It Specialist/ Systems Administrator Resume
3.00/5 (Submit Your Rating)
SUMMARY
- DoD Directive 8570.1 IAT Level II and IAM Level I certified Information Technology Specialist with 10+ years of experience capable of providing Tier I through III support, configuration management, acquisition support and staff leadership.
- In - depth expertise in the implementation, analysis, optimization, troubleshooting, and documentation of LAN/WAN network systems.
- Multi-task oriented professional with proven ability to work within or to lead diverse teams.
PROFESSIONAL EXPERIENCE
Confidential
IT Specialist/ Systems Administrator
Responsibilities:
- Responsible for all Site-wide JWICS Command, Control, Communications, Computers, and Intelligence (C4I)
- Ensure JWICS/SIPR/NIPR workstations, peripherals, communications devices and operating system/application software are properly configured for network operation, are on-line and are available to customers.
- JWICS account management, network storage, local authentication servers, file servers, user privileges, local group policy, local software testing, restoration operations, contingency planning, and local backups
- Perform JWICS specific system maintenance to install and maintain computers, servers, and all related software and hardware
- Create/migrate JWICS user mailboxes, managed distribution groups, and mail contacts through Air Force NetIQ Directory and Resource Administrator (DRA)
- Create/manage JWICS distribution lists, security groups and accounts in Air Force NetIQ Directory and Resource Administrator (DRA)
- Implement software patches and security fixes as required by the network operations and security center or program management office
- Manage network rights and access to systems and equipment
- Use remote desktop and dameware to troubleshoot remote sites and provide support to local administrators in remote locations
- Use ITSM/BMC Service Request Management Suite (Remedy) for trouble tickets
- Ensure security patching is completed and locally downloaded, and also push JAVA, Notice to Airman (NOTAMS) and Time Compliance Network Order (TCNO) patches AF JWICS Enterprise are unable to perform
- Perform investigative administration operations in support of Cyber Security Operations Center for malware, spyware, Trojans, or unauthorized software
- Responsible for troubleshooting, network fault isolations, software upgrades to workstations and servers to include COTS and Government Off-The-Shelf (GOTS) software suites
SYSTEMS ADMINISTRATOR
Confidential
Responsibilities:
- Provided SA for systems, servers, workstations, peripherals, communications devices and software are on-line and supported
- Ensured servers, workstations, peripherals, communications devices and operating system/application software are properly configured for network operation, are on-line and are available to customers.
- Assigned and maintained user IDs and passwords. Administer user privileges on the system
- Performed routine system maintenance
- Created/migrated user mailboxes, managed distribution groups, and mail contacts through Air Force NetIQ Directory and Resource Administrator (DRA)
- Created/managed distribution lists, security groups and accounts in Air Force NetIQ Directory and Resource Administrator (DRA)
- Implemented software patches and security fixes as required by the network operations and security center or program management office
- Tested and validated the proper operation and configuration with appropriate patches and fixes, as required above, prior to restoring any device to the network.
- Managed network rights and access to systems and equipment
- Used remote desktop and dameware to troubleshoot remote sites and provide support to local administrators in remote locations
- Used ITSM/BMC Service Request Management Suite (Remedy) for trouble tickets
- Implemented security protocol’s, Information Assurance Vulnerability Alerts (IAVA’s), mitigating security vulnerabilities and risks based on current cyber security standards
- Ran Assured Compliance Assessment Solution (ACAS) scans for Moody AFB footprint
- Enforced Security Technical Implementation Guide (STIG) requirements using Security Content Automation Protocol (SCAP) scans for NIPR/SIPR servers
- Responsible for troubleshooting, network fault isolations, software upgrades to workstations and servers to include COTS and Government Off-The-Shelf (GOTS) software suites