From:                              route@monster.com

Sent:                               Friday, November 4, 2016 8:48 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: PaloAlto

 

This resume has been forwarded to you at the request of Monster User xapeix03

Lee Her 

Last updated:  09/09/14

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Denver, CO  80209
US

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Lee Her - Network Administrator

Resume Value: 2axv5r2zz344kwqm   

  

 

Lee Her

LHer@lanwanprofessional.com | (720) 257 – 9365

Summary

IT professional with over 8 years of experience in administration, on-site support, engineering, installation, configuration and troubleshooting for various technologies for medium to global enterprise environments and include proficiency in routing, switching, security, voice, wireless and data center technologies.

 

Technical Certifications & Skills

§ Secret Security Clearance (Active)SSC

§ Certified WAN ProfessionalCWP

§ Cisco Certified Design AssociateCCDA

§ Cisco Certified Network Associate – Routing/SwitchingCCNA – R&S

§ Certified WAN Enterprise AdministratorCWEA

§ Cisco Data Center AdministratorCDCA

§ Cisco Voice AdministratorCVA

§ Cisco Security AdministratorCSA

§ Cisco Wireless TechnicianCWT

§ CompTIA SecurityCTS

§ Microsoft Certified IT Professional                                                                                                  MCITP

 

Technical Skills Detail

Network Hardware:Cisco Routers (3900, 2900, 1900, 800), Cisco Catalyst Switch (6500, 5500, 4900, 4500, 3000, 3100), Cisco Nexus 5k and 7k Series, Cisco ASA 5500 Series, Cisco WLC, Juniper (E, M, MX, T) Series.

Routing/Switching:WAN, LAN, TCP/IP, Spanning Tree, BPDU, CDP, Frame-relay, PPP, ACL, Network Address Translation (NAT), Port Address Translation (PAT), Access Control List, RIP, OSPF, EIGRP, BGP, MPLS, VTP, SNMP, SMTP, ARP, TCP, UDP, Static Routing, Stub Routing, VLAN Trunking, Multi-Area OSPF, VLAN, VTP, HSRP,  SVI, CEF, Etherchannel, Portfast.

Voice Technologies:Computer Telephony Integration (CTI), VoIP, Cisco Unified Call Manager (CUCM), QoS, PoE, H.323, SIP, MGCP, RTP, SCCP, SRTP, UCCM, UCCX.

Security Technologies:AAA, IPS/IDS, TACACS+, RADIUS, SSH, VPN, Cisco ACS, Data Loss Prevention, IPSec, Data Management Zone, Pretty Good Protection (PGP), Public Key Infrastructure (PKI),  Internet Key Exchange Policy, Port Security, IPS/IDS.

Wireless Technologies:IEEE 802.1x & 802.11 a/b/g/n, WLAN, WAP, AP, SSID, LWAPP, CSMA/CA, Bluetooth, HomeRF, MMDS, LMDS, Aironet, CCK, DSSS.

Monitoring Tools/Hardware:Solarwinds, Syslog, SNMP, Finisar, Wireshark, Remedy, Openview, Cacti, Nagios, VMware, F5, Cisco Works, LogicMonitor, Cisco Security Manager Suite, NX10000, Redcom Slice, DNS Servers, DHCP Servers, NTP Server, TFTP Server, Exchange Server, Blade Servers, Web Servers, FTP, and SFTP.

 

Professional Experience Detail

United States Army Network Administrator2005 – 2014

§ Member to a team responsible for handling the administration and overall support and design of various enterprises LAN/WAN applications and services for multiple U.S Army bases located in US and overseas utilizing satellite terminal.  Tasked with maintaining high availability and reliability for all internal and external users.

§ Technical responsibilities included, but are not limited to the administration, monitoring, maintenance, analysis, installation, configuration, implementation, upgrades, and troubleshooting of various mission-critical network devices, server, routers, switches, VoIP and security technologies.

§ Professional responsibilities included, but were not limited to coordinated projects, documentation of network issues and fixes, change management, following U.S Army policies and procedures, scheduling as needed reports to management and perform periodic review and research for any issues.

·   Specific technical responsibility handled includes but not limited to, configuring and establishing communications with different locations, monitor netork usage via Solarwinds, syslog, SNMP, etc; handling and maintaining secret keys and providing escalation support and maintenance for all network components.

·   Core technologies handled includes, Cisco ASA 5500 series, Cisco IPS, Cisco unified call manager, Cisco router (2700, 2800, series), Cisco switches (3700, 6500 series), Solarwind, Prominia NX1000, Redcom Slice, etc.

 

 

Summary of Technical Accomplishments

Routing & Switching

·               Configure secure privileged administrative access to the Cisco IOS system.  Enable the encryption of system passwords to prevent unauthorized users access to passwords in the system configuration.

·               Configure secure access to the console and sty ports, and set the interval that the EXEC command interpreter waits until user input is detected on the Console and sty ports.  Also, configure the console and sty ports log messaging to not interfere with active device configuration.

·               Configured and administrated VLAN Trucking Protocol to reduce administrative overhead.  Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switches ports following Layer 2 security best practices. 

