We provide IT Staff Augmentation Services!

Network Engineer Resume

0/5 (Submit Your Rating)

Fort Drum, NY

OBJECTIVE:

  • Red Teamer and previous Systems Administrator with 10+ years of Information Technology experience in a wide variety of industries including private military,, and food distribution. All of my experience has helped me build a strong foundation in business networking and security technologies. Self - motivated with proven background exceeding revenue and customer service goals, business, sales, manufacturing, logistics, and in different sectors utilizing excellent communication and organizational skills. Decisive and strategy minded, problem solver with a talent for budget analysis, development and reporting in accordance with all company goals.

TECHNICAL SKILLS:

OS & Enterprise Apps: Windows 2008 R2/2012 R2 Server, Exchange 2003/2007, Symantec Norton Anti-Virus Enterprise ed., Norton Ghost, pcAnywhere, Trend Micro, VMWare, Veritas Backup, Acronis Solutions, VNC, RDS, Nortel, Avaya, Altiris Solution, SunOne Solaris 10, Zantaz, Samhain, OSSEC, Tripwire, ESXi servers, ACAS, Aruba AirWave, CounterAct Forescout, BNA, NNMi

Technologies & Protocols: Active Directory, LDAP, DNS, WINS, DHCP, RIS, Remote Desktop, IIS, NAT, TCP, IP, UDP, ICMP, NFS, VLAN, 802.11x, 802.1x, VPN, FTP, HTTP, SSL, EIGRP, BGP, MPLS, OSPF, QOS/VLANS, DMVPN, Cisco 4G Mobile Router, VPLS, DMVPN, IPSec, QOS, STRIDE, FAIR, AppScan, WebInspect, Cenzic, Burp suite, Nessus, Metasploit, NMAP, Nikto, Maltego, Synchronous Optical NETwork (SONET), Voice Circuit, IDS/IPS, Network Access Controls (NAC), Testing/Provisioning, symmetric/asymmetric, ECB/CBC operations, AES, OWASP Mobile and Web application vulnerabilities, Web App Testing, BurpSuite, Network security testing, Information Risk Management, Security Audit, Ethical Hacking, Firewalls/Security Devices, Penetration Testing (Network, WebApp, Mobile, Car, USB Forensics, Android, iOS, WiFi, Windows, Linux), Log File Analysis, ISS, SATAN, OSSTMM, NIST, ITIL, OWASP, PCI, FISMA, GLBA, HIPAA, Wireshark, Nmps (including dnamp and Zenmap GUI), Citrix Zenapp, Qualys Guard, FireEye, Splunk, TCPDump, Discover script, Metasploit Framework, Armitage,, W3AF, linset, maltego, Beef, Nikto, OWASP Zap, SQLMap, Webscarab, Crunch, Medusa, Ophrack, gi/Kismet, macchanger, mdk3, wifite, etc

Connectivity & Hardware: Cisco 2500, 2600, Catalyst 1900, 3500, Brocade fabric (Brocade MLX 4, Brocade ICX 7450, ICX 6610), Aruba (3810 series, Airwave, 7240 Mobility Controllers, 330 AP Series), ProLiant server, Intel Express 410T, 460T, 535T, Watchgaurd Firebox 700, SOHO|tc, Juniper, Palo Alto, BlueCoat, Netgear, Routers, Switches, Wireless, PPPoE, Ethernet, Fast Ethernet, Gigabit Ethernet, Cable/DSL Modem, T1, T2, T3, etc

Desktop Technologies: Windows 7/8/10, Mac iOS, Unix, Plop, Linux (Kali, ArchLinux, BlackArchLinux, Cyborg-hawk, Tails, WiFiSlax, Vyatta, Metasploitable 2, Fedora, Ubuntu, etc.), Android Products, Apple Products, Microsoft Office Bundle 2016: Word, Excel, Access, Power Point, Outlook, Lotus Notes V. 8, Google Chrome/incognito, Internet Explorer, Mozilla Firefox, Tor/Bundle, BlackBelt Tor, ActiveSync for PDAs & Smart phones, Blackberry Manager, Anti-Virus software bundles, Scanners, Digital Cameras, Desktop and Networked Printers.

