Post Job Free
Sign in

Information Technology Windows Server

Location:
Warrenton, VA
Salary:
220,000 is my current salary
Posted:
March 25, 2025

Contact this candidate

Resume:

Jason D. Malroy

**** ***** ****

Warrenton, Va **187

Top Secret 4/29/2020

Phone: 703-***-****

E-mail: ********@*****.***

EDUCATION

●New Mexico State University, 1988, Las Cruces, New Mexico

●Bachelors of Business Administration & Economics

CERTIFICATIONS

●Security Plus, September 2008, Security Plus CE, Feb 2025

●Solaris 5.9 System Administration Class, August 2003

●MCSE Windows Server, 2000

●Microsoft Certified Professional (MCP), January 1997

●Novell CNE Certification, JUNE 1994

KEY SKILL AREAS

●Information Technology

●RHEL/CentOS/Oracle 7.x, and 8.x

●Windows Server 2000/2003/2008/2012/2016/2019

●Windows NT, XP, Vista, Windows 7, Windows 8.0/8.1, Windows 10

●Active Directory Administration

●GPO Administration

●Time Sync Management

●DHCP, WINS, DNS, SMTP, SNMP

●Remote PXE Boot Configuration

●Exchange 5.0, 5.5, 2000, 2003

●IIS

●MS SQL Server 2005, 2008 R2, 2012, 2019 Administration

●Windows SMS 1.2 / 2.0 Rollout

●Microsoft System Center Configuration Manager (SCCM) 2003/2007 R2

●HBSS to assist with Vulnerability Management.

●ePO 4.0 / 4.5, 4.6.8, 4.6.9,5.3.1, 5.9,5.10 VSE 8.7/8.8, and HIPS 7.0/8.0 and host agent 4.0/4.5/4.6/4.8, Mcafee DLP 9.3.200 .500 and DLP9.3.600 for Windows 2003/2008/2012/2016, Linux/Macintosh

●ENS 10.6 and 10.7 - Threat protection client, firewall client and common client

●ACAS, Nessus, Foundstone, and Retina vulnerability scanning tools

●Vulnerability Management System (VMS)

●Seagate Backup Exec 2010, Veeam Backup

●PSEXEC Tools for automated scripts

●Microsoft WSUS and other 3rd Party products that assist with patch management

●Configuration and use of VMWare’s VSphere with ESXi and VMware VirtualCenter Manager 6.x, 7.x, 8.x

●Remedy Trouble Ticket System for use with Help Desk Support

●Low vulnerability OS image development for remote deploy to Workstations/Servers as software baseline

●Access Control List (ACL) / Permissions Management

●Extremely knowledgeable of various HP/Compaq and Dell Hardware (both Desktop and rackmount)

●Vulnerability Management

●Certification and Accreditation with use of eMASS

●Acronis Backup & Recovery 10 / Acronis True Image Software for Disaster Recovery and Disk Imaging

●Tivoli Endpoint Management Software Application

●AWS Cloud environment to include EC2 computing, S3 buckets and RDS (SQL Server implementation)

MISCELLANEOUS TECHNICAL INFO

Mr. Malroy has his own personal lab environment with the following server hardware and software configurations installed into a double rack environment:

10 DELL 2950 Servers, 2 DELL R510 Servers, 1 DELL R530 Server, 2 DELL R710 Servers, 1 DELL R720xd Server and 1 DELL R730 Server configured to run various Operating systems on both physical server hardware and Linux KVM or VMWare ESXI 7.x and 8.x hypervisor environments. Multiple Operating systems include Windows 2012R2, Windows 2016, Windows 2019, Centos 7.9, RHEL 7.x and 8.x, Oracle 8.x, Ubuntu 18.x and 20.x as well as various versions of MS SQL Server. The network is configured for both NAT and routed environments to test various McAfee client environments or CDS/CSfC configurations. Software configurations include multiple ePO servers with different versions of ENS, Application Control (Solidcore), DLP, TIE/DXL, McAfee SIEM, Policy Auditor, RSD, VSE, HIPS and Drive Encryption. Additionally, he has a separate enclave of Linux Servers to replicate a CDS/CSfC environment with VPN access into the enclave.

