We provide IT Staff Augmentation Services!

It-specialist Resume

3.00/5 (Submit Your Rating)

SUMMARY:

A proactive and well - trained individual with 11+ years of computer security experience seeks a Cyber Security Specialist position that promotes learning and growth and needs a highly motivated and skilled employee.

TECHNICAL SKILLS:

Software: Remedy Tracking System, VMware, vmworkstation, vmplayer, SharePoint, Solar Winds Netware monitoring, Microsoft Office, Microsoft Project, TCP/IP Networks Configuration, Active Directory, FTP, Retina Scan, Confidential, Wireless 802.11 a/b/g/n/ac SCCM

Operating Systems: Windows /XP/Vista/Windows 7, 8.1 /, Server2008R2, Net Screen OS Juniper

Hardware : PCs, Laptops, wireless network cards, Cat 5 cable, Fiber, Floppy Drives and hard drives, Hubs, Wired and Wireless Routers, Bridges, Switches, and (SANs) Storage Area, Firewalls, Networks Cisco Routers and Switches, Dell Powedge servers, Dell racks, Dell desktop PCs, Dell Power vault Storage, KVM switches and Sun Solaris Microsystems.

PROFESSIONAL EXPERIENCE:

Confidential

IT-Specialist

Responsibilities:

  • Serving as a project team lead providing oversight of teams requiring coordination and integration of a number of complex programs, and making recommendations and taking action having a direct effect on the managed programs.
  • Plan, design, develop, and integrate network systems end to end consistent with existing or planned network infrastructures.
  • Monitors systems operation to ensure that procedures and guidelines for operating these systems are followed and determines possible revisions of procedures to eliminate and prevent any possible system disruption.
  • Evaluates, acquires, configures, and uses software intended to ensure that automated systems are secure from unauthorized use, viral infection, and other problems that would compromise sensitive information in terms of confidentiality, integrity, and availability, or would compromise other aspects of overall system security
  • Conduct engineering vulnerability assessment of systems utilizing Confidential approved IA tools (ACAS) and DISA STIGs
  • Serve as a network administrator on a large local system, including responsibility for: configuring hubs, switches, and routers; monitoring network performance and performing network diagnostics.
  • Project management - serves as team leader or team member on projects and programs of varying scope and complexity. Manages the lifecycle of an information technology project from concept development through implementation. Identifies customer requirements, develops technical approaches, and coordinates project resources related to project costs and schedules.
  • Manages/directs large-scale programs in scope with technical authority over a wide range of systems and applications. Perform studies and analysis of business processes to determine IT requirements.
  • Experience with reviewing government guidance, including task orders, directives, STIGS, or IAVAs for applicability and implementation.
  • Perform weekly vulnerability audits, submit Plans of Action and Milestone (POA&M)
  • Maintain vulnerability management compliance with operational directives
  • Utilizing computer hardware, networking, and operating systems to communicate with end-users, management, and external authorities. Following documented processes and procedures, identifying gaps, updating documentation of all types, and creating clear and concise deliverables as needed.
  • Conduct malicious file scanning and report findings for identification of potentially compromised systems.
  • Plan, install, configure, test, implement and manage the backup and restore environment in support of the agency’s IT architecture and business needs. Plan and coordinate the installation, testing, operation, troubleshooting, monitoring, performance-tuning and maintenance of storage backup hardware and software systems.
  • Support the Host Based team in weekly analysis of systems to identify vulnerabilities, anomalous host behavior, compromised network hardware and advanced malware.Develops and executes Configuration Management and Requirements Engineering plans, processes, and procedures.
  • Provides expert technical guidance, interpretation, and implementation oversight of applicable information security policies, processes, and practices to ensure continued operational availability and integrity of enterprise applications, systems, networks, and data.
  • Performs configuration and management of network equipment including Cisco routers; switches; VPNs, TCP/IP, WAN/MAN/LAN technologies; network tools; and monitoring tools such as SolarWinds.
  • •Supports network upgrade projects or initiatives, through the lifecycle, including design, test and deployment.Serves as a resident technical authority for assigned applications and systems providing support to a Confidential (DISA) organization in the planning, design, development, testing, configuration, implementation, integration and maintenance of networked systems used for the transmission of information in voice, data, and/or video formats.

Confidential

Systems Network Engineer

Responsibilities:

  • Coordinating and providing technical support of deployed applications.
  • Set up VMware server to take on other servers functions and reduce cost of buying new servers.
  • Utilized VMworkstation to use applications to test without taken risk of destroying a physical workstation.
  • Performed training using VMplayer to 1st Information Operation students.
  • Used vmservers snapshot function for backup’s recovery and transferring to new hardware.
  • Operating and maintaining Microsoft Windows Servers, Microsoft Active Directory, Microsoft Windows Server Update Services (WSUS), in a secure manner in accordance with current Confidential or DON Cyber Security.
  • Periodically assess processes for improvement opportunities and provides feedback to the Process Engineering group as appropriate.
  • Responsible for planning the installation of hardware, operating systems and applications; managing accounts and access to systems; implementing IA procedures; developing SA SOPs; resolving hardware/software interface and interoperability problems; ensuring systems availability, functionality, integrity, and efficiency; maintaining systems configuration; and managing the installation and integration of system fixes, updates, and enhancements.
  • Develops and maintains configurations for workstations, peripherals, and cabling.
  • Provides hardware, software, and/or network problem identification and resolution.
  • Sets up user domain accounts and email accounts using Active Directory and Account Profile Manager.
  • Configures TCP/IP addresses
  • Develops and implements local operating procedures to improve the overall functionality and reliability of hardware and software.
  • Applies automation and communications methods and techniques, making recommendations relative to the validity of new requirements and the optimal approach for implementation.
  • Assists with firewall maintenance, system backups, and data transfer.
  • Trouble shooting the network and systems and effectively communicate problems to other IT Operation team members.

