Post Job Free
Sign in

Manager Active Directory

Location:
Reston, VA
Posted:
December 28, 2013

Contact this candidate

Resume:

Mr. Truong H. Nguyen

Falls Church, VA *****

******.******@***.***

703-***-****

SECURITY CLEARANCE: Active TS/SCI (13-NOV-2013)

CAREER OBJECTIVE: To be in a job where I am still working on the latest and leading edge of technology.

SUMMARY:

Dedicated and self-motivated VMware/Windows System Administrator with extensive hands-on experience in

Windows system administration

Process strong multi-tasking abilities with little or no supervision

Work well both independently and as contributing member of the team

Experience in VMware ESXi 4.1&5.0 – Perform consolidation and migration efforts: P2V using VMware vCenter

Converter 4

Network/Protocols: LAN, WLAN, TCP/IP, WINS, DNS, DHCP, POP3, SMTP, FTP, VPN, Ethernet

Configure and secure IEEE 802.11g & 802.11n WLAN by changing the default wireless router’s Service Set

Identifier (SSID) & password, disabling the SSID broadcast, generating random or custom 64/128-bit Wired

Equivalent Privacy (WEP) keys, and enabling wireless MAC address filter

Able to assemble a PC starting with the motherboard follow by CPU, heat sink, “matched” RAM memory, 3

and/or 5 ” hard drive bay(s) and cable(s), CD/DVDROM, expansion card(s), cooling fan(s), power supply, ect.

Experience and familiar with Hypervisor technology like installing, configuring, administering VMware ESX 4.1 &

5.0 upgrade

Create and manage VMs (virtual servers & vCenter) and also involved in the maintenance of the virtual servers

Experience supporting large enterprise wide environments (i.e. 500+ servers and 3,000+ users)

Possess extensive expertise in maintaining Windows 2003/2008 Server environment

Experience troubleshooting Windows Server hardware / software and troubleshooting applications

Experience with MS Active Directory:

- Configure and deploy GPOs to target user groups or machine groups as well as troubleshooting issues within

that area

- Manage account administration and access control using AD groups and local groups, AD users, computers,

and OU containers

Experience with security best practices (e.g. DoD STIG & DISA Gold Disk)

In-depth knowledge of HP server hardware (rack mount and blade) and operating system internals

In-depth experience with the imaging process

Understand all aspects of server lifecycle management (baseline development, provisioning, patch management,

configuration management, backup/recovery and decommissioning)

General knowledge of networking technologies including network protocols (e.g. TCP/IP) and network addressing

Understand Enterprise server hardware technologies and configuration

Experience with software distribution packaging, patch deployment, troubleshooting related client and server

issues, and deploying packages to target user groups or machine groups

Automate patch deployment and updates (e.g. service packs and configuration changes) across a large server

environment (1,000+ OS instances) via tools and/or scripts

Experience with managing and supporting desktop security anti-virus solutions. This includes configuring and

managing the server infrastructure, deployment of anti-virus solutions (client and server)

Ability to maintain a reliable and methodical approach to support and documentation

Quick learner highly motivated with excellent organizational and analytical skills

Consistent Communication Skills: Report in a clear, concise, and thorough fashion, simplifying difficult concepts

and developing concrete terms for abstract ideas while increasing accuracy

1

EDUCATION: STRAYER UNIVERSITY, ALEXANDRIA, VA SEPTEMBER, 2003

B.S., COMPUTER NETWORKING (GPA: 3.59/4.00, Cum Laude)

PROFESSIONAL IT CERTIFICATONS (21):

CompTIA

1. Network+ 2009 (Career ID No.: COMP001020029867; Issue Date: 14-NOV-2009)

2. Security+ 2011 (Career ID No.: COMP001020030035; Issue Date: 28-NOV-2011)

Microsoft – MC ID: 2102651

Microsoft Certified Professional (MCP) on Windows NT 4.0 (Certification No.: A450-6099; Achievement Date:

O

27-NOV-2000)

Microsoft Certified Technology Specialist (MCTS):

