Network Specialist Resume Profile
OH
Objective: A challenging IT/IS Management position with diverse job responsibilities in a growth oriented organization.
Accomplishments:
- 25 years experience in all levels of communications including computer systems operations, support, and maintenance with extensive experience in
- Information Security, systems management and personnel.
- 25 years experience with installs, test, analysis, and configuration of T1/T3 E1, 10/100 Base T data lines, Bridges, Cisco Routers, Switches, Hubs, CSU's, DSU's,
- Modems, Channel Banks, Multiplexers.
- Established working knowledge of HP-Openview, Novell Netware, MS-DOS, IBM, Windows 95/98/NT/2000/ 2003 / XP/Vista/7/8, Windows Server 2003/2008, ISA, and TMG
- Servers, Unix, Linux, Lotus Notes, AS/400,OS/2, IIS, OAS, various Network Sniffers, SQL 7.0 Database, AV Platforms: Mc Afee, Symantec, Trend Micro System, Antivirus
- Monitoring and Administration, Intrusion Prevention - Cisco IPS, Juniper IDP, Palo Alto, and x86 Assembly, C/ C , also Java scripting.
- Protocols include: TCP/IP, WINS, DNS,VPN, FTP, HTTP, SMTP, Telnet, HP/UX, Ethernet, Frame Relay, Token Ring, ATM, IPX, SNMP, SNA, ISDN, FDDI, LAN/WAN.
- Currently Microsoft Certified with MCP, MCSE MCDBA in Windows 2000, Anti-Virus Platforms Mc Afee VirusScan ePolicy Orchestrator, and Symantec End
- Point Protection, Trend Micro Office Scan and Control Manager, Currently working on CISA/CISSP
Employment Experience:
Information Security Consultant
Confidential
Provide IT solutions for home/business in the Columbus/ Ironton, Ohio/ Huntington, W.VA. area. Build, configure, install and troubleshoot computer systems and network solutions for home/businesses. Responsible for managing information security operations for government offices such as C.A.O. Community Action Organization and the W.D.R.C Workforce Development and Resource Center for the Ironton, Ohio, Huntington, W.VA. offices. Provide vulnerability management services, Enterprise Vulnerability System Implementation, and Patching Governance. Provide technical support and training for all systems and networks installed. Work independently. Detail-oriented committed to quality. Strong technology background.
Security and Vulnerability AV Engineer
Confidential
Responsible for analyzing business needs, defining requirements, developing solutions, implementing systems, and managing installed applications in support of the Sign On Simplification SOS Program. An in-depth understanding of Identity Management, Single Sign-On SSO , Automated User Provisioning and issues surrounding authentication and authorization within an Active Directory environment. while also being involved with day-to-day operations within the Security realm of operations. Provide support for AV software, and any virus related incidents. Manage Symantec Antivirus 10 SAV 10 global infrastructure servers as well as Symantec Endpoint Protection 11 SEP 11 global infrastructure servers. Live Update Servers, Parent Servers and Regional Databases. Manage Sygate Removable Media control infrastructure Servers. Manage Encryption Plus Hard Disk EPHD encryption infrastructure Servers. Maintain Threat Reporter, SAV Reporter and Live Update infrastructures. Experienced in the implementation and maintenance of Symantec DLP Data Loss Prevention . Provide support for AV software and any virus related incidents, analyzing Network logs, Network Access Controls NAC Deploy, configurations, maintenance support. Firewall administration, Intrusion Prevention, Group Policies. Provide 3rd level support for all AV related issues. Implement exception requests for AV exclusions. Perform daily health checks of all systems. Submit suspicious virus samples to Symantec for analysis. Worked on projects to upgrade entire infrastructure to Symantec Endpoint Protection 12 SEP 12 Create, administer, deploy, and modify policies in all console's and within the Active Directory environment. Understanding of database systems, SQL and data modeling principles. Experience with LDAP and Microsoft Directory Services. Experienced with writing Perl, MS DOS based, and SQL scripting for complex instruction set. Worked with various vulnerability scanning tools such as Metasploit, Nexpose, Rapid7, SQL Injection. Provide