System Administrator Resume Profile
5.00/5 (Submit Your Rating)
MarylanD
Key areas of Expertise
- Technical Management
- Operations Support
- IT Support Administration
- IT Hardware/Software Procurement
- Network Security Functions
- Network Message Traffic Systems
- Network Maintenance/Administration
- Vulnerability Analysis
- Setting Group Policy
- Commutations Security Material System CMS
- Public Key Infrastructure PKI
- Data Transfer Systems Design
- Computer Installation/Testing
- Budgeting/Allocations
- Document Management
- Personnel Management
- Team Building Training
- Troubleshooting
- Customer Service
Professional Profile
- Demonstrate diagnostic and collaborative problem-solving skills exhibit proficiency in translating individual needs into responsive, customized solutions
- Exhibit expertise in various policies including DCID 6/3, ICD 503, FIMA, NIST 800-53, NIST 800-37, and SCDIC 1253
- Communicate technical and complex information easily and concisely conduct investigations and create reports and databases establish excellent work relationships and provide in-house training proficient in technical and operations support, and ensure excellent customer service
- Pro-active leader with personnel management experience provide training and development, conduct performance evaluations, build strong teams, and achieve organizational goals
- Self motivated and dedicated expertise utilizing a Vulnerability Analysis and Assistance program identify risk and provide maintenance to increase security
- Creating and enforcing group policy that limits user's access to certain information
- Organized and detail-oriented implement network security functions and supporting administration, procure IT hardware and software, provide end user support, and manage network message traffic system
- Results-driven with military professionalism United States Top Secret NATO Security Sensitive Compartmented Information SCI Full-Scope Polygraph Clearance
- Demonstrate high-level technical management and training qualities specialize in technical operations, maintenance, testing, and network administration
- Responsible for conducting real-time network scans using Nessus software and WebInspect
- Escalate organizational development through superior systems management provide uncompromised security while consistently exceeding goals and objectives
- Fully train in the use of Xacta which is a Technical Assurance Oversight SME/Technical Assurance Evaluator
- Awarded an Associate of Arts in Information Technology/Networking
- Qualified to handle to use Commutations Security Material System CMS for Siprnet and JWIC network.
Employment History
Technical Assurance Oversight SME/Technical Assurance Evaluator and System Administrator, Confidential
- To support to the established DoD oversight body s by organizing meetings, preparing minutes, and maintaining updates to the TA Policy Documents.
- Organize and contribute to any TA conferences/ workshops that may be scheduled.
- Shall provide support for the development of technical oversight to all TA laboratories supporting the DoD.
- Prepare a TA validation reports to provide guidance and direction to the TA laboratories and DoD Components on the proper implementation of the TAS.
- Provide interpretation and guidance of policy documentation for specific evaluations.
- Conduct peer reviews of new implementation documentation. Facilitate meetings to manage and approve changes to the USCYBERCOM TA methodologies.
- Research and respond to queries regarding interpretation of the TA Policy Documents and as it applies to the USCYBERCOM TA Component.
- Created Classified PowerPoint presentation for civilian and senior military personnel.
- Drafting and maintaining Excel spreadsheet to keep track of numbers and manipulate the data for certain projects.
- Working with NIST 800 series, especially 800-53.
Information Assurance Specialist, Confidential
- Identify, develop, and track operational requirements for computer network defense CND tools and solutions in the areas of Situational Awareness and Incident Management
- Configuration and maintain Network Configuration and Security, Fault Tolerance, Discovery, PKI, and CND standards/strategy
- Department primary liaison with DOD/CIO/NNI and DISA for issues, policies and implementation of IT Security policies
- Experience in briefing senior military and civilian personnel regarding current network threats
- Perform requirements analysis and verification and validation testing for IA and computer network defense tools and solutions
- Exhibited experience with Vulnerability Management System VMS . Joint Incident Management System JIMS , Joint CERT Database JCD , Joint Indicators Database JID and Assured Compliance Assessment Solution ACAS
- Strong program/project management experience, with the ability to multi-task and manage multiple projects/CND tools
- Customer Data Services CDS Security Engineer, Confidential
- Strong technical skills related to information security, network security, Windows security, UNIX/Linux security, web application security, and wireless security
- Experience with Federal Information Security Management Act FISMA , compliance reporting, Nessus Scanning, WebInspect, tenable support and working with the ISSO to resolve any vulnerabilities
- Evaluate technical controls through interviews, documentation creation and review, and comprehensive technical assessments
- FEMA-wide Federal Emergency Management Agency systems and networks for the identification of computer incidents, threat analysis and proactive response, IA analysis, IA reporting
- Security assessments and consulting on the Network's networking infrastructure, Web hosting environment, encryption technologies, firewall rule base analysis, remote access solutions, client engagement connections, vulnerability and threat analysis
- Working with functional teams to identify opportunities and provide recommendations on how security can be built into projects/products that are being developed
- Serve as a subject matter expert regarding information security leading practices and federal regulations such as CFAA Computer Fraud and Abuse Act , National Security Directive 42 NSD-42 , NIST National Institute of Standards and Technology, FISMA Federal Information Security Management Act , NIST 800-40 and Public Key Infrastructure PKI
- A systematic, accountable, and documented process for managing exposure to vulnerabilities through the timely deployment of patches
- Review and prioritize vulnerabilities and patches for immediate deployment and alternative remediation approach if patching is not possible
- Principal Security Engineer, Confidential
