Edward R. Tate
MCSE, CCNP, CCIE Written
*********@*****.***
202-***-**** (Cell)
Executive Summary:
I have over 25 years of experience in network engineering. I achieved the following network engineering certifications during the span of my career: CCNA, CCNP, and CCIE Written Certification. I also acquired my MCSE, Microsoft systems engineering certification. I have gathered extensive experience over the years in Infrastructure & WAN design, Cloud Networking, testing, deployment and management. My expertise and experience extend to both the telecom and enterprise arenas.
I have been engaged in Project Management for over 10 years. I am currently studying for my PMP certification. As an Infrastructure Technical Project Manager for LANs, SANs, and WANs. I have managed projects entire life cycles and authored Project Charters, Project Plans, Design & Testing Documents, Project Schedule (MS Projects) and Close-out/Lessons Learned Document and daily and weekly status update reports.
Summary of Technical Expertise:
Network Protocols and Technologies:
OSPF, BGP, IS-IS, RIP, IGRP/EIGRP, HSRP, VRRP, AAA, TACACS, RADIUS, ACL, IP Sec, GRE, PPTP, PPP, HDLC, IRB, CRB, ISL, 802.1q, ATM, Frame Relay, Sonet, OC3, OC12, OC 48, T1/DS1, T3/DS3, ISDN, 10/100/1000BaseX, FDDI, 802.11b, 802.11a, WEP, DES, 3DES, PGP, NAT, IKE, IPv6, NAC, Port Security, MPLS, DMVPN
Wi-Fi Equipment
Bellaire indoor 20E and outdoor SN100, Cisco LNS to terminate L2TP for Bellaire APs, Ruckus AP 7363), Ruckus ZD5000, Ruckus FlexMaster NMS, Cisco AP 1552C, Cisco Controller5500, Cisco 4990 M aggregation switch, Cisco ASR1000 B-RAS, Cisco ASR100 (Wi-Fi NAT Router). Alcatel-Lucent SR-12 7750 Service Router, Arris Dory AP Device, BENU Meg 100 Service Router, Cisco 6500, Cisco ASR 1000, Belarie AP indoor 20E and outdoor SN100
Network Equipment:
Cisco routers (25xx, 26xx, 36xx, 38xx 45xx, AS53xx, 72xx, 75xx, 12xxx series), Catalyst (29xx, 35xx, 37xx, 45xx 55xx, 65xx series), Foundry, Juniper M5/M20/M40, Lucent Max TNT, Lucent APX 8000, Ascend DSLAMS, FORE ATM SWITCHES, F5 LB BIG/IP, Adtran CSU/DSU, Linksys Etherfast Router,
VTC & Webcast Equipment
Cisco IPVC MCU, Tandberg 880, Tandberg Codian MCU, LifeSize Express, Niagara 2100 Encoders
Niagara Pro II, Windows Media Servers, Polycom RMX MCU, etc.
Cloud Networking & Next Generation Firewalls
Cisco FirePower, Check Point, Cisco ASA 55XX, Palo Alto, Juniper Firewalls, Fortinet Firewall. AWS, Azure and Google Cloud.
Network Management
Netcool, Cisco Works, Scrutinizer, E-Health, H-P Openview, ACE Live, SolarWinds, etc.
