Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Resume Feb 2016

233 visualizaciones

Publicado el

  • Sé el primero en comentar

  • Sé el primero en recomendar esto

Resume Feb 2016

  1. 1. LAWRENCE A. PEZALL Hm: (850) 710-8323 pezall@yahoo.com 8271 Gulf Blvd Apt 605 Cell: (850) 499-5331 larry.pezall@gmail.com Navarre,FL 32566 • Active Top Secret/ SCI Clearance (TS/SCI) - 30 Nov 2015 with CI Polygraph - Aug 2015. EDUCATION and CERTIFICATION • Master of Science in Information Technology Mgmt, Summa Cum Laude, Trident University 2009 • Bachelor of Science in Information Technology Mgmt, Summa Cum Laude, Trident University 2007 • NSA IAM/IAO (IA Manager / Officer) and ISSM/ISSO (Info Sys Security Manager/Officer) qualified • SANS GCIH - GIAC Certified Incident Handler - DoD 8570.01 IAT Level 3 (IAT III) certified • SANS GSEC - GIAC Security Essentials Certification - DoD 8570.01 IAT Level 2 (IAT II) certified • MCSE Windows Server 2012 - Microsoft Certified Solutions Engineer • MCSA Windows Server 2012 - Microsoft Certified Systems Associate • MCITP Server Administrator on Win Server 2008 - Microsoft Certified IT Professional • MCTS Windows Server 2008 AD, Configuration - Microsoft Certified Technology Specialist • MCTS Windows Server 2008 Network Infrastructure, Configuration • MCSA Windows Server 2008 - Microsoft Certified Solutions Associate • CCNA Data Center - Cisco Certified Network Associate - Data Center • VCP5-DCV - VMware Certified Professional 5 Data Center Virtualization • NCIE Data Protection - NetApp Certified Implementation Engineer - Data Protection Specialist • NCDA - NetApp Certified Data Administrator - Clustered Data ONTAP • NCDA - NetApp Certified Data Administrator - Data ONTP 7-Mode • EMCISA - EMC Information Storage Associate Version 2 • ITIL Foundation v3 - Information Technology Infrastructure Library - Foundation v3 • CASP - CompTIA Advanced Security Practitioner • CompTIA Project+ LEADERSHIP and MANAGEMENT • April 2014 - Current -- Office of Military Cooperation Kuwait; Leidos, DA GAME, Site Lead • July 2009 - November 2011 -- Ali AB and Sather AB, Iraq; Lockheed Martin, CTSS, Site Lead • September 2004 - June 2009 -- Hurlburt Field, FL; 39th IOS, Manager Information Systems Branch • July 2001 - August 2004 -- Holloman AFB, NM; 49th CS, Network Control Center Operations Manager • Distinguished Graduate United States Air Force Senior Non-Commissioned Officer Academy • Distinguished Graduate United States Air Force Airmen Leadership School TECHNICAL SKILLS • Server, SAN NW hardware: Dell, HP,Cisco UCS Servers,Netapp Flexpods, EMC, Vess Array SANs • Network Infrastructure hardware: Cisco Catalyst, Cisco Nexus Switches and TACLANE KG-175D SPECIALIZED APPLICATION SKILLS • Management Tools: Active Directory, GPOs,DNS, DHCP,Print Server, WSUS, SCCM, KMS • Server OS’s: Windows Server 2003, Server 2008 and Server 2012 • Virtualization: VMWare 5.5,vCenter, vSphere Client, Stand Alone Converter & Management Assistant • Backup and Recovery Software: NetApp SnapMirror, SnapDrive, Snap Manager for Exchange and Snapshots; Symantec Backup Exec and NetBackup, Shadowcopy, XCOPY,Robocopy, Ghost, Acronis • Info Assurance:Password Policy Enforcer, Shavlik, Retina, Blue Coat Proxy, Websense, OCSP • Email: MS Exchange 2003, 2007 and 2010, Office Communication Server and Outlook Web Access • Antivirus Software: Symantec AV Server, McAfee ePolicy Orchestrator 4.5, HBSS, Client AV SW • Misc: Active Roles Server,AtHOC Alert System, Windows Deployment Services, Microsoft Office • Client Operating Systems: Windows 7, Windows 8, Windows 10, Linux, UNIX and Ubuntu • Database Programs:Microsoft Access,Oracle 10g, MySQL, MSSQL 2005, 2008 R2, and 2012 • C4ISR: Falcon View, Google Earth, Tel-Scope, Talon View, IWPC,MIRC, TBMCS and PFPS • Internet/Web Software: HTML, IIS, MS SharePoint Services 3.0, Sharepoint 2007 and 2013 • Trouble Ticket Software: BMC Remedy Action Request System