Additional Languages: Arabic (Fluent), French (Fluent), German (In Progress), Greek (in Progress), Python, HTML/CSS, Bash

Volutneer & Social: Volunteer in St. Patrick s church mission to pray for the need. Volunteer in Fort Drum, NY special and social events

PROFESSIONAL EXPERIENCE:

Confidential, Fort Drum, NY

Network Engineer

Responsibilities:

  • Provide overall network infrastructure support to routing and switching equipment.
  • Provide overall network infrastructure support to firewalls and IDS/IPS.
  • Ensure the LAN/WAN is capable of providing required services by supporting the network infrastructure through the use of troubleshooting and problem resolution in a production environment.
  • Performing complex tasks associated with the planning, development, management, and enforcement of approved IT and communications architecture in order to ensure alignment with the broader business architecture
  • Participating in system integration efforts by working closely with a number of different customers as well as IT professionals in order to manage a large number of simultaneous deliverables.
  • Promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations' visions and goals.
  • Ensuring rigorous application of information security/information assurance policies, principles and practices in the delivery of all IT services.
  • Provide daily operational support for LAN/WAN networks, including firewalls.
  • Assisting in the planning and implementation of local area networks (LAN)
  • Plan, install and support hardware and software upgrades.
  • Installing, configuring, maintaining, monitoring, and troubleshooting networks and systems
  • Resolved technical issues associated with network and routing protocols at all levels of the OSI model through the use of diagnostics and network administration tools such as Confidential (HP) OpenView, Cisco Works and Tivoli.
  • Proficient in Management Information Blocks (MIB) and MRTG to measure, plan and execute methodologies to ensure high performance levels and minimum downtime.
  • Responsible for maintaining LAN - WAN barrier systems to prevent unauthorized access to MTF systems.
  • Ensure that IT security weaknesses identified in external or internal audits are documented.
  • Coordinates Disaster Recovery efforts, contingency planning, and testing of approaches for: incorporating NDC contingency planning into local plans; testing site's disaster recovery plan.
  • Conducting analysis of network usage, user complaints, and traffic interruptions
  • Configuring and maintaining Cisco firewalls, Cisco, Brocade, Aruba, Alcatel, Confidential - Confidential, Nortel and NetScreen VPN devices and IDSs according to DISA and DHA standards and requirements.
  • Conducting analysis of network usage, user complaints, and traffic interruptions
  • Coordinating the implementation of IT security programs across platforms; establishing IT vulnerability reporting criteria; evaluating IT security incident response policies; identifying the need for IT security changes based on new technologies or threats.
  • Reviewing proposed new systems/networks/software for potential IT security risks.
  • Instituting measures to ensure IT security awareness/compliance.
  • Troubleshooting IT security problems that affect the availability of applications.
  • Updating firmware for Brocade switches and Firewalls, Cisco firewalls, Cisco, Alcatel, Confidential - Confidential, Palo Alto firewalls, Nortel and Juniper NetScreen VPN devices and IDSs up to DISA and DHA standards and requirements.
  • Running ACAS scans against all network equipment for vulnerability and compliance.
  • Running ForeScout scans against all network equipment for vulnerability and compliance.
  • Running STIGs using HYATT on all network equipment for compliance compatibility up to DISA and DHA standards.
  • Running vulnerability patching for network equipment for security and compliance.
  • Facilitate and coordinate the gathering, analysis and preservation of evidence used in addressing security violations.
  • Conducts risk and vulnerability assessments to identify vulnerabilities, risks, and protection needs.
  • Gather latency statistics and find specific network bottlenecks.
  • Planning, installing and troubleshooting transport circuits between military installation and DISA.
  • Evaluate problems and implement fix actions through device reconfiguration or replacement depending on the circumstances.
  • Configuring Brocade, Cisco switches and routers to join production environment as a master, or secondary in stack.
  • Working with technical support personnel in resolving critical problems
  • Maintenance of Brocade distribution and edge fabric infrastructure
  • Evaluate and suggestion possible solutions for projects such as Vocera installation.
  • Design, planning, and implementation of Vocera network and telephony implementation
  • Configuration and installation of Aruba wireless AP and controllers.
  • Wireless infrastructure monitoring through Aruba Airwave and connection troubleshooting.
  • Generating monthly Visio network diagrams and reporting with details.
  • Installation, configuration and maintenance ESXi, vSphere, and VM guests.
  • Installation and configuration of Windows Server 2008/2012 Army Gold image.
  • In depth knowledge of port scanning and network recon.
  • Used Wireshark for packet capture and PCAP analysis.
  • Wireless auditing and packet captures for troubleshooting purposes.
  • Obtain and leads client engagements and projects.
  • Engaged in 5 simultaneous projects in the same time with different vendors and requirements.
  • Network gear firmware/bootrom upgrade.
  • Troubleshooting WAN circuits for local and remote locations.
  • NPS (Network Protection Suite) update and upgrade.
  • Fiber connections troubleshooting.
  • Port activation.
  • AAA & Radius configuration
  • Baseline configuration tweaking and implementation
  • Remedy tickets system.
  • Plus other responsibilities and duties

Confidential, New York, NY

Cyber Security Analyst

Responsibilities:

