Information Security (cybersecurity) Manager (isse)/systems Engineer/information Systems Security Officer (isso) Resume
Orlando, FL
SUMMARY:
- Highly organized, highly - dynamic, detail-oriented individual with strong multi-tasking abilities with over 16 years of Systems/Network Engineering, Administration and advanced Cyber Security experience.
- Proficient in Incident Response, SIEM, Cyber Threat Intelligence (CTI); identified delivery mechanisms, indicators of compromise within the IT infrastructure, motivation of attack if apparent, and identified the actor of the attack. Knowledgeable with Snort, WireShark, log analysis tools, MetaSploit (nmap, port scan, enum patches, ClamAV, various exploits within MetaSploit), Redline (auditing tool that collects all running processes, and drivers from memory, file-system metadata, registry data, event logs, network information, services, tasks and web history), Indicators of Compromise (IOC) analysis (IOC Editor), TCPDump, Windump, Rapid7, Advanced Persistent Threat (APT) analysis remediation.
- Experienced in establishing protection goals, objectives and metrics consistent with policies and procedures; secure configuration management (CM), creation of security update scripts to automate security response via: bash (linux), bat/powershell (Microsoft), java script, html, etc; contingency planning, incidence response and forensics activities utilizing a layered security approach and architecture as well as investigation of security breaches (personnel, physical security, software and hardware). Established Web Sites and web security through firewalls/NAT/DMZs/etc.
- Impeccable attention to detail with a focus on customer service and satisfaction.
- Experience with Splunk Security Information and Event Management (SIEM) infrastructure. Authored technical white papers for continuation of Splunk architecture deployment for customer. Configured data inputs to collect machine data; search, monitor, alert, and report on incoming data via search headers; indexers that provide data processing and storage for data and host the primary Splunk data store; forwarders that forward data to remote indexers.
- Strong understanding of audit and monitoring, risk/response and recovery, cryptography, cloud computing security, data communications, computer operations security, telecommunications and network security, security architecture and models.
- Experienced in the administration of Windows Active Directory Domain Controllers and Exchange Servers in an enterprise-wide environment with more than 12,000+ users in an extremely heterogeneous network. Astute technical knowledge in administering, hardening, and engineering of Microsoft, RedHat Linux and Unix Operating Systems and servers including Solaris, FreeBSD, HP-UX, Scientific Linux and Debian. Impeccable administrative and customer service skills.
- Advanced knowledge and familiarity with the following including but not limited to, within the areas of compliance, security standards, framework, audit and legislative regulations: National Institute of Standards and Technology (NIST) 800 series, DIACAP, Risk Management Framework (RMF), Common Criteria (CC), Federal Information Security Management Act (FISMA), Sarbanes Oxley (SOX), ISO 27001, OWASP Top 10, CNSSI 1253 series, various Department of Defense Instructions, International Organization for Standardization (ISO), Health Insurance Portability and Accountability Act (HIPPA), Health Information Trust Alliance (HITRUST), Control Objectives for information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), BCP/DRP, firewall audits, internal compliance/audit to internal standards, and agile methodologies.
- Proven project management skills through implementing programs, strategies, project control and status reporting, definition of performance metrics with concurrent projects, excellent responses to RFPs/SOW/CDRLs to align with budget/costs/financial controls/SLAs, proposal creations, and vendor relations. Excellent written and presentation skills.
- Creative, a sense of daring and a probing mind with a passion for learning and attainment of goals and challenges.
