From:                              route@monster.com

Sent:                               Monday, October 24, 2016 11:01 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: Network ADMIN ccna

 

This resume has been forwarded to you at the request of Monster User xapeix03

Kevin Martin 

Last updated:  08/02/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Upper Marlboro, MD  20774
US

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Network Engineer (Jr) Evening (weekend)Shift

Resume Value: ixvnjehp4nz7z87f   

  

 

Kevin E. Martin
8865 Rollright Court, Unit A
Columbia, MD 21045
Cell:  (443) 300-6037
Email: kevinemartin21@gmail.com


Education:Prince George’s Community College
Major:  Information Technology
Cisco Certified Security Professional (CCSP)
Cisco Certified Network Associate Voice (CCNA Voice)
                      Integrating Cisco Unified Communications Applications (CCNP Voice)
                                       Implementing Cisco Unified Communications Manager, Part 1 (CCNP                 

                                       Voice)
Certified Ethical Hacker
Microsoft Certified Professional (MCP)
                                        Security+

Security Clearance Level: Top Secret

Summary of Experience:

My depth of experience has given me a solid knowledge base of data methodology, software and system applications, equipment configurations, procurement, safeguarding corporate data and disaster recovery.  My diverse experiences have, provided me with an extensive knowledge of data processing, network processing, networking policies, standards and guidelines utilized in the Federal Government and the private sector.

I have over sixteen years of combined expertise in computer support, installing and implementing networks, server maintenance, upgrades, Cisco routers, Cisco switch configuration, and network security. 

 

Currently I am responsible for managing and review documentations, evaluations, and testing of information technology processes and information security controls in the Walter Reed Army Institute of Research (WRAIR) enclave. Manage the security aspects of the information system and day-to-day security operations and prepare the Plan of Action and Milestones (POA&M) for the management. Performs security audit support, change management, security configuration management, incident handling in accordance with DoD requirements. Performs security analysis as part of the system acquisition process in the according to vulnerability, risk, security features, and technical areas. Performs incident investigations, review system audit trails, and create executive summary reports for the command and the regional cyber center, and coordinate corrective actions as appropriate. Performs security analysis as part of the system acquisition process in the according to vulnerability, risk, security features, and technical areas. Performs incident investigations, review system audit trails, and create executive summary reports for the command and the regional cyber center, and coordinate corrective actions as appropriate. Ensures compliance for DIACAP annual review and reaccreditation evaluation and prepares the new accreditation package for the transition to Risk Management Framework (RMF).

 

My network experience includes working with Cisco and Brocade switches and routers, and Lumeta’s IPSonar Network Discovery Tool. My server experience includes Microsoft Servers and NetWare Servers installation, configuration, support, and troubleshooting.  My security experiences include Cisco Secure PIX firewall, Cisco Adaptive Security Appliance (ASA), Cisco Security Agent (CSA), Cisco Adaptive Security Device Manager (ASDM), Cisco Router and Security Device Manager (SDM), Cisco Network Intrusion Detection Systems (IDS), Cisco Network Intrusion Prevention Systems (IPS) and Host Intrusion Prevention (HIP).

 

My remote access experiences include the Installation and Configuration of PIX firewall, Cisco ASA, and working knowledge of Remote and Site-to-Site VPN on Cisco router. My routed and routing protocol experiences include IP, IP Multicasting, IPX, RIP, IGRP, EIGRP, and OSPF. My encapsulation experiences include Frame-relay, x25, HDLC, and PPP. I optimized WANs through Internet with an access solution that reduce bandwidth and reduces WAN costs using features such as Filtering with Access Lists, Policy-Base routing, NAT, and DDR.

Detailed Experience:

Naval Medical Research Center

Cyber Security Specialist

Clearance Level: Top Secret

October 2015 to Present

 

I lead a team of four assigned to WRAIR / NMRC for the Pre-DIACAP assessment. Corrected and documented progress and updates to the Plan of Actions & Milestones (POA&M) associated to the Mitigation Project for pre-DIACAP evaluation and post DIACAP assessment for WRAIR and NMRC. Assured that manual and automated patch management are completed, using Microsoft Windows Server Update Services (WSUS) and Microsoft System Center Configuration Manager (SCCM) to ensure compliance of all endpoints.

 

Provided comprehensive Bi-weekly progress reports detailing vulnerability status, affected systems, category, and severity codes collected from ACAS Vulnerability Scan results. Recommended proper mitigation plans of affected assets in preparation for DIACAP assessment. Ensured all systems are configured in accordance of DISA Security Technical Implementation Guide (STIG) and performed local network security analysis within the NMRC accreditation boundary. Create policy and procedures for the IT department. 

