Premium Essay

Network Administrator

In: Computers and Technology

Submitted By javansong
Words 1141
Pages 5
CURRICULUM VITAE

NAME : NYAMACHE EVANS ONGUTI

ADDRESS : P.O. BOX 672 - 00100 GPO NAIROBI

TELEPHONE : 0724–395-908

E-MAIL : javansong@gmail.com, enyamache@jambo.co.ke

MARITAL STATUS : SINGLE

DATE OF BIRTH : 28/10/1984

PLACE OF BIRTH : KISII

NATIONALITY : KENYAN

LANGUAGES : ENGLISH AND KISWAHILI

AGE : 26 YEARS

ID NUMBER : 23769870

CARRIER OBJECTIVES
To design and plan an advanced Telecom infrastructure that services over a million subscribers with ‎Triple Play Services (Voice, Data & Video Services).‎ To contribute to the growth of a progressive company with quality products and services in the field of Telecommunications and Information Technology (ICT).‎

SUMMARY OF SKILLS AND EXPERIENCE

• Total 2 years and 4 months of experience with Advanced Diploma in Telecommunication Engineering and Cisco Certified Network Associate (CCNA). • 2 years and 8 months of experience as Network Engineer (Windows/Linux/Network).

Possess the expertise in the following:

Networking • Installations, Configurations and Troubleshooting of; • Wireless local Area network (WLAN) • Local Area Network (LAN) and Wide Area Network (WAN) Security • Wimax CPE (Alvarion) for SAFARICOM and ACCESSKENYA networks • Free Space Optic link (FSO) • Mikrotik CPE and router. • Nanostation 2.4Ghz and 5Ghz • Cisco routers and switches • Firewalls rules implementation • VoIP servers using IP PABX • Network IP planning • Software and hardware

Windows •...

Similar Documents

Free Essay

Network Administrator

...trained professional seeking a challenging position in the information technology field with an opportunity to utilize my experiences and networking skills. EDUCATION Associate of Applied Science Degree in Computer Network Systems ITT Technical Institute, Orland Park Chicago (June 2010 - JUNE 2012) ACADEMIC FOCUS * Computer hardware * Python (Programming) * Windows Server 2008/Active Directory * Linux System Administration * Database Development * Network Standards and Protocols * Network Application Services and Security * Network Technology and Service Integration * Fundamental of Information System and Security SUMMARY OF QUALIFICATIONS * Operating Systems: DOS, Fedora LINUX. Windows NT,Windows Server 2008, Windows XP/7 * Implementing and Supporting the Functions and Administration of Network Information Systems: Included planning, configuring and Installing file server, work station and print servers in the local area environment. Configured and installed Active Directory (Parent/Child DC, RODC, OUs, Group Policy, User Groups, DNS, DHCP) Configured and installed Fedora Linux (Create, Add or Delete users, Web Server, SAMBA Server, DHCP, IP Tables) * Network Background:Peer-to-Peer and server-based network connections using NetBEUI, TCP/IP Configuredand installed Cisco Routers: ( 1700, 2600, 3600)and Cisco Switches (2950, 2960 series and 2948-GL3) Configured and installed communication Radio and WIFI System s......

Words: 317 - Pages: 2

Premium Essay

Network Administrator

...computing, including distributed virtual services, is an evolving paradigm that is fundamentally and rapidly changing communication services and infrastructure. The diversity of these services and the underlying infrastructure has itself produced different perspectives. In general, most of the many forums dealing with cloud computing have found common ground in the following description (Special Publication 800-145, The NIST Definition of Cloud Computing, Sept 2011 [x])” ( ETSI DTR 101 567 V0.0.5 Lawful Interception (LI);Cloud/Virtual Services (CLI) [y]. Definition of “Cloud Computing” According to NIST: “Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” Cloud Essential Characteristics • On-demand...

Words: 1499 - Pages: 6

Free Essay

Network Administrator

...Security Risk Analysis of time in expansion of network IT projects can be many times a daunting task to both the contracted IT Company and the clients. With some short deadlines, there is usually a small window of opportunity to present skills and produce positive results. As a network administrator, the pressure to deliver top notch and a robust system is a priority. U.S. industry Inc is just a young company that has both the quality and skills and knowledge to produce excellent work considering previous contracts that have been undertaken by the company. The US government department aims to expand its network infrastructure to enlarge the capacity and enable it provide quality services. The cost estimation of the contract is approximately three $3 million dollars lasting for a period of six months. A network administrator’s roles include: Ø setting up of the network Ø Designing and planning of the network Ø Expanding the network Ø Network maintenance Designing and planning of the network a network administrator is tasked with identify the US government departments requirement that necessitates the kind of system to set up. The US department may require certain special specification of their particular network depending on its purpose and objectives. It marks the first phase of the contract. Setting up a network The second phase is where the physical is setting up, and configuration of the network begins. Hardware installation and files,......

