Jordan Reyes Network Engineer
San Francisco, CA • netengineer@gmail.com • +1 4155-3333
Profile Summary
- Network Engineer with 8 years of experience operating enterprise networks across SaaS, colocation, and enterprise IT, specializing in multi-vendor routing and switching, network security, and SD-WAN.
- Solid technical background across routing and switching (Cisco IOS-XE, Juniper Junos), firewalls (Palo Alto Networks), wireless (Cisco Meraki), SD-WAN (Cisco SD-WAN (Viptela)), cloud connectivity (AWS Direct Connect, Azure ExpressRoute), load balancing (F5 BIG-IP), monitoring (SolarWinds, ThousandEyes), and automation languages (Python, Bash) with strong fundamentals in protocol-level fluency, packet-capture diagnostics, and audit-grade documentation.
- Deep expertise in high-availability network design, defense-in-depth segmentation, software-defined networking, and zero-touch provisioning, leveraging methodologies such as change-management workflows and quarterly failover drills to drive resilient, high-throughput, and secure networks.
- Engaged collaborator working cross-functionally with Security, DevOps, and IT teams in ITIL-aligned, change-controlled environments, contributing to change-advisory boards, design reviews, and post-incident retrospectives with a pragmatic, ownership-first mindset.
- Emerging leader who shares technical excellence and fosters a culture of protocol rigor and diagram and runbook discipline through PR reviews and runbooks, while leading network-engineering guild sessions and authoring widely adopted runbook and design templates.
Technical Skills
- Routing & Switching:
- Cisco IOS-XE, Juniper Junos, Arista EOS, BGP, OSPF, EIGRP, IS-IS, VLAN, STP, EtherChannel
- Network Security:
- Palo Alto Networks, Fortinet, Cisco ASA, IDS/IPS (Snort, Suricata), NAC (Cisco ISE), Zero Trust, ACLs
- Wireless:
- Cisco Meraki, Aruba Central, Ubiquiti UniFi, Ekahau site surveys, 802.11ac/ax, RF tuning
- WAN & SD-WAN:
- MPLS, IPsec VPN, SSL VPN, Cisco SD-WAN (Viptela), VeloCloud, Meraki SD-WAN, ISP management
- Cloud & Hybrid Networking:
- AWS VPC, Azure VNet, GCP VPC, Direct Connect, ExpressRoute, Transit Gateway, cloud-native firewalls
- Monitoring & Load Balancing:
- SolarWinds, ThousandEyes, PRTG, Nagios, NetFlow, Wireshark, F5 BIG-IP, Citrix ADC, NGINX, HAProxy, GSLB
- Automation & NetDevOps:
- Ansible, Python (Netmiko, NAPALM), Terraform, Git, NETCONF/YANG, Jinja2 templating
- Protocols & Foundations:
- TCP/IP, IPv4/IPv6, HSRP/VRRP, MPLS, QoS, Multicast, DNS, DHCP, IPAM, RADIUS/TACACS+
Education
Work Experience
- Owned network architecture and design for the multi-region SaaS production network spanning 60+ global sites, leading the topology across campus LAN, data center fabric, and WAN backbone with 900+ switches, routers, and firewalls under a single design standard.
- Operated enterprise routing and switching using BGP, OSPF, and EIGRP across Cisco Catalyst 9k, Nexus 9k, and Juniper QFX, applying VLAN segmentation, STP and EtherChannel design, and trunking and link aggregation, holding 99.99% core uptime through the year.
- Hardened the network security posture with next-gen firewall policies on Palo Alto and Fortinet, IDS/IPS signatures and NAC enforcement via Cisco ISE, and micro-segmentation aligned with Zero Trust principles, blocking 3,200+ critical threat events and shifting lateral-movement risk from moderate to contained.
- Designed and tuned enterprise wireless deployment on Cisco Meraki across 1,200+ APs, driving Ekahau site surveys, RF channel and power tuning, and SSID and controller policy hardening for clean coverage across 14 office floors across 6 cities.
- Modernized WAN and SD-WAN connectivity across 60+ branch and remote sites via MPLS-to-SD-WAN migration on Cisco Viptela, IPsec and SSL VPN tunnels for remote sites, and ISP diversity and carrier failover, cutting branch latency from 180 ms to 62 ms.
- Engineered hybrid cloud connectivity spanning AWS and Azure across 4 regions, delivering AWS Direct Connect and Azure ExpressRoute circuits, Transit Gateway and VNet hub-and-spoke peering, and cloud-native firewalls (AWS Network Firewall, Azure Firewall), sustaining 40 Gbps sustained across the hybrid edge.
- Built end-to-end network observability on SolarWinds and ThousandEyes covering 900+ devices and 60 site links, defining NetFlow and sFlow analysis for traffic baselining, path-aware synthetic probes via ThousandEyes, and threshold-based alerting and on-call rotations, reducing mean time to detect from 22 minutes to 3 minutes.
- Owned application traffic management for 80+ customer-facing apps using F5 BIG-IP virtual servers and iRules, DNS-based GSLB across 3 regions, and NGINX and HAProxy for microservice routing, sustaining 99.97% measured uptime through the on-call year.
- Reduced operational toil from 34% to 11% through Ansible playbooks for switch and firewall configuration, Python scripts using Netmiko and NAPALM for bulk changes, and Git-based config repos with peer review for every change, reclaiming 320+ engineer-hours/quarter.
- Led incident response across 38 SEV1/SEV2 network incidents during on-call rotations, performing packet captures with Wireshark and tcpdump, systematic log correlation across syslog and SNMP, and documented postmortems with owner-tagged follow-ups, cutting mean time to resolve from 2.8 hours to 34 minutes and curating 200+ network diagrams, IPAM records, and runbooks.
- Worked closely with Security, DevOps, and Data Center Operations teams across 7 colocation data centers to coordinate change-management windows, cross-connect provisioning, and capacity planning reviews, authoring 12 network design RFCs that shaped the org's network standard and onboarding 5 new network engineers.