We provide IT Staff Augmentation Services!

Network Administrator Resume Profile

5.00/5 (Submit Your Rating)

DE

OBJECTIVE

To secure an IT position where opportunity for advancement is based on performance and results.

PROFESSIONAL EXPERIENCE

Confidential

Network Administrator

Responsible for providing Network Support for the State of Delaware,DelDot,DART and the Delaware Transit Corporation LAN/WAN. Troubleshoot Windows XP, Windows 7 8 and Microsoft Office 2007/2010, printing and network related issues. Provide remote support via Bomgar to various remote State of Delaware offices. Reimage and redeploy new desktops/laptops as needed via Microsoft Deployment Toolkit. Exercise Virus and Spyware management via McAfee VirusScan Enterprise v8.8. Perform Daily and Monthly Backups via Symantec Backup Exec 2010 R3. Hardware used to perform backup operations: Dell Power Edge R710 and PowerVault TL2000. Work with vendors to resolve issues. Monitor the HelpStar and Service Now service trouble ticket queues. Complete additional projects when assigned.

Confidential

Network Support Engineer

Responsible for support technology of all types in and around the Delaware Pennsylvania area. This includes remote support, break/fix support as well as new project installations. Setup, configure and support internal and/or external networks. Troubleshoot network performance issues, recommend upgrades, patches, new applications and equipment. Provide technical support and guidance to users.

Technology Disciplines:

HP/Dell Servers/Workstations, Windows Desktop OS XP/7/8 , Windows Server 2003/2008/2008r2/2012 , Microsoft Exchange 2003/2007/2010 , Microsoft SQL Server 2005/2008 , Various Symantec products, Storage Craft, Appassure, Cisco routers/switches/firewalls, Various VOIP and traditional Telco, Citrix, Axis Video, etc.

Confidential

Sr. Information Security Analyst

  • Responsible for conducting Compliance Investigations in violation to GSK Acceptable Use of IT Resources Policy. The network is monitored by Verdasys Digital Guardian Network and Client ILP Information Loss Protection service that tracks the use of confidential/proprietary information on GSK devices. Alerts are escalated to the Computer Security Incident Response CSIR team when Proprietary/Confidential information is used in a way that may cause unintentional/intentional disclosure of the information such as sensitive data copied to removable media USB , sensitive data sent to an external email address, sensitive data uploaded to external websites, sensitive data written to CD/DVD, high volume printing, and high volume copying to removable media.
  • Under the leadership of the Chief Information Security Office responsible for the execution of the CSIR Process. The Computer Security Incident Response CSIR process is critical to reduce the risk inherent in using information technology to meet business requirements. This process ensures that GSK is prepared to address computer related and data breach security events in an efficient manner. Lead investigations of various incident types by following written standard operating procedures, collect evidence to support the investigation in a forensically sound manner, articulate remediation actions required to close an incident, partner with appropriate business resources to ensure remediation actions are executed.

Key Responsibilities:

  • Manage incidents through the analysis, investigation, response and post improvement process steps.
  • Responsibility for monitoring and initial intake of all incidents including capturing of key information needed to gain approval to investigate.
  • Consult with Management, Service Owners, Compliance Officers, Governance, Ethics and Assurance, Human Resources, Legal and/or other appointed individuals to approve the approach for managing incidents.
  • Responsible for maintaining the CSIR Incident Management system with all details and documentation associated with investigations.
  • Follow agreed procedures for approval and notification of the CSIR investigation.
  • Collect forensically sound evidence by partnering with various IT services organizations, external third party service providers and global business partners.
  • Partner with the business unit to agree and document remediation plans to resolve incidents.
  • Partner with HR to ensure HR and disciplinary processes are followed.
  • Engage with Legal to ensure all applicable laws are complied with both during evidence collection and incident management.

Additional Responsibilities Include:

  • Phishing Awareness Wombat Security Technologies Symantec Endpoint Protection
  • Symantec Clearwell eDiscovery Vulnerability Scanning - Languard
  • Cisco VPN 3000 Log Analysis McAfee Web Reporter - Proxy Log Analysis
  • Peer to Peer Report Analysis MS Windows Active Directory Log Analysis
  • Remedy Ticketing System NetIQ Directory Resource Administration
  • SMTP Log Analysis WireShark v.1.8.6 Network Protocol Analyzer
  • Firewall Log Analysis Mx Toolbox Email Header Analyzer

Confidential

NOC Technician

Responsible for monitoring Sprint MPLS WAN/LAN infrastructure, corporate internet, server health and statistics monitoring, datacenter environment and wide area network monitoring along with daily backup operations. Troubleshoot network issues The NOC uses the following tools for monitoring and troubleshooting events: WhatsUp Gold, Applix, Spectrum OneClick, ARCserve backup, ArcSight event security management and AirMagnet Enterprise Consoles for security monitoring and InfraStruXure Central for UPS monitoring. Responsibilities include second level troubleshooting store network issues on Cisco 2800 series router and Cisco 2960 series switches, Intel server farm and all corporate and store network outages. Investigate all incidents to determine root cause. Follow established escalation procedures and time lines to ensure the quickest resolution path. Communicate all incidents maintain incident reports, activity logs and follow-up on activities to maintain the highest level of service. Update service tickets with detailed explanation of work performed to resolve issues.

