Mr. Alvin Cartwright
757-***-**** (Cell)
Chesapeake, Virginia 23323
ad1tck@r.postjobfree.com www.linkedin.com/in/Alvin- Cartwright-201a7955
PROFESSIONAL SUMMARY
A versatile leader and Retired Naval Veteran with a proven record of success for over 20 plus years, specializing in Information Technology, Pharmaceuticals/Biotechnology, Contract Management, Cyber- Security Systems, Government Systems, Military Cyber Security Systems (ATO), Commercial systems, and Business Development with small to medium businesses. A team player with unparalleled problem-solving abilities. I have extensive experience and knowledge in the field of information security, as well as my passion for continuously improving and optimizing security measures. Over the course of my career, I have accumulated over 8 years of hands-on experience in providing security compliance for applications within Cloud environments, including AWS, Azure, and Google. I have a proven track record in coordinating and supporting the Assessment and Authorization (A&A) process, as well as managing system security plans to ensure compliance with NIST 800 series, CMMC, MARS-E, and HIPAA guidelines. Additionally, my Cybersecurity & Information Security Experience in reading and researching regulatory policy, in conjunction with data privacy within biotechnology and understanding the patent law, trademark, trade secrets, protecting patient information, and copyright laws to protect company information. Academic understanding of Intellectual Property guidelines, patent law, trade secrets, protecting patient information and cybersecurity laws and regulations and copyright laws to product business data, clinical trial information and when working with other Pharma organizations doing business with billion dollar corporation like ICON, as well as manufacturing information.
Well versed in reviewing contracts Non-Disclosure Agreements (NDA), RFP, RFI, MSA, MVA, DP Agreements for Clinical, small to Mid-sized Pharmaceuticals, Biomedical, Biosciences Biotechnologies, Biotherapeutics, Organizations and Government entities both in the United States (US), European Union (EU), and internationally.
Possesses multi-platform experience from Virtual systems to Enterprise system support. Certified COMPTIA Network +, A+, and Security +, 8750.1 compliant. Information Assurance systems and tools System and Administration and deployment, configures, and maintains workstation and server platforms running Unix/Solaris, Ubuntu, Linux, ESXi Servers VMware Various OS server images, Oracle, Microsoft, Novell, and Apple, Windows. Has experience in wired and wireless network deployment, configuration and maintenance. IT professional with over 20 years of Information technology and networking technology experience. Dynamic leader, Retired US NAVY veteran of 20 years, with project management and coaching practices with a demonstrated ability to meet challenges under varied conditions.
SKILLS
20 years Information Technology experience coupled with 15 years of experience directly related to this SOW, PWS . Is proficient in Information Security and Risk Management Framework in both the public and private and Government sector.
· Security compliance Cloud environments, AWS Azure Google Assessment and Authorization A&A C&A ATO IATT RMF NIST 800-53 DOD 8500.1 ISO 27001 FISMA MARS-E HIPAA guidelines Regulatory policy SOP Data Privacy Patent Law, trademark, trade secrets, protecting patient information, and copyright laws Non-Disclosure Agreements (NDA) RFP, RFI, MSA, MVA, DP Agreements SOC SOX GDPR Unix/Solaris, Ubuntu Linux, ESXi Servers VMware OS server images Oracle Microsoft Novell Apple Windows Virtual systems Enterprise system support Pharmaceuticals Biomedical DOD, DON, DHS SSP ACAS Tenable Nessus DISA VMS VRAM EMASS POAM HBSS SDLC McAfee ePolicy Orchestrator SIEM CHANGE CONTROL EEM Metrics collection VAI RAI STIG High Assurance Guard-HAG IAVA Arcsight CommVault Migration Implementation Remediation
Proficient in Reviewing contracts: Non-Disclosure Agreements NDAs, Request for Proposals RFP, Request for Information RFI, Master Service Agreements MSA’s, Market Value Adjustment MVA Data Protection DP Agreements for Clinical, Small to Mid-sized Pharmaceuticals, Biomedical, Biosciences, Biotechnologies, Biotherapeutics, Organizations and Government entities both in the United States (US), European Union (EU), and internationally to include Sweden, France, Portugal, Japan, United Kingdom, Canada (Toronto and Vancouver), India and Singapore. Review client agreements: (MSAs, MVAs, amendments, DPAs, etc.), RFI/RFPs, to ensure PRA is positioned in the best possible way in Cybersecurity terms to minimize exposure, meet client expectations and requirements, and understand any risks