We provide IT Staff Augmentation Services!

Network Administrator Resume Profile

5.00/5 (Submit Your Rating)

MD

CAREER SUMMARY

Senior Information Assurance Engineer/Architect and Manager with a proven track record of identifying, analyzing, integrating, verifying, and sustaining a broad spectrum of Information Assurance needs for any size organization. Excellent communication, interpersonal, organizational, customer focus, and problem solving skills.

PROFESSIONAL EXPERIENCE

Operations Principal Consultant

  • Information Assurance Subject Matter Expert SME and Principal Consultant
  • Directs Cyber Security initiatives within the company.
  • Advises on Cyber Security line of business opportunities and direction.
  • Conducts security analysis, risk management oversight and quality control of all Cyber Security related service offerings and tasks.
  • Primary Information Assurance support for technical proposal responses and business development activities related to Cyber Security.

Confidential

PRPS Information Assurance Lead

  • Lead Information Assurance engineer for the Paper Remittance Processing Support PRPS TIPSS-4 contract.
  • Directs, oversees, and architects all security and information assurance related activities in support of the prime contractor's responsibilities to the PRPS program.
  • Directly supports government program office in all information assurance matters to include FISMA requirements and activities such as Security Assessment and Authorizations SA A , IT Contingency Planning ITCP , Continuous Monitoring CONMON , FISMA contractor reviews, Security Risk Assessments SRA , Enterprise Audit Trails Audit plan, Plans of Actions and Milestones POA M , etc.
  • Subject matter expert for all information assurance related areas to include but not limited to infrastructure hardening and configuration requirements, network security, end-point protection, operating system and database security compliance, audit configuration and requirements.
  • Prepares and authors technical analysis reports on a wide range of security issues, processes, and technical components for both internal and external customers.
  • Creates responses to statement of work requests from customers to include scope analysis, cost estimation, and scheduling.
  • Responsible for conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs and conduct systems security evaluations, audits, and reviews.

IT Security Engineer, Senior Staff

  • Primary Information Assurance Support Lead for the Integrated Submission and Remittance Processing Program ISRP for the Internal Revenue Service.
  • Information Assurance lead for a SW development program, responsible for the following activities: 1 Produces and maintains Security Assessment Authorization SA A documents for program applications 2 Discover and remediates security vulnerabilities in said applications 3 Creates and maintains other associated security documents, SSP, SSAA, POA M, ITCP and other documents as needed 4 Coordinates and resolves security issues with Government counterparts 5 Ensures compliance of equipment and applications with Department of Treasury security policies, requirements and objectives 6 Provides security engineering designs and implementation in all aspects of Information Assurance and Information Security InfoSec Engineering. Assesses and mitigates system security threats/risks throughout the program life cycle validates system security requirements definition and analysis establishes system security designs implements security designs in hardware, software, data, and procedures verifies security requirements performs system certification and accreditation planning and testing and liaison activities, and supports secure systems operations and maintenance 7 Provides security certification test and evaluation of assets, vulnerability management and response, security assessments, customer support and provides guidance on security issues 8 Conducts Information Assurance research, develops security and Information Assurance position/white papers in support of customers' requirements. Works across all Engineering disciplines, interfaces with Quality Assurance, and Program Management.
  • Provides expert technical advice and guidance to management and other technical specialists on critical IT security issues.
  • Prepares and authors technical analysis reports on a wide range of security issues, processes, and technical components for both internal and external customers.
  • Creates responses to statement of work requests from customers to include scope analysis, cost estimation, and scheduling.
  • Responsible for conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs and conduct systems security evaluations, audits, and reviews.
  • Prepares and delivers education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures.
  • Implements security requirements through COTS configuration including Windows Group Policy Objects.
  • Performs system, OS, and application hardening utilizing industry best practices, DISA STIGS, CIS benchmarks, and NIST standards.
  • Program Privacy lead.

Confidential

IT Security Engineer

  • Provides expert technical advice and guidance to management and other technical specialists on critical IT security issues.
  • Responsible for conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs and conduct systems security evaluations, audits, and reviews
  • Prepares and delivers education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures.
  • Implements security requirements through COTS configuration including Windows Group Policy Objects.
  • Performs system, OS, and application hardening utilizing industry best practices, DISA STIGS, CIS benchmarks, and NIST standards.

Confidential

IT Security Engineer

  • Provided Information Security services to Maryland Department of Transportation and State Highway Administration MDoT, SHA, MAA, MVA .
  • Services included the monitoring and configuration of firewalls, IDS appliances, and proxy servers.
  • Focus of position was to perform vulnerability assessments and penetration testing.

