We provide IT Staff Augmentation Services!

Sr. Operations Manager Resume

Washington, DC

SUMMARY:

  • Senior IT Operations Manager, Experienced in exceeding the overall directions of Help Desk Operations, Network Operations, and Asset Management to develop, implement, and oversee project goals that exceed (IT) requirements. Including actions, services and planning for vulnerability patching, system imaging, decommissioning of IT Assets, and Help Desk Operations.
  • Ability to develop and implement procedures regarding security in compliance with regulations.
  • Independently plan, design, carry out, and evaluate effectiveness of programs, project studies or other work.
  • Knowledge of skill in applying IT systems security principles, concepts, and methods.
  • In deep knowledge of Federal IT security hierarchy
  • Responsible for asset management and documentation
  • Responsible for System Administration for monitoring systems log files
  • Provides technical analysis and advice on multi - faceted IT issues or problems where new implement security requirements such as those resulting from laws, regulations directives.
  • Assess and evaluate security system design to improve the software quality and implement its activities.
  • Ensure awareness, review new security technologies and threats, networks, and software designs for identifying potential security risks.
  • Analyzes designs, develops, customizes, and implements wide range plans of complex hardware and software to support large-scale of Information Technologies security system. Identify, evaluate and mitigate all security risk associated with the Information Technology systems to minimize the system vulnerabilities.
  • Provides the full scope of detail for IT security planning, policies and technical advice to team/senior management concerning network management issues
  • Works closely with other departments /organizations and collaborating with other IT staff to review and to propose a new systems and new software design to mitigate future potential Information Technology security risk.
  • Responsible for reviewing, planning and implementing new IT system security incident and develop a response policies.
  • Participates in systems documentation , such as programming specifications for implementation by computer programmers
  • Contributes to migration strategies for new complex systems, providing maximum compatib i lity with minimum disruption of the production workload
  • Work with users to assist their needs, provide solution and assistance to resolve their computer problems
  • Communicates with other support teams to enhance service to customers in the areas of Communications, Video Tele-Conference, VIP Support, Systems Administration, and with Asset Management teams. Occasionally assist or fill in to perform these duties when technicians are not available
  • Assist OCIO with best practices and ensure availability of service, confidentiality and integrity of systems and data
  • Provide troubleshooting support and recommendations for security and network issues
  • Make recommendations on proposed projects management principle and methods, such as wireless conference room, EPO disk encryption
  • Participate, suggest analyzing in resolving faults and provide solutions to problems
  • Providing technical support for users with varying levels of IT knowledge and competence
  • Primary for Network Troubleshooting, support and recommendations

PROFESSIONAL STRENGTHS:

  • In-depth knowledge of LAN, WAN, IT system security and network devices
  • Extensive knowledge of Microsoft technologies, VMware, McAfee disk encryption, HP servers, and switches
  • Solid knowledge of IP Networking, Routing Protocols, security and IP telephony
  • Proficient in IT Security development, troubleshooting Data Center and LAN network problems
  • Exhibit strong communication, critical thinking, multitasking, troubleshooting and customer support skill
  • Self-motivated, proactive, and has the ability to thrive in a fast-paced, mission critical operation environment
  • Attention to detail, very thorough when performing a project or task

TECHNICAL SKILLS:

  • Database Systems
  • COBOLL
  • Management Information Systems
  • System Design & Analysis
  • Web Design
  • C++

EXPERIENCE:

Confidential, Washington, DC

Sr. Operations Manager

Responsibilities:

  • Setting objectives and strategies for the IT department
  • Monitors CPIC activities within contract modules that provide an overview for planning and selection of IT Investments
  • Delivers business development diagrams which show meaningful enhancements to work production via contract vehicles
  • Mentors and coaches junior project managers, and help desk managers.
  • Leads recruiting efforts to effectively staff all business opportunities while adhering to the contractual obligations set forth by the department
  • Effectively writes job descriptions and key qualifications to attract outstanding talent.
  • Ensures at least 95% SLA completion on all projects
  • Implements ITIL Service Management Standards within all operations to exceed customer requirements
  • Implements CMMI Services as it adheres to the level of communication, reporting, and overall work progress within the contract.
  • Responsible for the completion and management of degaussing hard drives from EOL (end of life) devices
  • Works with System Owners for removal of servers once decommissioned
  • Skilled in the use of Sunflower Asset Management tracking software (auditing, retiring, adding)
  • Skilled in the use of Manage Engine for software license management to track contractual agreements in adherence to license policies
  • Responsible for the daily and long-term strategic management of software and technology-related hardware within the organization.
  • Design and execute asset management policies, procedures and processes.
  • Coordinate with management in utilizing the asset management tools to analyze, review and track asset data.
  • Develop asset control processes to monitor accountability identification, maintenance, location and contracts.
  • Manage asset reconciliation and asset disposal agreements.
  • Assist in inventory management, procurement and shipment activities.
  • Analyze purchasing effectiveness and resolve purchasing issues.
  • Oversee contract negotiation, contract renewals and vendor management activities.
  • Monitor software licenses to ensure they comply with license agreements and usage standards.
  • Collaborate with management to define cost savings, asset compliances and service improvements.
  • Ensure audit compliance for the IT assets.
  • Guide IT asset associate in the daily administration of the asset management activities
  • Adheres to project dates as provided by PWS/SOW
  • Recruits, and staffs well qualified individuals based upon company revenue goals/agendas
  • Provides Trend Analysis Reports that enhance contractual data to show strengths/weaknesses
  • Submit Weekly, Monthly, and Quarterly, status reports
  • Help his team prioritize the latest set of technical issues
  • Assist his team in identifying the problem at the root of several technical issues
  • Responsible for the overall accountability of project scope, project budgeting and cost reporting, and ensures completion of projects while meeting quality, schedule and cost objectives using the organizations standard processes.
  • Serves as project liaison between IT partners, client organizations and IT leadership. May assist in supplier management of existing vendors.
  • Leads problem solving, negotiating, influencing, facilitation, organization, prioritization, decision making, and conflict resolution skills.
  • Responsible for estimating, scheduling, coordinating, assigning resources, ensuring project funding is secured, and assisting and recommending business solutions/alternatives for projects.
  • Issues reporting to all levels within the organization.
  • Effectively initiating, planning, scheduling, estimating, forecasting, coordinating, controlling, managing and delivering all activities for projects and related release initiatives.
  • Responsible for resource scheduling to effectively manage all aspects of the contract to ensure coverage within all areas
  • Leads project initiatives and provides Subject Matter Expertise in areas in which required personnel initiate escalation for completion.

Confidential, Washington, DC

Chief of IT Services

Responsibilities:

  • Selecting and implementing suitable technology to streamline all internal operations and help optimize their strategic benefits
  • Designing and customizing technological systems and platforms to improve customer experience
  • Approve purchases of technological equipment and software and establish partnerships with IT providers
  • Oversee the technological infrastructure (networks and computer systems) in the organization to ensure optimal performance
  • Grew companies overall revenue from $2.9 Million to $10.5 Million
  • Received Lenovo Up and Coming awards for SLED sales within the Washington, DC metro area
  • In Depth design partnerships with Barracuda, Oracle, Dell, NetApp, and Cisco
  • Increased company’s software as a service models such as cloud, and storage hosting...
  • Increased services offerings to include help desk, projector maintenance, computer imaging, and VOIP service.
  • Maintained companies Oracle Platinum Partner Status
  • Direct and organize IT-related projects
  • Developed relationships with large computer manufacturers to insure profitability based on forecasted revenue
  • Monitor changes or advancements in technology to discover ways the company can gain competitive advantage
  • Analyze the costs, value and risks of information technology to advise management and suggest actions
  • Create business value through technology
  • Strategic planning of business growth objectives
  • Ensuring the tech systems and procedures lead to outcomes in line with business goals
  • Vendor negotiations and IT architecture
  • Supplier management
  • Information risk management (IRM)
  • IS policies, strategies, and standards
  • Technology futures and budgets
  • Create a cost-benefit analysis as well as supporting a detailed definition of data requirements and departmental workflows.
  • Oversee Internet, computer, and call sales operations.
  • Manages the day-to-day operations of the information technology department including directing staff, who support administrative computing, networking, user services, telecommunications and other information technology functions.
  • Assess and anticipate technology projects and recommend appropriate action and resources.
  • Establish and direct the strategic and tactical goals, policies, and procedures for the information technology department.
  • Propose hardware/software solutions to accomplish the company's business objectives.
  • Identify user needs and resolve problems.

