Post Job Free

Resume

Sign in

Information Technology Security

Location:
Chesapeake, VA
Salary:
120,000
Posted:
December 08, 2023

Contact this candidate

Resume:

Mr. Alvin Cartwright

757-***-**** (Cell)

Chesapeake, Virginia 23323

ad1tck@r.postjobfree.com www.linkedin.com/in/Alvin- Cartwright-201a7955

PROFESSIONAL SUMMARY

A versatile leader and Retired Naval Veteran with a proven record of success for over 20 plus years, specializing in Information Technology, Pharmaceuticals/Biotechnology, Contract Management, Cyber- Security Systems, Government Systems, Military Cyber Security Systems (ATO), Commercial systems, and Business Development with small to medium businesses. A team player with unparalleled problem-solving abilities. I have extensive experience and knowledge in the field of information security, as well as my passion for continuously improving and optimizing security measures. Over the course of my career, I have accumulated over 8 years of hands-on experience in providing security compliance for applications within Cloud environments, including AWS, Azure, and Google. I have a proven track record in coordinating and supporting the Assessment and Authorization (A&A) process, as well as managing system security plans to ensure compliance with NIST 800 series, CMMC, MARS-E, and HIPAA guidelines. Additionally, my Cybersecurity & Information Security Experience in reading and researching regulatory policy, in conjunction with data privacy within biotechnology and understanding the patent law, trademark, trade secrets, protecting patient information, and copyright laws to protect company information. Academic understanding of Intellectual Property guidelines, patent law, trade secrets, protecting patient information and cybersecurity laws and regulations and copyright laws to product business data, clinical trial information and when working with other Pharma organizations doing business with billion dollar corporation like ICON, as well as manufacturing information.

Well versed in reviewing contracts Non-Disclosure Agreements (NDA), RFP, RFI, MSA, MVA, DP Agreements for Clinical, small to Mid-sized Pharmaceuticals, Biomedical, Biosciences Biotechnologies, Biotherapeutics, Organizations and Government entities both in the United States (US), European Union (EU), and internationally.

Possesses multi-platform experience from Virtual systems to Enterprise system support. Certified COMPTIA Network +, A+, and Security +, 8750.1 compliant. Information Assurance systems and tools System and Administration and deployment, configures, and maintains workstation and server platforms running Unix/Solaris, Ubuntu, Linux, ESXi Servers VMware Various OS server images, Oracle, Microsoft, Novell, and Apple, Windows. Has experience in wired and wireless network deployment, configuration and maintenance. IT professional with over 20 years of Information technology and networking technology experience. Dynamic leader, Retired US NAVY veteran of 20 years, with project management and coaching practices with a demonstrated ability to meet challenges under varied conditions.

SKILLS

20 years Information Technology experience coupled with 15 years of experience directly related to this SOW, PWS . Is proficient in Information Security and Risk Management Framework in both the public and private and Government sector.

· Security compliance Cloud environments, AWS Azure Google Assessment and Authorization A&A C&A ATO IATT RMF NIST 800-53 DOD 8500.1 ISO 27001 FISMA MARS-E HIPAA guidelines Regulatory policy SOP Data Privacy Patent Law, trademark, trade secrets, protecting patient information, and copyright laws Non-Disclosure Agreements (NDA) RFP, RFI, MSA, MVA, DP Agreements SOC SOX GDPR Unix/Solaris, Ubuntu Linux, ESXi Servers VMware OS server images Oracle Microsoft Novell Apple Windows Virtual systems Enterprise system support Pharmaceuticals Biomedical DOD, DON, DHS SSP ACAS Tenable Nessus DISA VMS VRAM EMASS POAM HBSS SDLC McAfee ePolicy Orchestrator SIEM CHANGE CONTROL EEM Metrics collection VAI RAI STIG High Assurance Guard-HAG IAVA Arcsight CommVault Migration Implementation Remediation

