IT professional with over several years of professional and progressive technical experience in engineering, configuration, installation, integration, and troubleshooting of various technologies for enterprise environments and include proficiency in routing, switching, security, voice, and system administration.
Technical Certifications & Skills
Network Secuirty Rochester Edx
Cisco Certified Network Associate – Security CCNA – Security
Cisco Certified Network Associate – Routing/Switching CCNA – R&S
Microsoft Certified Solution Associate MCSA
Microsoft Certified Professional MCP
Information Technology Infrastructure Library ITIL
Amazon Web Services (AWS Certified Developer)-Associate AWS
Technical Skills Detail
Network Hardware: Cisco Routers (3900, 2900, 1900, 800), Cisco Catalyst Switch (6500, 5500, 4900, 4500, 3000, 3100), Cisco Nexus 5k and 7k Series, Cisco ASA 5500 Series, Cisco WLC, Juniper (E, M, MX, T) Series.
Routing/Switching: WAN, LAN, TCP/IP, Spanning Tree, BPDU, CDP, Frame-relay, PPP, ACL, Network Address Translation (NAT), Port Address Translation (PAT), Access Control List, RIP, OSPF, EIGRP, BGP, MPLS, VTP, SNMP, SMTP, ARP, TCP, UDP, Static Routing, Stub Routing, VLAN Trunking, Multi-Area OSPF, VLAN, VTP, HSRP, SVI, CEF, Etherchannel, Portfast.
Security Technologies: AAA, IPS/IDS, TACACS+, RADIUS, SSH, VPN, Cisco ACS, Data Loss Prevention, IPSec, Data Management Zone, Pretty Good Protection (PGP), Public Key Infrastructure (PKI), Internet Key Exchange Policy, Port Security, MAC Address Filtering, IPS/IDS.
Monitoring Tools/Hardware: Finisar, Wireshark, Remedy, Openview, Cacti, Nagios, VMware, Solarwinds, F5, Cisco Works, LogicMonitor, Cisco Security Manager Suite, DNS Servers, DHCP Servers, NTP Server, TFTP Server, Exchange Server, Blade Servers, Web Servers, Syslog, FTP, SFTP.
Summary of Professional Experience
P And P Motors LLC Onsite Technician (TMS) 2017-Present
Member of a team of professionals responsible for the developing, implementing and supporting mission critical technologies within in a LAN/WAN network infrastructure.
Technical responsibilities included, but were not limited to, the installation, configuration, administration, and troubleshooting of various enterprises LAN/WAN technologies, hardware/software, 2nd/3rd level training and support.
Install, configure, test and maintain operating systems, servers, application software and system management tools.
Implement GPO’s to user accounts through active directory.
Perform daily backup operations, troubleshooting and ensuring all required file systems and system data are successfully backed up on windows 7 and windows 10
Maintain and troubleshoot server platforms including but not limited to Active directory issues, Group policy and DHCP.
Special projects included developing network infrastructure from cabling to implementation of routers and switches utilizing VLAN, DHCP, IPv4 Address, Static Routes and network protocols.
Tizeti Network Limited. Escalation Support (ITS) 2015-2016
Member to a team of professionals responsible for the escalation support and maintenance of the IT infrastructure to include onsite administration and support, scheduled installation, configuration and troubleshoot activities.
Technologies handled by the team include but not limited to local area network (LAN) technologies, wide area network (WAN) technologies, server and enterprise applications and desktop technologies.
Professional responsibilities included project coordination, administration, following corporate policies and procedures, documentation, and scheduling as needed reports to management.
Escalation support activities included 2nd/3rd level support for various LAN/WAN issues to investigate, troubleshoot, reconfigure and resolve to resolve issue in a timely manner and as needed technical support and training of new technical professionals and users.
Master of Science in Computer and Information System (Pending) California University of Science
Bachelor of Science in Computer Science Afe Babalola University
Summary of Technical Accomplishments
Routing & Switching
Configure secure privileged administrative access to the Cisco IOS system. Enable the encryption of system passwords to prevent unauthorized users access to passwords in the system configuration.
Configure secure access to the console and sty ports, and set the interval that the EXEC command interpreter waits until user input is detected on the Console and sty ports. Also, configure the console and sty ports log messaging to not interfere with active device configuration.
Configured and administrated VLAN Trucking Protocol to reduce administrative overhead. Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switches ports following Layer 2 security best practices.
Configured VLAN Trucking Protocol to reduce administrative overhead. Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switches ports following Layer 2 security best practices.
Administrated Local VLANs based on department function, and configure ports with static VLAN assignment, static 802.1Q trunks, and dynamic ISL trucking using Pap for layer 2 forwarding. Utilize VLAN Spanning-Tree in conjunction with PVST+ for compatibility between Cisco and Juniper switches. Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays. Modify spanning-tree parameters for manual root bridge assignment. Implement ether-channels between each switch using Pap for negotiation. Modify ether-channel load balancing method.
Integrated WAN links between sites using frame-relay point-to-point and multipoint connections to establish connectivity between each of the four sites as required. Establish two frame-relay point-to-point connections between a central site and two remote sites. Configured multipoint connections between three of the sites forming a full-mesh.
Configured EIGRP MD5 Message Authentication between sites to prevent unauthorized insertion of routes into the domain. Integrate manual EIGRP route summarization to reduce routing protocol demand on CPU resources, memory, and bandwidth used to maintain the routing table.
Configure and administrated OSPF routing with multiple areas for networks between sites. Implement OSPF MD5 Authentication between each OSPF enabled subnet to prevent unauthorized insertion of routes into the domain.
Integrated static NAT/PAT to provide access to services located on a server in the private network to the public network. Implement standard and extended access-lists to filter network traffic.
Configured backup and recovery of Cisco IOS Images. Perform password recovery on Cisco IOS routers/switches and a Juniper EX2200 Series switch to restore administrative access. Backup and Restore startup-comfit file for disaster recovery.
Implemented an IPSec Site-to-Site VPN between the Cisco ASA 5505 at small office location and Cisco 1841 ISR with a security IOS image at the main office.
Implemented VPNs for IKE Policy using DES and SHA for encryption and authentication, access-lists to define VPN traffic, a transform set using esp-des esp-sha-hmac for traffic protection, crypto map to configured elements to a peer, and application of the crypto map to appropriate interface or VPN endpoint.