EXPERIENCE

Technical Senior Network / Systems Engineer / Architect, Government Agency, Reston, VA, Cross Point Solutions LLC and cFocus Software, Inc., Cross Domain Solutions (CDS) Technical Systems SME, 08/1/2023 to Present

Focus areas include: Development and construction of a government approved Cross Domain Solution Development Environment and stand-lone Test Lab to allow for development and testing of the CDS solution the government uses for data transfers. Systems Engineering, Technical Systems Architect / Engineer

Mr. Malroy developed and constructed a stand alone development environment and a test lab for a government client that provides a dual purpose development and testing of a CDS solution that is used in production within the government agency’s data flow environment. This lab and development environment will be used to migrate the older CDS system to a newer OS and CDS code base. Mr. Malroy’s sole role was to build this DEV and TEST lab environment. He architected the DEV environment and installed a DELL R750 Server, a Cisco Firepower 1120, and a Cisco Business series 250 switch into a 42U rack with ethernet connections between the hardware components. He developed the IP Schema for the DEV environment. He worked with the Networking group to connect the firepower to an outside internet connection, developed, configured and installed the development lab network configuration to include a VPN with NSA approved cryptography and appropriate VLANs on the Cisco Switch. He updated all of the firmware on the networking and server hardware, and finally installed VMWare ESXi and Vcenter on the DELL R750.

Mr. Malroy also developed two server baselines, one for the headless RHEL 8.x servers and one for the RHEL 8.x GUI workstations. These two baselines were carefully STIGged to comply with the NIST RMF SP 800-53 REV4 processes, controls and guidelines.

With regards to the headless server VMs, Mr. Malroy implemented RHEL 8.x NTP, DNS, DNSSEC, TSIG, the installation and configuring of Apache, the installation and configuring of an encrypted RHEL 8.x Syslog server, the installation of the Rhel Identity Management (ldap) solution, an NFS server, the ACAS Security Center application as well as the ACAS Nessus Scanners, and a VEEAM Backup system. Mr. Malroy also developed an update process whereby Linux Servers were updated by a local RHEL 8.x update repository instead of all the servers independently accessing the internet for updates. This process conserves outbound internet traffic.

Mr. Malroy built and configured the GNOME GUI Based RHEL 8.x workstations with NiFI, JBOSS, Perl 2.x, and Perl 3.x, and Java JDK 1.8 for use by the developers for coding. Access to these workstations within the development environment was done by installing and running Cisco Secure Connect (AnyConnect) on a remote laptop using IPSEC and RDPing into the Development environment with xRDP.

Mr. Malroy developed the instructions to install and configure Cisco Secure connect on the laptop with IPSEC activated per NSA guidelines.

Mr. Malroy also architected the Test Lab and racked all servers into a 42U rack and is in the process of implementing much of the same infrastructure as the DEV environment (without the VPN and remote access) with an additional installation and configuration of flow control VMs, specialized coded software, and a CDS system to replicate the production system.He also developed the IP Schema for the Test Lab.

Technical Senior Network / Systems Engineer / Architect, Department of State and US Army Pacific Command, Fort Shafter and Schofield Barracks, Hawaii, USA, Apriva LLC, Commercial Solutions for Classified (CSfC) Technical Systems SME, 12/1/2021 to Present

Focus areas include: Implementation of the NSA approved CSfC technical construct to assist in world-wide communications for various government agencies. Systems Engineering, Technical Systems Architect / Engineer