Proficient in Reviewing contracts: Non-Disclosure Agreements NDAs, Request for Proposals RFP, Request for Information RFI, Master Service Agreements MSA’s, Market Value Adjustment MVA Data Protection DP Agreements for Clinical, Small to Mid-sized Pharmaceuticals, Biomedical, Biosciences, Biotechnologies, Biotherapeutics, Organizations and Government entities both in the United States (US), European Union (EU), and internationally to include Sweden, France, Portugal, Japan, United Kingdom, Canada (Toronto and Vancouver), India and Singapore. Review client agreements: (MSAs, MVAs, amendments, DPAs, etc.), RFI/RFPs, to ensure PRA is positioned in the best possible way in Cybersecurity terms to minimize exposure, meet client expectations and requirements, and understand any risks associated with client agreements ensure Good Clinical Practice (GCP). Additionally, interact with clients during agreement negations. Capture identified risks and analysis in the Integrated Risk Management (IRM) solution. Researched and discovered current and future, state, national, international cybersecurity related laws and regulations and analyze potential exposure and risks related to these laws and regulations, including California Consumer Privacy Act CCPA, 21 CFR Part 11 Compliance (Food and Drug Administration), US Federal Cyber Laws, EU General Data Protection Regulation GDPR Compliance Ukrainian, Russian, Chinese, and Indian Cyber Policies Review Technical and Organizational Measures (TOMs) in reference to contractual standards, and red-lining contracts. Reviewing and Researching Cyber Policies, Data Privacy Policies, International Data Transfer Policies, Data Protection, the rules for engagement to conduct cyber business various countries to include Russia, Ukraine, India, Canada China, and Mexico understanding cyber protection guidelines regarding Health Services Executive HSE Ireland. Created process documents for internal client contract process documents for Corporate Client Contract Process and Process Documentation for Subsidiaries. He has experience using various network security applications. Proficient within the government and military sector in certification and accreditation to both DIACAP NIST 800 Series CMMC ATO RMF standards and ISO 27001. Additionally, has experience in developing enterprise-level security. Governance policies as well as enterprise-level security training via LMS Development tools. He has a working hands-on knowledge of the Risk Management Framework RMF and experience in the creation of Certification & Accreditation packages and deliverables utilizing eMASS Enterprise Mission Assurance Support Service work flow. Development of Security System Plan(SSP). He is Familiar with DOD, DON, DHS, USCG, Navy and other Federal Cyber Security policies and guidelines. To include DHS MD-4300A, USCG COMDTINST 5500.13, DOD 8500.1, related Federal Information, Topologies, Technical Diagrams and Signal Flow diagrams Processing Standards (FIPS) and National Institute of Technology Special Publications.

He has experience with several different security tools, including ones leveraged within the

DoD community and Business infrastructure these tools include EMASS, HBSS, McAfee ePolicy Orchestrator, ACAS, Tenable, Nessus, DISA VMS, VRAM, Trusted Agent, FISMA, WEB shield, Trusted Gateway System™ (TGS), Trusted Thin client and SimShield, JWICS, EEM Symantec Endpoint Protection and experience using Microsoft Office 365 suite, Visio Secscan . Has more than 15 years’ cumulative experience in Information Systems Security. Has 20 years experience working with Enterprise networks, systems and equipment supporting US Navy, Air force, Army and other DOD, Government facilities. He has excellent skills in documentation, risk assessment, audit and vulnerability assessment. Skills also include excellent reporting and analytical skills and Vulnerability Scanning Procedures.

PROFESSIONAL EXPERIENCE

PRA Health Sciences Acquisition in July 2021 to ICON PLC, 04/2021 - Present

Raleigh, North Carolina

ICON Clinical Research

Principal Cybersecurity Specialist Regulatory (Remote)

Summary of position responsibilities.

·Experience reading and researching regulatory policy, in conjunction with data privacy within biotechnology and understanding patent law, trademark, trade secrets, protecting patient information, and copyright laws to protect company information.

·Academic understanding of Intellectual Property guidelines, patent law, trade secrets, protecting patient information and cybersecurity laws and regulations and copyright laws to product business data, clinical trial information and when working with other Pharma organizations doing business with ICON-PRA, as well as manufacturing information.

·Utilize CMMC and NIST 800 series for RMF Security Controls assessment and POAM development and manage mitigation programs and comprehensive security systems infrastructure compliance of cyber security systems. A key contributor to the Security department’s cyber security escalation teams policies and procedures by consistently reviewing and refining processes and alert reviews to identify Change Control areas of gap improvement which ensures DOD IA and FISMA compliance. Vulnerabilities assessments and remediation team management.

·Providing leadership and counsel to the senior management and working the with Legal department on cybersecurity considerations in responding to cybersecurity events, including those regarding regulatory, contractual, and other legal compliance issues as needed.