TECHNICAL SKILLS:
Public Key Infrastructure; Cryptography; Access Control; Disaster Mitigation; Risk Management; Network Management; Business Continuity; Information Assurance/Cybersecurity; Point-to-Point; Remedy/Jira/Confluence; C5I (Command, Control, Communications, Computers, Combat and Information) Diagnosis and Maintenance; LAN/WAN/MAN/SAN Administration; VoIP/Tandberg CISCO Routers; Telecommunications Equipment (Satellites); Cryptographic Devices and Communications Security Gear; Network Administration; Video Teleconferencing equipment; TACLANES; WSUS; Norton /Ghost; HTML/XML; McAfee s Host Based Security System (EPO, HIPS, PA, ABM, RSD, etc); SIEM (SPLUNK, Alien Vault, SolarWinds, LogRythm, McAfee s Enterprise Security Manager); Cybersecurity/Information Assurance; Computer Forensics; Bluecoat; Aruba Wireless VMWare X.X; Tenable s ACAS; Retina; Windows NT/2000/XP/ 2003/2008/7/810/2012 ; RHEL 5,6,7; SAMBA; Access Control; (RADIUS, LDAP, etc); MS Exchange Server 2003/2008r2/2012/2013; MS Server 2003/2008/2008 r2/2012; MS Proxy Server; Active Directory Domain Controllers; Unix; IBM WebSphere; NETAPP file storage; CISCO routers/switch Firewalls (Juniper, Fortigate); SCCM;VPN/RAS WAP/WEP DNS; Antivirus (McAfee/Symantec,etc); CISCO ASA 5XXX; Fortigate; FreeBSD; MS SharePoint; SQL 20XX/Oracle; VMS; eMass; WireShark; IPS/IDS; DISA STIG; Barracuda WebFiltering
PROFESSIONAL EXPERIENCE:
Confidential, Orlando, FL
Information Security (Cybersecurity) Manager (ISSE)/Systems Engineer/Information Systems Security Officer (ISSO)
- Cybersecurity (InfoSec) Manager/Information Systems (Cyber)security Engineer/Information Systems Security Officer (ISSO)/Systems Engineer responsible for the analysis, design, implementation, development, certification and accreditation (C&A), risk assessments, documentation, validation and verification (V&V), delivery, training and compliancy efforts for the continuous operations of information assurance/cybersecurity enabled multiple virtual simulation systems. Prepared and authored various scientific and technical reports in accordance with established Dept of Defense Information Assurance/Cybersecurity directives including but not limited to: DIACAP, Risk Management Framework (RMF), and other applicable publications. Extensive and advanced experience in preparing Information Assurance/Cybersecurity certification letters, Plan of Actions & Milestones (POA&M) to obtain an Authority-to-Operate (ATO) and Certificate of Networthiness (CoN); Security Technical Implementation Guideline (STIG) deviation lists; Operations Security (OPSEC), mitigation strategies, antivirus/patch management; vulnerability management, IA/Cybersecurity plans, risk and vulnerability management and security assessments, data loss prevention (DLP) through McAfee suite, risk mitigation strategies and management.
- Established protection goals, objectives and metrics consistent with policies and procedures; secure configuration management, implementation and integration of new systems/architecture; creation of security update scripts to automate security response, contingency planning, incidence response and forensic activities utilizing a layered security architectural approach as well as the investigation of security breaches (personnel, physical, software and hardware security); authored numerous acceptable use corporate policies and procedures in conjunction with IT, human resources; access control, analyzed systems for vulnerabilities, identification/authentication (SSO), cost benefit analyses reports, Public Key Infrastructure (PKI), encryption, audit and backup solutions, content filtering, website security/firewalls, design, implementation, deployment, and validation of security controls; identity management, security policy analyses, security governance, incident response.
- Understanding of OWASP Top 10, CWE/SANS Top 25 and remediation best practices, Computer Network Defense (CND)/Computer Network Exploitation (CNE), Computer Network Attack (CAN), safeguarded networked systems against unauthorized infiltration, modification, and destruction.
- Applied systems engineering (cybersecurity) principles in interdisciplinary and/or collaborative approach in technical planning, design, development, system integration and implementation, supportability and effectiveness analysis lifecycle balanced system of systems and system solutions. Evaluated customer/operational needs to define system performance requirements integrate technical parameters and assure compatibility of all physical, functional and program interfaces. Performed various analyses to optimize total security for system of systems and/or system architecture. Performed analyses for affordability, safety, reliability, maintainability, testability, human systems integration, survivability, vulnerability, susceptibility, system security, regulatory, certification, product assurance and other specialties secure quality factors into a preferred configuration to ensure mission success.
- Successfully configured, designed, and implemented Cisco Call Manager (CUCM X), CISCO routers/switches/VLANs/etc,, CISCO ASA 55XX firewall, WebSense, VMWare/hyperV, Windows 2012 R2, Active directory, PKI, authentication/authorization, network segmentation.
- An effective security architect for several enterprise-wide security projects, designed, implemented and deployed defense-in-depth infrastructure security architecture that included security controls across multiple technology stacks of the OSI model. Experienced in intrusion prevention/detection systems (IPDS), firewall configuration (Fortigate, Palo Alto, CISCO ASA 55XX), SIEM (Splunk, SolarWinds, etc) security assessment tool/methodology for networks (OSPF, BGP, VPN, FTP/SFTP/VSFTPD), systems, database and applications/web related protocols (TCP/IP, UDP, IPSEC, HTTPS, etc), web development, authentication and authorization schemes (Active Directory, LDAP, RADIUS, etc), gateways (web/email), DNS Security, Internet security, encryption, web filters (Bluecoat/proxies), advanced knowledge of web application, operating system, hardware, software, database, and network attacks, exploitations and defenses spanning the 7 layers of the Open System Interconnect (OSI) Model.