- Responsible for conducting real-time analysis of theater IA-CND data from DISA Command Center DCC and DISA Support Element DSE in the DISA Field Office DFO US Cyber Command USCYBERCOM on a regular basis
- Monitor DISA-wide systems and networks for the identification of computer incidents, threat analysis and proactive response, IA analysis, IA reporting, and IA response to the DISN and GIG users
- Hands on experience with security standards, policy, procedures, C A and IA risk assessments
- Coordinate real time response to security incidents that affect the military domain with recommended course of action that mitigates and contains the risk while limiting the impact on the customer
- Experience with VMS compliance reporting, Retina REM Scanning and Hercules Remediation tool
- Demonstrated knowledge and understanding of CNDSP 6510, INFOCON, IAVM/VMS, Incident Reports, FRAGO, NTOC, WARNORD and STRATCOM Directive 527-1
- To maintain, educate and train military and civilian user on email cryptography
Information Security Specialist, Confidential
- Demonstrate a working knowledge of government/business network security practices and procedures
- Responsible for conducting real-time analysis of theater IA-CND data from DISA Command Center DCC and DISA Support Element DSE in the DISA Field Office DFO US Cyber Command USCYBERCOM on a regular basis
- Monitor DISA-wide systems and networks for the identification of computer incidents, threat analysis and proactive response, IA analysis, IA reporting, and IA response to the DISN and GIG users
Information Security Specialist /Administrator, Confidential
- Demonstrated expertise while working on Department of Energy DoE / National Nuclear Security Administration NNSA Metrica Team Venture drafting network security policies
- Shown a high degree of critical reasoning and the ability to work independently on network security projects
- Proficient in gathering system security control information from audit findings and other cross-functional sources to make value judgments on implementing changes that would positively affect the security posture of a network
- Dedicated in gathering data and evidence to be used in prosecuting cyber crime can install security and network monitoring software which are essential in today's corporate/government scenario as cyber attacks have become more sophisticated
System Administrator Confidential
- Successfully monitored multiple classified government intelligence networks at Fort George Meade ensured networks operated at capacity or provided an alert to a System Technician
- Key player who skillfully developed records utilizing a ARTS ticketing system entered noteworthy events on a DOC logging system
- Served as System Liaison to various representatives of the United States armed forces and their supervisors
Senior Information System Security Officer, Confidential
- Boosted business efficiency by managing Information Systems Security administration for computer systems conducted testing of security procedures and ensured all policies were adhered to
- Expertly oversaw systems including various scans, patches, security relevant software and hardware changes, and system security plan maintenance
- Maintained security by completing documentation and storing data in the computer system database SRTMS, COOP, Contingency Plans, POA M, audits, and security finding mitigations
Computer Technical Support Analyst Confidential
- Essential team player who provided technical, operations and training support to personal computer users skillfully produced reports and databases for weekly meetings
- Aided in design and coordination of personal computer support systems installed and tested computers and printers configured operating systems, and shrink-wrapped programs and applications software
- Led technical and operations support to Joint Worldwide Intelligence Communications Systems JWICS
- Accurately organized and installed Information Assurance Vulnerability Alert IAVA patches
- Demonstrated expertise by conducting hardware diagnostics, providing customized solutions, and coordinated repairs
- Served as liaison for data transfer systems design and implementation
- Exhibited experience with Fiber Optic, Cat 5 and Cat 6 cable wired a new network for Defense Intelligence Agency
Senior IT Helpdesk/Administrator, Confidential
- Increased business development by managing daily operations, administration, and maintenance of 500 CPU's reloaded operating systems and supervised weekly system backups
- Proficiently constructed, analyzed, and maintained reports wrote 15 technical reports utilizing controls for receipt and distribution
- Participated in weekly policy meetings which encouraged exchange of information and training development performed in-house training on computer use and on the job security
Security Incident Administrator, Confidential
- Vital team member who directed daily operations, administration, and reporting of security policies for England's NHS accounts participated in monthly policy meetings
- Launched investigations regarding violations of NHS Patients Data policy and possible network intrusion complied 50 reports and updates utilizing controls for receipt and distribution
Naval Information Systems Security Officer ISSO , Confidential
- Key player who managed security and administration of network security on unclassified, secret and TS/SCL military networks oversaw daily operations and administration of terrestrial and celestial circuits and LANs
- Enforcing governmental requirements access to network information with group policy need-to-know
- Sole Petty Officer in the Fleet Information Warfare Centre who was cleared to perform scans on Top Secret Joint Worldwide Intelligence Communications Systems JWICS
- Demonstrated superior leadership qualities managed 18 Help Desk Technicians, provided training and development, and directed budget allocating material and work force resources
- Provided comprehensive support to Department of Navy commands
- Effectively utilized communication security cryptographic keying material
- Operated Security Scanner software to analyze network vulnerability scanned 290,000 systems using Vulnerability Analysis and Assistance program
- Aided in recovery of data loss and compromise due to virus or intruder issues
- Directed network message traffic system using controls for receipt and distribution
- Processed network incidents utilizing multiple Intrusion Detective System platforms
- Dedicated Officer who supported and provided maintenance and updates to 200 members ensured efficiency and minimal downtown
- Provided inventory management identified and purchased new hardware and software