Profile | - 21 years' experience in Windows network environments, 5 years in Mac/Apple Networks, less than year LINUX administration
Technical Proficiencies: - Project management on a small to medium scale.
- Workstation and server planning implementation and support, as well as numerous peripherals.
- Infrastructure design and planning Small to Medium Enterprise
- Reviewing system vulnerabilities for all hosts on a network
- Symantec Risk Automation Suite used to scan the network and evaluate SCAP policy for FDCC / USGCB
- Rapid 7 Nexpose Vulnerability scanner
- Nessus Vulnerability Scanner
- Benchmark creation and review for security evaluation of systems
- Providing documentation for resolution of vulnerabilities where normal patching service doesn't resolve the vulnerabilities. Writing scripts to correct the vulnerabilities.
- Research and development for policy evaluation
- Group Policy Management and troubleshooting
- DHCP, DNS, SMTP, TCP/IP, WINS, Terminal Server, File sharing, DFS
- Network Documentation and Diagram / VISIO
- Windows scripting / PowerShell Beginner
- Developed Network assessments documentation
- Virtual Machines Various servers and vendors
- Analyzing Log files and troubleshooting
- Back-up and restore Symantec, Vemtu, Acronis
Hardware Proficiencies: - Network Security: VPN secured and unsecured, Port level authentication, RADIUS, MAC Address lockdown, network/IP-based surveillance, 802.1x security, VLANs.
- Barracuda Spam Filters / content filters
- Dell Secure works
- FireEye appliance
- Firewalls: Sonicwall, Watchguard, Cisco, Fortinet
- WIFI: Secured Wireless deployments and design, Cisco, HP
- Switches: Extreme, Cisco, HP ProCurve
Software Proficiencies: - Workstation Operating Systems: MS-DOS, Windows 3.1, Windows for Workgroups, Windows 95, Windows 98, Windows NT, Win2k, Win XP, Win Vista, Win 7.
- Server Operating Systems: Windows NT4.0, Windows 2000, Windows 2003, Windows 2003R2, Windows 2008, Windows 2008R2, Windows 2012
- Active Directory Domain Services, LDAP
- Group Policy modeling and implementation
- Exchange Servers: 5.5, 2003, 2007, 2010, and OWA
- SQL Servers: 2000, 2005, 2008, 2010 servers, DB installs and maintenance, Clustering
- SCCM 2007, 2010, 2012
- Blackberry server
- Web Servers: IIS4, 5, 6, and 7, ISA
- Symantec, Trend, McAfee Antivirus on enterprise level
- Integration of Mobile Devices
- Microsoft Office Suites: XP, 2000, 2003, 2007, 2010, Visio, Project
- Virtual Box Vm management and deployment, MS HyperV server, VMWare ESXI / virtual machine management
- Apple OS 7, 8, 9, X
- LINUX:
- HELIX 3 Forensics, Ubuntu desk top, Open SUSI, Backtrack 5, Kali, Remnux
Interpersonal Skills: - Strong management, communication, and technical
- Excellent Customer Service
- Strong understanding of health information technology and regulatory compliance HIPAA, HITECH
- Help desk Tier 4-5 Support via phone, remote, and hands on
- Worked on team to develop Standard Operating Procedures for continuous monitoring for Federal client.
Security: - Vulnerability management through the use of SCAP scanning tools and patching tools.
- Symantec Risk Automation Suite SCAP scanner on an enterprise level
- Policy evaluation applied FDCC/USGCB GPOs on an enterprise level
- Arch sight ESM- logging analysis
- VM VCenter Protect for patch management on an enterprise level
- Benchmark creation for the policy evaluation of different systems based on the NIST standards.
- Documentation for resolution of vulnerabilities where normal patching service doesn't resolve the vulnerabilities. Writing scripts to correct the vulnerabilities.
- NIST research on the vulnerabilities that are in the wild.
- Encryption Full disk, and file
- Securing Mobile devices
- Forensics Basic beginner
- Nessus Basic
- NMAP Basic
- BackTrack 5 Basic
- Kali Basic
- Remnux Basic
- Metasploit - Basic
|
Employment | Confidential Information Security Manager - Reviewing system vulnerabilities for all hosts on a network
- Develop the vulnerability risk management
- Develop standards for Vulnerability remediation
- Reporting to senior management on risk posture
- Develop the schedules for vulnerability scanning schedules
- Manage the scanning Nexpose
- Manage 3rd party assessments for NERC-CIP facilities
- Review of Control Networks and SCADA implementation
- Review of patching efforts on all systems
Confidential Security Specialist Senior - Reviewing system vulnerabilities for all hosts on a network
- Symantec Risk Automation Suite used to scan the network and evaluate SCAP policy for FDCC / USGCB
- Benchmark creation and review for Health and Human services
- Providing documentation for resolution of vulnerabilities where normal patching service doesn't resolve the vulnerabilities. Writing scripts to correct the vulnerabilities
- Implementation on patch management solutions for 3rd party vendors for 200 sites VM VCenter Protect
- Research and development for policy evaluation
- Workflows for patching systems for Information system security officers
- Review of Group Policy and troubleshooting of systems
- Interfaced with other teams to resolve network issues
- Worked on team to develop Standard Operating Procedures for continuous monitoring
- I used Symantec risk automation suite SRAS to review network vulnerabilities. I worked with the local IT staff to identify issues and resolve the vulnerabilities. I determined that many of the systems had not been patched in years. I worked with the local IT staff and the enterprise solutions team to deploy the VM Vcenter Protect to several locations with the highest vulnerability count. I deployed 22 consoles and 30 distribution servers. I also worked with ISSOs to get SCCM set up and deployed. We were able to reduce the vulnerabilities to a manageable number. I have edited the XMLs that are used to validate the policies that are pushed through GPOs. This is to verify that the GPOs are applied correctly to the systems on the network. This is then reported up to the department for compliance.