Operating Systems
Windows, Windows Server, RHEL 7,8, Apache Web Server
Education/Certifications & Training
Project Management Training: How to Be a Good Project Manager, How to Prepare for PMP Certification; How to Capture Lessons Learned, How to manage team conflict, How to Manage Daily Tasks, How to Prioritize Team Workload, How to Work Smarter not Harder, What is Project Managements Triple Constraints, Your Role as a Project Manager, Your Project Kickoff Checklist, Writing a Project Management Charter, Writing a Project Plan, Your Project Kickoff Checklist, What is Project Change Control?, The Top 5 People Management Skills, Managing Teams & Giving Feedback, How to Deliver a Great Presentation and more…
AWS Official Solutions Architect-Associate Training: EC2, Cloudwatch, RDS, Route 53, Cloudfront, Networking Services, VPC, Security Groups, ACL, Elastic Container Services, Elastic Load Balancer, Auto Scaling, AMIs, EBS, Glacier, S3, Buckets
University: Strayer College (AA Degree Pending)
Computer Learning Center (4.0 GPA) /MCSE Diploma - 2000
Technical/Certifications: MCSE /Computer Learning Center
CCNP - 2004
CCIE Written – Preparing for CCIE Lab Certification
Preparing for AWS Cloud Certification (Solutions Architect) – 3/2021
Security Clearance: Active Top-Secret Clearance
Employment History:
GritironIt Washington, DC
Designation: Network Architect
Duration: August 2024 – Present
Team Lead for MDA Network Migration Project: Spearheaded the network migration initiative for the Missile Defense Agency (MDA), ensuring seamless transition planning, execution, and risk mitigation. Provided technical oversight and strategic direction to the migration team.
Network Discovery and Documentation: Led the documentation of network discovery processes and created comprehensive As-Is network architecture documents, providing critical insights for future-state planning and cloud migration strategies.
Telecommunications Service Order Management: Co-developed and managed the Telco Service Orders tracking system and cut sheets, streamlining the process for circuit provisioning, decommissioning, and service transitions.
DoD Cloud Migration Collaboration: Facilitated cross-agency collaboration calls with various Department of Defense (DoD) Defense Agencies and Field Activities (DAFA) to coordinate best practices, resolve migration challenges, and ensure adherence to cloud security and compliance frameworks.
Executive-Level Presentations and Reporting: Delivered summary presentations of network findings, assessments, and migration progress to senior management, ensuring informed decision-making and alignment with organizational objectives.
Agil3Tech – Department of State Washington, DC
Designation: Azure Cloud Network Engineer
Duration: February 2022 – August 2024
Serve as Senior Cloud Network Engineer/Project Manager supporting the INL migration efforts to the Azure cloud environment.
Served as Project Manager for DINs Standardization and Cyber Security Mitigations
Responsible for mitigating all cyber security vulnerabilities in the LAN and WAN for remote sites.
Responsible for the standardization of all remotes sites to be migrated to the cloud.
I am responsible for mitigating all the cyber security vulnerabilities found in the network.
Perform network configuration audits of all remote sites’ firewalls, routers, switches & WLAN.
Developed a DINs Cyber Security Compliance Matrix to clearly identify the vulnerability areas and issues.
Configured static routing, OSPF, EIGRP, BGP, VPNs, installed certificates for SSL Proxy and Decryption, etc.
Performed site survey to confirm the physical conditions of the environments.
Responsible for confirming all network gear warranties and support contracts.
Hosted and conducted weekly meetings to verify progress of cyber security mitigation efforts.
Consulted with foreign vendors regarding the statement of work.
Developed the SOW for scope of work to mitigate security gaps in the environment.
Created a central repository for all remote sites diagrams, configurations, warranties and inventories.
Developed a change control process for INL DIN changes, updates and deletes.
Developed a WLAN DIN compliance checklist for all remote sites,
Conducted audits of the WLAN infrastructure for remote sites,
Brought all remotes sites up to the INL cyber security standards.
Decommissioned EOL equipment from INL Headquarters site.
Designed, procured and configured INL WLAN infrastructure using Palo Alto, Dell Switch & Cisco Aps.
Utilize Palo Alto Panorama to manage multiple firewalls supporting various enclaves, template configuration and deployment to multiple firewalls, Policy Rule Analysis to avoid conflicts, overlaps and outdated rules, device group management, log analysis of aggregated devices, software updates and management, etc.
Perform daily Palo Alto administrative duties.
Lead the migration of ASA to Palo Alto firewall migration
Confirmed and audited ASA site configurations.
Managed the INL DIN WAN environment and oversee the management of the remote site DIN WAN environment.