O

1. Windows Server 2008 Active Directory, Configuration (Certification No.: D631-9423 ; Achievement Date:

5-FEB-2012)

2. Windows Server 2008 Network Infrastructure, Configuration (Certification No.: D686-0706; Achievement

Date: 14-MAR-2012)

3. Windows 7, Configuration (Certification No.: D777-7346; Achievement Date: 12-MAY-2012)

4. Microsoft Exchange Server 2010, Configuration (Certification No.: D960-5754; Achievement Date: 22-

JULY-2012)

5. Windows Server 2008 Applications Infrastructure, Configuration (Certification No.: E153-6757;

Achievement Date: 03-FEB-2013)

6. Work in Progress – Microsoft SharePoint 2010, Configuring (Certification No Achievement Date: XX-

DEC-2013)

Microsoft Certified IT Professional (MCITP):

O

1. Server Administrator on Windows Server 2008 (Certification No.: D711-2834; Achievement Date: 15-APR-

2012)

2. Enterprise Messaging Administrator on Exchange 2010 (Certification No.: E021-5719; Achievement Date:

30-SEPT-2012)

3. Enterprise Desktop Administrator on Windows 7 (Certification No.: E090-2142; Achievement Date: 07-

DEC-2012)

4. Enterprise Administrator on Windows Server 2008 (Certification No.: E251-9405; Achievement Date: 28-

APR-2013)

5. Work in Progress – SharePoint Administrator 2010 (Certification No Achievement Date: XX-DEC-2013)

Microsoft Certified Solutions Associate (MCSA):

O

1. Windows Server 2008 (Certification No.: D713-1383; Achievement Date: 16-APR-2012)

2. Windows Server 2012 (Certification No.: E042-3730; Achievement Date: 28-OCT-2012)

3. Windows 7 – (Certification No.: E090-2143; Achievement Date: 07-DEC-2012)

Microsoft Certified Solutions Expert (MCSE):

O

1. Windows Server 2012 Infrastructure (Certification No.: E049-2234; Achievement Date: 06-NOV-2012)

2. Windows Server 2012 Desktop Infrastructure (Certification No.: E101-7627; Achievement Date: 16-DEC-

2012)

3. Windows Server & System Center 2012 Private Cloud (Certification No.: E118-7333; Achievement Date:

30-DEC-2012)

VMware – VCP No.: VMW-00510734E-00093246

1. VMware Certified Professional – Datacenter Virtualization on vSphere 4 (VCP4-DCV) (Issue Date: 24-SEP-

2011)

2. VMware Certified Professional – Datacenter Virtualization on vSphere 5 (VCP5-DCV) (Issue Date: 22-FEB-

2012)

3. VMware Certified Professional 5 – Desktop (VCP5-DT) (Issue Date: 20-OCT-2012)

4. VMware Certified Professional – Cloud (VCP-Cloud) (Issue Date: 17-NOV-2012)

2

PROFESSIONAL EXPERIENCE:

General Dynamics Information Technology (GDIT), 3211 Jermantown Rd, Fairfax, VA 22030 07/2013 – Present

Principal Systems Administrator at the Defense Advanced Research Projects Agency (DARPA)

VMware vSphere 5

- Deploy Windows 2008 virtual servers from Virtual Machine (VM) template that has been: (1) fully patched via

Microsoft System Center Configuration Manager 2012 (SCCM); (2) compliant with the DISA Security

Technical Implementation Guide (STIG) via the Host Based Security System (HBSS) and the Security

Content Automation Protocol (SCAP) Compliance Checker (SCC)

- Manually add ESXi patches into Update Manager (VUM) for closed networks (SIPRNet & JWICS) by creating

baselines or baseline groups that can be used to remediate the ESXi hosts

- Manage vCenter permissions by associating VMware permissions to AD security groups

Windows Server 2008 Active Directory (AD) and Exchange 2010

- Configure Group Policy Objects (GPO’s) according to DISA’s STIG and link them to the AD organizational

units (OU’s)

