Goal-oriented and collaborative IT professional with over 20+ years’ hands on experience as a Network Engineer, Administrator and Change Management, two advance graduate degrees in Networking and Information Systems, and two key graduate certificates in Information Security and Wireless Systems. Proven analytic and problem-solving skills with the keen ability to assess needs, define requirements, develop value-added solutions, and execute technical solutions that streamline and improve operating efficiencies. In-depth experience in Information Systems security including risk assessments, Information Assurance and Compliance, Security Test and Evaluations, Systems Security Engineering, Systems development, test and evaluation, and project management. Hands on experience in Cybersecurity risk assessments and compliance auditing in rapid development environments. Ability to communicate with technical and non-technical audience, develop system documentation and create policies to meet the needs of dynamic and continuously changing environments.
Overview
26
26
years of professional experience
Work History
Senior Risk Advisor, Cyber
Peraton
9 2023 - 4 2024
Develop roadmaps to implement cyber resilient techniques that subvert adversary attack vectors while allowing reliable delivery of C2, intel, and logistics data to warfighter. Understanding of advanced cyber threats targeting enterprises, along with tactics, and procedures used by those threats
Research artificial intelligence/machine learning to increase efficiency and effectiveness in the protection and defense of critical services to validate assumptions related to cyber security and cyber resiliency
Evaluate networking solutions that block, reroute, or deceive adversaries in a contested cyber domain
Research and evaluate using AI for automation of cyber defense actions with the goal of improving the ability to fight “at the speed of cyber”, leveraging MITRE Framework for predicative analytics
Demonstrated expertise in deploying and maintaining open-source network security monitoring and assessment tools
Experience developing and conducting detailed, technical, and hands on training
Assess complex capabilities, tactics, techniques and procedures, and requirements in support of the Army Cyber (ARCYBER) Program
Assisted in coordination, integration, and validation of new and emerging technologies that affect the Joint Forces Headquarters Department of Defense Information Network (JFHQ-DODIN) cyber environment
Work with Joint Forces Headquarters Department of Defense Information Network (JFHQ-DODIN) leadership and other organizations to ensure validated requirements are in line with cyber ARCYBER mission intent
Provide input into DODIN planning, validating, and programming efforts in cyber for development of Mission Assurance requirements
Identify areas of commonality, duplication of effort, and where appropriate, provide input to establish joint efforts to resolve redundancies
Monitor performance of programs and equipment to ensure operational performance meets mission requirements
Review operational, test and evaluation data and results to confirm the technological approach and affirm material effectiveness in solving identified requirements
Define dynamic techniques that rearrange the cyber battle space based on indicators and warnings of adversary activities
Network Engineer, Lead
Bluewater
06.2021 - 05.2023
Develop, submit, and maintain requirements documentation in support of all programs supported
Meet with stakeholders to gather initial requirements, performing requirements analysis to refine technical requirements, documenting requirements analysis and requirements traceability
Ensure the requirements align with the DISA and DoD strategic directives
Provide expertise, knowledge, and understanding of the DISA Strategic Plan, as well as current and emerging technologies, to include: the Joint Information Environment, Joint Regional Security Stack, Combined Communications Electronics Board initiatives, Secure Cloud Computing Architecture, and the Mission Partner Environment Information Systems that shall directly impact the architecture design, configurations and implementation of the programs supported
Provides network engineering support as it relates to all phases of the systems development life cycle process
Compliant with DISA’s Systems Engineering and Acquisition processes for all tasks related to programs supported in this PWS
Produce a project schedule to document the timeline for correcting any deficiencies identified through the Systems Engineering and Acquisition process along with accompanying documentation to include System Sustainment Plans, Concept Proposals, Comprehensive Operational Analysis and SRF documentation as identified by the COR /ACOR
Provide support to include participation and facilitation of meetings and conferences to include: the DMZ, NFG, Whitelist/FLM-NG, Initial/Mid/Final Planning Conferences and Cyber Security Working Groups
Support operational requirements and assure system and network availability for mission partners, by providing Tier III expertise, knowledge, and facilitation of activities with Tier II and the mission partners to ensure timely remediation of operational issues.
