| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Street Address Direct # PHONE NUMBER AVAILABLE EMAIL AVAILABLETechnical SkillsHardwareApple/MAC products, Dell PC, Cisco routers 2800 seriesCisco Switches 2950 series, Hubs, Install/remove hardware or upgrade systems, Install thin clients andBackup systemsNetworkingTCP/IP & LAN/WAN Protocols Sub netting VLSM, DHCP, DNS, Active Directory, Rip routing, OSPF, and EIGRPSoftwareACAS, NARCS, SCAP, HBSS, QTIPv5, STIG Viewer, MS Office 2007 2019, VMware ESXI, Apache Tom Cat, Solaris, RHEL 7, Adobe Pro, SQL, Visual Basics, Cisco Packet Tracer, Outlook, Wireshark, Nitro IDS/IPS, McAfee, IBM Netcool Omnibus, and EMASSLanguagesRaptr, C++, PythonOperating SystemsCisco IOS version 12.1, Linux Red Hat 6-9, Solaris 10, Windows XP 2010, Windows Server 2003-2019, Mountain Lion, Android mobile, Apple IOSEducationITT Technical Institute - Owings Mills, MDBachelor of Science in Cyber Security December 2013Bachelor of Science in Information Systems Security September 2013Cumulative GPA 3.3ITT Technical Institute - Owings Mills, MD December 2011Associate of Applied Science Degree in Information Technology - Computer Network SystemsCumulative GPA 3.3CertificationsCASP + CertifiedJuly 2022-2025CSAE CertifiedJuly 2022 -2025CSAP CertifiedJanuary 2022-2025CYSA + CertifiedJanuary 2022-2025Security + CertifiedFebruary 2022- 2025Linux + CertifiedJune 2018Work ExperienceObviate Virtual Technical Solutions LLC Aug. 2022 PresentSenior I.T. SpecialistTeam Lead Handling tickets / requests to Troubleshooting technical issues for PCs, Servers, Switches, and Routers.Install and update McAfee Security for ExchangeOccasionally deliver Servers, Switches, and PC to affiliate companies and clientsMitigate Vulnerabilities on Network and Workstations for Nessus.Install Backup Storage on Desktops and Servers to Azura Cloud Infrastructure.Building and configuring Servers, PCs and laptops as well as loading/managing software (AD DHCP, DNS) and applications like outlook, Wi-Fi, VPN and Backup Setup.Proficient experience with one or more of the following: SCCM, Active Directory, Exchange, VirtualizationExperience with integrating windows environments with monitoring solutions such as Microsoft SCOM and Splunk.Proactively Analyze System Logs and Events with SIEM tools to troubleshoot relevant threats, and provide intelligence briefings to stakeholders.Provides technical leadership for the integration of requirements, design, and technology and incorporates new plans, designs and systems into ongoing operations.Broad Leaf Jan. 2020 Aug 2022Information Systems Security OfficeProvide Cybersecurity testing and security control validation and assessment of technical and non-technical security features implemented on a system or network in support of the DoD RMFExperiences include but not limited to: Enterprise Mission Assurance Support Service (eMASS); authoring comprehensive RMF packages independently; performing technical security assessments, developing Plans of Action & Milestones (POAMs)Verify System Performance, availability, and report System Metrics with McAfee Vulnerability Manager. Provide disaster recovery and business continuity documentation for all key systems, data, and services.Proactively Analyze System Logs and Events with SIEM tools to troubleshoot relevant threats, and provide intelligence briefings to stakeholders.Implemented NIST-800-53 Standard requirements to manage Network Devices and McAfee Threat and Intelligent.Provide compliance with Security Technical Implementation Guides (STIG), Security Requirements Guides (SRG), and checklistsExerts some influence on the overall objectives and long-range goals of the organization.Assist in drafting Authorization to Operate (ATO) packages for new and existing systems.Ensure appropriate changes and improvement actions are implemented as required. Maintain current knowledge of authenticator management for unclassified systems.Ensure compliance with protection requirements, control procedures, incident management reporting, remote access requirements, and system management for all systems under scope.DMI Solutions April 2018 Jan. 2020Linux System EngineerConfigures and manages Linux operating system software, troubleshoots, maintains integrity, and configures network components along with implementing operating systems enhancements to improve reliability and performance.Monitor devices connecting to networks using WANDL, Netcool Omnibus, SNMP Agent, & E Health Juniper networks.Implemented NIST-800-53 Standard requirements to manage Network Devices and Software.Create backup OVF/ OVA files for VM ware EXSI.Install McAfee Agent on both Linux and Windows