We provide IT Staff Augmentation Services!

System Engineer Resume

5.00/5 (Submit Your Rating)

SUMMARY:

  • Currently seeking a position to leverage my combination of technical skills, cyber knowledge and program leadership to deliver and support high impact strategic business initiatives in an operational environment.

TECHNICAL SKILLS:

Operating Environments: Unix, Linux: Ubuntu, Red Hat, CentOS. Windows: XP, Vista, 7, 8, Windows Server: 2003, 2008, 2012

Virtualization Environment/Hypervisors: vmWare: vSphere, vmPlayer, vmWorkstation. Citrix: XenCenter, XenServer, XenDesktop. VirtualBox

Software/Tools: Sharepoint, Moonfruit, Visio, MS Word, MS Excel, MS Access, LDAP Active Directory, Active Directory Domain Services, Audit Log Management, DNS, antivirus management, SANs, Remote Desktop Protocol, ScrumWorks, Jira, Greenhopper, Putty, VIM, ArcSight, Catalyst, tag|Connect, Wiki Markup, Visual Basic, XHTML/HTML5, Microsoft Office Suite, Pointsec Media Encryption, Stackato, Sitscape, VNCServer, apache Tomcat, webservers, tomee, antivirus software, python

Hardware: Fusion Disk drives, Dell PowerEdge Servers, Power Connect Switches, Cisco Switches, Routers, Ninjaprobe box, APC Uninterruptible Power Supplies (UPS), Network Interface Cards (NIC)

WORK EXPERIENCE:

System Engineer

Confidential

Responsibilities:

  • In charge of the stability of large virtualization environment. The environment consist of 15 Dell servers and over 200 virtual machines (using both Linux and Windows OS). The environment used both Citrix and vmWare technologies.
  • System integration of outside vendors into virtualization environment.
  • Setting up a Remote Desktop license server and installing the license keys.
  • Demostrated different vendor’s software products to see if they are viable tools to use for NGOA.
  • Creating a Visual Display Interface using Citrix Xenserver and XenCenter
  • Installing UPS that use a network connection to shut down the servers automatically if the building loses power
  • Install and configure different COTS software to work in the Demo Virtualization environment. These were standalone installation.
  • Led the implementation of a standalone environment for GEOINT demo so it works outside the enclave
  • Technical lead for POI (Program of Instruction) revising the Cyber Threats Affecting Networks course using agile methodology
  • Assisted in production of Cyber Security Courses: Introduction to Reverse Engineering, Black Box Reverse Engineering, Hands - on Lab. Introduction to Cyber Security (REV2)
  • Completed cyber security for the following courses at GDAIS: Introduction to Cyber Security, Skillsoft CompTIA Network+: Network Protocols, Cyber Threats Affecting Networks, Network Defense Methods and Strategy, U.S. Government Information Assurance Regulations, Personally Identifiable Information (PII), Packet Analysis (featuring WireShark and Tcpdump), Security Operation Center (SOC) On the job .
  • Assist in software request evaluations, and investigation of e-mails for malware using various web sniffing sites and some python scripts
  • Created a SOP on how to look for APT threats in Arcsight and created a marco in excel that standardized the service tickets sent to IT
  • Assisted in evaluation of COTS vendors’ cyber security products for the NOSC
  • Supported development and evaluation of Cyber Warrior material
  • Assisted in configuring lab equipment for testing, development, and customer demonstrations Performed competitive intelligence research and maintenance of a cyber- competitive intelligence wiki
  • Assisted with the transition of proprietary software over different domains

Graduate Teaching Assistant

Confidential

Responsibilities:

  • Taught Intro to Computing Lab at George Mason University
  • Graded quizzes and case studies for Microsoft Office 2007, XHTML, wiki and blogs

Help Desk Technician

Confidential

Responsibilities:

  • Solved computer issues to enhance information systems and promote more efficient, cost-effective operations
  • Provided technical assistance, support, and advice to end users for hardware, software, and systems.
  • Provided end user for all applications used, in particular Pointsec Media Encryption, within the company.
  • Monitored hardware and software functionality and efficiency on a daily basis and helped ensure it remains in safe functioning condition.
  • Acted as a liaison with outside vendors. Called software and hardware vendors to request service regarding defective products.

We'd love your feedback!