We provide IT Staff Augmentation Services!

Network Administrator,resume Profile

3.00/5 (Submit Your Rating)

Summary

I wish to use my broad set of skills and knowledge to include 20 plus years of experience in network security/administration, including installation, configuration and troubleshooting. I consistently demonstrate keen expertise in all aspects information security to include system administration, security configuration and compliance. Furthermore, I do extremely well in the implementation of policies to optimize operational efficiency while ensuring government policies and regulatory standards. Taking initiative has always been my academic and career focus. With my skills and experience, I am certain that you and your team will gain a competent employee demonstrating key assets that would offer positive impact and valuable contributions to your team. Retired US Air Force, MSgt with Secret Clearance, Top Secret SCI eligible.

Experience

Information Security Analyst III Team Lead

Confidential

  • Validate, through Security Testing and Evaluation ST E the regulatory controls of ICANs based on the Mission Assurance Category MAC and information classification levels.
  • Schedule the ICANs for validations well prior to ATO expiration and travel to sites, perform testing and evaluation to ensure IA controls are being met report validation findings to the HQDA CIO/G6 appointed ACA at 7th SC T using methods in the applicable DIACAP publications.
  • Provide input via the DIACAP scorecard and Evaluation Requirements Report to the COR explain the findings submit automated finding input to the ACA tracking database.
  • Perform on-site assistance visits when required.
  • Advised peers on administrative policies and procedures and resolving technical problems, priorities, and methods.
  • Consult and advise other sections regarding internal controls and security procedures.
  • Prepare activity and progress reports relating to the information systems audit function.
  • Analyze risk associated with advanced technologies such as cloud computing, mobility, Databases, and networking architecture.
  • Perform risk assessments of highly complex systems and networks
  • Proficient in processing systems through DIACAP security processes and understanding utilization of DISA policy and STIG procedures.
  • Experienced with DOD IA Certification and Accreditation Process and/or NIST Risk Management Framework.

Information Assurance Analyst, 7th Signal Center S-TNOSC

Confidential

  • Developed security policies to support requirements as outlined in DISA Security Technical Information guides
  • Proficient in organization-wide security models for use in certification and accreditation, DICAP, Retina, DISA Gold disk, SCAP, VMS, and various penetration and vulnerability assessment tools.
  • Perform network security testing system scanning, ensuring command DIACAP and IAVA compliance on various operating systems OS platforms, such as Windows 2003/2008/XP/7, using appropriate FISMA guidelines, and Security Technical Information Guides STIGS , exporting findings utilizing Microsoft Excel reports and VMS Vulnerability Management System identifying vulnerabilities and malicious activities, tracking all events and incidents within the Centrix network.
  • Proficient in HBSS, MacAfee EPO server and all associated modules.
  • Developed and implement a test network of advanced hardware and software solutions. Implements security concepts associated with this position.
  • Extensive knowledge of platforms Microsoft Windows and Linux.
  • Proficient in the use of routers, switches and servers and associated protocols.

Intermediate Information Security Analyst, DISA Europe, Stuttgart, Germany

Confidential

  • Render high level of assistance to the TNOSC, DISA Europe Theater Network Operations Security Center Network Defense TNC NETDEFENSE EUROPE .
  • Support the information warfare analysis of several United States Combatant Commands, the European Command USEUCOM , United States Africa Command USAFRICOM , US Special Operations Command USSOCOM , Central Command USCENTCOM and NATO enterprise networks.
  • Analyze intrusion logs and system processes to prevent possible hacker activity and enforce security changes.
  • Employ the following Information Assurance IA tools on a daily basis to support intrusion analysis: Arc Sight Correlation Engine, Site Protector, Argus, Wire Shark, Snort Intrusion Detection System IDS.
  • Demonstrate in-depth knowledge of IA tools and related products, Retina Vulnerability Scanner, Vulnerability Management System VMS , DISA Gold Disk, Host Base Security System HBSS , Remedy and LanGuard vulnerability scanner, TcpDump, Netflow, Netwitness, to continuously monitor the United States of America, Department of Defense classified and unclassified information networks.
  • Perform network security monitoring system scanning, ensuring command DIACAP and IAVA compliance on various operating systems OS platforms, such as Windows 2003/2008/XP/7,
  • Tracks IAVA compliance and mitigation actions in response to CCRI and CNA inspections and conducting research in preparation for monthly Cyber Operations Readiness Report CORR .
  • Represented Cyber Systems Support CSS providing direct support on issues and tasks related to IT security/information assurance and the associated administration, development, policy plans, programs, and initiatives to the Information Assurance Program Manager IAPM .
  • Serve as an integral part of a team responsible for managing the Source Fire IDS systems, MacAfee IDS systems and Securify IDS platforms.

Senior Systems Engineer, HQ EUCOM, Stuttgart, Germany

Confidential

  • Applied dynamic leadership talents on global security in protecting USEUCOM interests, 30B in assets and thousands of personnel in support of Theater Engagement Planning TEP objectives in Europe.
  • Provided expert oversight in day-to-day operational aspects of security and connectivity, from system installation to configuration and ongoing system management.
  • Initiated the development and implementation of security programs, extending telecommunications and information protection to intellectual property, contractors, personnel, travel, special events and daily operational concerns.
  • Enforced Information System Security policies and procedures while adhering to applicable regulations.
  • Diligently managed all systems related to Theater Operations Analysis Detachment TOAD covering deployment, planning and analysis of information for use by decision makers and key stakeholders Commanders and European Joint Chiefs .
  • Oversaw a crucial system providing confidential and secure information to 50 analysts and European Joint Task Force command.
  • Supervised daily activities in a multi-platform IT/IS environment serving the entire United States European Command comprised of a secure NT domain and 60 Windows servers and workstations operating in a Windows network environment.
  • Primarily held responsible for the connectivity, uninterrupted operations and system security as well as component-level repair and user support
  • Systematically installed, configured, updated and maintained the entire infrastructure.
  • Dealt with TOAD software applications inclusive of Tactical Warfare, Joint Flow and Analysis System for Transportation JFAST and DART models.
  • Directed and coordinated related equipment inventories and logistics and confidential information storage, management and disposal.

Confidential

  • Established and implemented system policies, user profiles and network security for unit Windows NT server.
  • Entrusted as system administrator and personal computer PC administrator for over 60 Windows servers and workstations on a Windows network, providing continuous automation support to 50 operational research analysts.
  • Spearheaded the installation and configuration of Microsoft BackOffice components on Windows Server new computers and PC software
  • Earned distinction for knowledgeably managing the hardware/software systems supporting in-house and the Theater Operations Analysis Detachment TOAD deployable analysis cell of ECCS-AS.
  • TOAD brings operations analysis tools, such as Tactical Warfare, JFAST and DART models to the field in support of Joint Task Force commanders executing contingencies or non-combatant evacuation operations NEO .
  • Masterfully led PC/workstation configurations with unit NT servers and base Novell servers.
  • Handled routine preventive and corrective maintenance tested and monitored network activities as well as maintained necessary support and configuration documentation for all computer equipment.
  • Pivotal in installing, testing and troubleshooting IA systems in accordance with established policy, procedures, test plans and guidance.
  • Complied with standardization, anti virus and security guidelines for all personal computers maintained.

We'd love your feedback!