We provide IT Staff Augmentation Services!

It Specialist/ Systems Administrator Resume

3.00/5 (Submit Your Rating)

SUMMARY

  • DoD Directive 8570.1 IAT Level II and IAM Level I certified Information Technology Specialist with 10+ years of experience capable of providing Tier I through III support, configuration management, acquisition support and staff leadership.
  • In - depth expertise in the implementation, analysis, optimization, troubleshooting, and documentation of LAN/WAN network systems.
  • Multi-task oriented professional with proven ability to work within or to lead diverse teams.

PROFESSIONAL EXPERIENCE

Confidential

IT Specialist/ Systems Administrator

Responsibilities:

  • Responsible for all Site-wide JWICS Command, Control, Communications, Computers, and Intelligence (C4I)
  • Ensure JWICS/SIPR/NIPR workstations, peripherals, communications devices and operating system/application software are properly configured for network operation, are on-line and are available to customers.
  • JWICS account management, network storage, local authentication servers, file servers, user privileges, local group policy, local software testing, restoration operations, contingency planning, and local backups
  • Perform JWICS specific system maintenance to install and maintain computers, servers, and all related software and hardware
  • Create/migrate JWICS user mailboxes, managed distribution groups, and mail contacts through Air Force NetIQ Directory and Resource Administrator (DRA)
  • Create/manage JWICS distribution lists, security groups and accounts in Air Force NetIQ Directory and Resource Administrator (DRA)
  • Implement software patches and security fixes as required by the network operations and security center or program management office
  • Manage network rights and access to systems and equipment
  • Use remote desktop and dameware to troubleshoot remote sites and provide support to local administrators in remote locations
  • Use ITSM/BMC Service Request Management Suite (Remedy) for trouble tickets
  • Ensure security patching is completed and locally downloaded, and also push JAVA, Notice to Airman (NOTAMS) and Time Compliance Network Order (TCNO) patches AF JWICS Enterprise are unable to perform
  • Perform investigative administration operations in support of Cyber Security Operations Center for malware, spyware, Trojans, or unauthorized software
  • Responsible for troubleshooting, network fault isolations, software upgrades to workstations and servers to include COTS and Government Off-The-Shelf (GOTS) software suites

SYSTEMS ADMINISTRATOR

Confidential

Responsibilities:

  • Provided SA for systems, servers, workstations, peripherals, communications devices and software are on-line and supported
  • Ensured servers, workstations, peripherals, communications devices and operating system/application software are properly configured for network operation, are on-line and are available to customers.
  • Assigned and maintained user IDs and passwords. Administer user privileges on the system
  • Performed routine system maintenance
  • Created/migrated user mailboxes, managed distribution groups, and mail contacts through Air Force NetIQ Directory and Resource Administrator (DRA)
  • Created/managed distribution lists, security groups and accounts in Air Force NetIQ Directory and Resource Administrator (DRA)
  • Implemented software patches and security fixes as required by the network operations and security center or program management office
  • Tested and validated the proper operation and configuration with appropriate patches and fixes, as required above, prior to restoring any device to the network.
  • Managed network rights and access to systems and equipment
  • Used remote desktop and dameware to troubleshoot remote sites and provide support to local administrators in remote locations
  • Used ITSM/BMC Service Request Management Suite (Remedy) for trouble tickets
  • Implemented security protocol’s, Information Assurance Vulnerability Alerts (IAVA’s), mitigating security vulnerabilities and risks based on current cyber security standards
  • Ran Assured Compliance Assessment Solution (ACAS) scans for Moody AFB footprint
  • Enforced Security Technical Implementation Guide (STIG) requirements using Security Content Automation Protocol (SCAP) scans for NIPR/SIPR servers
  • Responsible for troubleshooting, network fault isolations, software upgrades to workstations and servers to include COTS and Government Off-The-Shelf (GOTS) software suites

We'd love your feedback!