Words: 1088 - Pages: 5

Premium Essay

Network Administrator

...during [1/6/2013 -2/12/2013] in [IT401-1301A] with [Kay N. Crook]." Re-use: "This task contains portions of material that were originally submitted during [8/19/2012 -9/26/2012] in [ENGL205-1203B-04] with [Carmen Kimble]." IT326-1401A-01: Network Infrastructure Administration D & S Residential Services Network Implementation Plan-2014 Titius Ivie February 3, 2014 Table of Contents Target Organization 5 Corporate Structure 5 Business Goal 5 Part 1: Proposed Network Solution 7 Network Configuration 7 Transmission Media 7 Targeted Users 8 Hardware and Software Requirements 8 Production Applications 10 External and Internal Costs 11 Personnel (External Costs) 11 Hardware and Software (Internal Costs) 12 Short Term and Long Term Benefits to the Organization 13 Part 2: Network Design 14 Physical Topology 14 Part 3: Installation and Configuration 15 Installation and Configuration Steps 15 Part 4: Maintenance and Troubleshooting 19 Maintaining servers on the network 19 Maintaining PCs on the network 19 Implementing security 20 Managing network connections 21 Unauthorized Usage 21 Proper Network Operating System 22 Training users 23 Conclusion 24 Part 5: Remote Access 26 Network Pro Prep Toolkit Screenshots 27 Screenshot of Completed Labs--Phase 1 27 Screenshot of Completed Labs--Phase 2 28 Screenshot of Completed Labs--Phase 3 32 References 35 Target Organization D & S Residential Services has been......

Words: 4303 - Pages: 18

Premium Essay

Network Systems Administrator Tools

...DEPARTMENT ITSA 255 – Information Systems Security Assignment 4 – Network System Administrator Tools/Utilities Students are to perform independent Internet research and write a short paragraph describing the functionality and utilization for each of the following Network System Administrator Tools/Utilities: * FileZilla FileZilla is a cross platform File Transfer Protocol (FTP) application software that allows the ability to transfer multiple files over the internet. It is made up of a FileZilla client and a FileZilla server. It is available for use with Windows, Linux and MAC OSX. It supports FTP, SFTP (SSH File Transfer protocol), FTPS (FTP secure). Some of the features include support in IPv6, Drag and Drop, Filename feature, Remote file editing, FTP proxy support and much more. It includes two methods to invoke security which is the explicit method and implicit method. Many bug fixes and vulnerability patches were made over the initial release of June 22, 2001. * Nessus Nessus is a open source cross-platform network vulnerability scanner software developed by Tenable Network Security. First introduced during 1998; it was created to be used as a free remote security scanner to the internet community. It allows for various scanning which scans a computer and raises an alert if it discovers any vulnerability that hackers could use to gain access to a computer that is connected to a network. Nessus scans for a certain range of vulnerabilities. It scans......

Words: 856 - Pages: 4

Free Essay

None

...My Dream Job I guess my dream job would be a combination of things. I don’t like just sitting at a desk. I need to get up and move around. I guess it would be a helpdesk role along with a systems administrator and a network administrator. I enjoy working with people hence the helpdesk role. I like the freedom to move around of the helpdesk role. Network administration is the most challenging of the roles. System admin is probably the most mundane of all. The helpdesk requires you to go to a person’s desk and interact with them. In the network admin role you work with the different devices. You may have to troubleshoot a connectivity issue, install a device, and configure the device. In the system admin role you mostly create user accounts, set shares and permissions, create e-mail accounts. To be able to land this type of job I will have to update some of my credentials. Probably go to college for at least an associate’s or maybe a bachelor’s degree. A lot of job advertisements I am seeing are requiring those now. I have experience but no degree. I need to renew my CCNA certification. That entails either going to classes or studying online. Going to classes would be the best because it would go toward a degree and give some hands on experience. The same applies to my A+ certification. Some of the other certifications also need refreshing. At my age I wonder if it would be worth the effort of working toward a degree. It would take over two years to......

Words: 649 - Pages: 3

Free Essay

Pieces Analysis

...its main building in Al-Daffna in addition to the employees of the sport federations who are located outside the main building and using their own network and databases. The IT department of QOC is responsible for the IT from both sides the hardware and the software and all what is related to them in order to facilitate all activities needed to run the authorization and to make sure all the technologies used are up to date, secure and meet the standards. The IT department has many units that is working together to reach the goal of the department as well as the goal of the entire authorization. One main unit of those units is the help desk unit that is responsible in brief for employees' requests to set services, solve problems or incidents. There are more than one way that is used by the help desk unit to interact with employees to help them with their IT needs i.e. call center, emails and the IT services system. This paper contains a comparison and evaluation of the two systems that have been used by QOC IT department to receive users' requests (HP open view, BMC9.1 & BMC10.1) in term of PIECES framework. The evaluation of the system is based on system administrator's point of view and end users' (QOC employees) point of view. An evaluation of the current system (BMC10.1) has been conducted based on employees & administrator surveys & interviews and after the analyzing of those surveys problems with performance and input has been highlighted. A suggested......

