Post Job Free
Sign in

Customer Service Computer Science

Location:
Rockville, MD
Salary:
Between 95-110k
Posted:
March 10, 2017

Contact this candidate

Resume:

Fritz Wesselhoft

* ********** *****, *********, ** 208**-***-*** 3679 acy8dc@r.postjobfree.com

Professional Objective

Highly self-motivated, excellent time management, bright, and energetic IT professional seeking to incorporate outstanding analytical and problem solving cybersecurity skills Technical Skills

HARDWARE

Installed, upgraded, troubleshoot, and replaced modules and other hardware components for diverse types of network, security, and production devices

Trained and experienced implementing and securing UTP, STP, and fiber cables, routers, access control systems, IDS, IPS, VPN appliances, CCTV systems, server racks, inline and standby redundant power appliances, UPS, firewalls, access points, servers, desktops, laptops, tablets, wireless extenders, hubs, layer 2 and 3 managed and unmanaged switches, PoE, injectors, fax machines, VoIP telephony, IP cameras, label printers, network printers, docking stations, all type of smart phones

SOFTWARE

Installed, hardened, configured, and troubleshot several operative systems such as Windows server 2003, 2008, 2008 R2, 2012 and 2012 R2, Ubuntu, Red Hat, and Kali, Windows XP, Vista, 7, 8, 8.1, 10, OS x, droid, and IOS

Server roles: DNS, WSUS, ADCS, File Services, Printing services, IIS, ADFS, ADDC, group policy, windows server backup, print server, etc

Computer forensics utilities: DD, Wireshark, FTK imager, FTK toolkit, Encase, Volatily

Security utilities: Nessus, Nmap, Wireshark, Tshark, Metasploit framework, Python, Hping3 stealth enumeration, Ophcrack, Cain and Abel, Backtrack suites, Netsparker, John the ripper, OpenVas, Symantec EPP, IBM Security identity, SIEM technologies such as QRadar, MD5 and SHA for integrity check, Security Compliance Manager(SCM), Event Log explorer for centralized logging reviews, etc

Virtualization platforms: Citrix 7.4 & 7.6, Hyper-V, Vmware, Virtual box, VirtualPC, etc

Backup Utilities: UrBackup Linux client/server, Windows backup, Acronis true image

Programming skills: Java, C++, Delphi, Shell, PL/SQL, Python

Secured, configured, and troubleshot other utilities such as email utilities(Outlook Express, Thunderbird, Windows Live Mail, Entourage), antivirus software(Norton, AVG, McAfee, Avira, Nod32), web browsers(IE, Mozilla, Google Chrome, Safari), editing software(Photoshop, Dreamweaver, Pinnacle Studio), imaging software(Acronis, Ghost, Windows Backup), offsite backup utilities(Cobain, Carbonite), partition tools(Acronis Disk Director, Partition Magic, Easus Partition Master), etc

NETWORKING

Configured, secured, and troubleshot LAN, WAN, PAN, SonicWall and Cisco firewalls, managed switches, bridges, hubs, routers, access points, wireless repeaters, VPN appliances, HIDS, HIPS, NIPD, NIDS, CCTVs, P2P, client/server, IP printers, mobile and embedded network devices, cisco IP phones, Cisco Unified Manager, Cisco unified ccx administration, virtual networks, VLAN configuration, workgroups, domains, DNS, DHCP, POP, SMTP, IMAP4, SNMP, BootP, ARP, etc

DATA RECOVERY

Four years of data recovery experience with IDE, SATA, SSD, RAID 0, 1, 5 and SCSI hard drives

Implemented several data recovery techniques such as disk imaging, repair of damaged sectors, reconstruction of MBR, repair firmware corruption and transfer ROM information, hot swaps, head stack and platter replacement Page 2

Introduced diverse hardware recovery tools such as DeepSpar DDI, PC-3000, Data Compass, and HD Doctor Suite

