DAVID BAMIDELE NGWODO
EMAIL: ******@*******.*** BOWIE, MD PHONE: 202-***-****
SUMMARY OF QUALIFICATIONS & TECHNICAL EXPERTISE/EXPOSURE
Over 30 years working in IT Networking environment and performing testing, analysis, database and implementation activities.
Experienced in Splunk UBA & Ent., Splunk Enterprise Security, ForeScout, AWS, Azure, RSA Archer, Windows NT & 2000,2003,2008, Cisco router, Switches, Hubs, Microsoft Office 2013, Microsoft Exchange Server 2000, 2003, 2007,2010, Outlook 2007, Dell, HP, DFS, FRS, Remedy, Heat, HP Openview, Oracle, SQL server, Internet, Lotus Notes, Netscape Navigator, Belarc, Zenworks 3.x & 4.x, BackupExec for NT/2000 v7.3, 8.x, Compaq DLT Autoloader Library, Brightstor Arcserve for Windows v9 & 2000, Windows 2008, Windows 2012 & 2016, Active Directory Services, SunSolaris 8, NETIQ, ManageWise 2.6, Netsight Element Manager, VirusScanners(Norton), Citrix Metaframe, eTrust, Quest, Aelita, Legato, Hyena, Veritas NetBackup 6.x, 7.x, McAfee EPO, Tenable, BeyondTrust, Qualys, Orchestrator 5.x., Cuckoo, AppsDynamic, Tanium,Trend Micro, Infoblox, Moloch PCAP, Solarwinds, Crowdstrike, Wireshark, ASA Firewall, CiscoFirePower, IronPort, SSL, TLS, Encryption.
EDUCATION & CERTIFICATIONS
B.S. degree in Computer Science, UNIVERSITY OF MARYLAND, UNIVERSITY COLLEGE, Adelphi, MD. 12/96
Computer Electronics Technology, HUMRRO, Washington, D.C. Courses completed in 1989.
Certificate in Computer Programming, DRAKE STATE TECHNICAL COLLEGE, Huntsville, AL.
Certified Splunk Enterprise Architect, 10/2023.
Certified Enterprise Splunk Security Admin, 09/2023.
Certified Splunk IT Service Intelligence 4.9, 11/2023.
Certified Splunk Developer, 09/2023.
Certified Splunk Admin, 09/2023.
Certified Splunk Core Power Users, 09/2023.
Certified Splunk Core Users, 09/2023.
Certified Ethical Hacker(CEH), 05/2024(Renewed).
Preparing for CISM Certification, 2024.
Microsoft Certified: Azure Windows Server Hybrid Administrator Associate, 04/2024.
Microsoft Certified: Azure Designing Microsoft Azure Infrastructure Solutions 05/2024.
Microsoft Certified: Azure Administrator Associate, 05/2024.
Certified AWS Certified Solutions Architect Professional, 12/2018.
Certified AWS Certified Developer Associate, 10/2018.
Virtualization Certified Professional(VCP 5) & ITIL Certified since 02/2013.
Microsoft Certified Information Professional(MCSA, MCTS, MCITP Server & Enterprise 2008).
Cisco Certified Network Professional CCNP.
Cisco Certified Network Associate CCNA.
Certified Novell Engineer (CNE), CNE-4,(1998), CNE-5,(1999), CNE-6,(2004).
Certified Novell Administrator (1998), IW4, GW5, NW5, NW6.
Completed Hands-on Training in MCSE 2008(Nov. 2009).
PROFESSIONAL EXPERIENCE
Senior SIEM/Splunk Engineer, Windwalker – Graham Technologies 1/23 – Present
Client: United States Customs Immigration Services(USCIS), Camp Springs, MD.
Utilize enterprise splunking, Splunk cloud ServiceNow & Jira Ticket Tracking tool to do daily tasks.
Create and maintain system design documents for production environment platform and subsystems.
Manage SOC knowledge base(JIRA/Confluence, SNOW).
Strong written communication skills & the ability to articulate technical security analysis to a non-technical audience.
Hands-on troubleshooting, analysis, & technical expertise to resolve incidents &/or service requests.
Responsible for the deployment, administration, log ingestion, health monitoring, and content creation for the SIEM in an on-premise/AWS environment.
Helped to administer a variety of other security tools within the client environment.
Administer the clients SaaS SIEM, the supporting hardware/software, and other client security tools
Develop, implement, review, and tune SOC detection content.