Platform.Mitigate System Vulnerabilities via ACAST and SCAP Vulnerability Scanning toolsUpdate the set of configuration management scripts (written in Python) to include the latest patch. Execute scripts against a master inventory of servers.Perform database upgrades, resources capacity planning, platform migrations, for the SMCII applicationMaintains basic security and recovery procedures such as scheduling and backups.Maintained data base security via unique database roles and object permissions. Modify database files to decrease cloning, backup, and restoring time.Provides support for implementation, troubleshooting, maintenance, and verify system logs of Netcool and Safenet Applications.Utilize SCAP tool to Scan and STIG VM Ware, Solaris, RedHat, IBM Netcool Omnibus, and CCV Database installed on LDOMs.Assist the Cyber Team with developing POAMs and mitigate the findings.Manages IT system infrastructure and any processes related to these systems. Provides support to IT systems including day-to-day operations, monitoring and problem resolution for all the client/server/storage/network devices, etc.Makes recommendations to purchase hardware and software, coordinates installation, and provides backup recovery.Develop and monitor scripts, policies, and standards for allocation related to the use of computing resources.TM3 SolutionsCyber Security Specialist Dec 2017 Apr 2018Providing support to plan, coordinate, and implement the organization's information security program.Proactively research relevant threats, provide intelligence briefings to stakeholders and produce reports and intelligence product.Providing support for facilitating and helping agencies identify their current security infrastructure and define future programs, design and implementation of security related to IT systems.Overseeing the efforts of security staff to design, develop, engineer and implement solutions to security requirements. Implemented NIST-800-53 Standard requirements to manage Network Devices and Software.Being responsible for implementation and development of DHS IT security processes and policies.Gathering and organizing technical information about an organization's mission goals and needs, existing security products, and proprietary applicationsPerforming risk analyses,using Mcafee Auditor which also includes risk assessment.Respond to corporate requests as requiredDevelop a Plan of Action and Milestone for security findings that need to be resolved.SRI Technologies APG, MDCyber Security/IA Dec 2016 Nov 2017Perform detailed assessments and audit reviews with McAfee Policy Auditor to regulated workflow environments and threats to ensure compliance to corporate security policies and standards using McAfee Vulnerability Manager.Perform cyber threat intelligence operations including intelligence collection (IOCs), tracking threat actors, identifying and tracking malicious infrastructurePerform general and application control reviews using STIG Viewer for computer information systems.Perform SCAP, QTIP, and ACAS Scans, to review computer and network information to determine which systems are compliant based on vulnerability tracking. Quarantine Non-compliant systems using HBSS.Implemented NIST-800-53 Standard requirements to manage Network Devices and Software.Report new IAVMs as they become available Provide disaster recovery and business continuity for all key systems, data, and services.Perform reviews of internal control procedures and security for systems under development, enhancement releases and existing systemsConduct operational, compliance, and investigative audits, as assignedPrepare audit finding memoranda and working papers to ensure adequate documentation exists to support completed audits and conclusionsCreate artifacts, including documented policies, procedures, diagrams and other materials required for remediation and compliance evidence to comply with internal and external auditing requirementsDevelop and drive the completion of audit finding remediation plans to achieve baseline compliance for identified deficiencies and control weaknessesFacilitate the completion of remediation efforts with IT, Business and vendor stakeholdersFollow up on audit findings to ensure management and control owners have taken corrective actionsSupport IT SOX auditing activities for interim and year-end testing cyclesPerform monthly access and entitlement reviews across applications to identify where unauthorized access is granted and can be removedDiscover and document internal computer information systems to validate usage, functionality and riskVectrus Baltimore, MDSys Admin/PC Technician II Jun 2016 Dec. 2016Installs, troubleshoot