SlideShare une entreprise Scribd logo
1  sur  3
Kenneth Howard Long
5509 9th Street NW Apt #100 Washington DC 20011 |Cell#: (301) 996 4518 |Email:Kenneth.long0714@gmail.com
Objective
To obtain an IT position that will strengthen skills and experience, so that one can achieve Sr. level.
IT Technologies/Tools Usedinthe past
Arcsight: Created and modified activelistand channels to parses out anomalies
Created activerules to detect malicioustraffic
Monitored over thousands (DNS, Proxy, WAF, Firewall,Antivirus, Email and IDS/IPS) logs daily to tune or get rid of false
or noisy rules.
Arcsight Logger: Generated logs from 24 to 48 hours to investigateinfection vectors, when possibleinfection was detected from
SEIM tool Arcsight.
Netwitness: Created custom drillsto generate full livepacket captures for rulecreation and investigation purposes
Sourecfire: Created custom rules for the followingdetection phases (C2, Scanning,Installation,redirection,and delivery)
Impervia web application firewall: Monitored and Created APT scanningrules to create ICF reports.
Mandiant Mir: Generated jobs to investigate successful or non-successful maliciousexecutables,froman end pointthreat detection
Perspective.
Archer: Created incidentreports daily to keep track and discover patterns, or trends, as well as possibleAPT activity.
Cisco IronPort: Used daily to determine if emails were categorize correctly as spam, and not APT.
Round Cube: Used as sandbox to determine if email document was weaponized or not.
Linux Ubuntu: Created virtual machineto examine maliciousredirects and possibly nonebad website.
Basic to intermittent level of navigatingvia Terminal
Create, delete, and move fileand directories via sudo/ sudo su
Utilized GREP commands to query particularinformation when need
System Center Operations Manager (SCOM): Monitored the followingtype of alerts for over fifty servers daily (failed connections,
failed services and volume spaceto notify server team, or perform standard operating
procedure according to situation.
Semantic NetBackup: Monitored over two hundred backups nightly to notify storage team of any issues,or perform standard
operating procedure accordingto situation.
Re-run/Restart backup jobs,and policies to perform tape ejects, standard operation procedures ,etc.
Viewed over two hundred backup jobs nightly to generate backup report.
Solarwinds: Monitored over 20 nodes to escalateor notify networking team of any issues accordingly.
Cleriion: Monitored, and Performed standard operating procedures for failed drives,so that all backup data in the environment was
never lostor corrupted
Bell Secure Works and Fire-eye: Viewed security alerts daily to determine if a ticket needed to be created for a wipe request, and
be pulled of the network.
Windows Server 2K3/r2,2K8/r2, 2K12/r2:Installed patches monthly to secure, and decrease issues.
Created, modified, and reset active directory accounts
Added or removed members from groups.
Performed weekly rebooting procedures
Created shared drives.
Added new printer to printserver with specific permissions.
Cisco Unified Admiration Phone System: Modified users extensions, and sidecards.
Discontinued users phone extensions
Configured new phone for users
Citrix : Installed clientsoftwarefor over 60 users.
Viewed, and restarted user sessions for troubleshootingpurposes via Citrix Director
Assyst: Created, Resolved, and assigned tickets daily
Ran trouble tooting procedures to ensure ticketing system was functioningcorrectly
Virtual Box: Created virtual machineusingLinux operatingsystems to examine maliciousredirects.
Vsphere: Monitored over 40 servers daily to complete daily task.
Microsoft Office suite: Install softwareclientvia Word,Outlook,Excel, and PowerPoint
Import / export email via outlook
Setup email rules via outlook
Created spread sheets via Excel
