the public SSLs and public Domains

• Integrate and implement the SSLs on F5

• Configure and troubleshooting public SSLs and public Domains

Tagged as: , , , , , , , , , , , , ,

Upload your CV/resume or any other relevant file. Max. file size: 3 GB.

Job Overview
Job Location