Cyber SME, Sr. Incident
Science Application Technology, SA-TECH, PwC
08.2020 - 01.2021
Cybersecurity functional expert and team leader in support of DOT&E missions pertaining to operational assessments of DoD warfighter platforms and networks
Supports Cybersecurity and Electromagnetic Activities (CEMA) and develop cyber threat mitigation strategies and countermeasures, procedures, methodologies, capabilities that required research and development
Provides subject matter expertise to Cybersecurity Assessment Program (CAP) evaluations being executed during Joint and Service Training exercises
Analysis and heavy data mining relative to cyber threat TTP identification and employment during platform assessment missions
Support cyber resiliency of signals intelligence analysis (specifically electronic intelligence), cybersecurity principles, Information Assurance policy, compliance requirements, and related network security measures, including but not limited to Protect, Detect, React, Restore and Resilience metrics
Evaluate Cybersecurity T&E Guidebook procedures to all network, C4ISR, weapons platforms, etc
From Sensor to Shooter
Applies the six phases of the Guidebook to operational assessments on warfighting platforms and network, (both closed and open)
Assess the Cybersecurity Requirements, Characterize the Attack Surface, Cooperative Vulnerability Identification, Adversarial Cybersecurity DT&E and TTPs, Cooperative Vulnerability and Penetration Assessment, Adversarial Assessments
Knowledge of Blue, Grey, and Red Threat and Network environment
Supports weapon system requirements to CEMA and cyber resiliency operational assessment plans and measures
Evaluate cybersecurity technologies into multiple systems, penetration testing, cyber forensics, system security engineering, and vulnerability mitigation strategies to reduce advanced persistent cyber-attack risk
Evaluate Threat Actor Tactics, Techniques and Procedures (TTPs) Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency
Provides Cyber Kill Chain and applicable analytic models
Diamond Model Data mining that supports threat assessment development for analytical products
Report Network and Internetwork Routing - Domain Name System protocol and architecture
Evaluate how an Antivirus program, and Intrusion Detection System works
Develop and evaluate exploitation, implants, and beacons
Build effective communications to explain complex technical information
Provides leadership and supervisory duties in a Cyber Threat environment Basic coding in scripting languages such as Python, R, or Ruby Calculating statistical significance and principal component analyses Basic Scripting for the GHOSTMACHINE environment Leveraging LABBENCH + Jupiter to interface with GMAE - TCP/IP: three-way handshake
Guidehouse
05.2019 - 08.2020
Analyze malicious code by conducting reverse engineering techniques and employing tools and scripting languages as well as virtual machine and networking software
Identify the methodology of hackers posing a potential threat to customer networks and systems
Documented results in time-sensitive reports, presentations and analyst exchanges
Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools
Conducted analysis of dynamic and static factors, and reverse engineering operations
Prepared reports to record findings in Malware software analysis and related incident analysis and response
Performed computer forensics including detailed technical analysis and reverse engineering of malware, malicious code and media such as hard drives and USB drives of compromised systems in support of Army Computer Network Operations (CNO) and Computer Network Defense (CND) efforts
Drafted technical reports detailing analysis results to US Army staff and leadership
Monitor the security of critical systems (e.g., e-mail servers, database servers, web servers, App-server) and changes to highly sensitive computer security controls to ensure appropriate system administrative actions, investigate and report on noted irregularities
Performed advanced computer and network tests relating to various forms of malware analysis, computer intrusion, theft of information, denial of service, multi-national organized criminal groups, and Advanced Persistent Threats (APT) - C, C++, Python, JavaScript, Fortran, X86 Assembly
Deep working knowledge of networking concepts and protocols: TCP/IP, HTTP, HTTPS, DNS, RPC
Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools
Conducted analysis of dynamic and static factors, and reverse engineering operations
Prepared reports to record findings in Malware software analysis and related incident analysis and response.