Confidential, Arlington, VA

Cyber Security Manager

Responsibilities:

  • Service, Monitor, Analyze, Detect, and Respond to unauthorized activity on Confidential networks and computer systems.
  • Services includes the actions taken to report, analyze, coordinate, and respond to any event or computer security incident for the purpose of mitigating any adverse operational or technical impact.
  • Conduct Nessus scans to discover vulnerabilities on each Confidential system and provide mitigation techniques or protocols.
  • Oversees a group of 15 advisors and 16 contractors
  • Creating SOP documents that provide direction towards System Decommission, Unauthorized Access, Annual Security Training, and risk Assessment
  • Analyzed approval of ITAR packages in reference to contractual management of Government I.T. Systems.
  • Manages incidents within Confidential in regards to ( unauthorized access, PII spills, and Malicious Codes )
  • Conveys Data to the Confidential SOC for vulnerability Data Calls which are required to sustain mission ready systems for all of Confidential ’s subcomponents
  • Processes all ISSM/ISSO Training to insure that our systems are being maintained by adequate and knowledgeable staff
  • Processes and updates Confidential HQ on Security Awareness Training for both federal and contractual employees
  • Illustrates updated written SOP documents in reference to daily tasks and functions
  • Conducts site visits on all Confidential Sub Components in response to proactive measures to insure incidents are mitigated
  • Conveys Security Event Notifications to all sub components in response to Confidential wide incidents that have a high impact of effecting the day to day operations
  • Conducts Nessus Scans with all available plug-ins to gain overall knowledge of systems to insure no unauthorized devices have been connected
  • Uses Confidential 800-37 RMF to make sure that FIPS 199 standards are held to the highest availability for protection of PII related systems.
  • Provides administrative, technical, and program management support for services and recommends solutions that meet current and future IT and telecommunications needs of customers in support of their global missions and functions.
  • Identifies need for changes based on new security technologies or threats.
  • Develop concepts to eliminate 1-3 year ATO accreditation in conjunction with the new Continuous Monitoring strategy.
  • Conducts Critical Infrastructure Security Audits for Stakeholder Networks based on Control Objectives
  • Oversees Assessments and Report Data which is used to evaluate national standard for individual sectors
  • Reviews proposed new systems, networks, and software designs for potential security risks.
  • Develops long-range plans for IT security systems that anticipate, identify evaluate, mitigate, and minimize risks associated with IT systems vulnerabilities.
  • Leads implementation activities and resolves integration issues related to the implementation of new systems with the existing infrastructure.
  • Provides guidance on categorizing information systems based upon the FIPS 199 standard as well as the Confidential 800-60
  • Control selections are done in coordination with the Common Control Provider using the Confidential 800-53 standard
  • Conducts review of all Security Assessment Plans to review and monitor change if any based upon Security Assessment of government information systems
  • Engages in travel to various stakeholder sites throughout the 50 states conducting cyber security assessments in reference to the Confidential cybersecurity framework.
  • Engages stakeholder in coordination of Confidential NCCIC and US - CERTS products to engage in cyber resilience.
  • Conduct Critical Infrastructure Security assessments (C-IST)
  • Engages in Public Speaking Engagements that adhere to the mission of providing information that SECIR/ Confidential has to offer such as C3VP, US-CERT, and NCATS.
  • Guides State, Local, and Private sector companies on risk management activities in reference to business continuity, vulnerability management, and asset management.
  • Act as a senior project leader and technical expert, demonstrating initiative and providing guidance and mentorship to subordinates and peers.
  • Demonstrate diplomacy in a high-performing environment, paying attention to a variety of compliance issues and policies in meeting clients’ demands and expectations.
  • Balance individual assignments while considering policy limitations and customer requirements to achieve optimal solutions.
  • Translate business requirements to technical solutions.
  • Prepare and present briefings to senior management officials on complex and sometimes controversial issues.
  • In depth knowledge of federal security requirements and ability to manage document submissions in timely manner are required.
  • Experience doing both auditing and remediating security for information systems
  • Works with engineering team to document and respond to POA&M findings, submit system documentation and meet with IA team as required.
  • Define global security policies, standards, guidelines and procedures to ensure ongoing maintenance of security.
  • Support/perform information security audits, risk assessments and perform risk management, including development and monitoring of risk mitigation strategies.
  • Efficient with packet capturing via Wireshark to monitor internal and external packet sniffing inside and out of the network
  • Generates Splunk queries to generate access logs and failed login attempts via Linux/Windows systems.
  • Oversees the client to government interaction to boost cyber participation amongst the private sector and central government. This allowed my staff to surpass FY17 numbers. To sign up for 24/7 watch service with Confidential requires a two year fee of $289 our goal was to turn around 35% of the audits we do into this actual monitor service Einstein.

