Post Job Free

Resume

Sign in

Help Desk

Location:
Taylors, SC
Posted:
August 30, 2017

Contact this candidate

Resume:

Michael A. Keys

***A Taylor Road

Greer, S.C. ***51

ac129f@r.postjobfree.com

Goal:

To work for an organization as a Remote Security/Network Engineer/Help Desk/Desktop support in a medium to large enterprise data center. I am currently studying Python, Threat Modeling, Guidelines on Firewalls and Policy, Splunk, and Sail Point with regards to asset categorization as well as compliance (governance in mind).

Salary: negotiable

SUMMARY

Years of experience working in Mainframe environments both Federal and Public.

Years of experience with Access Control, Information Security Governance and Risk Management, Security Architecture & Design, and Telecommunications & Networking.

Year of experience in desktop support in networked environments.

5 years of managing the installation of voice, data, and video circuits including copper and fiber wiring with ability to read blueprints and schematics.

Years of UNIX and Linux experience (scripting and system administration)

10 years of designing, troubleshooting, SIEM dashboards for signature-based correlation of events in Cisco, RSA Envision, Log Rhythm, Juniper, McAfee, Splunk, Websense, and Sail Point (Identity Access and Governance).

COMPUTER SKILLS

Operating Systems

Windows

Windows Server/ HYPER-V/Virtualization

Linux Operating Systems

Unix Operating Systems

PowerShell

Network Infrastructure Implementation

SCCM, Group Policy, Active Directory, Symantec Enterprise security

Knowledge Base:

TCP IP Troubleshooting/Utilities

Cisco VPN Concentrators/ Cisco Load Balancers

Cisco Router hardware & software configurations

UNIX Software Administration

Vulnerability scanning and assessment

Threat Risk Modeling

Guides on Firewalls and Firewall Policy (800-41)

NIST Special Publication (800-53 r4)

HIPAA

Sarbanes Oxley

PCI DSS

Applications:

Microsoft MS-Office

HP’s Omni back Data Protector for system backups and restores

AHD automated help desk

Tivoli

Web sphere

Remedy

Kronos

Genesis

IBM’s Tivoli Enterprise Console (TEC)

IBM’S Tivoli Workload Scheduler (TWS)

IBM’s Sterling Connect - Enterprise

Job Scheduling Console (JSC)

Enterprise Symmetric Storage EMC, IBM, HDS, DELL(SAN)

Air Defense, Air Watch

Cisco VMS, Pix, Switching Modules, ASA Firewalls, NAC, NAT, IDS/IPS sensors maintenance, signature updates and configuration

Net forensics, Cisco MARS, RSA Envision, Blue Coat, RSA Secur-ID

Net scout

Solar winds

TACACS+

VMware

Novell Access Manager (NAM)

Wireshark

Siebel

BMC

Network protocols – TCP/IP, UDP, DHCP, ARP, DNS, NAT, FTP, SNMP, SMTP, SSH, SSL, VPN, HTTP and HTTPS

EXPERIENCE

Information Security Analyst/Service Desk November 21, 2016 to Present

Hexaware

Herndon, Va.

I performed primary duties in Identity and Access Management provisioning and de-provisioning of client access to high risk applications as well as low risk applications. I performed associated tasks for Quality Control to ensure clients were not given access to applications that were not approved by management.

Information Security Consultant Greer, South Carolina

May 2014 – Present

May 2014

Vulnerability Scans performed

I performed an assessment of alarming messages were sent to office desktop computers.

Disconnected affected desktops and reimaged.

Restored shared drives, folders.

I proposed a solution to separate certain data as critical and non-critical.

I signed confidentially agreement.

June 2014

Install, configured antivirus for existing and new desktops.

Installed the most current patches for virtual machines.

I created new snapshots of virtual machines for disaster recovery.

Implemented patch procedures for vulnerabilities.

Proposed a backup solution.

I signed confidentially agreement.

August 2014

Cabling

Pulled CAT5 cabling for desktops.

Setup, configured multiple desktops.

Expanded sales to include mass market accounts.

September 2014

Cabling and network installed

Pulled Cat5 cabling for desktops.

Unpacked, setup of desktops.

Installed local area network without internet connectivity.

November 2014

I received a request to investigate a computer server due to performance issues and possible malware infections.

I performed an upgrade to existing server, and configured new system for small business.

I created a system image of upgraded system for disaster recovery.

I sent proposal to owner for anti-virus and backups solutions with associated cost analysis for implementation when needed.

Jan 2015

Consultant

Prepared documentation for small business cyber security framework (NIST)

Prepared PowerPoint presentations as a subcontractor.

I participated in the writing of a baseline security policy for a small business.

May 2015

I had left knee surgery.

Oct 2015

I performed a security assessment of current environment.

I performed malware/virus removal on lawyer’s office desktop systems.

I installed antivirus software on all systems.

I contracted to perform network check every 3 months; security assessments.

Jan 2016 to March 2016.

I collaborated on a SEIM project to evaluate, recommend the steps to upgrade existing IDS/IPS for a top 50 company.

I helped to perform internal as well as external perimeter vulnerability scanning.

