Network Security & Vmware Engineering Manager Resume
Ft Meade, MD
SUMMARY:
- Executes cyberspace operations and information operations functions and activities. Plans, organizes, directs and executes cyberspace and information operations such as, Defensive Cyber Operations (DCO), Offensive Cyber Operations (OCO), Department of Defense (DoD) Information Network (DoDIN) Operations and Mission Assurance for Air Force weapons systems and platforms. Such operations cover the spectrum of mission areas within the cyberspace domain.
- Plans and prepares for mission.
- Reviews mission tasking and intelligence information. Supervises mission planning, preparation and crew briefing/debriefing. Ensures equipment and crew are mission ready prior to execution/deployment.
- Operates weapons system(s) and commands crew. Performs, supervises, or directs weapons system employment and associated crew activities.
- Conducts or supervises training of crewmembers. Ensures operational readiness of crew by conducting or supervising mission specific training.
- Develops plans and policies, monitors operations, and advises commanders. Assists commanders and performs staff functions related to this specialty.
- Translates operational requirements into architectural and technical solutions. Works with commanders to deliver complete capabilities that include technical and procedural components. Researches or oversees research of technologies and advises commanders on associated risks and mitigation factors in conjunction with meeting requirements.
- Directs extension, employment, reconfiguration, adaptation and creation of portions of cyberspace to assure mission success for combatant commanders. This includes both deliberate and crisis action scenarios.
- Develops policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data.
- Conducts risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs.
- Conducts systems security evaluations, audits, and reviews; assesses security events to determine impact and implementing corrective actions.
- Participates in network and systems design to ensure implementation of appropriate systems security policies.
- Ensures the rigorous application of information security/information assurance policies, principles, and practices in the delivery of all IT services.
- Implements, maintains, and conducts on - site and remote analyses of information system standard security products and associated systems.
- Provides expert level advice and assistance in the areas of security architecture, systems auditing, security tools, and all areas related to information security.
TECHNICAL SKILLS:
Software: Microsoft Exchange Server 2003; HP OpenView; Veritas Net Back Up Exec; NetApps./Node Manager, MS Sharepoint 2012, MS HyperV, Citrix Xenapps, PeopleSoft; Lotus Notes, MS Active Directory 2000 -2008, Microsoft Office Suite; Microsoft Server Management System; AutoCAD, Novell Groupwise/Zenworks; Symantec Antivirus/Firewall Suite; HEAT; Remedy; Track-It;
POS software: Micros, Aloha
Languages: Java, JavaScript, C++, PowerShell, Python
PROFESSIONAL EXPERIENCE:
Confidential
Network Security & VMWare Engineering Manager, Ft. Meade, MD
Responsibilities:
- Planning, analyzing, developing, implementing, maintaining, and enhancing the information systems, security programs, policies, procedures, and tools
- Providing Information Technology technical services, such as, network administration, systems administration, network domain management, and computer operations support
- Centrally manage the Internet and Intranet technical services
- Install computer networks such as local area networks (LANs), wide area networks (WANs), the Internet, intranets, and other data communications systems.
- Install server hardware and software infrastructure - Microsoft Server 2012R2, Red Hat Enterprise Linux 6/7 / Ubuntu 16.04 / Unix - Solaris 10/11 - Custom System Engineering predicated on Government - SAP requirements
- Set up user accounts and passwords.
- Monitor network usage and security.
- Manage email, spam, and virus protection.
- Ensure networks are running smoothly.
- Troubleshoot and restore systems after crashes.
- Retrieve forgotten passwords.
- Undertake routine preventative measures and implement, maintain and monitor network security.
- Supervise help desk technicians.
- Ensure systems comply with industry standards.
- Keep internal networks running smoothly.
- Support administration of servers and server clusters.
- Manage system back up.
- Restore protocol.
- Document network problems.
- Support network and computing infrastructure.
- Install and maintain network services, equipment, and various devices.
- Oversee software security.
- Responsible for selling the complete VMware solution, products, and services within a list of 10 - 20 DoD focused named Accounts
- Learn and understand the assigned accounts’ extended business models and create offerings and solutions to meet DoD agency goals
- Become as intimate as possible with assigned accounts and bridge the gap to executives while increasing VMware mindshare
- Solidify existing customer accounts and elevate VMware to a more strategic position within all accounts
- Present VMware solution as a ‘platform’ within an account and change the role that IT plays within that account from being considered a cost burden to a strategic deployment
- Manage complex enterprise sales campaigns while managing a diverse set of partners within the same accounts
- Match the VMware solution to the customer’s business needs, challenges, and technical requirements
- Must exhibit general management style of sale while running a coordinated campaign within all entities of VMware
Information Assurance & Security Engineering Manager
Confidential
Responsibilities:
- Substantively involved in evaluating and implementing security policies and controls encompassing various architectures, firewalls, electronic data traffic, and network access. Support will also include preparation of security reports to regulatory agencies such as Department of Defense (DOD) or members of the Intelligence Community (IC).
