Now you can Instantly Chat with Bhushan!
Thanks for the opportunity and its great pleasure and honor for me to build my career in your company.
A senior professional over 13 years of wide-ranging experience in EnterpriseArchitect – I...
I’m Industry standard certified professional (TOGAF, PRINCE2, ITIL, AWS, Cisco, VMware, PaloAlto, Checkpoint). Familiar with industry compliance,Cyber Security standards (e.g. ISO27001, HIPPA, SOX, GDPR, PCI-DSS) and worked on various secuiryt technologies (Firewall, ISE, NAC, IPS, VPN, SSL, Proxy, WAF, DLP, CASB, SASE, DNS). Also having fair knowldegeon front end and back end technologies like Java, Python, Database as dveloped Cyber Crime Investigation project in Java programmingduring my B.E. Computer Engineering.
Currently working as Enterprise Architect – IT Strategy, Planningand Designwith Wipro Technologies and responsible for Enterprise ArchitectureStrategy (Security, Network, Compute, Storage, Database & End User Services), Technology Roadmap and Life Cycle Management for several Enterprise and DC echnologies.Also having exposure in Server Virtualization technologies and Public Cloud (AWS, Azure) architecture methodologies.
Driving the Solutioning activitiesfor network infrastructure outsourcing opportunities which involve multiple service lines and / or technology domains (Security, Network, Compute, Storage, Database and Hybrid Cloud). Development of a solution proposal response to prospective Clients throughout the sales cycle.
I have significant people management, leadership experience and a proven record of accomplishment of leadingteam dedicated to technical and service excellence. Responsible for establishing and maintaining vendor and partner relationships including KPI, SLA and daily operations.My combination of IT Services experience, analytical capability and interpersonal skills have allowed me to implement several major system enhancements while simultaneously improving internal service quality and securing the IT environment with the best practices.
Please review my resume for additional details regarding my expertise and career achievements. I lookforward to discuss how my experience and background meets your requirements.
Thank you for your time and consideration.
Networking & Security
Next Generation Fabric: CISCO ACI
Next Generation Fabric: CISCO ACI (APIC, L3 Out, GOLF, Multi Pod, Multi-Site, VMM, Micro-Segmentation)
NGF will be the software defined core network in our datacenters. The solution based on Cisco Application Centric Infrastructure product (ACI). Achieve 99.999% network availability for flows passing over NGF network estate.Zero impact on device maintenance using graceful switchover technologies. NGF will provide high bandwidth non-blocking connectivity for flows passing over the fabric. NGF should never have a bandwidth restriction through over-subscription situation.The configuration is fully network oriented;each customer subnet is attached to a separate bridge domain (BD) this an application endpoint group (AEPG) refers only to a single subnet.Show More Show Less
SkillsCisco Technologies Cisco NXOS Cisco ISE Network Security Network Design Network Administration Storage Area Network - (SAN)
ToolsJIRA Atlassian Confluence
Cloud Store: NSX-V, NSX-T
Cloud Store: NSX-V (NSX-V, ESXi, HCI, VOS, vCloud-Director)
The HCI follows the SDDC approach. It consists of different hardware in one physical box, the so-called Hyperflex.The Virtualization layer has realized with known software from VMware (Hypervisor ESXi). In addition, Network virtualization (vDS, DLR, LB, DFW, ESGs) has integrated via VMware NSX software. The VOS Platform is a combined Infrastructure-as-a-Service (IaaS) offering for cloud-native workloads. The Platform is based on industry leading open source projects OpenStack® and provides enterprise customers with flexibility in software and hardware.Show More Show Less
SD-WAN (Cisco Viptela & SilverPeak)
The objective of the project is to create a proposition called connected office. There by achieving Zero Touch Provision, End-to-End Encryption, Dynamic Path selection (multi-link), Central Management, Security-Firewalling Services,WAN Optimization, QoS, Policy Based Controls, Local Breakout, Service Chaining etc.Show More Show Less
SkillsNetwork Security SD-WAN
SDP / CASB:ZScaler ZPA, ZIA & Palo Alto Prisma
SDP / CASB:ZScaler ZPA, ZIA & Palo Alto Prisma
Zscaler Private Access (ZPA) is a cloud service from Zscaler that provides seamless, zero trust access to private applications running on public cloud or within the data center. With ZPA, applications are never exposed to the internet, making them completely invisible to unauthorized users. This zero-trust network access (ZTNA) approach supports both managed and unmanaged devices and any private applicationShow More Show Less
IT Merger and Acquisition
IT Merger and Acquisition:
Supporting the business case for achieving cost savings by combining the IT cost structures Reducing overlap of IT in the merged companies by rationalizing application portfolios and IT organizations.Show More Show Less
SkillsPMP Network Design