From:                              route@monster.com

Sent:                               Monday, October 24, 2016 11:01 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: Network ADMIN ccna

 

This resume has been forwarded to you at the request of Monster User xapeix03

Cornelious Jackson 

Last updated:  08/23/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Hempstead, TX  77445
US

Mobile: 4107337083   
cornelious.jackson77803@yahoo.com
Contact Preference:  Mobile Phone

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Cornelious Jackson - IT Specialist

Resume Value: pvdif2j3v3yvcap5   

  

 

Cornelious W. Jackson Jr.

 

108 North Reed Avenue                                                                                                                                              Cell: (410) 733-7083 Bryan, Texas 77803                                                                                                            cornelious.jackson77803@yahoo.com              

 

Network Administrator

 

I am a strategically focused leader with documented success introducing new concepts, building support for innovative ideas, motivating people to thrive, and executing key initiatives across complex enterprises. Diverse positions throughout 15 year career as a United States Navy Cryptologic Technician Communications and Cryptologic Technician Networks; provided a platform to exercise and perfect unconventional thinking to consistently rise to new challenges and excel in fast pace, high risk environments. Hands-on expertise includes but not limited to: LAN/WAN administration, project planning, hardware/software validation, installation, configuration, Technical Control and Video Teleconferencing. Military work ethic complemented with qualifications, education, experience, and personable communications skills to lead and work in concert with diverse groups.

 

Clearance, Professional Training, Education, & Certifications

 

DoD Secret Security Clearance

 

Introduction to Windows NT 4.0 Administration and Exchange 5.5

Advanced Networking and Troubleshooting Concepts

Cisco Certified Network Associate (CCNA) /Firewall Security Program

Basic Digital Network Analysis School

Intermediate Digital Network Analysis School

Network Security Vulnerability Technician School

Cryptologic Technician Communications School

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

 

AAS, Information Technology Excelsior College, Albany, New York

BSAST, Computer Network and Security University of Maryland University College, Adelphi, MD

 

DoD 8570 IAT Level I and II

CNSS 4011

CompTIA Security + CE Certified Professional

CompTIA Network + Certified Professional

Cisco Certified Entry Networking Technician

Cisco Certified Network Associate

Cisco Certified Network Associate Security

Department of Labor Certified Internetworking Technician

Certified in Homeland Security Levels I, II, III, IV & V

 

Technical Expertise

Operating Systems:Windows 9X & ME, Windows NT Workstation & Server 4.0, Windows 2000 Professional &

Server, Windows XP, Windows Vista, Windows 7, Windows Server 2003, Windows Server 2008, Windows Server 2012, Linux, and Unix, CentOS, Ubuntu, Asterisk VOIP PBX

 

Hardware:Cisco 4000/3600/3000/2600/1600 series Routers, Firewalls, Cisco 2900 series Switches, Linksys/Cisco VOIP phones, 3 Com, HP & Netgear Switches, Hubs, Laptops, Desktop Workstations, Servers (HP, Dell, Micron, Compaq, IBM), RAID, SCSI, Modems, Networks Cards, Memory, Hard Drives, Printers, Scanners, and other peripherals, AirTight and Motorola Wireless Access Devices, Sourcefire, FireEye, Commvault

 

Software:Exchange (2000, 2003, 2007, 2010), Microsoft Office Suite, Cisco IOS, McAfee, Norton, Symantec, Acrobat, Active Directory (2000, 2003, 2008), Ping Utilities, WhatsUpGold, Remedy, Hyper-terminal, Ghost imaging, Cisco Network Assistant, OpenVPN, X-Lite, TrueCrypt , VMware vSphere,

 

Network Protocols:LAN/WAN, TCP/IP IPX/SPX, WINS, DNS, DHCP, POP3, SMTP, SNMP, SSH, FTP, TELNET, VPN, ICMP, RIPv1/2, NAT/PAT, EIGRP, BGP, OSPF, STP, TFTP, VOIP

