Advanced Digital Investigator well-trained in forensic analysis, computer systems, and networking. Current on intrusion methods and detection, encryption, and data recovery techniques. Reliable in completing in-depth system reviews to find hidden information and pathways. Dependable employee seeking opportunity to expand skills and contribute to company success. Considered hardworking, ethical and detail-oriented. Active TS/SCI Clearance.
• Administers and maintains Unclassified, Classified, CRN, and special enclave systems, including Alternate Operating Location
(AOL) pre-deployment configurations.
• Manages lifecycle tasks: create, disable, unlock, configure privileges, and track user access across all systems.
• Ensures workstation security compliance with TCNO deadlines and local equipment management procedures.
• Coordinates maintenance actions with the Network's flight leadership, and external units.
• Supports Systems Administration of the operational networks, the training network, local base network.
• Documents support actions using approved ticketing systems; resolve outages within SLA timelines.
• Image workstations via image server.
• Develops and delivers technical training, SOPs, and system documentation for internal personnel.
• Coordinates maintenance efforts with network teams and external units; respond promptly to critical system issues and HAZCON
alerts.
• Responsible for testing, installing, configuring, maintaining, optimizing and upgrading various aspects of an enterprise network.
• Travels as needed to perform system installations, maintenance, and user support at off-site locations.
• Performs basic and intermediate level installation, upgrades, daily maintenance, and intermediate troubleshooting to include
hardware and software consisting of UNIX, Windows, and VMware operating systems, workstations/monitors, Anti-virus and
software, computer printers, Cybex switches.
• Modify Active Directory settings and policies.
• Creates and deletes user accounts, tracks user privileges, maintains a list of current users, and shows accessibility to all computer systems, network, and computer software applications, and other network components.