Assisting the System Architect and the Development teams in the development, integration, and testing of new advanced leading-edge cybersecurity capabilities.
Experience and strong familiarity of the Risk Management Framework (RMF) and security and privacy controls (NIST 800-37 and NIST 800-53R4), FedRAMP.
SIEM health monitoring, optimization, and capacity planning.
Onboard and maintain a wide variety of data sources to include various OS, appliance, and application logs.
Design and modify reports, dashboards, and visualizations to support the SOC’s mission.
Troubleshoot/solve complex integration challenges and configuration issues.
Technical documentation of engineering tasks (tool onboarding, process documents, etc.)
Strong understanding of System log files and other structured and unstructured data.
Assist in analyzing and testing web applications like JSON, XML, and/or OSCAL, Java, TLS, JavaScript. Provide support for managing COTS tools and in-house applications.
Design dashboards to capture metrics from the SOC and utilize Design tools like Balsamiq Wireframes to show Splunk Dashboard design layout.
Have 3 or more conference meetings every week with my immediate superior and fellow Splunk team members to discuss current and previous ServiceNow & Jira Tickets and ways to provide solutions to our daily tasks.
Senior Splunk SME Developer, Take2IT – Booz Allen & Hamilton 12/21 – 1/23
Client: U.S. Department of Veteran Affairs, Washington, DC.
Responsible for the maintenance and continuous improvement of all aspects of a large-scale Splunk SIEM infrastructure in on-premise/AWS.
Utilized ServiceNow & Jira Ticket Tracking tool to do daily project tasks.
Knowledgeable of security frameworks including MITRE ATT&CK, OWASP, TLS, FedRAMP & NIST.
Have troubleshooting, analysis, & technical expertise to resolve incidents and service requests.
Supported existing enterprise splunking, Splunk cloud and monitoring infrastructure.
Worked on creating, administering, and maintaining Dashboard Classic/Dashboard Studio and ITSI.
Utilized various Splunk Data Sources like ServiceNow, App dynamics, ForeScout, Aternity, Bigfix, ZingBox, BioMed to identify data sources.
Ensured the continuity and smooth functionality of the Splunk service, its associated components, and its integrations with other services.
Worked with the Splunk team to Design/implement solutions to business problems, understanding the Splunk architecture requirements for scalability, security, performance, and cost-efficiency.
Worked with Splunk team members as well as business units closely on overall blueprint and roadmap to translate requirements into an appropriate solution design.
Worked on modifying and writing Splunk queries to generate Dashboard Classic, Studio and ITSI.
Collaborated within Agile Scrum teams as a key contributor responsible for the system design and implementation of advanced cybersecurity capabilities.
Developed best practices, standards, and architectural principles for the Splunk service, creation and
maintenance of architectural documentation.
Participated in weekly conference meetings to discuss current and previous ServiceNow & Jira Tickets, as well as ways to provide solutions to our daily tasks.
Contacted Technical resources, Splunk vendors and applications vendors to resolve Cyber issues.
Experience with software and system lifecycle methodologies i.e., ISO, CMMI, ITIL, Agile, SAFe.
Generate appropriate alerting within SIEM to trigger investigations and participate in Incident Response activities.
Detailed understanding with Splunk Enterprise Security frameworks including: notable event, threat intelligence, risk, assets & identities.
Senior Splunk Content Developer & Splunk Data Admin, Mphasis, NY, NY 10/21 – 12/21
Client: Blackrock IT, NY, NY
Responsible for content creation, content monitoring, and content on boarding for cloud service provider logs in AWS; as well as data feed migration from a 3rd party MSSP to our Enterprise Splunk environment.
Monitored attack activities such as network reconnaissance probing/scanning, DDOS, malicious code activity.
Utilized technical resources to normalize all data to the Splunk Common Information Model; as well as Remedy and ServiceNow tools for Ticket Tracking.
Worked with SOC, IR and threat hunting analysts to design response actions for newly created detection rules.
Knowledgeable of Azure and Amazon Web Services components and best practices.
Have experience using Red Hat Linux, Windows Server administration (2012/2016), VMware Server, and Active Directory, MITRE ATT&CK, OWASP, FedRAMP & NIST.
Cybersecurity Splunk/Security Metrics Engineer Lead, Hill Associates, Rockville, MD. 11/20 – 03/21
Client: U.S. Department of Treasury, Department Office, Washington, DC.