associated with client agreements ensure Good Clinical Practice (GCP). Additionally, interact with clients during agreement negations. Capture identified risks and analysis in the Integrated Risk Management (IRM) solution. Researched and discovered current and future, state, national, international cybersecurity related laws and regulations and analyze potential exposure and risks related to these laws and regulations, including California Consumer Privacy Act CCPA, 21 CFR Part 11 Compliance (Food and Drug Administration), US Federal Cyber Laws, EU General Data Protection Regulation GDPR Compliance Ukrainian, Russian, Chinese, and Indian Cyber Policies Review Technical and Organizational Measures (TOMs) in reference to contractual standards, and red-lining contracts. Reviewing and Researching Cyber Policies, Data Privacy Policies, International Data Transfer Policies, Data Protection, the rules for engagement to conduct cyber business various countries to include Russia, Ukraine, India, Canada China, and Mexico understanding cyber protection guidelines regarding Health Services Executive HSE Ireland. Created process documents for internal client contract process documents for Corporate Client Contract Process and Process Documentation for Subsidiaries. He has experience using various network security applications. Proficient within the government and military sector in certification and accreditation to both DIACAP NIST 800 Series CMMC ATO RMF standards and ISO 27001. Additionally, has experience in developing enterprise-level security. Governance policies as well as enterprise-level security training via LMS Development tools. He has a working hands-on knowledge of the Risk Management Framework RMF and experience in the creation of Certification & Accreditation packages and deliverables utilizing eMASS Enterprise Mission Assurance Support Service work flow. Development of Security System Plan(SSP). He is Familiar with DOD, DON, DHS, USCG, Navy and other Federal Cyber Security policies and guidelines. To include DHS MD-4300A, USCG COMDTINST 5500.13, DOD 8500.1, related Federal Information, Topologies, Technical Diagrams and Signal Flow diagrams Processing Standards (FIPS) and National Institute of Technology Special Publications.
He has experience with several different security tools, including ones leveraged within the
DoD community and Business infrastructure these tools include EMASS, HBSS, McAfee ePolicy Orchestrator, ACAS, Tenable, Nessus, DISA VMS, VRAM, Trusted Agent, FISMA, WEB shield, Trusted Gateway System™ (TGS), Trusted Thin client and SimShield, JWICS, EEM Symantec Endpoint Protection and experience using Microsoft Office 365 suite, Visio Secscan . Has more than 15 years’ cumulative experience in Information Systems Security. Has 20 years experience working with Enterprise networks, systems and equipment supporting US Navy, Air force, Army and other DOD, Government facilities. He has excellent skills in documentation, risk assessment, audit and vulnerability assessment. Skills also include excellent reporting and analytical skills and Vulnerability Scanning Procedures.
PROFESSIONAL EXPERIENCE
PRA Health Sciences Acquisition in July 2021 to ICON PLC, 04/2021 - Present
Raleigh, North Carolina
ICON Clinical Research
Principal Cybersecurity Specialist Regulatory (Remote)
Summary of position responsibilities.
·Experience reading and researching regulatory policy, in conjunction with data privacy within biotechnology and understanding patent law, trademark, trade secrets, protecting patient information, and copyright laws to protect company information.
·Academic understanding of Intellectual Property guidelines, patent law, trade secrets, protecting patient information and cybersecurity laws and regulations and copyright laws to product business data, clinical trial information and when working with other Pharma organizations doing business with ICON-PRA, as well as manufacturing information.
·Utilize CMMC and NIST 800 series for RMF Security Controls assessment and POAM development and manage mitigation programs and comprehensive security systems infrastructure compliance of cyber security systems. A key contributor to the Security department’s cyber security escalation teams policies and procedures by consistently reviewing and refining processes and alert reviews to identify Change Control areas of gap improvement which ensures DOD IA and FISMA compliance. Vulnerabilities assessments and remediation team management.
·Providing leadership and counsel to the senior management and working the with Legal department on cybersecurity considerations in responding to cybersecurity events, including those regarding regulatory, contractual, and other legal compliance issues as needed.
