Livecareer-Resume

Network Administrator Ii Information Systems Security Manager Resume Example

Love this resume?

By clicking Build Your Own Now, you agree to our Terms of Use and Privacy Policy

Jessica Claire
  • , , 100 Montgomery St. 10th Floor
  • Home: (555) 432-1000
  • Cell:
  • resumesample@example.com
Professional Summary

Highly trained individual knowledgeable in implementing effective security strategies that are compliant with government regulations. A resourceful Information Systems Security Manager with definitive leadership qualities and strong critical thinking and decision making skills. Successful at optimizing security standards, improving planning processes and managing systems implementation. Knowledgeable about disaster recovery planning, roadmapping and team development.

Skills
  • Structured cabling
  • Windows Server NT 4.0 through Server 2019
  • Windows 98 through Windows 8
  • OpenSuSe, Debian, Ubuntu, RedHat, Fedora, CentOS, Solaris ZFS
  • vSphere 4 through 7.1, vCenter Server
  • MS Office (5.5 through Office 365)
  • CVS
  • Subversion (client and server )
  • Symantec Endpoint Protection
  • Veritas Backup Exec
  • Microsoft Exchange 2003 -2019
  • Microsoft Active Directory, DNS, DHCP, Azure
  • Cisco IOS
  • SSH
  • Cisco VPN
  • Freenas
  • Network Management, MS Active directory administration, policy and procedures, audits, work instructions, software license tracking, hardware inventory and tracking, metrics reporting, resource management and planning, patch management, system imaging, data backups, disaster recovery and business continuity
  • Operation and information security
  • Information security integration
  • Infrastructure development
Work History
Network Administrator II / Information Systems Security Manager, 03/2011 to 07/2021
Tucson Embedded Sytems, Inc.City, STATE,
  • Establish, document, implement, and monitor the IS security program to ensure compliance with requirements for the IS.
  • Identify and document unique local threats/vulnerabilities to the IS.
  • Responsible for periodic self-inspections of the facility's IS program, and any corrective action that needs to be taken, the development of facility procedures to govern marking, handling, controlling, removing, transporting, sanitizing, reusing, and destroying media and equipment containing classified information, implementing vendor supplied security-relevant features, detecting malicious code, viruses, and intruders.
  • Applied cybersecurity best practices to information system standards, directives and guidance for all personnel, monitoring compliance across organization.
  • Assessed security measures against government policies and regulations.
  • Oversaw user provisioning efforts, verifying credentialing policies, security and maintenance to encourage safe sign-ins.
  • Verified continuous update of systems and immediately patched vulnerabilities to prevent security issues.
  • Continuously monitored corporate networks and systems for various threats, including viruses, ransomware, cyber espionage and insider sabotage.
  • Monitored daily operations for accuracy of regulations, terms and conditions as well as policies and procedures.
  • Played key role in on-going network design, reevaluation and optimization to keep pace with company growth.
  • Analyzed network security and current infrastructure to assess areas in need of improvement and develop solutions.
  • Identified computer hardware and network system issues, performing troubleshooting techniques for remediation.
  • Guided implementation of company-wide enterprise security strategy for network and hardware, disaster recovery, data protection and endpoint protection.
  • Implemented and managed wireless devices, multi-site network infrastructure, business intelligence development and implementation.
  • Oversaw development and implementation of improvements to support and network operations.
  • Maintained network hardware and software, directed network security measures and monitored networks to maintain availability for system users.
Assistant / Information System Security Manager, 01/2004 to 02/2011
Tucson Embedded Systems, IncCity, STATE,
  • Configured networks for smooth, reliable operation to meet business processes and objectives.
  • Performed day-to-day LAN and WAN administration, maintenance and support.
  • Maintained network hardware and software and monitored network to support network availability to end users.
  • Rewrote and updated group policy with new domain move and domain level raise.
  • Provided planning for annual budgets to fund IT projects and controlled spending within budget.
  • Managed and maintained stability of network and wireless services throughout enterprise.
  • Verified continuity of computer and telephone system services for users through technical expertise, assistance and project coordination.
  • Planned, implemented and maintained wireless network strategy and operation.
  • Installed, configured, and supported local area network (LAN), wide area network (WAN) and Internet system.
  • Developed and refined build process and configurations, and contributed to network automation.
  • Planned, coordinated and implemented network security measures.
  • Constructed and maintained Virtual Local Area Network (VLAN).
  • Facilitated smooth network operations for 70 on-site users, and total of 97 users across 3 locations.
  • Introduced VMware infrastructure and management tools to create and manage virtual server computing environment.
  • Provided consistent support through on-call rotation duty.
  • Managed data backups and disaster recovery operations for 3 locations.
  • Backed up company data to distributed storage centers to avoid massive data loss in event of network breach or failure.
Assistant Manager / Computer Technician, 03/2000 to 01/2004
The Software FirmCity, STATE,
  • I provided software support & telephone based training for the SF Track program to Zep Manufacturing, This included PC troubleshooting, database management, software testing and documentation, monthly reports (metrics), media creation & control, call escalation.
  • Responded to support requests from end users and patiently walked individuals through basic troubleshooting tasks.
  • Explained technical information in clear terms to non-technical individuals to promote better understanding.
  • Followed up with clients to verify optimal customer satisfaction following support engagement and problem resolution.
  • Broke down and evaluated user problems, using test scripts, personal expertise and probing questions.
  • Patched software and installed new versions to eliminate security problems and protect data.
Education
Associate of Applied Science: Systems Administration and Networking, Expected in
Pima Community College - ,
GPA:
Affiliations

Member of NCMS since 2006

Certifications
  • CompTIA Network+
  • CompTIA A+
  • CompTIA Security +
  • Cisco CCNA
  • Vmware Vsphere
  • NISPOM

By clicking Build Your Own Now, you agree to our Terms of Use and Privacy Policy

Disclaimer
Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

How this resume score could be improved?

Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:

70Average

Resume Strength

  • Personalization
  • Strong Summary
  • Target Job

Resume Overview

School Attended
  • Pima Community College
Job Titles Held:
  • Network Administrator II / Information Systems Security Manager
  • Assistant / Information System Security Manager
  • Assistant Manager / Computer Technician
Degrees
  • Associate of Applied Science