Cyber Defense Network Support Technician Resume
2.00/5 (Submit Your Rating)
PROFESSIONAL SUMMARY:
Over the past 7 years I have become a professional Information Technology specialist with well - developed skills and experience in Network Infrastructure, Security and Cryptography. Daily operations consist of deploying, securing, sustaining, troubleshooting, and repairing standard voice, data, and video network infrastructure systems, IP detection/intrusion systems and cryptographic equipment.
WORK HISTORY:
Confidential
Cyber Defense Network Support Technician
Responsibilities:
- Technical specialist responsible for monitoring, operating, managing, troubleshooting and restoring any Confidential Information Network ( Confidential ) devices and associated IP networks.
- Tier 1 maintenance on all Confidential Information Network ( Confidential ) devices and associated IP networks management systems.
- Perform pro-active monitoring of network elements alarms and alerts using network management system(s)
- Use Palo Alto firewalls to monitor traffic and troubleshoot circuit problems
- Perform fault isolation, diagnostic, and assessment functions to include determination and execution of corrective action(s) on real-time basis.
- Maintain records and ticket history associated with reported problems to reference while troubleshooting.
- Collaborate with functional users and remote operations centers in proactive and reactive monitoring situations.
- Reports Confidential Information Network violations to proper channels to prevent network vulnerabilities from being exploited.
- Coordinates with change management and implementation teams to facilitate problem escalations and distribution of information
Confidential
Network Administrator
Responsibilities:
- Enterprise Operation Center, Network administrator for 600+ FBI sites, stateside and overseas.
- Remotely monitor 3 network enclaves, at each site, consisting of Cisco 7201, 6509, 4506, 3750, and 2960
- Utilized IPS, DRAC switch, Cisco Network Admission Control (NAC) server to provide network integrity
- HP Network Node Manager and HP Network Automation maintained cisco configuration snapshots and node updates
- Direct customer support from Verizon (SP) to troubleshoot circuit issues
- Direct customer support from Cisco to replace faulty routers and switches
- Use ITB Service Manager to manage tickets of network request and repairs
- Implement VSS for redundancy in core routers
- Utilize Active Directory for user accounts and workstation issues
- Utilize DHCP server to maintain IP leases and reservations and conflicts
- Implemented Access Control Lists for hardening of Cisco & Juniper routers/switches.
- Configured KG175A’s and KG175D’s cryptographic devices to create classified networks allowing access to multiple services such as: files server, database servers, mail server, print server, web server, proxy server, and share point.
- Configure Cisco routers and switches with port security, setting a specified mac-address limit denying network access to unauthorized computers and phones.
- VLAN configuration to segregate data such as: data traffic, voice traffic, printer traffic and classified traffic
- Subject Matter Expert in network cryptographic devices (KG-340, KG-175A/D/G, KIV-7, KIV-19)
- Manage cryptographic devices via Confidential ; discovering new devices, pushing routes, rekeying and status alerts.
- Troubleshoot cryptographic devices problems using Confidential, HP Network Automation and HP Network Node Manager.
Confidential
Information Technology Specialist
Responsibilities:
- Network administrator at Creech AFB for 30+ Air Force units, over 5,000 users conducting Remote Piloted Aircraft missions.
- Installation of unclassified and classified data, voice (analog/digital), network printing and encryption.
- Configuring host names, local user accounts, user authentication servers (TACACS), VLANs, classes of service, quality of service, speed, duplex, bandwidth, IP addressing, static routes, on routers/switches manufactured by Cisco and Juniper.
- Enhanced Interior Gateway Routing Protocol (EIGRP) for network neighbor adjacencies
- Open Shortest Path First (OSPF) to redistribute routing information
- Addition of Cisco & Juniper switches to existing virtual chassis’
- Upgrade Operating Systems using TFTP, FTP, or RCP protocols to upload the image to the router/switch
- Configure and sustain Cisco Call Managers to provide unclassified Voice over Internet Protocol (VoIP) phones and classified Voice over Secure Internet Protocol (VoSIP)
- Ran over 1,000 paths of various fiber termination enable critical mission networks.
- Fabricate various fiber and copper terminations; ST, SC, LC, Cat-5 & 6, RJ-45, Coaxial and 25-pair Amphenol
- Restore circuit outages by coordinating with Defense Information Systems Agency (DISA) and rerouting fiber
- Install & Troubleshoot secure Video Teleconference for management representatives
- Lead upgrade projects and updated officials on project status completion
- Implemented Access Control Lists for hardening of Cisco & Juniper routers/switches.
- Configure and sustain classified Voice over Secure Internet Protocol (VoSIP) using network encryption devices.
- Configured KG175A’s and KG175D’s cryptographic devices to create classified networks allowing access to multiple services such as: files server, database servers, mail server, print server, web server, proxy server, and share point.
- Experience with 802.1x server requiring over 5,000 computers & wireless access points to authenticate with server before allowing access to the network.
- Configure Cisco routers and switches with port security, setting a specified mac-address limit denying network access to unauthorized computers and phones.
- VLAN configuration to segregate data such as: data traffic, voice traffic, printer traffic and classified traffic
- Subject Matter Expert in network cryptographic devices (KG-340, KG-175A/D/G, KIV-7, KIV-19
- Manage cryptographic devices via Confidential ; discovering new devices, pushing routes, rekeying and status alerts.
- Inspect cryptographic devices ensuring keying material is not expired eliminating a Confidential incident
- Cryptographic key updates of over 200 network encryption devices ensuring secure communications
- Primary Confidential Responsibility Officer, maintaining all records of inventories and keying material