Prairie Star Circle
Springs, CO 80916
To obtain a challenging position within a
environment that will utilize my skills to the benefit of my
prospective employer and myself. I currently in a operations manager
position supporting the war fighter. However I like all area’s
of the technical world
& Results Oriented Intelligent Solid Leader
Skillful Communicator Creative Problem Solver
Independent & Self Reliant
Team Player Analytical & Methodical Deeply Customer Focused
Help Desk Manager.
knowledge and proficiency in network protocols; addressing schemes;
and networking components. Switches, routers, LAN technology,
Satellite modems VPNS.
the process of digital media transmission protocol terminology.
to install network analysis software, monitor, analyze, and
maximize the performance of networks.
knowledge and proficiency in Protocol Analysis and Trace Analysis.
major architectures -including SNA, DEC, TCP/IP and AppleTalk -as
found in live networking environments.
structure and function of major architectures; and given a specific
physical environment, recommend the best architecture for that
ability to work with Network technicians and support engineers to
solve all issues.
to demonstrate knowledge/design and layout of cable wiring
platforms; and electrical platforms.
to demonstrate advanced knowledge of WAN technologies, including
ISDN, Frame Relay, ATM, and Tl.
knowledge of various internetworking support protocols such as the
spanning tree algorithm, source route/transparent bridging, BO2.1Q
standard and value-added features in switches including
store-and-forward, fast forward, flow management, broadcast
control, remote access setup, and management.
implementation, and configuration of VLANs based on a port
a working knowledge of distance-vector as well as link-state
routing protocols such as OSPF; articulate the characteristics of
IGP and EGP as deployed in and between autonomous systems, and
demonstrate understanding of routing concerns such as split horizon
and convergence efficiency.
a working knowledge of the operation as well as the deployment
strategies of enterprise security mechanisms including application
proxies, screened host firewalls, bastion hosts, demilitarized
zones, virus protection programs, and solutions for guarding
against common types of security vulnerabilities.
knowledge of client/server application protocols such as 5MB, NCP,
and NFS through trace analysis.
the network design process including the system development life
cycle; gathering business, user and application requirements;
developing a requirements specification; base lining, analyzing,
and estimating network traffic volumes; developing a logical
network design specification, working the physical network/cable