 

Professional Experience

 

Department of Veterans Affairs, Houston, TX                                                        December 2015 – Present

40 hours worked per week

IT Specialist

Provides technical support to computer system end-users (Clients). Duties includes:   installing/integrating computer hardware/software in support of Client requirements (microcomputer workstations, printers, terminals, software updates, etc.); resolving common technical problems; assembling/testing cables and connectors for use in installation; interconnecting medical devices/instrumentation with automated information systems; locating/identifying/correcting communication cabling defects; working closely with Network/Server Managers regarding Client problems, assisting as necessary; documenting/reporting connection changes to ensure accuracy of records; installing and maintaining microcomputer-based desktop operating system software and diagnostic utilities as part of a standard configuration, including customizing the workstation and Client parameters and establishing connections to network resources; diagnosing and resolving Client hardware/software failures; maintaining equipment inventory database; documenting computer virus infestations, assisting in preventing and eradicating viruses, and cleansing infected documents/files; promoting optimum Client service/support through the established quality assurance program, including assessing current technical resources and new requirements and providing recommendations to ensure quality of service; assisting with processing of User Access Agreements for VISTA and Networked PC workstation access; and performs other related duties as assigned.

 

Triple Canopy, Reston, VA June 2011 Dec 2015

40 hours worked per week

 

Information Technology Services/Network Administrator/Helpdesk Technician             

Provide direct network and desktop support to over 200 headquarters personnel, while ensuring remote systems OCONUS maintain the highest degree of functionality for over 2000 personnel.

 

IT Specialist

·         Assist in management of Windows Server 2008/2012 infrastructure.

·         Conducts research into networking issues and products as required.

·   Experience implementing/installing, managing and troubleshooting vSphere ESXI server environments.

·   Responsible for switch management via Cisco Network Assistant and Cisco command line interface.

·   Oversee systems development, enhancement and the integration of new systems with existing systems.

·   Keep current with the latest technologies and determine what new technology solutions and implementations will meet business and system requirements.

·   Instrumental in the financial aspects of the IT Services Division, including purchasing, vendor negotiating, budgeting, and budget review.

·   Develop and implement all IT policies and procedures, including those for architecture, security, disaster recovery, standards, purchasing, and service provision.

·   Manage servers, security solutions, network hardware and equipment.

·   Manage telecommunications infrastructure and development plans, projects, policies and procedures.

·   Coordinate and/or perform additions and changes to network hardware and operating systems, and attached devices; includes investigation, analysis, recommendation, configuration, installation, and testing of new network hardware and software.

·   Provide direct support in the day-to-day operations of network hardware and operating systems; duties include evaluation of system utilization, monitoring response time and primary support for detection and correction of operational problems.

·   Troubleshoot at the physical level of the network, working with network measurement hardware and software, as well as physical checking and testing of hardware devices; at the logical level working with communication protocols such as 802.3, T- 1 and TCP/IP standards. 

·         Administer, configure and support advanced malware solutions such as FireEye.

·   Experience in working on Domain Controllers running as Virtual Servers

·         Sound knowledge of group policy object creation, modification, maintenance, GPO filtering, and troubleshooting.

·         Extensive knowledge of domain security and distribution groups.

·         Identifies requirements for hardware, software, and related products and services to support the LAN.

·   Conduct research on network products, services, protocols, and standards to remain abreast of developments in the networking industry.

·   Perform laptop configuration and initial set up of new user workstations and associated devices.

·   Responsible for receiving and assessing previously used IT equipment capabilities and making a determination on its usefulness in the current operational environment.

·   Completes necessary paperwork to get obsolete equipment out of circulation, and life cycled in accordance with company policies and procedures.   

·   Ensure that all computers on the company network have connectivity via physical LAN connection, wireless access, or VPN.

·   Responsible for ensuring IT equipment for new contract awards meet or exceed the requirements in the specified guidelines of the contract and coordinating shipping efforts to destination.