·Developed visibility and understanding of legal and client agreement risks which fed into ICON/PRA’s Cybersecurity Risk Management Program and Integrated Risk Management Program. Interacted with executive leaders, clients, and business leaders and clearly, in understandable terms, explained and articulate cybersecurity regulatory and legal risks.
·Reviewing contracts: Non-Disclosure Agreements( NDAs), Request for Proposals (RFP), Request for Information (RFI), Master Service Agreements (MSA’s), Market Value Adjustment (MVA), Data Protection (DP) Agreements for Clinical, Small to Mid-sized Pharmaceuticals, Biomedical, Biosciences, Biotechnologies, Biotherapeutics, Organizations and Government entities both in the United States (US), European Union (EU), and internationally to include Sweden, France, Portugal, Japan, United Kingdom, Canada (Toronto and Vancouver), India and Singapore. Review client agreements: (MSAs, MVAs, amendments, DPAs, etc.), RFI/RFPs, to ensure PRA is positioned in the best possible way in Cybersecurity terms to minimize exposure, meet client expectations and requirements, and understand any risks associated with client agreements ensure Good Clinical Practice (GCP). Additionally, interact with clients during agreement negations. Capture identified risks and analysis in the Integrated Risk Management (IRM) solution. Review Technical and Organizational Measures (TOMs) in reference to contractual standards, and red-lining contracts. Reviewing and Researching Cyber Policies, Data Privacy Policies, International Data Transfer Policies, Data Protection, the rules for engagement to conduct cyber business various countries to include Russia, Ukraine, India, Canada China, and Mexico understanding cyber protection guidelines regarding Health Services Executive (HSE) Ireland. Created process documents for internal client contract process documents for Corporate Client Contract Process and Process Documentation for Subsidiaries. Researched and discovered current and future, state, national, international cybersecurity related laws and regulations and analyze ICON/PRA’s potential exposure and risks related to these laws and regulations, including California Consumer Privacy Act (CCPA), 21 CFR Part 11 Compliance (Food and Drug Administration), US Federal Cyber Laws, EU General Data Protection Regulation (GDPR) Compliance, Ukrainian, Russian, Chinese, and Indian Cyber Policies.
US FLEET FORCES COMMAND February 2018 March 2021
USFF Communications and Information Systems Division (N6)
Norfolk Virginia
Information Assurance Manager
Summary of position responsibilities.
·Mr. Alvin Cartwright served as the IA Manager for USFF Communications and Information Systems
·Division (N6). Under this position, his major tasking includes successfully assisting in DIACAP Certification & Accreditation (C&A) package resulting in the RMF Authority-To-Operate (ATO) U-VTC.
·He has supported the revision of the entire end-to-end C&A process. Utilizing eMASS and various RMF and NIST, FIPS, DON, DOD supporting publications provides vulnerability assessments and other Certification and Accreditation (C&A) documentation in order to achieve Authority-to-Operate (ATO) and Interim-Authority-to-Test (IATT) for USFF systems.
·He has provided guidance in the completion of the new classified Risk Management Framework (RMF) Assessment & Authorization (A&A) package for C-VTC, C-AMHS, CFFO, C2LAN, U2LAN at USFF.
·Mr. Alvin Cartwright assists the ISSM in developing, reviewing, analyzing and updating system security documentation, USFF policies and technical procedures. Mr. Alvin Cartwright provides overarching expertise for the C&A process and ensures the necessary planning, outreach execution, and dissemination of lessons learned/after action reports. He continues to evaluate the ever-changing security posture, regulations, requirements, and legislation and standards, which ensures DOD IA compliance.
·Mr. Alvin Cartwright continues to work across the board with validators and key engineers to obtain an accurate engineering solution that promotes the proper security posture. He engages pertinent stakeholders and cross-functional event support SMEs as required to provide an overall framework for managing and coordinating necessary communications that directly, or indirectly, influence objectives and tasks.
·Develop Security System Plan (SSP)
MWITS PROGRAM CONTROL BRANCH February 2017 February 2018
Mount Weather IT Services
Federal Emergency Management Agency (FEMA) DHS
Washington DC
Assistant Information Assurance Security System Officer (AISSO)
Summary of position responsibilities.
