We provide IT Staff Augmentation Services!

Jsp Network Engineer Resume

3.00/5 (Submit Your Rating)

SUMMARY:

A results - driven U.S Navy veteran with more than 12 years of Network/Cybersecurity experience, in both military and commercial environments. A motivated, dedicated and determined IT security analyst well knowledgeable in IT Security tools, and has the required expertise in developing information system security documentation. Seeking a flexible schedule security analyst role.

TECHNICAL SKILLS:

  • Telos Xacta (IACS tool)
  • Nessus Vulnerability Scanner
  • Splunk Centralize Log Server

PROFESSIONAL EXPERIENCE:

Confidential

JSP Network Engineer

  • Participated in a kick off meeting using the approved IT security framework, FIPS 199/NIST 800-60 to categorize information and information system.
  • Conduct IT Controls risk assessment to identify system threats, vulnerabilities and risk, and generate reports in accordance with NIST 800-30 .
  • Conducted periodic IT Risk Assessment and Reviewed IA controls for any deficiencies
  • Conducted Business Impact Analysis (BIA) to identify high risk area where audit effort will be allocated to.
  • Assisted in developing a System Security Plan (SSP) to provide an overview of the system security requirements and describe the controls in place.
  • Helped guide System Owners through the Certification and Accreditation (C&A) process.
  • Ensured that management; operational and technical controls for securing either sensitive Security Systems or IT Systems are in place and are followed according to federal guidelines (NIST 800-53).
  • Used Telos Xacta RMF automated tool to administer different RMF processes.
  • Knowledge and hands on experience with performing vulnerability scans, as well as interpreting and remediating results.
  • Maintains and updates project’s plan of action and milestones (POAM)

Confidential

Network Engineer

  • Led a datacenter migration project by moving perimeter devices from one location to another.
  • Configured network devices to meet DISA STIGs compliance.
  • Have deployed VLANs, 802.1Q trunks, and Static routing between the headquarters and branch office devices.
  • Performed troubleshooting on various network outages and provided root cause analysis to management.
  • Have configured and troubleshot site to site IPSEC VPN, GRE, and DMVPN.
  • A working knowledge of PKI infrastructure, IP Sec and several cryptographic tools.
  • Configured an Out-of-Band Management Network and deployed Cisco Access Control Server (ACS) 5.4. across three company sites.
  • Have configured and implemented security to include TACACs+ on routers and switches.
  • Deployed SNMP v.3 and monitors the networks utilizing the following tools: “What’s up Gold Version 15.9.2” Nagios monitoring tools.
  • Extensive knowledge with installation and daily operation of Signature and Anomaly based IPS/IDS sensor devices.
  • Configured SPAN ports, Network Tap, and Wireshark for traffic monitoring.
  • Hands on experience with syslog, NAT, PAT, DMZ network, and the Perimeter Network as a whole.
  • Knowledge and hands on experience with Cisco ASA firewalls, MacAfee Sidewinder, Stateful Firewall technologies, Zone based firewall, and application of rules and Access Control List (ACLs).
  • Hands on experience with the following: Opening and managing Cisco TAC, and internal Remedy Ticketing system.

Confidential

System/Network Administrator

  • Provided Tier 1, 2 and 3 technical supports for mission critical SOCOM and CENTCOM Secret, and Top Secret/SCI networks in a fast- paced, war zone environments (Iraq, Afghanistan, and Qatar).
  • Administered and troubleshoot Domain Controllers, File, DHCP, Backup & print servers, and Cisco routers and switches.
  • Troubleshot Cisco switching 802.1X and port security issues.
  • Configured and troubleshot vlans, trunking and various layer 2 technologies.
  • Configured and troubleshot EIGRP, VPN tunnels and point to point GRE links.
  • Configured Cisco switches and routers to include, VLAN, VTP, STP, and static routing.
  • Performed daily, weekly, and monthly maintenance of all servers, switches, and network monitoring tools.

Confidential

Field Service Engineer/Developer

  • Responsible for all firewall and router Access Control List (ACL) modifications.
  • Maintained network security and ensure compliance with security policies and procedures through the use of industry best practices and DISA STIGs.
  • Provided direct network engineering, design, security, and installation support for 100 plus various worldwide implementations of the USBICES Enterprise network.
  • Designed and successfully implemented a plan to migrate Cisco PIX firewalls to Cisco ASA firewalls for three separate networks.
  • Designed and implemented a defense-in-depth security posture for the NATO Intelligence Fusion Center (NIFC) Internet facing network, which included a full Email and Web security solution. Following the implementation, there was a drastic reduction of spam and malware.
  • Responsible for Cisco and Tandberg IP Telephony implementations and troubleshooting.

Confidential

NOC Lead

  • Provided technical support for computers, routing and switching devices, applications and associated networks.
  • Assists senior Network Engineer in configuring and troubleshooting circuits (CSU/DSU), Cisco catalyst 3550 series switches, Cisco 2600 series routers and reloading crypto devices - KIV 7, Taclane.
  • Hands on experience with Layer 2 Protocols and technology such as Spanning Tree, VLANs, VTP.
  • Extensive knowledge in configuring PPP, Frame Relay, NAT, Access List.
  • Extensive knowledge and understanding in installing and managing Microsoft Server 2003 and related Microsoft products.
  • Hands-on experience with Windows 2003 operating system, registry entries, and security settings.
  • Systems Administered webshare, a SharePoint-like software

Confidential

Desktop Support/System Administrator

  • Provided Tier Two desktop support for 3500 users, including active directory user, computer and group management.
  • Configure new SIPRNET machines with static IP addresses and join them to the correct domain. .
  • Diagnosed and recommended repairs or replacement of laptops, desktops, monitors, and printers through established procedures.
  • Installed, configured and tested Cisco VPN client on laptops for users approved for teleworking.
  • Installed and configured Blackberry devices on users’ workstations to sync with their Exchange inbox.

Confidential

Dell Install Team Technician

  • 3 month contract.
  • Execute disk imaging for new desktops/laptops
  • Configured Microsoft Outlook e-mail settings
  • Installed Common Access Card (CAC) registration
  • Setup 400 users on/off Administrator accounts on Network
  • Transferred data for Classified and Unclassified workstations

We'd love your feedback!