·   Ensure that software is being purchased from an authorized agent, and tracking the number of licenses issued against software in use.

·   Install\Configure\Troubleshoot VOIP phone connectivity through web based interface and Asterisk PBX command line interface.

·   Creates organizational units, distribution groups, shared mailboxes/individual mailboxes, implemented group policies, and grants file access permissions.

·   Perform initial analysis of customer issues and resolve at first contact whenever possible. While maintaining running documentation of procedures performed in the help desk ticketing system.

·   Follow up with other tiers on tickets that have been escalated to ensure a timely resolution for the customer.

·   Coordinated the migration of 300+ HQ computers (Laptops and Desktop) from Windows XP to Windows 7.

·   Provide expertise and support during systems upgrades, installations, conversions, and file maintenance.

·   Work with staff to develop strategies and plans to enhance client services, improve user effectiveness, and foster innovation.

·   Communicate regularly with executive management and all users of information services and systems.

·   Mindfully flexible to meet the changing needs of users, groups and offices; new projects and technologies; and varying staff strengths.

·   Develop standard operating procedures and best practices, including providing written protocols and guidance to IT staff and to end-users.

·   Ensure the creation and maintenance of all written documentation, including system and user manuals, license agreements, and documentation of modifications and upgrades.

·   Oversee provision of end-user services, including help desk and technical support services.

·   Performs installs, moves, domain add/deletion and changes, data backup/restores, computer virus management, data migrations, and PC refresh activities. 

·         Design, implement, manage, and monitor the enterprise and hosting customer's Active Directory (AD) root services. 

·         Provide support for AD technical problem determination and resolution. 

·   Configure and manage Public Key Infrastructure (PKI) certificate installation/renewals and troubleshooting.

·   Implement, manage and monitor the integration of external services and applications using Lightweight Directory Access Protocol (LDAP).

·   Perform server maintenance, installation, configuration, troubleshooting, maintenance of hardware/software, and other activities as related to system administration of Microsoft Windows Servers (currently 2003/2008) to ensure the availability and functionality of the production systems. 

·   Manage the server cluster environment including configuration, shares and permissions to ensure reliable operations of hosting services. 

·         Develop backup and recovery procedures for recovery from data loss and destruction of data. 

·   Define and/or administer the backup and recovery schedules and procedures including software installation and node management until migrated into enterprise solution. 

·   Maintain and update a variety of images of base server configuration to construct new servers or rebuild servers in accordance with established procedures. 

·   Review and recommend monthly releases of Microsoft patches to maintain security configurations for servers and images. 

·         Schedule and perform monthly patches in accordance with established policies and procedures. 

·   Schedule and perform monthly scanning of servers to manage and report on internet usage and sites visited to ensure usage is in accordance with established procedures.

·   Present technical information before an audience consisting of a wide variety of government representatives on technical IT topics. 

·   Present informational briefings to management on technical IT topics. 

·   Discuss IT issues with clients in order to devise solutions for their IT needs. 

·   Tailor communications to correspond with the audience's level of understanding of IT subjects. 

·   Collaborate with other IT professionals to define and implement IT solutions. 

·   Negotiate with business partners and customers to implement IT initiatives. 

·   Communicate effectively with customers in order to understand their organizational needs and requirements to provide customer service and support.

·   Proofread technical documents (such as Root Cause Analysis, Position papers, technical evaluations) authored by other individuals for issuance to a wide audience. 

·   Write position papers concerning technical subjects for presentation to management officials. 

·   Write reports that describe evaluation findings and recommendations to improve current processes. 

·   Document working files to develop an audit trail for possible future review of work. 

·   Protects system by defining access privileges, control structures, and resources.

·   Recognizes problems by identifying abnormalities; reporting violations, and implementing safeguards to minimize/eliminate reoccurrence.

·   Implements security improvements by assessing operational environment; evaluating evolving threats; anticipating changes to operational environment based on evolving threats and methodologies used for compromising vulnerable systems.

