We provide IT Staff Augmentation Services!

Desktop Support Consultant Resume Profile

2.00/5 (Submit Your Rating)

CO

Skills Summary

  • Bachelors of Science Degree in Information Technology with over 7 years of experience with an array of focus within software engineering, networking using testing methodologies, network security, web design, database design, project management, software and the telecommunications industry
  • CompTIA A CE, Network CE, and Security CE Certified Professional
  • Fast learner, creative team member, and problem solver among a team of fellow engineers
  • Workstation and laptop troubleshooting, installation and system hardening of Microsoft Operating Systems
  • Excellent SOHO network troubleshooting skills using the 7 Layer OSI Reference Model
  • Proficient at setup, troubleshooting, analyzing various 802.11 Wifi networks, cutting and crimping Ethernet cable of various types i.e. Cat 1 6e cable
  • Experienced in Java IDE 6.8 compiler Intermediate through Advanced :
  • Working knowledge of older and current versions Microsoft Office 97-2012 and Adobe Creative Suites
  • Prior cable system experience cutting various Ethernet cabling in accordance with EIA/TIA 568A-568B
  • Documentation development experience with various network designs, configurations, topologies, and system component layouts
  • Service Now ITSM ticketing system experience

Technical Summary

  • Operating Systems: Microsoft Windows XP, Visa, Windows 7, Windows Server 2008 R2
  • Programming Languages: SQL, JavaScript, C , and Java
  • Tools and Technology: MS Office, Adobe CS 5/6, punch tool, crimping tool, continuity/wiremapping tester, Time Domain Reflectometer TDR , multimeter, and tone probe/tone generator
  • Databases: MS SQL Server 2008, 2012
  • Networking: Linksys switches and router configurations, Cisco router commands, network topologies, cable installation and creation: crossover cabling, routing protocols, IPv4, IPv6, DHCP

Experience

Confidential

Desktop Support Consultant

  • Performed acting role as the regional On/Off-site Desktop Support Consultant for the Rocky Mountain region include: Colorado, Utah, Texas, California, South and North Dakota areas receiving 100 satisfaction from all clients on services performed
  • Provided desktop and notebook support for all on-site and off-site clients using the client's ticketing system: ticket assignment role, change order request, updates i.e. via logs, email, instant messenger service and request of ticket input from the client before desktop service fulfillment
  • Thoroughly compared all client notebook computers to the company's asset management database for verification of ownership/assignment before re-imaging any system per company policy
  • Backed up sensitive data on clients' system before applying OS, re-image upgrades
  • Performed data migration of client's folders and files to include MS Outlook PST files
  • Performed necessary BIOS upgrades to Dell notebook computers
  • Re-imaged Dell Notebook computer systems using Microsoft Deployment Tool-kit 2013
  • Exercised initiative through taking the appropriate action in the absence of orders and undefined directives by proactively researching and acquiring authorized access and utilization of client's off-site secondary re-image server while the primary server received necessary updates
  • Performed encryption of all client's hard disk using McAfee Enterprise encryption software
  • Performed revocation and reassignment of CiscoAnyConnect VPN access via client-based OTP portal in which required re-authentication via email verification for temporary credential retrieval along with the reset of pin via the client's OTP portal
  • Applied global McAfee antivirus software updates via administrator account
  • Assigned clients as the local administrator of their systems in accordance with company role policy using administrative tools via MS Windows 7 as an administrator
  • Reset end-user Windows 7 password credentials via MS Active Directory
  • Reset end-user McAfee ePO Encryption via ePO administrator console
  • Troubleshot end-user denied access to their domain through the removal of their system from the domain to a Workgroup and reassignment of their system back to their domain
  • Ordered and tracked all orders of hard disk and other peripheral devices
  • Remotely troubleshoot client system issues using MS Officer Communicator
  • Applied manual software installations, patches, script-based directory remapping and policy updates fixing software compatibility issues with Windows 7 Enterprise Edition
  • Performed hard disk, docking station maintenance, and installations on the client's systems

Environments: Intel Pentium Processors, Dell Workstations, Dell Notebooks, WD Hard Drives, Windows Command Prompt, McAfee ePolicy Orchestrator, Microsoft Office Communicator, SCCM, SMTP, CiscoAnyConnect VPN, CA OTP, Microsoft Office 2010, Microsoft Windows XP, and Microsoft Windows 7 Enterprise Edition

