It Technician Resume
3.00/5 (Submit Your Rating)
Falls Church, VA
SUMMARY:
- Extremely enthusiastic and motivated to work a Helpdesk Specialist Journeyman: presently worked in IT for 28 years cultivating a professional career in the IT field.
- Exceptional customer service and interpersonal skills, critical thinker with the ability to work in any diverse environment.
- Demonstrate perseverance to embrace and adapt to technological changes .
- Able to work in a fast - paced environment independently or as a team member to obtain qualitative results.
- To support my fascination and interest in cybersecurity and information technology; obtained a bachelor’s degree in cybersecurity to enhance the skills in IT cyber support.
- My objective is to participate in an IT career by providing an opportunity to continue learning and contributing to applications, hardware, and networking support.
- With my cybersecurity posture and expertise in the IT field: I offer resilience to mitigate potential attacks and analyze and prevent vulnerability and risk.
- The Previous experience working as an IT Technician has prepared natural progression to a profession as a Helpdesk Specialist Journeyman .
- Responsibilities include the patch management and operations of servers, desktops, and laptops in an enterprise setting, troubleshooting, repairing, and management of the hardware, applications, updates of Operating System (OS) and firmware in a Microsoft environment.
- Create and enforce administrative controls in Active Directory (AD) thru group policies, procedures, and applied guideline. As a remote site manager, I provide logical and physical measures such as threshold account lockouts, device locks, system alarms, and other similar methods.
- Interact with clients, making suggestions and recommendations to avoid malware for email. Identified systems threats, weaknesses, and vulnerability and address them as needed; removing viruses, worms, trojans, logic bombs, adware, and spyware to eliminate replication.
- Register employee’s Personal Identity Verification (PIV) cards with Public Key Infrastructure (PKI) to grant access to the Domain.
- Utilized Certification Authority (CA) Privilege Access Manage (PAM) for management of user profiles and asset configuration intended to correspond with system enterprise cybersecurity policies.
- I have installed numerous versions of Windows OS NT/ Vista / 7 / XP, 8.1 and 10. The experience of installations built a solid comprehension of the Windows environment. The Windows products including Outlook, Office, Project, Word, PowerPoint Excel, and Access, and knowledgeable in a Microsoft Networking environment with TCP/IP.
- Process skills in ISDN, PRI and BRI connections and terminal adapter’s hardware connections for CSU-DSU. Experience in several of the following areas of telecommunication: internet, intranet, DMZ networking, and wireless technology practices. Experience in TCP/IP routing protocol solutions for LAN, WAN, WLAN, DHCP, DNS.
- Port scanning within Well-Known, Registered, and Dynamic ports such as, (FTP) 20-21, (Telnet) 23, (SSH) 22, Simple Mail Transfer Protocol (SMTP)25, Post Office Protocol (POP3)110, Simple Network Management Protocol (SNMP)161-162, Internet Message Access Protocol (IMAP)143, (Syslog) 514 Lightweight Directory Access Protocol (LDAP)-389-SecureLDAP-636, and more.
- Knowledgeable in Wireshark, NMAP, Linux Kila Penetration and Vulnerability tools, Protocol Analyzers and Packet and Port scanners.
- Experience with working with Footprint, Remedy, and ServiceNow helpdesk ticketing and assets tracking applications.
- Federal Information Security Management Act (FISMA) mandatory compliance to protect the Confidentiality, Integrity, and Accessibility (CIA) of Government and Private Sector data and assets. As a cybersecurity engineer foremost responsible for ensuring the organization and external groups affecting the enterprise systems is current with regulations, standards, and best practices.
- National Institute of Standards and Technology (NIST-800-53) establishes standards and guidelines for providing security controls and safeguards for information systems. Packet-Filtering, Circuit-Level Gateway, Application-Level, and Stateful Multilayer Inspection Firewalls working in conjunction with Routers and Network Intrusion Detection Systems (NIDS) help to mitigate external and internal adversaries.
PROGRAMMING / OPERATING SYSTEMS:
- JavaScript
- (C++)
- Visual Basic Script (VBS), Windows Script, Windows Management Instrumentation (WMI)
- Microsoft Operating System
- Microsoft Office Suite
- (IBM) International Business Machine
- (UNIX) Operating System
WORK HISTORY:
IT Technician
Confidential, Falls Church, VA
Responsibilities:
- Experience with various security methodologies and processes of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols.