Confidential

Corporate Network Administrator

  • Responsible for user accounts, network connectivity, setup and troubleshooting, backup and file recovery, anti-virus administration, and computer security.
  • Lead Active Directory and Group Policy Administrator for corporate network.
  • Aided in devising security architecture to include corporate Anti-X solutions and Anti-Virus Solutions. Recommended, installed, and configured assets in support of security architecture such as Barracuda Spam Firewall and Symantec Corporate Anti-Virus.
  • Performed and directed baseline security measures pre and post deployment of corporate servers and systems. Further increased security measures by performing system hardening and aligning with standards such as the benchmarks from the Center for Internet Security CIS and the DISA STIGS.
  • Acted as company inventory manager for all equipment and assets.
  • Devised and implemented an interactive asset tracking system.
  • Performed numerous small computer support functions.
  • Installed, updated, and troubleshot multiple computer systems at company headquarters.
  • Provided local help desk support to administrative staff.
  • Tracked and administered local area network components.
  • Conducted research and evaluation on new software, devices, and systems to be implemented at company headquarters.
  • Tested and evaluated security products, enterprise communication systems, and administrative programs in a virtualized environment utilizing VMWARE ESX Server, VMWARE Player, and VMWARE ACE.
  • Designed administrative databases to facilitate staff communication and information retrieval.
  • Acted as corporate web site designer and maintenance technician as well as manager for corporate cell phone and pager process.

Confidential

Programmer: National Security Agency

  • Contracted to build an interactive data dictionary system.
  • Created interactive web-based program to view, search, and administer a doctrine data dictionary.
  • Programmed using Perl and a Sybase database.
  • Implemented these capabilities on Sun and Windows systems.
  • Designed the scripts to be portable to various architectures.

Confidential

Programmer: USAF 32nd Intel Sq

  • Key member of a group creating a metrics infrastructure.
  • Created automated reporting to the web using Excel, Adobe Acrobat Perl.
  • Created a web application to query the metrics database with access controls.
  • Implemented using Perl and a Sybase database and Sun and Windows NT computers.

Confidential

Operations Systems Weekend Operator: Defense Security Service

  • Performed UNIX and Windows NT system operations and computer security for relational database machines.
  • Performed first tier troubleshooting of encountered system problems.
  • Conducted scheduled processes to perform daily and weekly updates of security data.

Confidential

  • Organization Webmaster responsible for the direction, content creation and maintenance of over 200 Intranet HTML pages
  • Created and integrated graphical content implemented CGI and Java scripting.
  • Provided end-user Intranet training.
  • Acted as an IRIX system administrator for four Silicon Graphics systems.
  • Performed NFS configurations, file permissions, password management, system backups, diagnostic checks and general preventive maintenance.

Confidential

  • Managed computer security programs integrating policies and procedures reducing computer-related incidents on Sun servers and workstations.
  • Implemented in depth software accountability procedures, information system protection techniques and provided organizational computer security training.

Confidential

Attended training courses to enhance knowledge for working with intelligence partners.

HF Analyst:

  • Performed work as a HF analyst for mission collection acquisition.
  • This work entailed setting up new collection requirements and tasking, and following tasking analysis procedures.
  • Conducted term and near real time analysis.
  • Technical Skills not all inclusive but most common Security Tools: Nmap, Nessus, ArcSight, Snort, HEAT, BackTrack, Ethereal, Ettercap, Metasploit Framework, Untangle, Nagios, Kismet, OSSIM, BRO, OSSEC HIDS, Wireshark, Tripwire, Netcat, GFI LanGuard, Acunetix, WebInspect, AppScan, AppDetective, Wikto, Sandcat, TCPDump, Cisco PIX, Netcat, McAfee Intrushield, Juniper Netscreen, IBM ISS, Symantec RAS, ArcSight, etc.
  • Forensics Tools: EnCase, Helix, FIRE, LiveView, Deft Linux
  • Operating Systems: Linux/UNIX, Solaris, Windows
  • Database: Sybase, SQL Server
  • Languages: Perl, Java, ASP.Net, Visual Basic, T-SQL
  • Software: MS Office, Adobe Acrobat, QuickBooks Enterprise, Open Office, TrueCrypt, BackTrack, Nubuntu, Symantec Corporate AV, VMWARE ESX, ClearQuest, ClearCase, MS Visual Studio
  • Network Design/Implementation: Spanning-Tree topology, Layer 2 and Layer 3 routed multi-VLAN environments, shared multi-customer network design, dedicated individual and remotely managed network devices, basic common routing protocols.
  • Infrastructure Support: Security and Authentication, Microsoft Active Directory, Group Policy, Routing, VMWARE ESX Server, Switching, Load Balancing, Content Delivery.

We'd love your feedback!