Created word documents with specified formatting via Word
Additional Knowledge
TCP/IP protocols and concepts: Basic to intermediate level of understandingof the followingDNS, DHCP, Telnet, SSH, LDAP, IP,
IMCP, ARP, TLS/SSL
Understandingof the three way handshakeand TCP vs UDP traffic via Wireshark
Understating of the OSI model layer seven to one
Cisco Switching and routing: Basic to intermediate understandingof configuration commands via putty as followbelow:
Create vlans,setstatic,dynamic,and defaultrouts, show IP route, show vlans,showrun,
Show ip protocol,do show run, configurerouter on a stick,configure telnet / SSH, Create passwords
and banners,change/ create host name.
Basic to intermediate understanding of programing concepts using the following languages via notepad ++
HTML/CSS, Python, Ruby, PHP, JavaScript: Create a basic webpage,
Basic understandingof for loops,if/ if else statements, creating values and strings,
Puts and prints,consolelog,Boolean logic,
EXPERIENCE
Robert Half Technology
Second to third level IT support technician/analyst Bethesda, MD May 2015 – Aug 2015
 Assistwith IT supportfor over three hundred users daily which lead to higher user satisfaction.
 Troubleshoot Citrix and printingissues daily which led to gaininga better understandingof issuetrends.
 Execute system admin task to provide daily fixes to cut down issuetrends.
 Imaged / installed laptops and desktops for new users which led to higher user satisfaction
 InfluenceIT processes and procedure methods to implement a level of organization / structure which let to task getting
done more quickly and efficient.
Wilmerhale
Global Operations Center Operator/ Technician Washington, DC October 2014 – March 2015
 Performed systemand environmental monitoring including reporting and analysis.
 Performed backups of data throughout the enterprise; monitor backups, change backup tapes and maintains inventory of on
and offsite tape storage.
 Performed physicalinstallation of servers and network equipment as needed.
 Connected systems to the network devices
 Monitored data replication functionality, resolves replication issues and reports errors appropriately.
 Resolved the majority of Infrastructure issues using the IT Knowledgebase,and escalated more complex problems to
Infrastructure Engineers in a timely manner.
 Assisted Infrastructure Engineers and otherData Center staff as needed.
 Maintained inventory of all equipment in the production Data Center.
BAE Systems
Security Operations Center Analyst Herndon, VA February 2014-July 2014
 Utilized Arcsight(Security Information Event Monitoring) tool to identify maliciousnetwork traffic daily
 Request reimagingand wipingof hard drives,protect company’s data and assets
 Performed triage level forensic of hostinvestigations to identify the root causeof infection,maliciousprocesses and
artifacts of compromise, add to teams awareness on identifyingmaliciousgroups and patterns
 Wrote and tuned signatures based on different types of CND (Computer Network Defense) scenarios,Improved ESM tool to
detect unrecognizablemalicious activity
 Utilized Archer to create detailed incidentreports that includeactivities leadingto compromise, remedial actions and
preventative control recommendations, keep the company up to date on targeted attacks
 Performed ICF reports on recon / vulnerability scansdaily
Education History
Year Up/ Northern Virginia Community College Washington, DC September 2013 – July 2014
Major: Information Technology
Courses:
Introduction to Hardware MicrosoftOfficeApplications Introductions to Networks
Business Communication Writing Introduction to Professional Skills Personal Finance,Help Desk
University of the District of Columbia (UDC) Washington, DC January 2010 - July 2011
Major: Graphic Design
Courses:
Digital Applications Introduction to Drawing Art Foundations
InDesign Figure Drawing Digital Media

