From: route@monster.com
Sent: Tuesday,
October 25, 2016 11:15 AM
To: hg@apeironinc.com
Subject: Please
review this candidate for: Windows Active Directory Domain Administrator
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
Donald K.
Alton
(202)374-4638 | donald.k.alton@gmail.com SUMMARY
AND SKILL An
accomplished senior-level IT Professional with 22 years’ experience
positioned to lead the next generation IT professionals and technology.
Interconnected information management disciplines to deliver value-based
programs with commitment, shared purpose and achievement of enterprise goals
in:
PROFESSIONAL
EXPERIENCE Enterprise
Network Operations / Incident
Manager
July 2014 - Present ARMA Global
(Special Operations Command), MacDill AFB, FL ·
Directly
Manage 25 IT professions and 23 others indirectly located in geographically
separated areas
worldwide. Provides senior level IT planning, engineering and
implementation expertise to assist
with
developing innovative IT engineering technical solutions
concepts and recommendations. ·
Plans,
designs engineers, manages and implement funded technical solutions that
improve efficiency and
effectiveness of critical IT services; analyzes critical network performance
metrics. Performs actions in
compliance with Service Level Agreements
(SLA).
·
Ears and eyes of Special Operation Command
(SOCOM) datacenter providing real world IT situational awareness, ASI,
system administration as the manager of the 24/7/365 incident management and
Tier I & II global data center
monitoring teams. ·
Establish
criteria for Incident Management support requirements, including equipment
and service
coverage, Priority-levels, definitions and characteristics, incident
classification and prioritization schema,
escalation requirements, communication requirements with
Government IT personnel and end-users. Senior
Communications Non-Commissioned
Officer
May 2010 – July 2014 U.S. Air Force, White House Communications Agency,
Washington D.C ·
Served as Senior
Communications Non-Commissioned Officer to President, Vice President,
Military Aides and key staff Provides Information Technology and
Communications support for $220M Multi-Network Enterprise. ·
Lead communicator in
the Presidents Emergency Operations
Center delivering communications, command and control to Air Force
One, Marine One and daily presidential motorcades; Afforded with authority to
activate emergency actions to ensure Continuity of Government. ·
Led IT Project
Management for cyber security / risk, certification & accreditation
efforts for the Presidents Emergency Operations Center (PEOC) as part of the
$600Mil Integrated Operations Center (IOC renovation. ·
Managed / trained and
led team of 22 personal responsible for unique Federal Aviation System,
Monitors Domestic Event Network and Secret Service systems, Missile Warning
Command Systems, Personal Protection Division, Tiger Wall IT communication
systems. Intrusion
Detection / Vulnerability Assessment Manager
May 2006 – May 2010 U.S. Air Force, Pacific
Network Operations Center, Hickam AFB, HI
·
Led team in monitoring / incident response on HQ Pacific Air Force (PACAF) 45k user enterprise
multi-platform network. ·
Managed theatre-wide Cyber Security Vulnerability
Management and Intrusion Detection ASIM sensor grid situational awareness
from Tier 0 to Tier 3 and provide mitigation and improvement recommendations;
perform analysis both verbally and in writing for all sensors, tool events, disruptions, outages and/or
anomalies; coordinate, report and direct network responses through orders,
policies, procedures and guidance from NSA, DISA,, PACOM and the U.S Air
Force. · Analyze all network traffic utilizing Symantec IA,
ESM, CSP, Source Fire, Air Force ASIM applications developed processes and
policy to action CAT events for 10 geographically separated military
facilities spanning 1.2Mil miles. · Performed network auditing / penetration testing /
security inspections / hardening on PACAF wide network. Ran largest PACIFIC Information
technology exercise "Terminal Fury" for three years. · Quick response to Cross Site Scripting, SQL
Injection, Path Disclosure, Denial of Service, Code Execution, Memory Corruption, Cross Site
Request Forgery, buffer overflows and other securing of web based
applications (Data Loss Prevention
goals) · Continuity of Operations (COOP) manager in the
form of disaster recovery and preparedness · Served as Training Manager for IT organization for
130 personnel to include Responsible for task assignments, performance
reviews, and training of IT personnel in support of a 3000+ user and 40+
Windows Network Enterprise, all Domain and infrastructure hardware including
installation, configuration, and maintenance, Windows Domain
administration of permanent locales, Windows Active Directory design and implementation
with deployable elements. Special Intelligence Communications Shift
Supervisor
May 2003 – May 2006 Defense Intelligence Agency, Washington D.C · Defense Message Center Test Administrator
and Program Manager for the Intel Community representing DIA/CIA · CSP Messaging Administrator for Intel
Hub System processing 3 million messages monthly · Decision Agent Administrator processing
message traffic via Microsoft 2003 Cluster Server and Microsoft Exchange 2000
configurations and active directory for Defense Attaches around the world and
LOTUS Notes for State Department · Traffic Analysis/Vulnerability Manager
on CSP, DMS and Exchange Message Traffic · Office continuity of operations
administrator for disaster recovery · Network / System Administrator
functions for MS Server 2000, 2003 / MS Exchange 2000 / 2003 on 5
multiplatform networks for 1200 personnel in Qatar and Iraq that including
deployment and maintenance functions of all servers, backups, patches,
vulnerability management, software management / implementation, upgrades and
user level administration from June 2004 - January 2005 Non-Commissioned
Officer Windows Network Administration
May 2000 – May 2003 U.S. Air Force, Air Force Technical Applications Center –
Patrick AFB, FL · Designed and managed a Windows NT domain
including DNS, WINS, DHCP, and Exchange 5.5 and Exchange
2000 on 3 platforms using Cluster Server configurations. Customers
located throughout the world · Provided account, e-mail, application
support including MS Office 95/97, Lotus SmartSuite, CHCS, Windows
95/98/NT/2000 support, computer
hardware, printers, and backups, restores, and X-Merge · Performed vulnerability
assessments / management tasks, patch management, accreditation and auditing
while
implementing the organizations first cyber specified technology operations Additional
experience / information from previous Air Force assignments &
deployments available upon request EDUCATION AND PROFESSIONAL DEVELOPMENT · Masters Degree: 31
Mar 2013 in Management Info Systems/Digital Forensics (Summa cum Laude 3.85
GPA) · Bachelors Degree: 31
Dec 2011 Info Technology Systems (Cum Laude 3.55 GPA) · Associates Degree:
31 Jan 2009 Computer Info Systems, Community College of the Air Force · COMPTIA Security +
CE Certification May 2015 · SCRUM Master Trained AWARDS · 2012: White House
Military Office Senior NCO of the Year · 2011: White House
Communications Agency Senior NCO of the Quarter · 2009: 67th Network
Warfare Wing NCO of the Year · 2009: 561st Network
Operations Squadron NCO of the Year · 2008: 561st Network
Operations Squadron NCO of the Quarter · 2007: Hickam Air
Force Base Team of the Year (Pacific Air Force Intrusion Detection) ·
2000: 21st Space Group C4 Airman of the Year |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|