services, and repairs personal computers, network equipment such as servers, modems, multiplexers, related PC software, telephones, cables, and connectors.Provides personal computer hardware, and software support. Install patches, updates, and services. Repairs personal computers. Connects personal computers and terminals to existing data networks.Instructs users in the use of personal computers and networks.Create private and public database links for specific user accounts.Recover control files from media failureInvestigates information, network, and communications needs of users.Remote in or travel to other locations to provide technical services to solve PC issues.Gryphon Technologies Washington D.C. Sep 2015 Jun 2016System Administrator/IT SpecialistAssign configuration of authentication and authorization of directory services.Follow security and data recovery procedures such as scheduling and backupsResponsible for the companys technological needs including- procuring employee computers, printers, and any other technical equipment the company may need.Administer servers, desktop computers, printers, routers, switches, firewalls, phones, smartphones, software deployment, security updates and patchesInstall and support LANs, WANs, network segments, Internet, and intranet systems.Install and maintain network hardware and software.Identify technical problems and research solutionsDeploy and manage mobile phone acquisition and maintenanceBasic networking such as TCP/IP, switches, infrastructure, active directory, exchange Operating systems such as Windows 7 Standard applications such as MS office and Adobe Plus Server such as VM ware, backup exec.Monitor networks to ensure security and availability to specific users.LEIDOS (GTS) Edgewood, Maryland Feb 2015 Aug 2015Help Desk Analyst Support end user requirements and questions concerning E9-1-1 systems, FPS2 systems, and AtHoc enterprise IWSSupport end users with Software Administration, alerting, and self-registration. Analyze root causes and provide input into problem management processes. Handle troubleshooting incidents. Monitor tickets and processing tasks. Assist with installations, assist with deploying s/w patches/fixes, and assist with testing to confirm proper functionality. Exercise discretion and independent judgment while providing incident support. Plan, organize and prioritize tasks to complete work as scheduled and to meet deadlines. Investigate, solve problems and provide support to customers, vendors and employees.Northrop Grumman (MCSG) Aberdeen, Maryland Jan 2014 Feb. 2015System Administrator IITier Two Department of Defense Network Operations Center (NOC)Responsibilities included: NOC Monitoring Technician; routinely monitor multiple satellite channels, ensuring data is being provided to and received from US soldiers in hostile environments around the world. Troubleshoot real time issues and Storage BackupsProvide customer service, via telephone, e-mails and web application chat sessions. Interact with multiple satellite vendors for technology related issues.Migrated data from Oracle 10g R2 database on UNIX to Oracle 11g on a Linux platform.Update data in tables, add/remove primary keys, foreign keys, Unique constraints, and utilizing aggregate functions.Track incidents using internal ticketing system. Produce incident reports, documenting the issues and steps taken toward resolution in shift logs. Act on issues in timely manner based on S.O.P documentation.Configure, install, and move network printers as needed;Trouble tickets are escalated to the appropriate available resource when or if it becomes necessary.Experience in SNMPC, Network monitoring software.Create Virtual topologies and virtual networks in VMware.Experience navigating Red Hat Enterprise and utilizing Linux as Super User.Proficient in utilizing re-mote access to trouble shoot issues off site locations.Basic networking such as TCP/IP, switches, infrastructure, active directory, exchange Operating systems such as Windows 7 Standard applications such as MS office and Adobe Plus Server such as VM ware, backup execProficient in processing classified and unclassified materials.Experience utilizing Nitro IDS/IPSSIMS Formerly E-Structors, Baltimore, MD June 2012 Oct. 2013EBay Specialist/Computer TechManage Internet SalesUpload pictures of items and post items on eBay.Supervised Techs and advised them to upgrade PCs for profit.Run diagnostic test and diagnose PCsFix and refurbish laptops, PCs and IMacs, G5/ MAC Book Pro desktops and laptopsPerform Migration from XP to Windows 7Secure customers information and remain PCI DSS complaintReview data entry about material assets and make changes |