We provide IT Staff Augmentation Services!

Systems Administrator Resume Profile

4.00/5 (Submit Your Rating)

VA

Objective

  • Acquire a position in the Information Security field
  • Summary of qualifications
  • Government Secret Security Clearance
  • Over 16 years of Information Technology experience
  • Provide excellent communication, customer service, and interpersonal skills to customers and IT colleagues
  • Projects a professional image at all times to the customer

Professional Experience

Confidential

Security Engineer

Update and develop Certification and Accreditation C A documentation. Conduct validation procedures by examining and evaluating evidence that Information System Security Controls are implemented in accordance with NIST and DHS standards. Use this information to support the updating of the following existing artifacts, to the extent needed: System Security Plans SSPs , Risk Assessments RAs , and Contingency Plans CPs . In addition, will apply this information towards developing and managing Plans of Action and Milestones POA Ms to remediate discovered vulnerabilities, and/or develop Waiver or Exception requests if deemed appropriate by the system Information System Security Officer ISSO . Conduct vulnerability assessments and security scans of systems to identify security vulnerabilities using Retina, AppDetective, and Nessus. Upload scan results into Vulnerability Management System. Track and respond to IAVM/ISVM notices. Conduct subsequent analysis of scan results to assign risk levels to systems. Review and analyze vulnerabilities that have been identified as being required for functionality. Create and maintain vulnerability status reporting using Microsoft Office. Perform internal audits to evaluate the security, integrity, contingency planning, and risk management of the Coast Guard Finance Center. Respond to incident response activities and report back to the organization. Communicate complex technical requirements to non-technical personnel. Brief senior security leaders based on audit findings. Promote awareness of security practices in the organization.

Confidential

Assurance Engineer

Conducted vulnerability assessments and security scans of both systems and networks to identify and mitigate security vulnerabilities using Gold Disk and Retina. Conducted subsequent analysis of scan results to assign risk levels to systems. Reviewed and analyzed vulnerabilities that have been identified as being required for functionality. Advised on necessity and security implications of leaving these vulnerabilities in place. Updated and developed Certification and Accreditation C A documentation and conducted validation procedures by examining and evaluating for evidence that Information System security Controls were implemented in accordance with NIST and DHS standards. Read and reviewed network diagrams and other security documentation to gain an understanding of underlying system and network security design issues. Compared these documents in analysis during vulnerability assessments. Produced information assurance related reports and documentation to aid in the generation of reports.

Confidential

Provided Information Assurance IA support to the Joint Coalition Warfighting JCW Information Assurance Manager IAM . Reviewed DIACAP accreditation packages for different military branches. Provided IA analyst services and maintained responsibility for the certification and accreditation of information systems and networks. Tracked, provided status, and created IA accreditation documentation for all JWFC event network requirements. Assisted in all tasks given to JWFC IA to include writing IA processes and documentation, assessing risk to JWFC networks, and providing input and recommendations to the JWFC IAM. Planned, coordinated, implemented network security measures. Read and understood network topologies, understood DOD Information Assurance requirements, and understood how military training exercises were conducted.

Confidential

System Administrator

Troubleshot operating systems, installed applications, and provided solutions to operational problems. Provided system administration to the 1st Fighter Wing of the US Air Force in support of the F-22 Integrated Maintenance Information System IMIS including administration of Trusted Solaris 8, Unix, Oracle 8i, Microsoft Windows 2003, Cisco PIX 515, network configuration, Oracle database backups, crash recovery, and account security. Conducted vulnerability assessments and security scans to identify and mitigate security vulnerabilities. Conducted subsequent analysis of scan results to assign risk levels to systems. Provided technical assistance to Air Force pilots, production supervisors, aircraft maintenance personnel, and senior leadership to maintain maximum system and aircraft availability and efficiency. Provided fully functional worldwide remotely deployable operations with minimal lead time and minimal interruption of required aircraft maintenance.

Confidential

Managed Third Country National TCN employees to provide maintenance support 24 hours a day 365 days a year. Trained personnel to perform duties as system maintainers and maintained status of their work progress. Used an Automated tracking system to manage the operations maintenance of the information system and network for the US Embassy and also updated the central WOW Windows for Workgroups database. Advised management, project officers, and contract personnel concerning software aspects of computer based training/electronic learning and prepared and/or reviewed programming specifications, information assurance specifications and program documentation of new developments pertaining to WOW unique ADP functions. Produced weekly reports on service desk statistics, projects, and accomplishments and maintained inventory and security of equipment and tools.

Confidential

IT Specialist

Lead information technology specialist responsible for determining methods and solutions for standard systems analysis and computer application problems. Responsible for designing and maintaining the STRAC Standards in Training Commission website. Primary editor for numerous Army training manuals. Translated and interpreted functional requirements and provided guidance to co-workers in solving programming problems. Prepared program specifications, developed coding logic flowcharts, and reviewed recommended solutions with users. Encoded, tested, debugged, and installed the operating programs and procedures in coordination with user requirements, and prepared related documentation. Kept abreast of current technologies. Evaluated products and made purchasing recommendations to management.

Confidential

Network Engineer

Provided technical advice, assistance, and problem resolution to staff. Performed operating system recovery resulting from a complete system failure. Troubleshot system level failures to determine their cause and developed a solution. Maintained and Administered backups. Applied quick fixes or patches, to restore operations and analyzed problems. Responsible for reviewing and selecting equipment and software, assisting in the installation and testing phases, and training support personnel in the operation of the system. Planned and delivered IT support services, which included installation, configuration, and troubleshooting. Assisted other system administrators in troubleshooting problems and implementing changes on the more complex systems. Provided customer assistance by diagnosing and resolving IT problems diagnosed and resolved problems in response to customer reported incidents researched, evaluated, and provided feedback on problematic trends and patterns. Identified, evaluated, and provided customer IT training/support services needs and developed training guides. Documented procedures and trained customers on implementation and use of approved solutions. Resolved assistance calls via the telephone and utilized remote administration software tools to assist customers remotely.

We'd love your feedback!