Systems Administrator Resume Profile
4.00/5 (Submit Your Rating)
Professional Profile
Experienced System administrator equipped with the hands on experience, knowledge and education to exceed expectations, meet requirements and lead progress.
Grantham
Technical Skills
| eEye Retina security scanner
| CAC/PKI Anti-Virus Tools McAfee, Symantec, Ghost, Microsoft Exchange 2003 DISA Gold disk |
Employment History and Experience Summary
Confidential
SYSTEM ADMINISTRATOR
- Confidential responsible for solving complex problems, identify innovative solutions, anticipate end user needs and identify solutions in a heterogeneous virtual environment.
- Managed the day to day trouble shooting in a command control rapid prototyping environment, consisting of 300 Windows and Linux virtual database, web and application servers hosted on a storage area network SAN .
- Conducts systems security evaluations, audits, and reports of Windows and Linux virtual servers based on DoD Security Technical Implementation Guides STIGs , scripts and Retina security scans. Maintained firewall port exception requests, renewals and provided access justification for developer teams.
- Managed the Active Directory structure, configured group police objects and Maintain strict change control of system infrastructure.
- Planed and schedules the installation of hardware, operating systems, and software applications. Coordinates and reviews the testing of vendor-provided software. Continues review of hardware and software, ensuring responsiveness to user needs.
- Daily system checks to verify data calibration between applications are consistent, verified and trouble shoot data streams between interconnected departments and verified accuracy.
Confidential
Information Technology Specialist
- Served as the Lead Information Technology Specialist, developed strategies to meet Confidential computer security compliance requirements, responsible for operational and strategic decisions based on varied inter-departmental sources.
- Managed task and resource schedules, documenting, tracking, and resolving issues documenting project status and communicating project status to management.
- Group policy and active directory management .configuration of RAID backups, license server management, antivirus distribution server and file servers management. Administration of Linux servers and desktop installation and network configuration.
- Responsible for analyzing current network vulnerability posture, remediation of operating systems and third party software vulnerabilities. Provide technical and DoN Police guidance support for best practice approaches to personal. Provide future remediation strategy and states reports to management.
- Responsible for departmental I.T. acquisitions, Government compliance verification of approval for hardware and software acquisition. Forecast I.T. hardware and software demand.
Confidential
WALTER REED ARMY MEDICAL CENTER
- Assessed security events with the use of security analyst tools, to determine the network vulnerability state. Developed and executed corrective action plans and made recommendations to management for corrective long-term preventive solutions to avoid recurrence.
- Managed reports of security breaches, violations of rules, regulations according to the HIPAA act, policies, procedures, and codes associated with security response. Ensured network free of vulnerabilities.
- Security response analyst under the direction of the Department Of Information Management. conduct risk and vulnerability assessments for Information Systems to identify potential threats to Network. Ensured compliance with established Information Assurance Vulnerability Management IAVM Programs.
- Active directory management Installation and configuration of software and hardware tools to monitored the network. Assist in the implementation and management of clinical information systems
- Ensured high level of customer support services for end users in a medical facilities, to including installation, configuration, troubleshooting, and customer assistance. Utilized database to track work orders, facilitated closing in timely manner and assessed current vulnerability levels, developed remediation strategy, and distribute daily work load to junior personnel.