From: route@monster.com
Sent: Thursday, November 10, 2016 3:24 PM
To: hg@apeironinc.com
Subject: Please review this candidate for: Network Engineer TS SCI
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
MICHAEL T. SWIERZEWSKI 38 Cherrywood Drive Goshen, NY 10924 845-703-0161 (cell) swierzmt22@gmail.com Objective: I am looking
for a permanent (non-contractual) management position involving Network
Security Management, Data Center Management and Design, and/or Information
Assurance. I have a preference for domestic and/or international travel
up to 50% of the time, including remote work. Education • University of Maryland College, Adelphi MD • M.S. in Cyber Security (pending 2016) • University of Maryland College, Adelphi MD • B.S. in Computer Networking & Security, 01/2010 to 01/2015 • University of Maryland College, Adelphi MD • B.A. in History, 01/2010 to 2015 • Central Texas College, Eileen TX • Certificate in Information Security Specialist, 01/2013 to 01/2015 • US Navy Journeyman Communications “C” School, NAS Norfolk, VA • Certificate of Completion, 07/2010 to 11/2010 • US Navy Information Systems Technician “A” School, NAS Pensacola FL • Certificate of Completion, Top of Class, Class Leader, 01/2007 to
05/20012 Certifications • CCIE Security Written (Cisco Certified
Internetwork Expert: Security), Cisco • CCNP (Cisco Certified Network Professional), Cisco • CCDP (Cisco Certified Design Professional), Cisco • CEH v8 (Certified Ethical Hacker), EC-Council • Cisco ASA Security 2.0 Skyline
Advanced Technology Services • Cisco MPLS 2.3 Skyline Advanced
Technology Services • Executive Management Certification, MSI
Management & Strategy Institute • Team Supervisor Certification, MSI
Management & Strategy Institute • Information Storage Associate EMC2, EMC2 • VMware Data Center Associate, VMware • MSCP Windows Server 2008 (Microsoft
Certified Professional), Microsoft • CCNA Wireless, Cisco • CCNA Security, Cisco • CCNA (Cisco Certified Network Associate), Cisco • CCDA (Cisco Certified Design Associate), Cisco • Comptia A+, Comptia • Comptia Network+, Comptia • Comptia Security+, Comptia • Comptia Server+, Comptia • HCNA (Huawei Certified Network Associate), Huawei Languages • Italian • Russian • Hebrew Skills • Layer 2 Core Technologies: Metro
Ethernet, QinQ, MPLS, VPLS, 802.1Q, 802.1ad Double-Tagging, C-Vlan (Customer
Vlan), S-Vlan (Service Provider Vlan), CPT Cisco Packet Transport (Layer 2
Redundant Ring) • SAN/NAS: (Unified Storage Area Network/Network Attached
Storage) EMC2 • SDN Software Designed Network: Spirent Test
Center & Avalanche Attack Designer, Qualisystems: Testshell Studio,
Authoring Tool, and Resource Manager • EMC2 VNX: Unified SAN/NAS with UniSphere Management
System • Cisco UCS Platform: UCSM,
VLAN, VSAN, VNIC, Service Profiles, Server Pools, Fabric Interconnects,
Fabric Extenders, Boot from SAN, etc… • Virtualization: VMware, ESXi Hypervisor,
Vmotion, VSphere, and Oracle VMBox • Data Center: FCoE (Fibre Channel over Ethernet), SCSI, iSCSI,
and Fibre Channel • Cisco Access, Core, and Distribution L2/L3 Switches and Routers: Cisco 10K CMTS (Cable Modem Termination System), Cisco ASR9K
(Autonomous System Router), and Cisco 7200. • Diverse Vendor L2/L3 Switches and Routers: CASA 10G CMTS and Huawei X3 and X8 Routers, ZTE OLT, Huawei MA5600T
OLT, CTDI OLT, and Alcatel-Lucent OLT. • Windows Server 2003 & 2008: Configuration
and Administration, Active Directory, DNS, Certificate Authority, Web Server,
File Server, etc… • Load Balancing Techniques: F5