Sr. Security Engineer/Cloud & Enterprise
BrainGU
08.2018 - 05.2019
Provided subject matter expert in area of information security risk management methodology and practice
Supports BrainGU Structsure SaaS enablement while securing various FedRAMP Moderate Security Controls, AWS cloud services and DOD and NIST 800-54r4 Risk Management Framework process
Formulate security program frameworks to assess impacts and security risks associated with cloud infrastructure technology
Expertise knowledge on enterprise security solution design and implementation skills covering identity and access management, infrastructure security (network & endpoint), privacy and data security as well as application security
Deep Technical knowledge in routing, firewall policy, Anti-DDoS, WAF, IPS, SIEM, secure credential management, virtualization, service-oriented architecture, development practices, operational practices, micro services architecture and database design
Assesses known information security weaknesses and the adequacy of associated remediation activities
Configuration hardening, assessment, and forensics experience with Linux servers
Solid knowledge and understanding of security regulations and best practices such as PCI, SOX, HIPAA, NIST or the ISO 27000 family of standards
Evaluate and identifies the key information security risk scenarios and supports the identification of the critical controls required
Identifying risk by reviewing current policies and processes, identifying areas of potential risk to the organization, and partnering on the development of solutions to mitigate business exposure by leveraging strong analytical and process
Work with network, platform, engineering and dev-ops teams in architecture design and review session
Expert knowledge of security frameworks such as Cloud Security Alliance (CSA), Internal Organization for Standardization (ISO), and National Institute of Standards and Technology (NIST)
Assesses known information security weaknesses and the adequacy of associated remediation activities
Configuration hardening, assessment, and forensics experience with Linux servers
Solid knowledge and understanding of security regulations and best practices such as PCI, SOX, HIPAA, NIST or the ISO 27000 family of standards
Evaluate and identifies the key information security risk scenarios and supports the identification of the critical controls required
Identifying risk by reviewing current policies and processes, identifying areas of potential risk to the organization, and partnering on the development of solutions to mitigate business exposure by leveraging strong analytical and process
Work with network, platform, engineering and dev-ops teams in architecture design and review session
Expert knowledge of security frameworks such as Cloud Security Alliance (CSA), Internal Organization for Standardization (ISO), and National Institute of Standards and Technology (NIST).
Information Security Engineer
Comtech Mobile Datacom, United States Army
07.2015 - 11.2018
Assurance Cyber Division
Lead and coordinate cyber incident response activities
Analyze and evaluate hardware, software and operational practices for cyber security impact
Provide knowledge in software, applications and database STIGs review and application security testing
Provide technical expertise and participate in projects to implement new cyber security tools
Coordinate security events monitoring using McAfee Nitro, Science Logic EM7, syslog and other tools
Evaluate potential threat and issues reports
Work with IT team to mitigate security events
Perform users’ management and activity monitoring, as well as configuration change monitoring
Perform periodic penetration testing
Coordinate periodic security patching activities on Windows, Linux servers and network devices
Check, identify, and verify installation of all pertinent patches based on IAVA, vulnerability alerts and vendor’s recommendations
Operate, maintain and provide reports on various security monitoring tools: FireEye web, e-mail and host-based (Mandiant) protection systems BlueCoat web proxy McAfee Nitro, SNORT and other intrusion detection systems (signatures and updates)
DoD HBSS system (McAfee ePolicy Orchestrator and host-based components) Various IT security software (McAfee Antivirus, Malware Bytes) Syslog’s, SEIM and other event management tools
Network analyzers (NI Observer, Wireshark) and other packet analysis tools
Perform regular security scans, risk and vulnerability assessments to verify compliance with the following regulations: DoD 8500.2 IA controls, AR25-2 Army Regulations, DIACAP accreditation framework, NIST standards and Risk Management Framework, Sarbanes-Oxley Act, Corporate internal standards and policies
Perform periodic monitors, control and develop IA policies for: Network access control (NAC) devices, Host-based and network-based IDS/IPS systems, Firewall rules and access lists, Linux and Windows servers and workstations, User access controls
Maintain DoD ATO accreditations and IA security posture on Government networks: In collaboration with IT team, ensure compliance of network and computing environment with current STIGs and DoD regulations
Perform periodic security audit and coordinate findings remediation
Perform and provide support for Government DIACAP inspections and scans
Create and maintain accreditation documentation and POA&Ms
Support system security evaluation and validation by independent third party
Perform periodic IA training and for the operations and administration personnel
Conduct periodic DR and redundancy testing.
