Support Technician Resume Profile
Vulnerability Assessment:
- Enumerating open ports using NMAP
- Identifying network, application, and web vulnerabilities using Retina SCVI , Nessus ACAS , and BURP vulnerability scanners
- Building scalable scan policies to meet customer requirements
- Report writing
Server Administration:
- Installing and configuring Microsoft Server
- Active Directory administration
- DNS and DHCP implementation User and group account administration
- Configuring Sites
- Server monitoring and optimization Administering print services
Workstation Administration:
- Installing Windows 7 Professional/XP Using Microsoft Management Console and Task Scheduler Managing disks Installing and configuring TCP/IP Protocol Setting up and managing local user accounts Configuring group and local security policy Backing up and restoring data Implementing, managing and troubleshooting hardware devices and drivers
- Administering network printers
Firewall/VPN:
- Administering Juniper Netscreen, CISCO PIX Firewalls and VPN devices
- Configuring firewall policies
- Implementing Network Address Translation
- LAN-to-LAN VPN IPSEC Tunnel setup
- Creating and Maintaining VPN user accounts
- Cisco Systems/Juniper VPN Client configuration and setup
Load Balancing:
- Configuring and Administering load balancing on F5 BIG-IP Local Traffic Management platform
- Configuring Virtual Servers and Pools
- Assigning appropriate monitors and iRules
- Setup and monitor High Availability configuration
WAN/LAN Technology and Application:
- Router and switch configuration and troubleshooting on Cisco/Foundry/Brocade platform IP addressing, VLAN, and subnet design Configuring RIP, IGRP, and EIGRP, OSPF Routing Protocols
- VRRP-E implementation
- Frame Relay, Point to Point, HDLC
OBJECTIVE
To obtain a technical support position that will utilize my experience with personal computers to include computer security, network administration, installing software programs, troubleshooting various operating systems and hardware components while maintaining a strong working relationship with the user community.
QUALIFICATIONS
Strong ability to troubleshoot and problem solve hardware, software, and network issues. Excellent organizational, written, and verbal communication skills. Working knowledge of common operating systems, software applications, computer security implementations, and network protocols. Friendly presence and helpful attitude good interpersonal skills and the ability to work well with others.
RELEVANT WORK HISTORY
Confidential
Cyber Info Assurance Analyst 2
DISA FSO
- Support external vulnerability scanning of DISA CNDSP program customer base to include DISA, COCOMs and DOD agencies.
- Coordinate with DNCs and send out scan de-confliction notices prior to scans.
- Map system targets and identify vulnerable ports and protocols of target systems using NMAP.
- Identify unauthorized software and vulnerable applications using Retina and Nessus vulnerability scanner.
- Develop a comprehensive after action report/executive summary based on protocol and vulnerability findings.
- Maintain and manually enter new vulnerability findings within Vulnerability Management System VMS .
- Other duties as assigned by government customer, HP management, or NG team leads.
Confidential
NETWORK ENGINEER PROFESSIONAL
- Maintain basic data network hardware and systems investigate, resolve and escalate network and hardware matters of significance research, analyze and isolate errors assist in assessing and updating older networks as needed and in accordance with specified plan.
- Provide first line technical support on data network for internal and external customers answer basic technical questions recommend and implement approved course of action.
- Install and maintain network facilities, including hardware, software, and system data for small networks. Install network applications on network servers maintain, test, research and resolve problems. Determine appropriate standard testing routines or scripts test various data equipment such as routers, switches, firewalls, and load balancers for maintenance.
- Assist in the design and, implement and maintain various networks such as LAN and WAN systems in accordance with specified requirements. Prepare data network diagrams and drawings to document and assist in communicating current operation status of network.
- Perform data network configurations and configuration changes of various data equipment such as routers, switches, firewalls, load balancers, and multi-function switch systems, to enhance performance and security posture.
Confidential
OPERATIONS SUPERVISOR
- Oversee multiple 50 employees operating within a defined support operations area.
- Work with clients to develop, implement and review customer relations service improvement programs to enhance delivery of service.
- Implement core business processes and assist in process improvement initiatives in order to enhance customer service.
- Recommend changes to policies and establish procedures that affect immediate policies and procedures.
- Maintain communications with customer, staff, and management to ensure that service is delivered on time and within budget.
- Interact with subordinate supervisors, customers and functional peer group managers, normally involving matters between functional areas, other company divisions or units, or customers and the company.
- Leverage business, technical, and interpersonal skills to manage center operations, customers, and operations personnel.
- Train and evaluate employees to enhance their performance, development, and work product.
Confidential
LEVEL II SUPPORT TECHNICIAN/WORKING SUPERVISOR
- Answer incoming user phone calls and e-mails and work with customers to provide a resolution to these issues. Analyze, diagnose, resolve and document reported issues and outages.
- Determine severity, impact and nature of reported issues security or otherwise , relative to Help Desk operations and escalation procedures and ensure that all required information and updates are entered into help desk ticket tracking system within the required time frame.
- Identify and remove malware.
- Troubleshoot and setup wireless routers- ensuring correct security settings.
- Ensure all updates, clarification, and closures are appropriately communicated back to the customer in the required time frame.
- Creating, modify, and disabling LAN user accounts as required.
- Pro-actively identify and develop supplemental user documentation and resources to include operational policies, procedures, and guidelines.