From: route@monster.com
Sent: Friday,
November 4, 2016 8:48 AM
To: hg@apeironinc.com
Subject: Please
review this candidate for: PaloAlto
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
Lee Her LHer@lanwanprofessional.com | (720) 257 – 9365 Summary IT professional
with over 8 years of experience in administration, on-site support, engineering,
installation, configuration and troubleshooting for various technologies for
medium to global enterprise environments and include proficiency in routing,
switching, security, voice, wireless and data center technologies. Technical Certifications & Skills § Secret Security Clearance (Active)SSC § Certified WAN ProfessionalCWP § Cisco Certified Design AssociateCCDA § Cisco Certified Network Associate – Routing/SwitchingCCNA
– R&S § Certified WAN Enterprise AdministratorCWEA § Cisco Data Center AdministratorCDCA § Cisco Voice AdministratorCVA § Cisco Security AdministratorCSA § Cisco Wireless TechnicianCWT § CompTIA SecurityCTS § Microsoft Certified IT
Professional
MCITP Technical
Skills Detail Network Hardware:Cisco Routers (3900, 2900, 1900, 800), Cisco Catalyst
Switch (6500, 5500, 4900, 4500, 3000, 3100), Cisco Nexus 5k and 7k Series,
Cisco ASA 5500 Series, Cisco WLC, Juniper (E, M, MX, T) Series. Routing/Switching:WAN, LAN, TCP/IP, Spanning Tree, BPDU, CDP,
Frame-relay, PPP, ACL, Network Address Translation (NAT), Port Address
Translation (PAT), Access Control List, RIP, OSPF, EIGRP, BGP, MPLS, VTP,
SNMP, SMTP, ARP, TCP, UDP, Static Routing, Stub Routing, VLAN Trunking,
Multi-Area OSPF, VLAN, VTP, HSRP, SVI, CEF, Etherchannel, Portfast. Voice Technologies:Computer
Telephony Integration (CTI), VoIP, Cisco Unified Call Manager (CUCM), QoS,
PoE, H.323, SIP, MGCP, RTP, SCCP, SRTP, UCCM, UCCX. Security
Technologies:AAA, IPS/IDS, TACACS+, RADIUS, SSH, VPN, Cisco ACS, Data Loss
Prevention, IPSec, Data Management Zone, Pretty Good Protection (PGP), Public
Key Infrastructure (PKI), Internet Key Exchange Policy, Port Security,
IPS/IDS. Wireless
Technologies:IEEE 802.1x & 802.11 a/b/g/n, WLAN, WAP, AP, SSID, LWAPP,
CSMA/CA, Bluetooth, HomeRF, MMDS, LMDS, Aironet, CCK, DSSS. Monitoring Tools/Hardware:Solarwinds, Syslog, SNMP, Finisar,
Wireshark, Remedy, Openview, Cacti, Nagios, VMware, F5, Cisco Works,
LogicMonitor, Cisco Security Manager Suite, NX10000, Redcom Slice, DNS
Servers, DHCP Servers, NTP Server, TFTP Server, Exchange Server, Blade
Servers, Web Servers, FTP, and SFTP. Professional Experience Detail United States Army
Network Administrator2005 – 2014 § Member to a team responsible for handling the
administration and overall support and design of various enterprises LAN/WAN
applications and services for multiple U.S Army bases located in US and
overseas utilizing satellite terminal. Tasked with maintaining high availability
and reliability for all internal and external users. § Technical responsibilities included, but are not limited
to the administration, monitoring, maintenance, analysis, installation,
configuration, implementation, upgrades, and troubleshooting of various
mission-critical network devices, server, routers, switches, VoIP and
security technologies. § Professional responsibilities included, but were not
limited to coordinated projects, documentation of network issues and fixes,
change management, following U.S Army policies and procedures, scheduling as
needed reports to management and perform periodic review and research for any
issues. · Specific technical responsibility handled includes but not
limited to, configuring and establishing communications with different
locations, monitor netork usage via Solarwinds, syslog, SNMP, etc; handling
and maintaining secret keys and providing escalation support and maintenance
for all network components. · Core technologies handled includes, Cisco ASA 5500 series,
Cisco IPS, Cisco unified call manager, Cisco router (2700, 2800, series),
Cisco switches (3700, 6500 series), Solarwind, Prominia NX1000, Redcom Slice,
etc. Summary of Technical Accomplishments Routing &
Switching ·
Configure
secure privileged administrative access to the Cisco IOS system. Enable
the encryption of system passwords to prevent unauthorized users access to
passwords in the system configuration. ·
Configure
secure access to the console and sty ports, and set the interval that the
EXEC command interpreter waits until user input is detected on the Console
and sty ports. Also, configure the console and sty ports log messaging
to not interfere with active device configuration. ·
Configured and
administrated VLAN Trucking Protocol to reduce administrative overhead.
