From: route@monster.com
Sent: Monday,
October 24, 2016 11:02 AM
To: hg@apeironinc.com
Subject: Please
review this candidate for: Network ADMIN ccna
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
Alvaro Velasquez 750
South Park Rd – Apt 8-32 - Hollywood FL 33021 (305)
401-1610 – alvarovzla@hotmail.com –
Skype ID: Live:alvarovzla_1 Summary Network
Security Engineer with experience in implementation, maintenance and support
of LANs, VPN, Firewalls, Proxies, DNS, DHCP and Active Directory. Additional
experience includes disaster recovery, software deployment, capacity planning
and business continuity Accomplishments ·
More than ten years of experience
managing and provisioning a LAN environment ·
Recognized and commended by
management for improving uptime and operation flow just after few months of
being hired ·
Developed standard and automated
procedures to handle complex as well as day-to-day tasks ·
Consistently supported sites
achieving excellent reviews by users and customers Competencies ·
Versatile individual able to
prioritize, multitask and work proactively to accomplish multiple projects at
the same time ·
Troubleshoot problems and
recommend/implement
solutions. ·
Manage assigned projects including
accepting responsibility and meeting milestones in a timely manner. ·
Effectively communicate with
customers and peers.
·
Excellent verbal and written
skills with outstanding customer service. ·
Written comprehensive
documentation including design documents, policies and procedures. ·
Self-motivated and able to work on
tasks, activities, and projects with minimum supervision. ·
Detail-oriented with excellent
analytical and project-tracking skills ·
Team player interested in
achieving overall department goals ·
Learns technical information
quickly ·
Foreign Languages: Excellent
oral and written fluency in Spanish. Technical
Skills -Network:
WhatsUpGold v14 and v15 (Monitoring), Splunk v4.2 (Logs). IP addressing,
Bandwidth usage, Proxy Services, Image Deployment. -Network
Security: Cisco ASAs, CheckPoint, Fortinet, Ironport, HP Tipping Point -Switching
and Routing-Cisco: Configuration of routing protocols (EIGRP, OSPF, BGP),
switching procedures, creation of VLANs, VPN and firewall setup. -Wireless: Cisco
Access Points Autonomous AP Provisioning, Lightweight AP configuration and
management through WLAN controller. -Network
Hardware: Cisco Routers 7200/2500/2600/1800/2800, Cisco Switches
2950/3550/3560/4500/Nexus5000/2000, Cisco ASA5520/5545/5585, Cisco Access Points
1200. -Systems:
Windows 2008 Server, Windows 10/7, CentOS 5.2. -Servers:
VMware, HP Proliant, DELL PowerEdge -Server
Applications: Active Directory, SCCM 2007, WSUS, Veritas NetBackup 6.5,
Symantec BackupExec 12 , NetVault Backup, Exchange 2010, CommVault Simpana
8.0. -Desktop
Applications: MS Office 2016, Visio 2016, Symantec Antivirus, McAfee Virus
Scan, Symantec Ghost, Acronis, WinMagic, PGP desktop and email encryption,
Devicewall, Citrix XenApp. Current
Certifications/Clearances CCNP
Security (Cisco Certified Network Professional Security) CCNP
(Cisco Certified Network Professional) CCNA
Wireless (Cisco Certified Network Associate Wireless) CCNA
Security (Cisco Certified Network Associate Security) CCNA
(Cisco Certified Network Associate) Cisco
Identity Services Engine (ISE) Specialist MCSE
(Microsoft Certified Systems Engineer) - Server 2003 ITIL
v3 Certified CompTIA
Security+ CompTIA
Linux+ DoD
Top Secret SCI Clearance Education/Workshops Cisco
Job Task Analysis (JTA) – CCNA Security Examination (San Jose, CA) April 2014 Subject
Matter Expert University of
Washington (Seattle, WA) August 2004
Bachelor’s
degree in Management Information Systems (MIS) Experience
Mastech
Inc – Royal Caribbean Cruise Lines Ltd (Miramar, FL) 02/2015 – Present Network
Security Engineer ·
Part of the network security team
in charge of maintaining the infrastructure of a cruise line with more than
forty ships, ten locations worldwide and a cloud environment. ·
Sustained and continuously created
rules more than 50 Cisco ASA Firewalls, including context firewalls for
communication between ships and shoreside, ships and vendors, and vendors and
shoreside. ·
Maintained and provisioned
Fortinet Firewalls located inside the new line of ships from Royal Caribbean ·
Implemented, troubleshot and
maintained VPN connections between vendors, employees, ships and the
headquarters location. ·
Managed and troubleshot Cisco
Ironport devices both on shoreside and on shipboard. ·
Provisioned Checkpoint firewalls
integrated with an AWS environment. ·
Generated and maintained Amazon
Web Services (AWS) security groups for cloud server instances communicating
with headquarters. ·
Used Infoblox to modify
information on external DNS in order to externalize production and staging
sites. ·
Troubleshot Network Access Control
tool Bradford for Windows, Android and Apple devices giving access to
corporate and guest network. ·
Monitored HP Tipping Point on
ships and performed weekly signature updates. ·
Represented the Network Security
department on change meetings and with project management meetings. X-eeto
Inc – U.S. Southern Command (Miami, FL) 08/11 – 02/2015 Network
Engineer ·
Part of the Network team assigned
to implement, maintain, troubleshoot and optimize a government site with 2
mirrored networks and a commercial network, consisting on more than 300
