Post Job Free
Sign in

Seasoned Cyber Security Engineer DC Availability Now

Location:
Washington, DC
Salary:
100K
Posted:
February 24, 2026

Contact this candidate

Resume:

Sampson L Esho

*** ********** ******, **. *********: (202} 655 0838

Washington, DC 20019 Email: ******@*****.***

Summary

• Several years of professional experiences both in military and private sectors

• Strong knowledge of military base computer security implementation and administration

• Security Engineering Knowledge: Use of Auditing Processes, Network Security Concept/Topology, Firewalls, IDS/IPS, Proxy Gateway to provide in depth line defense against, Cyber Security Threats, Internal Malicious Attack, Data-Packet Theft/Loss and other various Network Vulnerability.

• Strong knowledge of Cisco Firewalls, Routers, Switches (Cisco ASA& Skybox) and implementation of complex gateway policies that employs NAT, PAT and NIPS/NIDS Hardening.

• Enterprise Security Policy knowledge, Malware Detection, Web Filtering and Security best Practices.

• Advance knowledge of Routed/Routing Protocol; IS-IS, BGP, EIGRP, OSPF, RIP, MPLS, and VRF.

• Strong knowledge of network protocols such TCP/IP, IPX/SPX, HDLC, ATM/STM, SONNET, FDDI

• In-depth knowledge of VPNs that implement various tunneling protocols such as PPP, PPTP, L2TP.

• Knowledge of Microsoft Operating Systems such as Vistas, XP, WIN 7, WIN 10, NT, IIS Server.

• Strong SQL- Database Management and query support skills set, proficient in Unix/Linux and Novell

• Conversant with LAN, WAN and WLAN infrastructure Mgmt.{AD, DHCP, DNS,TACACS+, RADIUS}

• Strong knowledge of network installation, cabling, Telecommunication configuration and design.

• Ability to learn new technologies quickly and very skilled at troubleshooting network problems. Education

University of Maryland University College (UMUC), Adelphi, Maryland BSc. Degree - Computer Information Technology

Training and Certification

CompTIA Security+ (DHS) Certification

CompTIA Network+ (DHS) Certification

Clearance Level: NACI/SECRET CLEARABLE

HARDWARE/SOFTWARE

Operating Systems: WINS 10, NT, 2000 Server, IIS, Exchange Server, Red Hat Linux, Red Hat Linux, SUN Mandrake, Macintosh OS X

Programming Language: QBasic - Program Design, Flow Chart, Coding, Debugging & Testing Databases: Database Management (SQL- Data Modeling, Normalization Repository, Case-tooling) Hardware: Cisco Firewalls (Cisco ASA& Skybox) Cisco 12000, 10000, 7500, 3600, 2800, 2600, & 2500 Cisco Routers; Cisco 6500, 5000, 1900 3550 & 2950. Avaya switches; OC192 to DS0 Experience

Rotika Systems & Communications Systems Security Specialist Jan 2011 – Present Bladensburg Rd, MD

• Resolved client’s network technical issues that range from host base Hardware/Software conflict, configured, resolved and managed policy updates on network routers, switches and firewalls.

• Handled deploring of software patches review log files to detect abnormalities on the network traffic and occasionally run vulnerability test in accordance to Network Manager Directives or Instruction.

• Monitored NIPS (Anti-Malware)/NIDS (Net-Flow Monitoring tool) and validate network baseline security requirements for the Network.

• Implemented LAN/WAN policies and procedures in conformity to Network Systems Security Best Practices as established by the NIST standard.

• Assisted in training other developmental staff and provided technical advice to the end user in areas such as data mapping, data clean-up, test scripts, quality control and network security awareness United States Army/WTC MODS Health-System Analyst Jun 2006 – Dec 2010 Falls Church, VA

• Served as technical expert for Warrior Transition Command; charged to resolve complex technical issues with Medical Operational Data Systems and IT infrastructures.

• Responsible for implementing Security Parameters for the “Warrior Transition Module” in MODS. Tasked to grant, revoke and control access to the system in order to protect integrity the system’s data.

• Configured and upgraded firewalls, add/delete rules, analyze logs and implement server management for optimization, redundancy and throughput.

• Maintained and utilized SIEM to protect, monitor and decode network security lapses. Familiar with various security software tools such as Lan-Cope Stealth-Watch System, Fore-Scout NAC, Retina CS, Symantec Enterprise, and Cisco Advanced Malware Protection (AMP).

• Ensured that MODS interfaces and synchronizes with other Armed Forces Medical Systems for correlation, query, and display. Develop and implement end users training metrics/program for the OTSG Staffs and Regional Medical Command.

US Department of Defense/Contractor System Network Analyst Apr 2004 – May 2006 Washington, DC

• Managed, supervised and support the DCA for all Hospital Network Systems.

• Developed and implemented programs to ensure that systems, network and data users understand and adhere to systems security policies and procedures. Add and delete users on the network access log.

• Duties also includes; planning and implementing network security, configuring firewalls (Check-Point, Cisco ASA, Skybox) and applying cryptography measures as necessary for the DCA office.

• Implemented network security program that entails intrusion detection systems, authentication mechanisms, encryption technologies and networking protocols including SMTP, TCP/IP and SNMP. US Army Hospital (USAH) System/Admin Specialist Oct 2002 – Mar 2004 Washington, DC

• Served as members of the IT crew at the Walter-reed Army medical center to upgrade the old legacy patient data tracking system to the new and update patient data tracking technology.

• Performed patients file analysis to determine which data is critical, less critical and order of priority.

• Managed host security, file permissions, backup and disaster recovery plans.

• Performed data analysis and design.

US Army/DC-ARNG (DPERS) System/Admin Technician Oct 2000 – Sep 2002 Washington, DC.

• Tracked and resolved trouble ticket, interacting with upper-level technician and end-user. Collection documentation and researching for quality improvement.

• Updated personnel records into the system, used systems capacity in researching/ developing data and reports requested by superior officer.

• Acted in a liaison capacity to superior's subordinates to minimize demand on superior time.

• Established and maintained a wide variety of files for records, reports, correspondence and various technical data related to the activities of operations. DC-ARNG/Metro Police Dept Computer/Intelligent Analyst Nov 1999 – Sep 2000 Washington, DC

• Computer Specialist in the Directorate of Information Management, assigned as military attaché with the Metropolitan Police Department for Joint Operation known as Counter-Drug

• Functioned as INFO Tech (25B) and Admin Specialist (42A) for critical mission assignments.

• Responsible for the mission Systems Network Access Control (NAC) management: Configure, deploy and administer NAC system. Refine device classification and clarification.

• VPN Firewalls: Configure and maintain, add rules, add routers, maintain SSL certificates.

• Endpoint Control: Trained and promote awareness of technical security issues, plugged loopholes by deploying security patches, running Enterprise Anti-Virus, and intermittently severe access privileges. Army National Guard Computer System Specialist Aug 1996 – Sep 1999 Fredericksburg, Virginia

• Troubleshoot and install computer hardware and software

• Coordinated and performed threat analysis risk management, configuration management, business continuity and contingency planning for sustainability of existing systems

• Ensured implementation of appropriate systems security policies, and ensure the rigorous application of information security/information assurance policies, principles and practices in the delivery of all Information Technology (IT) services.

.



Contact this candidate