We provide IT Staff Augmentation Services!

Cyber Defense Network Support Technician Resume

PROFESSIONAL SUMMARY:

Over the past 7 years I have become a professional Information Technology specialist with well - developed skills and experience in Network Infrastructure, Security and Cryptography. Daily operations consist of deploying, securing, sustaining, troubleshooting, and repairing standard voice, data, and video network infrastructure systems, IP detection/intrusion systems and cryptographic equipment.

WORK HISTORY:

Confidential

Cyber Defense Network Support Technician

Responsibilities:

  • Technical specialist responsible for monitoring, operating, managing, troubleshooting and restoring any Confidential Information Network ( Confidential ) devices and associated IP networks.
  • Tier 1 maintenance on all Confidential Information Network ( Confidential ) devices and associated IP networks management systems.
  • Perform pro-active monitoring of network elements alarms and alerts using network management system(s)
  • Use Palo Alto firewalls to monitor traffic and troubleshoot circuit problems
  • Perform fault isolation, diagnostic, and assessment functions to include determination and execution of corrective action(s) on real-time basis.
  • Maintain records and ticket history associated with reported problems to reference while troubleshooting.
  • Collaborate with functional users and remote operations centers in proactive and reactive monitoring situations.
  • Reports Confidential Information Network violations to proper channels to prevent network vulnerabilities from being exploited.
  • Coordinates with change management and implementation teams to facilitate problem escalations and distribution of information

Confidential

Network Administrator

Responsibilities:

  • Enterprise Operation Center, Network administrator for 600+ FBI sites, stateside and overseas.
  • Remotely monitor 3 network enclaves, at each site, consisting of Cisco 7201, 6509, 4506, 3750, and 2960
  • Utilized IPS, DRAC switch, Cisco Network Admission Control (NAC) server to provide network integrity
  • HP Network Node Manager and HP Network Automation maintained cisco configuration snapshots and node updates
  • Direct customer support from Verizon (SP) to troubleshoot circuit issues
  • Direct customer support from Cisco to replace faulty routers and switches
  • Use ITB Service Manager to manage tickets of network request and repairs
  • Implement VSS for redundancy in core routers
  • Utilize Active Directory for user accounts and workstation issues
  • Utilize DHCP server to maintain IP leases and reservations and conflicts
  • Implemented Access Control Lists for hardening of Cisco & Juniper routers/switches.
  • Configured KG175A’s and KG175D’s cryptographic devices to create classified networks allowing access to multiple services such as: files server, database servers, mail server, print server, web server, proxy server, and share point.
  • Configure Cisco routers and switches with port security, setting a specified mac-address limit denying network access to unauthorized computers and phones.
  • VLAN configuration to segregate data such as: data traffic, voice traffic, printer traffic and classified traffic
  • Subject Matter Expert in network cryptographic devices (KG-340, KG-175A/D/G, KIV-7, KIV-19)
  • Manage cryptographic devices via Confidential ; discovering new devices, pushing routes, rekeying and status alerts.
  • Troubleshoot cryptographic devices problems using Confidential, HP Network Automation and HP Network Node Manager.

Confidential

Information Technology Specialist

Responsibilities:

  • Network administrator at Creech AFB for 30+ Air Force units, over 5,000 users conducting Remote Piloted Aircraft missions.
  • Installation of unclassified and classified data, voice (analog/digital), network printing and encryption.
  • Configuring host names, local user accounts, user authentication servers (TACACS), VLANs, classes of service, quality of service, speed, duplex, bandwidth, IP addressing, static routes, on routers/switches manufactured by Cisco and Juniper.
  • Enhanced Interior Gateway Routing Protocol (EIGRP) for network neighbor adjacencies
  • Open Shortest Path First (OSPF) to redistribute routing information
  • Addition of Cisco & Juniper switches to existing virtual chassis’
  • Upgrade Operating Systems using TFTP, FTP, or RCP protocols to upload the image to the router/switch
  • Configure and sustain Cisco Call Managers to provide unclassified Voice over Internet Protocol (VoIP) phones and classified Voice over Secure Internet Protocol (VoSIP)
  • Ran over 1,000 paths of various fiber termination enable critical mission networks.
  • Fabricate various fiber and copper terminations; ST, SC, LC, Cat-5 & 6, RJ-45, Coaxial and 25-pair Amphenol
  • Restore circuit outages by coordinating with Defense Information Systems Agency (DISA) and rerouting fiber
  • Install & Troubleshoot secure Video Teleconference for management representatives
  • Lead upgrade projects and updated officials on project status completion
  • Implemented Access Control Lists for hardening of Cisco & Juniper routers/switches.
  • Configure and sustain classified Voice over Secure Internet Protocol (VoSIP) using network encryption devices.
  • Configured KG175A’s and KG175D’s cryptographic devices to create classified networks allowing access to multiple services such as: files server, database servers, mail server, print server, web server, proxy server, and share point.
  • Experience with 802.1x server requiring over 5,000 computers & wireless access points to authenticate with server before allowing access to the network.
  • Configure Cisco routers and switches with port security, setting a specified mac-address limit denying network access to unauthorized computers and phones.
  • VLAN configuration to segregate data such as: data traffic, voice traffic, printer traffic and classified traffic
  • Subject Matter Expert in network cryptographic devices (KG-340, KG-175A/D/G, KIV-7, KIV-19
  • Manage cryptographic devices via Confidential ; discovering new devices, pushing routes, rekeying and status alerts.
  • Inspect cryptographic devices ensuring keying material is not expired eliminating a Confidential incident
  • Cryptographic key updates of over 200 network encryption devices ensuring secure communications
  • Primary Confidential Responsibility Officer, maintaining all records of inventories and keying material

Hire Now