Contenu connexe

Tendances

Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingPriyanka Aash
 
OpManager Review
OpManager ReviewOpManager Review
OpManager Reviewguesta265a9
 
Incident Handling in a BYOD Environment
Incident Handling in a BYOD EnvironmentIncident Handling in a BYOD Environment
Incident Handling in a BYOD EnvironmentIben Rodriguez
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentationguest85a34f
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewSymantec
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersIben Rodriguez
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015AFCEA International
 
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1Saksham Agrawal
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Cyberdyne systems (2)
Cyberdyne systems (2)Cyberdyne systems (2)
Cyberdyne systems (2)Bryan Moss
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015AFCEA International
 
Nessus-Vulnerability Tester
Nessus-Vulnerability TesterNessus-Vulnerability Tester
Nessus-Vulnerability TesterAditya Jain
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12Inuit AB
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configurationSoban Ahmad
 
The Greenway Bank Presentation
The Greenway Bank PresentationThe Greenway Bank Presentation
The Greenway Bank PresentationSherrod Butler
 
Windows Service Hardening
Windows Service HardeningWindows Service Hardening
Windows Service HardeningDigital Bond
 

Tendances (20)

Firewall audit
Firewall auditFirewall audit
Firewall audit
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
 
OpManager Review
OpManager ReviewOpManager Review
OpManager Review
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Incident Handling in a BYOD Environment
Incident Handling in a BYOD EnvironmentIncident Handling in a BYOD Environment
Incident Handling in a BYOD Environment
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 
Firewall
FirewallFirewall
Firewall
 
Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1Network_Intrusion_Detection_System_Team1
Network_Intrusion_Detection_System_Team1
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Cyberdyne systems (2)
Cyberdyne systems (2)Cyberdyne systems (2)
Cyberdyne systems (2)
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015
 
Nessus-Vulnerability Tester
Nessus-Vulnerability TesterNessus-Vulnerability Tester
Nessus-Vulnerability Tester
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
The Greenway Bank Presentation
The Greenway Bank PresentationThe Greenway Bank Presentation
The Greenway Bank Presentation
 
Windows Service Hardening
Windows Service HardeningWindows Service Hardening
Windows Service Hardening
 

En vedette

Sosocompany slideshare 03
Sosocompany slideshare 03Sosocompany slideshare 03
Sosocompany slideshare 03강진 김
 
Journey to Halong bay With Deluxe Halong Bay Cruise
Journey to Halong bay With Deluxe Halong Bay CruiseJourney to Halong bay With Deluxe Halong Bay Cruise
Journey to Halong bay With Deluxe Halong Bay Cruiseemma roberts
 
chuyên dịch vụ giúp việc theo giờ đảm bảo hồ chí minh
chuyên dịch vụ giúp việc theo giờ đảm bảo hồ chí minhchuyên dịch vụ giúp việc theo giờ đảm bảo hồ chí minh
chuyên dịch vụ giúp việc theo giờ đảm bảo hồ chí minhjosh169
 
chỗ nào dịch vụ giúp việc quận 9 tại hồ chí minh
chỗ nào dịch vụ giúp việc quận 9 tại hồ chí minhchỗ nào dịch vụ giúp việc quận 9 tại hồ chí minh
chỗ nào dịch vụ giúp việc quận 9 tại hồ chí minhefrain665
 
원광한의 소식지1호~6호모음
원광한의 소식지1호~6호모음원광한의 소식지1호~6호모음
원광한의 소식지1호~6호모음ChocoRachel
 
Grigsby Military Resume
Grigsby Military ResumeGrigsby Military Resume
Grigsby Military ResumeJames Grigsby
 
Siddhant Singh Parmar-new resume (17.02.2016).compressed
Siddhant Singh Parmar-new resume (17.02.2016).compressedSiddhant Singh Parmar-new resume (17.02.2016).compressed
Siddhant Singh Parmar-new resume (17.02.2016).compressedsiddhant singh parmar
 
Top attractions in florence
Top attractions in florenceTop attractions in florence
Top attractions in florenceemma roberts
 
chuyên dịch vụ giúp việc theo giờ chuyên nghiệp tại hồ chí minh
chuyên dịch vụ giúp việc theo giờ chuyên nghiệp tại hồ chí minhchuyên dịch vụ giúp việc theo giờ chuyên nghiệp tại hồ chí minh
chuyên dịch vụ giúp việc theo giờ chuyên nghiệp tại hồ chí minhshela505
 
sustainable-high-performance-stefano
sustainable-high-performance-stefanosustainable-high-performance-stefano
sustainable-high-performance-stefanoWilson Stefano Junior
 
chuyên dịch vụ giúp việc gia đình chất lượng cao tại sài gòn
chuyên dịch vụ giúp việc gia đình chất lượng cao tại sài gònchuyên dịch vụ giúp việc gia đình chất lượng cao tại sài gòn
chuyên dịch vụ giúp việc gia đình chất lượng cao tại sài gòngary804
 
chỗ nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcm
chỗ nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcmchỗ nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcm
chỗ nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcmhayley369
 

En vedette (15)

Sosocompany slideshare 03
Sosocompany slideshare 03Sosocompany slideshare 03
Sosocompany slideshare 03
 
