We provide IT Staff Augmentation Services!

Senior Systems Engineer Resume Profile

4.00/5 (Submit Your Rating)

Professional Experience

Senior System/Security/Network Engineer

Status:

Current FT

Confidential

  • CMMI Level 5 Training Completed
  • Cyber Warrior Basic Course Completed
  • Cyber Warrior Advanced Course Completed
  • Integrated System Security Completed
  • DITSCAP Process Completed
  • Certification and Accreditation Completed
  • Wireless LAN Assessment Completed
  • Common Body of Knowledge Completed
  • Process Essentials Completed
  • Engineering Essentials Completed
  • Introduction to Linux Completed
  • RT-RG The NSA Way Completed

SUMMARY OF QUALIFICATIONS

  • Mr. Patterson has 13 years of experience with Information Assurance, Security Engineering, Network Engineering, System Administration, and testing experience supporting Intelligence Community customers and other government agencies. As an IA leader in most of his jobs he has gathered security requirements from various security teams he has worked with which led to the implementation of security design activities. He has supported the following contracts: AIRGLOW, AIRSTEED, ATLAS, AXISS, CIDAR, CEMO, CEP, CES, CHEWAWAY, DDX, DCGS, DELTAWING, ENCORE, EPM, EPM II, ESSO, GAZELLEAPOLLO, GAZELLEATHENA, IES, IPT, JFCCNW, KMI, NAVIGATOR, NEADS, NTOC, OCMC, OMS, ONEROOF, RADIC, REPRISE, SANDCRAB, SEED, SILENTDAGGER, SOMMS, SHARKSEER, THOUGHTDARE, TUSCANSUN, VOYAGER, VULTURE, WINDWARD, ZUES, and ZND.
  • He was a Security Test Engineer on the CIDAR NTOC contract and developed system requirements and high-level design for the programmers to code against. Mr. Patterson worked with a small team of six engineers in evaluating a SCADA collection system for implementation in the Intelligence environment. He assisted with development of the test plans, performed testing and analysis of the SCADA system to determine best of breed for Government implementation. Additionally, he wrote implementation guidance that aided system administrators in operating the equipment. Mr. Patterson provided system security engineering support to a major USSOCOM communication satellite deployable kit for SILENTDAGGER on the AXISS contract. He developed and implemented an operational representative test network to examine different protocols and designed broadband networks to support multimedia content. Also, he worked with Network Engineers to insure that IA capabilities would be integrated into the developed systems based on the principles of Defense in Depth.
  • Mr. Patterson has excellent knowledge of Federal, NSA, IC, and DoD Information Security regulations, publications, and policy. He supported the NSA Information Security Certification Accreditation Process NISCAP as the Security Engineer at NGIS Northrop Grumman Information Systems on a team responsible for architecting, implementing, and testing a multi-level security environment supporting critical mission applications. He was instrumental in creating innovative test procedures to certify a COTS firewall at Protection Level 4 in accordance with DCID 6/3 requirements. These procedures were the first time the Government client applied rigorous testing of a COTS security device at NBP 2701. He performed technical analysis of the problem areas discovered on the COTS product.
  • He supported the NGIS team serving as the lead IA engineer responsible for reviewing, researching, and recommending appropriate Information Assurance IA standards for IT system developers. He conducted investigation of IA standards adoption within large scale IT development projects resulting in better definition of security requirements early in their system lifecycles. As a Security Engineer for NGIS, Mr. Patterson performed various information assurance procedures such as CAMPS/BER plans for approval of various hardware and software he helped manage the NSA NCAD database in order to keep the SSP up to date, performed IAVA patching and monitored the Beanstalk inventory system. Mr. Patterson used network security tools in order to keep systems secure such as Wireshark, WinPCAP, NMap, Snort, Netcat, Nessus, Cain and Able, Hping2, Lophtcrack, Brutus, John