Interface with Telco and Telco NOCs,
Maintained production environment with maximum uptime and minimizing negative customer impact by ensuring optimal performance of the network, to include the monitoring and management of data traffic and load.
Completed ongoing daily network administration tasks, such as password reset, user management, system file management, and server management.
Executed network implementation projects, as assigned.
Updated and maintained system documentation as changes occur, including installation configurations and wiring for local and remote locations.
Installed and updates network equipment, including new hardware from in-box to production in rack, network cabling, network components, and patches as required.
Updated system software as revisions are due or new software is required.
Provided switch, router, and VLAN administration, configurations, and firmware upgrades.
Administered all aspects of router design and edge router management, and schedule upgrades and maintenance regularly.
Works general operations and maintenance activities on the customer’s WAN/LAN/WLAN during maintenance hours.
Maintains integrity of the Data Center and re-built the DIN WLAN infrastructure located in various locations.
Produced accurate, appropriately concise, and timely network analysis and reporting, including ad hoc queries.
Provided support and advice to management and staff to build risk awareness initiatives within INL.
Provided technical support by evaluating and resolving network problems in the Data Center and other locations.
Developed relationships with Department of State (DoS), Information Resource Management (IRM), Diplomatic Security (DS) and INL regional, global, and functional program offices in support of network enterprise support for the INL Bureau.
Interacted positively and worked cooperatively with IM team members and points of contact to accomplish assigned work in a timely and efficient manner. Takes proactive measures to improve the working environment and cultivate teamwork.
Communicated both in writing and verbally with all levels of management to elaborate on IT support issues in areas of responsibility. In the event of an emergency, notify the IT Support Team Leader, Senior IT Manager and/or the IM Director.
Complied with all regulatory internal controls and procedures to protect organizational integrity, and prevents unauthorized use or misappropriation of all classified and sensitive (but unclassified) material and equipment in assigned areas.
Resolvetech – GCSS Army Remote Work
Designation: Senior Network/Cloud Engineer
Duration: March 2021 – February 2022
Supported DOD SAP cloud migration project as the Lead Network Engineer/Liaison SME
Developed AWS Cloud Network Diagrams to support the network documentation & troubleshooting.
Configured and supported AWS VPCs for various enclaves (Dev, Sandbox, QAS, PRD, etc.)
Configured, supported and troubleshot Cisco firepower technologies, Threat prevention, Malware, URL Filtering, VPN AnyConnect, etc.
Configured and confirmed Security Groups access for EC2 instances in the AWS cloud.
Supported network testing from AWS over NIPR to on premises devices.
Configured and supported EC2 instances in the cloud.
Configured and supported Amazon Route53 DNS services.
Supported configuration and management of Transit Gateway routing issues.
Interfaced with the following protocols: SMTP, HTTPS, DNS, DHCP, BGP, OSPF. NCAT, tcpdump, netstat, ncat, nmap, etc.
Configured, troubleshot ASA & Palo Alto firewalls rules to allow traffic to various lines of business on specific ports.
Troubleshot network connection issues on Linux, Windows, routers, and switches.
Configured network & application load balancers for backend web and application servers.
Provide daily verbal updates and weekly status reports on progress of network connectivity for the cloud migration
.
Resolvetech, AESIP Remote Work
Designation: Senior Network/Cloud Engineer
Duration: October 2019 – February 2021
Supported DOD SAP cloud migration project as the Lead Network Engineer/Liaison SME.
Developed the DOP PPS processing for all servers and network connections being migrated to AWS.
Developed NS2 On-prem and AWS Cloud Network Diagrams to support the network documentation & troubleshooting.
Configured and supported AWS VPCs for various enclaves (Dev, Sandbox, QAS, PRD, etc.).
Configured and confirmed Security Groups access for EC2 instances in the AWS cloud.
Responsible for all NS2 network testing from AWS over NIPR to On Premises (Redstone Arsenal).
