Skilled, organized and an effective IT professional with 15 years of progressive experience in developing and implementing IT solutions to meet challenging needs and priorities at various organizational levels. Analytical problem-solver, able to quickly identify and troubleshoot technical challenges and maintain complex hardware and software systems.
Bachelor of Science:Information Systems SecurityAmerican Military University, Charles Town, West Virginia, United StatesInformation Systems Security
Active Top Secret/ SCI security clearance
Certified Personnel Security Specialist
Technical help desk experience
Programming and design skills
Strong analytical skills
Proficiency in TCP/IP protocols
Network asset management
Local remoter systems support
Excellent problem solving skills
Strong collaborative skills
Defense Security ServiceHanover, MDPersonnel Security Specialist05/2017 to 10/2017
Review a variety of records for suitability and personnel security purposes; Assist investigators who are conducting personnel background investigations for security clearance and/or suitability for employment.
Reviewed investigative SF86 forms and reports for completeness and accuracy, technical work reviewing investigative documents (such as employment applications, investigative questionnaires, affidavits, credit and police reports, etc.) to identify discrepancies, inconsistencies, and areas potentially requiring clarification or additional investigation.
Initiates, reviews and submits clearance information using E-QIP (Electronic Questionnaire for Investigation Processing) track and follow up on cases and studies, ensuring timely completion and regulatory compliance.
Ensures unclassified and sensitive security information and areas are not compromised and are in full accord with all regulatory security requirements for such areas.
Genesis HealthCareSumter, SCCertified Pharmacy Technician06/2016 to Current
Accurately perform data entry of written and electronic prescriptions, calculate dosages, mix/compound and dispense medications, prepare medication labels and fill prescriptions for pharmacist approval
Receive/transfer prescriptions via telephone and fax to and from various different pharmacies doctors' offices and other health care professionals
Maintain an account of all scheduled medications and all associated dispensing documentation
Responsible for monitoring levels of medications and supplies and reordering and stocking as necessary
Process patient payments, bill insurance claims, resolve insurance issues, process coupons/ discount and savings cards as necessary
Address customer concerns regarding medication, payment, patient privacy as it relates to HIPPA etc.
Responsible for keeping inventory and restocking office stock medications and cash pharmacy prescriptions dispensed to the patient by the physician
Remain abreast of changing policies and procedures within the pharmacy community through continuing education courses
Maintain CPR qualification state and national certification.
Apex SystemsChesapeake, VADeployment Technician12/2013 to 11/2014
Provides technical assistance to customers to minimize disruptions of computer operations.
Routinely receives high volumes of phone calls, walk-ins, or computer generated service requests from personnel.
Resolves a wide variety of problems, to include LAN and WAN (Wide Area Network) technical problems emanating from NT operating systems, and applications such as LMP (Logistics Modernization Program) and/or Outlook Web Access and Enterprise Email.
Tests and analyzes computer hardware and software malfunctions to resolve physical and logical processing problems.
Responsible for hardware/ software installation and patches, troubleshooting, customer service, network security, local and network printers, IP configuration, switches and routers and networking.
Routes unresolved problems to appropriate specialists for resolution, maintaining complete status of trouble call for reference and reporting purposes.
Monitors and maintains the standard client software and hardware configuration to maintain effective and timely response time.
Manages authorized user account management services, i.e.
establishing, deleting, changing, suspending accounts; and responding to inquiries.
Monitors and reports unauthorized access attempts/breaches, and takes corrective action accordingly.
Performs thin client and workstation security lockdown.
Maintains, monitors, and provides assistance for logins, and passwords for local (non-domain) accounts.
Performance evaluations highlighted diversified experience in demonstrated ability to monitor, operate and maintain hardware, software, and networks for a computing platform for all military installations supported by NMCI (Navy Marine Corps Intranet).
Ensures and adheres to application of information security/information assurance policies, principles, and practices.
Developed keen problem-solving abilities, proven useful while configuring, assembling and installing laptops, microcomputers, workstations, and/ or related peripheral equipment.
Demonstrated strong oral communication skills when providing customer service.
Competently and skillfully responded to customer service in the receipt, troubleshooting and resolution of all internal and external inquiries and issues.
Routinely upgrades, modifies, and replaces hardware, software and network components.
Install computers, upgrade machines, handle deployments, ghost machines and upgrade networks that are out of date.
PSI PAXCalifornia, MDComputer Analyst11/2012 to 11/2013
Configuration, troubleshooting, customer assistance, and training to support of and response to Command requirements.
Within this specialty area, participates in accomplishing technical, analytical and advisory functions pertinent to the development of local policies, plans, and processes and ensuring that work accomplished is in compliance with higher authority policies and guidelines.
Ensures the rigorous application of information security/information assurance policies, principles and practices in accomplishing the customer support functions of this job.
Support for users of IT equipment, software, networks, and systems.
Discusses operating problems and procedures with Chief Information Officer (CIO) and specialists at all levels and identifies IT improvements and ways to provide greater effectiveness and economy of services.
Develops plans for installing, configuring, troubleshooting and maintaining Command user IT equipment and software.
Consults with and advises Command IT Specialists in other specialty areas to develop integrated problem resolution plans.
Reviews installed systems and diagnoses problems encountered in the use of the systems.
