Senior Network Engineer
About Us
At Providence Global Center Hyderabad, we build and operate highly reliable, secure, and scalable enterprise network platforms that support mission‑critical applications across on‑premises and hybrid cloud environments. Our Network Engineering team focuses on automation, visibility, and operational excellence by leveraging industry‑leading tools such as SolarWinds, Cisco ISE, Infoblox DDI, and Azure networking services. As part of our ongoing transformation, we are expanding our capabilities in Infrastructure as Code, analytics, and data‑driven operations to improve reliability, compliance, and efficiency across the organization.
Job Overview
As a Sr. Network Engineer, you will be responsible for designing, operating, and enhancing enterprise network management and identity platforms including SolarWinds, Cisco ISE, Infoblox DDI, and Azure DNS. You will work closely with Network Operations, Data Engineering, and Dev teams to automate network workflows, build operational tools, and deliver analytics and dashboards that provide visibility into inventory, compliance, capacity, availability, and incidents. This role requires strong technical depth, automation mindset, and collaboration skills to enable scalable, reliable, and data‑driven network operations in a hybrid environment.
Responsibilities:
- Operate and enhance Cisco ISE (centralized 802.1X/MAB/TACACS+):
- Build and maintain policy sets, authentication/authorization rules, downloadable ACLs, and device admin policies.
- Integrate with AD/LDAP, certificates/PKI (EAP‑TLS), posture & profiling, guest/BYOD portals
- Administer distributed/HA ISE deployments, manage certificates, backups, upgrades/patches, and perform log analysis (Live Logs/RADIUS/TACACS+).
- Troubleshoot 802.1X (EAP methods), MAB fallbacks, posture checks, and TACACS+ device admin flows end‑to‑end.
- Administer Infoblox DDI (NIOS/Grid):
- Manage DNS/DHCP/IPAM: zones, views, RPZ, DNSSEC, records (A/AAAA, CNAME, PTR, SRV, TXT/SPF/DKIM), DHCP scopes/options/failover HA, IPAM blocks/subnets, discovery, and workflows.
- Operate Grid master/members, HA pairs, upgrades, hotfixes, Grid backups/restore, logging/syslog, and role-based access.
- Troubleshoot DNS (recursion, delegation,), DHCP lease/option issues, and IPAM conflicts.
- Automate DDI using Infoblox WAPI, CSV imports, extensible attributes, templates, and (where applicable) cloud adapters for hybrid/cloud IPAM.
- Build IaC & automation for network tooling and DDI using Terraform and Python; create reusable modules, CI/CD pipelines, and policy-as-code
- Design, deploy, and administer SolarWinds Orion platform (NPM, NCM) including discovery, node onboarding, poller tuning, groups and custom dashboards.
- Build robust alerting & reporting (thresholds, dependencies, alert tuning, escalation policies) and automate runbooks using SWQL, Orion SDK/REST, and PowerShell.
- Plan and execute SolarWinds, Infoblox and ISE upgrades and hotfixes
- Collaborate with Platform, Security, and App teams to enable reliable name resolution, access control, and observability across on‑prem and Azure.
- Ensure security & compliance: least privilege/RBAC, certificate hygiene, audit trails, data protection, and change management (ITIL).
- Participate in incident management, problem/root-cause analysis, and continuous improvement of monitoring, detection rules, and SLOs.
- Support on-call rotations across time zones with crisp communication and effective handoffs.
- Contribute to switching/routing operations: L2/L3 design, STP/MST, EtherChannel, HSRP/VRRP, OSPF/BGP, QoS, ACLs/NAT, IPsec/SSL VPNs; implement standards and remediation via NCM templates.
- Partner with Data Engineering and Dev teams to build and maintain network dashboards and tools for inventory, automation, configuration drift, and incident analytics.
What would your day look like?
- Monitor and triage alerts and requests related to SolarWinds, ISE, Infoblox DDI, and Azure DNS; drive swift mitigation and durable fixes.
- Onboard new devices/services into SolarWinds; tune pollers, thresholds, dashboards, and dependency maps for actionable observability.
- Review ISE Live Logs and RADIUS/TACACS+ transactions; adjust policy sets, profiling/posture, and guest/BYOD flows as needed.
- Manage DDI changes: create/modify DNS zones/records, DHCP scopes, IPAM allocations; validate change plans and execute during maintenance windows.
- Run compliance and configuration drift checks; remediate non‑compliant network devices with versioned templates.
- Partner with Security/Cyber teams on RBAC, certs/PKI, NAC policies, and audit findings; close gaps with measurable controls.
- Work cases with vendor TAC (Cisco, Infoblox, SolarWinds, Microsoft) for critical issues and escalations; document RCAs and knowledge articles.
- Drive cost, reliability, and performance improvements for tooling (poller capacity, data retention, backup/restore).
- Participate in CAB/Change control, prepare MOPs with peer reviews, and execute changes with back‑out plans.
Who are we looking for?
- Bachelor’s or equivalent in Engineering/Technology.
- 5–8 years total experience in enterprise networking/operations, with:
- 3+ years hands-on with Infoblox DDI (NIOS/Grid) across DNS/DHCP/IPAM.
- 3+ years with SolarWinds (NPM/NCM) including upgrades, alerting, and SWQL/SDK automation.
- 2+ years with Cisco ISE (802.1X/MAB, TACACS+, posture/profiling, guest/BYOD, pxGrid, TrustSec).
- Strong Terraform skills for DNS/Infra modules; proficiency in PowerShell and Python for automation and APIs (Orion SDK/SWIS, Infoblox WAPI, ISE ERS).
- Knowledge of L2/L3 networking: VLANs, STP/MST, LACP/Port‑Channel, OSPF/BGP, HSRP/VRRP, QoS, ACLs/NAT, IPsec/SSL VPNs.
- Familiarity with Azure networking constructs (VNets, Private Endpoints, NSGs/UDRs, vWAN/Firewalls) and their DNS implications.
- Hands-on with CI/CD (Azure DevOps/GitHub), source control (Git), code review, and artifact/version management.
- Experience with alert and event integrations from monitoring and network tools into Azure logic apps and ServiceNow (Incident/Event Management)
- Strong troubleshooting across packets/logs (Wireshark), RADIUS/TACACS+, DNS resolution chains, DHCP, ALA and Splunk
- Proven incident management and RCA skills; clear written/runbook documentation and stakeholder communication.
- Working knowledge of AGILE practices for incident/change/problem management.