Confidential

Infrastructure Operations Center

Responsible for monitoring Verizon MPLS WAN/LAN infrastructure, web hosting environment, corporate internet, and all network devices from switches/routers and servers including remote locations. Respond to network related outages escalated by customers and various business units work with carriers and third party vendors to troubleshoot network and web related issues. Responsible for first level troubleshooting of core network devices, windows/unix servers and website outages. Investigate all incidents to determine root cause. Follow established escalation procedures and time lines to ensure the quickest resolution path. Communicate all incidents maintain incident reports, activity logs and follow-up on activities to maintain the highest level of service. Update service tickets with detailed explanation of work performed to resolve issues. Support community of 1500 total devices monitored 2,159 which includes router, switches, servers and UPS devices. Primary monitoring tools include Netcool, Insight Manager, Sun MC, Solarwinds, Foglight, Keynote, Gomez, Mazu, Oracle Enterprise Manager and InfrastruXure Manager. Additional responsibilities include network port provisioning, cable management, and installation of new equipment.

Confidential

Independent Network Enterprise Consultant

  • Responsibilites include designing, testing and building Windows 2000 images for the University of Pennsylvania Health System. Test existing application and verify compatibility with Windows 2000 operating system. Download image to new hardware via Ghost software. Managed deployment of 3 PC Technicians to complete rollout of new
  • Hardware. Setup Microsoft Outlook mail accounts and Internet proxy server. Monitor network performance via SNMP for network to insure maximum network performance. Troubleshoot Tier 3 network issues and complete task assigned.

Confidential

Desktop Engineer

Responsibliites include designing, testing and building Windows XP images for various business units. Test existing applications and verify compatibility with Windows XP operating system. Setup and install Altiris servers throughout the enterprise to store migration data. Install Altiris client on all new and existing hardware to start and track Windows XP migration process via Altiris PC Transplant software to migrate data from Windows NT operating system to Windows XP operating system. Supervised deployment team of 5 PC Technicians to complete Windows XP rollout of new hardware.

Confidential

Network Engineer/Administrator

Performed network troubleshooting, support, administration, and desktop support. Maintained enterprise architecture consisting of Gigabit Core 8540CSR along with 6500, 5500, 3500, and 2900 Cisco Access switches. Handled route summarization and IP migration of the core network and enterprise setup of new DHCP scopes for all floors. Monitored and analyzed WAN/LAN performance. Installed two distributed server sniffers that improved network monitoring capabilities, and allowed configuration changes from the desktop. Responsible for all new server installs and configuration for the enterprise and exsiting customers. Project highlights:

Confidential

Network Administrator: Configured/diagnosed workstation with TCP/IP, DHCP, IPX, and NWLink for Novell servers on Windows 95 and NT platforms. Set up new accounts with rights and permissions. Performed laptop and workstation troubleshooting. Installed/configured Lotus Notes R5.

Confidential

Network Administrator: Installed and configured Windows 95, MS Office 95/97, Outlook 97/98 Exchange 5.0, and Schedule Plus.

Confidential

Network Administrator: Provide network and user support for Windows 4.0 workstations and 4.0 servers. Interfaced with vendors for new equipment purchasing. Conducted nightly backups via Seagate for Windows NT.

Confidential

Dear Hiring Manager

  • Businesses grow and change to meet the needs of their customers. Businesses also expand and contract to meet a rapidly shifting economy. As a result of these shifts, I am seeking an IT position where I can utilize my knowledge and MSCE, MCP I and Network certifications. It is with this in mind that I am forwarding my r sum to you.
  • I am well suited to Network Engineering and IT Security Analyst Administration positions, and have a solid track record in supporting major corporations in network administration, support, and troubleshooting. My diverse base of technical skills are supported by clear communication with users on all levels.
  • Your firm will benefit from my analytical and creative problem solving abilities, and your clients will benefit from my dedication to providing the ultimate in customer-focused consulting.
  • While my r sum highlights my work history, a personal interview will convey my technical knowledge, self-motivation, and positive attitude. Please contact me to discuss your needs and my qualifications in depth. Thank you for your professional consideration.

We'd love your feedback!