Resolves problems and conflicts with occasionally uncooperative vendors/manufacturers when procured items do not meet with prescribed specifications.
Serves as troubleshooter for Command operating system software problems and applications and software interfacing problems.
Investigates frequent or significant transmission/communication software problems.
Evaluates alternative approaches to problem resolutions; frequently modifies and adapts precedent solutions to unique requirements to solve a variety of computer program problems and adapts precedents.
Determines courses of action on such matters as whether it would be cost effective to modify a system.
Abreast of emerging technologies; collaborated with lab technician to ensure quality product was produced from 3D printer.
Evaluated and responded to configuration change requests for new or expanded network and transport services.
Created new and modifies existing network interfaces, and implements and maintains network designs.
Serviced over 100 Marine Corps/ Navy bases worldwide supporting day-to-day operations, user account support, the diagnosis and resolution of technical issues to include connectivity, hardware testing, installation and update of approved software, etc.
Managed over 3000 user accounts utilizing active directory, set personal and command share drive permissions, enforced security policies and procedures set by the Department of Defense, monitored system health and performance analysis.
Handled problems and deviations in the work assignment in accordance with instructions, policies, previous training, or accepted practices in the occupation.
Planned and organized work based off of priorities: defined assignments and met suspense's and deadlines.
Commended for customer service skills; interacted independently and proactively with customers to identify and define complex/difficult problems and to develop and implement strategies.
United States NavyFort Jackson, SCInformation Systems Technician07/2005 to Current
Participate in long-range plans for IT security systems that anticipate, identify, evaluate, mitigate, and minimize risks associated with IT systems vulnerabilities
Plans, coordinates, implements and provides training to system users on new or changed operating systems, hardware, software, and the application of information assurance and security policies and guidelines.
Studies reports and logs of IT user problems encountered and structures training programs to fit user needs.
Establishes the technical procedures to be followed in resolution of system and/or component problems.
Interprets and explains higher authority and IT/customer support regulations, policies and directives and establishes and prepares local procedures, policies, guidelines and training programs for command automation users.
Knowledge of information assurance functions, methods, and techniques, (such as password control, media management, etc.) Knowledge of military security programs, regulations, and policies to serve as the installation information assurance security officer.
Provide guidance for local implementation of information assurance policies and procedures.
Assist technical and non-technical personnel in improving security.
Well-versed on automation concepts, methodologies, systems, and technology, to include commercial-off-the-shelf software, computers, standard operating systems, programming techniques, databases, and the functionality of software.
Ability to identify vulnerabilities and recognize security breaches, attempted intrusions, and unauthorized accesses.
Skilled in verbal and written communications to discuss information assurance security matters with IASOs and to provide security training awareness to users.
Administers and monitors compliance of programs which addresses IA operations and readiness.
Manages all aspects of IA and the developments, implementation, interpretation, accreditation, risk management, and maintenance of detailed IA policies, plans, programs, standards, and criteria ensuring a successful IA program.
Plans, develops, implements, and manages programs, policies, and procedures to protect the integrity and confidentiality of IT automated systems, networks, and data.
Maintained the network and servers, performing regular preventative maintenance, regular backups and disaster recovery of servers to tape auto loader and NAS (Network-attached Storage) storage media, as well as troubleshooting errors and avoiding network wide disasters.
Managed communications and connection solutions including local and wide area networks, intranet, and internet applications, DNS (Domain Name System), WINS (Windows Internet Naming Service), DHCP (Dynamic Host Configuration Protocol), firewalls, Cisco routers and switches.
Assisted users with account management, hardware and software testing and installation, maintenance, patches, and tech refresh installs, system analysis to resolve configuration and equipment problems.
Prepared and maintained all necessary circuit, operational and administrative logs, and ensured accountability of cryptographic publications and associated materials.
Responsible for training and educating personnel on information systems security practices.
Develops systems security contingency plans and data recovery procedures.
Conducts threat and vulnerability assessments and reports threats and technical vulnerabilities, identifies and assesses risks, and determines and implements effective measures to minimize such risks.
Identifies, analyzes, and reports attempts to gain unauthorized access to information, system failures, or suspected defects which could lead to unauthorized disclosures.
Reports and advises personnel on actual or potential computer virus threats.
Implements procedures for issuing, protecting, and changing system passwords.
Develops procedures to generate and maintain required documentation and reporting.
Manages the review of system audit trails and ensures the thorough investigation of discrepancies.
Develops and establishes access control policies covering access to systems only by authorized personnel.
Provides advice and guidance pertinent to IA program policies, guides, and standard operating procedures (SOPs) during all stages of the automation process.
Enforces security policies and safeguards for systems including stopping system operation if warranted by the seriousness of security violations.
Develops IT security plans, policy guidance, regulations, and procedures (SOPs) to ensure IA regulatory requirements are followed.
Provides oversight for IA programs ensuring compliance with overall Command-wide plans and higher authority policies and guidance.
Conducts and leads various IA security meetings with division organizational elements and IT representatives to plan, evaluate, and determine appropriate measures needed to ensure security requirements are met.
Ensures compliance with plans, policies, standards, infrastructures, and architectures of IT management and IT programs.
Monitors IT activities to measure progress in achieving IA objectives.
Interprets general higher authority policies and guidance pertinent to IT acquisition, management implementation, and disposal.