From:                              route@monster.com

Sent:                               Friday, April 15, 2016 10:18 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: CS UT

 

This resume has been forwarded to you at the request of Monster User xapeix03

Erik Lanham 

Last updated:  01/26/14

Job Title:  no specified

Company:  no specified

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Washington, DC  20018
US

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Erik Lanham - Network Engineer

Resume Value: dqzqpw88r3dirhq9   

  

 

(910)551-3243·erik_lanham@yahoo.com

Erik Lanham

2300 Washington Place NE Apt 224, Washington DC 20018·(910)551-3243·erik_lanham@yahoo.com

Erik Lanham

 

Proficient communications engineering professional with solid history of network infrastructure design, engineering, configuration, administration, repair, and related hardware / software maintenance. Ensure system availability and operational continuity for clients. Seamlessly manage and execute change, mitigating risk and conforming to industry best practices. Able to manage multiple tasks effectively and master innovative software and tools.

Experience

June 2013- Pres.                                                     Northrop Grumman                                                  Beltsville MD

 

Network Engineer

 

§          Part of Northrop Grumman's Information Systems support to the Department of State (DoS) Enterprise Network Management Operations Center (ENMOC).

§          Provides 7x24x365 monitoring and control of the unclassified and classified networks connecting DoS facilities worldwide

§          Responsible for managing over 450 Posts and Consulates around the world.

§          Conduct PCA audits on devices.

§          Standardization of Network Devices (Cisco 2911s, Cisco 3560s, Cisco ASA 5650, Nortel 600 Encryption Device.

§          Maintain full control of classified devices configurations and will provide sanitized configurations to GITM (Global IT Modernization) upon their request.

§          Perform Quality Assurance reviews of newly refreshed core devices within three business days of receipt of Remedy ticket and note any discrepancies to GITM for remediation.

§          Perform a 30-day pre-installation QC review of core devices and provide status of review to GITM within five business days of receipt of Remedy ticket.

§          Provide GITM with network routing and switching requirements.

§          Secure core network devices (re-enable TACACS) within 4 hours of notification from GITM.

§          Provide ongoing support and respond within 2 hours of any request for core device support during an ongoing migration.

§          Provide GITM and post with approved procedures for system migration.

§          ENMOC will annotate issues, concerns and detailed results of network device and domain controller QA reviews and provide feedback to GITM

§          Review/Update OpenNet Open Tickets

§          Verify & Close OpenNet Fixed Tickets (ENMOC Originated)

§          Help post resolve connectivity issue.

§          Help post resolve network device issue.

§          Troubleshoot with local ISP’s and DTSPO (Diplomatic Telecommunications Service Program Office) to bring tunnels back up.

§          Resolve configuration issues including BGP, OSPF, and iBGP issues, Local Pref, Route Mapes, Communities, Peer Group, and Load Balancing.

§          Use Network management and troubleshooting tools such as, NeuralStar, iPost, NetTracker, Opsware, PassTracker, Smoke Ping, Remedy.

 

November 2012- May 2013

ITT Systems

FOB Gardez, Afghanistan

Network Administrator

 

§          Responsible for entire Tier 2 network, which includes, layer 2-3 switches, Nexus switches, ACS server,  etc… on classified and unclassified enclaves.

§          Successfully installed IPS, IDS and log analyzer, received award for outstanding work.

§          Migrated from legacy ACS to new version of ACS for authentication on switches.

§          Successfully implemented layer 2 and layer 3 ip scheme for medical computers onsite on Gardez.

§          Successfully implemented layer 2 and layer 3 ip scheme on all three enclaves for the installation of a new ADN used by 1-187 IN BN.

§          Taught introduction to networking class to DSST soldiers.

§          Configuration/installation and upgrade of Cisco switches, up to 6509 series

§          Worked with ITT Outside Plant (OSP) personnel on Layer 1 and Layer 2 connectivity issues.

§          Clean-up and re-cabling of ADN5.

§          Configured Cisco VOIP phones with Call Manager.

§          Configured core, distribution, and access layer switches

§          Security Configuration and management

§          Configured TACACS and Port Security to lock down switches

§          Planed network development and expansion  as needed

§          Examined Logs and Perform Maintenance on Equipment

§          Created ACLs (Access Control List) for Blackout and security

§          administrators

§          Implemented port changes to include VLAN, port speed, duplex.