- Skills in IPCONFIG commands, such as /All, /RELEASE, /RENEW, /FLUSHDNS, and /REGISTERDNS, and Windows commands NETSTSAT -A
- Process a good understanding of the Open Systems Interconnection (OSI) model and how the TCP model applies to specific layers.
- Skills in Active Directory to implement administrative controls with group policies, VBS programming, and other rules. And creating profiles and assigning folder access, account lockout threshold and providing logical and physical measures include devices such as cable locks, system alarm, and similar strategies. Evaluate and remove all weaknesses, vulnerabilities, and threats to the Enterprise network from internal and external sources.
- Interacted with clients, making suggestions and recommendations to avoid malware with the use of email. Identified systems threats and address them as needed, removing viruses, worms, Trojans, logic bombs, adware, and spyware to eradicate replication to the LAN.
- Registered new staff Personal Identity Verification (PIV) cards with Public Key Infrastructure (PKI) to grant access to Confidential ’s Domain.
- Utilized Certification Authority (CA) Privilege Access Manage (PAM) for management of user profiles and asset configuration intended to correspond with system enterprise cybersecurity policies.
- Experienced working with Footprint, Remedy, and ServiceNow helpdesk ticketing and asset tracking applications.
IT & Telecommunication Specialist
Confidential, Washington, DC
Responsibilities:
- Managed an IBM System 36,38, and AS/400 in network environment experienced with the System Application Architecture (SAA), Command language (CL), Data File Utility (DFU), Source Entry Utility (SEU), Screen Design Aid (SDA) with Data Description Specifications (DDS)
- Manage Active Directory Domain, Organization Units, Group Policy, User Groups, Profiles, and Permissions.
- Designed installed and Managed a LAN, WAN, Intranet with access to the public Internet.
- Calculated plans for IT disaster with Business Impact Analysis (BIA), Business Continuity (BCP), and Disaster Recovery Plan (DRP).
- Troubleshooting systems failures and identify bottlenecks to ensure the efficiency of the network.
- Test and configure software, maintain and repair hardware and peripheral also an inventory of assets schedule upgrades.
- Deploy Switches, Routers, Hubs, Servers, Cables, Racks, Firewalls, and Wireless Access Point.
- Install Internet security software and ensure it's updated and running correctly.
- Maintain databases, conduct routine maintenance as needed to ensure data Confidentiality Integrity, and Accessibility.
- Make, and examination documentation for database changes or refinements
- Discuss changes or requirements in the databases with section chiefs and Managers.
IT Operations Specialist
Confidential
Responsibilities:
- Wireshark, Nmap, and Linux Kila Penetration and Vulnerability tools.
- Network standards designs for peripherals and software on wired, wireless, and internet connects.
- Administrative tools using diagnostic and repair techniques to troubleshoot and solve technical problems. Ability to respond with Blue Screen of Death (BSOD) and use utility function such as SFC, BOOTREC, MSCONFIG, REGSVR32, REGEDIT, MSINFO32, NETSH
- Monitor servers with running TCP/IP protocol thru network traffic switches, routers with command line tools such as PING, IPCONFIG, NETSTAT, TRACERT, NSLOOKUP, and ROUTE.
- Created, scheduled, and run routine backups such as the incremental, differential, full also created restore points.
- Install software patches and upgrades to targeted hardware, software, firmware, and security issues or minor software enhancements and compatibility.
- Disk partitioning using the correct file system, third-party disk drivers.
- Implemented security for breach, and antivirus and malware assaults.
- Security fundamentals with data, wired and wireless networks, access control, and principles of data destruction and disposal techniques, configuring, and troubleshooting security features.
- Created and changed new or existing user profiles such as an administrator, users, and guest accounts with User Account Control (UAC). Experience with Active Directory (AD) file permission inheritances and propagation issues.
- Process a good understanding Public Key Infrastructure (PKI) Certificates, roles, policies, and procedures regarding the electronic transfer of information.
- Process an essential understanding of computer hardware and able to troubleshoot and repair computer problems.
- Excellent working skills in helpdesk ticketing systems worked with Footprints, Remedy, and ServiceNow to track incidents and assets.
