Post Job Free
Sign in

Information Technology Management

Location:
Chamblee, GA
Posted:
September 23, 2024

Contact this candidate

Resume:

SUMMARY OF QUALIFICATIONS

As a Professional Associate Information Management, with experience in computer network and cybersecurity, my responsibilities at the Information Resources Management Office (IRM) are juggling a complex portfolio, providing Software and Hardware Information Technology (IT) application support in Computer Networking & ISSO responsibilities’, Radio & Telephone, Secure VOIP & Video Conferencing Support to Employees in Controlled Access Area (CAA) and Post Communication Centre (PCC). COMSEC custodian my role in ensuring the confidentiality, integrity, and availability of sensitive communications within an organization or government agency. I manage various IRM functions and applications, OKTA, Microsoft Azure cloud network management, Exchange Server, MS Active Directory, Office365, and vSphere client management. IT Asset Management (ILMS), MS-SharePoint, My services, Access Control Systems Auditing applications and provides efficient support to the Embassy’s large-scale LANs and WANs network Class-Net Systems (36+ users, 24 Thin Client workstations). Experience in single sign-on (SSO), multi-factor authentication (MFA), SMART Admiration, Supporting and troubleshooting large-scale Cisco Unified Communications Administration and CS100 Nortel and AVAYA-IP telephone switch networks of over 800 extensions and 4 remote locations and HF and VHF/UHF Radio Systems. Using Network Security Monitoring Tools to analyze network data and detect network-based threats. Examples of tools used include Argus, Nagios, Tenable, Splunk. Intune and AirWatch Mobile Device administration. coaxial termination, fiber termination, copper cable testing, Installation bonding infrastructure cable trays, ladder racks, and continuous cable support systems, fiber termination Perform pre-termination functions, Install correct connecting hardware for fiber terminations, Security access control, system network.

WORK EXPERIENCE

TEKsystems/ZT Systems

AWS Data Center Technician Hardware migration (Temporary) April – August 2024

Upgraded server performance by replacing and installing the necessary RAM modules.

Ensured reliable network connectivity by connecting servers using CAT6 cables and SFP connectors.

Expertly racked servers in accordance with precise specifications and industry standards.

Maintained a safe and organized work environment by thoroughly clearing and cleaning the work area, including the removal of excess equipment and debris.

Optimized GPU performance by carefully removing, inspecting, and reseating NVIDIA GPUs for improved connectivity.

TEKsystems at Microsoft

Microsoft CO+I critical infrastructure facility.

Data Center Network Technician migration (Temporary) February – MAY 2024

Monitoring the health and performance of hardware equipment using monitoring tools and systems. This includes monitoring temperature, power usage, disk space, and other critical metrics to ensure optimal functioning and prevent downtime.

Un-rack and re-rack rack-mounted devices in the new location. Ensure that cabling is done correctly and that devices are securely placed.

Installation of network devices such as routers, switches, firewalls, and load balancers.

Koniag FBI-Theorist Screening Center Telecommunications Specialist (Contract) July 2023 – December 2023

Oversee the daily operations and maintenance of CS 1000 PBX phone systems, ensuring high availability and performance.

Troubleshoot technical issues, providing quick and effective solutions to minimize downtime.

U.S. DEPARTMENT OF STATE (DOS) U.S. Embassy, Cairo, Egypt

Professional Associate Information Management August 2022 – December 2023

Responsible for imaging and deployment of Secure TEMPESTED computer systems and User Administration on Active Directory, monitoring and pushing required patches to computers and servers. SMART Administration and performing OpenNet/ClassNet LRA tasks.

Manage and operate Microsoft Azure cloud server, deploying administering, and keeping an eye on Azure solutions as well as the storage, identity, governance, virtual networks, and computing in a cloud environment.

Setting up and configuring Exchange Server according to the organization's requirements, including mail flow, mailbox databases, and client access.

Creating, modifying, and deleting user mailboxes, distribution groups, and public folders. Managing user permissions and access rights within Exchange.

VMware administrator responsible for monitoring and managing systems that operate through VMware products and services. Ensuring the security and stability of VMware networks by running technical control procedures to maintain quality standards.

Administering Active directory domain services with a wide range of responsibilities including, Creating, modifying, and deleting user accounts, groups, computer accounts, organizational units (OUs), and other objects in the directory service database.

Planning, evaluating and carrying out security measures to protect the United States Embassy from breaches. I monitor networks and servers to ensure that assets are safe, and work to secure data in the event of an attack quickly.