The Ripper, Ettercap, Aircrack, Pwdump, Windump, Tcpdmp, Fragroute, Airsnort, Netbus, Netstumbler, Nbtstat, Traceroute, nslookup, nltest, ping, Whois, sid2user, Kismet, Smbdie, MBSA, eEye Retina, Gold disk, WASSP, SecScan and other GOTS software. He has experience with computer and network exploitation CNE , along with cyber analysis and mitigation procedures. Has knowledge of the following attacks, tools, techniques, and scans: SYN Stealth Scan, XMAS scan, Idle Scan, TCP connect scan, Fin scan, Null scan, Heap/Stack buffer overflows, Unicode attack, SQL injections, honeypots, polymorphic viruses, cross site scripting, keylogging, encryption, steganography, shared key authentication, SmurfCrack, RainbowCrack, ADMmutate, DES, AES, Tripwire software, sec event logging, Firewalking, Brute Force, Dictionary, and Hybrid password attacks, Man in the middle attacks, ARP poisoning/spoofing, IP spoofing, MAC spoofing/flooding, DNS cache poisoning/DNS zone transfers, Session Hijacking, Smurf/Land/SYN flood attacks, chained exploits, passive information gathering/footprinting, social engineering, vulnerability mapping, website cloaking, port scanning, vulnerability analysis, banner grabbing, proxy servers/Tor, backdoor entries, SNMP strings, Snow Hidden channels /Alternate data streams, DoS ping of Death , password hash/SAM files, TCPflow, sequence numbers, replay attacks, Anti-virus software, rootkits, Trojans, worms, security tokens, biometric devices, smart cards, covert channels/Tunneling, MAC ACLs, NAT, DMZ, Stealth Anonymizer, zombie/bots, Tcpslice, IP Fragmentation/splicing, cookie manipulation, null sessions, phishing attacks, and virus wrapping.
  • excellent understanding of the NSA Certification and Accreditation process NISCAP . Responsible for supporting the NISCAP Type Certification of firewalls/VPNs and other commercial network security products as a Security Engineer, he developed new approaches for conducting NISCAP type certifications that exceeds previous methodology in terms of completeness and cost savings. He also assisted with staffing responsibilities: wrote open job requirements, evaluated candidates and was a technical mentor to junior IA engineers and system administrators on the team.
  • Confidential and prepared reports and other information to support the various departments using MS Office products. MS Visio was heavily used throughout his career for network design purposes and documentation of different networks. He has an excellent knowledge of the following software: Microsoft Office Suite Word, Excel, PowerPoint, Outlook, Access, FrontPage, Project, Publisher, Visio Tripwire, ArcSight, Zenoss, Oracle, Norton Anti-virus, MacAfee, HP OpenView, Adobe CS suite, MX Studio, Primavera, Doors, J-Builder, Rational suite, Popkin Systems Architect , WebLogic, Hummingbird, Symantec Backup Services, NetViz, Cisco VPN, AutoCAD, Ghost, Cygwin and Samba.
  • He effectively interfaces with senior external personnel and is a self-motivated contributor to initiatives with an extensive understanding of network design and engineering, systems analysis and development, and served as an IA leader for many contracts. Most of his work is performed without appreciable direction. As a Security Engineer for NGIS, Mr. Patterson acted independently to uncover and resolve issues associated with the development and implementation of operational projects. He was in charge of hardening many systems with vulnerable holes by threat mitigation techniques and remediating procedures. He effectively interfaced with colleagues in the SOCC, the IIS, Eagle Alliance, the Government Comms Center ITD , and other Government Departments.
  • He has the ability to cope with a changing environment and short deadlines. Mr. Patterson has always been flexible with his work schedule in that he is always willing to work long hours and weekends. He has realized that in the IT world there are many projects that need to be completed in a short turn around especially mission related projects. Many deadlines require the negotiation and coordination from a variety of teams for speedy activations. From October 2003 to now, Mr. Patterson has provided in-depth engineering analysis of telecommunications alternatives for government agencies in support of their strategic modernization efforts.
