We provide IT Staff Augmentation Services!

Telecommunications Administrator Resume

5.00/5 (Submit Your Rating)

Troy, MI

SUMMARY:

  • IT professional experienced working with networking technologies, including IP addressing, LANWAN technologies and wireless. Knowledge includes various network protocols such as ACLs, VLANs, Confidential and NAT. Hands - on experience includes installing, configuring and troubleshooting network equipment. Support experience includes client/server, hosted/cloud and remote/mobile computing. Additional talent includes PM, documentation and excellent customer service.
  • Working with Telco’s to troubleshoot circuits
  • Static/Dynamic routing knowledge and configuration
  • Rack mounting hardware, cable testing, Confidential for HW warranty & feature licensing
  • Network troubleshooting (Ping, Traceroute, Wireshark and PuTTY for telnet/SSH)
  • Windows Administrative Tools ( Confidential, DHCP, DNS, Event Viewer, Services, Defrag, etc.)
  • WAN knowledge (PPP/HDLC), DMVPN, MPLS and FR (DLCI, CIR, PVC, etc)
  • Home network includes Windows Server 2012 DC, Confidential Server Confidential, Cisco CUCM/CUC/IM&P virtual servers, Cisco routers (2801, 2811, 2901, 2911), ASA firewall 5510, switches (2960, 3550 POE) and computers running Win10 Pro, Win 8.1Pro and Win7 Pro. Tools include MS Visio Pro, PuTTY, SecureCRT, TFTPD, Advanced IPScanner, ExamDiff, Wireshark and GNS3/Boson sims.

PROFESSIONAL EXPERIENCE:

Confidential

Telecommunications Administrator, Troy, MI

Responsibilities:

  • Environment consisted of an Confidential -integrated VoIP network managed via CLI, GUI, Vsphere client and Confidential . VoIP cluster included HQ/DR locations with redundant CUCM, CUC, IM&P, HA 3900 CUBE router pairs connected to AT&T SIP trunks & Windows 2008/2012 Confidential Servers. Work included troubleshooting 69xx, 79xx, 88xx phones, MAC, backups, failover testing, TF / DID configuration, etc.
  • Managed the ongoing project of opening, moving and closing various lending locations nationwide. Ordered primary/backup circuits, network racks, patch panels, Confidential, etc. Coordinated with Network team for router/switch/WAP builds and Server team for server builds/moves. Configured phone numbers into CUBE routers and configured sites, DID’s, phones and users into CUCM/CUC. Installed equipment at remote site and tested network, Wi-Fi, phones, applications and printing for functionality.
  • Other projects included upgrading certificates on VoIP cluster, working with vendors via RFP to upgrade cell booster solution in data center, switching vendors for call data reporting and implementation of Alertus emergency mass notification for all company phones.

Confidential

Service Delivery/Network Engineer, Troy, MI

Responsibilities:

  • Manage branch network including branch equipment Cisco ISR’s (2901, 2911, 4331) running Confidential and DHCP. Associated HW includes POE, 8/16/24 port WICs/NIMs and 2960X/3550 switches as well as Cisco Meraki AP’s and Cradle Point (4G wireless WAN failover). Configure ACLs to limit access to branch routers (inbound) and to allow vendor applications port-based access (outbound).
  • Manage public/private IPV4 addressing for branches, configure and ship routers for ongoing router upgrades. Connect locally/remotely to branch routers via console/PuTTY to troubleshoot/configure
  • Provide MAC user support for CUCM/CUC VoIP phone system across 2 headquarter office locations. Network is comprised of 2 CUCM servers per site (1pub/3sub) and 1 Unity server per site (1pub/1sub).
  • Worked with Telco’s to troubleshoot circuits ( Confidential, Confidential, Cox, Frontier, Century Link, etc.)
  • Monitoring tools include AVG and PRTG which are used to monitor sites experiencing outages. Solar Winds NCM used to report on hardware, IOS versions and device uptime as well as confirm/verify configurations on existing devices. Additional reports are run in PRTG for sites experiencing packet loss, performance degradation and/or outages. Perform Layer 1-3 troubleshooting with branches and escalate to ISP for circuit testing and/or dispatch.
  • Create parts and budget estimations for hardware acquisitions related to lifecycle replacement projects (router upgrades, port expansions, wireless backup, etc.) Incidents, requests and assets managed via Service Now.

