Computer System Specialist Resume Profile
4.00/5 (Submit Your Rating)
ME
during the span of my military career.
- As Healthcare Administrative Specialist, I possesses an extensive record of successful service in challenging assignments, where I has been directly involved in analyzing data and information to meet an administrative task, in support of the Department of the Army, Army Medical Command, and Joint Commission on Accreditation of Healthcare Organizations JCAHO in developing analyzing and coordinating short, mid and long-term range plans and programs in the likes of Warrior Transition Programs WTP , Medical Evaluation Board System MEBS , Integrated Disability Evaluation System IDES and Medical Operational Medical Database Systems MODS .
- My background and experiences validate my ability to be cautious and vigilant on any reports/document received or prepared to be sent through the chain of command. Hence, Event planning, Calendar Management, Critical Analysis of Reports, Briefings and Document for clarity is a re-occurrence procedure to maintain integrity of the office I'm serving and to be served. I regularly communicate verbally and in writing with individual originating administrative and personnel action requesting supplemental data, providing clarifications, giving guidance on compliance for regulatory and policy requirements.
- As a Computer Specialist with United States Army I acquired strong interpersonal communications and customer relations' skill with a proven record of effectiveness in rapidly identifying, analyzing and resolving complex technical problems. Multi-tasking and hands-on experience in trouble shooting, configuring, repairing and providing technical support services for end users of Battalion's LAN with WINDOWS based WIN 95/98/2000/ME/XP/NT applications and several other/current State of the Art software and hardware's.
- Proficient with Novell, UNIX, and have sound knowledge of Computer Information System Development such as: Alternate Network Protocols TCP/IP, IPX/SPX, HDLC, Telecommunication PPP, STDM, SLIP, Digital Analog Transmission LAN/WAN Topology/Configuration TI/T2 Fiber Optic System backed Nodes, Routers, Bridges and Firewalls effect on Network Security Efficiency . Database Management SQL- Data Modeling, Normalization Repository, Case-tooling Computer Program Design C Programming- Flow Charting, Coding, Debugging, Testing Micro-Computer Software, Hardware, and Troubleshooting Techniques.
- Clearance Level: NAC/SECRET CLEARABLE
Experience
Confidential
Rotika Systems Communications Computer Tech Specialist
- Oversee Client's Red Hat Network RHN Satellites Systems to ensure that security fixes and configuration files are applied across Linux infrastructure environment consistently.
- Validates system requirements and provides technical advice to the user in areas such as data mapping, data clean-up, test scripts, and quality control.
- Monitors modems and display screen information to detect error messages that signal malfunctions in communications software and hardware.
- Implements LAN/WAN policies, procedures and standards and ensures their conformance with network and company objectives.
- Assists in training other development staff as well as users.
Confidential
System Analyst
- Technical Expert for Warrior Transition Command resolving complex technical issues with Medical Operational Data Systems and IT infrastructure.
- Duties include setting up security parameters for the Warrior Transition Module in MODS. Creates, maintain, and control access to the system and protect integrity of the data input into the system.
- Ensures that MODS interfaces and synchronizes with other Armed Forces Medical Systems for correlation, query, and display. Develop and implement end users training metrics/program for the OTSG Staffs and Regional Medical Command.
- Maintain data integrity, backup, and automation of medical operational data system module that is used by United States Army to keep track of the treatment status of the wounded soldier under Army Health Care Systems.
- And perform other administrations and technical duties as needed.
Confidential
System Network Analyst
- Managed, supervised and support the DCA for all Hospital Network Systems.
- Responsibility includes maintaining functionality of the HNS. Duties also includes planning and implementing network security, building firewalls, and applying cryptography measures as necessary for the DCA office.
- Installations of network applications, managing host security, file permissions, backup and disaster recovery plans
- Adding and deleting users on the network access log. In addition, develops and implements programs to ensure that systems, network and data users are aware of, understand, and adhere to systems security policies and procedures.
Confidential
System/Admin Specialist
- Served as members of the IT crew at the Walter-reed Army medical center to upgrade the old legacy patient data tracking system to the new and update patient data tracking technology.
- Perform patients file analysis to determine which data is critical, less critical and order of priority
- Perform data analysis and design.
Confidential
System/Admin Technician
- Tracking and resolving trouble ticket, interacting with upper-level technician and end-use. Collection documentation and researching for quality improvement.
- Updating personnel records into the system, used systems capacity in researching/ developing data and reports requested by superior officer.
- Act in a liaison capacity to superior's subordinates to minimize demand on superior time.
- Establishes and maintained a wide variety of files for records, reports, correspondence and various technical data related to the activities of operations.
Confidential
Computer/Intelligent Analyst
- Computer Specialist in the Directorate of Information Management, assigned as military attach with the Metropolitan Police Department for Joint Operation known as Counter-Drug
- Functioned as INFO Tech 25B and Admin Specialist 42A for mission critical assignments
- Assignment include use of Oracle database security, Intrusion Detection, CISCO PIX Firewall, Web content Filtering, Mail Gateways, VPN, CISCO Routers and Register hardware and software on a Microsoft Windows platform.
- Creation and promotion of the awareness of technical security issues.
Confidential
Computer System Specialist
- Troubleshoot and install computer hardware and software
- Coordinated and performed threat analysis risk management, configuration management, business continuity and contingency planning for sustainability of existing systems
- Ensures implementation of appropriate systems security policies, and ensure the rigorous application of information security/information assurance policies, principles and practices in the delivery of all information Technology IT services.
.