Full Stack Administrator\ Architect \ Sr. Network Engineer Resume
3.00/5 (Submit Your Rating)
TECHNICAL SKILLS
- HP Master Tech Server & Desktop (2013)
- Ruckus WIFI Systems Certified Partner
- Microsoft Certified Systems Engineer + Internet (MCSE Expired 2000)
- Dell Certified Field Supervisor/ Lead Field Tech
- Xyplex Master Bridge/Router Certified (Vender equivalent to Cisco Certified Network Professional CCNP)
- Cabletron Bridge/ Router Certified
- FCC Amateur radio Extra Class licenses
SUMMARY
- 20 year + experience running Field Certification, Qualification and Troubleshooting Equipment
- SolarWindws \ WhatsUP Pro\ PTRG and other NMS Solutions
- WireShark \ Syslog \ SNORT
- Fluke Networks Versiv DTX - 5000, with Cable Analyzer, CertfiberPro and OptiFiber OTDT
- Fluke Networks DTX-1800, LinkRunner and Cable IQ
- Fluke Networks One Touch AT Network Assistant
- Fluke Networks EtherScope
- Fluke Networks AirMagnet Survey, WIFI Analyzer and Spectrum XT
- Ekahau WIFI Planner, Survey and Spectrum
- JDSU HST- 3000 with Copper, VDSL2, T1 and T3/DS3 Service Heads
PROFESSIONAL EXPERIENCE
Confidential
Full Stack Administrator\ Architect \ Sr. Network Engineer
Responsibilities:
- In this role, I was contracted to identify and document all the networks and production solutions for a small manufacturer, this included, but not limited to the route\switched LAN\WAN\Campus Networks networks, WI-FI solution, Storage Networks (SAN, NAS, DAS), Cisco VOIP solution, and SCADA\PLC Networks for Four Campuses. This work led to a scope change and extension of the original contact. As part of the scope change, I assumed the day-to-day operations and lifecycle of all infrastructure across four campuses (three in US and one in Latin America, plus a new Latin America Campus under construction). I was also tasked with the following major projects as the Lead and or Architect:
- LAN\WAN \Perimeter Network Lifecycle (SonicWALL): As part of this project, I was tasked with documenting the Dell\SonicWALL devices and to layout the lifecycle road map for the solution. As part of the initial findings, advisements were issued to upgrade most of the SonicWALL devices, Install SonicWALL GMS for management, construct HA pairs for critical control points, and then add additional Firewall zones to segment the solution further. Additionally, advisements were issued to change the MPLS Architecture and implement BGP routing. As part of the scope, a full LAN hardware audit was conducted, EOF\EOS Equipment identified, and IOS Audit\ Management program constructed.
- NMS upgrade (Solar Winds): This project was to look at the current WhatsUP Pro\PTRG NMS deployment and determine if it was meeting the needs of the IT staff and company policy. This resulted in the green fielding of a new Solar Windows deployment for all Infrastructure. I was responsible for all phases of the new NMS solution, the pilot program, green fielding the new server in parallel with the old NMS, the cutover to the new Solar Winds, and finally deprecating the old WhatsUP Pro solution.
- EMC SAN Architecture review: As part of my initial documentation, I noted several SAN, DAS, and NAS storage solutions. This project was formed because of that documentation with the goal of identifying a new Architecture for a single SAN solution (Road Map) and Vendor, while using as much of the current solution as possible.
Confidential
Firewall /Cyber Security Engineer with Global Networking Services
Responsibilities:
- In this role, I was hired to be a dedicated resource for the Nissan Americas Motor group account. In this role, I was one member of a four member team that was responsible for effecting change on Cisco ASA Firewalls, Cisco ACS load balancers, F5 Networks security appliances, and Palo Alto Firewalls within the Nissan solution Globally. Daily as the senior member of the team, I was the primary intake person for new engineering requests, performed the initial reviews, checked for any security policy or architectural issues. I led the morning architectural stand up meeting where all engineering requests (firewall/load balancing) were prescreened and peer reviewed and then assigned the requests to the appropriate HPe engineering resource. After assigning the engineering resource to the requests, I monitored the requests through the change management and fulfillment processes. I often represent HPe Network/Security at the Nissan IRD (Infrastructure Requirements Document) review meetings. I assisted the Project Management office as the technical resource on new programs. In that function, I was responsible for performing the final Architectural review, constructing the engineering request needed to complete the approved design and track those requests through the fulfillment process. At any stage of the program, if new requirements were identified, I assisted with documenting the new requirement/modification and verified that it met Policy and Architectural guidelines.