Enable secure sharing of VLAN information to prevent the introduction of
rogue devices from affecting the VLAN database. Shutdown unused switches
ports following Layer 2 security best practices. ·
Configured VLAN
Trucking Protocol to reduce administrative overhead. Enable secure
sharing of VLAN information to prevent the introduction of rogue devices from
affecting the VLAN database. Shutdown unused switches ports following Layer 2
security best practices. ·
Administrated
Local VLANs based on department function, and configure ports with static
VLAN assignment, static 802.1Q trunks, and dynamic ISL trucking using Pap for
layer 2 forwarding. Utilize VLAN Spanning-Tree in conjunction with
PVST+ for compatibility between Cisco and Juniper switches. Configure
edge ports for fast-transitioning into the forwarding state to fix
workstation startup connectivity delays. Modify spanning-tree
parameters for manual root bridge assignment. Implement ether-channels
between each switch using Pap for negotiation. Modify ether-channel
load balancing method. ·
Integrated WAN
links between sites using frame-relay point-to-point and multipoint
connections to establish connectivity between each of the four sites as
required. Establish two frame-relay point-to-point connections between
a central site and two remote sites. Configured multipoint connections
between three of the sites forming a full-mesh. ·
Configured
EIGRP MD5 Message Authentication between sites to prevent unauthorized
insertion of routes into the domain. Integrate manual EIGRP route
summarization to reduce routing protocol demand on CPU resources, memory, and
bandwidth used to maintain the routing table. ·
Configure and
administrated OSPF routing with multiple areas for networks between
sites. Implement OSPF MD5 Authentication between each OSPF enabled
subnet to prevent unauthorized insertion of routes into the domain. ·
Integrated
static NAT/PAT to provide access to services located on a server in the private
network to the public network. Implement standard and extended
access-lists to filter network traffic. ·
Configured
backup and recovery of Cisco IOS Images. Perform password recovery on
Cisco IOS routers/switches and a Juniper EX2200 Series switch to restore
administrative access. Backup and Restore startup-comfit file for
disaster recovery. Security ·
Configured and
administrated an IPSec Site-to-Site VPN between the Cisco ASA5505 at small
office location and Cisco 1841 ISR with a security IOS image at the main
office. Implementation of the VPN includes the following
configurations: Internet Key Exchange Policy using DES and SHA for
encryption and authentication, access-lists to define VPN traffic, transform
set using esp.-des esp-sha-hmac to define how the traffic is
protected, crypto-map to associate the previously configured elements to a
peer, and application of the crypto map to appropriate interface or VPN
endpoint. ·
Configured and
administrated Zone-Based Policy Firewall on the Cisco 1841 ISR with the
following components: three zones, class-maps specifying traffic that
must have policy applied as it crosses a zone-pair, policy maps to apply
action to the class-maps’ traffic, zone-pairs, and application of policy to
zone pairs. Voice ·
Installed Cisco
2811 ISR (VoIP) with a Cisco Unity Express Network Module (NM-CUE) installed,
Cisco Communications Manager Express, a standard Cisco 3550 Switch, and a
Cisco 3550 switch with Power-over-Ethernet. Create and manage Data and
Voice VLANs, and configure ports with static VLAN assignment and 802.1Q
trunks for layer 2 forwarding. Configure edge ports for
fast-transitioning into the forwarding state to fix workstation startup
connectivity delays. ·
Configure Fast
Ethernet main and sub-interface assignments as required for intervlan
routing. Implement static routes for local connectivity. Configured
NTP server, DHCP server, and TFTP server for support of the VoIP
network. Modification of system level parameters including max phones,
max directory numbers, display format for date and time, and setting the
Time-Zone. ·
Integrate Unity
Voicemail on the Cisco Unity Express Network Module. Configure a
dial-peer on the Cisco 2811 ISR to define the attributes of the packet voice
network connection to the Cisco Unity Express Network Module. Enable
call forwarding on busy or no answer. Implement Message Waiting
Indicators and Voicemail access via SMTP. Daisy-chain PCs to VoIP
phones to reduce network cabling costs. Utilize PoE ports for VoIP
phones to reduce power infrastructure costs. Wireless ·
Administrated a
wireless network infrastructure providing access to wired LANs to increase
mobility and productivity utilizing the following network elements:
Cisco Wireless LAN Controller (WLC) 2106, a Cisco 3550 switch, a Cisco 1130AG
series Access Point, and a Cisco 1121G series Access Point. Create
wireless LANs and configure interface association, security parameters, and
radios used. Utilize the Wireless LAN Controllers web GUI to configure
and manage the wireless network. Configure internal DHCP scopes for
WLANs. ·
Prepare
configuration for AP registration on same subnet as management VLAN and for
AP registration on different subnet. Implement option 43 for DHCP where
necessary. Configure AAA AP policies to allow Self Signed
Certifications for APs shipped without a Manufacturer Installed Certificate.
Implement AP Grouping to ensure WLAN SSIDs are only broadcast by the APs
desired. |
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||
|
|