We provide IT Staff Augmentation Services!

Systems Admin Associate Resume

5.00/5 (Submit Your Rating)

Pendleton, CA

TECHNICAL SKILLS:

  • Operating Systems: Windows 7, Windows Server 2003/2008, Linux Fedora, Mac
  • Applications VMware View, Microsoft Security Suite, Microsoft office Suite, Firefox, Google Chrome, Internet Explorer 8,9,10,11 Symantec Antivirus, McAfee Antivirus
  • Understanding of penetration testing, vulnerability management, web application security, risk assessment, and mitigation methodologies
  • Familiarity with the NIST 800 publications governing the FISMA Act
  • Experience with tools such as Kali Linux, Metasploit, WebInspect, Nessus, Burp Suite, Wireshark, Nmap, HBSS, etc
  • Strong verbal, written and interpersonal communication skills
  • Understanding of common networking protocols and services and their relevant security issues (MLS, TCP/IP, SMTP, DNS, DHCP, SNMP, 802.1x, SSL, IDS/IPS, Topology, etc)
  • Attended Splunk conference in San Diego learned how Splunk could be used and its ability to leverage machine data

PROFESSIONAL EXPERIENCE:

Confidential

Systems Admin Associate

Responsibilities:

  • Provide Plan of Action and Milestones (POA&M) support services to complete identified items to include tracking, updating and managing the POA&M.
  • Provide Contingency Planning support services to complete required activities and documentation.
  • Develop, review and make recommendations on project - level documentation (e.g. FISMA related documents, security plans and policies, requirements specification, system architecture, design documents, etc.)
  • Develop and document security test plan and procedures.
  • Research, evaluate, and develop relevant information security policies and guidance.
  • Actively participate in technical exchange meetings and application review boards, documenting actions items/results of these events.
  • Management, as needed, on the status of action items and/or results of activities.
  • Identify and clarify security requirements and recommend policies and procedures to satisfy requirements.
  • Develop and update System Security Plan.
  • Develop and update Business Impact Assessment document.
  • Coordinate system security evaluation with appropriate project personnel.
  • Assess/calculate risk based on threats, vulnerability, and shortfalls uncovered.
  • Document the framework and guidance needed to unify the existing IT security program elements into a cohesive and responsive governance program.
  • Develop security policies, processes and initiatives that will reinforce the governance.
  • Provide Continuous Data Monitoring support services to complete required activities.
  • Review and make recommendations on project-level documentation (e.g. requirements specification, system architecture, design documents, test plans, security plans, etc.
  • Develop and document security test plan and procedures.
  • Assist in researching, evaluating, and developing relevant Information security policies and guidance.
  • Actively participate in or lead technical exchange meetings and application review boards, documenting actions items/results of these events.
  • Brief management, as needed, on the status of action items and/or results of activities.
  • Clarify security requirements and recommend security countermeasures.
  • Read and analyze SSP and develop understanding of systems and applications into security plans.
  • Coordinate system security evaluation with appropriate project personnel.
  • Conduct hands-on systems/network scans, analyze results, document risk, and recommend countermeasures.
  • Perform network security analysis and risk management.
  • Assess/calculate risk based on threats, vulnerability, and shortfalls uncovered in scanning.
  • Identify mitigating countermeasures to identified threats, vulnerability, and shortfalls.
  • Identify needs for processes, procedures, and tools in scanning/monitoring/remedying capabilities; conduct research on and evaluation of automated tools and provide summaries and reports to client on the tool capabilities, in support of potential procurement by client.
  • Prepare reports citing system vulnerability and suggested courses of action.
  • Review the findings from the Information System Security Scans of client systems identifying vulnerability, while pursuing remediation of the vulnerability found.
  • Track and monitor outstanding remediation efforts.
  • Coordinate, schedule and perform scanning activities with appropriate elements in support of FISMA data collection.
  • Prepare SLA metric reports in accordance with the SOP.

Confidential

Systems Admin Associate

Responsibilities:

  • Installed and configured Common PC Operating System Environment (COMPOSE) combining commercial-off-the-shelf (COTS) and government-off-the-shelf (GOTS) products to deliver directory services, e-mail, Web acceleration, office automation applications, collaboration tools and antivirus software for the Integrated Shipboard Network System (ISNS). Diagnosed, evaluated, and resolved problems, including software incompatibilities and failures, and software user questions.
  • Installed and configured Compose 4.0 Windows Server 2008 & 2012
  • Installed and configured Microsoft Exchange server, ISA Server, Symantec, Simple Sync, C2PC, WSUS.

Confidential, Pendleton, Ca

Information Security Specialist, Camp

Responsibilities:

  • Troubleshoot Configured, ran and monitored automated security testing tools keeping assets protected.
  • Performed manual validation of vulnerabilities
  • Performed manual penetration testing of client systems, web sites and networks to discover vulnerabilities for local sites and customers facing sites
  • Thoroughly document exploit chain/proof of concept scenarios for client consumption
  • Performed overnight work as necessary
  • Working with technical security controls
  • Programming experience in Python, PHP, Perl, Ruby making scripts

Confidential, Poway, Ca

Desktop Support/Migration

Responsibilities:

  • Windows 7 Deployment in a team environment for system installations.
  • Duties include, but not limited to Systems installation, Reimaging machines, Run SCCM boot sequence, Settings and Files migration, Application installation and Assets tagging.

Confidential, San Diego, Ca

Tech Support

Responsibilities:

  • Resolved multiple services related issues related to Cox products Cox High Speed Internet and Cox Digital Telephone by directing customers through a series of troubleshooting steps.
  • Educated customers on customer owned equipment such as PC, use of browser, use of email changing passwords and other member services features.
  • Assisted customer with reinstalling software, modem issues, TCP/IP settings and other functions by performing detailed troubleshooting and walk through steps.

Confidential, San Diego, Ca

IT Desktop Support

Responsibilities:

  • Un-Install and Reinstall and configured, and supported over 100 Dell, HP, Compaq, Sony, desktops, laptops, Avaya one-x phones and miscellaneous devices and supported over 50 customers post deployment for Union Bank
  • Installed configured, and supported Windows 7 operating systems, enterprise business applications, and miscellaneous software applications and configured IE 8 for over 50 computers at LPL Financial
  • Removed and Reinstall, configured, and supported copiers, fax machines, printers, scanners and miscellaneous peripheral hardware, supported network connectivity to conference rooms and miscellaneous audio/visual equipment. for over 100 Users at Union Bank
  • Documented, maintained, and helped upgrade or replace hardware and software systems for over 50 users at LPL Financial
  • Supported and maintained user account information including rights, security and systems groups as well as using windows update and changed user password and permissions using active directory for over 10 users at Simon Wong Engineering as well as changing network and updating Microsoft outlook from 2003 to 2012

Confidential, San Diego, Ca

IT Support Tech

Responsibilities:

  • IT Support Tech for Qualcomm Technologies Corporate IT Hardware Asset Management team
  • Accessing hardware to determine operation, repair or recycle statuses for over 300 desktops and laptops
  • Inventoried, audited and staged Various hardware and consumables
  • Installed and removed computer components (hard drives and RAM)/Software to hardware association for over 300 Dell, HP desktops and laptops

We'd love your feedback!