Confidential, Rosslyn, VA

Junior System Administrator/Technical Lead

Responsibilities:

  • Responsible for direct interaction with customers either by telephone, electronically or face to face.
  • Continued support of National Protection and Programs Directorate ( Confidential ) a component with Department of Homeland Security ( Confidential ) Headquarters at a Senior System Administrator/Team Lead level
  • Continued support of National Protection and Programs Directorate ( Confidential ) a component with Department of Homeland Security ( Confidential ) Headquarters at a Senior System Administrator/Team Lead level Responsible for managing site queue, including:
  • Assigning trouble tickets to desk side technicians
  • Served on proposal evaluation teams and ensured that procurements are performed accurately, adequately documented, and effected in a timely manner.
  • Monitored technological changes and developments associated with IT telecommunications, and networking technologies.
  • Provided 24/7 support to Confidential Under Secretary and Chiefs of Staff whether on travel or out of office.
  • Prioritizing tickets in queue to ensure major and mission critical issues are addressed immediately
  • Escalating tickets that cannot be resolved on the Tier II Deskside Support level to the proper group
  • Ensuring that proper forms are scanned into tickets and that procedures are followed to provide a correct estimation of resolution times and accountability
  • Completing daily reports to summarize ticket queue activity, and updating management on aged tickets and major site events
  • Tracking software deployments throughout the site through Remedy client software from the time it is received from the courier to delivery to the customer
  • Employs specialized knowledge of infrastructure protection needs to create documents for unique sets of users such as Protective Security Advisors in the field to ensure tailored and improved operating procedures are applied for their systems and support
  • Considers and studies IT security hierarchy to better understand federal testing and approval processes in order to assist customers with planning out IT requests that require introducing new hardware and software to systems and network
  • Uses project management principles to provide efficient and thorough support by planning out projects such as SharePoint expansion and new training procedures, taking lead in execution and monitoring project progress
  • Adheres to and administrates IT security practices to the team by using knowledge of basic IT security principles and concepts such as system integrity, availability, authenticity and non-repudiation as regulated by the Confidential IT security team
  • Works closely with federal asset management point of contact at Confidential HQ to assist with installation of asset tracking software for facilities and asset management users throughout Confidential and proper processing of assets through IT including filing property transfer receipts with Confidential tracking numbers and hardware serial numbers to maintain a good relationship with asset management
  • Contacts vendors such as APC, HP, and Dell on behalf of customers to get external support for equipment under warranty such as network printers for routine maintenance and major repairs requiring parts
  • Maintains accountability of equipment by tracking the inventory at the site level and transferring assets that require disposal or recycling
  • Uploads, updates and organizes knowledge base information such as how-to's and common fixes for issues as SharePoint administrator
  • Collaborates with project engineering for any major projects going on at the site such as the Confidential laptop refresh and Confidential keyboard refresh to make sure processes are followed thoroughly and an adequate amount of support is provided to meet customer deadlines
  • Creates and applies new standard operating procedures based on analysis, testing and overall findings when administering IT support to systems and network to be approved by management and added to the knowledge base
