A complete list of System Administrator duties.
PROVIDED DIRECT SUPPORT TO AN ADMIRAL (Flag Officer) at a Regional Headquarters
location. Maintained databases, established accounts and configured communications and system
interfaces. Served as primary individual responsible for achieving IT project objectives. Planned
and implemented the enterprise structural framework to align IT strategy, plans, and systems
with Navy mission, goals, structure, and processes. Evaluated IT methods and procedures to
recommend improvements or modifications related to internal systems. Oversaw IT systems
application design and development. Determined network bandwidth needs and recommended
measures to meet those requirements. Supervised issues regarding resolution that affect
specifications of systems or networks pertaining to processing, budgetary control or statistical
reporting. Troubleshot and performed disaster recovery procedures.
OVERSAW ALL INFORMATION TECHNOLOGY LIFE-CYCLE TASKS while overcoming
constraints such as cost, scope, and time. Isolated and defined unprecedented conditions,
resolved critical problems and integrated new technologies. Conducted cost-benefit analysis
methods, achievement strategies, tools of quality assurance and quality control. Installed,
configured, tested, implemented, and managed the systems environment to support IT
architecture and business needs. Applied proficient knowledge of the architecture and typology
of software, hardware, and networks, including LANS, WANS, and telecommunications
systems, and systems life cycle management. Installed and maintained system upgrades,
operating and security patches. Remained open to change and new information; adapted work
methods in response to changing conditions or unexpected obstacles, and effectively dealt with
ambiguity. Hailed as the “go-to” technician for critical jobs requiring time sensitive execution.
DESIGNED, INSTALLED, OPERATED AND MAINTAINED classified and unclassified
military computer systems and technical operations to support command and control (C2) and
logistical data transmissions. Utilized proprietary programs to collect, manipulate, and distribute
data for a wide variety of applications. Configured Cisco routers, switches, and built firewalls to
protect against cyber-attacks. Managed moves, additions, and changes to existing hardware and
software including IP phones, simple network management protocol, modems, and satellite
transportable terminals. Liaised with other team members to diagnose issues with integrated
systems. Served as communication security account manager, advising, and developing
strategies for software standardization, compatibility, and implementation while maintaining
PROVIDED DESKTOP SYSTEM MANAGEMENT with account monitoring, security,
operating system (OS) installation and system administration functions. Maintained and loaded
cryptographic device and keys. Assisted users with account setup, email configuration, CAC
setup, data backups and desktop and laptop PC problem solving and usage. Documented network
configurations and versioning. Demonstrated proficiency in applying security requirements to an
operating system for the network environment and computer environment. Developed
operational guidance for systems operations, maintenance, and sustainment. Served as the
recognized authority in the analysis and direction of IT programs and issues and in researching,
interpreting, analyzing and applying operations and security guidance.
IDENTIFIED AND SOLVED PROBLEMS relative to installation and functionality issues.
Performed routine software and hardware maintenance and troubleshooting. Conducted
programmatic evaluations, made corrections when applicable, or referred to others for resolution
when necessary. Made determinations involving major uncertainties due to factors such as
changes in requirements, policy, and rapidly evolving technology. Administered and participated
in high-level meetings with staff, customers, and upper-level management, while concurrently
creating and advancing project plans. Provided program leadership; established IT policies and
criteria; and advised senior management on plans, programs, and pending IT developments.
CONDUCTED ANALYSIS TO DETERMINE COMPLIANCE or advantages/disadvantages of
projects. Managed moves, additions, and changes to existing hardware and software including IP
phones, simple network management. Prepared documentation on cost/benefit studies that
involved summarizing information and organizing it in a logical fashion. Monitored, evaluated,
and reported on the status and condition of IT security programs; coordinated corrective actions
to eliminate or reduce risks. Interviewed subject-matter experts to obtain facts regarding work
processes; synthesized the resulting data into charts showing information flow. Planned and
completed assignments independently; informed management of controversial problems and
conferred with management on proposed actions that may have required policy decisions.
SET SHORT AND LONG-RANGE PROJECT WORK PLANS AND SCHEDULES, for both
in-house staff and contracted work. Directed the implementation of project plans to meet
objectives and manage project resources. Translated business rules and processes into
requirements. Provided technical assistance regarding federal procurement and contracting
processes. Assigned work to subordinates based on priorities, difficulty of assignments, and
capabilities. Established guidelines and performance expectations for staff members, provided
feedback, and evaluated employees’ performance.
OVERSAW CONTRACTS FOR IT EQUIPMENT AND SERVICES. Understood and executed
various types of contracts, techniques for contracting and procurement, and contract
administration. Used project management, conflict management, mediation, team building, and
negotiation tools to achieve results. Prepared work statements and technical paragraphs for
specifications. Inspected and tested work performed by contractors. Prepared reports on progress
and problems. Monitored vendor information sources for upgrades and patches. Analyzed
diverse viewpoints to make planning decisions and solve complex problems.
APPLIED CAPABLE INFOSEC EXPERTISE; continually monitored systems and verified the
integrity and availability of hardware, software, server resources, and key processes while
exercising expert knowledge of IT infrastructure and security. Executed ongoing performance
tuning, hardware upgrades, security improvements, and resource optimization. Employed
automated security tools to determine vulnerabilities and implement security countermeasures to
mitigate active and potential risks. Implemented protective measures designed to prevent
unauthorized access, disclosure, acquisition, manipulation, modification, or loss of information.
Reported and responded to any attempt to gain unauthorized access to information, system
failures, virus infections, and other occurrences that could lead to unauthorized disclosure or
destruction of data.