Information System Security Officer
Acro Service Corporation, Northrop Grumman Corp
11.2017 - 08.2018
JINTACCS Missile Defense & Protective Systems Division
Develop, implement and maintain security controls and supporting documentation as required for risk management framework (RMF)
Support security incident reporting, vulnerability assessments, and information assurance compliance scans
Develop and maintain SA&A documentation for the system policy and Federal guidance SA&A documentation may include, but is not limited to, System Security Plans (SSP), Risk Assessment Reports, Security Assessment Reports, Contingency Plans, Authorization to Operate (ATO) documents, etc
Maintain system for risk management and SA&A documentation
Conduct testing of proposed security configuration settings to ensure that these settings meet system requirements
Document security configurations as implemented on all IT assets and update this documentation as configuration changes are made
Analyze systems, audited security logs and provide security control recommendations in accordance with policy, NIST SP 800-53, and DoD directives
Support establishing and ensure that all IT assets are configured to system specifications, security configuration baselines and in accordance with DoD directives, NIST, and applicable governing requirements
Conduct continuous monitoring, and addressing any deviations from, the applicable security configuration baselines
Define system boundaries, system hardware/software inventories, system interconnections, system responsible officials, and system users
Develop and maintain information system security documentation
Performed security risk assessments using tools (ACAS, SCAP, Splunk) and STIGs requirements to enhance security posture of the severity of weaknesses or deficiencies discovered in the IS
Perform review new security solutions designs and specifications to validate they are ready for existing security operations environment
Conduct technical policy and contract reviews as requested and advise the Senior Management accordingly
Perform reviews of existing and future technologies and standards, and advise the Senior Management of the implications that such technologies and standard may have on Customer IT security
Enforce SIPRNet security guidance policies as provided by DISA, DSS, USCYBERCOM, Department of the Air Force, and other relevant regulations
Work with the Configuration Control Board (CCB) for approval of all patches and major updates/changes
Provide required Information Assurance Vulnerability Management (IAVM) scanning and vulnerability assessments with DoD approved software
Manage and support Active Directory, WSUS and RADIUS
Implement and test IS and data backup procedures for integrity
Prepare for a CCRI or other government inspections and conduct self-assessments in advance of inspection to ensure all applicable CND Directives and applicable IA policies for the IS
Provide an accounting of hardware and support life-cycle to both Senior Management and the Customer of the existing IT infrastructure
This includes the following list of technologies: Devices: Firewalls, NIDS, and Proxy Applications: Antivirus, Content Filtering, HIDS, and Logging.
Infrastructure Engineer
Elevate Technology Solutions, Wireless
10.2014 - 01.2015
States Agency for International Development (USAID), M/CIO/IT/Engineering Management
Lead team of 3 IT professionals in design, implementation, configuration, and management of enterprise wireless hardware, software, and management systems (NMS)
Draft technical manuals Concept of Operations (CONOPS), installation manuals, installation progress updates, and incident response plans in order to enhance system security documentation; create required system compliance reports and information requests
Plan and coordinate system utilization and capacity, involving configuration and testing with vendor
Responsible for advanced enterprise wireless LAN administration and design, mesh networks, and point-to-point and point-to-multipoint topologies
Monitor, document, and control infrastructure performance for response, throughput, and availability
Resolve escalated hardware and software issues related to LAN/WAN
Identify opportunities and solutions for improving efficiencies with emerging technologies, including Cisco routers/switches and wireless systems
Conducted client consultations for wireless LAN/WAN hardware and software, including networks, routers, and servers
Analyzed business needs and recommended solutions
Identified technical problems and debugged hardware and software related to LANs/WANs
Helped develop and implement system verification and vulnerabilities tests, assess mission assurance factors, and construct risk mitigation plans
Architecture included quality of service configurations, router/switch configuration, capacity planning, and modernization of supporting systems
Installed Wireless Intrusion Detection and Prevention sensors, monitored performance of wired and wireless networks to maximize operations
Conducted testing of new wireless devices, their features, advantages and benefits compared to existing products available in the market, to validate speed, range, signal strength, ease of use and manageability.