  • Informs direct supervisor, LM Regional Manager for Region 2, of any major and disputable incidents to ensure operations are being carried out accurately and dutifully (service is being provided within regulations and are in compliance with security and standard operating procedures) and allow for any necessary communication between management and the customer base for resolution should the need arise
  • Responsible for creation of new tech hire process to ensure each technician has their basic requirements met and completes a standard training module
  • Communicates to users when machines are not in compliance to be able to have them brought in for critical security patches and works with security team to isolate and quarantine systems that viruses have been detected on
  • Teaches new users on best practices for equipment use to make them aware and help prevent hardware theft, security information breaches such as unauthorized use and basics on how to avoid viruses
  • Participates in the Newsletter Committee to communicate major changes and events going on within the contract
  • Coordinates the response and work effort for major site events to ensure the timely and efficient restoration of complete functionality, to include events such as office moves and major power outages
  • Attends meetings and provides feedback on the implementation of new processes and procedures and provides input on improvement of the overall support pipeline
  • Serves as the Senior Technician for the site as required
  • Required to update all Apple Technology products with GOOD enterprise software to ensure safety and classification of government email
  • Required to activate all Apple IPAD and iPhone Software as well as enhancing hotspot technology
  • Serves as the liaison to the customers for improvement of service outlook and satisfaction
  • Oversees the site technicians
  • Tracks time worked and approve timecards and time off
  • Manages a schedule that ensures site support coverage during core hours; schedules technicians to perform support functions at different intervals
  • Ensures newly appointed technicians are equipped with a workstation and the required equipment to perform their duties
  • Clarify the duties and roles of technicians at the site and hold them accountable for results
  • Makes final decisions regarding exceptions and during emergency situations
  • Assist in developing, coordinating and executing policies and procedures to prevent Information Systems vulnerabilities. Using IT resources (knowledge, tool and procedures) to restore security of information systems and network services.
  • Interprets and applies information security policies and procedures, documents any weaknesses in the security process,
  • Interprets and applies information security policies, including updates to the 4300 series of IT security publications and other related policies, and implements Procedures.
  • Works with system owners to document weaknesses in the Plans of Action and Milestones process for the tracking and execution of security-related tasking, requirements and weakness remediation, and initiates corrective action.
  • Supports up to 350 users for Confidential OUS
  • Responsible for troubleshooting all technical software and hardware problems and then communicating fixes, work-arounds, and overall updates to the end user in a busy environment.
  • Provides IT Technical advice for Confidential Windows 8 Tablet Pilot Program
  • Provide documentation updates on projects lead with analyze data to gauge completion
  • Manages uses of software product keys and provides documentation via excel sheet
  • Configured users for LAN/WAN access via Homeland Security Network
  • Generates quick fixes and workarounds for interoperability issues hardware/software
  • Utilized ITIL plan, design, develop, and management principles to generate smooth software rollouts and firmware updates.
  • Efficient in Blackberry setup and troubleshooting
  • Efficient in Windows 8 OS Deployment via Mobile Device, or Desktop
  • Utilized firmware updates to solve OS latency issues
  • Utilized Microsoft Excel to reference spreadsheet used for Inventory & Procurement information
  • Ensured that customer inquiries were responded to and executed without delay.
