We provide IT Staff Augmentation Services!

Dpscs Security Compliance Officer Resume

5.00/5 (Submit Your Rating)

SUMMARY

  • Professional with progressive professional and technical experience including design, engineering, implementation and troubleshooting in high availability, mission critical environment with proficiency in Confidential, switching, datacenter technologies and multicoud networks.

TECHNICAL SKILLS DETAIL

Confidential /Switching Technologies: Cisco Routers ASRs/ISRs, Cisco Catalyst/Nexus Switches (9k/7k/5k/), Juniper, Citrix, H3C and HP Routers and Switches, BGP, OSPF, RIP, STP, Multicast Confidential, FR, IGMP, EIGRP, SD - WAN, DMVPN, WAN, LAN, TCP/IP, VTP, SNMP, SMTP, ARP, TCP, UDP, VLAN, VXLANs, EtherChannel, Portfast, VSS, VPC, DNS, DHCP, BPDU, IPv6, PHP, Bash Scripting, Perl, Python.

Security Technologies: Cisco ISE, Cisco ASA 5500 series firewalls, Cisco Security Manager Suite, Cisco FWSM, Cisco IPS/IDS, Cisco ASA, AAA - TACACS+/RADIUS, Juniper SRX Series, SSH, VPN, IPsec, SSL/IPsec, Port Security, MAC Address Filtering.

Monitoring/Data Center: Wireshark, Cacti, Nagios, SolarWinds, Cisco Security Manager Suite, Remedy - VMWare, F5, Citrix NetScaler, Microsoft Windows Server NT, 2000, 2003, Exchange, Cisco Prime, Meraki, SNMP, DNS, DHCP, FTP, Telnet, HTTP(S), SMTP, PTP, SFTP, RDP.

Cloud Technologies: FEDRAMP, IAM, VPC, WAF, AWS Cloud, Peering, Cloud Security, Cloud Networking, Prowler.

PROFESSIONAL EXPERIENCE

Confidential

DPSCS Security Compliance Officer

Responsibilities:

  • Installation and configuration of computer hardware operating system and applications.
  • Troubleshoot network problems and radio communication systems in furtherance of institution s goals.
  • Conduct weekly electrical and monthly fire safety checks on communication and network infrastructure.
  • Allocate equipment and communication resources to institution s personnel.
  • Liaise with manufacturers and external vendors on teh R&D of new equipment and systems.
  • Test and evaluate new technology and create runbooks for ease of future use of technology.
  • Conduct essential administration, documentation, prepare budgets and accounts as well as any other duties that may be assigned by teh supervisory chain of command.

Confidential

Network Engineer /Sr. Analyst

Responsibilities:

  • Member of a team responsible for onsite LAN/WAN support deployment and configurations of routers, switches, wireless, firewalls and related LAN/WAN technologies at data center, corporate and branch locations.
  • Proficiency in Cisco Routers; Cisco Catalyst Switches; Cisco ASA; Cisco Nexus 1k, 2k, 5k,7k,9k; Juniper, F5 Big IP; Cisco UCM; Cisco Unity; Cisco WLC; Cisco Aironet; Palo Alto Firewall, Nagios, Solar Winds Orion, Cacti, Wireshark.
  • Responsible for day-to-day management and support that included scheduled and as needed change requests, documentations including policies and procedures, remediations, audit and compliance, escalation support and troubleshooting.
  • Additional responsibilities included proactive operational analysis and providing timely reports to key stakeholders.
  • Implemented site-to-site VPN, deployed DMVPN, IPsec and GRE Tunnel.

Confidential

CSM/Sr Administrator

Responsibilities:

  • Lead member of a team of administrator responsible for day-to-day support of an 24/7 mission critical IT network that included scheduled and as needed deployments and change requests and escalation support based on SLA’s.
  • Additional responsibilities including but not limited to proactive monitoring and analysis, preparing for and handling scheduled audits, managing policies and procedures and compliances, managing vendors/contracts and conducting operational analysis and providing qualitative reports to key stakeholders.
  • Implemented VLANs, VXLANs, ISL, 802.1Q trunking, VTP, STP and RSTP, Inter-VLAN Confidential for enterprise networks, class-based shaping and class-based policing.
  • Configured MPLS TE, implemented VRF, MP-BGP, Frame Relay and packet switching.
  • Extensive troubleshooting of Confidential protocols - OSPF, EIGRP, BGP.

Technical Accomplishments

Confidential

Responsibilities:

  • Implemented VLAN Trunking Protocol to reduce administrative overhead and to control VLANs and VXLANs using NX-OS to ensure virtual and flexible subnets that extend further across teh network than previous generation of switches.
  • Implemented port-profiles in NX-OS for multiple ports and port-types to reduce errors and improve readability.
  • Enabled encryption of system passwords and privileged administration to prevent unauthorized IOS user access.
  • Implemented secure access and EXEC command interpreter interval to teh console and vty ports.
  • Created and managed Local VLANs based on department function, and configure ports with static VLAN assignment, static 802.1Q trunks, and dynamic ISL trunking using PAgP for layer 2 forwarding.
  • Utilized VLAN Spanning-Tree in conjunction with PVST+ for compatibility between Cisco and Juniper switches and for root bridge assignment.
  • Implemented frame-relay point-to-point and multipoint WAN links between sites to establish connectivity between four sites. Established frame-relay point-to-point connections between three sites to create full mesh network. Implemented hub and spoke network between three sites with teh main office as teh hub for redundant connections.
  • Implemented EIGRP Confidential for point-to-point and Non -Broadcast Multi-Access networks. Prevented neighbor adjacencies forming and sending/receiving Confidential updates on unnecessary interfaces. Implemented EIGRP MD5 between sites to prevent unauthorized insertion of routes into teh domain. Implemented manual EIGRP route summarization to reduce demand on CPU resources, memory, and bandwidth used to maintain teh Confidential tables.
  • Implemented multiple area OSPF Confidential and totally stubby areas to lower teh system resource utilization of devices. Implemented NSSA area to allow injection of external routes into teh area and propagation into teh OSPF domain.
  • Configured e/iBGP peering using directly connected networks and loopbacks with OSPF, ebgp-multihop, and Route Reflectors to provide Confidential information with debugging diagnostic commands to monitor BGP events.
  • Extensive experience in TCP/IP management, IP Addressing, subnetting, VLSM, Route summarization and Redistribution of EIGRP and OSPF between two AS on multiple routers.
  • Route filtering in EIGRP and OSPF using access-list and prefix-list for inbound and outbound traffic.

We'd love your feedback!