Mr. Malroy provided on-site and remote support for various government entities to assist them with construction and installation of the NSA approved CDS/CSfC solution that provided a strategy to quickly deliver secure cybersecurity solutions that leverage commercial technologies and products to the customer (i.e. government agency). Mr. Malroy’s role was to implement this system. It is set up in three zones with networking equipment and servers within each zone. It also uses a complex double nested VPN arrangement for classified communications between the zones. As part of the systems team, Mr. Malroy led and assisted the team in architecting, racking, and installing Dell 650/450/240 or Cisco UCS C220 M5 servers as well as install networking equipment to include Aruba / Mesa /Cisco ASA VPNs, Cisco 9300 switches, and Cisco Firepower firewall devices. Mr. Malroy led and assisted in developing the architecture and implementation of the IP Schema, VMWare (ESXi and Vcenter) virtual environment, installing Windows and RHEL 8.x Linux Servers on VM’s within each zone, installing various appliance products such as NetMRI, Cisco ISE TACAS, ACAS Security Center application as well as the ACAS Scanners, and a VEEAM Backup system to include the configuration for backups within MS SQL Server to properly backup the databases. Mr. Malroy also installs ESS (formerly HBSS) and configures ENS, DXL, Policy Auditor, and the Rogue Detection system within an ePO 5.10 environment on 2 of the zones. Additionally, Mr. Malroy implemented RHEL 8.x CRLDP, NTP, DNS, DNSSEC, TSIG, the installation and configuring of Apache, and installation and configuring of encrypted RHEL 8.x Syslog Servers for all three zones. Mr. Malroy is also directly involved in leading the team in STIGging all of the Server and component devices (i.e. MS SQL Server, Apache) excluding the networking part of the system.

Mr. Malroy also develops documentation to include installation documentation for RHEL 8.x and Windows 2019 or Windows 10 installation steps, installation checklists, and the development of punchout lists for monitoring installation progress.

Mr. Malroy was also solely involved in the architecture and implementation of the end user device (EUD) at the Department of State that consisted of a multi-vpn laptop or multi vpn Samsung phone that communicated through the three zones. The technologies used were Windows 10 Pro / Hyper-V for the laptops and Samsung Enterprise Mobility Management (EMM), the Key License Manager (KLM), as well as Fluid Mobility (FM) products for assisting the phone in communicating through the three zones.

McAfee Cyber Security Engineer (SME), NAVAir, Sandia Labs, Defense Health Agency, HII NNS (On-Site and Remote) and others, McAfee LLC, Cyber Security Engineer, 1/5/2021 to 11/30/2021

Focus areas include: McAfee Cyber Security Engineer for various government and corporate organizations to assist with installation of the McAfee ePO 5.10 platform 5 and deployment of various product installations, System Engineering, Technical Security Engineer

Provided on-site and remote support for various government and corporate organizations to assist them with installation and configuration of ePO, the deployment of purchased McAfee products, and engineering support to ensure McAfee best practices are followed within the ePO environment. Products deployments included McAfee ENS 10.7, McAfee Application Control, McAfee DLP, McAfee Drive encryption, PA, RSD, TIE/DXL and ePO Agent. Mr. Malroy also assisted in ensuring the health of the ePO environment and verified the ePO system was running at optimum capacity. He guided the client in making appropriate fixes to their product deployments, dashboards, queries, reports, policies, tags, client tasks, and server tasks to obtain a satisfactory result. Products were deployed to Windows, Macintosh and Linux systems. Mr. Malroy also assisted a client in a specialized stand-alone ePO build and completely configured the build onto a Linux KVM and VMWare ESXI hypervisor environment.

Mr Malroy also developed documentation for many of the ePO installations or client deployments to ensure repeatability when the ePO installation or product deployment needed to be performed again by local support.

Mr. Malroy also assisted clients in Windows Server and SQL Server performance troubleshooting when issues arose that affected the performance of ePO 5.10.