- Responsible for defining, building and implementing network test and compliance methodologies. Utilized black box/white box testing via industry standards/methodologies, functional testing, non-functional (performance, scalability, usability), analysis of user requirements, test design, test tools selection and regression testing. Established
- Developed security architecture requirements for LANs, routers/switches, firewalls, webservers, including the utilization of encryption/PKI. Strong understanding of application, system, network and enterprise-level security issues and methods, processes, and procedures to mitigate, remediate, and/or harden said security issues.
- Extensive experience in effectively installing, configuring and securing all major operating systems (Windows 7/8, Windows 2003/2008/2012, Red Hat 5.5-6.5, Unix, Linux, Android, Mac), tablets, wireless devices, routers, switches, hardware, databases, firmware, and virtualization solution (VMware ESXi, Vsphere, HyperV) clusters, Storage Area Network (SAN).
- Experienced in performing penetration tests (MetaSploit, etc), audits and vulnerability assessments using industry-standard vulnerability scanners (RETINA, Nessus, etc), implementing and hardening operating systems (Red Hat Linux, Microsoft desktop and server images), software, firmware, networked (routers, switches, firewalls) device. Installed, configured, integrated, and administrated HBSS McAfee security suite, Syslog servers and Nessus ACAS.
Confidential
Consultant (Splunk/Cloud/Security) (short term project)
- Migrated legacy applications to customer’s proprietary cloud infrastructure. Reviewed current Splunk Security Information and Event Management (SIEM) infrastructure and authored technical white papers for continuation of Splunk architecture deployment for customer. Provided technical feedback and support to the engineering group concerning the infrastructure-as-a-service (IaaS) and software-as-a-service (SaaS) strategy across a hybrid cloud infrastructure model (access/authentication/accounting *triple A*)
Confidential
Lead Systems Engineer
- Served as the lead Systems Engineer for the Marine Corps Biometrics Program-Afghanistan. Performed system engineering functions for hardware, network, and software components including but not limited to: requirements specification and management; product and design evaluation, trade-off and selection; human and systems integration; simulation and performance analysis in a laboratory environment; biometrics application (facial recognition, retina analysis, finger print analysis); designed and documented server builds and technical details for change control; built, tested and executed the installation of new or modified operating systems and applications software and hardware for desktop and server core images per Marine Corps customer requirements through the utilization of industry-standard deployment processes.
- Authored the Confidential Biometrics Program Systems Engineering and Migration Plan (SEMP) that articulated and communicated the technical planning and execution of the Biometrics Automated Toolset (BAT) system and the Secure Electronic Enrollment Kit II (SEEK II) through its System Development Life Cycle (SDLC); from the system’s migration to its end-of-life.
- Managed system resources including but not limited to: performance and capacity planning, availability, cyber security/information assurance, serviceability and recoverability of all high-utilization biometrics systems for the Marine Corps Biometrics Program-Afghanistan with an emphasis on: database and application design, engineering, and testing; database administration, management, installation, maintenance, and support of the SQL server and database architecture, optimization of stored procedures, and database troubleshooting; server scripting in an enterprise level utilizing Systems Engineering best practices to attain the highest and most logical outcome possible; engineered cyber security and information assurance solutions to attain the highest level of network security; modified and integrated existing system configurations; researched, tested, implemented, and integrated cutting edge COTS products, services and protocols into the network infrastructure.
- Managed networked appliances (Tipping Point, CISCO, Juniper).Diagnosed and resolved complex level-3 technical support issues that involved the production and application of the computing environment and components that are not functional. Installed, configured, administered and maintained Windows servers throughout a geographically dispersed configuration including but not limited to: WinServ 2008 r2, Active Directory, DNS, DHCP, WDS, IIS, WSUS, SCCM 2007, SCOM 2007, WebDAV, SQL 2008, .Net FrameWork, VMWare ESX-I cluster, backup through RAID, disaster and file system recovery, WireShark, Splunk, Logrythm, TCP/IP, MS SOAP, WebSphere and performance tuning of McAfee HBSS products and antivirus definitions.
- Built and maintained a secure network that stores cardholder (PCI-DSS) data, information (HIPPA), restricted access to data, tracked and monitored all access to networked resources storing cardholder data/information, regularly and methodically tested security systems and processes.
