We provide IT Staff Augmentation Services!

Network Performance Engineer Resume

0/5 (Submit Your Rating)

Columbia, MarylanD

SUMMARY:

  • Security Engineer with 10 years’ design and operational experience in cyber security systems and 20 years network engineering experience including network intrusion analysis, Intrusion Prevention Systems (IPS), firewalls, network equipment, Windows and Linux server and client environments, Antivirus, and incidence response for numerous government clients.

TECHNICAL SKILLS:

Operating Systems: Windows Server, Windows XP/7/8, Microsoft Windows NT 3.51/4.0 Server/Workstation, UNIX (FreeBSD, System5), Linux (RHEL/Fedora, Mandriva, Ubuntu), MS - DOS

Network and Computer Equipment: Cisco switches, Nexus Switches, Cisco routers, firewalls, ACE load balancers, Cisco MDS switches, SourceFire 3D IPS s and Defense Centers, Proventia IDS GX5108 appliance, HP printers, and Cryptographic equipment, Spirent Avalanche, Spirent TestCenter, Breakingpoint, Raritan KVMs, IBM BladeCenter Chassis and servers, HP Servers

Applications: Red Hat Network Satellite Server, Red Hat Cluster Suite, Microsoft Office, Wireshark, Splunk, Nessus, McAfee ePolicy Orchestrator, McAfee Host-Based Intrusion Prevention, McAfee LinuxShield, McAfee VirusScan, Symantec Antivirus, Ghost, Norton Utilities, AutoCAD, Visio, Microsoft Project, SQL Server, mysql, Microsoft/Libre Office, Firefox/Thunderbird, GIMP, MediaWiki, IPfw, pf, shorewall, ActivClient, Tumbleweed Desktop Validator, Squid proxy server

Programming Languages: Perl, Ruby, TCL, Bash scripting

Network Protocols: TCP/IP, IPv6, IPX/SPX, SNMP, SMTP, RIP, EIGRP, IGRP, OSPF, NetBEUI, DHCP, NTP, HSRP, STP

Web Technologies: HTML, XML, CSS, ASP, PHP, phpmyadmin, webmin, BIND

PROFESSIONAL EXPERIENCE:

Network Performance Engineer

Confidential, Columbia, Maryland

Responsibilities:

  • Led a team of network performance testers in creating, running, and analyzing network performance tests on Cisco/Sourcefire ASA and FireSIGHT firewalls and IDS’s
  • Analysis activities include: diagnosing Snort rules and Snort preprocessor operations, monitoring Linux OS performance, investigating memory exhaustion, analyzing buffer leaks, troubleshooting proper hardware operation, and inspecting PCAPs generated by test equipment, assisting with customer issue escalations

Security Engineer

Confidential, Fairmont, West Virginia

Responsibilities:

  • Served as a Security Engineer for the design and maintenance of the DoD Automated Biometrics Identification System (ABIS) including creating firewall designs, network engineering using primarily Cisco products, designing IDS and DMZ infrastructures, performing incident response, implementing two factor authentication, performing software updates, and providing Tier III support for the operational system

Network/Security Engineer

Confidential, Linthicum Heights, Maryland

Responsibilities:

  • Led a team consisting of Help Desk, Security, and Network Engineers while working beside them to design and maintain a multitude of classified (Secret and Top Secret), and unclassified networks for a digital forensics laboratory

Senior Network Engineer

Confidential, Linthicum Heights, Maryland

Responsibilities:

  • Served as Senior Network Engineer for the DoD Computer Investigations Training Agency (DCITA) responsible for architecting and maintaining two unclassified LANs

Senior Network Engineer

Confidential, Silver Spring, Maryland

Responsibilities:

  • Worked on a number of both government and civilian contracts as a Senior Network Engineer primarily responsible for performing technical system relocations. In this capacity, I was responsible for surveying the clients existing network infrastructure and topology in order to reconstruct the network topology, normally using newly procured equipment, at the customer’s new site. Worked with the following customers: Pentagon, USDA, Walter Reed Medical Army Facility, Qwest Communications, USDA, Society of the Plastics Institute, DPSC, Department of Integration, Arlington Government, and the IRS.

We'd love your feedback!