Words: 1469 - Pages: 6

Free Essay

Zenmap

...Zenmap Specs * Supported Operating systems: Windows, Mac, Linux, BSD * Cost: Free * Requirements: Nmap Who’s it for? Zenmap is for any network or security administrator who needs to keep a constant check on their network topology. With it’s next-to-zero learning curve, just about any network administrator can have all of the information they need quickly. Zenmap will work for any size company or even a single-user consultancy, where a quick scan of a network topology can make the difference between spotting a security issue and finding a resolution or, well…not. What problem does it solve? There are two very key issues Zenmap solves. One is making the more-challenging Nmap scanner useable for the average administrator. Nmap is a console-only tool and the majority of administrators do not want to spend their day at the console (with a nod to the old-school Linux and UNIX admins who would much rather spend their day at the command line than in a GUI tool). Zenmap also gives the administrator a topology mapping tool where they can actually see an interactive, animated visualization of the hosts on your network. Key features * Free * Easy-to-use GUI * Quickly saves scans * Uses traceroute and ping * Saves profiles for frequent run tests * Topology mapping * Compares scan results of different scans * Runs multiple scans and views them as one big scan * Plenty of default scan profiles to choose from * Searches scan results...

Words: 251 - Pages: 2

Premium Essay

Owner

...System Administrator | ← Job Descriptions Main Page  | ESSENTIAL FUNCTIONS: The System Administrator (SA) is responsible for effective provisioning, installation/configuration, operation, and maintenance of systems hardware and software and related infrastructure. This individual participates in technical research and development to enable continuing innovation within the infrastructure. This individual ensures that system hardware, operating systems, software systems, and related procedures adhere to organizational values, enabling staff, volunteers, and Partners. This individual will assist project teams with technical issues in the Initiation and Planning phases of our standard Project Management Methodology. These activities include the definition of needs, benefits, and technical strategy; research & development within the project life-cycle; technical analysis and design; and support of operations staff in executing, testing and rolling-out the solutions. Participation on projects is focused on smoothing the transition of projects from development staff to production staff by performing operations activities within the project life-cycle. This individual is accountable for the following systems: Linux and Windows systems that support GIS infrastructure; Linux, Windows and Application systems that support Asset Management; Responsibilities on these systems include SA engineering and provisioning, operations and support, maintenance and research and......

Words: 1105 - Pages: 5

Premium Essay

Professional Culture Report

...projected from 2008 through 2018. One of the most important things in the IT field is to keep up to date with the latest trends. There is a chart covering the annual income of some of the careers in the field. As well as a chart that covers the annual total cost of tuition and fees for some of the best online schools. Professional Language and Culture Report What is Information Technology (IT)? IT is an acronym for “Information Technology” and you pronounce it by saying the letters individually. IT is anything related to computing such as the internet, hardware, software, networking, and even the people it takes to operate and maintain the systems. Almost all large companies have their own IT department that manage the computers, servers, networks, security, and anything else that falls into their area of expertise (Techterms, 2011). Culture According to a blog, by La Salle, “Culture has been a constant worry in the Information Technology (IT) field, since it has been observed that culture can influence on the success of IT adoption and usage” (2010). More often than not the professionals in the IT field go unnoticed until something goes wrong. What is really happening is they are behind the scenes operating and maintaining current systems as well as testing and implementing new ideas and technology into the field. The IT field is growing rapidly and is always looking for new professionals. Most of the information conveyed in this field comes through knowledge and...

Words: 1279 - Pages: 6

Free Essay

Resume

...Lauren Lamotte | 7714 Lancer Ct | Niceville, FL 32578 | (850) 408-6789 | lauren.lamotte@us.af.mil November 14, 2015 Linda Vinetti Hiring Manager Capriccio Software, Inc. 3556 Gen DeGualle Blvd New Orleans, LA 70128 Dear Ms. Vinetti: I read of your company’s need for a Linux Systems Administrator in the New Orleans area on Indeed.com. I will be returning to New Orleans after my military enlistment is complete, and I believe that I would be an excellent fit for the company. I have worked as an IT professional in the United States Air Force for over six years, with my last three years working as a Linux Systems Administrator, and I am confident in my ability to become a valuable member of your team. I have an Associates degree in IT, and I am working towards by Bachelors degree in Information Systems Management. I am also professionally certified from Microsoft, Cisco, and CompTIA. As a Linux System Administrator, I have extensive experience in the following areas: * System Administration and Repair * Systems Installation, Configuration & Upgrading * Programming and Scripting * System Security, Backup and Recovery As a supervisor in the United States Air Force, I have experience working in teams, and I thrive under pressure. Additionally, I have excellent communication and interpersonal skills, which......