·Developed visibility and understanding of legal and client agreement risks which fed into ICON/PRA’s Cybersecurity Risk Management Program and Integrated Risk Management Program. Interacted with executive leaders, clients, and business leaders and clearly, in understandable terms, explained and articulate cybersecurity regulatory and legal risks.

·Reviewing contracts: Non-Disclosure Agreements( NDAs), Request for Proposals (RFP), Request for Information (RFI), Master Service Agreements (MSA’s), Market Value Adjustment (MVA), Data Protection (DP) Agreements for Clinical, Small to Mid-sized Pharmaceuticals, Biomedical, Biosciences, Biotechnologies, Biotherapeutics, Organizations and Government entities both in the United States (US), European Union (EU), and internationally to include Sweden, France, Portugal, Japan, United Kingdom, Canada (Toronto and Vancouver), India and Singapore. Review client agreements: (MSAs, MVAs, amendments, DPAs, etc.), RFI/RFPs, to ensure PRA is positioned in the best possible way in Cybersecurity terms to minimize exposure, meet client expectations and requirements, and understand any risks associated with client agreements ensure Good Clinical Practice (GCP). Additionally, interact with clients during agreement negations. Capture identified risks and analysis in the Integrated Risk Management (IRM) solution. Review Technical and Organizational Measures (TOMs) in reference to contractual standards, and red-lining contracts. Reviewing and Researching Cyber Policies, Data Privacy Policies, International Data Transfer Policies, Data Protection, the rules for engagement to conduct cyber business various countries to include Russia, Ukraine, India, Canada China, and Mexico understanding cyber protection guidelines regarding Health Services Executive (HSE) Ireland. Created process documents for internal client contract process documents for Corporate Client Contract Process and Process Documentation for Subsidiaries. Researched and discovered current and future, state, national, international cybersecurity related laws and regulations and analyze ICON/PRA’s potential exposure and risks related to these laws and regulations, including California Consumer Privacy Act (CCPA), 21 CFR Part 11 Compliance (Food and Drug Administration), US Federal Cyber Laws, EU General Data Protection Regulation (GDPR) Compliance, Ukrainian, Russian, Chinese, and Indian Cyber Policies.

US FLEET FORCES COMMAND February 2018 March 2021

USFF Communications and Information Systems Division (N6)

Norfolk Virginia

Information Assurance Manager

Summary of position responsibilities.

·Mr. Alvin Cartwright served as the IA Manager for USFF Communications and Information Systems

·Division (N6). Under this position, his major tasking includes successfully assisting in DIACAP Certification & Accreditation (C&A) package resulting in the RMF Authority-To-Operate (ATO) U-VTC.

·He has supported the revision of the entire end-to-end C&A process. Utilizing eMASS and various RMF and NIST, FIPS, DON, DOD supporting publications provides vulnerability assessments and other Certification and Accreditation (C&A) documentation in order to achieve Authority-to-Operate (ATO) and Interim-Authority-to-Test (IATT) for USFF systems.

·He has provided guidance in the completion of the new classified Risk Management Framework (RMF) Assessment & Authorization (A&A) package for C-VTC, C-AMHS, CFFO, C2LAN, U2LAN at USFF.

·Mr. Alvin Cartwright assists the ISSM in developing, reviewing, analyzing and updating system security documentation, USFF policies and technical procedures. Mr. Alvin Cartwright provides overarching expertise for the C&A process and ensures the necessary planning, outreach execution, and dissemination of lessons learned/after action reports. He continues to evaluate the ever-changing security posture, regulations, requirements, and legislation and standards, which ensures DOD IA compliance.

·Mr. Alvin Cartwright continues to work across the board with validators and key engineers to obtain an accurate engineering solution that promotes the proper security posture. He engages pertinent stakeholders and cross-functional event support SMEs as required to provide an overall framework for managing and coordinating necessary communications that directly, or indirectly, influence objectives and tasks.

·Develop Security System Plan (SSP)

MWITS PROGRAM CONTROL BRANCH February 2017 February 2018

Mount Weather IT Services

Federal Emergency Management Agency (FEMA) DHS

Washington DC

Assistant Information Assurance Security System Officer (AISSO)

Summary of position responsibilities.