- Oversaw all aspects of the Marine Corps Biometrics Program-Afghanistan including, but not limited to: Enterprise Solutions Assurance, Information Technology Security (ITSEC); Cybersecurity/Information Assurance (IA); Information Security Governance and Risk Management and Vulnerability Assessment; Disaster Recovery Planning (DRP); Business Continuity (BCP) and Disaster Recovery Planning; Security Information and Event Management (SIEM); Access Control (Identity Access Management/LDAP/RADIUS,etc); Security Network Architecture and Design; and Customer Relationship Management.
Confidential, Fort Meade, MD
Systems Engineer (Cybersecurity)
- Supported research, development, testing and integration (RDT&I) of the Enterprise Network Mapping and Leak Detection Systems (ENMLDS) program for the Defense Information Agency (DISA) and Dept. of Defense (DoD). Provided Computer Network Defense (CND) situational awareness of the Global Information Grid (GIG) through the engineering, architecture, fielding, testing of network security sensors (Splunk, SolarWinds, etc) and products and developed solutions for the confidentiality, integrity, and availability of the GIG.
- Conducted internal and external network testing in a controlled environment to develop solutions for the production environment. Globally deployed and tested software/hardware solutions to the production environment using HP’s ILO suite of solutions.
- Spear-headed the development of the ENMLDS DoD Information Assurance Certification and Accreditation Process (DIACAP) packages to include: Security Plan of Actions and Milestones (POA&M), identified mitigation strategy/solutions, reviewed/mitigated findings via VMS/eMass, submittal of requisite accreditation and registration documentation for the DIACAP package, reviewed Information Assurance Vulnerability Assessment (IAVA) compliancy for the Dept of Defense ENMLDS program.
- Skilled in utilizing IT security audit tools to carry out activities related to the security certification and accreditation of assigned IT systems. Communicated with various customers on technical and engineering issues relative to product. Set and observed all technical and architectural standards as previously stated within the Statement of Work. Evaluated, tested, deployed, and maintained vendor-specific software and hardware for the Department of Defense production environment.
- Experience in areas of software design, hardware design, computer networking, cloud computing via a virtualized environment, operating systems, system design and manufacturing supporting server and storage products. Systems planning, configuring systems, installing software, providing guidance in technical meetings, defining standards, assisting with research and design for architectural issues, assisting/providing status updates, attending project meetings and implementation support of new applicationsImplemented authentication and authorization technologies including but not limited to usernames and passwords, Public Key Infrastructure (PKI), digital certificates, and two-factor authentication.
Confidential, Cherry Point, NC
Lead Systems Engineer/Cybersecurity Administrator
- Provided advanced systems administration and network management, engineering, maintenance, installation and refurbishment of over 67 Windows Server 2003/2008, 7 Redhat Linux 5.8 server, and 14 HP-UX servers; housing NetIQ, SAMBA, WebSphere, SQL database and various proprietary in-house applications for production utilization. Proficiently administered an active directory domain controller with over 2000+ users ; troubleshoot active directory domain controller related services and issues including but not limited to: Domain Name Services, DHCP, GPOs, LDAP, RADIUS, user and computer policy management, identity access management (IAM), directory domain controller replication issues, user and email management through active directory domain controller users and computers.
- Performed Information Assurance administration and maintenance on all 88 servers via defense and industry-wide standards utilizing DISA STIGs, Gold Disk, Security Readiness Review (SRR), Host Based Security System (HBSS), and Retina Network Security Scanner. Performed IBM WebSphere/webserver administration.
- Participated in various security compliance reviews, risk and vulnerabilities assessments, audits and review of planned and installed IT systems to identify vulnerabilities, risks, and protection of these assets to ensure confidentiality, integrity, and availability of these networked assets.
- Performed back-ups to data via VERITAS Volume Manager and NetApp Backup Manager. Created, installed, configured, and managed all aspects of the VMware ESXi environment including the installation of over 20+ ESXi hosts and over 10 VMware infrastructure servers and implementing updates and patches and fine-tuning the configuration to attain the best balance of performance resource and optimization and availability.
- Developed scripts for recovery, performance diagnostics and to stream-line administration via Shell, VBscript, BASH and Jscript. Proven installation and administration of Virtual Private Networks (VPN) per customer requirements.
