Antivine L. Smith-Bey
**** *********** ***** ***. *, North Chesterfield Va. 23225
LinkedIn Profile:http://www.linkedin.com/pub/antwine-l-william-smith-bey/18/b23/3a4
*********@*****.***
Active Clearance: Top Secret SSBI~DISCO
DOD 8570 IAM Level I, IAT Level II: Network Environment (NE), Advanced Level Computing Environment:
https://www.ia-academy.com/IATlevelII/tabid/76/Default.aspx
Career Objectives:
As a Information Technology Specialist I have advanced security skills required to implement e-business solutions security policies, identify security threats, develop countermeasures using firewall systems, attacking recognition technologies and to manage the deployment of security solutions. In addition, my general education provides me with the professional skiil set applying my IT experience skills in critical thinking, logic, communication, problem solving to manage challenges in a technical environment.
Desire to be and complete: (ISC2) Certified Information Systems Security Professional (CISSP)2015-2017
Degree & Certifications :
Career ID: COMP001020235029
IAM Level I & IAT Level II : Security+CE Network+CE
Associate in Science in Computer Information Science Programming, Everest University, 2008
Bachelor of Science Information Technology System Security, Westwood (Cisco Network Academy)
Bachelors; Cumulative Credits: 213.5 Minimum Credits: 243, Can provide Westwood College Transcript
Information Technology Experience:
Staffing Firm: Apex Systems, Inc., Glen Allen, Va
Unisys at Capital One, James River Center, Chester, VA
August 2015 to October 2015
IT-II/IA Intermediate Desktop Support Specialist, Contractor
Windows 7 Non-VDI Migration :
Manage SALT.SCCM Application Layering Tool v3.2.0.0 (Desktop),deploying W7 in a large-scale CAPITALONE environment.
Migrate, Transfer, Import /Export and Configure clients local profile from XP to W7 PC’s via laptops managing Capital One Enterprise Remote Management ERM v4.1.2.0
Administratively input Machine Name, MAC Address, IP Address, Machine Domain with SCCM DB Lookup to begin W7 imaging process
Efficient in navigating within Run Advertised Programs to configure Capital One Installing Applications successfully
Imaging PXE Boot : F12 Task Sequence Wizard
Properly locate, run the script file VBScript to execute (Teradata) application manually from Capital One local shared network drive
Demonstrate great customer service by replacing XP with W7 Hewlett Packard Compaq 8000 Elite Small Form Factor Laptops.
Valued customer service, provided each W7 migrated end user with windows 7 quick reference guide
Avaya One X Virtual Desktop Interface (VDI)-Agent Phone and Windows 7 VM Ware Herizon Virtual Desk Top (Cloud)
Peridot Solutions LLC., Richmond Va. April 2013 to February 2015
Defense Commissary Agency (DeCA), Contractor: General Dynamics IT (GDIT)
IT-II/IA Intermediate Desktop Support Specialist
Managed day to day desktop operations, supporting end user accounts in Active Directory and troubleshooting various software and hardware errors and access to network folder permissions for Commissaries branches for all of U.S. through centralized location, DECA Commissary, Fort Lee Headquarters.
Installed, maintained, configured (Cisco AnyConnect Secure Mobility Client) AnyConnect to empower DECA's end users to imulate DECA secure Extranet/Intranet infrastructure, VOIP: Voice Over Internet Protocol, Cisco, DECA,, VPN, telework
Provided second-tier support to end users for all approved application on the Agency’s desktop Interact with network services, datacenter or business applications groups to restore services and / or identify and correct core problems.
Installed,configured AC Nielsen (NITRO) and Red Brick (Database Driver) to be compatible with XP, Windows7 on 20-50 end users laptops and PC (Towers)successfully.
Added each AC Nielsen computer and end user into Active Directory within the (AC Nielsen Recipient's Group)
Configured and navigated NITRO SETTINGS within Microsoft Excel ADMIN menu Office 2007/2010, Shared Database Directory / Personal Database Directory / Shared Metadata file to the PC shared directory, verified that the data populated successfully.
Added each AC Nielsen computer and end user into Active Directory within the (AC Nielsen Recipient's Group)
Used Windows data recovery software successfully recover digital certificates, lost or corrupted data
Provided public key infrastructure (PKI) and digital certificate solutions to enable trusted commerce and communications over private and public networks.