Mr. Alvin Cartwright Ensures that security requirements for the major application or general support system with which I am involved are being or will be met. Ensuring that requests for certification and accreditation of computer systems are completed in accordance with the published procedures. Manage plan of actions and milestones. Ensuring that protective measures for physical security threats such as deadbolt locks on doors, placement of electrical wiring, etc., are in place. Ensuring compliance with all legal requirements concerning the use of commercial proprietary software, e.g., respecting copyrights and obtaining site licenses. Maintaining an inventory of hardware and software within the program/development offices or site facility. Coordinating the development of a Contingency Plan and ensuring that the plan is tested and maintained. Ensuring risk analyses are completed to determine cost-effective and essential safeguards. Ensuring preparation of security plans for sensitive systems and networks. Attending security awareness and related training programs and distributing security awareness information to the user community as appropriate. Reporting IT security incidents (including computer viruses not contained by antivirus software) in accordance with established procedures.

Reporting security incidents not involving IT resources to the appropriate security office. Providing

input to appropriate IT security personnel for preparation of reports to higher authority concerning

sensitive and/or national security information systems.

ISHPI Technologies March 2015 to Sept 2016

SeaWatch IA USCG C3CEN

4000 Coast Guard Blvd.

Portsmouth, VA 23703

Senior Computer Security Specialist

Mr. Alvin Cartwright served as the SeaWatch IA Team Member. Under this position, his major

tasking includes successfully assisting in DIACAP Certification & Accreditation (C&A) package

resulting in the Authority-To-Operate (ATO) SeaWatch. He has also assisted in the completion the

new classified Risk Management Framework (RMF) Assessment & Authorization (A&A) package

for SeaWatch. Develop, review, analyze and update system security documentation, policies, procedures, technical vulnerability assessments and other Certification and Accreditation (C&A) documentation in order to achieve Authority-to-Operate (ATO) and Interim-Authority-to-Test (IATT) for SeaWatch and other USCG systems. He continues to evaluate the ever-changing security posture, regulations, requirements, and legislation and standards, which ensures DOD IA compliance. He assisted in the development of SeaWatch ATO package under the new NIST guidelines. Perform system vulnerability scans at SeaWatch C3CEN and supports C3CEN TISCOM VAT scan aboard US Coast Guard Cutters.

Navy Cyber Defense Operations Command December 2014 March 2015

Global Network Operations Security Center

112 Lakeview Parkway

Suffolk, VA 23435

Sr. Cyber Security Specialist

Deploy Security scan and conduct security assessment examines and analyze technical safeguards. Provide mitigation strategies to the Risk Management framework process.

Performed STIG’s and security checks, system updates on Solaris, Suse, Ubuntu LINUX Red Hat Servers, ensured sensitive data protection by maintaining DOD security requirements on all Solaris servers and provided compliance reports. Conducted daily SUID File Baselines checks and Audit Trails. Conducted scans for information assurance vulnerabilities. Provided daily scans that checked for unusual or unauthorized activity by system administrators. Maintained Unix Virus Scan engine and DAT updates. Maintained ACAS compliance on all enclaves, ensuring systems that cannot be patched within the required timeline had an approved Plan of Action and Milestones (POA&M). Designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, applications and/or provides mitigation strategies. Ensures system security needs are established and maintained for various objects/matters. Integrates new architectural features into existing infrastructures, design cyber security architectural artifacts, provide architectural analysis of cyber security features and relate existing systems to future needs and trends. Evaluates computer software and network for threats and/or malware; collect data from a variety of network security tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment. Employs and provides computer advanced forensic tools, technique, and intrusion support for attack reconstruction and high technology investigations, while reviewing threat data from various sources.

L-3 STRATIS December 2013 October 2014

SOCOM-JSOC

Special Mission Services (SMS)

Fort Bragg

Fayetteville North Carolina

Cyber System Security Engineer

SITEC-SS JSOC ADSI SCI Information Assurance Compliance Site Servers Support

TOP SECRET(SCI)

REDHAT/ Linux/ORACLE SOLARIS Unix 9,10 & x86

Deploy Vulnerability Security scan, and conduct Risk Management framework process, the security assessment examines and analyzes technical safeguards. Performed STIG’s and security checks, system updates on Solaris UNIX, Ubuntu, Redhat, LINUX Servers to Ensure sensitive data protection by maintaining DOD security requirements on all Various servers and provided compliance reports. Conducted daily SUID File Baselines checks and Audit Trails.

