Nana Owusu provides a resume summarizing her qualifications and experience in information technology and networking. She has over 10 years of experience in internetworking, help desk support, and systems administration. Her background includes expertise in Linux, Windows, networking protocols, firewalls, routers, switches and information security certifications. She is currently employed as an Information Assurance Analyst ensuring systems are regularly scanned and audited in compliance with DOD policy.
1. N a n a O w u s u
2 6 8 4 W A VE R LY HI LLS DR . • LA W R E NC E VI LLE , GE O R GI A 3 0 0 4 4
W O R K : 3 1 8 - 4 4 9 - 0 5 8 7 • E MA I L NA NA O 1 1 1 1 U S @ YA HO O . C O M • MO BI LE : 0 9 3 - 7 9 6 4 8 1 6 7 7
- 1 -1
NANA OWUSU 2684 WAVERLY HILLS DR
LAWRENCEVILLR GA 30044 EMAIL:
NANAO1111US@YAHOO.COM
SUMMARY OF QUALIFICATIONS
Over 10 years ofinternetworking experience & computerhelpdesk with various
vendor platforms, specializing in analysis, design and implementation of
network solutions and over 6 years of Linux(Red Hat) and Windows
experience, and in-depth understanding of systems planning for networked
multi-user environments. Self-motivated individual with excellent analytical,
communication, interpersonal and technical skills which is complemented by a
demonstrated ability to work with experts of diverse technical skills and adapt
to changing environments quickly.
EDUCATION
Computer ED College, Warwick, Rhode Island, Wayne State University,
Detroit, Michigan
Computer Science
CERTIFICATIONS
Microsoft Certified Professional (MCP)
CompTIA Network Security+
CompTIA Sever+
CompTIA A+ Certified Technician
CompTIA Advanced Security Practitioner (CASP)
TRAINING
INFORMATION ASSURANCE (IA) TRAINING CERTS • ACAS Intro to
Vulnerability and Compliance Auditing Course January 7, 2016 • DISA ACAS
4.8– 32 Hours March 11, 2016, 2015 • DISA HBSS for Non-Administrator
January 26, 2016 • DoD Information Assurance Roles and Responsibilities v 2
September18,2015 • Dept.of the Army Information AssuranceFundamentals –
40 Hours January 25, 2016
2. N a n a O w u s u
2 6 8 4 W A VE R LY HI LLS DR . • LA W R E NC E VI LLE , GE O R GI A 3 0 0 4 4
W O R K : 3 1 8 - 4 4 9 - 0 5 8 7 • E MA I L NA NA O 1 1 1 1 U S @ YA HO O . C O M • MO BI LE : 0 9 3 - 7 9 6 4 8 1 6 7 7
- 2 -2
HARDWARE
Cisco 10K, Cisco Firewalls (ASA 5500 and PIX 500 Series), Cisco IP Phones,
Juniper M series routers, Cisco 6500/sup32 Catalyst Switches, 3COM
(Ethernet and FDDI Switch), Ascend MAX ISDN routers, Processor
architecture (RISC, CISC).
SOFTWARE
Cisco IOS, Visio Professional, Network Health traffic accountant, Site
Manager, SNMP, Putty, TFTP Server, Device Manager, Remedy, SMARTS,
BMC-Patrol, Cisco Call Manager (CM), Ethereal, Sniffer Pro, Check Point
Firewall, Windows 2008&12, Oracle, SQL, SYBASE, Linux (Red Hat,
Installation methods (optical media, USB, network share, PXE) for Windows
PROTOCOLS
TCP/IP, 802.1x Multi-Protocol Label Switching (MPLS), HSRP, IPX/SPX,
BGP, IS-IS, DNS, HTTP/HTTPS,SSL, IPsec,VPN, CHAP, PAP, FTP, SNMP,
Ether Channel, VTP, STP, OSPF, RIP, RIPv2, EIGRP, PIM, PPP, HDLC, T1,
T3, E1, Fractional T’s, ISDN, ATM, Sonnet, Frame Relay, X.25
PROFESSIONAL EXPERIENCE
VECTRUS- March 2016-Present- Information Assurance Analyst I
Responsible for providing key government personnel with policy coordination
and interpretation support, generalinformation security support, and assisting
with the development and implementation ofa defensive security program that
protects Information systems and documents. Responsible for ensuring and
documenting that all systems are regularly scanned and audited in accordance
with applicable DOD policy and procedures, andthatincidents are documented
and accounted for as necessary through leadership. Employ network scanning
tools such as REM/Retina,SCCM/SMS,WSUS,AV,etc., to detect system and
3. N a n a O w u s u
2 6 8 4 W A VE R LY HI LLS DR . • LA W R E NC E VI LLE , GE O R GI A 3 0 0 4 4
W O R K : 3 1 8 - 4 4 9 - 0 5 8 7 • E MA I L NA NA O 1 1 1 1 U S @ YA HO O . C O M • MO BI LE : 0 9 3 - 7 9 6 4 8 1 6 7 7
- 3 -3
network vulnerabilities/deficiencies, as part of a proactive network security
policy. Utilizing skills to determine if requisite cyber security patches and
remediation procedures have been applied per IAVA requirements. Providing
daily status on findings and recommendations and provide follow-on written
technical analyses.
