Resume Updated 20091121

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Resume Updated 20091121 as PDF for free.

More details

  • Words: 854
  • Pages: 2
Patrick Lloyd 107 Stephen Drive, Stonington, CT 06378 (860) 861-3519 [email protected] http://patllo.com

OBJECTIVE To utilize my current skills and build on them in the way of a Systems Administration, Network Administration or Network Security position.

EDUCATION Rochester Institute of Technology Master of Science in Networking and System Administration Expected Graduation: May 2010 GPA: 3.41 Eastern Connecticut State University, Willimantic, CT Bachelor of Science in Computer Science, May 2008 Minor in Communications 3.51 GPA COMPUTER SKILLS Visual Basic Scripting HanDbase Database MySQL/SQL Database COURSEWORK Graduate: Secure Wireless Networking Network Management Advanced Routing protocols Emerging Network Technology Undergraduate: Signals and Systems Programming Language Translation Software Engineering

Microsoft Business Desktop Deployment BASH Scripting CentOS/Knoppix/Fedora Linux HMTL Applications (HTA’s) Microsoft System Center Configuration Manager

Research Methods Network Design & Performance Enterprise Networking Organizational Behavior and Leadership Advanced Digital Forensics

System Administration Enterprise Security Covert Channels Project Management

Operating Systems Linear Algebra Hardware Organization and Architecture

Algorithm Analysis Parallel Processing Database Management

WORK EXPERIENCE Rochester Institute of Technology December 2008 – Present Finance and Administration Systems & Technologies – Cascade Manager • Supervise and take part in the configuration and delivery of computer systems to Finance and Administration staff across RIT campus. • Assist in troubleshooting technology related issues called into the FAST help desk. • Systems administration through account creation within Microsoft Active Directory • Update and modify images for domain implementation using Microsoft Business Desktop Deployment System. Rochester Institute of Technology August 2008 – December 2008 Information & Technology Services – Desktop Engineer • Assisted in the configuration of Microsoft System Center Configuration Manager for administration systems pilot. • Scripted the basic setup of new computers, membership rules, software update templates and computer management within SCCM.

Progeny Systems Corporation

May 2007 – August 2008 Non-Tactical Data Processing System Intern • Built, Maintained and Troubleshot Virtual Machine (VMWare) servers and workstations for testing purposes. • Followed strict testing procedures to test online learning systems under the supervision of government witnesses (NAVSEA), later put into use on US Navy submarines and surface ships. • Numerous tasks concerning the installation, uninstallation, testing, database management, and scripting used in the Non-Tactical Data Processing System.

Eastern Connecticut State University April 2006 – May 2008 Environmental Health and Safety Department – Database Administrator • Maintained a database listing fire extinguishers campus wide; transfered data between HanDbase Database and Microsoft Access. • Navigated through campus offices, classroom buildings and residence halls, including high security basements and Child and Family Development Resource Center inspecting fire extinguishers.

ACTIVITIES • • •

Eagle Scout Rank from the Boy Scouts of America Upsilon Pi Epsilon Honor Society Students for Concealed Carry on Campus Rochester Institute of Technology Campus Representative

January 2004 April 2008 May 2009 – January 2010

APPLICABLE PROJECTS Wireless Network Security – Bluetooth Vulnerabilities (Group Project) • Researched and demonstrated the ability for Bluetooth enabled phones to be exploited through packet insertion and social engineering attacks. Used of the “Bluetooth gun” to demonstrate the ability to detect open Bluetooth connections up to 250 feet away Introduction to Systems Administration – Network Setup • Implemented a mixed Windows/Linux based network environment including a DNS server running Active Directory, DHCP server, and multiple connected clients. Enterprise Security – Risk Assessment • Researched the ability for security professionals to evaluate the most risk prone areas of business and calculate the potential loss and risk of lost information using the Octave Allegro Risk Assessment model. Network Management – Network Management Protocols (Partner Project) • Demonstrated the ability to implement Simple Network Management Protocol (SNMP) in a local area network environment. SNMP was enabled, configured and polled with Cisco and Extreme Networks brand switches and routers. • Researched the effect on network performance by the implementation of spanning tree protocol. • Demonstrated the effect on network performance by the implementation of RIP with large numbers of routing tables in multiple local area network environments. Network Design and Performance – LAN and WAN implementation (Group Project) • Researched the implementation of different sized networks, based on requirements given from businesses looking to expand current networks. LAN implementation was within two buildings containing 4 classrooms and 4 offices. WAN implementation was between three separate offices throughout the United States. All research including the equipment needed, pricing, purchasing and implementation were done within groups and reported as theoretical implementations. • Researched the General Dynamics Sectera Edge Secure Smart Phone and its ability to be implemented in a secure office environment. Advanced Routing Protocols – Sensor and Legacy Routing Protocols • Researched the foundations for routing protocols and their implementation in standard LAN environments as well as sensor networks. Specific protocols include EGP and GPSR for LAN and sensor networks, respectively. Thesis – Covert Channels within Voice of IP • Currently researching the ability for the Session Initiation Protocol and Session Description Protocol to be modified to carry covert messages which could only be seen and understood by two agreeing parties able to view the packets on their respective ends. A discussion of Covert Channels, Steganography, Entropy and modification of a packet capture tool to detect covert channels will be part of the project write-up.

Related Documents

Resume Updated
May 2020 23
Resume - Updated
June 2020 13
Resume Updated
May 2020 12
Resume Updated
November 2019 23
Resume Updated
July 2020 12