  • Responsible for all documentation required for each asset on site
  • Utilized Exchange Server to grant access to MS Lync users
  • Responsible for sending out daily/weekly reports which include new hires, break/fixes, and security incidents
  • Provided key support in the encryption of Confidential machines to meet security requirements through McAfee Endpoint.
  • Responsible for the opening and closing of work tickets via BMC Remedy Ticket Tool Management
  • Updating all ticket responses via the Remedy Database to update procedures and events.
  • Utilized HP Web Jet Admin Tool to oversee various printer devices along the network to deviate toner changes, paper jams, firmware updates, and scan to email functions.
  • Analyzed COTS software to seek firmware updates and patch updates
  • Formulated solutions to recent Security Risks by mitigating or eliminating the source.
  • Measured the requirements needed for new software by testing vulnerability and port availability for processes.
  • Unlocked users account when access is denied to the domain
  • Utilized the Active Directory Tool to reset end users passwords as well as apply users
  • Efficient in Active Directory movement towards specific Organizational Groups, Applying Group Memberships, and SCCM patches via the domain group.
  • Diagnosed and resolved network issues
  • Sustained comprehensive familiarity of software/hardware for auditing purposes.
  • Re-Imaging of Machines via Network Server
  • Assisted in the process of hardware setup as specified for classified information
  • Revised and implemented Group Policy Requirements to deny access to reference ports
  • Directly supported National Protection and Programs Directorate ( Confidential ) a component with Department of Homeland Security ( Confidential ) Headquarters
  • Provided accurate and timely support for the client utilizing Remedy client software to create, track, and update all incidents and change requests. Ensured work was performed within the boundaries of Service Level Agreements
  • Provisioned support for local and remote users for all hardware and software systems, including connectivity, VPN, and remote desktop issues
  • Prepared Infrastructure Protection’s field teams such as Chemical Security Inspectors and Protective Security Advisors (PSAs) with specialized hardware and software packages:
  • Installed various map data software such as ArcGIS and Garmin map source
  • Assisted with configuration of local administrator account to allow customer to install drivers and handle minor IT needs when working remotely
  • Worked with engineering to gain approvals for accounts, ensure user responsibility and target user system to be put in organizational unit to allow for continued administrator rights
  • Outlined and performed rigorous testing of hardware before deploying to users to ensure their systems were fully functional and ready for field activity
  • Maintained ongoing support to agents in the field using specialized knowledge of their systems and needs
  • Performed routine hardware and software system installations, modifications, and upgrades
  • Analyzed and isolated unclassified computer hardware and software problems at the workstation, including OSS and SCIF support for Unclassified LAN
  • Encrypted all new laptops per regulation to maintain security coverage for users who planned to take equipment offsite after device was deployed
  • Installed, configured and troubleshot peripherals for users’ unclassified workstations in unclassified environments, Open Secret and SCIF environments
  • Participated in PVG assessments to assist IT security in applying new IT security advancements including removing old security software from systems (Symantec), deploying new security software to systems not in compliance (McAfee) and manually updating/patching systems as necessary
  • Assisted users with air card and Blackberry issues by troubleshooting and repairing both the hardware and software issues and/or working with iSYS and the device carrier to correct the issue
  • Deployed replacement unclassified equipment including desktops, laptops, Blackberry, air cards, pagers, various peripherals, and assisted users with configuration and data transfer