Configured, supported and troubleshot Cisco firepower technologies, Threat prevention, Malware, URL Filtering, VPN AnyConnect, etc.
Performed bandwidth and load capacity testing for network latency experienced over the NIPR.
Presented all network related change requests & migrations before the AESIP Change Control Board
Configured and supported EC2 instances in the cloud.
Configured Amazon Route53 DNS services.
Configured Cisco CSRs.
Troubleshot Transit Gateway routing issues.
Configured and supported BGP & OSPF on-premises devices
Interfaced with the following protocols: SMTP, HTTPS, DNS, DHCP, BGP, OSPF. NCAT, tcpdump, netstat, ncat, nmap, etc.
Utilize Palo Alto Panorama to manage multiple firewalls supporting various enclaves, template configuration and deployment to multiple firewalls, Policy Rule Analysis to avoid conflicts, overlaps and outdated rules, device group management, log analysis of aggregated devices, software updates and management, etc.
Configured, troubleshot ASA & Palo Alto firewalls rules to allow traffic to various lines of business on specific ports.
Configured, supported and troubleshot BGP and OSPF routing protocols.
Troubleshot network connection issues on Linux, Windows, routers, and switches.
Configure load balancers for backend web and application servers.
Configured IPSEC tunnels from on-premises to DOD NIPRnet and AWS Cloud
Provide weekly status reports on progress of network services cloud migration.
Defined workflow processes for managing tickets and Change Requests Process
Responsible for all network services Change Request and Incident tickets.
Eurofins Remote Work
Designation: Senior Network Engineer/Architect
Duration: September 2018 – September 2019
Daily operation, administration and management of LAN, WLAN and WAN infrastructure for more than 30 000 employees worldwide and company customers.
Utilized Service Now Ticketing system to document and track trouble tickets created.
Create appropriate documentation to ensure smooth transition of new technologies into production and the effective operational support of such technologies.
Installed, Configured, and maintained F5 load-balancers.
Configured F5 VIPs, Pools, Servers, health monitors, iRules, SNAT, static routing, performance optimization, etc.
Configured firewall policy and rules in the Palo Alto firewalls within the infrastructure.
Utilize Palo Alto Panorama to manage multiple firewalls supporting various enclaves, template configuration and deployment to multiple firewalls, Policy Rule Analysis to avoid conflicts, overlaps and outdated rules, device group management, log analysis of aggregated devices, software updates and management, etc.
Configured, supported and troubleshot Cisco firepower technologies, Threat prevention, Malware, URL Filtering, VPN AnyConnect, etc.
Configured and supported the SD-WAN solution for remote sites.
Effectively manage a global enterprise communication network, regularly monitoring its performance, functionality and capacity and making recommendations to constantly improve and align the environment to current requirements.
Provide escalated support as needed for the operations teams.
Execution of SOPs (Standard Operating Procedure) to ensure high-quality processes.
Serves as Senior Network Engineer/Architect to migrate new acquisitions to the Eurofins network.
Work with Site Senior Management, Facilities, and IT staff to resolve issues to transition networks.
Provide weekly status and progress reports to senior management of daily and weekly progress.
Produced a Site Transition Project Milestone Spreadsheet for senior management to track all tasks necessary for each site’s progress, challenges, and completions.
Attend weekly Covance & Eurofins meeting to support site transitions.
Perform network assessments and site survey of multiple remote sites slated for transition.
Attend Adhoc meetings requested upon demand to discuss site design progress, circuit ordering & testing and the obtainment of quotes for ordering new network equipment for new sites.
Design Visio logical and physical network topologies for newly acquired remote sites.
Unbox and configure all stacked routers and switches and firewalls for failover for each site.
Confirm that new routes were injected into the Data Center Core and advertised over ISPs MPLS circuits.
Configure NAT, S2S tunnels, Remote Access, Firewall Objects, SNMP, VLANS, LAGs, Trunks, & Allocated IP Space, etc.