- Determine/analyze and decomposes security requirements to the level of detail that can be implemented and tested
- Assess configuration of systems IAW the appropriate Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGS) and Security Requirements Guides (SRGs).
- Tactical Ground Station SSPs, Enterprise Mission Assurance Support Service (eMASS), direct JWICS, NIPR, SIPR support for information assurance as well as (DRP) - disaster recovery plans and IRP’s - incident response plans.
- Verify and validate system security requirements have been implemented according appropriate DOD, IC and Army regulations for the systems operational environment
- Perform system certification and accreditation planning and testing and liaison activities; support secure systems operations and maintenance
- Perform security engineering analysis, risk and vulnerability assessment to assess and mitigate system security threats/risks throughout the program life cycle
- Monitor and analyze security functional tests
- Identify and evaluate complex business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement
- Assist in the selection and tailoring of approaches, methods and tools to support service offering or industry projects
- Facilitate use of technology-based tools or methodologies to review, design and/or implement products and services
Data Center Infrastructure Manager
Confidential, Washington, DC
Responsibilities:
- As a Data Center Infrastructure Server Team Lead consist of preparing plans for development and installation of data center according to present and future requirements.
- Monitors all software and hardware products and ensure compliance to Data Center standards and systems.
- Administer installation and maintenance of organization data center.
- Monitor all activities related to analysis and implement all data center plans.
- Supervises designing and evaluation of all server systems according to measurement of process.
- Performs troubleshooting at data center and identify issues and assist in timely resolution of same.
- Manages and performs research to design new advanced data center.
- Ensures adherence to all established guidelines and management practices for employees.
- Coordinates with various departments and performs integration of critical systems into infrastructure.
- Coordinate with IT, enhancement and business teams and develop strategies to ensure achievement of data center capacity.
- Maintains expert knowledge on all applications and its use on systems for various critical systems.
- Ensures client satisfaction and provide optimal level of customer services for various departments.
- Maintains expert knowledge on all business procedures associate with assets and capacity.
- Configures, manages, monitors, and trouble-shoots various network and application server hardware, operating system software, and peripheral network equipment for both classified and unclassified networks.
- Conducts testing using remote management terminals to insure operability, efficiency, and compliance with existing standards.
- Served as a member of an Information Assurance / Confidential team, as a ISSO, I was tasked with creating the following C&A documents: System Security Plans (SSPs), Contingency Plans, Incident Response Plans, Interconnection Security Agreements, Configuration Management Plans, Privilege User and General Users Guides.
- Other forms that I created to maintained the system: System Admin Account Management Forms, ISSO User Account request Form, ISSO Account Logs, Active System Users Log, Authorized Users Logs, Inactive Accounts Logs, List of Recently Transferred Employed Logs, List of Authorized User Logs, Contingency Plans Training Logs, Equipment In/Out Including Media Logs, Patches and Software and Authorized User Log, IOS Updates and visitors Sign-in Sheets.
- Generate and maintain security documentation for system hardware and software, to include System Security Plans, Contingency plans, Contingency tests, equipment lists, practices and procedures
- Assess the performance of IA security controls within the IT infrastructure
- Identify IA vulnerabilities resulting from a departure from approved procedures and plans
- Evaluate potential IA security risks and take appropriate corrective and recovery actions
- Oversee that applicable patches are implemented, including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA)
- Research, evaluate, and provide feedback on problematic IA trends and patterns in customer support requirements
- Perform system audits to assess security related factors within the IT infrastructure including re-authorization, continuous monitoring and C&A
- Review response actions to security incidents• Review and respond to all proposed change requests related to the Information System and provide formal Security response
- Maintain a repository for all system accreditation/certification documentation
- Coordinate all monthly scans with SOC
- Work closely with system administrators to resolve security weaknesses
- Work closely with customers regarding POAMs
- Managed 8 projects independently and demonstrated initiative. Due dates were achieved. Reviewed firewall logs weekly for critical events. I was tasked with also reviewing audit logs to ensure systems are being operated securely. Backup audit logs. Ensured all media and equipment is labeled.
- Created and updated Contingency Plans and POA&M items.
- Reviewed and updated Access List for Privilege Users.
- Reviewed network threats and current attacks from security sites (i.e. US-CERT Alerts, Cyber Security Bulletins Technical Cyber Security Alerts). Drafted C&A documents IAW PII requirements, NIST 800-53, 37, and Federal Information Security Management Act FISMA requirements.
- Implemented a strategy that prevented 150 security incidents from happening on major networks.
- Developed a list of classification markings that is not allow on network.
- Implemented and conducted software and hardware audits on all systems.
- Assistance incident management w/security incidents involving unauthorized classifications on network.
- Perform research and analysis on emerging IT technologies.
- Routinely provided weekly security training to internal customers.
- Created C&A documents for emerging technologies.
- Performs other duties as assigned.
- Identify classified and CUI destruction requirements and processes, and National Security Agency ( Confidential )-approved destruction equipment.
- Support Confidential related inspections of customer facilities
- Provide daily advice and assistance to appointed SMs, ASMs, and Security Assistants.
- Develop and maintain an Confidential suggestion and process improvement program.