Served as a subject matter expert to solve complex cybersecurity requirements.
Utilized Dynatrace, Splunk ITSI, AppDynamics with installing agents, forwarders, APIs,
performance monitoring tool alerts, dashboards, and data trend analysis in a monitoring tool in on-
premise and AWS; as well as data management methodologies to analyze, respond and solve problems across business, IT and security functions.
Applied in-depth expertise in Splunk to support Federal Information Security Management Act (FISMA) Level 4 (Managed and Measurable) IT controls for specified systems.
Defined input requirements to support data models; as well as ensured Department personnel are able to assess the security status of computing systems.
Developed a dashboard/automated data that comply with NIST 800-53R4 and other Government contract requirements.
Provided data analysis to support response to security incidents that may occur with IT systems.
Maintained Agency IT/security systems operated by OCIO to sustain security environment posture.
Submit recurring weekly and monthly program status reports.
Have experience using Red Hat Linux, Windows Server administration (2012/2016), VMware Server, and Active Directory, MITRE ATT&CK, OWASP, TLS, FedRAMP & NIST.
Developed and updated Standard Operating Procedures/user guides to facilitate installation/upgrades.
Cybersecurity Splunk SME, LEIDOS, Reston, VA. 07/20 – 11/20
Client: U.S. Department of Homeland Security, Washington, DC.
Built, implemented and administered Splunk in Windows and Linux environments.
Assisted in the technical design process and provided guidance/direction for customers to access
Splunk products.
Established and maintained configuration control and provided technical support.
On-boarded new data sources into Splunk, analyzed the data for anomalies and trends, and Splunk dashboards and alerts to support the ESOC Operations team.
Perform integration activities to connect with 3rd party software APIs.
Work with stakeholders to develop requirements and deliverables.
Manage automating Splunk deployments and orchestration within a Cloud environment.
Experience implementing, architecting and administering Splunk/ Splunk Enterprise Security Suite.
Experience writing Splunk queries in Splunk Programming Language (SPL).
Experience developing in XML, Bash, JavaScript and Python, Perl, PowerShell scripts.
Extensive experience with SQL, MySQL, or Oracle.
Experience administering Linux OS, particularly RedHat Enterprise.
Experience working in an Agile environment and working in AWS.
Thorough understanding of HTTP, REST APIs, JSON and syslog data format.
Systems architecture experience including allocation of hardware and software requirements, development of use cases and stories, interface definition, and systems integration and test.
Will be responsible for developing and updating standard operating procedures and user guides.
Provide consulting in Red Hat Linux, Windows Server administration (2012/2016), VMware Server, and Active Directory.
Deliver high availability for all infrastructure resources while ensuring confidentiality and integrity of the environment provided to the business.
Cybersecurity Engineer III, Kingfisher Systems, Inc. – Falls Church, VA. 06/20 – 7/20
Client: GOVPLACE – DHS US International Boundary and Water Commission – Washington, DC.
Implement and maintain enterprise-class security solutions as a federal agency to support and sustain CDM and HACS requirements. Align standards, frameworks and security with overall business and technology strategy.
Identify and communicate current and emerging security threats.
Design security architecture elements to mitigate threats as they emerge.
Create solutions that balance business requirements with mission, cyber security, and CDM/HACS requirements.
Identify security design gaps in existing/proposed architectures and recommend changes and enhancements.
Experience in security design using existing/emerging technologies to achieve enterprise solutions.
Experience working with Security Authorization requirements, developing and enhancing the security risk posture, and analysis and reporting of IT security metrics.
Perform Architectural design on ServiceNow, SailPoint, McAfee ePO Policy Auditor and Application Control, Tripwire IP360 VNE, Tenable Security Center, and RSA Archer.
Knowledge of security frameworks including FedRAMP & NIST.
Sr. Cybersecurity CDM Arch Engineer, Dinocrates Group LLC, Rockville, MD. 4/19 – 06/20
Client: National Oceanic Atmospheric Administration – Department of Commerce – S/Spring, MD.
Serves as the lead subject matter expert to the NOAA CDM program manager for all phases of CDM.
Splunk development/administration experience with Python scripting in an Agile Methodologies
environment. Responsible for the monitoring and tracking of security relevant events and assists in the development and implementation of security procedures.
Develops the current state and desired state architecture across NOAA systems for all aspects and phases of CDM. For all phases, assists and documents the readiness and ability of the Bureau to begin phase or incorporate the technologies required to meet the phase requirements.