Journey to Halong bay With Deluxe Halong Bay Cruise
Journey to Halong bay With Deluxe Halong Bay CruiseJourney to Halong bay With Deluxe Halong Bay Cruise
Journey to Halong bay With Deluxe Halong Bay Cruise
 
chuyên dịch vụ giúp việc theo giờ đảm bảo hồ chí minh
chuyên dịch vụ giúp việc theo giờ đảm bảo hồ chí minhchuyên dịch vụ giúp việc theo giờ đảm bảo hồ chí minh
chuyên dịch vụ giúp việc theo giờ đảm bảo hồ chí minh
 
chỗ nào dịch vụ giúp việc quận 9 tại hồ chí minh
chỗ nào dịch vụ giúp việc quận 9 tại hồ chí minhchỗ nào dịch vụ giúp việc quận 9 tại hồ chí minh
chỗ nào dịch vụ giúp việc quận 9 tại hồ chí minh
 
원광한의 소식지1호~6호모음
원광한의 소식지1호~6호모음원광한의 소식지1호~6호모음
원광한의 소식지1호~6호모음
 
Grigsby Military Resume
Grigsby Military ResumeGrigsby Military Resume
Grigsby Military Resume
 
Siddhant Singh Parmar-new resume (17.02.2016).compressed
Siddhant Singh Parmar-new resume (17.02.2016).compressedSiddhant Singh Parmar-new resume (17.02.2016).compressed
Siddhant Singh Parmar-new resume (17.02.2016).compressed
 
MY LAST VACATION
MY LAST VACATIONMY LAST VACATION
MY LAST VACATION
 
11th ANNUAL COMPETITION
11th ANNUAL COMPETITION11th ANNUAL COMPETITION
11th ANNUAL COMPETITION
 
Top attractions in florence
Top attractions in florenceTop attractions in florence
Top attractions in florence
 
chuyên dịch vụ giúp việc theo giờ chuyên nghiệp tại hồ chí minh
chuyên dịch vụ giúp việc theo giờ chuyên nghiệp tại hồ chí minhchuyên dịch vụ giúp việc theo giờ chuyên nghiệp tại hồ chí minh
chuyên dịch vụ giúp việc theo giờ chuyên nghiệp tại hồ chí minh
 
sustainable-high-performance-stefano
sustainable-high-performance-stefanosustainable-high-performance-stefano
sustainable-high-performance-stefano
 
chuyên dịch vụ giúp việc gia đình chất lượng cao tại sài gòn
chuyên dịch vụ giúp việc gia đình chất lượng cao tại sài gònchuyên dịch vụ giúp việc gia đình chất lượng cao tại sài gòn
chuyên dịch vụ giúp việc gia đình chất lượng cao tại sài gòn
 
chỗ nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcm
chỗ nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcmchỗ nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcm
chỗ nào dịch vụ giúp việc gia đình có kinh nghiệm ở hcm
 
Girish_Resume1
Girish_Resume1Girish_Resume1
Girish_Resume1
 

Similaire à Kenneth Howard Long_Res_Was (20)

Harold mcraeresumenew
Harold mcraeresumenewHarold mcraeresumenew
Harold mcraeresumenew
 
Resume
ResumeResume
Resume
 
Gopu_CV_2016
Gopu_CV_2016Gopu_CV_2016
Gopu_CV_2016
 
OpManager - Technical overview
OpManager - Technical overviewOpManager - Technical overview
OpManager - Technical overview
 
Opmanager technical overview
Opmanager technical overviewOpmanager technical overview
Opmanager technical overview
 
jagdeep singh
jagdeep singhjagdeep singh
jagdeep singh
 
Opmanagertechnicaloverview 160128123947
Opmanagertechnicaloverview 160128123947Opmanagertechnicaloverview 160128123947
Opmanagertechnicaloverview 160128123947
 
OpManager Technical Overview
OpManager Technical OverviewOpManager Technical Overview
OpManager Technical Overview
 