Using Encryption tools to protects data by scrambling text so that it is unreadable to unauthorized users. Examples of tools include Tor, KeePass, VeraCrypt, NordLocker, AxCrypt, and TrueCrypt. Periodically conducted web vulnerability scanning, scan web applications to identify security vulnerabilities including cross-site scripting, SQL injection, and path traversal. Tools used include Burp Suite, Nikto, Paros Proxy, and SQLMap.

Information systems security officer (ISSO) responsibilities and performing COMSEC responsibilities, using approved cybersecurity tools (ISSO Toolkit, iPost, Slunk) to audit systems to achieve everyday compliance.

Implementing and enforcing email security policies, anti-spam measures, and data loss prevention (DLP) strategies. Ensuring compliance with regulatory requirements and industry standards related to email communication.

Managing PBX CS1000 Telephone operation, NetBox, IVG and E1 Line operation. Analog and Avaya VOIP telephone operation and post HF & U/VHF Radios.

Assisted in the management and tracking of IT assets for a company with over 100 employees and 500 devices.

Conducted regular audits of IT assets to ensure compliance with company policies and regulations.

SharePoint Administrator developing SharePoint page for various offices to meet user needs.

Enforced the use of approved department policies and procedures in the use of IT applications at the Embassy like OKTA, ISSO Toolkit, My Services, and SharePoint.

Communication with department heads on missing critical work applications that affect secure communication and work deliverables.

Wrote ISSO SOP on disaster recovery plan at post level inculpating cybersecurity frameworks such as NIST CSF, CIS Top 18 Messages.

Worked on using a multifaceted task that involves evaluating IRM security posture across various domains.

Risk Assessments evaluate the likelihood and impact of potential threats to identify critical risks and prioritize mitigation efforts in the area of transporting secure IT assets.

U.S. DEPARTMENT OF STATE (DOS) U.S. Embassy, Dar Es Salaam, Tanzania

Professional Associate Information Management August 2018 – August 2022

Responsible for imaging and deployment Secure TEMPESTED computer systems and User Administration on Active Directory, monitoring and pushing required patches to computers and servers. SMART Administration and performing OpenNet/ClassNet LRA task.

Manage and operate Microsoft Azure cloud server, deploying administering, and keeps an eye on Azure solutions as well as the storage, identity, governance, virtual networks, and computing in a cloud environment.

VMware administrator, responsible for monitoring and managing systems that operate through VMware products and services. Ensuring the security and stability of VMware networks by running technical control procedures to maintain quality standards.

Administering Active directory domain services with a wide range of responsibilities including, Creating, modifying, and deleting user accounts, groups, computer accounts, organizational units (OUs), and other objects in the directory service database.

Planning, evaluating and carrying out security measures to protect the United States Embassy from breaches. I monitor networks and servers to ensure that assets are safe, and work to quickly secure data in the event of an attack.

Using Encryption tools to protects data by scrambling text so that it is unreadable to unauthorized users. Examples of tools include Tor, KeePass, VeraCrypt, NordLocker, AxCrypt, and TrueCrypt. Periodically conducted web vulnerability scanning,

scan web applications to identify security vulnerabilities including cross-site scripting, SQL injection, and path traversal. Tools used include Burp Suite, Nikto, Paros Proxy, and SQLMap.

Information systems security officer (ISSO) responsibilities and performing COMSEC responsibilities, using approved cybersecurity tools (ISSO Toolkit, iPost, Slunk) to audit systems to achieve everyday compliance. Antivirus software finding viruses and other harmful malware, including ransomware, worms, spyware, adware, and Trojans. Using tools like Norton 360, Bitdefender Antivirus, Norton AntiVirus, Kapersky Anti-Virus, and McAfee Total Protection.

Managing PBX CS1000 Telephone operation, NetBox, IVG and E1 Line operation. Analog and Avaya VOIP telephone operation and post-HF & U/VHF Radios.

IT Assets Management uses approved applications to inventory and manage IT assets and maintain a system that staff cannot do away with but follow the required process. Provided technical support to employees for hardware and software issues.

Assisted in the management of IT assets, including the tracking and disposal of outdated equipment.

SharePoint Administrator developing SharePoint page for various offices to meet user needs.

Spearheaded cyber risk assessments for Post, including USAID and CDC enhancing the embassy's security posture by identifying critical vulnerabilities, prioritizing threats, and reducing risk scores by 20%.