guidance as to specific scope requirements as needed. Professional experience in incident management and IT operations in a financial institution. Good working knowledge of global financial institutions in terms of technology/infrastructure and their dependencies and requirements. Utilize IS Operational support systems to include the Help Desk, Change Control, Problem Management. Lead the development of systems through feedback and analysis, and assists in enforcing the support and use of these systems throughout IS. Build and maintain vendor relationships to ensure products and/or services meet the business needs and objectives of the enterprise. Work to minimize systems outages by scheduling needed system downtimes to provide minimal disruption of service to users, proactively monitoring and analyzing system performance to proactively detect and resolve production system issues, and perform stringent system testing before implementing new solutions or system changes. Knowledge and use of incident/problem management tool set e.g. Maximo, Impact, Remedy and Service Centre. Knowledgeable in common cyber threat terminology, methodologies and possess basic understanding of cyber incident and response, and related current events. Working knowledge of PKI Public- Key Infrastructure . Knowledge of Windows/ Kerberos Authentications. Knowledge of Microsoft AD Active Directory . Forward-looking and creative thinker, with a general problem-solving mindset. Strong interpersonal and communication skills. Detail-oriented committed to quality. Strong technology background. Team-oriented. Project support, Change Control, Production Assurance and support.
Information Technology Risk Manager
Confidential
Provided Information Risk Manager Support for the Home Lending business. Support application development and project management processes to ensure risk management remains incorporated in those processes and activities, interfacing with the business and central technology groups. Performed pre-deployment and post production security reviews and control self-assessments. Coordination of Application Security Assessment ASA activities with Home Lending Application Development Managers. Assist customer with implementing policies and tactics, techniques and procedures for conducting assessments. Conduct vulnerability assessments, to include in-depth penetration testing, on Windows and UNIX based platforms. Performed and assisted in application risk activities including risk assessments, audit remediation and security testing. Experienced performing security assessments, analysis and audits of 3rdparties external connected partners that includes sending 3rdparty security questionnaires, reviewing and assessing responses, identifying security issues that need to be remediated and follow up to ensure measures are enacted or implemented. Experienced in performing security assessments at the network, server/operating system, application and/or data level, also with developing and implementing security policy and/or standards in accordance with F.F.I.E.C. guidelines. Assist AD Managers with connectivity and the exception processes. Knowledgeable in common cyber threat terminology, methodologies and possess basic understanding of cyber incident and response, and related current events. Provide IT Risk guidance based on Chase Standards and Policies to Application Development and project teams. Provide guidance as to specific scope requirements as needed. Forward-looking and creative thinker, with a general problem-solving mindset. Strong interpersonal and communication skills.Detail-oriented committed to quality. Strong technology background. Team-oriented. Project support, Change Control, Production Assurance and support.
Malware Defense Specialist
Confidential
- Responsible for analyzing business needs, defining requirements, developing solutions, implementing systems, and managing installed applications in support of the Sign On Simplification SOS Program. An in-depth understanding of Identity Management, Single Sign-On SSO , Automated User Provisioning and issues surrounding authentication and authorization within an Active Directory environment. while also being involved with day-to-day operations within the Security realm of operations.