I assisted in the evaluation of patches, licensing issues regarding current physical servers hosting virtual machines. I helped to update out of date vendor patches for their virtual environments, and explained how important that testing as well applying the patches prevents certain attack vectors to management.

I signed confidential agreement.

Information Security Architect (6:45 p.m. – 7:00 a.m. June 5, 2006 - September 2008) (6:45 a.m. to 7:00 p.m. October 2008 to April 2014)

Lowe’s Corporation

Mooresville, North Carolina

Provides security monitoring and first level support on technical/procedural issues of information security utilizing Cisco MARS software, Net forensics, and Air Defense (to monitor wireless Access Points).

Demonstrated on-the-job experience with vulnerability assessment tools (hands on experience) and cyber security engineering. Demonstrated understand of Identity & Access Management (IAM) best practices, and how these relate to regulatory requirements.

Demonstrated experience with security incidents and event management (SIEM, IDS/IPS) and logging environments for security events and alerts to potential (or active) risk or threats, intrusions, and/or compromises.

Demonstrated on-the-job experience communicating and collaborating effectively with program leads and Technical SMEs in support of program milestones or projects that require extensive collaboration over long periods of time.

Collaborated with CISO team to evaluate, test, and deploy IDM/IAM solutions (RSA, ADFS, NAM) to improve identity access control for SSO (single sign on) change request.

Demonstrated on-the-job experience providing guidance and direction on the maintenance of security configuration control of hardware, systems, and application software where needed. Demonstrated support and guidance based in the areas of security architecture design, operations management, business risk assessment, and policy development.

Develops and maintains technical event analysis documentation of configurations and standards for all application platforms, operating systems, and network devices in both the production, development and test environments. Participated in all change requests for vendor access thru corporate firewalls (ASA).

Demonstrated on-the-job experience performing in-depth analysis on reports produced from vulnerability assessment tools and the ability to communicate those results effectively to other project stakeholders.

Provides desktop and server support to resolve information security issues concerning connectivity to the corporate network and logged tickets in Remedy to track incidents.

Identifies asset threats, vulnerabilities, and compensating controls with regards to NIST, PCI-DSS, Sarbanes-Oxley and HIPAA for Audit compliance.

Demonstrated on-the-job experience assessing and guiding the implementation of identified corrections associated with technical vulnerabilities.

Demonstrated experience with the development and maintenance of security policies, standard operating procedures (SOP) documentation for Lowe’s Corporate Information Technology Division.

Collaborated with corporate technical teams (Audit, ISM, CISO and Network Engineering) to identify, resolve, and mitigate events with root cause analysis.

LAN Discovery Techniques

Intrusion and Attack Techniques

802.11 Protocol Analysis

Wireless Intrusion Prevention Systems (WIPS) Implementation

Layer 2 and 3 VPNs used over 802.11 networks

Enterprise/SMB/SOHO/Public-Network Security design models

Managed Endpoint Security Systems802.11 Authentication and Key

COMPUTER OPERATOR 3rd Shift 12:00 to 8:30a September 12, 2005- March 2006

BASF/SIEMENS Business Services, Inc.

4400 MASTERS BLVD

ANDERSON, SOUTH CAROLINA

Tivoli Job Monitoring of application batch processing, batch reruns, hardware failures in the United States, and from remote sites around the world.

Creating and Scheduling of jobs utilizing IBM software Tivoli job scheduler.

Monitoring of backups and restarting failed backups utilizing Hewlett Packard’s Omni back Data Protector Software.

Responsible for performing nightly FTP transfers of data to Germany utilizing IBM Sterling Connect – Enterprise and verifying with customer to ensure data was received.

Monitoring of automated tape library (ADIC), and storage area

Monitoring job failures via TEC (Tivoli Enterprise Console) and addressing any job failures by following the job documentation or escalating any issues or problems to the operation scheduler during the shift.

Responsible for the creation of SAP/R3 Production, quality, and test background jobs according to the Background Job Documentation supplied in the Global SAP Knowledge Center (GSKC).

Monitoring of BASF routers, servers, and WAN links of remote sites for connectivity around the world using the Concord monitoring software.

Logging help desk tickets thru AHD (automated help desk software) for failed jobs, failed desktop or server network connections, and application failures.

Monitoring IBM’s Tivoli Enterprise Console (TEC) messages for fatal, critical (all file systems), warning (archive file systems only), and prompts on all of BASF’s UNIX, Intel, Novell, and Network Systems. In addition, operators are responsible to notify the appropriate UNIX (100+ systems), Database Administrators, and/or SAP Central Basis Group for resolution depending on the Tivoli error message(s).

Preparing turnover reports in detail of any failures to Network Server backups, Network outages, tape issues, and for discussion during morning conference calls for support personnel around the world.

Ensure a clean, safe, secure environment for all personnel.

I-N-I COMPUTER SERVICES January 1996 – December 2004

33 Bennett Drive

Taylors, South Carolina

Owner: Michael Keys

Responsibilities:

Monitoring, configurations and troubleshooting of IBM MVS/XA mainframes.

Desktop computer sales, marketing, setup, configuration, and troubleshooting for lawyers in South Carolina.