·   Assesses security posture by investigating vulnerabilities identified through system reporting/penetration testing/periodic audits, and determining the most efficient cost effective solution.

·   Responsible for implementing corrective action related to security suite hardware lifecycle/break fix scenarios, as well as ensuring updates to existing and new software that maintains security controls.

·   Responsible for keeping management apprised of system status through periodic performance reports; and communicating upcoming efforts to user base via weekly briefings.

·   Maintains quality service by following established organizational policies , and ensuring new processes are documented in SOP format.

·   Maintains technical knowledge by attending educational workshops; reviewing publications, and participating in technology based conferences.

·   Integral contributor to organizational mission objectives while ensuring a secure platform for communications and data distribution across networks and associated equipment.

 

United States Navy/ Naval Information Operations Command, Pensacola, FL         December 2005 – April 2011

60 hours worked per week

 

United States Navy/Forward Operating Base (FOB), Salerno, AF           August 2007 – March 2008

 

Cryptologic Support Team 18 NCOIC/Geospatial Metadata Analyst             

Provided 24 hour SIGINT targeting/analysis support to both conventional and special operations forces. Duties also included ensuring effective utilization of collection assets in the exploitation of enemy communications, and compiling results into a visual representation of the battle space.

 

·   Parsed/Analyzed more than 10,000 selectors from 108 exploitation products initiating the creation of 91 target packages for high valued targets resulting in the apprehension of over 100 Al Quiada/Taliban affiliates, and effectively removed caches of weapons from stash houses under Al Quiada/Taliban control.

·   Intuitive insight led to the creation of 15 Standard Operating Procedures for re-occurring tasks completed by the Cryptologic Support Team. Expertise and competence provided the in-coming Cryptologic Support Team an effective guide to operations resulting in a seamless turn over and no impact to the mission.

·   Instrumental in leading troubleshooting efforts across three different time zones to resolve five Information Systems outages. Immediate action ensured minimal down time to critical systems vital to time sensitive military operations.

·   Coordinated force protection measures for Task Force Commanders prior to commencement of combat operations, providing an extended measure of security utilizing National collection assets during 123 separate missions.

·   Awarded the Joint Commendation Medal, Afghanistan Campaign Medal, Combat Action Ribbon, and NATO Medal in recognition for a job well done.

 

Malicious Activity Mitigation Team Leading Petty Officer               

Led a team of five analysts in the research, analysis and reporting of worldwide Digital Network Intelligence supporting Fleet, Theater, and National level customers.

 

·   Directed five analysts in the production of three requests for information, analyzed over 510,830 files for operational Commanders and National level agencies in support of global information operations.

 

Computer Network Operations Division Assistant Leading Petty Officer

Lead eight personnel in the submission of six product summaries and completion of two reports for quality control reviews. Efforts directly supported an ongoing, National level computer network and information operations action.

 

·   Dedicated 112 hours of research and analysis for nine priority one missions. Authored nine technical reports and three quality control reviews providing sensitive intelligence data to SOCOM, EUCOM AND CENTCOM Commanders operating in support of the Global War on Terrorism.

·   Provided real time coverage for Fleet units participating in exercise Terminal Fury 2007 in support of Joint Task Force 519 and PACOM Commanders. Timely and accurate identification of cyber-attack traffic resulted in the production of a time sensitive intelligence report earning the support team a Bravo Zulu from the Task Force Commander.

·   Provided 40 hours of essential Job Qualification Requirements training to seven analysts resulting in a 60 percent increase of qualified Digital Network Intelligence analysts across two operational watch sections.

 

United States Navy/Naval Information Operations Command, Kunia, HI       August 2002 – December 2005

60 hours worked per week

 

Information Technology Watch Chief

Effectively dispatched six System Administrators in the daily operation of a 24 hour Information Technology Help Desk including over sight, monitoring, troubleshooting, assessing security vulnerability, and maintenance of 5 networks, 150 UNIX/NT servers, 8 mission systems and 4,200 user accounts.