Load/Traffic Balancer BIG-IP Appliances (Layer 4 & Layer 7), Layer 3
Router Load Balancing with Routing Protocols, and Layer 2.5 MPLS Core Load
Balancing via FEC and MPLS Headers. • Network Management: RouterSNMPv3,
NetBrain, and Solar Winds • Security: Sophos Endpoint Security, Cisco ASA Firewall
5550, Microsoft ISA Firewall & Web Caching Server, Retina Network
Vulnerability, Norton Anti-Virus, Symantec Anti-Virus, Qualysguard, ACLs,
Port-Based Security, NAC, DAC, IPS and IDS systems, Checkpoint Security
Appliances (3200, 5200 series) & Sandblast Threat Extraction Software. • Remote Access: VPN, SSH, AES128
Encryption, Cryptography, Cisco ADS and Cisco ADSM • Routing Protocols: EIGRP, OSPF, iBGP, eBGP,
IS-IS, RIPv1, and RIPv2 • Data Center Redundancy: RAID
Configurations, Active Directory Site-to-Site Replication, and VERITAS Backup
Manager • ISP (Internet Service Provider) Technologies: MPLS, VPLS, Optical, OLT (Optical Line Terminal), MEF (Metro Ethernet
Forum), Cable Labs Specifications, DOCSIS 2.0, PON (Passive Optical
Networks), HFC (Hybrid Fiber Coax Networks), EPON (Ethernet Passive Optical
Network), DPoE (DOCSIS Provisioning of Ethernet Passive Optical Networks),
WDMPON (Wavelength Division Multiplexing Passive Optical Network), CPT (Cisco
Packet Transport), MPLS Core, VoIP, BSoD (Business Services over DOCSIS T1
Line Replacement), Metro Ethernet E-LINE, E-TREE, and E-LAN topologies, RFC
2544 Testing, and SPIRENT Test Center. • RF (Radio Frequency) Technologies: IP via
SHF (Super High Frequency) Satellite Communications, IP via EHF (Extremely
High Frequency) Satellite Communications, UHF (Ultra High Frequency) Voice
Circuits, Multiplexers, Couplers, and SATCOM planning systems. • Cryptology: Key Management Systems, Proper Destruction of Classified
Materials, Key Accountability, Key Tapes, Key Transmission, Proper Secured
Storage of Classified Materials, TS-SCI Government Clearance (Top Secret,
Special Compartmentalized Information). • Foreign Language Proficiency: English,
Italian, Russian, Hebrew, Arabic Work History Mediacom Communications Corp. 1 Mediacom Way, Chester, NY 10918 IP Engineer II (Testing, Security, and Network Design) 10/13 to Present -Lead IP
Engineer involved in DOCSIS Provisioning over Ethernet
(DPoE) testing via Passive Optical Networks (PON) involving multi-vendor
devices including Huawei MA5600T OLT, ZTE 5600 OLT, CTDI OLT, Finisar SFP
ONT, and CTDI D5200 ONTs ensuring vendor inter-operability in conjunction
with Cable Labs standards. -Migrated over 1,000 remote access “TACACS” network devices from Cisco ACS
version 4 to Cisco ACS version 5 ensuring security policies and procedures
were in place for mobile access to the company network in accordance with
Mediacom company policies. -Lead IP
Engineer involved in Gigabit Passive Optical Network
(GPON) and Ethernet Passive Optical Network (EPON) PON solutions including
Fiber-to-the-Home (FTTH) solutions such as Ethernet over Passive Optical
Network over coax (EPOC). -Lead IP
Engineer involved in Business Services over DOCSIS (BSOD)
testing certifying: CASA 10G CMTS, 100G CMTS, CISCO 10K CMTS along with
Spirent Test Center validations involving RFC2544 and 802.1q (Double-Tag)
features. -Technician
involved in new Data Center implementation for Mediacom. Massachusetts Institute of Technology, Lincoln Laboratory (MIT) 244 Wood St, Lexington, MA 02421 Classified Systems Administrator for “Space Surveillance Division 93” 01/13 to 10/13 (Contractor) -Individually
installed, wired, and performed initial setup procedures