Configure routers, switches and firewalls and access points and controllers for all the remote sites.
Provide site variable data to generate site specific network configurations for all devices.
Provide day-to-day support for all technical matters regarding the remote sites.
Perform site visit to Lancaster to configure equipment for onsite staging and deployment of new Eurofins network.
Complete RFCs for all the remote sites’ S2S network changes for the change control process
Encourage team meetings to be held to enhance team unity, success, and effectiveness for remote site network deployments.
Assist with telco circuit ordering, deployment, and testing.
Interface with Senior Level Management and Project Managers for daily and weekly progress meetings.
Provided weekly progress reports to Senior Management to highlight accomplishments and blockers.
ECS/NTSB Washington, DC
Designation: Senior Network Engineer
Duration: October 2017 – September 2018
ECS SUNet
Serve as Firewall and Network Engineer in support of SUNet with DoD policy and security requirements.
Support operations to manage all SUNet networking devices.
Utilized Service Now Ticketing system to document and track trouble tickets created.
Apply understanding of computer security, military system specifications, and Department of Defense Information Assurance (DoD IA) policies, in the execution of all aspects of the systems and their Cybersecurity posture.
Responsible for DoD Information Assurance Risk Management Framework (DIARMF), and the implementation of Cyber Security and IA boundary defense techniques and various IA-enabled appliances to facilitate certification and security of engineering tasks in support of SUNet.
Configured EC2, Cloudwatch, RDS, Route 53, Networking Services, Direct Connect, VPC, Security Groups, ACL, Elastic on AWS platform
Authored CONOPS document with project deployment details and detail network drawings
Developed project plan and WBS to detail the work-flow process for completing the project.
Architected and engineered the deployment of SolarWinds monitoring solution for SUNnet infrastructure environment.
Configure SNMP monitoring for router, switch, firewall, IPS, server and Hypervisor in the environment.
Configured and maintained F5 load-balancers.
Configured SD-WAN in lab for proof of concetp
Configured FortiGate as the external firewall for Rule and policies, NAT, etc. for multiple enclaves and zones.
Configured Palo Alto internal firewall for NAT, URL filtering, IPSEC, interfaces for multiple enclaves, etc.
Utilize Palo Alto Panorama to manage multiple firewalls supporting various enclaves, template configuration and deployment to multiple firewalls, Policy Rule Analysis to avoid conflicts, overlaps and outdated rules, device group management, log analysis of aggregated devices, software updates and management, etc.
Deployed SolarWinds agents to Windows and Linux servers. WMI was also used to monitor the servers.
Deployed & configured SolarWinds NPM, NCM, NTA and SAM modules for network and server monitoring for SUNet.
Setup monitoring for Routers, Switches, Servers, Firewalls, Terminal Servers, Hypervisors, IPS & IDS devices.
STIG devices based on DOD vulnerabilities and mitigation requirements.
POC for RedSeal vendor; Lead the POV concept for RedSeal risk management and network security compliance tool to maintain DoD compliance and minimize access attacks to the network.
Completed the AWS Solutions Architect vendor lead training.
POC for SkyBox vender: Lead the POV concept for FireMon for a Firewall Management tool and an infrastructure security tool to minimize access and DoD Compliance vulnerabilities.
Serve as project lead for SolarWinds deployment and RedSeal evaluation and implementation.
NTSB
Serve as Senior Network Engineer on Engineering Team to stand-up a new WAN infrastructure.
Cisco FTD 6.1 for multiple hubs to support WAN.
Configured OSPF routing for multiple areas to support WAN and Remote Site offices and remote users.
Configure BGP and redistribution into various VRFs and PE peering.
Interface with VMware virtual machines and vSphere
Configure LAG and trunk ports to support transport of multiple VRFs and VLANs.
Configure ShoreTel Director to support VOIP phones and infrastructure.
Utilized Infoblox & IPAM for IP Allocations and DNS reservations.
Used Infoblox to create DNS zone files.
