Network Performance Engineer Resume
Columbia, MarylanD
SUMMARY:
- Security Engineer with 10 years’ design and operational experience in cyber security systems and 20 years network engineering experience including network intrusion analysis, Intrusion Prevention Systems (IPS), firewalls, network equipment, Windows and Linux server and client environments, Antivirus, and incidence response for numerous government clients.
TECHNICAL SKILLS:
Operating Systems: Windows Server, Windows XP/7/8, Microsoft Windows NT 3.51/4.0 Server/Workstation, UNIX (FreeBSD, System5), Linux (RHEL/Fedora, Mandriva, Ubuntu), MS - DOS
Network and Computer Equipment: Cisco switches, Nexus Switches, Cisco routers, firewalls, ACE load balancers, Cisco MDS switches, SourceFire 3D IPS s and Defense Centers, Proventia IDS GX5108 appliance, HP printers, and Cryptographic equipment, Spirent Avalanche, Spirent TestCenter, Breakingpoint, Raritan KVMs, IBM BladeCenter Chassis and servers, HP Servers
Applications: Red Hat Network Satellite Server, Red Hat Cluster Suite, Microsoft Office, Wireshark, Splunk, Nessus, McAfee ePolicy Orchestrator, McAfee Host-Based Intrusion Prevention, McAfee LinuxShield, McAfee VirusScan, Symantec Antivirus, Ghost, Norton Utilities, AutoCAD, Visio, Microsoft Project, SQL Server, mysql, Microsoft/Libre Office, Firefox/Thunderbird, GIMP, MediaWiki, IPfw, pf, shorewall, ActivClient, Tumbleweed Desktop Validator, Squid proxy server
Programming Languages: Perl, Ruby, TCL, Bash scripting
Network Protocols: TCP/IP, IPv6, IPX/SPX, SNMP, SMTP, RIP, EIGRP, IGRP, OSPF, NetBEUI, DHCP, NTP, HSRP, STP
Web Technologies: HTML, XML, CSS, ASP, PHP, phpmyadmin, webmin, BIND
PROFESSIONAL EXPERIENCE:
Network Performance Engineer
Confidential, Columbia, Maryland
Responsibilities:
- Led a team of network performance testers in creating, running, and analyzing network performance tests on Cisco/Sourcefire ASA and FireSIGHT firewalls and IDS’s
- Analysis activities include: diagnosing Snort rules and Snort preprocessor operations, monitoring Linux OS performance, investigating memory exhaustion, analyzing buffer leaks, troubleshooting proper hardware operation, and inspecting PCAPs generated by test equipment, assisting with customer issue escalations
Security Engineer
Confidential, Fairmont, West Virginia
Responsibilities:
- Served as a Security Engineer for the design and maintenance of the DoD Automated Biometrics Identification System (ABIS) including creating firewall designs, network engineering using primarily Cisco products, designing IDS and DMZ infrastructures, performing incident response, implementing two factor authentication, performing software updates, and providing Tier III support for the operational system
Network/Security Engineer
Confidential, Linthicum Heights, Maryland
Responsibilities:
- Led a team consisting of Help Desk, Security, and Network Engineers while working beside them to design and maintain a multitude of classified (Secret and Top Secret), and unclassified networks for a digital forensics laboratory
Senior Network Engineer
Confidential, Linthicum Heights, Maryland
Responsibilities:
- Served as Senior Network Engineer for the DoD Computer Investigations Training Agency (DCITA) responsible for architecting and maintaining two unclassified LANs
Senior Network Engineer
Confidential, Silver Spring, Maryland
Responsibilities:
- Worked on a number of both government and civilian contracts as a Senior Network Engineer primarily responsible for performing technical system relocations. In this capacity, I was responsible for surveying the clients existing network infrastructure and topology in order to reconstruct the network topology, normally using newly procured equipment, at the customer’s new site. Worked with the following customers: Pentagon, USDA, Walter Reed Medical Army Facility, Qwest Communications, USDA, Society of the Plastics Institute, DPSC, Department of Integration, Arlington Government, and the IRS.