Confidential

Senior Systems Network administrator

Responsibilities:

  • Assist with voice and data communications support for an exercise facility involving a variety of Local Area Networks (LANs), the Wide Area Network (WAN) connection and the internal telecommunications systems.
  • Coordinating the installation, testing, operations, troubleshooting, and maintenance of large-scale hardware and software systems.
  • Perform and coordinate cable changes with systems administrators.
  • Used vmserver to perform backups of dell poweredge physical servers.
  • Install and terminate data cabling using shielded and unshielded twisted pair as well as fiber optic cable terminating in patch panels and assists with the installation of new network cabling within the building.
  • Research and purchase of network supplies and equipment.
  • Maintain a base line inventory of tools, cable and supplies for installations and repairs.
  • Performed monthly update documentation and mechanical drawings for the Network layout.
  • Configured TCP/IP address
  • Used FTP File Transfer Protocol for sending and receiving data.
  • Exercised Confidential on daily basis while sending and receiving messages.
  • Implemented new system hardware and software and develops local operating procedures.
  • Applied automation and communications methods and techniques, making recommendations relative to the validity of new requirements and the optimal approach for implementation. Interchange computer internal parts such CD Rom and hard drives etc.
  • Daily duties included setting up pc domain accounts and Email accounts using APM (Account Profile Manager) and Active Directory.
  • Tested cable fiber.
  • Telnet to servers to turn on and off ports.
  • Assisted with installation of terminals and associated hardware.
  • Provided system support, to include: Microsoft Windows administration, network administration & support (Ethernet, ATM), and network protocols (TCP/IP).
  • Developed and maintained configurations for workstations, peripherals, and cabling (Fiber and CAT V).
  • Provided client assistance support for the installation and set-up of computers.
  • Provided support in hardware, software, and/or network problem identification and resolution.
  • Established and maintained user accounts, maintain hardware, hardware/software installation, printer support, basic computer/network/printer troubleshooting.
  • Assisted with firewall maintenance, system backups and data transfer.

Confidential

Senior Help Desk Analyst

Responsibilities:

  • Responsible for data management by loading, validating, identifying and resolving discrepancies to maintain.
  • Serves as a senior systems administrator and performs a broad range of system analysis and security management functions in support of Government systems, services and facilities.
  • Monitors system usage and the performance of production processors, modifying hardware and executive software configurations, maintaining information related system configurations, and ensuring the correct and efficient operation of systems.
  • Plans and implements changes to the physical configuration of hardware and software in major systems by changing operating system software parameters, modifying the configuration of system storage, adding peripherals, changing system resource allocation, modifying the physical configuration of the device, updating software releases, loading new software, etc.
  • Develops and implements system security management procedures. Responsible for issues related to processing hardware, executive software, system management tools, and application software.
  • Performed daily UNIX backups using SUN Solaris systems
  • Performed System Administrators duties such reset accounts and configuring accounts, shell scripting on UNIX Sun Solaris and Linux Operating Systems.
  • Managed night shift crew production for satellite imagery, produced and shipped.
  • Maintained commercial satellite to the (TDOC) Time Dominant Operations Center and (STIL) St. Louise Information Library.
  • Maintained Confidential accounts from unclassified to Top Secret and technical support.
  • Performed one-way transfers of satellite imagery.
  • Coordinated system outages.
  • Executed networks checks from ping accounts and system checks daily.

Confidential

Security Specialist Supervisor

Responsibilities:

  • Desk Top/Unix help desk administrator help desk for 100 + personnel
  • Provided SCIF access control
  • Ensured that proper personnel have correct credentials.
  • Escort personnel.
  • Provided document control and management.
  • Conduct threat/vulnerability assessments to show what may be potential weak point within security.
  • Received and transmitted classified mail.
  • Maintained document control inventories.
  • Assisted with security issues, security awareness training and education.
  • Provided training on operational security for physical security.

Confidential

Military /Combat Controller

Responsibilities:

  • Performed base entry and exit controller to ensure safety of installation.
  • Executed daily mobile traffic stop to motorist not following base guidelines.
  • Guarded multi-billion dollar aircraft and equipment.
  • Escorted and Guarded high profiled personnel such as Four Star General Tommy Franks, and Colin Powel.
  • Provided security for military installations overseas in the Middle East.
  • Involved in mission such as Enduring Freedom and Southern Watch.
  • Occasionally perform duties as Air Force Honor Guard for special events.
  • Assisted Emergency Response Team during flight line emergency assisted and cordon area.
  • Wrote reports of mishaps and major incidents.
  • First responder for military chemical, biological, radiation training.
  • Communicated frequently with radio to law enforcement desk during all situations that occurred.
  • Secured and executed riot control duties to McDill Air Force base during riots and protest.
  • Security Response Team to Central Command (CENTCOM) at McDill Air Force Base, Tampa.

Confidential

Systems Support Technician

Responsibilities:

  • Setup computers and network printers
  • Assisted the helpdesk staff resolve automation issues.
  • Put computers on office domain using Confidential table.
  • Setup PC domain accounts and Email accounts.
  • Maintained an effective filing system, and performed daily office functions like data entry, email, and fax.

We'd love your feedback!