Post Job Free
Sign in

Network engineer

Location:
Greensboro, NC
Salary:
60000
Posted:
February 14, 2018

Contact this candidate

Resume:

Executive Summary

I am currently seeking a long-term role to finalize my enrollment into a competitive Veteran IT Program in Network Engineering. The program requires full time employment in an IT position. The optimal position will provide the maximum amount of growth potential in an organization that recognizes the value of a strong work ethic, superior organizational skills, team and conflict management abilities and excellent time management strategies. I am an approachable leader that is not afraid to roll up my sleeves and welcome an environment with strong mentors who regularly challenge me to take on responsibilities outside of my comfort zone.

ETAC Inc. (US Veteran Jobs) Veteran IT Program in Network Engineering

Over the next 32 months I will combine the skills I learn through 19 courses (Cisco, CWNP and EC-Council) with the practical experience I receive in my new position to accomplish my goal of becoming a Senior Network Engineer. All training is focused on emerging technologies and skills within Wireless / Mobility, Infrastructure Security, Cyber Security, Data Center, Cloud and Campus Switching / Routing. Strong emphasis is put on Project Management, Risk Assessment and Compliance processes.

Program Overview Can Be Found At

www.usveteranjobs.com

Accomplishments

● Obtained a Secret clearance while in the military.

● Through years of working with customers was about to build my customer service skills.

Work History

Window Clerk 2012-Present

United States Postal Service

●Precise, organized, professional and efficient in all procedure used at the U.S. Post Office.

●Supervised sorting and loading mail, as well as filing reports for stolen, lost, or change of address packages.

●Ensure customer satisfaction by perform tasks needed and answering any questions.

Team Supervisor 2006- 2009

U.S Army

●Performed precise mathematical calculation to ensure accurate placement of high explosive rounds.

●Worked with a team to maintain, repair, and move multiple weapon systems.

●Acted as a liaison between different occupational specialties to ensure safety and satisfactory job performance.

●Led a team of 10+ employees to properly conduct quarterly and monthly inventory assessments

Education

Network and Cyber Security

Randolph Community College, Asheboro, NC

Criminal Justice

Randolph Community College, Asheboro, NC

ETAC Veteran IT Program in Network Engineering (In-Progress)

2017-Present

Certifications Training

CCNA Routing & Switching – Cisco Certified Network Associate – Routing & Switching

CCNA Wireless – Cisco Certified Network Associate - Wireless

CCNA Cloud – Cisco Certified Network Associate - Cloud

CCNA Cyber Ops– Cisco Certified Network Associate – Cyber Ops

CCNA Data Center – Cisco Certified Network Associate – Data Center

CCNA Security– Cisco Certified Network Associate - Security

CWNA – Certified Wireless Network Administrator

CWDP – Certified Wireless Design Professional

CWSP – Certified Wireless Security Professional

CWAP – Certified Wireless Analysis Professional

CCNP Wireless – Cisco Certified Network Professional – Wireless

CCNP Data Center – Cisco Certified Network Professional – Data Center

CCNP Security – Cisco Certified Network Professional - Security

CND – EC-Council Cyber Network Defender

CEH – EC-Council Certified Ethical Hacker

PMP – Project Management Professional

CISSP – Certified Information Systems Security Professional

VCP – VMware Certified Professional

Cisco Network Programmability Design and Implementation Specialist

Industry Compliance Standards

Skills & Technology Focus

Project Management: Planning and Time Management Budget, Quality Control and Communications Risk, Procurement and Stakeholder Management Managing Work, Scope, Schedules and Cost Building and Leading an Effective IT Team Building and Effective Trust Model Managing Conflict Encouraging Commitment and Ownership Increasing the Team Standard of Excellence Achieving the Right Results

Wireless LAN (WLAN) WI-FI Mobility: Site Survey Procedures Designing for Data Coverage Designing for Voice and Real-time Applications Designing for Location and CMX Designing for Outdoor and High Density Designing and Executing Effective Security Policies Security Approaches in the Enterprise End Point and Client Security Cisco Identity Services Engine (ISE) and Security Management Wi-Fi Infrastructure Security Access Control Secure Roaming Network Monitoring Troubleshooting Processes Communications Protocols 802.11 Frames WLAN Hardware Spectrum Analysis Wired Issues

Data Center Cloud Virtualization SDN ACI: Network Protocols and Host-to-Host Communication Data Center Networking Concepts Data Center Storage; FCoE, Fiber Channel, iSCSI Server Architecture Data Center Network Virtualization Unified Computing System (UCS) Overview Automation and Orchestration SDN and Application Centric Infrastructure (ACI) NX-OS Configuration Automation Provide Increased Bandwidth and End-to-End Resiliency Services Provisioning Custom Queuing and Quality of Service Python, JSON, REST, XML, NETCONF, YANG APIs and Automation Protocols OpenFlow, OpenDaylight, SDK Network Operations and DevOps VMware Software Defined Data Center VMware vCenter Server, vMotion and ESX

Infrastructure Security Cyber Security: Security Concepts; Firewall, VPN, Intrusion Detection and Protection (IDS/IPS) Threat Mitigation through Identity Services Engine (ISE) Web Authentication and Guest Access (ISE, TACACS, RADIUS) Deploying NAT on Cisco IOS and Cisco ASA Deploying Threat Controls on ASA and IOS Cisco FlexVPN Solutions SSL VPNs Cloud Web Security Cisco Email Security Appliance Cisco Malware Protection Cisco FirePOWER Security and Risk Management Identity and Access Management Security Assessment and Testing Security Operations Software Development Security Footprinting and Reconnaissance Scanning Networks Enumeration Preventing System Hacking Preventing Malware Threats Sniffing Social Engineering Preventing Denial of Service Preventing Session Hacking Preventing SQL Injection Protecting Cloud Computing Understanding Cryptography



Contact this candidate