§          Used Orion, SNMPc, and Wireshark to monitor and troubleshoot network availability and to administer switches.

§          Created a network diagram (DIACAP) of all equipment, and fiber runs on the FOB using Visio

 

May 2011- May 2012

ITT Systems

FOB Spin Boldak, Afghanistan

Tech Control Technician

§          Worked the migration of the Tactical Network to the Strategic Network on FOB Spin Boldak.

§          In support of coalition forces for Operation Enduring Freedom, monitoring, maintaining, repairing, and configuring the Promina series multiplexing systems that provides SIPR, NIPR, and Centrex.

§          Developed and established standard operating procedures (SOPs) and updated circuit diagrams to streamline and standardize the problem resolution process.

§          Spearhead control facility inspections to ensure the highest caliber of performance and security.

§          Maintained Remedy Account system which provided updates on circuits that needed to be troubleshot, repaired, and restored to normal operations.

§          Controlled COMSEC (Ex: KIV-7 Series, KIV-19 Series, TACLANE Series, KIK-13, DTD.)

§          Learned valuable routing experience: Basic TCP/IP, LAN’s, wireless security and implementation, static and dynamic routing, management and security (Telnet, SSH, and CDP), implementing VLAN’s, STP, routing protocols (Distant Vector, OSPF, EIGRP, and BGP), implementing ACL’s, NAT, WAN implementation, and IPv6.

 

2009-2010

Inter con Security

Washington DC

Diplomatic Protection Officer

§          Provides protection services for the Harry S Truman Building (State Department Building).

§          Services include access control, roving patrol, pedestrian control and preparing reports and records.

§          Top Secret Clearance.

 

 

2002-2005

US Army

Ft Bragg, NC

Tech Control Technician

§          Provide communications for Ft. Bragg.

§          Monitored and troubleshoot the 24/7/365 matrix switch.

§          Maintained unit’s Remedy Account system which provided updates on circuits that needed to be troubleshot, repaired, and restored to normal operations.

§          Responsible for coordinating with DISA when setting up circuit.

§          Controlled COMSEC (Ex. Loading crypto, ky’s, kg’s, and STU III’s.)

§          Responsible for securing all crypto and any other classified documents in secure vault.

 

 

2000-2002

US Army

Camp Red Cloud, S Korea

Tech Control Technician

§          Secret Clearance.

§          Served as a member of the Camp Red Cloud Technical Control Facility (TCF) team.

§          The team provided continuous 24 hour operation and maintenance of telephone trunking, multi-channel microwave and fiber optic circuits that handled over 15000 calls and messages daily.

§          Preformed preventive maintenance and prompt outage restoration to reduce down time for circuits affecting ten instillations throughout Area I (S. Korea).

§          Maintained unit’s Remedy Account system which provided updates on circuits that needed to be troubleshot, repaired, and restored to normal operations.

§          Controlled COMSEC (Ex. Loading crypto, ky’s, kg’s, and STU III’s.)

§          Responsible for securing all crypto and any other classified documents in secure vault.

 

Education

 

2005-2006                          Suffolk Community College                               Selden, NY

Associates in Criminal Justice

Pi Alpha Sigma Honor Graduate

2006-2009                                       George Mason University                                            Fairfax, VA

Bachelors of Science in Administration of Justice

Certifications

CCNA

CCNA Security

Secutity +

ITIL

Interests

Active in athletics.

All Armed Forces Volleyball Team

Suffolk Community College Men’s Basketball Team

George Mason University Men’s Volleyball Team

Howard University Women’s Volleyball Assistant Coach

George Washington University Women’s Volleyball Assistant Coach

 

 

 



Experience

BACK TO TOP

 

Job Title

Company

Experience

Network Engineer

Northrop Grumman Information Technology Global Corporation

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Date of Availability:

Immediately

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Top Secret

US Military Service:

Yes

Citizenship:

US citizen

 

 

Target Job:

Target Job Title:

Network Engineer

 

Target Company:

Company Size:

 

Target Locations:

Selected Locations:

US-DC-Washington/Metro

Relocate:

No