Developed SOPs, reviewed, and edited information security policies and procedures, offering guidance on best practices.

Led the impregnation of Microsoft 360 Azure at the Embassy level, restoring operations within 24 hours and minimizing patient data exposure. My leadership and coordination skills were instrumental in navigating this critical situation.

Implementing NIST policy security framework on Encryption tools to protect data. Through awareness creation.

Worked with HRO on Privacy Assessments and analyzed how the offices collect, store, and use personal data to ensure compliance with privacy regulations like GDPR and CCPA during MO360 migration.

A COMSEC (Communications Security) custodian plays a crucial role in safeguarding sensitive information related to communication systems. Here are some responsibilities typically associated with this role:

Secure Communication Equipment Management: This involves managing and maintaining secure communication equipment such as cryptographic devices, secure telephones, and secure communication networks.

Key Management: Ensuring the proper generation, distribution, storage, and destruction of cryptographic keys used to encrypt and decrypt sensitive information.

Policy Compliance: Adhering to all COMSEC policies, procedures, and regulations set forth by the organization, government agencies (e.g., NSA, NIST), and industry standards (e.g., FIPS).

Incident Response: Responding to and investigating any security incidents or breaches related to secure communication equipment or cryptographic keys.

Physical Security: Ensuring the physical security of communication equipment, cryptographic keys, and related materials through measures such as access control, secure storage, and periodic inspections.

Inventory Management: Maintaining accurate records of all secure communication equipment, cryptographic keys, and related materials, including tracking their location, status, and usage.

Coordination and Liaison: Collaborating with other departments, agencies, and external stakeholders involved in secure communication activities, including coordination for key exchanges and cryptographic support.

Compliance Reporting:Generating reports and documentation to demonstrate compliance with COMSEC policies, procedures, and regulatory requirements to internal stakeholders, auditors, and regulatory bodies as necessary.

Overall, a COMSEC custodian plays a critical role in ensuring the confidentiality, integrity, and availability of sensitive communications within an organization or government agency.

Awards Received: Franklin Award, July 2018, and November 2018

Meritorious Honor Award, June 2021

Office of the Army Surgeon General Defense Health Headquarters

IMD IT Support Services May 2017 – June 2018

Provides responsive IT technical support to United States Army Medicine officers, mainly smooth running of computer systems and ensuring users get maximum benefits from them.

Installing and configuring computer hardware operating systems and applications and monitoring and maintaining computer systems. Talking to staff or clients through a series of actions, either face-to-face or over the telephone, to help set up systems or resolve issues and troubleshooting systems and problems and diagnosing and solving hardware or software faults by replacing parts as required.

providing support, including procedural documentation and relevant reports, and setting up new users' accounts and profiles and dealing with certificate issues.

Rapidly establishing a good working relationship with customers and other professionals, such as network engineers.

U.S. DEPARTMENT OF STATE (DOS) U.S. Embassy, Addis Ababa, Ethiopia

Information Management Assistant September 2015 - June 2017

Improved Communication Efficiency:

Streamlined Mission phone systems: Transitioned to IP, reduced call wait times by 15%, and streamlined onboarding with pre-configured new phones.

Optimized call routing: Established caller and pickup groups, directing calls to the right teams 24/7, boosting staff productivity.

Enhanced Security & Asset Management:

Led Embassy-wide PKI card rollout, improving user access security and offering comprehensive support.

Revamped IT asset management: Increased accountability through reorganization and inventory updates, ensuring compliance and responsible disposal.

Tech Upgrades & User Support:

Seamless system integration: Performed frequent computer updates and imaging, ensuring smooth deployment and user access.

Efficient hardware replacement: Upgraded computers using WDS and added peripherals, tailoring solutions to user needs.

Proven expertise in Information Technology Assets Management, collaborating with clients to assess needs, maximize profits, and identify investment opportunities.

U.S. Department of State U.S. Embassy, Kinshasa, DRC

Diplomatic Post Office (DPO) Supervisor July 2013 - June 2015

In the realm of Technology Assets Management, my role involves engaging with clients to assess asset status, needs, risks, goals, and progress. I am adept at preparing comprehensive financial statements, business activity reports, and forecasts. Additionally, I specialize in developing, organizing, and maintaining client portfolios, demonstrating proficiency in studying market trends, maximizing profits, and identifying lucrative investment opportunities.