  • Network Vulnerability scanning using Nessus, OpenVas, Nikto, Nexpose, Qualys Guard.
  • WebApp pen testing using Zap, Fortify, AppScan, BurpSuite, Vega, Wapiti, W3af, WebScarab, Skipfish, Ratproxy, SQLMap, Wfuzz, Grendel-Scan, Watcher, Arachni, and other tools.
  • Assess and work with vulnerability findings from vulnerability scanners based on severity level and platforms.
  • Articulate vulnerabilities and remediation to varied audience
  • Exploit, CVE, CPE and CVSS research
  • Threat modeling using a collection of methods such as STRIDE, P.A.S.T.A. (Process for Attack Simulation and Threat Analysis), and other different threat models.
  • Research and operationalize application risk identification platforms and tools (e.g. threat modeling, static code analysis, dynamic vulnerability assessment).
  • Security strategy assessment and design.
  • Used Nmap to perform port scanning, OS & service fingerprinting, and network mapping
  • In depth knowledge of port scanning and network recon
  • Used Google Dorks to find vulnerable websites and perform recon on targets
  • Used Recon-ng for information gathering
  • Recon with Windows, android and Linux native OS tools
  • Used Wireshark for packet capture and PCAP analysis
  • Wireless auditing and packet captures with aircrack suite
  • Experience using Maltego to perform passive recon on targets
  • Hands on experience writing port scanners and network recon tools in Python
  • Obtain and leads client engagements and projects.
  • Conduct Penetration/WebApp tests on regular basis using OWASP and OSSTMM
  • Building different Penetration/WebApp Testing thorough reports (Executives reports, IT management reports, IT professional reports) using different tools.
  • WebApp and software security analysis.
  • Penetration Testing reports presentations with possible solutions to different management segments.
  • Ability to work closely with French, Arabic, English speaking clients in different continents.
  • Traveled and lead projects in Middle East, Europe, Asia clients based locations and branches.
  • Assisting clients with identifying and assessing information system security related risks and defining best practices as a trusted advisor.
  • Actively participate in client discussions, meetings, and business development opportunities.
  • Work collaboratively and integrate with the clients’ internal team in delivering the highest quality service to their managers/organization; interact directly with their clients on a regular basis to better understand and serve their needs.
  • Ability to work in a fast-paced, demanding environment under high stress with critical thinking.
  • Strong understanding and demonstrated experience applying a risk-based approach to information security and security assessments using DREAD,
  • Hands on experience with exploiting systems using the Metasploit Framework, Armitage/Cobalt Strike
  • Used exploit DB to search for exploits to run on vulnerable software/services
  • Hands on experience manually identifying vulnerable software/services and running exploits
  • Hands on experience modifying exploit code
  • Hands on experience using Metasploit and beef to run Client side exploits
  • Hands on experience using different stagers and payloads
  • Hands on experience using Privilege escalation exploits and process migration
  • Hands on experience using Powersploit to dump passwords in clear text
  • Hands on experience using Veil-evasion for AV bypass AV
  • Vulnerabilities patching with other teams or alone
  • Tripwire HIDS configuration generation/update/integrity check
  • Samhain HIDS installation/configuration/checking
  • Snort implementation/configuration/oinkmaster/update
  • Bro IDS Installation/configuration/updating
  • Creating rules using Bro language
  • Configuring Barnyard for logging dispersal through different log readers
  • Firewall policies updates/upgrades (Checkpoint, ASA, Juniper, etc...)
  • Firewall daily tasks (addition, blocking, deleting, etc…)
  • Network blueprint generation
  • Network infrastructure assessment and threat evaluation
  • Network infrastructure updates/upgrades (Microsoft, Cisco, etc...)
  • Change management integration and implementation
  • Strong analytical and problem-solving skills.
  • Excellent verbal and written communication skills.
  • Excellent organizational skills and strong attention to detail.
  • Demonstrated ability to work team and simultaneous engagements.
  • Motivated, team player with a positive attitude, solid interpersonal skills and ability to take ownership when asked and required.
  • Produced high-quality deliverables, reports, and presentations for client management and technology personnel.
  • Client IT policy and procedure development.
  • 24x7 on-call support doing Network Security and Vulnerability Testing
  • Pick and learn new technologies on the fly
  • Hands on experience doing post exploitation with Meterpreter and reverse shells
  • Used Windows native commands to do post exploitation recon on Windows domains such as process migration, folder traversal, etc...
  • Privilege escalation on windows via Metasploit and manual methods
  • Hands on experience with privilege escalation on Linux
  • Used Veil-Powerup to determine privilege escalation attack paths and escalate privileges
  • Used Veil-Powerview to gain situational awareness
  • Dumped hashes on locals system with mimkatz, hashdump, creddump
  • Pivoted inside networks using PSexec and psexec psh module in Metasploit
  • Experience with data exfiltration
  • Password cracking with Jack the ripper, Cloud crack, and Hashcat.

We'd love your feedback!