Develops presentation materials on current status of CDM activities from a technical and informational/usability perspective.
Develops SPLUNK queries and data reports to facilitate the evaluation and determination of data accuracy across the Bureau. Evaluates tools and technologies proposed under the CDM program and presenting findings to the NOAA CDM program manager and additional staff.
Strong written communication skills & the ability to articulate technical security analysis to a non-technical audience.
Serves as liaison between the CDM integrator and NOAA management and additional staff.
Works with the CDM project manager on integration activities and schedules.
Works with the Junior security architect on the development of standard operating procedures and all technical and managerial presentation/documentation activities.
Assisting the CDM team in the development of a CDM/cyber security roadmap in conjunction with the existing CSD OCIO cyber security roadmap to ensure the correlation between the CDM activities and cyber security division activities are addressed.
Assisting the System Architect and the Development teams in the development, integration, and testing of new advanced leading-edge cybersecurity capabilities.
Responsible for engineering design, security tools maintenance and development of cyber security technology along with integration of new architectural features into existing infrastructure. Resolve architecture implementation issues during integration and test.
Perform security tools maintenance as required on McAfee Web Gateway/Proxy, DLP such as Symantec, Email security tools such as IronPort and FireEye, CDM tools like BigFix, ForeScout, Splunk, Tenable. Experience in Unix and Linux Administration, REST API, SDKs, SQL.
Support multi-disciplined teams in the design and implementation of the cyber security system architecture. Apply cyber security standards, directives, guidance and policies to an architectural framework. RMF. NIST 800-53R4, NIST 800-37.
Provide architectural analysis of cyber security features and relate existing systems to future needs and trends. Provide broad based experience in the systems engineering lifecycle and apply the experience to specific cyber security initiatives relating to architectural design and development.
Experience identifying new tools and/or required upgrades based on ROI. Knowledge of Windows and Linux operating systems, hardening baselines such as STIGs. Experience with Change Management(CRs, CCBs, etc.). Performance metrics related to security operations.
Utilize SCAP scanner tool to compares a target computer or application's configuration and/or patch level against that of the SCAP content baseline. I also used it to automate management of vulnerabilities and policy compliance for the organization.
Create/maintain system design documents for production environment platform and its subsystems.
Detailed understanding with Splunk Enterprise Security frameworks including: notable event, threat intelligence, risk, Splunk back-end configuration files, assets & identities as well as extensive working knowledge of the Common Information Model.
SOC 2 ANALYST/TECHNICIAN, Z Federal – Sparks Group, Rockville, MD. 10/18 – 04/19
Client: U.S. Census – Department of Commerce – Greenbelt, MD.
Worked with alerts from the Tier 1 SOC Analysts, to perform in depth analysis/triage of network security threat activity based on computer/media forensics, malicious code and protocol analysis.
Utilized Wireshark for packet capture(PCAP) to identify network performance issues, etc. Splunk
development/administration experience with Python scripting in an Agile Methodologies environment.
Assisted with the development of incident response plans, workflows, and SOPs, Deployed and
maintained security sensors and tools, Monitored security sensors and review logs to identify intrusions. Monitored key security infrastructure elements, identified security events, performed analysis, and initiated response activities. Experience in Unix and Linux Administration, REST API, SDKs, SQL. Responsible for the monitoring and tracking of security relevant events and assisted in the development and implementation of security procedures.
Performed packet analysis by identifying malformed packets and the payload of the packet. Integrate security products, including designs for all organizational networks as well as designing, engineering, planning, integrating, configuring, testing and deploying.
Thought critically and creatively while analyzing security events, network traffic, and logs to engineer new detection methods, Worked directly with cyber threat intelligence analysts to convert intelligence into useful detection, Collaborated with incident response team to rapidly build detection rules and signatures as needed.
Developed and implemented detection use cases, Developed and implemented IDS signatures, Assisted with incident response efforts, Created and brief customer reports.
Participated in on-call rotation for after-hours security and/or engineering issues, Performed customer security assessments, Develop and run table top exercises. Identify incident root cause and take proactive mitigation steps, Perform lessons learned activities, Mentor junior analysts and run brown bag training sessions, Review vulnerabilities and track resolution, Reviewed and processed threat intel reports and sources.
Provide documentation and interaction with other analysts and Operations and Maintenance (O&M) personnel to ensure a complete and functioning system that meets requirements.