  2. 2. LAWRENCE A. PEZALL Hm: (850) 710-8323 pezall@yahoo.com 8271 Gulf Blvd Apt 605 Cell: (850) 499-5331 larry.pezall@gmail.com Navarre,FL 32566 WORK HISTORY and PROFESSIONAL EXPERIENCE Mar 2013 – Present Sr. Systems Admin, Leidos, US Embassy/ARCENT G2, Camp Arifjan, Kuwait • Managed $250k network infrastructure upgrade project--CISCO switches, routers and firewalls installed • Led $200k Virtualization Project--physical servers virtualized & migrated to CISCO UCS & NetApps • Managed local email to DISA email migration--worked with DISA to setup directory & onboard users • Modified SnapMirror configs to throttle speed to 1024kb to prevent saturation of links between sites • Installed and configured multiple Flexpod Express NetApp SANs,Cisco UCS’ and Nexus switches • Architected SAN and virtual server solution to replace legacy physical servers at multiple locations • Created Win2008R2 Domain Controllers to replace 2003 DCs to upgrade functional level to 2008 R2 • Migrated Embassy Domain Exchange Services from Microsoft Exchange 2003 to Exchange 2010 • Deployed vCenter Server to manage ESXi servers at multiple sites, infrastructure updates and licensing • Created spreadsheet to track all servers and infrastructure device configurations at all Kuwait Embassy sites to include: processor, memory, disk utilization, name, IP, location and warranty status, etc... • Migrated entire domain at multiple sites from physical servers to virtual servers using ESXi 5.5 • Created 11 new Windows 2008 R2 servers and migrated DHCP,Print and file services at severalsites • Stood up new SCCM 2007 and WSUS services to include SCCM Distribution Point for remote site • Coordinated firewall modifications to open TCP and UDP ports to allow for RDP access,SCCM remote Tools, access to IP KVMs and VMware accessto ESXi’s at remote sites to streamline management • Reconfigured Netapp & VMWare Infrastructure--Upgraded four ESX v3, v3.1 and v4.1 to ESXi v5.5 • Modified NetApps--created new ESXi datastore volumes, removed 22 individual VM datastores • Setup SnapMirrors for ESXi & CIF backups--created Visio SnapMirror configuration diagram • Setup SSH on ESX 4.1 and 5.5 servers to allow secure remote access if the vCenter server fails • Created spreadsheet to track over 500 systems on three networks at three sites to include: processor, memory, name, IP,MAC, location and warranty status to include SAN utilization of nine NetApps • Created new Windows 2008 R2 DODIIS Domain Controller to replace failing domain controller • Created new vCenter Server on JWICS to manage ESXi servers,software updates and licensing • Providing training for several technicians on general troubleshooting of user email & data access issues • Coordinated with DIA to acquire Windows 7 baseline image--Installed OS on 4 systems for remote site • T/S and repaired Print Server--No network access,corrupt NIC drivers system operational in 10 minutes • T/S WSUS issues--failed sync & no patches being pushed, reconfigured source IP and approved updates • Trained Army tech how to configure new raid and migrate data from failing array--100% data preserved • Created ARCENT tracking tool to show how many users/computers haven’t accessed network regularly • Configured/connected remote site NetApp datastores to ESXi hosts, migrated VMs,configured network, iSCSI, VM Startup and shutdown, High Availability and Distributed Resource Scheduler settings • Deployed VSphere Management Assistant (VMA) 5.5 to allow CLI access to multiple ESXi hosts • Troubleshot and fixed multiple users Lotus and Appoveit form issues--corrupt user registry entries • Setup NetApp Snapshots and SnapMirror between local and remote site volumes--100% redundant • Configured DNS name servers and VLAN IP helper addresses on core switch and three remote switches • Coordinated DIA DNS/DHCP migration to INFOBLOX& get SCCM/WSUS configured on all systems Aug 2012 – Mar 2013 Sr. Systems AdminEngineer, Tyonek ServicesGroup, Hurlburt Field, FL • Reconfigured network--Setup four ESXi 5.1 Servers stood-up/migrated 17 network servers on JWICS • Created IA servers to manage network systems; Shavlik, eRetina, WSUS 3.0 and SCCM 2007 Servers • Created Win 2K8 template on JWICS ESXi to be facilitate rapid deployment of fully patched servers • Created new domainsetup core services,Domain Services, DNS, Exchange 2010 and SharePoint 2013 • Created new email server and setup Exchange 2010, migrated from legacy Exchange 2003 server • Created new vCenter Server on JWICS to manage ESXi servers,software updates and licensing • Reconfigured seven server racks,moved two new ESXi servers,vCenter Server and VESS array • Reconfigured Dell 15TB MD3000 SAS SAN—Attached to Video on Demand (VOD) server to increase on-hand storage capacity of multimedia by over 250%--Freed up 5TB VESS array for ESXi Storage