devices and 2,000 users. ·
Maintained VPN access for users
using EZVPN, Site to Site and Client VPN. ·
Designed and provisioned VPN
access for users joining Cisco ASA and Anyconect. ·
Secured communications between ASA
and remote routers by implementing certificate-based authentication. ·
Implemented classification,
quarantine and remediation of end user devices using cisco Identity Services
Engine (ISE) ·
Created and implemented Firewall
Rules using Cisco ASA ·
Maintained and troubleshoot
Websense Secure Gateway ·
Extended networks by configuring
trunks, vtp, vlans and port security on new switches due to exercises being
conducted on temporary locations (Command Centers) ·
Automated provisioning of Cisco
switches by the creation of scripts, reducing implementation time in half. ·
Made use of Cisco Secure Access
Control Server (ACS) to implement AAA via TACACS+ on different network
devices ·
Tracked devices, ports and also
implemented changes to routers and switches enterprise-wide by using
CiscoWorks ·
Portrayed implementations and
changes to the network topology through Visio drawings ·
Implemented SNMP v3 on devices to
allow for network management and used WhatsUpGold to monitor and establish
alerts for interface failures, cpu overload, BGP neighbors and bandwidth
utilization of Cisco switches and routers ·
Used Splunk to troubleshoot and
track changes and issues on Cisco devices ·
Followed Security Technical
Implementation Guides (STIGS) in order to provide access, SNMP and
administrative security to Cisco L2 and L3 devices ·
Executed VoIP-related tasks such
as configuring GD-Viper phones and using Cisco Unity to add/edit/delete voicemail
boxes. ·
Responsible for providing daily
assistance to install team/tier1/tier2 with networking management and
troubleshooting, including switches/routers, 802.1x, and network security Lockheed
Martin – U.S. Air Force (Homestead, FL) 07/09 – 07/11 Systems
and Deployment Administrator ·
Responsible for administration of
the Software and Updates Deployment Infrastructure for Homestead Air Force
Base with more than 1,200 workstations and 50 servers ·
Made use of mainly SCCM 2007
to administer and streamline package deployments, however I also used Network
Monitoring tools, VBS and command line scripting to aid on the completion of
deployments ·
Usage of CiscoWorks to run reports
of hosts that needed to be patched or inspected for software vulnerabilities ·
Assisted efforts to run exercises
at the bases by leading and implementing projects that included installation
and cabling of temporary locations (Command Centers) ·
Monitored Servers by creating
email alerts that will let the Systems Administrators know when a server was
offline, enhancing customer response. ·
Created documentation on Software
Deployment Procedures and Day-to-Day Troubleshooting Issues in order to
generate a Knowledge Base intended to be used by Systems Administrators and
Helpdesk Personnel ·
Coordinated with Air Force
management the planning and execution of Time Compliance Network Orders which
involved Servers, Workstations, Laptops and Printers all across the Base ·
Executed projects in conjunction
with Federal IT site leads that included implementation of new servers,
networking circuits and backbone switches. ·
Enhanced functionality and reduced
downtime on servers by applying practices such as Link Aggregation,
Monitoring of Servers’ Usage, Backup Monitoring and Email Alerts, Printing
Monitoring and Site Documentation using Visio 2007. ·
Exercised daily troubleshooting
(local and remote) of Active Directory, user support with Cisco VPN client
and custom applications while using Remedy as a ticket queue. Eastern
Financial Florida Credit Union (Miramar, FL) 02/05-06/09 Network
Administrator ·
Part of the IT team responsible
for offering network and server support to the Corporate Building and Branch
Offices, adding up to about 700 employees. ·
Performed router and switch
provisioning for the internal LAN, which included management of VLANs,
package monitoring and traffic inspection. ·
Administered and dealt with twenty
six Backup servers running Linux Red Hat at the organization’s branches in a
day-to-day basis. ·
Performed on-call duties assisting
users with issues resembling connectivity to the network VPN, reporting a
malfunction on transaction-processing servers, password resets, and
business-applications usage. ·
Configured and deployed SOHO
solutions using Check Point VPN-1 Edge devices through Provider-1 while
creating two VLANs for each remote user. ·
Configured DHCP reservations and
scopes; configured DNS options. Set up of public folder emails and mailbox sizing
on Exchange Server. Dealt with File and printer server access and
troubleshooting using Windows Server 2003. ·
Monitored network performance and
downtimes through the use of packet sniffers and network monitoring tools,
reducing the length of downtimes and creating diagnostics that warned me
about future issues. ·
Used scripts, Group Policy Objects
and MSI packages for the deployment of software, access restrictions
enforcement and sharing of resources across the network through Active
Directory. |
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Languages: |
Languages |
Proficiency Level |
|
Brazilian Portuguese |
Intermediate |
|
|
English |
Fluent |
|
|
Spanish |
Fluent |
|
|
|