- Support oversight and implementation of the security incident and Preliminary Inquiry (PI) process IAW DoD and Agency policy
- Support or provide notification to the customer’s Computer Emergency Response Team (CERT) of security incidents
- Provide relevant incident information to the Classification Management team to support validation of incident classification and monitor as needed
- Prepare Confidential reports and relevant supporting documentation.
- Conduct in-person in/out-briefings for required IPRs
- Maintain and update unclassified and classified portal sites, as well as the security program database and portal page with Information Security-related records and Program metrics
- Develop training plans and conduct required training and briefings
Sr. System Engineer & IT Manager
Confidential
Responsibilities:
- Performed patching, backups, and disaster recovery operations for Windows Systems, tape library/backup systems.
- Monitored server uptime, performance of routine operational maintenance procedures, and completion of daily operational checklists, tier-one troubleshooting, and incident escalation to the Infrastructure Operations, Engineering, and Desk Side Support teams.
- Installed, configured, troubleshot, and maintained hardware and software to ensure the availability and functionality of the systems.
- Recovered data in the event of hardware or software failure.
- Planned, scheduled and coordinated the installation, testing, operation, troubleshooting, and maintenance of IT hardware, operating and software systems.
- Planned, developed, implemented, and maintained programs, policies, and procedures to protect the integrity and confidentiality of systems, networks and data.
- Promoted awareness of security issues among management and ensured sound security principles.
- Duties may include setting up administrator and service accounts, maintaining system documentation, tuning system performance, installing system wide software and allocate mass storage space.
- Interacted with users and evaluated vendor products.
- Made recommendations to purchase hardware and software, coordinated installation and provided backup recovery.
- Designed, installed, operated and maintained analysis tools. Interpreted customer requirements and translated those into technical specifications.
- Conducted data backups and restores using Quest and Netback up.
- Developed policies & coordinated with vendors to ensure problems with equipment were addressed.
- Modified customer applications / systems as requested or needed.
- Documented all network, hardware and software activities, upgrades or modifications.
- Developed backup and recovery strategies for assigned systems.
- Acted as the Technical point of contact and expert on installation, configuration and user issues.
- Evaluated system / customer needs and provided purchase recommendations and developed standard operating procedures for system use / security.
- He participated in Oracle 11g upgrade.
Facility Security Manager
Confidential
Responsibilities:
- Processed SII/DCII inquiries and is familiar with JFAN and Confidential standards and procedures.
- Processed all required paperwork for clearances.
- Utilized Access Commander 3.2 & ViSi Commander 3.5 to manage the following security services: personnel security, video surveillance/analytics, enterprise facility access control, biometrics & smart cards, SCIF closed area design, construction and accreditation plans, facility security management as well as security clearance processing.
- Assist the FSO with the Defense Security Service (DSS) and Department of Defense sponsors on inspections, reviews, investigations, and other reportable issues
- Assist the FSO with creating, coordinating, and implementing security policies and procedures pertaining to the safeguarding of classified information according to the Confidential, DCIDs, and ICDs.
- Assist the FSO with collateral and TS//SCI security clearance function/processes and related activities including classified visits both inside and outside of RAND.
- Assist with the clearance process of all new and current employees in the Santa Monica office.
- Assist with multiple security databases
- Respond to Security Helpdesk issues. Back-up the management of the outgoing visit clearance process including but not limited to access roster and outgoing staff clearances. Control access to the cleared facility through oversight of physical security systems including: badging, access control, CCTV and alarms. Oversee maintenance, installation, upgrading and servicing of physical security systems to include the periodic testing of the alarms. Confidential certified communications security ( Confidential ) custodian or alternate Manage and safeguard all Confidential (classified and unclassified) in accordance with Confidential regulations. Conduct Confidential inspections to ensure compliance with Confidential procedures. Maintain in-depth knowledge of state-of-the-art security equipment standards and technology.
- Maintain the SM lock & safe program.
- Conduct physical security inspections and facility evaluations. Oversight of the guard force. Working with the Manager, Security Administration, will have day to day oversight of the security officer guard force (contractor and proprietary)
- Respond to after-hour alarms or emergencies.
- Maintain and analyze statistical security data for monthly reports provide to the Corporate Director, Security & Safety.
- Emergency Response Team (ERT) Coordinator.
Enterprise Server Administrator
Confidential, Washington, DC
Responsibilities:
- Implemented support services for the Confidential infrastructure including multiple networks, systems, applications and servers.
- Troubleshooting issues and isolated faults, identified solutions, documented and resolve the problem
- Processed and addressed trouble calls.
- Evaluated and troubleshot external interfaces, provided support and solutions.
- Trained government users.
- Managed third party maintenance providers.
- Performed IT asset management and procurement functions.
- Installed software and reported to the Site Lead and/or SA regarding various errors or problems.
- Reviewed Windows server applications and workstation problems and provided corrective actions / recommendations.
- Tracked database backups, examine activity logs and perform problem resolution as needed.
- Configured and maintain Windows NT, 2000 or 2003 server and PC operating systems
- Implement installations, upgrades and patches as needed or available.