McAfee Cyber Security Engineer (SME), Veteran’s Administration, Washington, DC (Remote), McAfee LLC, Cyber Security Engineer, 10/16/2017 to 1/4/2021

Focus areas include: Cyber Security Engineer for Veterans administration on the McAfee ePO platform 5.9 and 5.10, VSE 8.8 up to P14, HIPS 8.0 up to P14 and ENS 10.6 and 10.7 November 2020 Update, System Engineering, Technical Security Engineer

Provided support for the Veterans Administration using the McAfee ePolicy Orchestrator (ePO) platform. This support included management of 600,000 workstations with ePO. Duties included the management and monitoring of three ePO clustered environments, configuration and maintenance of Agent handlers, and SuperAgent Distributed Repositories (SADR), DAT and Amcore distributions across the VA Enterprise environment, configuration, running queries and reports, building and maintenance of server tasks, creating Tags and Tag deployment, Policies and Policy assignment rules, ePO account management, 2FA of user logins with OCSP and CRL configurations and management, building and monitoring of server tasks, building and monitoring of client tasks, deployment of the McAfee Agent, troubleshooting Agent problems, team member for the migration of ePO from an on-prem environment to an AWS cloud environment for all 600,000 endpoints, the team member for the migration from VSE to ENS for all 600,000 plus endpoint. Troubleshooting all aspects of the ePO environment for Windows, Linux and Mac endpoint as well as ePO/MS SQL server latency or performance issues.

Mr. Malroy was also involved in the monthly patching of the on-Prem ePO clustered server environment with Windows updates, Hot Fixes and assisting the Windows team when necessary to fix Windows Server related issues. Mr. Malroy also developed the plan for the management of the McAfee Application Control component of ePO to include deployment plans and App control policy configuration. Later, he was solely responsible for the continued maintenance and management of the Application control component of ePO.

Information Technology Security Engineering, US Army, Crystal City, VA, Spider Strategies, Cyber Security Engineer, 05/02/2016 to 10/11/2017

Focus areas include: Cyber Security Engineer for US Army on military web application, System Engineering, Technical Security Engineer

Provided support for the US Army on a web application called Strategic Management System (SMS). This application allowed US Army components to measure Army organizational metrics of their choosing. My role consisted of Windows 2008 R2 and Windows 2012 R2 technical system engineering support, HBSS (McAfee) technical engineering support, Microsoft SCCM technical engineering support, Cyber security scans on the servers using HBSS, SCAP and ACAS scanning tools, and vulnerability mitigation on the SMS web servers for both the NIPRNET and SIPRNET environments. I also was the sole person responsible for the importing of vulnerability scan results into an Army application called eMASS to monitor the mitigation progress of any vulnerability findings for all SMS Servers on NIPRNET and SIPRNET environments. I was also solely responsible for obtaining the Security accreditation and Authority to Operate approval (ATO) of the SMS system for both NIPRNET and SIPRNET environments. I led the upgrade migration for Windows 2008 R2 to Windows 2012 R2 which included performance configuration, patch management, volume space management, COOP requirements, McAfee configuration requirements, Apache/Tomcat and Java configurations, and the cyber security hardening of all servers for the SMS environment on both SIPRNET and NIPRNET environments. Finally, I was the DBA for the MS SQL Server 2008 R2 database for the SMS application and led the migration from the use of MS SQL 2008 R2 to MS SQL Server 2012 SP3. I also was solely responsible for the performance monitoring of the DB, the performance configuration of the DB, space management, backup management and enforcing the use of Industry Best Practices for MS SQL 2008R2/2012SP3. Additional skills include review of ACAS and SCC (SCAP) scans for remediation of vulnerabilities on the SMS systems by loading STIG information into the scanner, verifying vulnerabilities, and preparing the fix for each particular vulnerability.