Experienced with design, architected and maintained FireEye hardware and software i.e., with FireEye CM, NX, AX, EX, and PX.
Collaborated with Agile Scrum teams as a key contributor responsible for the system design and implementation of advanced cybersecurity capabilities.
Provided consulting in Red Hat Linux, Windows Server administration (2012/2016), VMware Server, and Active Directory in on-premise and AWS environment.
Detailed understanding with Splunk Enterprise Security frameworks including: notable event, threat intelligence, risk, Splunk back-end configuration files, assets & identities as well as extensive working knowledge of the Common Information Model.
Hands-on troubleshooting, analysis, & technical expertise to resolve incidents &/or service requests.
Knowledgeable of security frameworks including MITRE ATT&CK, OWASP, FedRAMP & NIST.
Delivered high availability for all infrastructure resources while ensuring confidentiality and integrity of the environment provided to the business.
Taught students on how to triage daily queue of alerts from sources such as Bluecoat, Fireeye, SourceFire, McAfee Antivirus/HIPS, Splunk logs, Active Directory, Checkpoint Firewalls, and Juniper Firewalls.
Taught investigating alerts for potential DLP issues & malicious activity as well as possible network attacks such as DDOS, DOS, DNS attacks, and server exploitations.
Represented our team using rotation for large scale issues on conference calls.
CDM Tools Engineer, CGI Federal – Patriot LLC, Fairfax, VA. 08/18 – 10/18
Client: Department of Homeland Security HQ
Responsible for the monitoring and tracking of security relevant events and assists in the development and implementation of security procedures.
Served as subject matter expert providing technical knowledge and analysis of highly specialized applications and operational environments, high-level functional systems analysis, design,
integration, documentation and implementation advice on exceptionally complex problems that need
extensive knowledge of the subject matter for effective implementation.
Participated in all phases of software development with emphasis on the planning, analysis, testing,
integration, documentation, and presentation phases.
Applied principles, methods and knowledge of the functional area of capability to specific task order
requirements, advanced mathematical principles and methods to exceptionally difficult and narrowly
defined technical problems in engineering and other scientific applications to arrive at automated solutions. Risk Management Framework NIST 800-53, NIST 800-37, FedRAMP.
Utilized SIEM Monitoring tools: Forescout, Splunk, Qradar, IBM BigFix, Tenable Security Center, RES Workspace, McAfee Application Control for Continuous Diagnostics Mitigation. Splunk development/administration experience with Python scripting in an Agile Methodologies environment. Monitoring tools: Splunk, DB protect, AppProtect.
Experienced in Unix and Linux Administration, REST API, SDKs, SQL.
Cyber Security Operations Engineer, SOC ManTech Int’l Corporation, Reston, VA. 11/15 – 05/18
Client: Department of Homeland Security HQ, Reston, VA.
Experience with CDM dashboard or Security Information Event Management (SIEM) systems, including ingest of third-party data for rendering within the dashboard or SIEM.
Provided initial configuration and troubleshooting for McAfee and ForeScout products supporting network monitoring, device detection, endpoint software inventory, configuration compliance assessments, and vulnerability detection in SOC. Experience in Unix and Linux Administration, REST API, SDKs, SQL. Monitoring tools: Splunk, DB protect, AppProtect.
Knowledgeable with basic IPv4 local area networking concepts like subnets, masking, switches, routers, gateways. Familiarity with the NIST 800 publications governing the FISMA Act.
Operated and provided Tier 2 and Tier 3 CDM support for Splunk, Vulnerability Manager, ForeScout CounterAct, RSA Archer, e.t.c. Performed Vulnerability Scanning on Retina servers to determine Microsoft patches needed. Risk Management Framework NIST 800-53, NIST 800-37.
Subject Matter Expert in McAfee ePO, McAfee Policy Auditor, McAfee Application Control.
Ensure Active Monitoring of Network and Endpoint Inventory in SOC.
Experience in Dynatrace, Splunk ITSI, AppDynamics with installing agents, forwarders, APIs, performance monitoring tool alerts, dashboards, and data trend analysis in a monitoring tool.
Manipulated data in order to conduct sound and accurate analysis regarding output.
Learned and assisted in managing CDM DHS-specific Compliance dashboards and applications. Mentored Junior Cyber Security Operation Engineer.
