Post Job Free
Sign in

Security Technician

Location:
Worthington, OH, 43035
Posted:
March 13, 2013

Contact this candidate

Resume:

Robert Lee Scott

614-***-**** ****************@*****.***

PROFESSIONAL SUMMARY

Mr. Robert Scott has transitioned from the military to the private sector. While in the military, Robert’s assignments included analyzing, planning, and meeting mission requirements as an information technology systems analyst. Robert participated in multiple projects leading scope gathering information, root cause analysis, creating user and client documentation, training, and support. In October 2012, Robert graduated with honors Cum Laude from DeVry University with a Bachelor Science in Computer Information Systems. Robert’s course of studies included Structured Analysis and Design, Object Oriented Analysis and Design, Project Management, Programming with Labs, Forensic Analysis, Business and Technology, Interpersonal Communication, Critical Thinking and Problem Solving.

CERTIFICATIONS

ITIL Foundations Version 2011, CompTIA A+, CompTIA Security+, CompTIA Network+, MCT: Enterprise Desktop Support Technician 7, PRO: Windows 7, Enterprise Desktop Support Technician, Windows 7, Configuration and Apple Certified Associate - Mac Integration 10.7 MCITP: Enterprise Desktop Support Technician 7

PROFESSIONAL EXPERIENCE

Clients: McKesson Specialty Health, Nationwide Insurance, JPM Chase, PNC Bank, Alliance Data, OSU Medical Center October 2007 to Present

Systems Analyst

Robert’s portfolio of clients include Fortune 100, healthcare, and marketing leaders. His clients rely on him for ITIL knowledge and infrastructure experience. Over the last six years, Robert has been responsible for:

1. Analyzing system performance, event viewer, security logs, network communication, network configuration and firewall settings, user accounts, security, antivirus, and malware scans for issues/threats. Created documentation of resolution processes and design for end users and clients. Trained users on best practices for implementing resolutions

2. Gathering information and researching solutions for technical issues, incidents, and problems.

3. Escalating issues and problems and determining priority based on numbers of users and systems affected, and severity, to appropriate support teams or levels.

4. Advising and consulting clients in hardware and software system upgrades and deployment.

5. Documenting and resolving technical issues utilizing various incident and change management tracking systems and performing root cause analysis.

6. Correcting configuration of software and hardware.

7. Tracking and managing incidents in compliance with service level agreements.

8. Acting as a customer and client advocate to third party support and vendors.

US Army August 1999 – October 2007

October 2007

As a non-commissioned officer, led and trained soldiers, and planned and conducted the day-to-day unit operations within prescribed policies and directives. Analyzed information as part of decision making processes. Analyzed orders and missions to determine specific, essential, and implied tasks. Planned preparation activities. Gathered and considered key information for use in making plans. Update the information continuously and refined the plans as needed.

Researched and developed plans to upgrade entire unit’s communications. Utilizing regular inspection and analysis of equipment and processes, improved the maintenance program of his unit. Ensured all missions were complete, and units had 100% communications during day to day operations, training exercises, and deployed missions in combat zones, resulting in mission success, and with zero incidents, wounded, or casualties. Participated in staff training and operations meetings. Served on the Lt. Col. Staff at the Battalion level, where in addition to communications, computer and network support, followed, educated, and enforced military information security policy.

Served as a Signal Support Systems NCO in a Division Special Troops Battalion; supervises and integrates the installation, operation and maintenance of signal support systems, to include radio, wire, cable and battlefield automated systems; plans, and provides training and support for the Division’s local area networks, wide area networks and routers which service over 10,000 users; assists in staff supervision of information network security and Army Information assurance policies; responsible for the morale, welfare, and professional development of one junior NCO, and three Soldiers; responsible for automation equipment worth in excess of $250,000.

As Information Assurance (IA) Support Officer:

1. Enforced IA policy, guidance, and training requirements per regulations

2. Ensure implementation of IA dissemination, reporting, and compliance procedures.

3. Ensure all users meet the requisite favorable security investigations, clearances, authorization, need-to-know, and security responsibilities before granting access to the IS.

4. Ensure users receive initial and annual IA awareness training.

5. Ensure log files and audits are maintained and reviewed for all systems and that authentication (for example, password) policies are audited for compliance.

6. Prepare, distribute, and maintain plans, instructions, and standard operating procudures concerning system security.

7. Review and evaluate the effects on security of system changes, including interfaces with other ISs and document all changes.

8. Ensure that all ISs within their area of responsibility are certified, accredited and reaccredited.

9. Maintained and documented for IS software (including IS warning banners) and hardware.

10. Pre-deployment or operational IASOs will ensure system recovery processes are monitored and that security features and procedures are properly restored.

11. Pre-deployment or operational IASOs will maintain current software licenses and ensure security related documentation is current and accessible to properly authorized individuals.

12. Report security violations and incidents

EDUCATION

DeVry University, Bachelor of Applied Science (BASc), Computer and Information Systems Security/Information Assurance, 3.80, 2008 – 2012, focus on computer forensics, Deans List

Page of



Contact this candidate