Overview OpManager
Overview OpManagerOverview OpManager
Overview OpManager
 
ahmedCVciv
ahmedCVcivahmedCVciv
ahmedCVciv
 
Minnette Davis - Professional Network Systems Engineer Accomplishments
Minnette Davis -  Professional Network Systems Engineer AccomplishmentsMinnette Davis -  Professional Network Systems Engineer Accomplishments
Minnette Davis - Professional Network Systems Engineer Accomplishments
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Soma_5+_Monitoring_Tools
Soma_5+_Monitoring_ToolsSoma_5+_Monitoring_Tools
Soma_5+_Monitoring_Tools
 
Syed_Network_resume
Syed_Network_resumeSyed_Network_resume
Syed_Network_resume
 
Liberatore_Resume
Liberatore_ResumeLiberatore_Resume
Liberatore_Resume
 
RESUME SSTOMAR1
RESUME SSTOMAR1RESUME SSTOMAR1
RESUME SSTOMAR1
 
RESUME SSTOMAR1
RESUME SSTOMAR1RESUME SSTOMAR1
RESUME SSTOMAR1
 
RESUME SSTOMAR1
RESUME SSTOMAR1RESUME SSTOMAR1
RESUME SSTOMAR1
 
RESUME SSTOMAR1
RESUME SSTOMAR1RESUME SSTOMAR1
RESUME SSTOMAR1
 
johndemunnik_MAY2016
johndemunnik_MAY2016johndemunnik_MAY2016
johndemunnik_MAY2016
 