- I have been involved with Dept. Homeland security and Health and Human Services for the continuous risk analysis of the network.
- Resource Patient Management System RPMS I was then assigned to work with RPMS ISSO to work on the new implementations of software and meaningful use stage 2 deployments and requirements. This includes the
- I researched and created documentation for the department on XCCDF, and provided all of the tools available for editing the benchmarks.
- I use the Vsphere 5 to manage the SRAS, and the testing systems I created to run scans against. I was involved in training classes for ESX and vsphere 5.
Confidential System Engineer/Technical Lead/Division Manager - Managed client's full infrastructure, connectivity, servers, workstations, laptops, and software.
- Interfaced with the client's software vendors to perform updates and deployments. Provided application support for the client. Installed and set up connections working with Tricore, XRANM, Presbyterian, Lovelace, and other LABS to get results and information into the databases. Worked with both the software vendor and the external LABs to get the systems tied together.
- Developed security standards and documentation
- Documented the full infrastructure of the client's network
- Developed the relationships with the client and worked to meet the needs of the client and the staff
- Developed replacement plans and created budgets
- Network and infrastructure designs for corporate and client systems
- Created training documentation for the clients
- Secured Wireless Deployments
- Network Security Assessments Of physical access and network access to servers
- MS partner Certified in Volume Licensing small to mid
- Cloud office 365 deployment
- Managed 4 engineers
- As a system engineer, I had 5 client locations that I was responsible for maintaining their desktops, servers, and infrastructure. The largest was 350 employees. A medical office with 35 doctors, and 2 locations. I managed 4 servers plus practice management system. We used VMware, DFS, BU Exec, Sophos AV, and Linux proxy servers. Created documentation of the full network and infrastructure with Visio and how to's for software installs. Migrated their new servers to Windows 2008
- At the Oncology facility, they had 8 servers. Managed SQL 2005 cluster, Citrix 4, AD, DFS, back-ups and disaster recovery. I deployed Wyse thin clients for the exam rooms to utilize the citrix environment. Managed a replication server at a colocation. Developed the documentation for the network, with Visio diagrams and How To's. Worked with the CFO to set criteria for the EMR projects and migration. Worked with the Ops mgr., to come up with the integration of the paper records in to the EMR system.
- At the call center they had 4 servers and 50 work stations. Managed their back-ups and replications of their medical billing server. Worked with the Ops manager to meet the HIPAA compliance. Documented the network and infrastructure with Visio and how to's. Migrated their systems to windows 2008, and exchange 2007. Deployed SharePoint 2007 and trained staff to manage the portal.
- For the government contractor, I managed their 4 servers. I migrated them to Win 2008 servers and upgraded the exchange from 2003 to 2010. Worked with MS to restore exchange 2010 after RAID failure.
- Team Lead I was lent to a bank to manage their IT staff and implement their switches to do 802.1x authentication. I created 200 page training manual for the staff and CIO. This contained instructions on how to implement RADIUS, BU Radius and restore, to use the CLI to program the switches and BU the configurations. How to program the MAC authentication, the Win XP and user authentication for the switch to turn the port on. Set up their WiFi network and VPN. Worked with providers to get their internet and DNS set up correctly. Read wiring diagrams and floor plans. Punched down wire and cleaned up wiring closets.
- I also was responsible for working with the other engineers in troubleshooting their client issues. We had a total of 30 clients. I would access systems and preform the patch management. Created scripts for BU, and verifying BU ran. Programmed firewalls and wireless lan controllers. Deployed at a manufacturing facility over 20 Access points managed with Cisco WLC. Implemented 4 Aps at the POD facility with the Cisco WLC. Deployed WiFi at sorority for UNM.
- Div. Mgr I managed 4 engineers. Passed the MS volume licenses tests for marketing. Implemented a Monitoring system Paessler, to monitor our clients. Began a work for creating a NOC. Reviewed and responded on RFPs. Worked with the CIO and VP to win proposals for Socorro electric, and AFRL. I managed specific projects for purchasing, documenting, installing, and implementing systems. Created as a managed service option network assessments and security reviews.
Confidential Health Connect Deployment Team Lead - Responsible for deployment of Health Connect and its Epic interfaces at 5 medical offices.
- Maintained communication with department administrators and business partners to determine hardware to be used in the deployment of Health Connect.
- Provided inventory management for systems deployed.
- Provided service request assignments in Remedy to direct teams to build, test and deploy the software in a timely manner.
- Developed strong relationships with team members, department administrators, and business partners.
- Verified that the builds were complete through running validation scripts and routines.
|