Information Technology Security Engineering, Fannie Mae, Reston, VA, CompSciPrep, Cyber Security Engineer, 05/04/2015 to 04/29/2016

Focus areas include: McAfee Security Engineer using ePO 4.6.8 and 4.6.9, and 5.3.1, VSE 8.8 P5, HIPS 8.0 P5, MA 4.8.0.1938 and DLP 9.3.200/500/600

Provided support for ePO 4.6.8 and 4.6.9 to include a review of the system to determine Best Practice Configuration issues, configuration of VSE and HIPS policy rules and led the development of all DLP 9.3.500 Device rules and Protection Rules (both E-mail and Web) used for Data Loss Prevention issues at Fannie Mae. Led the team in the design and implementation of converting DLP Rules from computer centric (assignment) rules to user centric (assignment) rules. Rules included limiting users from writing to USB thumb drives, CD/DVD Drives, Smart Phones and Cameras of different makes and models. Led the refinement of e-mail based rules and web posting rules to conform to Fannie Mae InfoSec Guidelines to include the storage of evidence files for specified rule triggers. Review Incident Logs and fine tuned to eliminate false positives and dual rule triggers. Developed Discover Rules to categorize and tag local user email. Configuration of the DLP Agent to resolve whitelisting issues, dual homed NIC issues on the ePO server and developed different DLP policies for customized workstation group configurations outside of the baseline.

Developed and configured various McAfee AV Scan Policies to include the development of Default, High, and Low risk scan policies with exclusions defined per industry best practices. Corrected a configuration issue to apply the McAfee Default HIPS content rules to all workstations in the environment for automated deployment of the HIPS content rules.

Developed queries and reports for VSE 8.8, HIPS 8.0 and DLP 9.3.600 for team and upper management review. Created server and client tasks to perform various server cleanup and tagging tasks as well as workstation deployment tasks.

Solely, developed and implemented the process to upgrade ePO 4.6.8 to 4.6.9, led the development and implementation to upgrade DLP 9.3.200 (Patch 2) to 9.3.500 (Patch 5), led the development to upgrade the AV scan engine from version 5700 to 5800, and was a team member for the development of the upgrade of the ePO system from ePO 4.6.9 to ePO 5.3.1. Additionally, he resolved incoming trouble tickets for McAfee related issues in the enterprise as well as updating the ePO 4.6.9 and 5.3.1 architecture documentation and the creation of VSE and DLP configuration documentation.

Information Technology Security Engineering, Veteran’s Administration, Martinsburg, WV, Booz Allen Hamilton, Associate, 12/01/2013 to 05/01/2015

Focus areas include: Team Lead for Internal Veterans Administration group working with network security devices,

Led the technical team that provided configuration support for Splunk, Palo Alto network security devices, Sourcefire devices, Cisco ASA devices, PathScan (a proprietary network scanning device) and continued to support the McAfee ePO 4.x and 5.x migration. Job functions included reviewing technical solutions for day to day and week to week security engineering problems, the implementation of PathScan (a network intrusion tracking system), the scheduling of CCB’s, planning, scheduling and managing maintenance upgrades as well as managing administration processes for onboarding and offboarding incoming or outgoing employees, and the review of ePO 5.1 policies for VSE 8.8 and HIPS 8.0.

Information Technology Security Engineering, Veteran’s Administration, Martinsburg, WV, Booz Allen Hamilton, Associate, 08/01/2013 to 12/01/2013

Focus areas include: MacAfee ePolicy Orchestrator 4.5, Host Intrusion Prevention (HIPS) 8.0, Tool Command Language (TCL)

Provided configuration support for McAfee ePO 4.5 in the writing and configuring of custom signatures and exceptions for the Deep Dive Analysis Team. This included creating policy rules and sub rules based on TCL that would monitor each host for suspicious behavior related to possible malware attacks on the local host. Areas of monitoring consisted of files, registry, hook, programs, services, Isapi (Http) and buffer overflow conditions. This was created in a test environment, configured as a policy and pushed out to the local hosts on the test network.