 

Army Review Boards Agency
Information Security Analysis/Information Assurance Specialist
Clearance Level: Top Secret
January 2013 to September 2015

ARBA Point of Contact for Single Agency Manager (SAM), which provides Pentagon Information Technology Services for National Defense community and manages, operates, and maintains IT services for the Pentagon.  Work with SAM if data is compromised and decide steps to resolve the security issue.
Compile data for cyber forensics following a breach.  Implement procedures for monitoring the use of ACTS-related data files and to regulate access, in order to safeguard information in computer files.
Verify information stored on (and/or transmitted via) ARBA computers or networks is not disclosed to unwanted parties or modified inadvertently.  Responsible for completing Certification and Accreditation for the agency.  I use the Security Technical Implementation Guide (STIG) to manually scan the network and use the SCAP Tool electronically scan the network. I use this information to create a report to give the Systems Engineers, Network Engineers, and Developers to resolve non-compliant STIGs. I use ACAS Tenable for weekly vulnerability scans. These vulnerability reports are used for the Systems Engineers to verify previous findings have been resolved, software updates have been properly applied, and to see new findings. Review and research IAVM(s) from weekly ACAS Tenable Scans. Create Plan of Action and Milestones (POA&M). Use ElasticSearch Logstash Kabana (ELK) to collect, centralize, and review logs.

 

 

DISA
Systems Administrator
Clearance Level: Top Secret
October 2011 to November 2012

Maintain and support the IPsonar environment by performing IPsonar deployments, installations, and upgrades on customers’ network.  Provide Tier III help desk and systems support of IPsonar and FreeBSD systems integration with troubleshooting, problem resolution and escalating to development team as needed per policies and procedures. Interface with network support team to troubleshoot connectivity issues, maintain network security, and improve connectivity. Monitor performance, tune, and maintain historical performance data to make and implement recommendations for improvement as necessary.  Perform IPsonar scanning and reporting in support of cyber security activities, document and report system metrics and scan results.  Have working knowledge of Vulnerability Management System (VMS) updating IAVA’s per Retina scan results, mitigating vulnerabilities on systems/software procedures.

Walter Reed Army Medical Center
Network Engineer
June 2008 to September 2011

Member of the Change Control Board that determines which applications, hardware, and software will be allowed on the network. Member of the Data Migration Team that determines which routers, switches, circuits, servers, data, and applications will be relocated/disabled to different Army Bases. Supervise a team of Network Engineers when traveling to other Army Bases to inspect their network infrastructure. When doing inspections I follow the guidelines of MEDCOM/OTSG Reg. 25-1 and Army Regulation 25-2. While onsite I assist Network Engineers with making any changes to the network if needed. Interview potential candidates for Network Engineer positions. Use Retina Network Security Scanner to identify vulnerabilities and scan operating systems. Use Wireshark to troubleshoot sources of network issues and traffic. Use Cisco ASA Firewalls and PIX Firewalls to monitor the network. Use Kiwi Syslog to monitor the network. Installed and configured Cisco routers and Foundry switches.  Assist in the management of over 200 routers and switches.  Maintain inventory for all switches and routers for Walter Reed Army Medical Center.  Responsible for shipping and receiving IT hardware such as switches, routers, network management cards, network modules, and GBICs.

District Government
Office of Chief Medical Examiner
Computer Specialist
September 2001 to April 2008

Installed and configured Cisco ASA and Cisco Secure PIX Firewall, Cisco Network Intrusion Detection System (IDS), and Cisco Security Agent (CSA).  Installed and configured Windows 2003 Servers, VPN on Cisco router, and PIX firewall. Configured, monitored, and maintain agency IDS to ensure that users are not infecting/attacking any internal or external devices due to vulnerabilities/worms.  Monitored and maintained agency firewalls, ensuring that the software is up to date, filters are operating properly and log messages do not indicate any issues associated with the firewall or the policies applied to the firewall.  I installed Cisco Security Agent and configured groups, managed hosts, and configured policies using Cisco Security Agent Management Center.  In addition, I evaluate hardware/software and take into account the operational impact of the products to make sure it works effectively and efficiently.  I also requested quotes from vendors and did a cost benefit analysis on the products.  After, analyzing the products I use Procurement Automated Support System (PASS) to order IT hardware, software, and supplies.

Merck
Network Operator
August 99 to September 01 

Installed, configured, maintained, and troubleshoot Novell Servers, Microsoft Servers, Cisco routers and switches.  Troubleshoot and monitored TCP/IP problems. Installed and implemented IP configuration in a WAN environment.  Installed, configured, and operated routed LAN, routed WAN, switched LAN networks, and DDR connectivity. Optimized WANs through Internet with an access solution that reduce bandwidth and reduces WAN costs using features such as Filtering with Access Lists, Policy-Base routing, NAT, and DDR.  Possess working knowledge of routing protocols/policies including OSPF, HSRP, IP Multicasting, VPN, and EIGRP.  Monitored, configured, and troubleshoot IP network via HP OpenView, CiscoWorks, Sniffer Pro, and Cisco IOS commands. Installed and configured Windows 2000 Server Active Directory (AD).  This also included implementing and troubleshooting AD Group Policies.  I have also configured and supported multiple Windows NT Servers 4, Windows 2000 Servers, Novell Servers, and Windows 2000 Professional workstations for LAN and WAN usage. Responsible for the purchasing of computer related inventory for the company.



Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Work Status:

US - I am authorized to work in this country for any employer.

 

 

Target Job:

Target Job Title:

Network Engineer

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Computer/Network Security

 

Target Locations:

Selected Locations:

US-MD-Prince George's County

Relocate:

Yes