Words: 894 - Pages: 4

Free Essay

Mircorsoft

...System Administrator Description: Computer networking jobs involve designing, setting up, and maintaining a network. Requirements: Although most users today have their own home networks, setting up, troubleshooting, and maintaining a corporate network can be a much more complicated task. Often, networking jobs also require a good understanding of how a network works, and in some cases how all the underlying protocols and structure of how networks work. Recommendations: There are numerous network and network related certifications available today, such as the CCNA, MCSE, etc. Often depending on the level of certification and the job you are applying for, the certifications will be more than enough to quality you for most network jobs. Some of the higher networking positions, especially in the development of network hardware or programming side, may also require past experience in networking or a degree. Difficulty: (MEDIUM - HIGH) Depending upon the job specifications and the complexity of the network usually determines the difficulty of this job. Networking Security expert Description: Test and find vulnerabilities in a system, hardware device, or software program. Requirements: This position is for someone who has a strong familiarity with how software, hardware, and networks work and how to exploit them. Often, you need to have a good understanding of how the overall system works as well as good programming skills. Recommendations: Keep up-to-date with all security...

Words: 1124 - Pages: 5

Premium Essay

System Admin

... What entails to be a system administrator? * A system administrator (SA) is responsible for managing and maintaining a multiuser computing environment. * He /she looks after computers, networks, and the people who use them. * May look after hardware, operating systems, software, configurations, applications, or security. * A system administrator influences how effectively other people can or do use their computers and networks. SA responsibilities include: * Installing, maintaining and troubleshooting workstations, servers, OSs, software applications and other computing systems * Creating user accounts and assigning user permissions * Executing anti-virus mechanisms * Creating backup * Creating file systems * Monitoring network communication * Updating systems upon release of new OSs or software * Implementing computer, network and security policies for system and network users. * Light programming or scripting * User training and management * Hardware and software system security, such as protection against hardware theft and abuse, malware/spyware and unauthorized use of systems and components, including firewall and intrusion detection system maintenance (http://www.techopedia.com/definition/4815/system-administrator-sa Book:the practice of system and network administration second adition by:Tomas A,limoncile) Consequences of not doing your work as system administrator * There will be number......

Words: 507 - Pages: 3

Premium Essay

System Administrator

...Career Choice: Network and Computer Systems Administrator Business and Writing for the IT Professional July 26, 2009 Abstract A network and systems administrator is responsible for network security, installing new applications, implementing software updates, monitoring the integrity of the system, developing management programs, and performing routine backups. As has been noted throughout my research, there has been a decline in technology majors throughout the past couple of years, thus affecting the job market. The survey that was conducted on high school seniors, as well as research done by some universities, has proven that lack of information and interest affects this type of career choice. By properly informing potential technology students and offering them resources, we can better equip our future system and network administrators to perform to their potential. Topic Proposal Author Background An interest in computers came to my attention shortly after graduating from high school. I first involved myself in working with cameras and fixing them for several customers. The satisfying knowledge that I gained came from realizing that I could take apart, fix a piece of technology and do it well. Computers as a hobby came only after my brother gave me one to fix and keep for my use. Although I was daunted at first, I took apart and drew diagrams, to remember where the components where located. I had no previous experience from computers that I had learned...

Words: 1945 - Pages: 8

Free Essay

Nt1210 User-Profile

...Ellery Corley NT 1230 Wednesday Unit 4. Exercise 1 User-Profile Scenario From: Systems Administrator To: Manager I have reviewed your email inquiry and have the following recommendations. 1. Interns should not have the level of access that allows the changing of their workstations. Thus all interns will be combined into a group for restricted access. This group will be given standard access, not allowing for any changes to workstation unless authorized by System Administrator. This includes the changing of their password every 60 days. 2. Team leads need to have access to their files from any workstation. Thusly, all team leads will be assigned roaming user profiles. This will allow any team lead to access any work station at their convenience as long as the computer is on the network. This will also require team leads to lock or sign out of a work station when they are not using it. Due to the level of access and availability of said access, Team Lead passwords will be set to be changed every 30 days. 3. Since to Marketing Staff have dedicated work stations, they will be added to an ACL, and be designated user rights applicable to their needs. As System Admin, I do understand the need for access to applications, storage, the network, and the ability to change and customize as needed. Due to the level of access that the Marketing Staff will be assigned, they will be required to change their passwords every 30 days. They will be given a......

Words: 326 - Pages: 2