- Create AD user accounts and Exchange mailboxes

- Create AD computer accounts and join servers to domains

Microsoft SharePoint 2010

- Create site collections (top-level sites) and subsites

- Manage site permissions by associating SharePoint permissions to AD security groups

Microsoft Virtual Desktop Infrastructure (VDI)

- Deploy Windows 2008 virtual servers with Remote Desktop Services (RDS) to host multiple, simultaneous

client sessions

- Configured and deployed DELL Wyse thin-client hardware devices that run an embedded Windows 7-based

operating system with Remote Desktop Connection (RDC) client software

- Enable single sign-on for RDC clients by: (1) Configuring authentication on the RD Session Host server; (2)

Configuring the client computer to allow default credentials to be used for logging on the specified RD

Session Host servers by using either Local Group Policy or the Group Policy Management Console (GPMC)

- Configure Folder Redirection policy in the GPMC and AD for all user profiles (Desktop, Documents, Pictures,

Favorites, Contacts, etc.) to redirect to the NetApp Storage Area Network (SAN)

Perform security hardening on all servers prior to production deployment using Security Content Automation

Protocol (SCAP) Compliance Checker (SCC)

IntePros Federal, 1 Research Court (Suite 160), Rockville, MD 20850 06/2012 – 07/2013

VMware System Administrator at the Pentagon’s Joint Chiefs of Staff (DoD)

Maintained and administered Active Directory (AD) 2008 and Microsoft Exchange 2010 servers

- Provided standard user management including setting up of user accounts, exchange mailboxes, and

assignment of home drive

- Created Organizational Units (OUs) for implementation of Group Policy Objects (GPOs)

- Created AD security groups to manage vCenter permissions

- Performed exmerge, a process of deleting e-mails which were sent out unintentionally to multiple recipients’

mailboxes using a third party software (Exchange 2010 Mailbox Search Tool v1.0)

- Assigned mailbox permissions

Installed, configured, and provided maintenance of Windows physical servers using HP Integrated Lights-Out

(iLO) Remote Management & IBM BladeCenter Advanced Management Module for 5 data centers

- Hardware: (1) HP ProLiant BL465c & BL685c G6; (2) IBM LS41 (TYPE 7972) & LS42 (TYPE 7902)

- Configured RAID1 for HP ProLiant BL685c G6 blades using HP SmartStart CD and deployed Microsoft

Windows Server 2008 R2 Enterprise servers

Managed several vSphere 5 virtual environments (staging & production)

- Provided support of vSphere 5 upgrades on ESXi 4u1 hosts

- Designed, installed, configured VMware ESXi 4u1 & 5 clusters, within vSphere 4 and 5 environments with

VirtualCenter (vCenter) management, DRS, HA, DPM, vMotion and VMware Data Recovery

- Created VMs from ISO and fully patched template for VM deployment

- Organized VMs into folders in the data center for managing permissions for different teams using AD groups

and VMware permissions

- Migrated VMs from one datastore to another across the WAN and add them to the inventory of the ESXi

cluster

Managed print servers, printers, and print devices:

- Created printers and ports using IP Address Management (IPAM, a TCP/IP Scanning and Address

Management Tool) on DHCP servers

- Configured print devices including multi-function devices (HP & Samsung) with static IP addresses and latest

drivers

3

- Managed printers using HP Web Jetadmin

Monitored all servers (Windows & ESXi) using System Center Operations Manager (SCOM) 2007 R2

Prioritized and resolved self-assigned Remedy trouble tickets including escalated tickets from Tier 1 & 2 helpdesk

Troubleshot and provide support for all workstations remotely using DameWare NT Utilities Application

Provided guidance to & cross train other team members

Adapted to changing environment requirements and managing multiple tasks

Created and/or updated system documentation and Standard Operation Procedures (SOP’s) as needed

Accenture, 800 N Glebe Rd (Suite 300), Arlington, VA 22203 01/2012 – 06/2012

Enterprise Management Tools Engineer at the National Reconnaissance Office (NRO)

Worked as part of a technical support team delivering a quality service to single/multiple clients using a variety of

hardware and software products

Provided technical support & maintenance of production and development systems and administration of

environments, running on various platforms, ensuring SLA targets are met

Provided expertise on system performance tuning, capacity planning, and maintenance patching and new version

installation

Provided ongoing management and/or improvement of activities related to a part or to the whole of a technical

infrastructure (e.g. information systems, security, telecommunications networks, etc.).