Project Manager
Computer World Services Corp, Falls Church
02.2011 - 10.2014
Defense Health Quarter (DHHQ), United States Air Force/AFMSA SG6I
Managed and Interfaces with, the DHA Cybersecurity Division, and in some cases, other agencies with AF, DHA and DoD C&A
Managed IA web site information, research and evaluation on Cybersecurity matters, incident response and reporting, AFMS, MHS, RMF, DIACAP/Command, Control, Communications, and Computer Intelligence Support Plan (C4ISP) security documentation, technical papers, white papers, military staff package preparation, evaluation of applicable standards of The Joint Commission, Health Insurance Portability and Accountability Act (HIPAA), wireless technologies, and privacy issues
Provided and conducted Independent Verification and Validation (IV&V) of medical devices from various vendors and Original Equipment Manufacturers (OEMs)
This includes interpreting results, ensuring proper implementation of controls, ensuring proper configurations, etc
These efforts are all based on Department of Defense Instructions (DoDI), AFIs, DHA Administrative Instructions, Federal Drug Administration (FDA) Guidelines, and current industry standards
Served as SME in the development of multiple vendor C&A (RMF, DIACAP, PIT, etc.) artifact documentation to be used in the accreditation process
Upload C&A artifact documentation/notes into appropriate tracking tool
(Tracking tool template to be provided to the contractor by the MDIS PMO after contract award)
Consulted with equipment manufacturers and other DoD agencies to obtain information they can use to advise and assist the CE and PMO Leadership in producing sound engineering solutions to enhance the security posture of the medical device systems being deployed
Design, develop, implement, and integrate information assurance architecture within system application
Coordinate with program engineers, developers, information system security officers and managers, system administrators including stakeholders to ensure acceptable application system risk levels
Provide documentation of compelling evidence artifacts including system security plans, system security design, policies and standard operating procedures
Evaluated system architecture and design alternatives to meet user requirements
Conduct lectures and speeches, established and maintain technical to show project progress to management
Develop articles, white papers, talking papers, bullet background papers, staff summary sheets, project briefings, evaluation reports, business cases analysis, meeting agendas/minutes, and spreadsheets
Ensured that all monitored systems comply with the DoD Gold disk, STIGs, IAVA, IAVB, IAV-TA, Security Control procedures in addition to FISMA requirements
Report on all security, IA, and C&A compliance requirements
Updated security documentation related to reaccreditations, annual reviews, accreditation updates, and when configuration changes are made to the device/systems and upload into the Medical Device IA tracking tool and Enterprise Mission Assurance Support Service (EMASS) web-based application, no later than (NLT) three (3) business days after updates are received from the vendor, MTF, DHA or other AF agencies.
Lead Network Engineer
Innovative Management Concepts Inc, Silver Spring
09.2011 - 02.2012
For WRAIR –NMRC, Walter Reed Army Institute of Research, and Navy Medical Institute of Research
Engineered, Implemented, and simulated two networks in a lab environment for the purpose of GRE Tunnel with VRF Configuration and performance analysis using Cisco routers and switches, 3750, 6513, and 3560
Deployed Windows 2008 servers to simulate two live networks hosting, AD, SFTP, DHCP, DNS, RAS, Web, and Exchange
Management and operation of including supervising a staff of four Network Engineers, coordinating LAN / WAN maintenance, testing, evaluating and procuring new technologies for Intranet / Internet applications
Manage and configure a defense in de-depth security-framework Supported VLANS, vulnerability assessment, data forensics, firewall anomalies, false positives and disaster recovery
Managed various operating systems, review various logs for ingress and egress
Supported computer forensics, analyze data, through Security Information and Event Management (SIEM)
Provided threat assessment, using packet capturing software tools, Nessus, AppDetective, and Fortify
Provided traffic analysis and scripting for various firewalls
Ensure compliance with existing Army Security Policies and Architectural standards, including RSA Secure ID technology, SMS client management
Test Lab, using dynamic routing protocols OSPF, EIGRP as well as policy routing, implemented total router, VPN tunnel and firewall redundancy of all sites
Manage and Maintain Cisco PALO-ALTO/MacAfee/ASA-5500 series firewalls and Juniper SSG5400 firewall adding ACL and NAT as an additional layer of security
Set up PPTP VPN using MS Windows NT RAS for the remote users
Designed, implemented and managed LAN/WAN Networks/PC network system supporting, US Army, and US Navy infrastructure and customer support departments
Developed and supported software applications that facilitated business decision making and financial auditing
Conducted user training, subcontractor management and contract negotiations with vendors
Engaged in daily analysis, design, documentation, change management, implementation, and support of client’s network infrastructures
Performed vulnerability security test of the network utilizing visual inspection of router and switch configurations files, port scanners, access lists, and other methods to determine security weaknesses.