  • As a Security Engineer for NGIS, Mr. Patterson was the GFE Government Furnished Equipment coordinator for the RADIC, PRIORYCRAWL CIDAR , and the EPM programs. As the GFE coordinator for these programs, he planned and organized an abundant amount of hardware and software assets through the lifecycle that these products go through. Mr. Patterson has used computer network defense CND techniques to protect and monitor threat activity to the classified AJ domain at NGIS. He performed extensive planning, designed, and stood up the AJ computer domain consisting of over 400 users and workstations, engineered several active directory infrastructures for various proposals and IRADS, and performed SCADA software integration planning and support. As a lab manager for TASC, Mr. Patterson participated in Software Code Analysis Services which was an IRAD with the intent to offer an objective, trusted 3rd party service which evaluated software code and provided the owners/users with knowledge of significant security vulnerabilities and potential mitigations. The service determines the salient vulnerabilities and suggested mitigations through knowledge of the software application and operating environment, software development and security engineering experience, knowledge of known weaknesses/vulnerabilities/common attack patterns, and static code analysis with manual review with judicious use of automated tools. This effort really gets to the heart of the matter with significant vulnerabilities that put the application and the mission at high risk for attack.
  • From April 1999 to now, Mr. Patterson has developed his communication skills with managers, co-workers, and customers. He has supported over 35 different government contracts and reported directly to the NSA customer on four different contracts such as, EPM II, AXISS, DELTAWING, and CIDAR. As a Senior Security Specialist at JHUAPL The Johns Hopkins University Applied Physics Laboratory , he prepared and delivered effective communications that synthesized information and conveyed ideas in written and orally presented formats to audiences preparing and analyzing fiscal information, provided statistical data for document control quarterly/yearly activities by preparing viewgraphs and presentations for Group and Department Meetings. He gave various briefings/debriefings for the APL staff that handled classified materials.
  • At NGIS, Mr. Patterson has been in control of all changes made to the hardware and software on the AJ domain at NBP2701. From October 2003 to now, Mr. Patterson has been involved in the purchasing, installation and configuration of all types of network hardware and protocols: Switches, Routers, Hubs, Firewalls, IDS's Network and Host-based , Servers, Tape backup units, Access Points, UPS's, NIC Cards, Fiber transceivers, Fiber Optic and Cat6 cable, WPA, WEP, AES, TKIP, TCP/IP, WINS, DNS, DHCP, Ethernet, VTP, ARP, EIGRP, ICMP, IPv4, IPv6, OSPF, RIP, UDP, FTP, HTTPS, VNC, IMAP, Kerberos, NetBIOS, SMB, IRC, LDAP, NTP, SSH, SMTP, SNMP, POP, TELNET, TFTP, Gateways, KVM's, VLANs, VPNs, ACLs, PKI, SSIDs,Wireless LANs, Racks and Patch panels, Grounding and Firestoping, SATCOM equipment, and Crypto gear. From September June 2005, Mr. Patterson performed system/security administration on a Linux environment for the DELTWING program. This effort involved expertise with the Linux, also he worked in a Unix environment for the where many systems were setup from scratch and turned into advanced Unix servers. In 2012 on the EPM II contract supporting the PSN part of KMI, he has worked with Red Hat Linux a good amount installing and configuring and troubleshooting in a development and operations environment. Mr. Patterson has experience with the following operating systems: Windows NT/9x/2000/XP/Vista OS, Windows NT/2000/2003/2008 Server, Novell Netware, UNIX - Sun Solaris, Linux - Red Hat GUI and command line, Fedora, Scientific Linux, OpenSuSE, Ubuntu, Mandriva, Knoppix, Debian, VMware ESX Server, Cisco Firewall, Router, and Switch IOS's.

