System Administrator

    A complete list of System Administrator duties.

    PROVIDED DIRECT SUPPORT TO AN ADMIRAL (Flag Officer) at a Regional Headquarters
    location. Maintained databases, established accounts and configured communications and system
    interfaces. Served as primary individual responsible for achieving IT project objectives. Planned
    and implemented the enterprise structural framework to align IT strategy, plans, and systems
    with Navy mission, goals, structure, and processes. Evaluated IT methods and procedures to
    recommend improvements or modifications related to internal systems. Oversaw IT systems
    application design and development. Determined network bandwidth needs and recommended
    measures to meet those requirements. Supervised issues regarding resolution that affect
    specifications of systems or networks pertaining to processing, budgetary control or statistical
    reporting. Troubleshot and performed disaster recovery procedures.

    constraints such as cost, scope, and time. Isolated and defined unprecedented conditions,
    resolved critical problems and integrated new technologies. Conducted cost-benefit analysis
    methods, achievement strategies, tools of quality assurance and quality control. Installed,
    configured, tested, implemented, and managed the systems environment to support IT
    architecture and business needs. Applied proficient knowledge of the architecture and typology
    of software, hardware, and networks, including LANS, WANS, and telecommunications
    systems, and systems life cycle management. Installed and maintained system upgrades,
    operating and security patches. Remained open to change and new information; adapted work
    methods in response to changing conditions or unexpected obstacles, and effectively dealt with
    ambiguity. Hailed as the “go-to” technician for critical jobs requiring time sensitive execution.

    DESIGNED, INSTALLED, OPERATED AND MAINTAINED classified and unclassified
    military computer systems and technical operations to support command and control (C2) and
    logistical data transmissions. Utilized proprietary programs to collect, manipulate, and distribute
    data for a wide variety of applications. Configured Cisco routers, switches, and built firewalls to
    protect against cyber-attacks. Managed moves, additions, and changes to existing hardware and
    software including IP phones, simple network management protocol, modems, and satellite
    transportable terminals. Liaised with other team members to diagnose issues with integrated
    systems. Served as communication security account manager, advising, and developing
    strategies for software standardization, compatibility, and implementation while maintaining
    system integrity.

    PROVIDED DESKTOP SYSTEM MANAGEMENT with account monitoring, security,
    operating system (OS) installation and system administration functions. Maintained and loaded
    cryptographic device and keys. Assisted users with account setup, email configuration, CAC
    setup, data backups and desktop and laptop PC problem solving and usage. Documented network
    configurations and versioning. Demonstrated proficiency in applying security requirements to an
    operating system for the network environment and computer environment. Developed
    operational guidance for systems operations, maintenance, and sustainment. Served as the
    recognized authority in the analysis and direction of IT programs and issues and in researching,
    interpreting, analyzing and applying operations and security guidance.

    IDENTIFIED AND SOLVED PROBLEMS relative to installation and functionality issues.
    Performed routine software and hardware maintenance and troubleshooting. Conducted
    programmatic evaluations, made corrections when applicable, or referred to others for resolution
    when necessary. Made determinations involving major uncertainties due to factors such as
    changes in requirements, policy, and rapidly evolving technology. Administered and participated
    in high-level meetings with staff, customers, and upper-level management, while concurrently
    creating and advancing project plans. Provided program leadership; established IT policies and
    criteria; and advised senior management on plans, programs, and pending IT developments.

    CONDUCTED ANALYSIS TO DETERMINE COMPLIANCE or advantages/disadvantages of
    projects. Managed moves, additions, and changes to existing hardware and software including IP
    phones, simple network management. Prepared documentation on cost/benefit studies that
    involved summarizing information and organizing it in a logical fashion. Monitored, evaluated,
    and reported on the status and condition of IT security programs; coordinated corrective actions
    to eliminate or reduce risks. Interviewed subject-matter experts to obtain facts regarding work
    processes; synthesized the resulting data into charts showing information flow. Planned and
    completed assignments independently; informed management of controversial problems and
    conferred with management on proposed actions that may have required policy decisions.

    in-house staff and contracted work. Directed the implementation of project plans to meet
    objectives and manage project resources. Translated business rules and processes into
    requirements. Provided technical assistance regarding federal procurement and contracting
    processes. Assigned work to subordinates based on priorities, difficulty of assignments, and
    capabilities. Established guidelines and performance expectations for staff members, provided
    feedback, and evaluated employees’ performance.

    various types of contracts, techniques for contracting and procurement, and contract
    administration. Used project management, conflict management, mediation, team building, and
    negotiation tools to achieve results. Prepared work statements and technical paragraphs for
    specifications. Inspected and tested work performed by contractors. Prepared reports on progress
    and problems. Monitored vendor information sources for upgrades and patches. Analyzed
    diverse viewpoints to make planning decisions and solve complex problems.

    APPLIED CAPABLE INFOSEC EXPERTISE; continually monitored systems and verified the
    integrity and availability of hardware, software, server resources, and key processes while
    exercising expert knowledge of IT infrastructure and security. Executed ongoing performance
    tuning, hardware upgrades, security improvements, and resource optimization. Employed
    automated security tools to determine vulnerabilities and implement security countermeasures to
    mitigate active and potential risks. Implemented protective measures designed to prevent
    unauthorized access, disclosure, acquisition, manipulation, modification, or loss of information.
    Reported and responded to any attempt to gain unauthorized access to information, system
    failures, virus infections, and other occurrences that could lead to unauthorized disclosure or
    destruction of data.

    Contact Me