Network Engineer
Future Technologies Inc
07.2011 - 09.2011
For the AFMES – Arm Forces Medical Examiner, US Army:
Network Assessment and Documentation (including technical, operational, and economic assessment
Configured Cisco 3750, 4507 and 6513 VTP-VLAN configurations, IP-Subnetting
Implementation of TCP/IP & related Services-DHCP/DNS/WINS, and Kerberos authentication protocol for client/server
Manage and configure a defense in de-depth security-framework t
Supported VLANS, vulnerability assessment, data forensics, firewall anomalies, false positives and disaster recovery
Managed various operating systems, review various logs for ingress and egress
Ensured information assurance by transmitting secure data between classified systems; perform ethical hacking, malware reverse engineering, penetration testing, and Certification and Accreditation (C&A) within Security Operations Center (SOC) environment
Supported computer forensics, analyze data, through Security Information and Event Management (SIEM)
Supported Linux base OS systems
Provided threat assessment, using packet capturing software tools
Provided traffic analysis and scripting for various firewalls
Manage complex operations that involve two or more additional functions such as, but not limited to, network operations, systems security, systems software support, and production support activities
Managed Cisco PALO-ALTO/MacAfee/ASA-5500 series firewalls and Juniper SSG5400 IDS
Design and implement security policies using ACL
Perform system-level design and configuration of products including determination of hardware, OS, and other platform specifications Managing User accounts using Active Directory Server 2008, configured Link Aggregation Control Protocol (LACP)/ Port aggregation protocol (PAgP) to form Ether-channel between 10-Gigabit Ethernet ports
Implement storage migration using Dell EMC-SAN CX4-240 hardware
Provide technical direction and engineering knowledge for communications activities including planning, designing, developing, testing, installing and maintaining LAN/WAN and large communications networks
Recently consulted with vendor on Metro-E and T-1 Circuit DEMARC- point
Provide logical and physical network design layout
Build and maintain Visio documentation database of network topology
Design the layout for cable Installations
Help establish guidelines and standards for Change Procedures
Configure, install and maintain software and hardware in accordance with Security Technical Implementation Guide (STIG)
Hardware includes Cisco switches and routers, 6513, 4507, 3725, 3750
Develop System Security Plan (SSP), documentation and provide POA&M
Provide risk assessment using NIST standard security framework
Upgrade Cisco Routers, Switches and Firewall IOS using TFTP
Configured Cisco Routers (3725, 4507, and 3750) using RIP, OSPF, and EIGRP
Troubleshoot Windows 2003 Servers and streamlining the user policy.
IT- IT Ops Support Analyst III
World IT Solutions, Washington
03.2011 - 07.2011
For NSWC- Naval Surface Warfare Center, US Navy, Indian Head Division
Provided support and maintenance of infrastructure and information systems
2007 Exchange mail server, Server 2008R2 Active Directory user supports
Participated in architecture reviews to ensure that solutions comply with standards, user Policy Agreements and other documentation
Analyzed business requirements and 3rd party configuration software implementation of infrastructure solutions
Configured Guardian for data back-up and software- encryption
Maintained Dell PC’s and HP notebooks and perform Desktop management
Created documentation, testing and maintenance of applications, Microsoft Office Suite
Analyzed and corrected network troubles and performance issues
Help Desk, end-user Local Area Network Hardware and Software support
Configuration, and IOS updates (Cisco routers, switches)
Provided HP Desktop migration end user support and troubleshooting
Provided imaging/installation and software configuration Management
Platforms/Software included Dell, 2000/XP, MS Office Suite
Protecting Network data, monitoring network performance management and optimization
Provided desktop support for both software and hardware
Configured and installed application services
Network Administrator
Keller Graduate School of Management, DeVry University
02.2007 - 06.2010
Help negotiate hardware, HP, DELL, Gateway, software- Microsoft and Verizon circuit contracts for client
Designed customer’s office with fiber-optic cable for scalability and robustness to manage 500+ users
Installed various hardware and software operating systems, Linux, Windows NT, XP, Server 03, Oracle
Provided software and hardware, Exchange 2007 mail server, and Cisco 3600 router support
Installed and configured DHCP Client/Server and troubleshoot DNS queries
Serviced and Troubleshoot printers (HP laser, inkjet, and fax machine)
Enforced network SOP’s, login and user access restrictions, virus protection, OS updates, user rights and security policy requirements with campus sites
Coordinated with vendors such as Verizon on SLA and evaluated network statistics
Delegated to open incidents with vendors, Verizon T-1, PBX and T-1 PRI circuit failures
Junior Network Administrator
DeVry Institute of Technology
01.2004 - 02.2007
Provided Help Desk / End-user support for hardware, software and Windows operating systems
Maintained and created user accounts and policies within Active Directory
Imaged and prepared PC’s and laptops for distribution to the end-users
Developed problem solving and optimum trouble shooting abilities
Perform Troubleshooting end-to-end between the two sites
Supervisory MPA - Operations Manager at Department of Energy, Geothermal Technology OfficeSupervisory MPA - Operations Manager at Department of Energy, Geothermal Technology Office