Ian McLellan, Network Engineer
San Diego, CA, US, 571-***-****, ***.*.**********@*****.***
PROFILE
Cleared Network Engineer (TS/SCI) with over 6 years of hands-on experience managing up to six distinct network environments aboard U.S. Navy warships, ensuring secure, high-availability communications in mission-critical operations. Demonstrated expertise in maintaining and securing complex network infrastructures, leading cross-functional teams, and implementing cybersecurity best practices to meet DoD standards. Currently transitioning to the civilian workforce, bringing mission-tested technical proficiency, leadership, and a proven commitment to operational excellence. PROFESSIONAL REFERENCES - Michael Craft – Network Engineer, King Tech Inc.
210-***-**** - *****@********.***
Note: Network Engineer Lead I worked directly
underneath during installation of Network.
- Genesis Padilla – Information Systems Security
Manager, Chief, US Navy.
757-***-**** – *******.*******@*****.****.***
Note: Direct supervisor while in the United States Navy.
EMPLOYMENT HISTORY
2024 — 2025 April
Information Systems Watch Officer/Lead Network Security Vulnerability Technician, USS COMSTOCK (LSD-45) San Diego, CA
• Served as the Information Systems Watch Officer (ISWO), overseeing real-time network operations, coordinating fault isolation and response across multiple enclaves, and ensuring uninterrupted communications and cybersecurity posture during watch rotations.
• Oversaw the security, availability, and integrity of classified and unclassified Navy networks by managing real-time monitoring and ensuring uninterrupted communication for mission-critical operations.
• Supervised 13 technicians in the secure operation and maintenance of 65 servers, achieving zero cybersecurity incidents through strict enforcement of DoD policies and best practices. 2023 — 2024
Network Security Vulnerability Technician, USS COMSTOCK
(LSD-45) San Diego, CA
• Conducted regular vulnerability assessments using Nessus on RHEL systems, remediating all findings to enhance network security and maintain full compliance with DoD cybersecurity requirements.
• Resolved critical VMware infrastructure issues, including VSAN storage configuration, Veeam Backup integration, and virtual server recovery, ensuring continuous operations and data integrity.
• Partnered with off-site organizations to consolidate shared network resources and documentation, increasing troubleshooting efficiency and achieving a 100% service ticket resolution rate. 2022 — 2023
Senior System Administrator, USS COMSTOCK (LSD-45) San Diego, CA
• Developed and enforced a standardized maintenance schedule for network hardware and software, significantly improving system reliability and reducing unplanned downtime.
• Consolidated and archived technical troubleshooting procedures into a repository of 38 tailored support documents, streamlining on boarding and accelerating issue resolution across the IT team.
• Led systems analysis to identify potential failure points in firewall and proxy integration with off- site applications, improving overall system interoperability and resilience. 2019 — 2022 System Administrator, USS GETTYSBURG (CG-64) Norfolk, VA
• Managed and secured classified and unclassified Navy network environments, ensuring high- availability connectivity and mission-critical communications across multiple domains.
• Administered and integrated Active Directory within complex network architectures, enforcing Group Policy Objects (GPOs) and access controls in compliance with DoD cybersecurity standards.
• Maintained and monitored over 60 networked servers, leveraging VMWare, WSUS, and PowerShell to optimize performance, enhance network resilience, and ensure rapid disaster recovery. SKILLS Vulnerability Assessment & Virtualization & Infrastructure Remediation Security
Network Security & Monitoring Security Operations & Incident Response
System Hardening &
Compliance (STIG/RMF) Technical Leadership &
Documentation
TECHNICAL EXPERIENCE •Splunk, Firepower (Cisco), ISE (Cisco), WSA (Cisco) Used various network management applications to aggregate, monitor, and review for multiple applications, network traffic connectivity/bandwidth and enforcing NAC policies (RADIUS / 802.1x).
•IPv4, Subnetting, BGP, OSPF, EIGRP
Implemented use of common WAN/LAN Cisco routing protocols to connect tactical WAN networks utilizing the Automated Defense Network System (ADNS)
•Windows, Linux, and VMWare configuration and troubleshooting. Utilized VMware vCenter, VMware ESXi hypervisor, VSAN to integrate various cross-platform systems to include the following: Windows Server 2016, Windows 2012, RHEL 7 and IIS web applications.
•Experience with Kali Linux tools such as nMAP, TCPDump, WireShark Performed various in-lab penetration testing as part of CompTIA CySA+ course in efforts of Blue Team activities/tests.
• Strong foundational experience to various Risk Management Framework, associated security controls, and STIGs.
Familiar with ISO 27001, GDPR, NIST CSF, PCI DSS, OSSTMM and experienced in the integration of DISA STIGs regarding naval networks.
• Exposure to Authority to Operate (ATO) RMF compliance through analysis of security controls, risk assessments, and compliance along documentation.
•Working knowledge of Windows Server core elements (Domain Controller, Active Directory, Registry, GPO creation, DISM, SCCM)
•Knowledge of ACAS suite management, installation, upkeep, and troubleshooting.
CERTIFICATIONS CompTIA A+, CompTIA Network+, CompTIA Security+, CompTIA CySA+