Responded to and diagnose problems through using established procedures ensuring all actions taken are documented in the assigned ticket
Ensured timely process through which problems are controlled. Include problem recognition, research, isolation, resolution, and follow-up step
Resolved all tickets assigned and work them IAW the Agency’s ticket handling process Documents, tracks, and monitors the problems to ensure a timely resolution.
Performed PST and file backup, computer repair, hardware/software installation and troubleshooting as-well-as Ghost imaging for new employees.
FOCUCED MANAGEMENT INC., Arlington Va. July 2011 to January 2013
Sr. Information Technology Specialist: Test Engineer
Information Technology Agency (ITA) Private Environments
Network Vulnerability Assessments Performed Included : Adobe Acrobat, Adobe Shockwave Player, Active Client (Multiple Versions), IBM Lotus Form Viewer, Adobe Flash Player, Adobe Reader, Mozilla Firefox, MEGA 2009 Service Pack 5 Patch 8,Verifone VX570 Terminal, Java Run Time Environment (JRE) & Java Development Kit (JDK),Microsoft Expression Encoder"
Advanced working Knowledge of Active Directory, DNS, Domains, TCP/IP, SMTP, and working within an private network
Proactively served two years to identify industry level security issues, compatibility by researching and planning and documenting, testing new and upgraded software to HQDA users. This capability includes COTS, GOTS, custom application software, patches, virus definition files and other upgrades
Demonstrate the ability to identify the most common attack methods, as well as the basic strategies used to mitigate those threat
College Student / Technical Support Specialist Tier I and Tier II Experience
Bachelor of Science Information Technology System Security
Westwood College 'Cisco Network Academy' 2009-Present
BAE Systems., Herndon VA June 2010 to July 2010
Nextec Incorporation., Herndon Va. July 2010 to October 2010
Telos Corporation., Ashburn, Va. November 2010 to December 2010
EDGE Professional Services., LLC, Rockville, MD March 2011 to April 2011
Staffing APEX Systems Inc., Information Technology Staffing, Falls Church Va. May 2011 to June 2011
Help Desk Technician\DLA CTR Information Operations- Defense Logistics Agency (DLA- HQ) DLA, Ft. Belvoir, Va.
PC Technician\ Windows 7 Enterprise \CTR, 844 CG\SCBT\OT- Pentagon, U.S. Air Force 844th Communications Group
Due Diligence, Manage, and Apply Information Assurance Vulnerability Alerts / Bulletins (IAVA/IAVB), Security Technical Implementation Guides (STIGS), patches.
Interpret DoD Information Assurance Certification and Accreditation Process 'DIACAP' controls accurately with regard to system security posture, policy updates and configuration process to ensure that risk management is applied for information systems.
Understand Policies, Standards, Guidelines, and Procedures, Access control List (ACLs) Logical Access Controls, Access Control Policies, Groups, Domain Policy, Group, Identification, Authentication, Authorization, and Accountability
Demonstrate an understanding of how permissions are applied in the Windows NT File System, Shared Folder, Encrypting File System, Printer, Registry Key, Active Directory, and how User Rights are applied.
Acquire Assets, Image Assets, Deploy Assets 4 phase Operation Systems windows 7 upgrade
Windows 7 Upgrade DLA HQ deployment, Operation Systems and various applications DLA specified version 3517 laptops and desktops
Responds to and diagnose problems through using established procedures ensuring all actions taken are documented in the assigned ticket
Using Cisco CLI commands to perform basic router and switch configuration and verification.
Imaging, BIOS, Disk Partitioning, Naming Convention, Posting Standard Desktop Configuration, SLM
Enabling WIFI 2.x&3.x, Wireless, Remote Access Connection Manager, Remote Auto Access Connection Manager, Telephony, WLAN AutoConfig, ConMon ( Connection Monitor), OCS:ActiveSync
Programs: ActiveClient, Citrix XenApp, Anti Virus, Microsoft Office 2010, Juniper VPN,
Network/Domain, manual /static, TCP/IP, DHCP, DNS, WINS, PROXY,
Provided support through Meridio application, and created weekly FAQ’s with Meridio Camp Victory Manuals
References:
Available upon request