Using Remedy Data Base to approve tickets on Secret Internet Protocol
Router Network (SIPRNet)
LexisNexis – June 2007 to March 2015- Help Desk Analyst
Installed, configured, and troubleshoot Windows & Linux operating system
Organized lab sessions forCisco router and switch installation, configuration
and troubleshooting for users
Installed PGP & Checkpoint encryption- setup Whole Disk software and
completed the enrollment or registration on users. VPN software
installation and configuration. Pc
Configured access point using windows zero configuration protocol - allowing
wireless clients to join the home network without needing to rewire or re-
configure the Ethernet connections.
Used the Deployment Software- Toolto deploy software patches to user’s pc
Verified various user accounts and unlock the account when usercannot access
the resource or reset password where applicable.
Assisted hundreds of associates correct access issues to the Domain,
SharePoint, VPN, PGP, Same time, Right fax, Service Desk, Service Center,
ACD, Voicemail, Avaya, Remote Desktop, Sales Force, Siebel, Terminal
Servers, Blackberry, Lotus Notes, Mainframe and many others.
IBM Smart Center (CGS) - September 2004 to 2007- System
Administrator
Installed, configured, and troubleshoot Windows Operations systems.
Organized lab sessions forCisco router and switch installation, configuration
and troubleshooting
Provided technical support in a call center environment to IBM customers
specific to IBM Desktop/Laptops and Wireless & LAN related issues. As a
4. N a n a O w u s u
2 6 8 4 W A VE R LY HI LLS DR . • LA W R E NC E VI LLE , GE O R GI A 3 0 0 4 4
W O R K : 3 1 8 - 4 4 9 - 0 5 8 7 • E MA I L NA NA O 1 1 1 1 U S @ YA HO O . C O M • MO BI LE : 0 9 3 - 7 9 6 4 8 1 6 7 7
- 4 -4
senior technical supportteam member, also provide hands on mentoring and
leadership to other team members
Provided network support and management utilizing Cisco Works, Open
view, AR-Remedy Ticketing System and Nortel Device Manager while
effectively interacting with internal, external users and clients to maintain
customer satisfaction.
Troubleshot and supported Global Network Operations infrastructure
consisting of a mixture of LAN/WAN technologies.
Troubleshotlatency issues from subnet to subnet and to various applications.
Supported WAN circuit from various providers ranging from fractional T1
to OC3.
Installed, configured, and managed various models of Cisco routers and
catalyst switches and configuration of PIX/ASA firewalls to ensure
uninterrupted connectivity between sites.
Installed, configured and troubleshot terminal servers for console access to
switches and servers.
Designed and managed IP addressing space to support VLSM.
Assisted in the design and installation of Cisco Catalyst Switches to back up
the existing LAN backbone infrastructure.
Designed and implemented an effective integration of both registered and
private IP address within the LAN/WAN by implementing both Network
Address Translation (NAT) and Port Address Translation (PAT) utilizing
Cisco IOS.
Designed and implemented Hot Stand-by Routing Protocol (HSRP) to
introduce effective router redundant system.
REFERENCES
5. N a n a O w u s u
2 6 8 4 W A VE R LY HI LLS DR . • LA W R E NC E VI LLE , GE O R GI A 3 0 0 4 4
W O R K : 3 1 8 - 4 4 9 - 0 5 8 7 • E MA I L NA NA O 1 1 1 1 U S @ YA HO O . C O M • MO BI LE : 0 9 3 - 7 9 6 4 8 1 6 7 7
- 5 -5
Available upon request