- Primary Job Responsibilities: Maintaining, installing, and administration of the Anti-Virus and Personal Firewall infrastructure for IBM's customers. This includes insuring the compliance and currency of the software version as well as the anti-virus definitions. Experienced in the following AV Platforms: Symantec 10, 11, and 12. Mc Afee ePO- 3.5, 4.5, 4.6, along with other products from Mc Afee such as EEFF, EEPC, NAS Scanner 1.0. Experienced in the implementation and maintenance of Symantec DLP Data Loss Prevention . Understanding of database systems, SQL and data modeling principles. Work closely with System Administrators, Network Administrators, Desktop Support, and Help Desk to ensure policies are being followed and appropriate steps are taken to protect the customer's infrastructure. Experience with LDAP and Microsoft Directory Services, specifically Active Directory, strong skills in use of PC desktop applications such as MS Word, Excel, PowerPoint, and Project.Respond to audit requests relating to the currency of the customer's infrastructure and take remediation steps to close any gaps in anti-virus coverage. Monitor the AV Consol and provide current reports to System Administrator and Desktop Support Personnel. Also provide instruction as to specific actions needed to remediate gaps identified on the reports. Provide 3rd level software support to the support groups and the customer to assist in resolving any non-standard anti-virus issue. Work closely with the anti-virus vendors to resolve outstanding issues. Provide virus samples to the anti-virus vendors for analysis and respond appropriately to the findings. Design and rollout new product releases of anti-virus into the customer's infrastructure. Prepare product comparisons and roll out a different vendor's product if selected by the customer. Respond to, and remediate virus infections in the customer's infrastructure. Network connectivity limitations may require travel to the customer's site to complete remediation activities and bring the customer's network back up. Regular status reports would be made to IBM and IBM's customer during an outbreak. A Root Cause Analysis may be required to determine the cause of the infection and the steps needed to remediate the issue. Typical skills used in this role include: Malware applications Symantec, Trend, McAfee, Sophos, CA, Malware Hunter, Malware Boot CD, and Junos Pulse for Mobile devices. Experience with Malware, Malware Analysis, Computer Forensics or Software Reverse Engineering. Perform behavioral analysis of known and suspected malicious files. Malware Education Ability to provide education to support teams in the capacity of 3rd level support functions Experienced with writing Perl, MS DOS based, and Python scripting for complex instruction set. Security forensics Identifying source and propagation methodology of an infection / Root Cause Analysis Incident Management Respond to and remediate virus infections Experienced with several types of ticketing systems, Maximo, Impact, Remedy, to keep all level of technical staff updated, and for Change Control. Good working knowledge of tools such as client, Alarmpoint, TAMS and other applications. Virus Workshop Ability to provide executive level instruction on the IBM Malware Services SQL Server knowledge, maintenance and administration. Infrastructure Design Enterprise Malware and Personal Firewall design and implementation Several aspects of Network and Application Security E.G. FIREWALLS, IDS, IPS, PROXIES, ROUTING, SWITCHING, APPLICATION SECURITY MODEL
Confidential
Network Specialist
Build, configure, install and troubleshoot computer systems and network solutions for businesses in the Tri-State area. Provide technical support and training for all systems and networks installed. Provide IT solutions for home/business in the Confidential area. Build, configure, install and troubleshoot computer systems and network solutions for home/businesses. Responsible for managing information security operations. Drive information security initiatives through the system development life cycle. Defines solutions that balance information security requirements against business needs. Provides vulnerability management services which includes Minimum Security Baselines MSB , Enterprise Vulnerability System Implementation, and Patching Governance. Provide technical support and training for all systems and networks installed. Work independently. Detail-oriented committed to quality. Strong technology background.
Information Security Administrator
Confidential
Responsible for providing technical, policy and administrative support in the areas of information security, information assurance and information control. Conduct research in the areas of system security develop technical analysis of site-specific systems security incidents. Delegated duties to Information Security Technicians for several sites. Create and maintain appropriate policy and procedural documentation. Worked directly with Customers, Technicians, Managers, and Directors.
Client/Server Technician
Confidential
- Installation, maintenance, and implementation of Dell Power Edge Servers 2400 - 6400 series, Windows NT workstations. Administration of Windows NT and Lotus Notes accounts for the Ashland site. Troubleshoot server/network issues dealing with switches, routers and Hubs. Responsible for BU of all systems and
- storage/coordination for Ashland/Huntington sites.