Deployed standard repeatable build outs

Managed relationship with application vendors and ensure they are meeting all service levels and responsibilities

Planned and implemented medium to high risk changes on production systems

Analyzed and assessed the impact and risk of low to medium

Conducted trend analysis with a focus on proactive identification of events/issues that threaten performance and

a consistent & timely resolution and documentation

Analyzed system performance indicators and recommend improvement actions

Monitored vendors' release notes and plan necessary upgrades and patches as required

Assisted disaster recovery tests

Created and reviewed technical system recovery plans

Reviewed the problem management register and identify and implement actions

Assessed/installed/maintained third-party tools

Made proactive suggestions for service improvements

General Dynamics Information Technology (GDIT), 6400 Grovedale Dr., Alexandria, VA 22310 06/2011 – 10/2011

Senior System Engineer at the Defense Advanced Research Projects Agency (DARPA)

Provided support for a closed network consists of VMware ESXi 4.1 licensed for clustering, Microsoft Windows

Server 2008 R2 x64 Datacenter, Exchange 2010, and Windows 7 Professional x86

- Installed, configured, and managed of network Microsoft Windows servers (domain controllers, application

server, exchange servers, files servers, web servers, and SQL servers) in accordance with established

policies and procedures

- Performed automated software security patch & service pack deployment to network Microsoft Windows

servers and workstations using Windows Server Updates Services (WSUS) 3.0 installed on an export

physical and an import virtual servers and configure client computers (workstations and servers) within the

disconnected network to install from the WSUS import virtual server using AD-based GPO

- Conducted backup/restore operations of virtual servers when needed

- Planned for system outages

- Troubleshot and resolved all Windows network related issues

Microsoft Office SharePoint (MOSS) 2010

- Managed and provided expertise in the provisioning, configuring, maintenance, functionality and efficiency of

enterprise SharePoint 2010 server

- Provided daily operations support for MOSS users by helping users to understand the way new software

works

- Maintained the integrity and security of MOSS by designing Active Directory (AD) Organization Units (OUs)

structure, creating AD security groups, and using Group Policy Objects (GPOs)

- Developed and implement testing strategies and document results

- Provided advice and training to end-users

Responsible for creation and maintenance of user accounts, security groups, distribution groups, and information

access control

Utilized McAfee ePolicy Orchestrator (ePO) management server to deploy and manage anti-virus software and

DAT updates to systems on the network

Performed security implementations using approved Security Technical Implementation Guides (STIGS)

Coordinated with vendors to resolve software issue and conducted follow-ups until issue is resolved

4

Maintained system documentation

Made recommendations to purchase hardware and software, coordinate installation and provide backup recovery

Provided guidance and work leadership to less-experienced staff members

Maintained current knowledge of relevant technologies as assigned

Participated in special projects as required

Troubleshot problems reported by users

Communicated about any system failure to the users and update them about the possible uptime

Koniag Services, Inc. (KSI), 2751 Prosperity Avenue (Suite 100), Fairfax, VA 22031 10/2010 – 06/2011

System Administrator at the National Guard Bureau (NGB)

Provided system, network administration and hardware support for web-based software applications and

information systems in a Test environment

Provided technical and logistical support for application hosting environments

Installed Microsoft Windows Server 2003 & 2008 R2 x86 & x64 Standard, Enterprise, Datacenter, or Web on

legacy HP ProLiant BL20p G2 & G3 blade servers by using HP SmartStart CD to create the USB Key for RAID1

and RAID6 configurations and firmware upgrade

Supported the virtualization of all environments through the use of VMware ESXi 4.0 by:

- Converting HP ProLiant BL460c G6 blade servers with 2 hot-plug Small Form Factor SAS or SATA hard disk

drives (HDDs) into ESXi 4.0 hosts in conjunction with HP StorageWorks SB40c Storage Blade with 6 HDDs

for housing datastore and virtual machines (VMs)

- Installing and configuring VMware vCenter Server 4.0 software on a dedicated Windows 2008 R2 x64

Standard physical server in order to manage multiple ESXi 4.0 hosts and virtual machines through vSphere

Client 4.0 which is a single console application installed on a workstation

- Creating VMware templates from thin virtual machines with various operating system (OS) ISO installed

- Deploying virtual servers from fully patched & sysprep VMware templates

- Converting many physical machines to VMs (P2V) at the same time with a VMware Converter centralized

console and special consideration for domain controllers and application servers

- Managing the distribution of VMware software patches to ESXi servers using the vSphere Host Update Utility

on the vCenter server

Implemented the imaging process and deployment of Microsoft Windows 7 Enterprise x86 by using the following

tools:

- Windows Automated Installation Kit (WAIK) to create the Windows Pre-installation Environment (WinPE)

bootable CD or USB flash drive (UFD) by using the WinPE Deployment Tools Command Prompt and

command lines

- Symantec Ghost 8.0 to capture or deploy Microsoft Windows 7 Enterprise x86 image over the network or at a

local workstation

- Sysprep and an .xml answer file created from the WinPE Windows System Image Manager (WSIM) to

prepare a computer for imaging

Completed the Defense Information Systems Agency (DISA) Gold Disk v2.0 security and vulnerability

assessments for Microsoft Windows 2003 servers, and Security Technical Implementation Guide (STIG) for 2008

servers supporting applications and information systems by using Microsoft Active Directory Group Policy or the

Local Group Security Policy

Coordinated with the client technical staff to complete patch updates, deploy software releases, and implement

new software applications

Managed the distribution Microsoft software updates, hot fixes, service packs, device drivers, and feature packs

using Windows Server Updates Services (WSUS) 3.0 installed on a central server and configured client

computers (workstations and servers) within the network to install from the WSUS server using Active Directory-

based Group Policy Object (GPO)

Northrop Grumman Corporation, 12900 Federal Systems Park Drive, Fairfax, VA 22033 01/2010 – 10/2010

Windows Systems Administrator 3 at the Department of Homeland Security (DHS)

Install, setup and configure Microsoft Windows 2008 servers (domain controllers, application servers, file servers,

and LANDesk servers) for secured environments in both virtualized and physical Intel processor platforms

Create and configure VMware ESXi 4.1 64-bit HP Blade physical servers with RAID6 to host VMware

VirtualCenter environments

Create and configure virtual machines (VMs) within the VMware vSphere Client and allocate corresponding

system resources as required

Maintain industry and government IT compliance via scheduled and unscheduled maintenance, installation of

technology upgrades and security patch/software updates using virtual machines (VMs) and LANDesk (similar to

SMS or SCCM)

5

For scheduled maintenance - Work from 10 PM to 4 AM on every last Friday of the month to push out

-

Microsoft patches to over 1600 workstations and 200 servers across the network

- For unscheduled maintenance – Perform manual and script automated software security patch deployment to

Microsoft Windows servers and workstations by the required suspense date

Perform Microsoft Active Directory maintenance and administration

Manage domain and attached systems via Active Directory and LANDesk

Backup and restore database using Microsoft SQL Server 2008 Management Suite

Assist in maintenance of Citrix server farm and thin clients

Implement and roll out of new systems while learning new technologies quickly without extensive prior knowledge

of a system or its architecture (mostly Microsoft and VMware)

Participate in a migration of existing systems from physical to virtual

Manage and administer DNS, DHCP, AD, Group Policy, and other internal and proprietary software/systems

Perform security implementations on Windows 2003 and 2008 servers using approved DoD Security Technical

Implementation Guides (STIG’s) and Gold Disk v2.0

Implement proper disaster recovery procedures

Support a variety of server and desktop COTS and GOTS applications

Utilize the company’s HP Service Desk ticketing system for tracking of IT tasks/duties