·               Configured VLAN Trucking Protocol to reduce administrative overhead.  Enable secure sharing of VLAN information to prevent the introduction of rogue devices from affecting the VLAN database. Shutdown unused switches ports following Layer 2 security best practices. 

·               Administrated Local VLANs based on department function, and configure ports with static VLAN assignment, static 802.1Q trunks, and dynamic ISL trucking using Pap for layer 2 forwarding.  Utilize VLAN Spanning-Tree in conjunction with PVST+ for compatibility between Cisco and Juniper switches.  Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.  Modify spanning-tree parameters for manual root bridge assignment.  Implement ether-channels between each switch using Pap for negotiation.  Modify ether-channel load balancing method.

·               Integrated WAN links between sites using frame-relay point-to-point and multipoint connections to establish connectivity between each of the four sites as required.  Establish two frame-relay point-to-point connections between a central site and two remote sites.  Configured multipoint connections between three of the sites forming a full-mesh.

·               Configured EIGRP MD5 Message Authentication between sites to prevent unauthorized insertion of routes into the domain.  Integrate manual EIGRP route summarization to reduce routing protocol demand on CPU resources, memory, and bandwidth used to maintain the routing table. 

·               Configure and administrated OSPF routing with multiple areas for networks between sites.  Implement OSPF MD5 Authentication between each OSPF enabled subnet to prevent unauthorized insertion of routes into the domain. 

·               Integrated static NAT/PAT to provide access to services located on a server in the private network to the public network.  Implement standard and extended access-lists to filter network traffic.

·               Configured backup and recovery of Cisco IOS Images.  Perform password recovery on Cisco IOS routers/switches and a Juniper EX2200 Series switch to restore administrative access.  Backup and Restore startup-comfit file for disaster recovery.

 

Security

·               Configured and administrated an IPSec Site-to-Site VPN between the Cisco ASA5505 at small office location and Cisco 1841 ISR with a security IOS image at the main office.  Implementation of the VPN includes the following configurations:  Internet Key Exchange Policy using DES and SHA for encryption and authentication, access-lists to define VPN traffic, transform set using esp.-des esp-sha-hmac to define how the traffic is protected, crypto-map to associate the previously configured elements to a peer, and application of the crypto map to appropriate interface or VPN endpoint. 

·               Configured and administrated Zone-Based Policy Firewall on the Cisco 1841 ISR with the following components:  three zones, class-maps specifying traffic that must have policy applied as it crosses a zone-pair, policy maps to apply action to the class-maps’ traffic, zone-pairs, and application of policy to zone pairs.

 

Voice

·               Installed Cisco 2811 ISR (VoIP) with a Cisco Unity Express Network Module (NM-CUE) installed, Cisco Communications Manager Express, a standard Cisco 3550 Switch, and a Cisco 3550 switch with Power-over-Ethernet.  Create and manage Data and Voice VLANs, and configure ports with static VLAN assignment and 802.1Q trunks for layer 2 forwarding.  Configure edge ports for fast-transitioning into the forwarding state to fix workstation startup connectivity delays.

·               Configure Fast Ethernet main and sub-interface assignments as required for intervlan routing.  Implement static routes for local connectivity.  Configured NTP server, DHCP server, and TFTP server for support of the VoIP network.  Modification of system level parameters including max phones, max directory numbers, display format for date and time, and setting the Time-Zone. 

·               Integrate Unity Voicemail on the Cisco Unity Express Network Module.  Configure a dial-peer on the Cisco 2811 ISR to define the attributes of the packet voice network connection to the Cisco Unity Express Network Module.  Enable call forwarding on busy or no answer.  Implement Message Waiting Indicators and Voicemail access via SMTP.  Daisy-chain PCs to VoIP phones to reduce network cabling costs.  Utilize PoE ports for VoIP phones to reduce power infrastructure costs.

 

Wireless

·               Administrated a wireless network infrastructure providing access to wired LANs to increase mobility and productivity utilizing the following network elements:  Cisco Wireless LAN Controller (WLC) 2106, a Cisco 3550 switch, a Cisco 1130AG series Access Point, and a Cisco 1121G series Access Point.  Create wireless LANs and configure interface association, security parameters, and radios used.  Utilize the Wireless LAN Controllers web GUI to configure and manage the wireless network.  Configure internal DHCP scopes for WLANs. 

·               Prepare configuration for AP registration on same subnet as management VLAN and for AP registration on different subnet.  Implement option 43 for DHCP where necessary.  Configure AAA AP policies to allow Self Signed Certifications for APs shipped without a Manufacturer Installed Certificate. Implement AP Grouping to ensure WLAN SSIDs are only broadcast by the APs desired.

 

 

 



Experience

BACK TO TOP

 

Job Title

Company

Experience

Network Administrator

US Army

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Work Status:

US - I am authorized to work in this country for any employer.

 

 

Target Job:

Target Job Title:

Network Administrator

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Network and Server Administration

 

Target Locations:

Selected Locations:

US-CO-Denver