for over 10 UCS 5100 Chassis, 80 UCS B-Series Blades, 13 UCS C-Series Blades,
4 UCS 6100 Fabric Interconnects, 2 UCS Fabric Extenders, and 4 Cisco Nexus
Layer 3 Switches providing IP connectivity for multiple classified government
programs. -Individually
installed, wired, and served as lead storage system
administrator for a classified government network involving a hybrid
file/block EMC2 VNX5500
SAN/NAS implementation incorporating various technologies including
virtualization, 10Gigabit Ethernet, Fiber, and SAS. -Created and
managed 3 Block/File storage pools, 2 file systems, 10
RAID groups, and 50 LUNS for EMC2 VNX5500 SAN/NAS system consisting of 120 SAS/FLASH/NL-SAS HDD drives,
2 Storage Processors, 7 DAEs, and 2 X-Blade enclosures totaling over 5,000
Petabytes of classified government data. -Successfully
conducted incremented firmware upgrades to over 100 pieces
of Cisco UCS applicable hardware in an active operational environment. -Utilized Microsoft PowerShell and Cisco UCS Power Tool to create automated
server scripts, inventory system hardware data, and monitor UCS system
functions. -Devised enterprise-level MAC pool, UUID pool, IP address, WWNN, WWPN, Dynamic
VNIC and Dynamic VHBA address schemes for the successful implementation and
connectivity of over and 500+ Virtual Machines, 93+ servers, and SAN/NAS
spanning three geographical sites. -Provided critical IT helpdesk support to MIT Lincoln Laboratory “Space
Surveillance Division 93” team members involving the installation, operation,
and troubleshooting of high graphic-intensive space surveillance/tracking
software. -Designed
and created secure base-line computer system images for space surveillance
division classified projects using Retina Network Vulnerability Scanner,
Symantec Antivirus, and Acronis imaging software. United States Navy USS Vicksburg CG-69 Jacksonville, FL 32233 Information Systems Technician First Class (IT1, E-6) Classified
Systems Administrator 03/07 to 12/12 (Honorable Discharge) -Managed,
operated, and optimized 4 Cisco Routers, 6
Alcatel Switches, 10 Microsoft 2003 servers, one UNIX server, and over 250+
workstations aboard a ship of 360 users in a high-stress environment. -Maintained,
administered, and troubleshot 4 separate LANs: Secret LAN, Unclassified LAN,
NATO Coalition LAN, and a UNIX based NTCSS LAN ensuring that over 360 users
could perform critical tasks. -Managed the local “Cyber PMS” instruction that involved over 100 checks
weekly ranging from network vulnerability scanning and monitoring to ensuring
anti-virus definitions were current according to Naval Information Systems IA
Doctrine. -Served as the
lead SATCOM satellite operator for Extremely
High Frequency (EHF) and Super High Frequency (SHF) systems, ensuring that
WAN radio frequency paths were easily accessible and stable to allow off-ship
internet IP connectivity for over 360 users. -Utilized Microsoft ISA server, router access control lists, switch-port
security, USB scans, and Retina scans to increase overall network security
allowing the ship to have zero major security violations in accordance with
strict Naval Networks Doctrine for both Classified Secret and Unclassified
networks. Norton Antivirus/Internet Security and Symantec used for malware
scanning, malware removal, virus signature updates, and running heuristic
scans. |
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Languages: |
Languages |
Proficiency Level |
|
Hebrew |
Intermediate |
|
|
Italian |
Fluent |
|
|
Russian |
Advanced |
|
|
|