Jsp Network Engineer Resume
3.00/5 (Submit Your Rating)
SUMMARY:
A results - driven U.S Navy veteran with more than 12 years of Network/Cybersecurity experience, in both military and commercial environments. A motivated, dedicated and determined IT security analyst well knowledgeable in IT Security tools, and has the required expertise in developing information system security documentation. Seeking a flexible schedule security analyst role.
TECHNICAL SKILLS:
- Telos Xacta (IACS tool)
- Nessus Vulnerability Scanner
- Splunk Centralize Log Server
PROFESSIONAL EXPERIENCE:
Confidential
JSP Network Engineer
- Participated in a kick off meeting using the approved IT security framework, FIPS 199/NIST 800-60 to categorize information and information system.
- Conduct IT Controls risk assessment to identify system threats, vulnerabilities and risk, and generate reports in accordance with NIST 800-30 .
- Conducted periodic IT Risk Assessment and Reviewed IA controls for any deficiencies
- Conducted Business Impact Analysis (BIA) to identify high risk area where audit effort will be allocated to.
- Assisted in developing a System Security Plan (SSP) to provide an overview of the system security requirements and describe the controls in place.
- Helped guide System Owners through the Certification and Accreditation (C&A) process.
- Ensured that management; operational and technical controls for securing either sensitive Security Systems or IT Systems are in place and are followed according to federal guidelines (NIST 800-53).
- Used Telos Xacta RMF automated tool to administer different RMF processes.
- Knowledge and hands on experience with performing vulnerability scans, as well as interpreting and remediating results.
- Maintains and updates project’s plan of action and milestones (POAM)
Confidential
Network Engineer
- Led a datacenter migration project by moving perimeter devices from one location to another.
- Configured network devices to meet DISA STIGs compliance.
- Have deployed VLANs, 802.1Q trunks, and Static routing between the headquarters and branch office devices.
- Performed troubleshooting on various network outages and provided root cause analysis to management.
- Have configured and troubleshot site to site IPSEC VPN, GRE, and DMVPN.
- A working knowledge of PKI infrastructure, IP Sec and several cryptographic tools.
- Configured an Out-of-Band Management Network and deployed Cisco Access Control Server (ACS) 5.4. across three company sites.
- Have configured and implemented security to include TACACs+ on routers and switches.
- Deployed SNMP v.3 and monitors the networks utilizing the following tools: “What’s up Gold Version 15.9.2” Nagios monitoring tools.
- Extensive knowledge with installation and daily operation of Signature and Anomaly based IPS/IDS sensor devices.
- Configured SPAN ports, Network Tap, and Wireshark for traffic monitoring.
- Hands on experience with syslog, NAT, PAT, DMZ network, and the Perimeter Network as a whole.
- Knowledge and hands on experience with Cisco ASA firewalls, MacAfee Sidewinder, Stateful Firewall technologies, Zone based firewall, and application of rules and Access Control List (ACLs).
- Hands on experience with the following: Opening and managing Cisco TAC, and internal Remedy Ticketing system.
Confidential
System/Network Administrator
- Provided Tier 1, 2 and 3 technical supports for mission critical SOCOM and CENTCOM Secret, and Top Secret/SCI networks in a fast- paced, war zone environments (Iraq, Afghanistan, and Qatar).
- Administered and troubleshoot Domain Controllers, File, DHCP, Backup & print servers, and Cisco routers and switches.
- Troubleshot Cisco switching 802.1X and port security issues.
- Configured and troubleshot vlans, trunking and various layer 2 technologies.
- Configured and troubleshot EIGRP, VPN tunnels and point to point GRE links.
- Configured Cisco switches and routers to include, VLAN, VTP, STP, and static routing.
- Performed daily, weekly, and monthly maintenance of all servers, switches, and network monitoring tools.
Confidential
Field Service Engineer/Developer
- Responsible for all firewall and router Access Control List (ACL) modifications.
- Maintained network security and ensure compliance with security policies and procedures through the use of industry best practices and DISA STIGs.
- Provided direct network engineering, design, security, and installation support for 100 plus various worldwide implementations of the USBICES Enterprise network.
- Designed and successfully implemented a plan to migrate Cisco PIX firewalls to Cisco ASA firewalls for three separate networks.
- Designed and implemented a defense-in-depth security posture for the NATO Intelligence Fusion Center (NIFC) Internet facing network, which included a full Email and Web security solution. Following the implementation, there was a drastic reduction of spam and malware.
- Responsible for Cisco and Tandberg IP Telephony implementations and troubleshooting.
Confidential
NOC Lead
- Provided technical support for computers, routing and switching devices, applications and associated networks.
- Assists senior Network Engineer in configuring and troubleshooting circuits (CSU/DSU), Cisco catalyst 3550 series switches, Cisco 2600 series routers and reloading crypto devices - KIV 7, Taclane.
- Hands on experience with Layer 2 Protocols and technology such as Spanning Tree, VLANs, VTP.
- Extensive knowledge in configuring PPP, Frame Relay, NAT, Access List.
- Extensive knowledge and understanding in installing and managing Microsoft Server 2003 and related Microsoft products.
- Hands-on experience with Windows 2003 operating system, registry entries, and security settings.
- Systems Administered webshare, a SharePoint-like software
Confidential
Desktop Support/System Administrator
- Provided Tier Two desktop support for 3500 users, including active directory user, computer and group management.
- Configure new SIPRNET machines with static IP addresses and join them to the correct domain. .
- Diagnosed and recommended repairs or replacement of laptops, desktops, monitors, and printers through established procedures.
- Installed, configured and tested Cisco VPN client on laptops for users approved for teleworking.
- Installed and configured Blackberry devices on users’ workstations to sync with their Exchange inbox.
Confidential
Dell Install Team Technician
- 3 month contract.
- Execute disk imaging for new desktops/laptops
- Configured Microsoft Outlook e-mail settings
- Installed Common Access Card (CAC) registration
- Setup 400 users on/off Administrator accounts on Network
- Transferred data for Classified and Unclassified workstations