Confidential

Technician Network Security Analyst Contractor

  • Remotely managed/provided desktop and notebook support for homeowners and small businesses using Bomgar Remote desktop support software
  • Performed application security, and system hardening using Burp Suite Professional as a fuzz testing software solution
  • Perform system analysis, scanning for viruses, malware, spam of client system s , and bug removal from anti-virus and Windows 7 3rd party software
  • Demonstrated Windows 7 Enterprise network domain vulnerability through creating specific scripts and deploying them within Windows 7 OS allowing administrative access
  • Performed system removal all viruses, malware, spam from client system s using Kaspersky Internet Security 2014 edition and Microsoft Security Essentials
  • Built a malware analysis environment using: Virtualbox for malware isolation, CaptureBAT for system monitoring, Process Hacker for process monitoring, WureShark for network monitoring, RegShot to monitor system state and changes, OllyDbg as a disassembler and debugger, and LordPE as a memory dumper
  • Trained clients on specific security threats to include: information security awareness, social engineering, incidence response policies and procedures, end user anti-spam techniques along with common security policies i.e. Acceptable use policies, due care, need-to-know, account expiration, and destruction or disposal of equipment, media, and printouts
  • Provided research development, project management, problem solving and software solution support
  • Detected SQL injection attacks within Microsoft SQL Server 2008 R2
  • Monitored and prevented cyber threats screening for potential false positives within host-based firewall software
  • Escalated and maintained all logs i.e. Shift logs of cyber threat issues using the Remedy ticketing software
  • Installed anti-virus software to include: McAfee, Norton, and Kaspsersky Internet Security 2013 edition
  • Provided workstation and notebook system hardening and support for Windows XP and Windows 7 systems
  • Analyzed client SOHO networks for network weaknesses contributing to network vulnerabilities
  • Replaced bad desktop, NAS, and notebook hard disks, solid state drives, optical drives, ram, and notebook screens
  • Performed backup on a client's system via image clone, incremental, full and differential backup support
  • Setup and maintained Uninterrupted Power Supply UPS systems for SOHO clients
  • Performed internal and external network and workstation maintenance
  • Upgraded client's network hardware infrastructure i.e. DOCSIS 3.0 modem, IEEE 802.11ac standards
  • Received 100 satisfaction for work performed with multiple referrals from clients

Environments: Intel Pentium Processors, workstations, notebooks, Bomgar, ATX form factor cases, Seagate NAS, Microsoft Baseline Analyzer, Acronis True Image, Windows Command Prompt, Wireless Network Analyzer, APC Parachute, VMware, Windows Server 2008 R2, Acronis True Image, McAfee Antivirus, Kaspersky Internet Security Suite, Norton Antivirus, Bomgar Remote helpdesk support, SCCM, SMTP, VPN, Firewalls LAN/WAN , Microsoft Office 99-2012, editions, MS Active Directory, Microsoft Windows XP, and Microsoft Windows 7 Ultimate Edition, Software bug removal, Burp Suite Professional 2014 fuzz testing software solution. VirtualBox, WireShark, OllyDbg, LordPE, CamptureBAT, Process Hacker

Confidential

Circuit Activation Engineer Technical Support Contractor

  • Provide Metro grade Ethernet services for businesses through communication with field technician using various network validation and troubleshooting tools
  • Troubleshoot and analyse Layer 2-3 Cienna 3900 series switches, Cisco 4200 series routers, and Juniper routers using RFC 2544, loopback testing, SecureCRT
  • Create trouble tickets using Remedy, Century, and Ccoms
  • Escalate and follow-up on out of scope issues to project management via IM, MS Outlook Express emailing service
  • Analyse and interpret network issues within unique network schematics created within MS Visio
  • Troubleshoot VLANS within multi-point to multi-point and site-to- site of the CPE customer premise equipment
  • Enable and disable reflector testing
  • Accurately document work performed per task in full detail i.e. Screenshots, command prompts, contact name, phone number, etc.
  • Communicate with other circuit test engineers working as a team to extend the knowledge base of extraordinary network-based events
  • Test and circuit diagnosis over DOCSIS 3.0

Environments: Technical Support Center, Microsoft Windows XP, Micrsoft Visio, Internet Explorer, Mozilla Firefox, Remedy ticketing system, Cisco routers, Cienna switches, VLANS, MPLS, Stellant, CComs, RFC 2544 loopback tester, SecureCRT, MPLS, EDI, LDP, Layer 2 Tunneling Protocol version 3 L2TPv3

Confidential

Web Developer

  • Built and maintained i7920 workstations with RAID 5 support and redundant backup systems
  • Replaced vendor-based laptop components i.e. Motherboard, processors, heat sink fans both on-site off-site
  • Managed and maintained commercial Network Access Storage NAS devices for SOHO
  • Provided workstation system hardening and support upon installation of Windows Operating System s
  • Setup network system support, security, and optimization for SOHO workstations
  • Setup and created policies for multiple user accounts, roles, and access control to network resources
  • Provided IT consulting for homeowners and small businesses
  • Constructed and tested Ethernet CAT 3- CAT-5 cabling for network upgrades and optimization
  • Setup and maintained Uninterrupted Power Supply UPS systems for SOHO
  • Built and managed online e-commerce sites
  • Built eCommerce, database for tracking and retrieving customer data
  • Integrated complex API for tracking taxes, sales, and financial data
  • Maintained 10,500 volume of sales to include all electronics, memberships, and apparel