Mr. Alvin Cartwright Ensures that security requirements for the major application or general support system with which I am involved are being or will be met. Ensuring that requests for certification and accreditation of computer systems are completed in accordance with the published procedures. Manage plan of actions and milestones. Ensuring that protective measures for physical security threats such as deadbolt locks on doors, placement of electrical wiring, etc., are in place. Ensuring compliance with all legal requirements concerning the use of commercial proprietary software, e.g., respecting copyrights and obtaining site licenses. Maintaining an inventory of hardware and software within the program/development offices or site facility. Coordinating the development of a Contingency Plan and ensuring that the plan is tested and maintained. Ensuring risk analyses are completed to determine cost-effective and essential safeguards. Ensuring preparation of security plans for sensitive systems and networks. Attending security awareness and related training programs and distributing security awareness information to the user community as appropriate. Reporting IT security incidents (including computer viruses not contained by antivirus software) in accordance with established procedures.
Reporting security incidents not involving IT resources to the appropriate security office. Providing
input to appropriate IT security personnel for preparation of reports to higher authority concerning
sensitive and/or national security information systems.
ISHPI Technologies March 2015 to Sept 2016
SeaWatch IA USCG C3CEN
4000 Coast Guard Blvd.
Portsmouth, VA 23703
Senior Computer Security Specialist
Mr. Alvin Cartwright served as the SeaWatch IA Team Member. Under this position, his major
tasking includes successfully assisting in DIACAP Certification & Accreditation (C&A) package
resulting in the Authority-To-Operate (ATO) SeaWatch. He has also assisted in the completion the
new classified Risk Management Framework (RMF) Assessment & Authorization (A&A) package
for SeaWatch. Develop, review, analyze and update system security documentation, policies, procedures, technical vulnerability assessments and other Certification and Accreditation (C&A) documentation in order to achieve Authority-to-Operate (ATO) and Interim-Authority-to-Test (IATT) for SeaWatch and other USCG systems. He continues to evaluate the ever-changing security posture, regulations, requirements, and legislation and standards, which ensures DOD IA compliance. He assisted in the development of SeaWatch ATO package under the new NIST guidelines. Perform system vulnerability scans at SeaWatch C3CEN and supports C3CEN TISCOM VAT scan aboard US Coast Guard Cutters.
Navy Cyber Defense Operations Command December 2014 March 2015
Global Network Operations Security Center
112 Lakeview Parkway
Suffolk, VA 23435
Sr. Cyber Security Specialist
Deploy Security scan and conduct security assessment examines and analyze technical safeguards. Provide mitigation strategies to the Risk Management framework process.
Performed STIG’s and security checks, system updates on Solaris, Suse, Ubuntu LINUX Red Hat Servers, ensured sensitive data protection by maintaining DOD security requirements on all Solaris servers and provided compliance reports. Conducted daily SUID File Baselines checks and Audit Trails. Conducted scans for information assurance vulnerabilities. Provided daily scans that checked for unusual or unauthorized activity by system administrators. Maintained Unix Virus Scan engine and DAT updates. Maintained ACAS compliance on all enclaves, ensuring systems that cannot be patched within the required timeline had an approved Plan of Action and Milestones (POA&M). Designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, applications and/or provides mitigation strategies. Ensures system security needs are established and maintained for various objects/matters. Integrates new architectural features into existing infrastructures, design cyber security architectural artifacts, provide architectural analysis of cyber security features and relate existing systems to future needs and trends. Evaluates computer software and network for threats and/or malware; collect data from a variety of network security tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment. Employs and provides computer advanced forensic tools, technique, and intrusion support for attack reconstruction and high technology investigations, while reviewing threat data from various sources.
L-3 STRATIS December 2013 October 2014
SOCOM-JSOC
Special Mission Services (SMS)
Fort Bragg
Fayetteville North Carolina
Cyber System Security Engineer
SITEC-SS JSOC ADSI SCI Information Assurance Compliance Site Servers Support
TOP SECRET(SCI)
REDHAT/ Linux/ORACLE SOLARIS Unix 9,10 & x86
Deploy Vulnerability Security scan, and conduct Risk Management framework process, the security assessment examines and analyzes technical safeguards. Performed STIG’s and security checks, system updates on Solaris UNIX, Ubuntu, Redhat, LINUX Servers to Ensure sensitive data protection by maintaining DOD security requirements on all Various servers and provided compliance reports. Conducted daily SUID File Baselines checks and Audit Trails.
