We provide IT Staff Augmentation Services!

Systems Administrator Resume

2.00/5 (Submit Your Rating)

SUMMARY:

IT support professional with over a 7+ year career record of accomplishment for providing IT solutions that meet demanding time restraints and exceed expectations. With a proven ability to bridge technology and business goals to provide productive solutions.

RELATED SKILLS AND ABILITIES:

  • CompTIA Security+ ce Certified
  • Current Secret Security Clearance
  • (ACAS 4.6)(Nessus)Assured Compliance Assessment Solution. Certified
  • Microsoft Certified Technology Specialist (MCTS)
  • Host Base Security System ( Confidential ) Certified, AKA, MacAfee Confidential server eEye Digital Security's Retina IAVM suite Certified
  • Confidential Administrator
  • Powershell and BASH Script writing experience
  • Server 2008 and 2012 Administrator experience
  • Experience creating and operating servers in “VMWARE” using ESX and VSPHERE.
  • Experience creating and operating servers in “Virtualbox” virtualization system
  • Red Hat and Ubuntu Linux Systems Administrator
  • Cloud server deployments using Red Hat, Ubuntu, Debian and Windows 7 and Windows 2008

EMPLOYMENT HISTORY:

Confidential

Systems Administrator

Responsibilities:

  • Worked on Windows 2008, 2012 and Linux systems, supporting a surge contract at Pacific Missile Research Facility island of Kauai Hawaii.
  • Supported Security Technical Implementation Guide or Confidential application and confirmation of Confidential configuration settings in preparation for upcoming Cyber Security Inspection ( Short Term Contract).

Confidential

System Administrator, Raleigh - Durham, North Carolina

Responsibilities:

  • Over saw photo/Image storage systems for 1.9 million users.
  • Was responsible for configuring and managing Windows IIS servers and configuration of associated application pools on those servers
  • Concurrently, I was responsible for Confidential patching of the departments 106 windows 2008 and 2012 servers.

Confidential

Security Administrator, Presidio of Monterey, Ca

Responsibilities:

  • I Worked at Network Enterprise Center at the Presidio of Monterey in California
  • I was responsible for compliance scans on all assigned systems, also working in concert with the patching team to achieve acceptable compliance levels.
  • I also Worked as the local Commands Training compliance officer, making sure all personnel were up to date with required Confidential security training.
  • Utilized MacAfee ePolicy Orchestrator ( Confidential ) console According to Confidential 's ensuring all assets were configured correctly and patch compliant.
  • Executed testing on all Confidential polices before implementation on the network.
  • Create exclusion subgroups in Confidential system tree and disable specific deployment tasks to these systems.
  • Produced Confidential custom queries and reports to capture various systems and users populations statistics from data as required.

Confidential

Help Desk Technician/Systems Administrator/Subject Matter Expert

Responsibilities:

  • Working on Computer Network Defense Afloat, creating updating and managing Virtual Machine images hosted on VMWARE ESX servers.
  • Work regularly with applying policies, Confidential 's and FAM's. Worked as Help Desk Agent on CND-Afloat Project, troubleshooting help desk tickets from ships around the world.
  • Assisting Navy Personnel in resolving hardware, software and network issues with McAfee Confidential using its component parts, the Host Intrusion Prevention System,
  • Policy Auditor, Assets Baseline Module,
  • Rogue System Detection,
  • Device Control Module
  • Data Loss Prevention

Confidential

Technical Support Analyst, Network Associate Engineer

Responsibilities:

  • Worked with the Confidential E-Tool Sustainment/ Confidential Wireless Support mission
  • Oversaw 560 hardware E-Tools units (laptops) and two 2005 Database servers with server 2003 back ends.
  • I had to build up the servers per written instructions so that a very specialized abstraction layer software could query the maintenance data and submit parts requests and maintenance data to higher echelons.
  • The problem was the how-to configuration documentation was non-existent (they forgot to write it) and required multiple long calls to the vendor to achieve the proper result, all while I and an airman wrote the technical how-to for this system for the unit.

Confidential

Technical Support Analyst

Responsibilities:

  • Created and Managed user accounts and permissions in Active Directory
  • Acted as the liaison between technical and non-technical personnel
  • Managed the domain OU structure for USARCENT to include all aspects of the Active Directory objects
  • Provided professional guidance to other departments to better enhance their working environments
  • Subject Matter Expert for troubleshooting many types of high level hardware and network issues
  • Efficiently able to communicate critical information to different departments and leadership in layman’s terms
  • Resolved previously “unsolvable” problems through in-depth analytical reasoning and troubleshooting
  • PKI enabled Multi-Function printers to allow scan to network and scan to email options utilizing a Confidential

Confidential

Cyber Security Engineer / Information assurance support officer

Responsibilities:

  • Employ SCAP (Security Content Automation Protocol) compliance checker to verify Security Technical Implementation Guidelines, Confidential 's in preparation for Command Cyber Readiness Inspection.
  • Ensure Confidential compliance for Windows server 2003 and 2008 servers and Windows 7 systems
  • Utilized MacAfee ePolicy Orchestrator ( Confidential ) console and eEye Digital Security's Retina IAVM suite. According to Confidential 's ensuring all assets are configured correctly and patch compliant.
  • Execute testing on all Confidential polices before implementation on the network.
  • Run audits using eEye Digital Security's Retina IAVM suite to confirm proper patching on hardware
  • Create exclusion subgroups in Confidential system tree and disable deployment task to these systems.
  • Produce Confidential custom queries and reports to capture various deployment statistics and data as required.
  • Used NMAP to identify as then unidentified systems on the local network
  • Experienced in coordinating, motivating and training subordinates and fellow coworkers in other departments
  • Made several recommendations that significantly influenced positive user IT experience
  • Work on a daily basis with MS Office, SharePoint, McAfee Confidential, ForeScout, Citrix and Bitlocker Encryption

Confidential

Owner/Operator

Responsibilities:

  • Debian Ubuntu and Centos Linux Servers
  • Experience building and running LAMP stack systems to include
  • Camillo LMS
  • LDAP authentication servers
  • POSTFIX email servers

Confidential

Help Desk Technician

Responsibilities:

  • Performed leadership direction as the role of Helpdesk Manager in their absence
  • Gave Unparalleled Customer service and drive to please the customer in a timely manner
  • Performed Tier 3 support to provide a level of support between Jr Helpdesk Technicians and System Admins.
  • Maintained highest ticket closure rate combined with the fastest resolution time for 14 consecutive months
  • Mapping printers and network drives, account activations, rebuild of user profiles and settings during OS upgrade and computer life cycle replacements.
  • Provided Tier I/II support for over 350,000 Navy and USMC users in a fast paced help desk environment troubleshooting both desktop hardware and software issues.

Confidential

Verizon Wireless Technical Support

Responsibilities:

  • Call manager for Verizon data cell phone users
  • Troubleshot issues with phones and wireless Confidential wireless data systems for customers
  • Resolved customer service problems with complete customer satisfaction
  • Adjust accounts and service plans as the need arose

Confidential

Software Test Engineer

Responsibilities:

  • Managed multiple projects to ensure websites for external clients was completed from start to finish in a timely manner
  • Performed scripting to increase performance
  • Executed regression and investigative testing
  • Build out of Windows XP and Linux machines for hardware and software testing environment

We'd love your feedback!