Confidential

Lead Security Engineer/Deputy Program Manager

  • He evaluates the COTS FireEye Malware Protection System MPS to validate that it can provide critical real-time detection, analysis, and protection functionality and prevent malicious malware from negatively impacting the respective system and associated network architecture. As configured, for the pilot, this MPS tool specifically is evaluated to determine its reliability and effectiveness in mitigating malicious E-mail traffic and attachments that attempts to penetrate the Non-classified Internet Protocol IP Router Network NIPRNet . This evaluation is focused on file reputation and FireEye's integration in a test environment along with existing DoD network defense tools and capabilities such as Enterprise Email Security Gateway EEMSG . Mr. Patterson is hands on with the equipment as well and also engineers and tests FireEye's CMS server Central Management System and Gigamon's HC2 passive tap. Zero-day vulnerabilities are increasingly exploited using malicious attachments or uniform resource locators URLs in spear phishing e-mails. The ZND pilot will be implemented and managed in a manner to conduct a thorough evaluation of this product which was collaboratively selected by the National Security Agency NSA and Defense Information Systems Agency DISA PEO MA sponsored Zero-Day Network Defense ZND Pilot program. This malware protection tool is being deployed on the DoD Unclassified but Sensitive Internet Protocol Router Network NIPRNet and hosted at the five DISA Enterprise Computing Centers DECCs . Mr. Patterson is in charge of the team of security engineers and is the liaison between them and the government. He gives direction to the engineering of the program and the network layout of all the DECCs using MS Visio and Power Point. His duties that he has are switch configurations, VMware admin, Cisco Iron Port admin, equipment procurement, Red Hat admin, selection of COTS products from various vendors, obtaining many approvals from different government groups and customers, leading meetings, managing the lab, being tier III support to the production equipment, working with tier I and II production analysts with malware findings, C A support on all equipment Nessus and Retina scans, and mitigating findings , providing daily and monthly reports to government, doing performance/functional/regression/acceptance/transistion/Implementation testing on all equipment in the lab and providing information in documentation format as a Test Plan, writing and modifying test scripts, and briefing various groups that are affiliated with the efforts of the program's mission.
  • Confidential
  • Lab Manager/System Engineer
  • Linux System Administration, cabling, loading software, installing IAVA patches, troubleshoot networking issues, server configuration and administration, development of System Administration guidelines and procedures. He also worked with virtualization and NetApps installation and configuration, doing inventories, recreating all software Visio inventory docs and diagrams and installing and racking servers and storage devices. Mr. Patterson managed the operations lab and the development lab. He dealt with classified hardware and software installing and configuring along with creating documentation moreover, he updated source code on various boxes and worked with network monitoring software in both labs. Mr. Patterson was the lead for engineering three PSN labs, racking equipment, running cable, and configuring network and server equipment. He provided a great deal of system engineering by recreating Windows Active Directory on several domains including DNS and group policy configurations and options. One of the domains on the operations side was corrupt and he was the only person with the knowledge to recreate the AD structure. Mr. Patterson worked with the Gov security person doing Network vulnerability scanning and approvals for equipment and software. Not only was he using his expertise in Windows in the labs but he also used his Linux skill, which had a large presence in the lab. He managed the switches and firewalls in the labs and engineered the rack layouts for the future labs. Mr. Patterson worked on virtualizing the PSN KMI effort in addition, he became the SME for various software packages that are being used on the program to monitor the infrastructure. Besides assisting in managing and maintaining the six PSN systems, he was heavily involved with the engineering of the Spiral 2 phase of the system which instills more capabilities to the system. The engineering consisted of the areas of equipment, redundancy, software, IPs, Vlans, rack layouts, power/space/cooling, switch configs, and more. The program consisted of many tight deadlines for various projects which had to be met to not interfere with the operational side of the house.

Confidential

Lab/IT Manager

As a Lab Manager for the Solutions Center Lab, Mr. Patterson was responsible for managing the schedule of all activities in the center and was the point of contact for issues and actions related to connection to and operation on the TASC Research Network. He was in charge of Control access accounts and resources to the center resources and provided suggestions for center improvements. Mr. Patterson installed and configured/reconfigured equipment and software, maintained a complete and current inventory of all center equipment and software and their configuration, assisted in preparing demonstrations or other activities in the center and periodically backed up data that resides on the center network furthermore, he provided a monthly report on the activities and status of the center. Mr. Patterson has performed penetration testing on various hardware devices in the solutions center lab and worked with different vendors in a VMware environment performing continuous monitoring testing and evaluation. Mr. Patterson evaluated the best breed of product for the ISSO community in regards to Configuration Management of Control and Security Control Monitoring furthermore, he was evaluating companies such as Tripwire. He took on a security software engineer role by working with different vendors doing software vulnerability analysis on source code. The effort was called Software Code Analysis Services, which was a service that identified and offered mitigations for significant security vulnerabilities in applications using static analysis techniques. The key benefit to customers was that the owners of software applications get actionable information from which to assess risk and make decision to use or repair for mission use. Mr. Patterson was in charge of setting up the environment, compiling the code to analyze in a Linux environment, and scanning and preparing these reports for the customer. The various products that he used analyze source and binary code. Mr. Patterson worked with senior TASC management in order to bring in more funding for this effort for the next fiscal year regarding TASC IRAD and billable customer contract work. The Software Code Analysis Services that TASC will be provided became very popular among the Intel environment and many companies that currently provide this service are trying to team up with TASC in this effort. He worked with the HP OpenView suite doing Network Monitoring on the company's IRAD network for analyzing the tool for the transition to the customer's enterprise network. He was in charge of standing up a classified Solutions Center at the TASC Annapolis Junction Facility and had been working with Management and the ISSO for this effort. In addition, Mr. Patterson was the server and network administrator for the AJ LanStaff and performed duties such as tickets, server work, tape backups, conferences, IAVA patching to all workstations and servers through push software, and other network troubleshooting issues. He has performed major migrations such as the server infrastructure off Government equipment over to new server equipment building three domain controllers and three file and print servers with no network service interruption.