  3. 3. LAWRENCE A. PEZALL Hm: (850) 710-8323 pezall@yahoo.com 8271 Gulf Blvd Apt 605 Cell: (850) 499-5331 larry.pezall@gmail.com Navarre,FL 32566 WORK HISTORY and PROFESSIONAL EXPERIENCE cont. • Created File Server,configured permissions, setup Shadow Copy and seamlessly migrated 2TB of data • Ran vCenter Protect on 209 machines, pushed missing operating system patches to all machines • Setup new 32TB VESS Array for use on JWICS ESXi, provides area to place all virtual servers • Setup DHCP server/migrated scope settings to server,reconfigured switches to point to new server • Setup 2008 R2 server and configured it as KMS Server to provide licensing to new network servers • Migrated domain and forest functional levels of domain from Windows 2003 to Windows 2008R2 • Ran monthly eRetina vulnerability scans on JWICS to identify and remediate over 4,000 vulnerabilities • Installed and configured Windows Deployment Server and AIK to deploy and capture system images • Restored SharePoint site from backup--installed SQL2012 and SharePoint Services 3 on 2008R2 server • Upgraded ESXi server from 4.1 to ESXi 5.1--maintained config and datastores operational in 30 min. • Setup three ESXi servers and a vCenter server,configured domain controller and created new domain • Upgraded Cisco IOS on three 4507 switches, configured SSH and disabled Telnet access to all switches • Completed Physical to Virtual server conversion of eight systems including three domain controllers July 2009 – Aug 2012 SysAdmin III, Lockheed Martin, AFCENT Iraq and Afghanistan • Maintained NIPRNet/SIPRNet/CENTRIXS lans supporting OIF/OEF, AFCENT / ARCENT missions • Directed, supported & managed the day-to-day operations of network admin using local procedures, network documentation, technology acquisitions, budgeting & staffing and performance improvement. • Installed, configured and maintained Dell 1850, 1950, 2850, 2950, R510, R610, R710 servers and multiple NAS / SAN EMC systems. Maintained hardware for Bluecoat Proxies, Sidewinder Firewalls, Riverbed optimization devices, CISCO Intrusion Detection Systems and multiple Dell IP KVMs. • Experienced with Microsoft Powershell for Windows Server 2008 and Exchange 2007 and 2010. • Provided configuration management and continuity support on network design and infrastructure to include domain controllers, print/file/application servers,routers, switches and desktop computers. • Improved the security posture of multiple networks through detection of intruders, malicious codes and cyber attacks by developing countermeasures of known and new vulnerabilities. Applied latest Service Packs,IAVA’s,Hot Fixes and security patches to network servers,workstations and peripherals. • Performed daily checks on Automated Backups Systems, for backups of SharePoint Servers, Exchange Servers, Domain Controllers and Data/File Servers using Veritas Net Backup & Backup Exec Software; ensured backups ran and completed successfully and troubleshot and fixed errors as required. • Installed various peripherals to include: printers (networked and non-networked), digital scanners, digital senders, monitors, KVMs, monitors, external hard drives, projectors and laser pointers. • Performed multiple restores of deleted user data files on local Storage Area Network (SAN). • Modified GPOs to map drives, set user permissions, modify local accounts and misc computer settings. • T/S multiple Group Policy errors,isolated and fixed mis-configured GPOs, eliminating logon problems • Validated/Fixed over 10,500 vulnerabilities from Retina scans and Network Health Assessments • Created SCCM collections and advertisements for Windows 7 OSD deployment to over 700 systems • Created SMS 2003 collections and advertisements for Windows Vista deployment to over 850 systems • Built Print Server for 175 printers; restored network print capability for over 2,100 network users. • Troubleshot and repaired Dell servers,bad Raid card, motherboard and Raid Key,rebuilt Server 2003. Enterprise server and restored SMS 2003 functionality; ensured automated patching of 600+ systems. • Performed weekly maintenance on Active Directory using LDAP queries to find, disable and remove legacy and unused user accounts as well as to find, disable and remove unused computer accounts. • Created SCCM advertisements for severalCTO/IAVA patches; eliminated over 10,000 vulnerabilities. • Troubleshot and resolved severalActive Directory user account and user email account problems. • Created/implemented DHCP tracking spreadsheet for over 450 reservations, eases troubleshooting. • Configured/validated Veritas NetBackups for Domain Controllers, Exchange Servers and file servers. • Performed monthly SCCM pushes of Microsoft, Adobe and Java updates to workstations and servers. • Replaced failed four UPS battery units for Dell EMCs supporting off-site classified network backups.