Conducted scans for information assurance vulnerabilities. Provided daily scans that checked for unusual or unauthorized activity by system administrators. Maintained Unix Virus Scan engine and DAT updates. Maintained IAVA compliance on all enclaves, ensuring systems that cannot be patched within the required timeline had an approved Plan of Action and Milestones (POA&M). Designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, applications and/or provides mitigation strategies. Ensures system security needs are established and maintained for various objects/matters. Integrates new architectural features into existing infrastructures, design cyber security architectural artifacts, provide architectural analysis of cyber security features and relate existing systems to future needs and trends. Evaluates computer software and network for threats and/or malware; collect data from a variety of network security tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment. Employs and provides computer advanced forensic tools, technique, and intrusion support for attack reconstruction and high technology investigations, while reviewing threat data from various sources.

RAYTHEON October 2012 October 2013

RTCS Professional Services

Herndon, Virginia 20170

Sr. Cyber Systems Engineer II

TOP SECRET/ SCI

In support of JWICS install and configure and test MDDS, Trusted Gateway System™ (TGS), SimShield, Trusted Thin Client® (TTC), WEBshield, EEM Metrics collection system access to networks at different classification levels (e.g., Top Secret/SCI, Secret, and Sensitive but Unclassified) Virtual Access Implementation (VAI), Remote Access Implementation (RAI), Apache HTTP Server and OpenSSL, Including Cross Domain Solutions. Install and Configure Ubuntu RedHat Linux 5.7, 6.1, SeLinux, DoDIIS Linux Build, Centos 6.3 Install Snort, test and configure Rule sets. Deploy Secscan, in support of Risk Management framework process, security assessment examines and analyze technical safeguards. Maintain a Virtual Lab environment utilizing VSphere 4.1 VMware ESXi 4.1.0, Ds View 4.1 KVM (Rac) Remote Access Console. Designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, applications and/or provides mitigation strategies. Ensures system security needs are established and maintained for various objects/matters. Integrates new architectural features into existing infrastructures, design cyber security architectural artifacts, provide architectural analysis of cyber security features and relate existing systems to future needs and trends. Evaluates computer software and network for threats and/or malware; collect data from a variety of network security tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment. Employs and provides computer advanced forensic tools, technique, and intrusion support for attack reconstruction and high technology investigations, while reviewing threat data from various sources.

Naval Facilities Engineering Command Mid-Atlantic, May 2012 October 2012

NAVFAC MIDLANT CIO, IT Division

IT Hosting Support (CIO33)

Naval Base Norfolk Virginia

GS-2210-12 Information Technology Specialist

Information Technology Specialist (SYSADMIN/NETWORK

Supporting multiple domains across the Naval base and internationally Responsible for administering the installation, testing, operation, troubleshooting, and maintenance of hardware and software systems in support of the NAVFAC MIDLANT organization’s IM/IT program. Provides advice and recommendations on IM/IT system administration. Interpret and apply IM/IT polices, processes and guidelines. Conducted systems and application analysis/design and recommended resolution to problems and issues. Managed systems resources including performance, capacity, availability, serviceability, integrity, efficiency and recoverability. Built and virtualized servers and performed STIG’s and security checks, system updates on Windows 2008 R2, Linux Redhat Enterprise ESXi Servers Integration and configuration for the systems ICS and SCADA. Contributes to the creation of vulnerability risk assessments. As a Sea Watch IA Team member he has provided continuous monitoring activities, including managing POA&Ms; conducting annual assessments, research and development of Sea watch Topology and Data flow documentation review/updates; coordinating and documenting annual Contingency Plan Tests (CPTs). Mr. Alvin Cartwright also performs analysis of US and CG-CYBERCOM Task Orders (TASKORDs) requiring continued collaboration with system security stakeholders to determine appropriate response actions. Conducts a daily review and assessment of IAVM Tracker Database on ensure DISA compliance to determine the accurate response. Perform monthly IA review DISA STIG guidance. Work well independently as well as with a team. Complete monthly reports to the IA Sea watch team lead.