Conducted scans for information assurance vulnerabilities. Provided daily scans that checked for unusual or unauthorized activity by system administrators. Maintained Unix Virus Scan engine and DAT updates. Maintained IAVA compliance on all enclaves, ensuring systems that cannot be patched within the required timeline had an approved Plan of Action and Milestones (POA&M). Designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, applications and/or provides mitigation strategies. Ensures system security needs are established and maintained for various objects/matters. Integrates new architectural features into existing infrastructures, design cyber security architectural artifacts, provide architectural analysis of cyber security features and relate existing systems to future needs and trends. Evaluates computer software and network for threats and/or malware; collect data from a variety of network security tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment. Employs and provides computer advanced forensic tools, technique, and intrusion support for attack reconstruction and high technology investigations, while reviewing threat data from various sources.
RAYTHEON October 2012 October 2013
RTCS Professional Services
Herndon, Virginia 20170
Sr. Cyber Systems Engineer II
TOP SECRET/ SCI
In support of JWICS install and configure and test MDDS, Trusted Gateway System™ (TGS), SimShield, Trusted Thin Client® (TTC), WEBshield, EEM Metrics collection system access to networks at different classification levels (e.g., Top Secret/SCI, Secret, and Sensitive but Unclassified) Virtual Access Implementation (VAI), Remote Access Implementation (RAI), Apache HTTP Server and OpenSSL, Including Cross Domain Solutions. Install and Configure Ubuntu RedHat Linux 5.7, 6.1, SeLinux, DoDIIS Linux Build, Centos 6.3 Install Snort, test and configure Rule sets. Deploy Secscan, in support of Risk Management framework process, security assessment examines and analyze technical safeguards. Maintain a Virtual Lab environment utilizing VSphere 4.1 VMware ESXi 4.1.0, Ds View 4.1 KVM (Rac) Remote Access Console. Designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, applications and/or provides mitigation strategies. Ensures system security needs are established and maintained for various objects/matters. Integrates new architectural features into existing infrastructures, design cyber security architectural artifacts, provide architectural analysis of cyber security features and relate existing systems to future needs and trends. Evaluates computer software and network for threats and/or malware; collect data from a variety of network security tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment. Employs and provides computer advanced forensic tools, technique, and intrusion support for attack reconstruction and high technology investigations, while reviewing threat data from various sources.
Naval Facilities Engineering Command Mid-Atlantic, May 2012 October 2012
NAVFAC MIDLANT CIO, IT Division
IT Hosting Support (CIO33)
Naval Base Norfolk Virginia
GS-2210-12 Information Technology Specialist
Information Technology Specialist (SYSADMIN/NETWORK
Supporting multiple domains across the Naval base and internationally Responsible for administering the installation, testing, operation, troubleshooting, and maintenance of hardware and software systems in support of the NAVFAC MIDLANT organization’s IM/IT program. Provides advice and recommendations on IM/IT system administration. Interpret and apply IM/IT polices, processes and guidelines. Conducted systems and application analysis/design and recommended resolution to problems and issues. Managed systems resources including performance, capacity, availability, serviceability, integrity, efficiency and recoverability. Built and virtualized servers and performed STIG’s and security checks, system updates on Windows 2008 R2, Linux Redhat Enterprise ESXi Servers Integration and configuration for the systems ICS and SCADA. Contributes to the creation of vulnerability risk assessments. As a Sea Watch IA Team member he has provided continuous monitoring activities, including managing POA&Ms; conducting annual assessments, research and development of Sea watch Topology and Data flow documentation review/updates; coordinating and documenting annual Contingency Plan Tests (CPTs). Mr. Alvin Cartwright also performs analysis of US and CG-CYBERCOM Task Orders (TASKORDs) requiring continued collaboration with system security stakeholders to determine appropriate response actions. Conducts a daily review and assessment of IAVM Tracker Database on ensure DISA compliance to determine the accurate response. Perform monthly IA review DISA STIG guidance. Work well independently as well as with a team. Complete monthly reports to the IA Sea watch team lead.