Racked and stack the equipment for new WAN environment for staging and configuring the devices.
Upgraded the code on all the 3850 switches and 4431 routers.
Configured 3850 stack switches, FTD for HA in each region, configured the routers with multiple VRFs to support the various routing instances of each.
Configured the 4431 routers for BGP and OSPF routing and trunking multiple VRFs and VLANs.
Constructed the Boilerplate template for device lockdown configurations.
Supported NTSB enterprise and WAN using Checkpoint and Palo Alto Firewalls.
Configured Policy and pushed policies to firewalls.
Utilized SmartView Tracker
Configured IPSEC, HTTPS inspections, NAT, and firewall rules.
Serve as WLAN Engineer supporting the NTSB CIO office WLAN network for Employees and Guest access.
Configured the Cisco 1850 and 1830 mobility express controller and APs for the WLAN environment.
Converted APs from mobility express and CAPWAP modes.
Troubleshot ShoreTel VOIP phones, switches, and connections issues.
Supported the ShoreTel VOIP infrastructure.
Upgraded the code on 1850 controllers and access points.
Configured SPAN ports for AllienVault and Gigamon network security appliances.
Monitored Network traffic via Gigamon for security threats, attacks, and traffic anomalies.
Utilized Gigamon to capture Meta Data from network traffic.
Configured SNMP for the enterprise and WAN environment.
Configure, troubleshoot, and maintain the Remote Site Cisco Routers running MPLS.
Deployed SNMP using SolarWinds in the environment.
Configure, troubleshoot, and maintain LAN and remote sites.
Configure, troubleshoot, and maintain WLAN infrastructure.
Configure, troubleshoot, and deploy HP 2530 ProCurve L3 Switches
SCOM Remote Work
Designation: Network Manager/Senior PCI Engineer
Duration: February 2016 – September 2017 (Completed contract with multiple extensions)
Created a customized PCI Network diagram to document PCI data flows through various sites’ data centers.
Development, Design, and Implementation of new PCI DMZ zone.
Configured F5 VIPs, Pools, Servers, health monitors, iRules, SNAT, static routing, performance optimization, etc.
Installed, Configured, and maintained F5 load-balancers, Checkpoint Firewall, Brocade Switches, Cisco Switches, VPC, Trunking, LAGs in support of new DMZ.
Supported the migration of the virtual machines into the PCI DMZ zones.
Supported the migration for Checkpoint firewall rules and policies to New DMZ Checkpoint Firewall to support the PCI DMZ.
Supported the SD-WAN solutions for WAN environments.
Configured rules and policies for Checkpoint Firewall, Cisco ASA, and Palo Alto Firewalls
Mapped the DMVPN Hub & Spoke for documentation along with MPLS, Wireless, and VOIP circuits and data flows.
Detailed the firewalls, IDSs, IPSs, and F5 load balancers, UCS connectivity within each data center for PCI requirements.
Configured OSPF, BGP and MPLS to support the DMZ infrastructure.
Installed, Configured, and maintained F5 load-balancers.
Configured the 5k, 7k and 9k Nexus devices to support the DMZ and core network.
Configured and designed and troubleshot VPN solutions, IPSEC and DMVPN.
Hands-on Engineering and implementation of network infrastructure and PCI compliant network equipment.
Managed junior engineers to support the implementation phase of PCI audit mitigation process.
Managed and performed the scheduled PCI maintenance cutover from old to new PCI compliant equipment.
Provided daily and weekly update of progress and status of each site’s network diagram.
Responsible for project plan implementation and mitigation in multi-vendor environment for PCI audit standards.
Planed, designed, and implemented complex data communication systems and make recommendations for resources required to maintain and/or expand service levels.
Served as design engineer for design projects within Global networks division.
Provide guidance and assistance to Network Engineering & Management Teams.
NTG/CSRA Fairfax, VA
Designation: Network Manager/Firewall/Network Engineer
Duration: August 2016 – February 2017 (Completed the project before schedule)
Supervised 5 Network and Firewall Engineers.