Demonstrated proficiency using diverse software recovery tools such as Ontrack Easy Data Recovery, GetData, Recuva, Bad Copy, Disk Patch, Easus Data Recovery, Studio-R, Partition Table Doctor, Raid Recovery Reclaime and many others PROJECTS

Designed, managed, and implemented numerous projects from beginning to end and never missed a dateline; also, over 50% of all my projects are self-initiated and required minimal or ZERO supervision

These are just a few examples of some of the projects that I have worked with at my current job: Designed and implemented from beginning to end a fully functional new location in Las Vegas (Site to site tunnels, VPN access, VoIP integration, encryption of Wifi communications and emanation prevention, configuration of firewalls, routers, managed switches, and access points, testing). Designed and implemented a new camera system for the HQ location (Deployed a new server, configured recording settings, alerts and remote secure access). Involved on the design, implementation, and management of an access control system using a 128bit AES token. Deployed a new server to manage all mobile devices via the apple DEP. Designed and deployed an alerting system for when any of our 6 networks goes down. Deployed and ran Nessus scans and dealt with all the steps necessary for remediation of vulnerabilities. Implemented Colasoft for network sniffing and bandwidth revisions. Deployed and configured WSUS for patching an updating of windows systems. Deployed and configured a password security policy. Created several security rules and employee awareness bulletins to protect our office 365 infrastructure against phishing, spear attacks, and other email attacks. Performed phishing exercises to help creating user awareness. Designed and created of security policies for the organization

Education

MASTER OF SCIENCE JOHNS HOPKINS UNIVERSITY

. Major: Cybersecurity

. Expected on 2018

COMPUTER NETWORKS AND CYBERSECURITY 2016 UMUC

. Major: Computer Networks and Cybersecurity

. GPA: 3.55/4.0

COMPUTER SCIENCE JULY 2013 MONTGOMERY COLLEGE

Major: Computer Science

GPA: 3.7/4.0

IT CERTIFICATIONS

CISSP, Comptia Security+, Comptia--A+, Comptia--Network+, Montgomery College--Programming Certificate, Test Out-- PC Pro, Test Out--Network Pro, Test Out--Security Pro, Test Out LinuxPro, Test Out--Cisco Pro

CEH expected on April 2017

Professional Experience

NETWORK AND SECURITY ADMINISTRATOR AUI MARCH 2014- PRESENT

AD, office 365, access control, and VoIP account creation, roles assignment, and administration of their lifecycle

Designed, deployed, and maintained several group policy security rules for the organization

Configured, troubleshot and maintained our internal Sonicwall and ASA Firewalls, switches, routers, and VPN tunnels

Designed, implemented, and managed the CCTV system for the organization

Designed, implemented, and managed WSUS for Microsoft updates management Page 3

Designed, implemented, and managed PQD Deploy for non-Microsoft updates management

Implemented and maintaining SSL deployment for Citrix 7.6

Vulnerability detection and patching using Nessus

Security awareness training via email and phishing exercises

Configuration and change control documentation

Provided excellent customer service and technical support solutions for our 6 nationwide warehouses

Assisted my fellow co-workers when dealing with difficult computer and network situations

Troubleshot and found resolutions for diverse hardware, software, network, and human-related issues.

Supervised and maintained all the systems and network running properly and secure.

Researched external and internal resources when working with unknown computer issues. NETWORK AND SECURITY ANALYST PERUVIAN AIR FORCE ATTACHE FEB 2011– MARCH 2014

Managed all the information systems and the networks (public and a private are physical segregated networks)

Performed daily backups and imaged systems weekly, this was done using 128bit AES locally

Worked together with the Peruvian government in order to coordinate secure transfer methods of sensitive information over the public network

Created policies and security standards for the local network, including GPs, firewall rules and other network configurations, log revision, etc

Implemented security awareness training via weekly emails

Troubleshot network communications from the public and private networks

Applied patches via WSUS



Contact this candidate