Windows System Administrator Resume
4.00/5 (Submit Your Rating)
SUMMARY:
- Self - motivated Windows System Administrator willing and able to learn new systems and adapt with changing corporate environments.
- Looking to bridge the gap between user support and security operations.
WORK HISTORY:
Windows System Administrator
Confidential
Responsibilities:
- Builds and maintains systems hardware and system provisioning.
- Handles complex support desk incidents; determines resolution action that will support operational and support staff needs.
- Monitors daily system activity, verifies the integrity and availability of all hardware, server resources, systems and key processesreviews system and application logs, and verifies completion of scheduled jobs such as backups.
- Leads the evaluation, testing, and implementation of office network technologies and communication services, which include installing hardware, developing software, and writing procedures.
- Handles new installations and move, add, change requests from end users. Supports telecommunications infrastructure and associated
- Security Software Confidential IDS
- Bradford NAC Symantec PGP Secunia Confidential Card Recon
- Checkpoint endpoint disk encryption Confidential
- Combofix Malware bytes
Senior Desktop Support Analyst
Confidential
Responsibilities:
- Installed encryption on client side and trained end users, showed them how public and private keys work Worked with windows admins and security group for support, patching and shared drive creations. Created secured folders on client and server shares.
- Used private key to recover data when employee's where terminated
- Checkpoint disk encryption
- Installed app on client machines
- Created recovery files for corrupted machines for date recovery.
- Added machines into virtual groups for access to new blades such as AV and local disk encryption.
- Credit card scanning and patching
- Secunia Confidential -Ran for Windows and 3rd party apps patches.
- Card Recon\Spider
- Mask all cardholder data - automatically makes PAN data Confidential -compliant within simple file types. Quarantine - moves the specific file to a secure location and permanently erases the original. Delete Permanently - deletes the detected data permanently.
- Encrypt file - secures the file content using an AES protected zip file and permanently erases the original.
- Detect and analyze threats Incident Response Quarantine threats
- White list known good resources
Desktop support
Confidential
Responsibilities:
- Review, analyze, and evaluate business systems and user needs. Supply second tier assistance for Application Development Analysts as deemed appropriate.
- Manage ticket queues and distribute items to technicians Point of access for regional offices
- Assist with complex problems and issue resolution. Run Confidential credit card scans
- Active Directory Microsoft Office Winstall
- Oracle Applications ADP\HRP Compusense
- Develop project testing and implementation plans.
- Coordinate the development of IT policies, procedures and standard s and maintain them based on the involvement of technology and organization. Serve as project lead for IT research projects.
- Assist IT management staff with the development and implementation of the organization’s technological strategic goals.
- Research and test new technologies and provides recommendations as to the usefulness and compatibility to the organization’s current technology. •
- Create project documentation on an as needed basis.
Security Officer & Board member
Confidential
Responsibilities:
- Position on the Credit Union Board managing credit-union computers and local area network. eDiscovery of sensitive information
- Ensure security policies are enforced and all member data is protected.
- Work with the board to revise and strengthen data management and disaster-recovery process in order to protect and secure the personal information of members.
- Performed security scans of credit-union infrastructure in order to identify missing OS and application patches and security mis-configurations
- Performed regular security audits and presented these findings to the credit committee.
Desktop Support Analyst
Confidential
Responsibilities:
- Configure and build machine images for deployment to new users.
- Assist in hardware installation, office technology build-outs, and enterprise system deployments.
- Established proficiency at troubleshooting and maintaining Windows PC workstations, both Operating System/software and hardware.
- Proven experience supporting Blackberry handheld devices in the enterprise .
- Experience with iPhone, iPad and Droid devices
Desktop Support System Analyst
Confidential
Responsibilities:
- Supported Windows XP shop of over 1200 users.
- Provided level 3 phone supported and user Confidential to remote into machines.
- Performed adds, moves and changes for the company. Worked in a non admin environment.
Support Technician
Confidential
Responsibilities:
- Desktop/Hardware Support Technician
- Engaged in the process of imaging new machines for deployment to XP SP2 & user file backup using Ghost.
- Maintained and Supported HP Laser Jet Printers.
- Used Remedy to open, close and update Tickets. Engaged in the operation of configuring new user accounts on Desktops and PC moves.
- Troubleshoot & Maintained Email client Outlook 2003 on Exchange Server.
- Installed Avistar
Support Technician
Confidential
Responsibilities:
- Desktop/Hardware Support Technician
- Engaged in the process of imaging new machines for deployment.
- Engaged with limited administrative duties such as unlocking user accounts and changing passwords using user manager for NT 4.0.
- Assisted in deploying an entire trade floor consisting of workstations, Laptops, local & network printers.