Environments: Intel Pentium Processors, laptops. Bomgar, ATX form factor cases, Seagate NAS, Microsoft Baseline Analyzer, Acronis True Image, Windows Command Prompt, Wireless Network Analyzer, Adobe Dreamweaver, Parallels Plesk, MySql

Confidential

Web Developer Java Programmer

  • Strategically wrote web-submission program code keeping e-commerce, maintaining site hits utilizing various SEO search engine optimization techniques
  • Prepared Software Requirement Specifications SRS for the client
  • Used various Java import packages with documentation before creating functions
  • Strong understanding of an assortment of data types variables and constants according to association while respecting case sensitivity and object naming conventions
  • Used variables of both primitive and reference types
  • Created objects calling the constructors of specific classes i.e. T-shirt obj1 new T-shirt
  • Familiar with various format specifiers f, n, etc.
  • Used operators, expressions and assignments in order of precedence producing resultants
  • Familiar with when and how to use private and public functions both parameterized and without parameters, whether wild or returning a value
  • Used math, relational, and logical operators to solve major and minor issues
  • Strong understanding of the use of various placeholders to separate input and outputs within a function
  • Used the building block approach reuse of old software code without reinventing the wheel
  • Used input and output statements for end user standard input and output devices
  • Troubleshooting experience with solving fatal and non-fatal runtime errors using Netbeans IDE compiler version 6.8
  • Applied KIS Keep It Simple throughout application development
  • Understand the importance of code refactoring within a large work environment, dynamic allocation of variables, action listeners, registering events, event handlers, and decision making statements along with execution processes
  • Knowledgeable on the architecture of the CPU, ALU Arithmetic Logical Unit and memory access
  • Connected Java GUI to Microsoft Access database within a 3 tier project
  • Implemented exception handling to catch user input errors i.e. The user enters a float instead of an integer
  • Used Visual Studio 2008 to create, compile, and execute C programs
  • Used case logic structures, and decision making for production of desired results

Environments: Windows 7, Adobe Flash, Adobe Dreamweaver, Adobe Photoshop, Adobe Illustrator, Netbeans 6.8 JDK, Visual Studio 2008, Unified Modelling Language UML Diagramming, Rational Rose, Microsoft Visio

Confidential

IT Security Contractor Call Center Representative

  • Tracked incoming and outgoing calls via Private Branch Exchange lines
  • Updated Electronic ticket requests, mainframes, and customer data files
  • Handled multiple client accounts
  • Troubleshoot tasks in accordance to work order priority,
  • Updated time cards using basic arithmetic, subtraction, and division formulas within Excel Spreadsheet

Environments: Windows XP, MS Excel Spreadsheet, Remedy, SOCKS, Citrix, Lenovo, Windows Active Directory, Token Key Generator, LoJack Laptop Tracking

Confidential

Fire Support Specialist

  • Multitask efficiently and diligently resulting in efficient early task completion s
  • Prioritized tasks according to importance while servicing workstations and desktop equipment
  • Rapid organizational and maintenance skills of military records
  • Appointed as physical security representative for the unit's intelligence department
  • Strong data entry, logging, and analysing skills
  • Effectively managed over 1.2 million dollars of sensitive, government equipment resulting in a 100 accountability rating and promotion
  • Trained personnel on government operational security procedures, operating government networks, observation equipment, vehicles, computer initialization and utilization
  • Set-up surveillance and monitoring systems in Operation Iraqi Freedom
  • Established balanced teams to complete task s efficiently and effectively
  • Field Operations Help Desk support for Marines, Navy, and DOD contracted entities
  • Operated and maintained components of the AFATDS Advance Field Artillery Tactical Data Systems

Environments: Indoors/Outdoors, Microsoft Office, Windows XP, Windows 2000, Linux, Unix, Cisco, MySQL Database, PC Hardware Repair, Network Security, Project Management, Procurement

Awards

Adams County, Colorado: Juror's Certificate of Appreciation

A Certificate of Completion of Training

Network Certificate of Completion of Training

Global War on Terrorism Expeditionary Medal

Global War on Terrorism Service Medal

Army Certificate of Achievement 30

Army Achievement Medal 3

Army Commendation Medal

Army Good Conduct Medal 3

Army Iraq Campaign Medal

We'd love your feedback!