  4. 4. LAWRENCE A. PEZALL Hm: (850) 710-8323 pezall@yahoo.com 8271 Gulf Blvd Apt 605 Cell: (850) 499-5331 larry.pezall@gmail.com Navarre,FL 32566 WORK HISTORY and PROFESSIONAL EXPERIENCE cont. • Performed monthly SCCM pushes of Microsoft, Adobe and Java updates to workstations and servers. • Replaced failed four UPS battery units for Dell EMCs supporting off-site classified network backups. • Created and modified computer and user logon scripts and pushed via Active Directory GPOs • Created VLAN in DHCP for APC UPS management and 85 DHCP Scopes for Cisco VoIP phones • Trained personnel how to setup dell server and install, patch and configure Microsoft Server 2008. • T/S SMS errors during OSD push, systems not utilizing DHCP had failed, implemented DHCP on domain controller and pushed script via SMS to convert systems to DHCP across classified network. • Planned and ran data storage migration for 3.7TB of data on 3 networks--zero data lost and downtime • Fixed TFTP issues for VLANs on 3 networks--not in the CORE switch and mis-configured in DHCP • Plannedimplemented transfer of critical services; to include Directory Access and Email to new TCF • Coordinated drawdown of 2 Iraq sites--seamless removal of services--no impact on remaining network Sep 2004 – July 2009 Sr. Systems Administrator & Mgr, Info Systems Branch, Hurlburt Field, FL • Managed day-to-day operations and maintenance on medium/large LANs and WANs for various NIPRNet/SIPRNet/JWICS /NSANet/CENTRIXnetworks at multiple locations around the world. • Setup/maintained C4ISR tools; Information Warfare Planning Cell (IWPC),Tel-Scope, Falconview, GoogleEarth, TBMCS for ISR schoolhouse--700+ Intel Analysts trained utilizing real world tools • Performed/oversaw maintenance and installation of $100M in C4ISR Intel collection/processing IT assets whiledeployed in Support of OIF and C2 Combined Forces at Camp Victory,Iraq. • Directed, supported & managed the day-to-day operations of network admin using local procedures, network documentation, technology acquisitions, budgeting & staffing and performance improvement. • Developed and coordinated Disaster Recovery plan and Business Continuity plan and programs in coordination with higher Headquarters’ directives to meet current and future threats and vulnerabilities. • Performed daily checks on Automated Backups Systems, for backups of Exchange Servers,DMS Servers, and Data/File Servers using Veritas NetBackup,Backup Exec and Robocopy Software; ensured backups ran and completed successfully and troubleshot and fixed errors as required. • Conducted network security vulnerability scans on computer systems and network equipment using Retina Network Security Scanner,Shavlik, IIS and various other software packages • Coordinated short notice install of two network nodes to provide range connectivity for Undergraduate Network Warfare Training (UNWT). Utilized project management knowledge and techniques to quantify 10 requirement's for UNWT course,$3.5M project completed on schedule and under budget. • Installed, maintained and troubleshot Information Warfare Planning Capability 4.0 and 4.2 Windows 2003 Based server,running several Oracle and SQL databases as wellas supporting 137 clients. • Ensured Certification & Accreditation of systems using EITDR, NISCAP & DITSCAP processes. • Managed two LAN migration projects, coordinated w/ NSA and DIA, 16 systems seamlessly upgraded. 2000 – 2004 System Administrator & Oper.Mgr, Network Control Center, Holloman AFB, NM • Improved the security posture of multiple networks through detection of intruders, malicious codes and cyber attacks by developing countermeasures of known and new vulnerabilities. Applied latest Service Packs,IAVA’s,Hot Fixes and security patches to network servers,workstations and peripherals. • Provided configuration management and continuity support on network design and infrastructure to include domain controllers, file/application servers,routers, firewalls, switches and desktop computers. • Planned/coordinated/scheduled Holloman AFB’s $9M Combat Information Transport System upgrade. • Led five network work centers to ensure validation/correction of over 22,500 network vulnerabilities which was crucial to overall network security and system integrity while assigned to Balad AB, Iraq. • Supervised 60 personnel from seven network work centers; ensured personnel were properly trained, certified and equipped to maintain, troubleshoot and professionalize a $4.2M communications network. • Designed and reconfigured network power distribution for 24 critical servers supporting over 5,000 users; improved ventilation, doubled backup power redundancy and eliminated potential fire hazards.

×