Confidential
Authorized Service Interruption Manager/Security Operations Controller
- Provided a single point of coordination for communications connectivity, outage response, HAZCONs or events affecting systems and networks, and processed requests for Authorized Service Interruptions (ASIs) throughout the entire Greater Kabul Metropolitan Area including 5 major bases, and 12 forward-operating bases during real-time operations in Afghanistan, servicing over 12,000+ users. Monitored networks in an enterprise environment to identify and prevent unauthorized use and disclosure of information networks.
- Assisted 5 major technical control facilities in outage restorals. Directs operational adjustments to technical control, telecommunications transmission equipment, and Network and System Security Operations Center (NOC/SOC) to maximize optimal circuit up time.
- Oversaw and facilitated research, evaluation, and the secure selection of hardware, software, and product standards, infrastructure projects to harmonize customer requirements. Conducted performance testing of new technologies as required on all upgrades to the existing infrastructure. Ensured proper procedures and governance reviews were followed based on directives, etc.
- Provided technical support and information assurance (cybersecurity) initiatives to over 20 Windows 2003/2008r2 active directory domain controller with over 500 users and messaging services, and 1200 computers in a highly demanding work scenario. Reviewed and analyzed alerts and logs from SIEM appliances (McAfee Enterprise Security Manager, SolarWinds, Splunk, Logrythm) IPDS, AV, and other security threat data sources.
- Provided technical and operational support to manage and maintain situational awareness of the Army strategic communications infrastructure within the Greater Kabul Metropolitan Area. Validated and verified systems and infrastructure-level connectivity for ongoing operations.
THEATER NETWORK AND SECURITY OPERATIONS CENTER WATCH OFFICER (NOC/SOC) ( )
Confidential
- Monitored, corrected and modified access control lists (ACLs) by manipulating CISCO series routers as needed to improve systems and networks for over 55 medium to large networks spanning a global wide area network (Global Information Grid.
- Administered and troubleshoot 15 internal and external DNS servers running RedHat Linux 6.0 within the Department of Defense (DoD) unclassified and classified domains. Acted as the lead shift systems administrator providing guidance and direction to less experienced employees with; adding/deleting users, creating security groups and distribution lists, managing GPOs, network security through IAVAs and information assurance/security, file permissions, file system integrity, troubleshooting active directory domain controller issues of over 100+ active directory domain controllers.
- Assisted in securing networks and ensured government standards of command and control information security protection measures were maintained within the Security Operations Center. Performed incidence detection and response while conducting analysis of security log data while analyzing and recommending mitigation techniques for cyber threats by using SolarWinds and LogRythm SIEM solutions. Skilled in manipulating perimeter firewalls and Intrusion Protection/Detection System and McAfee’s Host Based Security System suite.
- Established and provided IP services, Internet services and electronic mail connectivity to various Naval organizations expanding a globally dispersed area through DNS transfers of MX records, A records, SOA records, and NS records.
- Served as the lead engineer that provided direction to junior personnel for organizations requesting expeditious IP connectivity for web browsing and electronic mail by means of querying recursive lookups through cached local DNS records, querying DNS Top Level Domains (TLD), and querying authoritative DNS servers through the Global Information Grid (GIG). Effective DNS security engineer for a major Network/Security Operations Center (NOC/SOC) using network monitoring tools (SIEM, Solarwinds, Splunk, WebSense, etc).
- Maintained, troubleshoot, monitored, responded and reported on network security infrastructure systems and services, and information assurance; including but not limited to: network security log analysis, firewall maintenance and monitoring, IPS fine tuning and administration, intrusion anomaly detection and analysis, and trend reporting for management review. Implemented operating systems hardening best-practices and procedures through security applications to achieve a comprehensive network, application, database, hardware and system security. Drafted and recommended procedure changes that ensures effective and efficient management of IT assets through the assets life cycle.
Confidential
Senior Information Management Officer
- Managed, administered, and configured Windows 2003 servers for 760 user accounts spread across Afghanistan. Administered, engineered and managed SharePoint portal for the Joint Improvised Explosive Device Defeat Organization (JIEDDO) Counter-IED (CIED) division supporting the entire Afghanistan area of responsibility.
- Conducted information assurance/cybersecurity audits and reviews of hardware, software, and service asset data to ensure that system’s operation and management are in compliance with established Department of Defense directives.
- Experienced in utilizing web authoring tools including HTML, XHTML, XML, CSS, WebSphere, and web forms to improve public-facing websites.
- Installed and administered the Biometric Automated ToolSet (BATS) utilized for counter-insurgency techniques in support of the JIEDDO initiative. Focal point for the integration and deployment of the Handheld Intragency Identity Detection Equipment (HIIDE) to various Forward Operating Bases across Afghanistan.