Confidential
Data Center Engineer / Network Specialist Administrator
Responsibilities:
- In this role, I was part of a small team formed to investigate and propose a solution to quickly move two large medical database applications from the current enclave to a new green-fielded solution located at the Fort Knox Datacenter. As part of the requirement the team was tasked with remediating any known security issue and identifying any previously unknown or updated security requirement, such as HIPPA and High Tech, as those requirements may not have been present at the time the application was commissioned. I was specifically tasked with reviewing the network and datacenter requirements for the current solution (based on the document available), to guiding the team in constructing a general order of magnitude of compute power for the Greenfield solution. I acted as the liaison between Enterprise Architecture team, Information Assurance / Access control teams, and the SAIC proposal team, to ensure that the team had a clear understanding of the Datacenters common operating environment, access control, policy and procedures.
Confidential
Sr. Technology Engineer
Responsibilities:
- In this role, I acted as the primary escalation point for the company’s managed services practice level one and two helpdesk functions supporting desktop clients, LAN/WAN, VPN solutions, servers, VoIP/telephony products, client security software, backup solutions, and wireless access. As part of this role, I developed policy and procedures used by the help desk in day-to-day transactions, incident response, and engineered corrective controls used by the staff to mitigate issues with the current state of managed system/site. I acted as the primary Engineer for new site implementation of firewalls, wireless systems, networks, and the onboarding of new customers onto the managed services platform. I reviewed new site system designs, new client system profiles, and provided risk management input to senior management. I was responsible for monitoring the automated backup and automated administration/patching tools. I provided reporting on the current state of the managed client base to senior management. I also acted as the primary engineer/administrator for the networks, firewalls, and wireless systems /controllers under managed services agreements.
Confidential
Owner, Field Engineer, Technical Project manager
Responsibilities:
- For over 12 years I owned and operated a small infrastructure company (Network Medic) that specialized in Government/DOD project work, and a large retail/hospitality point of sale, telephony service business. Some of my more notable projects are listed below. In general, my company provided service to over 75 clients including Black Box Networks, Windstream Communications, Xeta Technologies, Lockheed Martin, Northrop Grumman, and SCS.
- My primary role in the company was the main technical resource/project manager. On larger projects, I would act as a technical project manager leading my own team or a contracted team of resources from the kick off call through the completion of the project. Most of these projects were large network uplifts (route/switch), new VoIP implantation/cutover projects consisting of a small office through large multi site campuses, and decommission of large multi tenant PBX solutions. I was awarded several cabling infrastructure, wireless design, and wireless survey contracts. As part of all these activates, I was responsible for, and had to ensure that, all Information assurance policy and controls were followed, risk assessment performed when required, and documentation completed.
- The other part of my business was services telephony, network, and point of sale solution at retail, restaurant, and hospitality locations. In this role, I acted as the SME on network, telephone, and point of sale systems. A vast majority of the work was performing pilot projects, assisting larger operators in identifying flaws in the install process documents, identifying PCI compliance issues, general optimization of the workflow, and other risk factors. As part of this practice, I performed several PCI audits, upgrades, and serviced credit card terminals. I also performed several back-office systems / management PC uplift projects in which strict PCI/PII controls had to be followed.
Confidential
Sr. Technologist/Engineer for the enterprise network.
Responsibilities:
- I was responsible for the management and maintenance networking services group, the technical operations of the corporate call center, and acted as the lead on other computing projects. I managed a staff of five software/systems engineers + technical support staff provided, support for 70 Nodes, and 10 Servers running multiple operating systems across eight sites, plus six remote/ branch offices. I was the architect of Confidential ’s Windows 2000 active director deployment and migration effort as well as other major system deployments and corporate computing projects. I was the SME that supported the Production long distance Class 5 and Class 2 telephone switches, provisioning, and billing systems, the corporate call center, and networked telephony systems. I crafted the operations standards for the corporate office and corporate technology use policy.
Confidential
Sr. Networking Engineer/ Systems Integrations Specialist/ Installation and Deployment Engineer
Responsibilities:
- Supported Telcordia Technologies in the Installation and Deployment of their Next Generation Network Product Line . Perform installation of Telcordia Service Manager Voice over packet/cell Solution (Sprint ION class 5 switch), Announcement Servers and Accounting Gateway. Assisted in the installation of Telcordia IGCS Voice over packet/cell solution. Planned and managed system/hardware integration for Service Manager Trials. Worked with 3rd party venders to produce trial system configuration (i.e., Cisco, Nortel), Performed LAB testing of installation procedures for Service Manager Software, performing LAB testing on installed systems, and performed call testing for clients such as Bellsouth, AT&T, US West and other Independent Phone Service Providers.