Diverse Technologies Corp, March 2010 May 2012
NH95 GCCS
Naval Base Norfolk, Virginia
VDI Linux-Solaris UNIX Administrator/ (GCCS) Administrator
Sun Solaris UNIX and Redhat Enterprise Linux Administrator provided expert technical support to implement Unix Security features and tools for Solaris version 8 thru 10 within enterprise zone
enclaves. Performed System backups, archiving security logs and McAfee security, engine and
anti- virus signature files and Exchange GAL upgrades, GCCS/COP servers. Recognized and
extracted key performance elements from UNIX and UNIX-like (i.e. High Assurance Guard-HAG)
systems. Analyzed the data and implement corrective actions to enhance overall performance and stability. Performed audit offloads to tape while providing technical support for Oracle DBA's and developers. Familiar with Sun Servers V480, V440, T2000, T1000, Ultra80, Ultra 10, Ultra, 280R, T5220 and dell servers. Maintained Remedy ticket System and logging. Performed Solaris system Migrations and upgrades from 8 thru 10 and Linux RHEL5.2 Provided VMS administration in support of UNIX and Windows OS patch and STIG requirements and IAVA updates. Installed and configured Go Global software on NIPRNET and SIPRNET servers and client workstations.
Performed Oracle Audit offloads. Performed STIGs on UNIX and Red Hat Linux servers in
compliance with DISA field Security operations. VDI Administrator familiar with VMware
vSphere 4.0 and VMware View 4.6 Administration. Managed over 600 VM's 19 hosts on NIPR and SIPR. Migrated over 500 users from Desktop fat clients to Zero client and thin clients. Managed vSphere Performance and troubleshooting utilizing vCenter Server 4.1.0 and VMware PowerCli and PowerShell 5.0. Created and Managed Pools and Thinapps desktops and servers utilizing VMware View Administrator 4.6.0. Provided Remediation to ESXi servers utilizing CLi and
vSphere client (update Manager) in conjunction with DISA VMS. Deployed new host ESXI servers
by building out HP Proliant BL460c G6's and G7 Blade servers. Maintained Data stores and
virtualized resources; created and cloned with vSphere. Maintained Windows 2008 R2 Active
Directory links with VMview Administrator by creating pools and managing snapshots and desktop
align systems policy and provide performance tweaking and troubleshooting. Virtualized software
and programs utilizing Thinapps 4.6.0 custom to the end users. Created and deployed Image
updates. Familiar with Arcsight and CommVault configurations for backup and restoral.
Troubleshoot ILO server support during server faults and restoral procedures. Performed STIGs on ESXi server images to include Window 7 Enterprise and staging and installing DISA patch updates.
Engineering Services Network (ESN) October 2008 March 2010
Naval Station, Norfolk, VA.
Network Engineer/Security Engineer
Sun Solaris UNIX Administrator with 10 years’ experience in complex, secure and classified
environments. Performed Solaris upgrades and migration. Familiar with Solaris version 9 to 10.
Performed UNIX security system hardening procedures. Ensured sensitive data protection by
maintaining DOD security requirements on all Solaris servers and providing compliance reports.
Conducted daily SUID File Baselines checks and Audit Trails. Conducted scans for information
assurance vulnerabilities. Provided daily scans that checked for unusual or unauthorized activity by system administrators. Maintained Unix Virus Scan engine and DAT updates. Maintained IAVA
compliance on all enclaves, ensuring systems that cannot be patched within the required timeline
had an approved Plan of Action and Milestones (POA&M). Ensured daily system backups are
completed and verified. Conducted daily fiber network connection interfaces checks. Responsible
for the backup of all servers and recovery of lost or corrupted data. Maintained an offsite backup and storage system using a Jumpstart (VERITAS Net backup) UNIX Disk Volume Management, Disk Suite/Solaris Volume Manager model. Familiar with Spectra Logic T120 robotic tape storage system. Implemented tape backup encryption. Maintained fiber optic connections to servers and robotic backup and storage systems in four enclaves. Responsible for 24 x 7 support of over 60 Sun Sparc servers and management across four different enclaves. Provided troubleshooting and assistance to various personnel including firewall engineers, database administrators and web developers. Provided weekly and Monthly reports to the Project Managers that included status of offsite projects and personnel completion rate to Support the Mission Statement of Work. Configured Sun hardware and installed and maintained jumpstart servers using Flash archive designed for rapid recovery. Demonstrated an Enterprise working knowledge of