Confidential

Client Technologies Technician, Camas, WA

Responsibilities:

  • Device support, configuration, troubleshooting, and remote support as needed
  • Image and configure laptops, desktops and tablets using SCCM front end build tool (Win7/8 x64) across the network via PXE boot or using lite touch via USB
  • Use SCCM 2007/2012 to run advertisements, view/add collections and collection memberships, monitor and troubleshoot pushes, etc.
  • Additional support for TCP/IP and network printing, bandwidth monitoring (Solar Winds Orion), Cisco IP Communicator, MS Office (2010, 2013), Lync (2010, 2013) and per-site file/print server support
  • Users/computers in multiple domains managed via MMC console with Confidential for each domain
  • Project work includes hardware/software refreshes, moves and rack mounting server and network equipment.
  • Incidents tracked through Remedy (ITSM). Knowledge Base used was Remedy ( Confidential ).

Confidential

Support Engineer, Portland, OR

Responsibilities:

  • Configure 600 laptops across North American enterprise with Microsoft Bitlocker encryption
  • Document processes/procedures and update ticket status/problem summaries
  • VNC, Confidential and Configuration Manager 2012 Remote Control used to access end user computers and virtual Confidential Horizon View Client VDI desktop sessions for troubleshooting.
  • SCCM 2012 used to create device queries to determine HW compatibility for encryption.
  • Tier 2/3 support including deploying/troubleshooting workstations and responding to/resolving tickets
  • Active Directory used to manage users, computers, permissions and groups
  • Monitor network events & bandwidth utilization via Solar Winds Orion.
  • Cisco VPN Client supported for remote workers.
  • End user voicemail administered via Cisco Unity Messaging.

Confidential

Network Technician, Irvine, CA

Responsibilities:

  • Support provided for 1750 Windows7 users distributed across 100 branch and office locations across California.
  • Users, computers, groups managed using Active Directory.
  • Multiple Windows Server 2003/2008 and Exchange 2003/2010 servers supported across enterprise.
  • Administration included issue troubleshooting, user/computer move/add/changes, monthly Windows server updates, and Spam/Quarantine email server administration (Proofpoint/Postini/Trend). Netflow Analyzer used to monitor bandwidth utilization across multiple sites.
  • Cisco Confidential client used to authenticate devices on network. Branch conversion projects were completed when other banks were acquired.
  • Typical conversion project work included racking preconfigured router, switch and Confidential as well as patch cabling PC’s, printers and Cisco IP phones.
  • Other projects included user mailbox migration from Server 2003 (ESM) to Exchange Server 2010, Confidential Kace software pushes (Acrobat, Java, etc.) and desktop/laptop upgrades.
  • End user voicemail administered using Cisco Unity Messaging.
  • Cisco VPN Client supported for remote workers.

Confidential

Network Engineer, Tempe, AZ

Responsibilities:

  • Support provided for multiple customers and their network infrastructure.
  • Work included moves within and between datacenters (ex: rack mounted server/router/ switch), changes, capacity planning, and troubleshooting (ex: firewall packet capture).
  • Network troubleshooting also provided for vendor-related circuit issues.
  • Learned and became SME for Confidential VPN token administration via Confidential Server Console interfaced with Cisco Secure Confidential .
  • Typical workflow involved managing outages, scheduled changes during scheduled and emergency change windows and disaster recovery testing.
  • Participated in rotating oncall and engaged 24/7 Confidential as needed.
  • Confidential ’d to Server 2003/2008 used for datacenter access (routers, switches, firewalls) and Confidential server administration.
  • Configured change management tickets through ITIL based asset management system ( Confidential ) and CMB to ensure that client IT assets were appropriately tracked and managed throughout their lifecycle.

Confidential

Systems Support Specialist, Scottsdale, AZ

Responsibilities:

  • Contract support provided to 500 administrative and medical staff in remote clinical offices. Duties included performing user/ group/device add/remove/changes via Confidential, managing email accounts via Exchange 2003 and printers (print server and TCP/IP).
  • Created and imaged RAID servers, PC’s and laptops with Ghostcast server. Moved and added rack mounted servers as needed.
  • Virtual servers were managed using Confidential Vsphere Client. VLAN port assignments, troubleshooting, descriptions, etc performed on Cisco switches (2950, 3950).
  • Set up POE enabled Avaya IP phones. Managed IP Address space via Orion Confidential and administered end-user SSL VPN sessions.
  • Documentation included creating/ storing documents on internal Wiki, MS Office and SharePoint updates.
  • Tape backups performed via Confidential -serv grandfather/father/son full & differential backups. Tickets managed using Sysaid ticketing system.

We'd love your feedback!