In my capacity, I have fulfilled work orders and service calls, excelling in the installation, maintenance, and repair of computer and telephony equipment, along with associated peripherals. Collaborating with the IPO, I troubleshoot Nortel phone system hardware, software, and occasionally address network operating problems. Adhering to approved FAM regulations, I expertly set up, assemble, install, configure, reconfigure, modify, move, and relocate hardware/software on-site for regular or special function use.

Optimized DPO clerks' work schedules, resulting in a monthly savings of over $1,200 in overtime pay for the US Embassy.

Conducted a detailed analysis of DPO financial operations, uncovering financial malfeasance and reducing operating expenses by $350 per week.

Collaborated with airline and customs officials to develop a new client management database, achieving a 100% reduction in missing mail and packages.

Transitioned the Embassy's payment process for fees to DRC Government customs and airlines officials, improving accuracy and eliminating billing inconsistencies.

Designed and conducted a training course on Microsoft Excel and other DPO-related software, reducing operational hours and minimizing the need for overtime.

Implemented an automated Microsoft Excel program for email notifications, resulting in a 95% decrease in paper usage in the mailroom.

Established processes for electronic signatures to confirm mail delivery and the use of digital cameras for package condition documentation.

Facilitated effective communication with DRC Government customs and airlines officials, garnering support for a streamlined process for airway bills and invoices.

Encouraged the integration of computers for 90% of mailroom tasks, enhancing efficiency, responsiveness, and mail distribution speed.

Maintained controlled supervision for the delivery of DPO, Unclassified, and occasionally Classified Pouch, DHL, FedEx, and UPS mail and packages to embassy staff, offices, and departments.

Achieved exemplary performance for the diplomatic pouch office through the seamless implementation of computerized processes and cost-saving measures.

Moreover, my proactive approach involves sending detailed monthly reports on mailroom activities and events to supervisors and overseers, allowing for effective management with minimal supervision.

U.S. Department of State U.S. Embassy, Colombo, Sri Lanka

Security Escort, (RSO) July 2011- March 2013

• Conducted systematic checks prior to escorting non-cleared personnel, janitorial teams, maintenance crews, and contractors working in secure areas of the Mission or other designated locations. Collaborated with the RSO shop to supervise the work, ensuring the integrity of secure areas. Implemented rigorous site security measures upon completion of work, confirming the exit of all non-cleared personnel. Prepared Controlled Access Areas (CAAs) for work crews and ensured thorough inspections of all materials entering CAAs.

• Coordinated services for classified Diplomatic Courier Pouches and provided occasional support for mission-related flight activities.

EDUCATION

University of Maryland University College Adelphi, MD

BS in, Computer Networks and Cybersecurity June 2012 – June2016

Relevant coursework

Administering Windows Server

Network Forensics, Architecture and Design

Computer Security Systems

Configuring CISCO switches (directly applied training to current work)

Establishing and maintaining an active user directory (directly applied training to current work)

CCAN, Security+, Network+ and CompTIA A+

Foreign Service Institute (On the Job Training)

IT/Information Systems

Annual SMART Systems Administration

Exchange Server/Active Directory 11/2018

Test Out PC Pro, 12/2016

Avaya Telephone System, 03/2016

MS SharePoint, 02/2016

Test Out Security Pro, 12/2015

Test Out Network Pro, 02/2015

CompTIA Security+ 03/2015

Security Training

Intermediate Systems Network 10/2021

National Incident Management System,

Community Preparedness, 11/2016

National responds framework, 11/2016

Counterintelligence Awareness, 05/2016

Foreign Affairs Counter Terrorism, 08/2014

SOS: Security Overseas, 02/2011

Annual ISSO Information Assurance Training,

VOLUNTEER ACTIVITIES

Interviewed 50 candidates for the Mandela Washington Fellowship for Young African Leaders Initiative, U.S Embassy Addis Ababa, 2017.

Assigned to transportation team for Secretary John Kerry and Dr. Jill Biden visits to the DRC. Responsible for ensuring security of all baggage for VIPs and their team, 2014.

Assisted in replacing fiber optics cables at the U.S. Embassy Dar es Salaam, 2018.

REFERENCES

Joseph Rizcallah, Information Programs Officer ***********@*****.***

Gregory Strozier MNCM, Information Management Officer **********@*****.***

Axelord Samuel M, Information Programs Officer *********@*****.***

Michelle L Judy, Information Management Specialist ******@*****.***



Contact this candidate