Confidential

Information Sys Tech Analyst Level IV

Mr. Patterson was consistently requested by Management to work critical short turn around mission oriented projects. These projects require the negotiation and coordination from other departments for speedy activation. Specific examples of this are located throughout the Special Ops community, IC Partners, Afghanistan, Iraq, UK and Germany. Mr. Patterson was a technical network engineer in a 6 Person Tiger Team specifically focused on providing USSOCOM/SOF United States Special Operations Command/Special Operations Forces network and voice connectivity. He was assigned as the team lead for the AFRICOM command providing network and voice deployments. These responsibilities included Quick Reaction Capabilities QRC for the mission element down range. He was an engineer working with the DNI and C4I initiatives to share resources across the enterprise and he brought his IA background to the team for hardening the deployable systems to prevent attack from the target out in the field. This responsibility of his included the, design and implementation of critical network resources for the Intelligence community. He engineered, implemented, and deployed Lightweight deployable kits consisting of network and voice equipment to various US military bases around the world, and he was present and stood up these systems at 10 different bases. Mr. Patterson served as a liaison between high level military personnel and the NSA. He worked with the NSA's Network Security team, IP team, VoIP team, and the LAN maintenance team closely to insure reliability in the network infrastructure. The technical aspect of the effort was configuring Cisco switches, routers, firewalls, VoIP, crypto gear, and SATCOM equipment.

Confidential

System/Security Administrator IV

Mr. Patterson was responsible for contributing to system/security administration projects and infrastructure maintenance also he ensured successful daily computer network operations CNO of secure and corporate communications. He worked with the Information System Security Officer ISSO , Personal Security Officer PSO , and other senior security engineers using network vulnerability scanner tools and exploiting systems to ensure that the network was secure and that configuration management complied with security requirements. He developed technical solutions and recommended advanced technological ideas and guided their development. Mr. Patterson has received five awards at NGIS, TASC and four promotions for outstanding support to the staff. NGIS, TASC has given him an advanced level of hands-on proficiency with numerous development tools. He became the NSA Tech Lead, designed and stood up the AJ computer domain consisting of over 400 users and workstations, engineered several active directory infrastructures for various proposals and IRADS, designed/engineered the NSA Solutions Center Lab, and performed SCADA software integration testing and support. Mr. Patterson worked independently on two different occasions to migrate the entire classified domain to new equipment with a change in the infrastructure with very short deadlines. He was the Priorycrawl system/network administrator onsite supporting this NTOC effort. Mr. Patterson was also responsible for setting up and monitoring network devices and backup solutions, performing GFE coordinator duties, creating SOP's for other LAN Staff members and users, and training new AJ LAN Staff employees to perform daily tasks. He has a proven acuity for promptly and thoroughly mastering new technologies and is a self-motivated contributor to team-based initiatives with an extensive understanding of network design and engineering, systems analysis and development, cyber security, database creation and administration, information assurance roles and technical support.

Confidential

Network Engineer

He was responsible for duties including voice and data network design and engineering, installation, configuration, maintenance, troubleshooting and tuning of enterprise data networking equipment for DoD efforts. Mr. Patterson performed critical evaluations of networks and developed recommendations for improvements and ensured the continuous availability of all data network services in addition, prepared necessary network layouts, diagrams, equipment lists, and documentation. He managed vendors by working with them to define product features and enhancements and acted as liaison with vendors and operations to resolve escalated issues. He responded to escalations, tickets, and alerts from NOC and Helpdesk issued to network engineering in a timely manner and was able to open/close trouble tickets Remedy Action Request System , generate/provide status reports, provide analysis, develop engineering redlines as needed to support network maintenance actions, engineering changes/upgrades, and security vulnerabilities. As a Network Engineer, he provided resolution information and worked with other teams to complete impact analysis where appropriate, and worked with other department personnel to insure the smooth and coordinated implementation of production deliverables. He installed, maintained and provided troubleshooting for multimode and single mode fiber optic cable and UTP cable, and performed troubleshooting of complex network problems utilizing network security analyzers and other troubleshooting tools. Mr. Patterson provided analysis for implementation techniques and tools for the most efficient solution to network problems and to improve existing solutions furthermore, evaluated/reported on new analog and digital communications technologies to enhance the capabilities of the data network.