Confidential, Washington, DC

Cyber Security Analyst

Responsibilities:

  • Provided network security expertise and guidance in support of security assessments for government (FISMA DIACAP & NIST) and commercial clients (SOX, PCI, HIPAA). Performed network risk assessments, vulnerability assessments, and penetration testing. Evaluated and recommended security technology such as network and host based intrusion detection systems (IDS), virus protection capabilities, and virtual private network solutions.
  • Reviewed security logs to ensure compliance with policies and procedures and identifies potential anomalies.
  • Utilized various project management methodology & PMI process to enhance various cyber security programs within the Department. Managed the 24x7 DoT SOC/CIRT.
  • Developed reports for CIO, CISO, and other executives (Dept. Secretary) about IT security posture across the department. Developed daily cyber security situation awareness reports from various sources (advisories, SIEM, Intel briefing, etc.). Advised in IT risk management for the department.
  • Lead liaison for cyber security for the Department. Incident response liaison between the department and other government organizations ( Confidential US-CERT, DC3, NSA). Represented the department in government wide initiatives Cyber Storm, GFIRST, NCRCG, Federal Law Enforcement, Joint Cyber Threat Working Groups, DOD and the Intelligence Community.
  • Analyze Cyber Intelligence threats (advanced persistent threats) by investigating of cyber security incidents, assisting the DOT Inspector General, FBI, NSA, ARL (Army Research Lab), AFRL (Air Force Research Lab), and other law enforcement agencies with forensic analysis (Malware/shellcode analysis via. tools Encase, IDApro)
  • Designed & implemented the department SIEM (Arc sight) to monitor the DOT enterprise (over 20,000 assets). Administration of the DOT security infrastructure consisting of IDS/IPS systems (Snort, ISS, IDSM2, IPS, NFR, Checkpoint IPS1), Vulnerability Assessment tools (Foundscan and Nessus).
  • Creating IDS signatures to detect undesired or malicious network activity (i.e. APT, worm scanning and payload propagation).
  • Assist in the writing and review of Departmental security policies (Security Awareness, IDS, Patch Management, Anti-Virus, etc.)
  • Ensuring that systems were compliant with departmental rules, OMB mandates & FISMA ( Confidential guidance).
  • Responsible for direct interaction with customers either by telephone, electronically or face to face
  • Utilized Symantec Endpoint Protection Network Activity Tool to Identify suspicious processes
  • Organized and labeled through system libraries within the intranet service
  • Maintained problematic ticket system to record and track customer calls and emails
  • Provided assistance to customers by unlocking user accounts when access to the domain was denied
  • Utilized the Active Directory Tool to set group policies
  • Formulated accounts for Cisco VoIP phones
  • Utilized Nessus Vulnerability Scanner to check for open ports, IP addressing, and Server Hardening.
  • Provided assistance to users who need Network Drives Mapped
  • Provides daily technical support to 350 employees
  • Assisted in the preparation/installation of new OS software/hardware on computers
  • Applied the use of PC Refresh to setup computers for new users
  • Diagnosed and resolved network issues
  • Coordinates with I.T. team on asset purchases via the Dell Vendor
  • Maintained detailed knowledge of company owned software/hardware
  • Solved numerous port issues via Network Server
  • Verified IP addresses for network connectivity
  • Applied Manage-ID software to Biometric machines for imaging
  • Calibrated fingerprint scanner using Cogent 3M software to capture precise images of users
  • Configured Iris ID scanner for security recognition upon sensitivity
  • Troubleshot network connectivity on site from users’ configuration in order to assist with port activation in LAN rooms
  • Participated in projects to set up and implement the IT requirements for new areas being built-out by the client
  • Supported network printers by replacing necessary parts, upgrading firmware, resetting and configuring them for the unclassified network
  • Administered documents and desk side assistance for IT information requests, including software and hardware use questions
  • Aided IT site leadership by prioritizing mission critical issues and assisting with organizing team efforts to effectively provide solutions to emergency incidents
  • Helped users to reset domain and disk encryption passwords on site and remotely
  • Submitted requests and requirements for new technicians on site as well as training in proper procedures and troubleshooting protocols
  • Analyzes and refines software systems requirements to reflect cyber requirements, and translates systems requirements into applications prototypes.
  • Designs user interfaces and ensures quality and functionality of software systems. Integrates secure hardware and software components.
  • Conducts risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks and protection needs.
  • Promotes awareness of security risks in software applications among Federal management, and develops systems security contingency plans and disaster recovery procedures.
  • Ensures secure technical integration of the enterprise structural framework is achieved across the enterprise by participating in test planning, validation and reviews of software applications and services.

Hire Now