From: route@monster.com
Sent: Friday, May 06, 2016 1:34 PM
To: hg@apeironinc.com
Subject: Please review this candidate for: Cloud
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
Russel Stone Centreville, VA 20120, Telephone: 571.236.4535; email: Stonepirate@msn.com Work Summary I have over 8 years of NOC/telecom experience in
addition to 12 years as a system administrator and 7 years as a Help Desk
Manager as well as 4+ years of Cloud Administration and Cloud system
migration experience with an emphasis on computer security. I have precise
written and verbal communication skills. I have outstanding analytical and
problem-solving abilities as evidence by the experience listed below. Experience December 2002-Currently employed: System
Administrator/Help Desk OPS Manager/Sr. Cloud Engineer-AWS Program Manager Positioned in multiple leadership roles with-in
the organization including being selected for the transition role of VP of IT
Operations that supported over 1600 users including all IT and business
functions for multiple site locations. This included oversite and
responsibility for Circuit provisioning/Network provisioning/WAN
integration/MS Exchange team management/ Cost point and Congnos application
oversite/Security Assessment and remediation management/IDS team
management/Domain Management and Migration/Physical and Virtual
environments/invoicing. In my role of AWS program manager business was
increased by 70% for the life of a key contract. I also performed business
development and business capture roles while preforming the responsibilities
of AWS Program Manager. In addition, I performed the role of AWS Architect
including initial stand up implementation of security functions and
management for the internal AWS Engineering, Operations, and the Security
team. Captured and then grew a new AWS contract by 50% with-in a year time
frame. Responsible for all AWS contracts and AWS related business activities.
I was brought into two key contracts as part of a tiger team to resolve and
support issues that were unable to be addressed by the operation teams (A
public facing system that was analyzed and reported on in all major business
and media outlets). I was the team lead for an additional tiger team that
included resolving issues on physical and virtual systems of over 400 domain
servers (DEV,TEST,PROD) including resolving outstanding security issues while
working directly with the security team with-in the agency. · Architected a Federal Agencies First Application to move
to the AWS Cloud with a FISMA Low accreditation. Including Dev/Test/Protection/Security
Stacks. Assessment of Customer requirements including the Current
Architecture, Operating Systems, Applications, Databases, Network and System
Security needs. Identification of what AWS Services will be Utilized
Including Compute Services, Storage Services, Database Services, Networking
Services, Security Services, and Management Services. Then preformed
Architecture Design to include Application Deployment, Identification of
Ports and Protocols, Load Balancing, Roles and Responsibilities, Separation
of Duties, Network Configuration and DNS implementation. Developed and
implemented AWS security group configurations to meet accreditation
requirements. Development of custom scripts for use in the AWS management
console for security lock down requirements based on customer roles and
responsibilities. ·
Architected
and deployed internal AWS Enterprise Asset Management Solution including
Cloud document share solution for mobile applications. Implemented Route 53
for DNS with-in the environment. Preformed AWS ACL lockdowns based on
security attacks to the application increasing system response times. ·
Architected
and migrated internal applications from physical hosted equipment to a hybrid
AWS VPC. Including recommending security configurations based on AWS Security
best practices. ·
Architected
stand-alone agency AWS cloud solution utilizing AWS RDS multi AZs and SSD
Provisioned IOPS needed for an application migration including price analysis
and budget analysis. Added the implementation of auto-scaling groups to
include a 70% cost saving for AWS run-time. ·
Performed
vulnerability assessments using Nessus to identify risks and implement risk
mitigation procedures. ·
Implement
security to meet FISMA moderate security controls in alignment with NIST 800-53r4
and FedRAMP requirements. ·
Provide
day-to-day operational support for Enterprise Cloud solutions hosted on the
Amazon Web Services (AWS) infrastructure using Windows Server 2008 R2 and
Windows 12 Red Hat Linux (Linux team support), Ubuntu, Amazon Machine Images
(AMIs). Design, configure, implement, and manage all AWS related activities.
(EC2, EBS, security groups, ACLs, NAT, AWS Workspaces, SES, SNS, Route 53,
Storage Gateway, RDS, VPC, S3, CloudWatch, IAM lockdowns, Directory Service,
Trusted Advisor, AWS Invoicing, AWS Billing, VPN, GovCloud) · Install, configure, and manage
Enterprise applications (Event Sentry, Symantec Endpoint Protection, Tripwire
Enterprise, Netlib, MS Lync, Azure Phone Factor). Titan
Technologies, April 2002-July2002: PC Technician ·
End
user maintenance and support of 1300 PC's. ·
Complete
system upgrades and roll-over of desktops, monitors, and printers for the
USPTO. · Involved troubleshooting of
network devices, and applying customer satisfaction in a timely manner. General Services
Administration FTS 2K1, August 1991-April 1999: Computer Specialist-CO
Computer Skills
Operating
Systems: DOS, Windows
9X, Windows NT, Windows 2000, Windows XP Pro, LINUX (little working
knowledge), Windows Server 2008/2012 Enterprise, Vista, and Windows 7/8 Application
Packages: MS Office all
varieties, MS Visio/Project, Lotus Notes, Remedy, Veritas Backup Exec 9/10,
Blackberry Enterprise Server, Comvault, Event Sentry, MS SQL Server, SEP
Management Console, MS Lync, SCCM, Phone Factor, Mi-Token, Netlib, Datanamic,
Load Balancers, AWS Console, MS Azure, Double-Take. Communication
Software: PC
Anywhere/RDP, MS Exchange, MS Outlook, Active Directory users and computers,
Cisco systems Any connect VPN, Symantec Management Console Browsers: Chrome, Internet Explorer, Mozilla, Firefox Network
Technologies: Switches,
Hubs, Routers, TCP/IP, Firewalls Computer
Security: Intrusion Detection,
PKI, Risk Assessment, Incident Response, Password Retrieval, Data Recovery,
Nessus, Tripwire Enterprise, Cenzic Hailstorm, Alien Vault, App detective.
Penetration and Application testing, OS lockdowns, Vulnerability Remediation. Related Coursework
Computer
Information Systems, Computer Program Design, UNIX Operating System,
Networking Essentials, System Analysis and Design, Network Security, and
Top-Down Network Analysis and Design. Education B.S., Computer Networking, Strayer University,
2001 |
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
|
|