Information Technology System/Security Engineering, Veteran’s Administration, Falling Waters, WV, Booz Allen Hamilton, Associate, 10/01/2012 to 07/31/2013

Focus areas include: Windows System Administration Support, Tivoli Endpoint Management Support, Technical System Engineering, Windows 2008 R2 and SQL Server 2008 R2 support, Configuration Management Support

Provided operational support for the Tivoli Endpoint Management (TEM) suite of applications to include the Tivoli Endpoint Management console and Tivoli Remote Control. Duties included monitoring a 400,000 user enterprise network using canned and customized queries within the Tivoli Framework, the development of “fixlets”, tasks, and analysis scripts to configure/update/patch systems on the enterprise using the Relevance language, the use of TEM to find software/hardware vulnerabilities on the network, the deployment of Fortify software on specified workstations on the network, and the development of deployment fixlets to assist with the baselining of OSX based Macintosh computer’s on the network. I also conducted the performance monitoring of SQL Server 2008 R2, maintenance of the Windows 2008 R2 VM systems and the ad hoc assistance of regional administrators for Tier III support. This

Information Technology System Engineering, Treasury Department, Washington, DC, Booz Allen Hamilton, Associate, 04/06/2012 to 09/30/2012

Focus areas include: Windows System Administration Support, VMWare Administration, Technical System Engineering, SQL Server support, Configuration Management Support

Provided system administrator support for a small enterprise user network. Duties included Windows Server 2008 R2 administration, management of VMWare virtual machines to include creating and deleting VM’s, managing and configuring the VMWare environment, Adding, deleting, and expanding LUN’s and VMAX storage, installation and management of analytical software in a single user or network mode, troubleshooting Windows server and workstation OS issues as needed, assisting as an MS SQL DBA to include backups, and hardening of the SQL Server, technical documentation creation, and the development of a managed file transfer environment.

Information Technology System Engineering, Veteran’s Administration Network Security Operations Center (NSOC), Martinsburg, WV, Booz Allen Hamilton, Associate, 06/06/2010 to 04/05/2012.

Focus areas include: Management of HBSS /ePO4.0/4.5 Administration support, Technical System Engineering, Vulnerability Management and Assessment, Configuration Management Support, Help Desk Support

Provided System Administrator/Network Engineering support for a 300,000 plus enterprise user network. Duties included the use of the HBSS/ePO 4.0 to monitor approximately 381,000 devices on the network, the configuration and management of 5 regional ePO “core” servers, 5 regional ePO “core” backup servers and the monitoring of 206 repository servers. Mr. Malroy was also involved in an advisory board for the upgrade of ePO 4.0 to ePO 4.5. Mr. Malroy also installed, configured and managed the subcomponents of ePO 4.0 and 4.5 to include the client agent (version 4.0 and 4.5), VirusScan 8.5/8.7 (VSE) and Host Intrusion Prevention System 7.0 (HIPS). Additionally, Mr. Malroy worked with the installation, configuration and deployment of the ePO agent, VSE 8.7 and HIPS 7.1 for RedHat Linux and the scripting of the scan and updating of the virus definitions for Sun Solaris. Mr. Malroy was also involved in the configuration and update of the IBM Proventia GX 5000 and GX5108 IPS devices, setting policy parameters, adjusting firewall settings, updating XPU versions, and troubleshooting security events recorded on these devices throughout the Veterans Administration (VA) network. Mr. Malroy also configured a VMWare Lab environment and set networking configuration parameters on the approximate 26 VM Servers located in this lab environment.

Information Technology System Engineering, FBI/Cryptologic and Electronic Analysis Unit (CEAU), Quantico Marine Corp Base, Booz Allen Hamilton, Associate, 02/12/2010 to 06/03/2011.

Focus areas include: Lead Night System Administration support, Technical System Engineering, Network Engineering Support, Vulnerability Management, Configuration Management Support, Help Desk Support