Maintain operational procedures and guides and maintain hardware and software inventories

Provide desktop & systems support (tier 1, 2 & 3) of corporate & offsite/remote users including troubleshooting on

networking issues, laptops, desktops, printers, and docking stations

Work as part of a team a majority of the time however some tasks can be done individually without the need for

excessive communication

Pragmatics, Inc., 1761 Business Center Dr, Reston, VA 20190 06/2009 – 01/2010

System Administrator at the Defense Information Systems Agency (DISA)

Assisted users, manage and create SATCOM Data Base Management Tool (SDB-MT) accounts by administering

Windows 2000/2003 servers in an Active Directory environment and the SDBWin 1.2 tool

Ensured that all Windows 2000/2003 servers are compliant with security policies and guidelines

Monitored accounts that are set to expire or passwords that need to be reset

Updated the Symantec virus definitions on all 8 servers

Examined the Event Logs to identify and diagnose the source of current system problems, or to predict potential

system problems

Ran retina scan on all of the systems & install patches based on the Vulnerability Management System (VMS)

alerts

Monitored the Joint Command, Control, Communications, Computers, and Intelligence (C4I) Decision Support

Center (JCDSC) helpdesk line, check e-mails, and ensure that the systems function properly

Ensured all backup procedures for the Joint C4I Decision Support Center (JCDSC) system data and software are

followed and functional

Maintained off-site backups of all software, data, and documentation for the JCDSC system at the Pragmatics

facility

CACI International, Inc., 4114 Legato Rd (7th Floor), Fairfax, VA 22033 06/2008 – 06/2009

Promoted to System Administrator 2/Network Support Technical Lead at the U.S. State Department (DoS)

Under general supervision, maintained data files and controlled procedures for a system of network computers or

for a single group microcomputers linked to a host workstation, or mainframe

Performed backup using the Grandfather-father-son strategy:

- Differential/Incremental backup (12-hr range – 6 PM to 6 AM) runs daily from Monday through Friday.

- Weekly full backup (60-hr range – 6 PM on Friday to 6 AM on Monday of the next week) is on every Friday.

- Monthly full backup is on the last Friday of each month.

- The retention for differential/incremental backup is 2 weeks. The weekly full backup is retained for one

month. The monthly full backup is retained one year. The monthly full tapes are stored at an “off-site”

location. After the period of retention is expired, the media can be rotated and re-used.

- Based on the role of each server, the data logical drive location or the size of the data, each server may have

its own policy.

Responsible for system security by updating virus definitions on the Norton server

Worked with the Active Directory to add, transfer, remove, or update user accounts

Worked with the Exchange integrated Active Directory to create individual user mailboxes, group mailboxes, and

distribution groups

Analyzed server system logs and identify potential issues

6

Installed and troubleshot local and/or network server print queues and printers

Installed and configured new hardware (such as local and network printers, HP Digital Sender, etc…) and

software

Configured and troubleshot Microsoft Outlook 2007 by:

- Setting up Address Books and Distribution Lists

- Customizing e-mail messages using signatures

- Creating Outlook profile which corresponds to various Exchange servers

- Creating and customizing calendar for sharing by specifying the people or group(s) who can have access

- Creating .PST e-mail containers on local and/or network drives to prevent the “Mailbox” from getting full

- Configuring remote access to the .PST e-mail containers from various TDY locations via “CITRIX” & virtual

private network (VPN) connections

- Creating rules for where e-mail traffic should go

- Adding additional group mailboxes

- Troubleshooting corrupted user Outlook profile

- Ensuring all settings are the same when PC’s get replaced by copying the .NK2 file to the correct directory

and configuring the “Microsoft Office Save My Settings” wizard

Created Cable Xpress (Lotus Notes Application) accounts on various Sensitive but Unclassified (SBU) and

Classified Local Area Network (CLAN) servers

Installed, created, and configured Cable Xpress desktop profiles to work with Microsoft Outlook 2007 when

forwarding cables

Configured and troubleshot Blackberry devices

Identified root causes and resolved escalated trouble tickets from Tier 2 desktop technicians

