We provide IT Staff Augmentation Services!

Network Security Resume Profile

2.00/5 (Submit Your Rating)

Summary of Qualifications

  • As a professional information security analyst, I have been responsible for protecting an organization's digital information and computer networks. I have accomplished more than 15 years of work experience and verifiable achievements in information technology, data security, customer support as well as network and system operations. Expert at generating high-quality solutions that enhanced business and IT operations, complemented with expertise in surpassing expectations and rendering optimum level of service under time constraints or special considerations. Skilled at conducting computer systems audits to ensure security controls and updates. I begin my career in IT during my US Army service as Command Staff Communication Chief from 1999-2004, during which time I was granted Top Secret Security Clearances. My time in service developed my ability to build strong relationships within team members and all levels of management, along with a reputation for dependability and close attention to detail.
  • Experience with multiple computer systems and programs.
  • The ability to solve problems independently.
  • Strong verbal and written communication ability.
  • Sound decision-making ability.
  • Ability to handle sensitive information and maintain established SLA's.

Professional Experience

Confidential

Enterprise Access Management EAM , Network Security, Team Lead

  • EAM procedures, along with security management of drive share access and controls. Project team member for a 42 terabyte migration of server data from the Wachovia mainframe to the Wells Fargo data servers. Pass down of all new security policies and procedures with in the new frame work. Teams lead on group creation, restricted access and customer problem ticket resolutions. Subinacl Robocopy scripting procedures, data migration and staging process control.
  • Use of SecureCRT in a Microsoft Windows environment as UNIX terminal for secure script runs in manual or automation modes.
  • Security controls policy for migration procedures and access management to users
  • Allocation of business information for build-out of new server share location, folders and user permissions groups.
  • Subinacl, Robocopy staging of migration controls and securities for overnight data migration.
  • Participating in the evaluation, development, and implementation of security standards, procedures, and guidelines for multiple platforms and diverse systems environments
  • Designing network vulnerability scans and providing remediation alternatives
  • Developing specifications for complex network security
  • Identifying emerging vulnerabilities and evaluating associated risks and threats
  • Error Event logs, Security Event Logs and Analysis
  • Maintaining SLAs

Confidential

Team Lead

Lead the first shift team on various monitoring activities including website, credit card transaction and stock market server assets system, IMB, Solaris, UNIX Oracle. System administration provided along with implementation of hardware and software solutions. Systems support analysis for technology needs and security and provided technical support and troubleshooting customer and end user relations, regulatory compliance and standards leadership, training, and team collaboration.

  • Monitored, managed resolved incoming event viewer for financial market software on a 24/7 global scale for the Merrill Lynch/BAC data servers.
  • Client access security control, UNIX security backup request, testing development servers
  • Net-cool, Citrix portal, Unix WebTop, Site Scope, GSM, MySQL or Oracle Sybase portals.
  • Managed daily checks and pass-down security control on a global 24/7 team.
  • Review Technical Security Controls and provided implementation responses as to if/how the Systems are currently meeting the requirements.
  • VPN troubleshooting
  • Installation and maintenance of security software
  • Instructing computer users on security
  • Error Event logs, Security Logs and Analysis
  • Maintaining SLAs

Confidential

Administration /Desktop I I

  • Active Directory administrator for software installations and licensing.
  • Troubleshoot and Microsoft Office 2003, Outlook Web access and various applications.
  • Support Tier-2 administration for various state agency software systems used throughout the Virginia Judicial departments Provided First Contact support to various software systems such as JTS Juvenile Tracking System , Badge, J-Initiator, Crystal Reports, CIPPS, LMS, Supreme Court Systems, Net Meeting programs.
  • VPN troubleshooting
  • Maintaining SLAs

Confidential

FAB 300 Helpdesk

  • NT Admin/password, Lotus Notes administrator, Tarantella remote access and SAP accounts.
  • Monitored and resolved factory errors received by associates during automated production runs.
  • Re-imaging Workstations, Notebooks, TCP/IP protocol, Print Spool, VPN, and Access Control Servers.
  • Hardware/Software installations for factory tool server runtime operation.
  • Maintaining SLAs

Confidential

Communication chief Sergeant E-5

  • Primary adviser to Unit Commander on all communications during real world tactical and training operations while deployed to foreign countries and in garrison headquarters.
  • Provided satellite, cellular, long/short range radio communications to unit garrison offices for field training exercises and real world mission deployments.
  • Secret/Top Secret clearances granted for duties while in garrison and real world mission deployments, currently in-active but I am clearable for future sponsorship.

Additional Information Skills

Team Leader on multiple contracts and projects, Structured Thinking and Writing, Interpersonal Communication Skills , Information Security Policies, Cost Allocation Management, Microsoft Office Suite 2010, 2013 , Microsoft Server 2008, 2012, Routers, Hubs, and Switches, HTML, CSS, JavaScript, UNIX scripting, Shell Bash, Enterprise Access Management Security, Subinacl Robocopy server tools, Network Protocols, Network Security

We'd love your feedback!