From: route@monster.com
Sent: Thursday, November 10, 2016 3:23 PM
To: hg@apeironinc.com
Subject: Please review this candidate for: Network Engineer TS SCI
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
Michael Richard Taylor 10211
S. Bailando Rio Hereford,
Arizona 85615 E-mail:
michael.richard.taylor@gmail.com Phone#
(520) 508-8483 Active
Security Clearance Top
Secret Sensitive Compartmentalized Information (TS/SCI) Professional
Certifications (All current) CISA,
CISSP, CEH, CCNP, CCNA, JNCIA, Security+ (CE version), Network+ Professional Experience 2RCC
Network Division Chief and JRSS Subject Matter Expert August
2012-Present ●Serve
as the sole Subject Matter Expert among 315 contract staff for Networking and
the Joint Regional Security Stack (JRSS) projects ●Lead
a division comprised of 5 separate teams: Wide Area Network Team, JRSS
Service Migration Team, Domain Name Services team, Proxy Operations team, and
the 2RCC infrastructure team. Supervisor for a total of more than 75 FTE on
contract. ●Developed,
modeled, wrote the proposal to government for, and spun off an entirely new
Unified Communication team totaling new 18 FTE positions on contract
(including 3 SME positions) ●Developed,
modeled, wrote the proposal to government for, and staffed net new Army
Service Migration team to support the JRSS project totaling 26 FTE positions
on contract (including 6 SME positions) ●Initiated
the first remote teleworker program in 2RCC history to support staffing the
JRSS initiative with highly qualified personnel outside the Sierra Vista
area. ●During
tenure as Division chief and SME was directly responsible for adding over 50
net new positions to the contract (over $1M per year in increased billable FTE
hours) ●Participated
on-site, (hands-on in the CLI), in the migration of Joint Base San Antonio
(JBSA) from the Legacy Top-Level Architecture (TLA) to the JRSS. Program
Manager (ARCENT BRAC C4/IT Relocation) August
2010-August 2012 ●Sole
supervisor for the relocation Army Central Command's (ARCENT) C4/IT
infrastructure from Fort McPherson, GA to a newly constructed facility at
Shaw AFB, SC. ●Develop
and maintain Master Project Schedule for all phases of this project. ●Maintain
control of financial metrics for this Cost Plus Fixed Fee (CPFF) contract. ●Select
and supervise subcontractors for ARCENT BRAC task. ●Serve
as hiring manager for all STG employees on this task. STG
Inc, Sierra Vista, AZ Deputy
Program Manager January
2010-August 2010 ●Scout
new business development opportunities both within the Defense sector and in
the private sector. ●Draft
contract proposal bids for DoD information technology and information
assurance contracts under the TEIS and ITES contract vehicles. ●Perform
detailed business cost analysis of current and projected projects. ●Provide
technical oversight and editing of technical work for local IT/IA projects. ●Provide
training, mentorship, and quality control for subordinate contractors and
their contract deliverables. Prepare
and deliver briefings for both contract and government personnel STG
Inc, Sierra Vista, AZ Deputy
Program Manager June
2009-January 2010 ●Hired,
trained, and lead a team of 17 Security Engineers in support of Task 306
DIACAP Engineering and Certification under IASED, Fort Huachuca. ●Supervise
travelling DIACAP certification teams. ●Write,
QC, and provide technical oversight for all DIACAP scorecards, POAMs, and
SEARs. STG
Inc, Sierra Vista, AZ Security
Engineer February
2009-June 2009 ●Performed
DIACAP security engineering and certification in support of IASED as part of
Task 202. ●Write,
QC, and provide technical oversight for all DIACAP scorecards, POAMs, and
SEARs Northrop
Grumman, CONUS RCERT, Ft. Huachuca, AZ Security
Analyst/Penetration Tester April
2008-February 2009 ●Provide
security analysis and penetration testing of all CONUS Army installations. ●Utilize
security and penetration tools including Metasploit, Nessus, Kismet, Retina,
Harris Stat (Patchlink), ISS, and custom administration sets to assess
network security and exploit weaknesses to demonstrate needed fixes and risk
mitigation. General
Dynamics Information Technology, Ft. Huachuca, AZ WAN/LAN
Analyst October
2006-April 2008 ●Responsibilities
included performing WAN management functions for over 200+ Army installations
across the Continental United States. Monitor, manage, analyze, and configure
Army Top Layer Architecture (TLA) consisting of CISCO routers, switches, and
various firewalls. ●Ensure
proper configuration of network routing protocols including TCP/IP, OSPF,
BGP, Frame Relay, and ATM. ●Utilize
various network management tools such as Cisco Works 2000, WS-Watch and Net
Health.. U.S.
Army, Various duty stations (Korea, Honduras, Texas, Germany, Balad Iraq) Signals
Intelligence Intercept
Supervisor
June
1992– October, 2005 ●Supervised
a SIGINT collection mission of 65 linguists including 20 civilian augmentees. ●Find,
process, and disseminate COMINT signals of interest using the Guardrail
Common Sensor Aerial Exploitation platform |
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Languages: |
Languages |
Proficiency Level |
|
Korean |
Intermediate |
|
|
|