Followed established SOPs and work closely with the support team members and leaders to identify needed

changes, refinements, or additions to current processes

Insured that the network infrastructure is up and running at all time

CACI International, Inc., 3130 Fairview Park Drive, Falls Church, VA 22201 10/2005 - 06/2008

Escalation Desktop Analyst at the Air Force Pentagon – 844th Communications Squadron (DoD)

Provided Tier 2 desktop support to the HQDA staff consisting of over 10,000 users by responding to phone & e-

mail requests

Performed Tier 2 hardware/software troubleshooting, upgrades and connectivity problems by providing hands-on

or remote support via Microsoft Systems Management Server (SMS)

Use Remedy ticketing system by:

o Making initial assessment of request to resolve all issues

o Recording and tracking all incidents and complaints

o Keeping customers informed on request status and progress

o Managing request life-cycle, including closure and verification

Worked on assigned tickets and irresolvable issues from other technicians

Performed unclassified NIPRNet and classified SIRPNet desktop/laptop PC “Ghost” imaging

Performed limited network administration such as:

- Updating user or/and computer accounts

- Placing printer and scanners on the network using static IP addresses

- Creating, configuring, and maintaining print queues and farms on print servers

- Configuring user Active Directory accounts to be used w/ the Common Access Cards (CAC) for domain logon

- Providing access control to Remote Access Service (RAS) & CITRIX remote users

- Securing the Active Directory and protecting the Windows environment from the risk of power escalation and

inadvertent security threats through granular access control

Configured, installed, and troubleshot all local or/and network printers

Assisted peers on procedures for setting up and troubleshooting, CAC, Blackberry, and Remote Access (CISCO

VPN, CITRIX, or Verizon AirCard software)

Participated in deployment of new software or/and software upgrades

Documented problem resolution in the Remedy call-tracking database

Documented and distributed procedures and solutions to commonly reported problems

Analyze and troubleshoot problems that may be affecting the Blackberry device, e-mail accounts, user accounts,

or service provider voice/data services at the user level

Provided limited one-on-one desk side training for customers requiring assistance software applications (Adobe

Acrobat 7 Professional, Business Objects, Blackberry Desktop Manager 4.x, GhostView, PureEdge 6.5, Quest

5.7, etc…) and/or IT equipment

7

Trained new Tier 2 technicians

Performed other tasks as assigned by the Program Manager, Deputy Program Manager, and the Help Desk

Manager

Stanley Associates, Inc., 3101 Wilson Blvd (Suite 700), Arlington, VA 22201 06/2005 – 10/2005

Systems Analyst at the U.S. Department of Transportation

Under guidance and supervision of a senior analyst or the Project Manager, provided design, development,

coding and testing, troubleshooting, deployment, and maintenance of the Virtual Office of Acquisition (VOA) web

site of the Maritime Administration (MARAD) using HTML, VBScript, ASP.NET, source control with Microsoft

Visual Source Safe, Visual Studio .NET 2003, and FrontPage 2003

Implemented other web-based document management products such as eRoom & Documentum

Maintained the currency of the Microsoft SQL databases

Arrowhead Global Solutions, Inc., 3190 Fairview Park Dr., Falls Church, VA 22042 01/2005 – 06/2005

Tier 1 Helpdesk Technician at the National Guard Bureau (NGB)

Performed entry-level work on the Tier 1 helpdesk call center and interact with Microsoft Windows NT/2000

workstation users to Microsoft Office 2003 suite via the telephone and Remote Access software (Unicenter

Remote Control)

Worked with Remedy and/or CA Unicenter helpdesk applications to create, modify, and update trouble tickets

Used additional technologies include: Citrix Metaframe, printers, TCP/IP, and web-based applications

Administered domain user accounts in an organizational unit (OU) of the Active Directory by creating & disabling

account, resetting password, and adding users to group locally or through VPN

Updated user account information in the Exchange server and Active Directory

8



Contact this candidate