We provide IT Staff Augmentation Services!

Systems Administrator Resume

0/5 (Submit Your Rating)

Washington, DC

SUMMARY

  • A seasoned Enterprise IT professional with over 6 years of experience in the technology sector with proficient knowledge in system engineering, Information Assurance/Cyber Security and Cloud Computing. Most of my professional focus has been in the realm of Cyber Security, Systems Engineering, and Cloud Computing.
  • My long term aspiration is to become a Principal Architect specializing in Cyber Security and its best practices where
  • I will utilize my past experiences and vast amount of knowledge to develop a more robust and adaptive Cyber Resiliency framework.
  • Deployed, provisioned and remotely maintains an off premise public cloud offering that allows friends and family to download music on demand
  • Designing a unique Linux OS based on the Linux “OpenSuse” Project tentatively named "SIASuse"

TECHNICAL SKILLS:

Operating Systems: Windows 2000, ME XP, Vista 7, 8

Software Tools: SQL

Languages: Javascript

ITILv3 Foundation: MAC OS 10.6, 10.7, 10.8

Mestsploit Framework: Cloud Security Alliance Certificate of Cloud Security Knowledge (CCSK), Linux Red Hat, CentOS, Ubuntu (MAAS), BackTrack, Kali Linux

Python: EC - Council Certified Ethical Hacker (C|EH), EC-Council Certified Hacking Forensics Investigator (C|HFI) Unix Solaris, BSD

WinDbg/IDA Pro: Bash/Shell Scripting

PROFESSIONAL EXPERIENCE

Confidential, Arlington, VA

Cyber Risk Consultant

Responsibilities:

  • Responsible for developing Security Configuration Standards for mission critical applications and information systems in direct support of our clients mission(s)
  • Utilizes DISA STIGs in order to develop Security Configurations for Core technologies found within our Client’s IT Infrastructure
  • Utilizes FedRAMP controls along with DoD Cloud Computing SRG in order to perform an assessment on Cloud - based applications and Cloud infrastructure in use by our Government clients
  • Identify cybersecurity threats and perform gap analyses of reported anomalies on client networks and critical information systems
  • Designs, implements, and supports business process and IT controls in an enterprise environment, including new implementations, control redesigns, or assessment of a client’s enterprise security posture
  • Develops Data protection requirements/guidelines in order to mitigate sensitive Data Leakage within our Client’s Organizations and or Agencies/Government Branches
  • Assess complex governance requirements/controls, to include SOX 404, HIPAA and FedRAMP and NIST guidelines in order provide clients with leading practice recommendations as it relates to IT Security controls within an enterprise environment
  • Assess cyber security and enterprise information security management practices through pre-implementation reviews
  • Evaluates and provides recommendations towards the design architecture and operating effectiveness of Technical, Operational, and Managerial IT controls residing at the system, organizational and application levels within our client’s enterprise environments.

Confidential, Fairfax, VA

Applications Specialist/Engineer

Responsibilities:

  • Responsible for performing Security Assessment and Authorization on information systems in an production environment in order to identify and remediate vulnerabilities found within the IT environment
  • Responsible for the development of the Standard Operations and Procedures document (SOP) to include the remodeling of Disaster Recovery/Business Continuity plans as well as escalation procedures
  • Utilizes FISMA Standards and guidelines in order to enhance and improve the security posture of information systems
  • Performs malware debugging specific to CBP workstations and 3rd party applications
  • Conducts vulnerability assessments using Nessus, port scanning using Wireshark and intrusion detection/prevention monitoring using Snort on all information systems across the network in order to identify vulnerabilities, malicious content intrusion and other possible security threats
  • Receives requests from customers for service or problems resolution; prioritizes requests and routes to appropriate staff for action; maintains a database of customer requests & tracks the progress of service & problem resolution; contacts customers to keep them informed of the status of their requests
  • Actively participates in the testing and implementation of new systems
  • Actively participates in system and log/event monitoring using HP Arcsight as well as OSSEC
  • Provides in-servicing sessions for users in the operation of computer and communications equipment, system applications, and software products

Confidential, Washington DC

Systems Administrator

Responsibilities:

  • Performed daily system monitoring, verifying the integrity and availability of all hardware, server resources, systems and key processes, reviewing system and application logs, and verifying completion of scheduled jobs such as backups
  • Executed regular security monitoring to identify any possible intrusions
  • Performed daily backup operations, ensuring all required file systems and system data are successfully backed up to the appropriate media, recovery tapes or disks are created, and media is recycled and sent off site as necessary
  • Repaired and recover from hardware or software failures. Coordinate and communicate with impacted constituencies
  • Achieved ongoing performance tuning, hardware upgrades, & resource optimization as required.
  • Configured CPU, memory, and disk partitions as required.
  • Developed and maintained installation and configuration procedures

Confidential, Largo, MD

Jr. Database Analyst

Responsibilities:

  • Maintained responsibility for developing and maintaining the databases in use by the organization
  • Built up and maintained the database architecture and models
  • Designed and updated knowledge based information and instructions for databases as appropriate for its use
  • Installed, configured upgrades and maintained the server to suit the database needs and all other related software
  • Operated automated systems to mine information and make reports on database performance
  • Provided inputs for developing newer versions of databases customized to peculiar needs
  • Acquired and extract primary or secondary data from existing internal or external data sources
  • Controlled the access for database by giving/extending security passwords and permissions
  • Accessed and maintained data files and clientele accounts within Company Servers
  • Managed internal clientele informational in SQL Database

Confidential, Lanham, MD

IT Associate

Responsibilities:

  • Provided desktop support for over 30 clients by phone/in person as needed to minimize downtime
  • Identified, isolated and repaired computer equipment showing wear and tear as well as during preventative maintenance routines
  • Escalated and documented issues as they arose with network support staff and other support groups
  • Managed clientele informational in SQL database
  • Created user accounts and assign group rights using Microsoft server tools (ADS) Active Directory
  • Migrated users from XP to Windows 7
  • Supported all Major Microsoft applications as well as 3rd party business apps
  • Provided Remote Desktop Support & IT Operational support via SCCM to resolve escalated issues for Internal users

We'd love your feedback!