 

·   1 of 500 First Class Petty Officers Navy wide initially selected to lay the foundation for a new rating (Cryptologic Technician Networks) when the Navy realized the significance of Information Warfare, and created a job specialty that encompassed every element of Computer Network Defense (CND), Attack (CNA), and Exploitation (CNE).

·   Isolated and resolved 43 collection system anomalies for 8 mission systems supporting the command’s 98 percent mission system availability which ensured time sensitive data reached worldwide analysts, Pacific war fighters and tactical decision makers in support of Operation Enduring Freedom and the Global War on Terrorism.

·   Performed over 800 hours of training to 16 newly assigned System Administrators encompassing account creation, troubleshooting procedures/fault isolation, server administration and security requirements for 150 servers and 4,200 workstations.

·   Designed an Advancement-In-Rate training program that prepared junior sailors for advancement examinations resulting in 7 of 10 personnel assigned being promoted to the next pay grade.

·   Coordinated, set-up, and participated in daily Video Teleconferencing briefs between technical directors, and system manager’s worldwide to discuss current outages, resolved outages, troubleshooting efforts and expected time of recovery.

·   Planned, coordinated, and implemented security measures for information systems to regulate access to computer data files and prevented unauthorized modification, destruction, or disclosure of information.

·   Performed risk assessments and executed tests of data-processing system to ensure proper functioning of data-processing activities and security measures.

·   Encrypted data transmissions and configured firewalls to conceal confidential information as it was being transmitted, effectively eliminating tainted digital transfers. 

·   Reviewed violation of computer security procedures and discussed procedures with violators to ensure violations were not repeated.

 

United States Navy/Unified Atlantic Region Network Operating Center DET Hampton RDS, Norfolk, VA April 1999 – May 2002

60 hours worked per week

 

Network Operating Center System Administrator:

Responsible for providing technical support to afloat and shore units, duties to include monitoring system performance, running system security vulnerability software to ensure all security concerns have been addressed per IAVA updates.

 

·   1 of 13 selected out of a pool of 75 candidates to stand up the Navy’s first Top Secret Sensitive Compartmented Information Autonomous Digital Networking System to function seamlessly within a pre-existing unclassified Network Operating Center. This serves as the mold for which all Network Operating Centers within the Navy conducts business.

·   Installed, configured, and supported Unified Atlantic Region Network Operating Center Detachment Hampton Roads local area networks (LAN), wide area networks (WAN), and Internet systems (NIPRNET/SIPRNET).

·   Ensured that all routers, switches, and firewalls were properly configured, maintained and functioning at optimum efficiency in accordance with DOD guidelines.

·   Monitored network to ensure availability to all system users and performed necessary maintenance to support network availability.

·   Maintained and administered computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations.

·   Answered questions or resolved computer problems for clients in person, via telephone, or from a remote location.

·   Provided assistance covering the use of computer hardware and software including printing, installation, word processing, electronic mail, and operating systems.

·   Supervised and coordinated workers engaged in problem-solving, monitoring, and installing data communication equipment and software.

·   Awarded two Navy and Marine Corps Achievement Medals and a letter of appreciation from the Commander of Atlantic Fleet for a job well done.



Experience

BACK TO TOP

 

Job Title

Company

Experience

IT Specialist

Triple Canopy Inc

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Years of relevant work experience:

10+ to 15 Years

Date of Availability:

Within 2 weeks

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Secret

US Military Service:

Yes

Citizenship:

US citizen

 

 

Target Job:

Target Job Title:

Network Security Engineer

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Computer/Network Security

·         Desktop Service and Support

·         Network and Server Administration

·         Software/System Architecture

·         Systems Analysis - IT

 

Target Locations:

Selected Locations:

US-TX-Houston

Relocate:

Yes

Willingness to travel:

Up to 50% travel

 

Languages:

Languages

Proficiency Level

English

Fluent