Supported data collection from McAfee and ForeScout by a Splunk repository. Reconcile information aggregated within Splunk with native databases of McAfee ePO and ForeScout CounterAct.
Conducted appropriate analysis and ensure calls that are unable to be resolved are appropriately forwarded to next level support services, both internal engineering and product vendors. Supported the following: Provided initial problem resolution where possible, Generated, monitored, and tracked incidents through resolution, Provided software support, Maintained frequently asked questions and
their resolutions, Obtained customer feedback and conduct surveys, Contribute technical input to CDM CMaaS User and Operator Training in Security Operation Center.
Experience using McAfee Host Intrusion Prevention System Configuration, McAfee Host Intrusion Prevention System Management, McAfee Application Control, McAfee Policy Auditor, McAfee
Installed, Operated and performed administrative tasks on Linux Redhat 6.x.
Risk Advisor, Splunk, RSA Archer, Security Content Automation Protocol (SCAP), Asset Summary Reporting Format (ASR) in Security Operation Center. Implement FSMO roles.
Developed effective written procedures and SOPs to guide & IA/scanning team on daily operations, Worked with the other IT support teams in troubleshooting and remediating outstanding.
Vulnerabilities. Made sure software configurations achieve a high level of security for systems and applications. Managed the day-to-day activities of threat and vulnerability management, identified risk tolerances, recommended treatment plans and communicated information about residual risk.
Operated and maintained a suite of vulnerability scanning tools, including Retina, Nessus, Assisted in research, analyze, design, test, and implement new or vendor-supplied security software solutions.
Provided up- to-date documentation and procedures on security software products. Splunk
development/administration experience with Python scripting in an Agile Methodologies environment
in a private and public cloud. Developed and managed security for more than one IT security area across the enterprise.
Systems architecture experience including allocation of hardware and software requirements, development of use cases and stories, interface definition, and systems integration and test.
Analyzed scan results, prioritize, identify solutions and made recommendations based on the analysis. Utilized Wireshark for troubleshooting network issues.
Examined data from multiple disparate sources with the goal of providing new insight. Designed and implemented custom algorithms, flow processes for data sets used for modeling, data mining, and research purposes. Performed penetration tests, identified exposure and risks, and recommended appropriate security solutions. Responsible for the monitoring and tracking of security relevant events and assists in the development and implementation of security procedures.
Made recommendations regarding the selection of cost-effective compensating security controls based on NIST 800-37, NIST 800-53 to mitigate risk. Stay up to date with current vulnerabilities, attacks, and countermeasures. Enforced security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates and maintains the documented security controls.
Experience with software and system lifecycle methodologies i.e., ISO, CMMI, ITIL, Agile, SAFe.
Worked on developing Splunk Use Cases, Dashboards, Alerts and Reports based on different sources of data, including databases as well as developing content for Splunk, including creation of complex correlation logic and operational dashboards in on-premise and AWS environment.
Hands-on on experience utilizing both pre-built dashboards/add-ons within Splunk system and customized Splunk dashboards and search queries.
On-boarded new data sources into Splunk, analyzing the data for anomalies and trends, and building dashboards highlighting the key trends of the data.
Experience creating and managing Splunk knowledge objects (field extractions, macros, event types, CIM, data models etc) and assisting with developing modules, plugins or API end points.
Exposure to build, design, deliver, re-write, and maintain efficient, reusable, and reliable security automations using Splunk SOAR as well as collaborating with internal teams as part of setting up SOAR integrations.
Experience with design, architect and maintain FireEye hardware and software i.e., with FireEye CM, NX, AX, EX, and PX.
Created & maintained system design documents for production environment platform and its subsystems.
Assisted the System Architect and the Development teams in the development, integration, and testing of new advanced leading-edge cybersecurity capabilities.
Collaborated with Agile Scrum teams as a key contributor responsible for the system design and implementation of advanced cybersecurity capabilities.
Provided consulting in Red Hat Linux, Windows Server administration (2012), VMware Server, and Active Directory.
Delivered high availability for all infrastructure resources while ensuring confidentiality and integrity of the environment provided to the business.
Systems Administrator, I4DM, Millersville, MD. 08/11-09/15
Client: HP – Department of Veteran Affairs, Washington, DC.
Responsible for system configuration, system backup, software installation and maintenance, software license maintenance, utilization, and system performance for servers supporting a variety of software application systems. Make recommendations to management concerning hardware/software upgrades for more effective system use.