From: route@monster.com
Sent: Monday,
October 24, 2016 11:03 AM
To: hg@apeironinc.com
Subject: Please
review this candidate for: Network ADMIN ccna
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
PAUL M. MADIGAN
Information Security Engineer
7762 Chatfield Lane https://www.linkedin.com/in/paulmmadigan Ellicott City, MD. 21043
e-mail:
pmadbass@verizon.net
Phone: 443-878-3790
OBJECTIVE
To gain employment providing
excellence and expertise in support network and security solutions for the
public and/or private sector. PROFESSIONAL
PROFILE_
·
Network Engineer
·
Certifications: F5 Certified BIG-IP Administrator, ITIL
v.3, Security+ (DoDD 8570 compliant), Previously held certifications: CCNA,
MCSE: 2000 & NT4.0, MCP+I, A+
·
Security
Clearance: DoD Top Secret, NATO Briefed. Status: Active CAREER SUMMARY
·
2014-Present:
Social Security Administration, NCC- National Computer Center ·
2006-2014:
Department of Homeland Security, TSA/Office of Intelligence and Analysis ·
2003-2006:
Office of Secretary of Defense- EOST, Pentagon ·
2002-2003:
Social Security Administration, NCC- National Computer Center ·
2001-2002:
Ferris, Baker Watts TECHNICAL EXPERIENCE
·
Load
Balancers and Virtual Private Network Appliances: F5- Global Traffic Manager
(GTM), Local Traffic Manager (LTM), F5 Viprion, 4000 and 3900 series hardware
platforms, F5 Firepass SSL-VPN Appliance, Cisco VPN 3080 Concentrators
(IPSec) ·
Intrusion
Prevention/Detection systems And Firewall: Enterasys Dragon HIDS/NIDS, Cisco IPS/IDS, Snort, Juniper
NetScreen 5200 Firewalls, Cisco ASA Firewalls, ·
Routers
and Switches: Cisco
7140 Routers, Cisco Nesus 7000, Cisco Catalyst 6500, 4700, 3550, Nortel- ·
Authentication
and Security Appliances:
RSA SecureID, Cisco ACS RADIUS/TACACS + Server, Cisco AS5300 Access Server,
IBM WebShpere DataPower SOA Appliance, Cisco MARS, Cisco Security Manager,
Enterasys Dragon Enterprise Manager Server (EMS) ·
Protocol
Analyzers, Vulnerability Scanning and Forensics Tools: Wireshark/PCAP, Tenable
Nessus, Autopsy, Helix pro, ProDiscover, Access Data Forensic Tool Kit (FTK) ·
Network
Monitoring and Change Control: Net Cool, Solar Winds, (SNMP v3) Remedy, Rational Clear
Case/Clear Quest. ·
Server
Hardware: IBM
Blade Center, IBM P-770 ·
Operating
Systems:
Windows Server NT\2000\2003\2008, Linux STRENGTHS,
EXPERIENCES AND RESULTS
Strength: Deploy and
maintain multiple three-tiered secure network infrastructures. Experience: Implement
network solutions for COOP support of Department of Homeland Security’s
Transportation Threat Assessment and Credentialing program. Timely mitigation of Plan of
Action & Milestones (POA&Ms) and Common Vulnerabilities and Exposures
(CVE) findings necessary to maintain compliance with FISMA and OMB directives
for IT Security and Information Assurance. Results: Coordinated
individual and team efforts necessary to insure Secure Flight
Information Systems received Authority to Operate (ATO) certification.
