Cyber Security Resume
SUMMARY:
IT Professional with a proven track record for providing excellent technical support to meet all challenges and needsExceptional communication and diagnostic skills, able to consistently solve problems and infrequently escalate issues, Proven expertise in supporting and troubleshooting hardware, software and networking issues, strong technical background with a genuine commitment to quality and customer satisfaction, More than eight years’ experience as a Computer Specialist.
TECHNICAL SKILLS:
Windows 2000: 10 Windows Server 08 R2 / 2012 R2 Wintel, MAC OS 9 - OSX, Linux Red hat
Programming Languages: Host Base Security System (McAfee ePolicy Orchestrator), Assured Compliance Assessment Solution (ACAS), System Center 2012 R2 Configuration Manager (SCCM), Symantec Ghost, Mainframe Technologies, BMC Remedy, knowledge of Oracle 11i/10g, SQL Server, VMware, and a host of other applications
SQL, PowerShell (Novice), Visual Basic Scripting
Hardware: Servers, Desktops, Laptops, Cabling, Printers, Multifunctional devices Scanners, Hubs, Switches, Routers, Blackberries, Tablets, Smart phones, LAN, and Wireless Topologies
PROFESSIONAL EXPERIENCE:
Confidential
Cyber Security
- Inspect and maintain all associated ACAS infrastructure to ensure proper operation and tuning for optimal vulnerabilities identification and enumeration.
- Create and track POA&M requirements for resolving security findings.
- Implement, and maintain the secured ACAS capability baseline, provide support to the development of the implementation guidance, best practice information, schedules, and detailed product feature specifications to support integration of ACAS.
- Possesses a widespread knowledge of systems integration, performance, evaluation methods and procedures. Utilized project management principles to maintain, plan and coordinate the installation of new Government off the selves (Gots), and Commercial off the selves (Cots) applications and hardware in a server environment.
- Recommend information assurance/security solutions to support customers’ requirements. Ensure system security requirements are addressed during all phases of the system life cycle.
- Implement and monitor security measures for communication, networks, and provide advice for personnel to adhere to and established security standards. Remain knowledgeable of Administrative requirements for security on our systems.
- Improve and execute Government approved security policies, plans, and procedures; implement data, network security measures; operate Network Intrusion Detection and Forensics.
- Operate Electronic Key Management System, and Public Key Infrastructure (PKI).
- Operate all aspects of Information Systems (IS), data availability, integrity, authentication, confidentiality, and nonrepudiation.
- Implement, and Monitor Host Based Security System (McAfee ePolicy Orchestrator), firewalls, Intrusion Prevention Systems, Intrusion Detection Systems, other point of presence security tools, Virtual Private Networks (VPNs), and related security operations.
- Develop and execute Government approved security policies, plans, and procedures; implement data network security measures; operate Network Intrusion Detection and Forensics; handle IS security incidents; support COOP/DR plans, and perform certification of IS and networks.
- Maintains, utilized, and implemented Security Technical Implementation Guides (STIGs) and supports Risk Management Framework (RMF) in efforts to sustain the integrity of all supported systems.
- Administer, troubleshoot and determine solutions for multiple (OS) versions and (Reduced Instruction Set computing (RISC) Platforms).
Confidential
Engineering Specialist
- Install, configure, service, repair, and maintain hardware and software for network services, storage networking devices, and servers. Integrate multiple information systems in a networked environment, evaluate and resolve customer information system problems. Analyzed and resolved client’s computer hardware, software and peripheral, Multifunction device errors onsite.
- Identified and track server performance, availability, capacity and configuration problems.
- Initiated mitigation or preventative actions, such as increasing disk or memory capacity to improve performance. Plan and coordinate with impacted staff for server’s schedule maintenance, upgrade and support.
- Install and configure routers, switches, and various transmission media, server hardware and software, and ensure the proper installation and configuration of workstation hardware and software for efficient operation on the network. Install, optimize and troubleshoot Local Area and Base Area Networks
- Baseline for (Navy Generation Enterprise Network) Confidential Certification and Development labs environment, and Software testing for McAfee Data Loss Prevention (DLP) EPolicy Orchestrator.
- Created documentation for application certification including installation instructions, possible network/hardware/software performance impact and technical specifications.
- Utilize and development virtual lab environments for application management testing & packaging, with System Center 2012R2 Configuration Manager (SCCM).
- Assign IP subnets and addressing for end users in the development environment.
- Manipulating install, uninstall, registry and special character scripts for application packages in SCCM.
- Help establish application test environments from scratch utilizing various tools: Microsoft Server 2012 R2, Microsoft SCCM 2012, SQL Server, Active Directory, DHCP, DNS, Domain Controllers, Microsoft Lite Touch/PE, VMWare.
- Troubleshoot hardware/software installation
- Assign IP subnets and addressing for end users in the development environment.
Confidential
Technical Consultant
- Responsible for building maintaining, and supporting Mobile devices, Windows and Macintosh desktop and laptops platforms.
- Provided support for managing, and creating databases for business applications, and licensing.
- Analyzed and resolved client’s computer hardware, software and peripheral, Multifunction device errors, on both Macintosh and Windows platforms.
- Served as the liaison on behalf of the Contracted companies for ordering and purchasing new technology from vendors.
- Advised on Network, Client Server infrastructure implementation to small businesses.
Confidential
Computer Support Specialist
- Managed and installed software and applications for Cots and in house software used, built and maintained computer labs throughout the facility, and maintained the network state on site, repairs and maintenance of networking closets throughout the entire facility.
- Provided daily instruction and technology support to high school students, including a summer service-learning project teaching the basics of computer hardware and software to children.
- Delivered onsite, desk side, phone (helpdesk) support for Administrative staff and students using Live Time and Remedy ticketing systems.
- Served as the liaison on behalf of the School District for ordering and purchasing new technology from vendors.
- Participated in city-wide upgrade to fiber optic network for School District of Philadelphia.
- Provided computer hardware, software and peripheral devices support, desk side, and phone for Philadelphia School District Regional Administration Office as well as various schools within that Region servicing over 1000 students and Administrative staff.
- Participated in National Computer Conference in Philadelphia (NECC) setup of Computers both Mac, PC, Projectors, Interactive Whiteboards, Multifunction Printers as well as any of setup they needed and supported all of the equipment both hardware and software throughout the week long Conference for NECC.
- Participated in cable management project in multiple locations throughout the School District of Philadelphia.