Confidential

Senior Security Specialist /Assistant TS Control Officer

Mr. Patterson managed network and system performance of a multi-user computing system used for processing classified DoD data. He was responsible for processing all levels of classified material which includes the accountability, transmitting and receiving of the material. Various security software tools were used to perform these job duties. He served as a key knowledge resource relative to group activities and classified materials in responding to internal and external requests, interacting with supervisors and staff to generate responses to inquiries, and communicating those responses as required. His duties included providing technical assistance and consulting to the system users, developing tools for managing the system, monitoring various classified programs that are being executed by staff members in the TS Vault, researching/maintaining address and clearance information on contractor and government facilities, resolving discrepancies and assisting staff members in following proper procedures for handling classified material. Mr. Patterson provided solutions to a variety of technical computer problems and conducted various security briefings/debriefings for the APL staff that handled classified materials.

Confidential

Computer Specialist

  • He was responsible for providing computer support and assisted with designing the computing infrastructure. He assisted with troubleshooting high profile network performance issues and proposed appropriate action. Mr. Patterson made recommendations of computer system enhancements that would improve the performance and reliability of the systems. His contribution to the company website was a huge asset. He also assisted with proposal development and provided support for Public Relations programs furthermore, he brought his security mindset to the company and gave recommendations for the security vulnerabilities that existed on the network. As an intern, Mr. Patterson also conducted market research and assisted with marketing collateral design and production. He maintained high levels of data accuracy, performing all duties with diligence and thoroughness in a sensitive, customer-focused, and high-volume financial investment environment.
  • ConfidentialMr. Patterson developed policies and standards for allocation and use of computer equipment. He ensured data integrity by evaluating, proposing, implementing and managing software, hardware, and security solutions. Mr. Patterson compiled, analyzed and prepared reports and other information to support the department. He assisted with designing and developing server disaster recovery strategies and assisted with web site development also he continuously updated the school's databases. He also prepared and delivered effective communications that synthesized information and conveyed ideas in written and orally presented formats to audiences. He has an expertise analyzing, identifying, designing, and supporting comprehensive solutions that directly supports staff needs.

Special Accomplishments

Mr. Patterson has 13 years of IT professional experience relating to Security/System/Network Engineering and has received numerous awards for outstanding support to his customers. He was highly recognized by the NSA customer on four different occasions. In 2006, the customer came to NGIS and said they had to come off the NSA domain due to the engineering of the NSA Active Directory structure. This customer was amazed with the short turn around that a contractor facility with 400 users and computers had in creating a complicated domain to support all their own assets. When NSA came out to inspect the domain, they said it was the best they had seen and the NGIS facility became the example model for all future contractor domains and many contractor facilities called NGIS for support. From the AD structure to the security group policy to the DNS setup to the redundancy of file replication, they were impressed. This was a project that Mr. Patterson lead, engineered, and completed. Another time of recognition from the NSA customer was on the AXISS contract where there was an RMM site that was on the back burner for three years for receiving NSAnet connectivity, and Mr. Patterson went outside his normal support to SOCOM and took care of this site configuring all the equipment with little support from assisting teams. The customer was extremely happy with this effort. He was presented an award for outstanding network and system administration support to the PRIORYCRAWL Team allowing it to be recognized as a finalist by NSA for the 2006 Deckert/Foster Award for excellence in SIGIT engineering. The RADIC program gave Mr. Patterson a recognition award for contributions above and beyond the call of duty. The NRO customer awarded Mr. Patterson for outstanding support to the Voyager program for system administration efforts. He was also given an award for outstanding support to the Mission Preparation and Training Department in support of the VULTRUE and WINDWARD projects for the DIA customer. At the Johns Hopkins University Applied Physics Laboratory, he received an award from the DoD for outstanding support in delivering security efforts and awareness to the APL staff.

We'd love your feedback!