These efforts were crucial milestones leading up to the October 28, 2008
passage of the Secure Flight Final Rule and the eventual on boarding of all
domestic and international air carriers into the Secure Flight program. Strength: Network
Architecture Analysis Experience: Evaluated Network
Architecture for several DHS programs (Crew Vetting Program and Secure
Flight) for single points of failure and critical spare analysis. Results: Recommended and
implemented a high availability host-based and network-based reporting system
for Intrusion Detection event collection and reporting. Properly aligned
policy profiles, implemented cross-site replication. Implemented
uninterruptible power supplies (UPS) for closet switches and end user
systems. Strength: System
Development Life Cycle Migration and Consolidation support
Experience: RAS\VPN Migration for the Office of Secretary of
Defense, Pentagon. Results: Migration of
fourteen separate remote access components into a single enterprise
implementation. A 75% reduction in operation and support costs was achieved
by consolidating eighty-four network devices into a six-device enterprise
solution. Maintained 99.99 % SLA uptime metrics EMPLOYMENT
HISTORY
Network Engineer for Social
Security Administration NCC
(2014-Present) Employer: OBXtek Role: Global and Local
Application Switching and Load Balancing Projects: Application Server/Data
Center Migration Duties: Data
Center/Hardware migration of over 700 Application VIPs from
thirty-four F5 LTM/GTM F5 BIP-IP 3900 paired devices to a six F5
BIG-IP 4800 Viprion series virtualized (Chassis\Blade\Host\Guest) device
solution. Create SSL profiles; implement client and server side
certificates. Configure, maintain and monitor F5 Viprion, Enterprise Manager,
Global Traffic Manager (GTM), Local Traffic Manager (LTM) devices. Discover,
troubleshoot and report code bugs present in recent software release and
drive vendor for a documented solutions. Network Engineer (Level
III) for DHS/TSA/TTAC
(2006-2014) Employer: InfoZen Role: Network Team Lead,
Vulnerability Management Team Member Projects: Data Center
Build outs, POA&M/CVE Remediation Duties: Support
LAN/WAN/VPN infrastructure in a secure DHS facility which interoperates with
other DHS, law enforcement\ intelligence organizations for the purpose of
information sharing regarding terrorist threats. Provide subject matter
expertise on secure configuration and troubleshooting of network operating
systems in order to ensure persistent network operations. Analyze firewall
rule requests, implement Firewall rules/routes, create VLANs,
configure/troubleshoot trunking and ether-channel configurations. Implement
IPS/IDS Signatures. Analyze network access trends and perform cyber forensics
analysis. Upgrade and install security patches per DHS security posture
compliance. Maintain change management documentation and configuration
backups. Develop SOP documentation. Maintain licensing and vendor support
renewal. Submit quotes and acquisition recommendations. System Development
Life Cycle (SDLC) support. Provide secure operation, maintenance
and monitoring for high availability of parallel development, testing and
production environments. Network Engineer, Office of
the Secretary of Defense, the
Pentagon (2003-2006) Employer: CACI
International Inc Role: VPN Remote Access
Security and support for OSD and Component Organizations Projects: OSD NIPRNET
Enterprise Remote Access Migration Duties: Maintained
redundant site RAS\VPN infrastructure, RAS\VPN Migration/Consolidation,
RSA SecureID migration/consolidation from 5.0 to 6.0, Cisco ACS
migration/consolidation v 3.3, Analyze network access trends and
provide logging forensics, Upgrade and install Security Patches per
IAVA compliance, Maintain change management documentation and
configuration backups, Provide monthly utilization reports and daily
morning briefings to OSD Components, Maintain licensing and support
renewal, Submit quotes and acquisition recommendations, Schedule
vendors for onsite presentations Title: Network Engineer for
Social Security Administration NCC
(2002-2003) Role: Enterprise Network
Migration support Projects: Server Migration
Project, Workstation Migration Project Duties: Servers Migration
support: Windows NT to Windows 2000, Workstation Migration support: Windows
NT to XP, SMS migration support: SMS 1.2 to SMS 2.0, Token Ring to Ethernet
migration support, Day shift supervisor for Workstation migration, Track and
document project progress
Employer: Ferris, Baker,
Watts Inc Role: Operational support
for Securities and trading firm. Duties: Troubleshoot and
provide complete resolution on all issues, Create and manage user accounts
and manage user profiles, Administration of e-mail accounts and corporate
address books, Remote Access support for VIPs, Author “Known Issues”
and “Break/Fix” documentation for Help Desk EDUCATION
·
Masters
Degree in Cyber Security, UMUC- 2012 ·
Graduate
Certificate- Cyber Security Technology, UMUC- 2011 ·
Graduate
Certificate- Foundations of Cyber Security, UMUC- 2011 ·
BS
Degree in Music, Towson University- 1999
I.T. TRAINING_________________________________ ______________
F5 Application Security Manager ASM v11 Training (On-Site Training
and Labs)
SANS Institute- SEC503: Intrusion Detection In-Depth
IBM- Administration of IBM WebShpere DataPower SOA Appliance
New Horizons- F5 LTM Essentials & LTM Advanced
Global Knowledge: IPS - Implementing Cisco Intrusion Prevention
System v6.0
Global Knowledge: SNPA - Securing
Networks with PIX and ASA Juniper Networks: JNCIA-SSL Configuring NetScreen Secure Access
(CNSA)
Global Knowledge: Building Cisco
Remote Access Networks (BCRAN) SUN Microsystems: Solaris 8
Operating System Fundamentals Training UMBC Computer Training Center:
Cisco CCNA, MCSE NT 4.0, A+ System Source: Designing a MS
Windows 2000 Migration Strategy AWARDS, AFFILIATIONS AND
MEMBERSHIPS
·
Social
Security Administration Associate Commissioner Citation- in recognition
of successful implementation of U.S. Treasury CRL Caching- (2016) ·
Social
Security Administration Associate Commissioner Citation- - in recognition of
successful implementation of the HTTPS-Everywhere and Domain Consolidation
Changes- (2016) ·
DHS\TSA
Certificate of Appreciation- (2008) ·
Faculty
Member Towson University Music Prep Department- (1997) ·
Dean’s
List Award, Towson University- (1997) |
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Languages: |
Languages |
Proficiency Level |
|
Spanish |
Beginner |
|
|
|