Provided night lead System Administrator/Network Engineering support for a 70 user network. Duties included the use of the Windows 2003 / XP OS, Active Directory (AD), configuration of the AD Group Policy Objects, configuration of Dynamic Host Control Protocol (DHCP) and Domain Name Service (DNS), configuration of port security on the 2950, 3550, and 2750 series switches, Exchange 2003 Administration, the installation of SCCM 2007 R2, the development of scripts that assist in patching vulnerabilities, largely responsible for the mitigation of approximately 12,000 Information Assurance (IA) vulnerabilities in about a 45 day time period, the configuration and monitoring of two Cisco 2800 routers, the development of an automated workstation software baseline installation process, workstation builds with the previously mentioned build process, ad hoc support for various trouble tickets, resolving ad hoc network and server issues, documentation for technical processes, and the use, configuration, and repair of the following hardware platforms: Dell workstations (various models), Dell Poweredge (rackmounted) 850's, 1750's, 2850's, Cisco 2800 series routers and 2950, 3550, and 2750 series switches and finally he is familiar with the installation, configuration and use of VMWare’s vSphere/ESX environment. Additionally, he was instrumental and successful in recommending the client purchase Microsoft SCCM 2007 R2, a network management tool that enables a granular view of network resources, patch management, and imaging technologies.

Certification and Accreditation, Information Technology, Key West, Florida, Booz Allen Hamilton, Associate, 06/02/2009 to 02/12/2010.

Focus areas include: Vulnerability Management, Information Technology

Assisted as the ADNET technical representative and Information Assurance Security Officer (IASO) responsible for providing support for the Joint Inter Agency Task Force – South in resolving the IA vulnerability threats from their NIPRNET and SIPRNET networks in advance of a JIATF-S yearly Defense Information Systems Agency (DISA) security inspection. Scanning tools used to find vulnerabilities included Gold Disk (June 2009 edition) and the Retina Scan Engine. The results of these scans were uploaded into VMS for review and categorization. Analysis of the data allowed Mr. Malroy to prioritize the order of vulnerability mitigation. The tool used to help mitigate the vulnerabilities found on workstations and servers was Microsoft’s Systems Center Configuration Manager 2007 (SCCM 2007). Activities performed with this tool were the creation of scripts to push out software or edit registry settings per VMS or Retina Scan recommendations, the deployment of a remotely delivered operating system build with no CAT I or CAT II findings, a hardware and software inventorying system used to find systems with out of date software. Additional duties included assistance in helping JIATF-S troubleshoot their internal GPO settings, AD structure, DNS settings, DHCP settings and WINS settings. Finally, Mr. Malroy assisted the JIATF-S J-63 troubleshoot network switch settings which were causing problems with workstation machines inability to configure IP settings and communicate on the network.

Network/System Engineer, Pentagon, Wash., D.C., Booz Allen Hamilton, Inc., Associate, 2/2009 to 05//2009.

Focus areas include: Certification and Accreditation, System Engineering, Network Engineering, and Software Development

Assisted as the Joint Staff J1 technical representative for any network or computer operating system related issues for a web application called electronic Joint Manpower and Personnel System (eJMAPS). The J1 has the web applications located at the Pentagon within the Joint Staff and Mr. Malroy responsibilities include managing the technical computer OS, hardware and networking issues on a daily basis. He is involved in technically assisting the JS/J1 in the development of the Peoplesoft web application called eJMAPS. His duties also include performing Certification and Accreditation (C&A) work on all of the servers as the IASO, performing Retina and Gold Disk scans, assessing the scan information for true CAT I, II and III vulnerabilities by eliminating false positives, installing patches, updating the Vulnerability Management System (VMS), creating a Plan of Actions and Milestones (POAM), documenting the Authority to Operate (ATO) for future versions of eJMAPS and submitting the eJMAPS/COGNOS results into eMASS for final ATO approval.

Network/System Engineer, Information Assurance, Certificate and Accreditation, Pentagon, Wash., D.C., Booz Allen Hamilton, Inc., Associate, 9/2008 to 2/2009.

Focus areas include: Vulnerability Management, Technical Writing, and Technical Analysis

Assisted the Office of the Chief Information Officer (OCIO) at the Pentagon with their HBSS deployment. The core of the HBSS product was McAfee Antivirus 8.5i. Mr. Malroy’s primary responsibility was documenting the functionality and architecture of the system, developing the HBSS



Contact this candidate