Diverse Technologies Corp, March 2010 May 2012

NH95 GCCS

Naval Base Norfolk, Virginia

VDI Linux-Solaris UNIX Administrator/ (GCCS) Administrator

Sun Solaris UNIX and Redhat Enterprise Linux Administrator provided expert technical support to implement Unix Security features and tools for Solaris version 8 thru 10 within enterprise zone

enclaves. Performed System backups, archiving security logs and McAfee security, engine and

anti- virus signature files and Exchange GAL upgrades, GCCS/COP servers. Recognized and

extracted key performance elements from UNIX and UNIX-like (i.e. High Assurance Guard-HAG)

systems. Analyzed the data and implement corrective actions to enhance overall performance and stability. Performed audit offloads to tape while providing technical support for Oracle DBA's and developers. Familiar with Sun Servers V480, V440, T2000, T1000, Ultra80, Ultra 10, Ultra, 280R, T5220 and dell servers. Maintained Remedy ticket System and logging. Performed Solaris system Migrations and upgrades from 8 thru 10 and Linux RHEL5.2 Provided VMS administration in support of UNIX and Windows OS patch and STIG requirements and IAVA updates. Installed and configured Go Global software on NIPRNET and SIPRNET servers and client workstations.

Performed Oracle Audit offloads. Performed STIGs on UNIX and Red Hat Linux servers in

compliance with DISA field Security operations. VDI Administrator familiar with VMware

vSphere 4.0 and VMware View 4.6 Administration. Managed over 600 VM's 19 hosts on NIPR and SIPR. Migrated over 500 users from Desktop fat clients to Zero client and thin clients. Managed vSphere Performance and troubleshooting utilizing vCenter Server 4.1.0 and VMware PowerCli and PowerShell 5.0. Created and Managed Pools and Thinapps desktops and servers utilizing VMware View Administrator 4.6.0. Provided Remediation to ESXi servers utilizing CLi and

vSphere client (update Manager) in conjunction with DISA VMS. Deployed new host ESXI servers

by building out HP Proliant BL460c G6's and G7 Blade servers. Maintained Data stores and

virtualized resources; created and cloned with vSphere. Maintained Windows 2008 R2 Active

Directory links with VMview Administrator by creating pools and managing snapshots and desktop

align systems policy and provide performance tweaking and troubleshooting. Virtualized software

and programs utilizing Thinapps 4.6.0 custom to the end users. Created and deployed Image

updates. Familiar with Arcsight and CommVault configurations for backup and restoral.

Troubleshoot ILO server support during server faults and restoral procedures. Performed STIGs on ESXi server images to include Window 7 Enterprise and staging and installing DISA patch updates.

Engineering Services Network (ESN) October 2008 March 2010

Naval Station, Norfolk, VA.

Network Engineer/Security Engineer

Sun Solaris UNIX Administrator with 10 years’ experience in complex, secure and classified

environments. Performed Solaris upgrades and migration. Familiar with Solaris version 9 to 10.

Performed UNIX security system hardening procedures. Ensured sensitive data protection by

maintaining DOD security requirements on all Solaris servers and providing compliance reports.

Conducted daily SUID File Baselines checks and Audit Trails. Conducted scans for information

assurance vulnerabilities. Provided daily scans that checked for unusual or unauthorized activity by system administrators. Maintained Unix Virus Scan engine and DAT updates. Maintained IAVA

compliance on all enclaves, ensuring systems that cannot be patched within the required timeline

had an approved Plan of Action and Milestones (POA&M). Ensured daily system backups are

completed and verified. Conducted daily fiber network connection interfaces checks. Responsible

for the backup of all servers and recovery of lost or corrupted data. Maintained an offsite backup and storage system using a Jumpstart (VERITAS Net backup) UNIX Disk Volume Management, Disk Suite/Solaris Volume Manager model. Familiar with Spectra Logic T120 robotic tape storage system. Implemented tape backup encryption. Maintained fiber optic connections to servers and robotic backup and storage systems in four enclaves. Responsible for 24 x 7 support of over 60 Sun Sparc servers and management across four different enclaves. Provided troubleshooting and assistance to various personnel including firewall engineers, database administrators and web developers. Provided weekly and Monthly reports to the Project Managers that included status of offsite projects and personnel completion rate to Support the Mission Statement of Work. Configured Sun hardware and installed and maintained jumpstart servers using Flash archive designed for rapid recovery. Demonstrated an Enterprise working knowledge of



Contact this candidate