AS/400 maintenance and troubleshooting for the City of Fountain Inn, City of Liberty in South Carolina.

Network installation and cabling for RE/Max and Century 21 in Maryland, and consulted on Web site development project.

Cat5 cabling contract for the cities of Fountain Inn and Liberty, South Carolina.

Provide onsite desktop troubleshooting for lawyers around the Upstate under certain maintenance contracts.

Configuration of TEC (Tivoli Enterprise Console) for operations staff for failed UNIX jobs, of which fatal, critical, warning messages of all file systems were needed.

Consultation with Blue Ridge Computer Systems to implement Omegamon II for MVS monitoring environment, and Windows NT 4.0 Server for resource sharing of file and printers services.

Analyzed network design and configuration for several companies, and initiated corrective action when necessary to ensure a cost effective solution.

COMPUTER WAN/LAN SPECIALIST MARCH 1990 - January 1996

Department of Defense, BUMED

Naval Medical Information Management Center, Operations Department

8901 Wisconsin Avenue

Bethesda MD. 20889

Primary responsibilities include desktop administration, selection, and installation, monitoring, and troubleshooting of end users environments around the globe for all Naval Hospitals.

Windows NT 4.0 Server configuration, installation, deployment, and monitoring for file and print sharing. Provides procedural documentation to record and explain the results of the above effort.

Analyze problems and determine the best technical solution to integration issues.

Cisco AGS+ router installation, configuration, deployment, troubleshooting, and monitoring for all Naval Hospitals of which included travel to each site.

Create and maintain voice and data circuits including copper, and fiber wiring to each of the Main hospitals and any outlaying medical clinics or dental clinics.

COMPUTER OPERATOR

DEPARTMENT OF DEFENSE, NMIMC, October 1987 -February 1990

Console monitoring of TSO, ISPF, and VTAM for unusual conditions that impact performance.

Initiate system backups and restore operations initial program load (IPL).

Monitor Amdahl 5890/190e MVS/XA/Jes2 mainframe environment consoles via Omegamon.

Diagnose any workflow issues to process new requirements within existing schedules and procedures (JES job entry subsystem).

I maintained a professional attitude with system programmers, system analysts, end users, and service technicians from IBM, AMDAHL, MEMOREX, STORAGETEK, and many others.

Ensure a clean and safe work environment.

COMPUTER ASSISTANT September 1984 - September 1987

DEPARTMENT OF DEFENSE, NNMC

Maintained magnetic tapes for processing of batch jobs.

Prepared test plans utilizing FATS (fast analysis of tape surfaces.

Maintained integrity of data with tapes cleaner Kybe Series 440.

Analyzes documentation provided with new or revised programs.

Enters necessary scheduling data via remote terminal into automated scheduling system.

Provides assistance to Remote Job Entry (RJE) and Time Sharing (TSO) users who have terminal, card reader, tape drive and or printer capabilities.

MEDICAL RECORDS TECHNICIAN September 1979 – August 1984

8901 Wisconsin Avenue

NNMC, Bethesda, Maryland 20814

I received a certificate in medical terminology.

I maintained medical records for active duty military, retirees, dependents, and members of the public health service.

I have superior knowledge of the use of the terminal digit system for filing, retrieving, tracking, and retiring of medical treatment records utilizing the social security number.

I have retired numerous medical records to St. Louis, Missouri for offsite storage for federal documents.

EDUCATION

Graduated Howard D. Woodson Senior High School June 1979

Pursing Bachelor of Science in Computer Information Systems

Strayer University, Washington, D.C.

Classes completed:

System Analysis and Design

UNIX Operating System

C Programming 1

Software Engineering

Introduction to Business

COBOL Programming 1

Communications 1

COBOL Programming 2

Introduction to College Math 1

Communications 2

Distributed Communication Systems

Introduction to Psychology

Principles of Economics

Accounting 1

Computer Operating Systems

Introduction to Networking

Communications 3

Introduction Local Area Networks

LAN Administration

Cisco Router AGS+ Software Training

Cisco Router AGS+ Installation and Maintenance

January-December 2005 (Greenville, SC Campus) Junior

Introduction to Relational Database Management Systems

The Origins of Western Culture

Introduction to Sociology

Administering Windows desktop clients

Windows 2003 Server Administration

Network Infrastructure Implementation

January-December 2006 (Greenville, SC Campus) Senior

Java Programming 1

Introduction to Art, Music, Literature

History and Methods of Science

Object-Oriented Programming 1

153.0 credits completed (180.0 for Bachelor of Science degree)

Windows Server Administration Fundamentals Completed January 2015

Networking Fundamentals Completed March 2015

Windows 10 Technical Preview Fundamentals for IT Pros Completed April 2015

Software Development Fundamentals currently studying June 2015

C# Fundamentals for Absolute Beginners currently studying September 201

Security Fundamentals currently studying January 2016

Introduction to Programming with Python currently studying April 2016

NIST 800-37 Guide to Applying the Risk Management Framework

ITIL Service Strategy, Service Design, Service Transition, Service Operation, Continual Service Improvement (2011 – 2013)



Contact this candidate