Kenneth Howard Long_Res_Was

  • 1. Kenneth Howard Long 5509 9th Street NW Apt #100 Washington DC 20011 |Cell#: (301) 996 4518 |Email:Kenneth.long0714@gmail.com Objective To obtain an IT position that will strengthen skills and experience, so that one can achieve Sr. level. IT Technologies/Tools Usedinthe past Arcsight: Created and modified activelistand channels to parses out anomalies Created activerules to detect malicioustraffic Monitored over thousands (DNS, Proxy, WAF, Firewall,Antivirus, Email and IDS/IPS) logs daily to tune or get rid of false or noisy rules. Arcsight Logger: Generated logs from 24 to 48 hours to investigateinfection vectors, when possibleinfection was detected from SEIM tool Arcsight. Netwitness: Created custom drillsto generate full livepacket captures for rulecreation and investigation purposes Sourecfire: Created custom rules for the followingdetection phases (C2, Scanning,Installation,redirection,and delivery) Impervia web application firewall: Monitored and Created APT scanningrules to create ICF reports. Mandiant Mir: Generated jobs to investigate successful or non-successful maliciousexecutables,froman end pointthreat detection Perspective. Archer: Created incidentreports daily to keep track and discover patterns, or trends, as well as possibleAPT activity. Cisco IronPort: Used daily to determine if emails were categorize correctly as spam, and not APT. Round Cube: Used as sandbox to determine if email document was weaponized or not. Linux Ubuntu: Created virtual machineto examine maliciousredirects and possibly nonebad website. Basic to intermittent level of navigatingvia Terminal Create, delete, and move fileand directories via sudo/ sudo su Utilized GREP commands to query particularinformation when need System Center Operations Manager (SCOM): Monitored the followingtype of alerts for over fifty servers daily (failed connections, failed services and volume spaceto notify server team, or perform standard operating procedure according to situation. Semantic NetBackup: Monitored over two hundred backups nightly to notify storage team of any issues,or perform standard operating procedure accordingto situation. Re-run/Restart backup jobs,and policies to perform tape ejects, standard operation procedures ,etc. Viewed over two hundred backup jobs nightly to generate backup report. Solarwinds: Monitored over 20 nodes to escalateor notify networking team of any issues accordingly. Cleriion: Monitored, and Performed standard operating procedures for failed drives,so that all backup data in the environment was never lostor corrupted Bell Secure Works and Fire-eye: Viewed security alerts daily to determine if a ticket needed to be created for a wipe request, and be pulled of the network. Windows Server 2K3/r2,2K8/r2, 2K12/r2:Installed patches monthly to secure, and decrease issues. Created, modified, and reset active directory accounts Added or removed members from groups.
  • 2. Performed weekly rebooting procedures Created shared drives. Added new printer to printserver with specific permissions. Cisco Unified Admiration Phone System: Modified users extensions, and sidecards. Discontinued users phone extensions Configured new phone for users Citrix : Installed clientsoftwarefor over 60 users. Viewed, and restarted user sessions for troubleshootingpurposes via Citrix Director Assyst: Created, Resolved, and assigned tickets daily Ran trouble tooting procedures to ensure ticketing system was functioningcorrectly Virtual Box: Created virtual machineusingLinux operatingsystems to examine maliciousredirects. Vsphere: Monitored over 40 servers daily to complete daily task. Microsoft Office suite: Install softwareclientvia Word,Outlook,Excel, and PowerPoint Import / export email via outlook Setup email rules via outlook Created spread sheets via Excel Created word documents with specified formatting via Word Additional Knowledge TCP/IP protocols and concepts: Basic to intermediate level of understandingof the followingDNS, DHCP, Telnet, SSH, LDAP, IP, IMCP, ARP, TLS/SSL Understandingof the three way handshakeand TCP vs UDP traffic via Wireshark Understating of the OSI model layer seven to one Cisco Switching and routing: Basic to intermediate understandingof configuration commands via putty as followbelow: Create vlans,setstatic,dynamic,and defaultrouts, show IP route, show vlans,showrun, Show ip protocol,do show run, configurerouter on a stick,configure telnet / SSH, Create passwords and banners,change/ create host name. Basic to intermediate understanding of programing concepts using the following languages via notepad ++ HTML/CSS, Python, Ruby, PHP, JavaScript: Create a basic webpage, Basic understandingof for loops,if/ if else statements, creating values and strings, Puts and prints,consolelog,Boolean logic, EXPERIENCE Robert Half Technology Second to third level IT support technician/analyst Bethesda, MD May 2015 – Aug 2015  Assistwith IT supportfor over three hundred users daily which lead to higher user satisfaction.  Troubleshoot Citrix and printingissues daily which led to gaininga better understandingof issuetrends.  Execute system admin task to provide daily fixes to cut down issuetrends.
  • 3.  Imaged / installed laptops and desktops for new users which led to higher user satisfaction  InfluenceIT processes and procedure methods to implement a level of organization / structure which let to task getting done more quickly and efficient. Wilmerhale Global Operations Center Operator/ Technician Washington, DC October 2014 – March 2015  Performed systemand environmental monitoring including reporting and analysis.  Performed backups of data throughout the enterprise; monitor backups, change backup tapes and maintains inventory of on and offsite tape storage.  Performed physicalinstallation of servers and network equipment as needed.  Connected systems to the network devices  Monitored data replication functionality, resolves replication issues and reports errors appropriately.  Resolved the majority of Infrastructure issues using the IT Knowledgebase,and escalated more complex problems to Infrastructure Engineers in a timely manner.  Assisted Infrastructure Engineers and otherData Center staff as needed.  Maintained inventory of all equipment in the production Data Center. BAE Systems Security Operations Center Analyst Herndon, VA February 2014-July 2014  Utilized Arcsight(Security Information Event Monitoring) tool to identify maliciousnetwork traffic daily  Request reimagingand wipingof hard drives,protect company’s data and assets  Performed triage level forensic of hostinvestigations to identify the root causeof infection,maliciousprocesses and artifacts of compromise, add to teams awareness on identifyingmaliciousgroups and patterns  Wrote and tuned signatures based on different types of CND (Computer Network Defense) scenarios,Improved ESM tool to detect unrecognizablemalicious activity  Utilized Archer to create detailed incidentreports that includeactivities leadingto compromise, remedial actions and preventative control recommendations, keep the company up to date on targeted attacks  Performed ICF reports on recon / vulnerability scansdaily Education History Year Up/ Northern Virginia Community College Washington, DC September 2013 – July 2014 Major: Information Technology Courses: Introduction to Hardware MicrosoftOfficeApplications Introductions to Networks Business Communication Writing Introduction to Professional Skills Personal Finance,Help Desk University of the District of Columbia (UDC) Washington, DC January 2010 - July 2011 Major: Graphic Design Courses: Digital Applications Introduction to Drawing Art Foundations InDesign Figure Drawing Digital Media