- Exemplary resourcefulness in delivering and providing network, system, and cybersecurity support to five organizations, 9 servers in an active directory domain, 650 workstations, 760 user accounts at 27 Forward Operating Bases across Afghanistan. Routine maintenance in an Active Directory environment of over 760 user accounts. Personally corrected over 1,200 technical deficiencies through trouble call responses.
Confidential, San Diego, California
Lead Systems/Network Engineer
- Data Center Engineer who responded to over 450 trouble calls, directly supporting over 5,000 Confidential Users in conjoining Navy and Marine Corps installations throughout the United States within the Network Operations Center and Security Operations Center in an enterprise level. Maintained and administered over 230 CITRIX Xen App clients to enable application delivery to end-users in a Windows environment.
- Engineered and maintained servers, hardware, routers, switches, software, etc that provided cloud computing platforms/stacks to over 12,500 clients/users via infrastructure-as-a-service (IaaS) as virtual machines; software-as-a-service (SaaS) of help desk, human resources, and web services applications; identity-as-a-service (IDaaS) of user credentials (access management) through secure implementation of single sign-on, directory services, and authentication services in a virtualized cloud computing environment.
- Proficiently administered over 7000+ Active Directory domain controllers including but not limited to: setting up network/file access restrictions; troubleshooting of user accounts, user account creation/deletion, backups and restores procedures through MS Active Directory domain controllers; virus protection through Symantec/McAfee anti-virus solution; authorization/authentication/accounting; web content filtering; firewall administration; patch management services; group policies through GPO. Supervised and mentored civilian and military personnel to conduct effective NMCI troubleshooting procedures. Maintained, and managed data storage, e-mail, information assurance/security and web services through real-time monitoring, fault recognition, isolation and resolution.
- NMCI Field Engineer processed, tracked and resolved over 2,000 trouble tickets to over 12,500 users in a highly dynamic and demanding organization. Utilized Remedy Ticket Tracking System to document and resolve cases. Utilized Norton Ghost and other reimaging software for reimaging high-level computers for production utilization.
Confidential, Sasebo, Japan
Systems Administrator
- Completed the migration of Windows NT server to Windows 2000 server environment for 3 medium to large size organizations. Administered an active directory domain of over 30 servers with exchange email services, file/print, DHCP, various application, antivirus and patch management on all servers within various classified (SIPR/CX-I) and unclassified (NIPR) domains for 4 medium to large size organizations consisting of over 6,000 users. Assisted in the migration of over 2500 workstations from Windows NT to Windows 2000. Troubleshot 4 network servers, 200 user profiles, cannibalized and rebuilt over 50 computers.
- Implemented Public Key Infrastructure (PKI) and information assurance initiatives in a large size organization, contributing to a more secure environment.
- Primary WebMaster for 4 medium to large size organizations, facilitating optimum information dissemination throughout the Pacific Fleet area of responsibility.
Confidential
Technical Control Facility (TCF) Shift Supervisor
- As the Technical Control Facility (TCF) Shift Supervisor, provided a full spectrum of capabilities in support of low probability of interception and low probability of detection of global voice and data communications operations throughout the Fifth Fleet Area of Operations during real, war-time operations. Trained and lead junior technical control facility personnel in the day-to-day operations of the TCF.
- Impeccable support to both secure and non-secure communications and transmission systems which included but not limited to: local area networks, wide area networked systems, network management equipment, asynchronous transfer mode (ATM) equipment, internet protocol (IP) equipment, channel banks, high-to-low level multiplexing systems and equipment, satellite communications (SATCOM), switching systems, channel service units/digital service units (CSU/DSU), cryptographic equipment and interfaces, test and patch facilities, signal conversion, interface equipment, single and multi-mode fiber optics, emission control and security (EMCON/EMSEC), communications security (COMSEC), electronic keying management system (EKMS), fiber optics, multiplexing equipment, laser, wireless, radio frequency (RF), UHF/EHF/SHF, MLOS, microwave frequency, tactical interfaces, fiber-to-copper and copper links, repeaters, switching protection, information assurance/security and cryptographic equipment.
- Responsible for proper performance of quality control checks, isolating disruptions, and coordination of restoral of over 600 Department of Defense communications circuits traversing ultra-high frequency, super high frequency, extremely high frequency, and fiber optic mediums.
- Assisted in over 150 communications upgrades and installs. Configured circuits, networks, and systems based on DISA standards, and the results of quality assurance testings.