Served as Senior Firewall and Senior Network Engineer to support and secure the CSR network.
Received requests from various program areas to open various and multiple ports for data access and transmission through the Palo Alto firewall. Utilized Panorama to support firewalls throughout the infrastructure.
Served as the POC (Network/Technical PM) for the Network Engineering team implementing changes for specific program areas.
Provided daily updates at daily stand-up meeting on status of all requests, changes and rule deletion to PMs and senior management.
Configured F5 VIPs, Pools, Servers, health monitors, iRules, SNAT, static routing, performance optimization, etc.
Configure Vulnerability and Spyware Protection for various networks and zones.
Enabled user IDs for junior engineers and installed security certificates.
Configures SSL VPNs for user and customer remote access.
Help train junior firewall and network engineers.
Configure, troubleshot, and maintained F5 load balancers.
Configured default routes and DNS.
Confirmed routes, VLANS and port within the Brocade UCS fabric.
Configure and troubleshot Brocade routers and switches for VLANs, OSPF and BGP, etc.
Manage projects and special assignments via requests from supported program areas and Project Managers.
Firewall requests were for a newly designed network that required: NAT, URL Filtering, DHCP services, HTTPS inspections.
Configured DMZ Server Access for inside and outside networks.
African American Music Association Washington, DC
Designation: Senior Network Engineer/Project Manager
Duration: October 2014 – February 2016 (Organization Dissolved for Lack of Funding)
As Executive Director, I managed 4 employees and 20 volunteers for IT technical and community projects.
Hands-on Engineering and implementation of network infrastructure.
LAN and WAN management for routers, switches, and firewalls.
Configure routers, switches, firewalls, wireless access points.
Liaison for ISP turn-up and circuit troubleshooting.
Managed & configured ASA firewall for port blocking, Remote Access, VPN, NAT, and basic firewall rules creation.
Configured OSPF, Spanning-tree, LAG, MPLS, VPN site-to-site tunnels, VPN Remote Access.
Renumbered the network and developed Visio drawing of network topology.
Troubleshot network and firewalls for outages, latency, and optimization.
Performed network device inventory management.
Maintained IP allocation spreadsheet.
Served as the Executive Director.
Senior Project Manager utilizing PMBOK standards for best practices.
Staff management and augmentation and recruiting.
Board of Directors recruitment.
Event Planning and Management.
Organizational and Program Presentations.
Managed Active Directory.
Organizational branding, development, and reorganization.
Strategic Planning and Execution.
VisionIT/EGS-NCO Remote Work
Designation: Senior Network Engineer/Senior PCI Engineer
Duration: April 2014 – October 2014 (Completed Contract Term)
Responsible for managing over 10 Network Engineers to mitigate the EGS/NCO Global Network for PCI compliance.
Hands-on Engineering and implementation of network infrastructure and PCI compliant network equipment.
Configured F5 VIPs, Pools, Servers, health monitors, iRules, SNAT, static routing, performance optimization, etc.
Plan, design, and implement data network systems and provide remote support for Client's global data network end user.
Managed junior engineers to support the implementation phase of PCI audit mitigation process.
Managed and performed the scheduled PCI maintenance cutover from old to new PCI compliant equipment.
Represented configurations changes requirements at CAB (change control board).
Tracked and verified completion of Service Now tickets for CAB review for junior engineers.
Organized and manage team and management meetings.
Provided daily weekly update of Master PCI Milestone Spreadsheet with status of each site.
Responsible for project plan implementation and mitigation in multi-vendor environment or PCI audit standards.
Plan, design, and implement complex data communication systems and make recommendations for resources required to maintain and/or expand service levels.
Configure, troubleshot, and maintained F5 load balancers, health monitors, SNAT, pools, virtual servers, etc.
Responsible for complex configurations, testing and analysis of all network facilities, including, but not limited to Cisco routers, Catalyst switches,