Jason M.

System Administrator III at New Directions Technologies Inc.
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Greater Colorado Springs Area, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Matt Keys

I worked with Jason when I was stationed at Warner Robins. He was always sharp on the job, a great teacher and friend.

Tukayote Gustke

I had the distinct privilege of working with Jason when I was in the US Air Force. Jason is a vital asset to the Air Force and all of the future organizations he will be a part of. Jason strives to develop himself both academically and professionally, and was one of the top technicians in the workcenter we worked together in. Jason was always self-motivated, and would get the job done on time, every-time. I would highly recommend Jason for any networking, systems administration, IT management, or project management position.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • ITIL Foundation 2011
    AXELOS Global Best Practice
    Sep, 2014
    - Oct, 2024
  • Certified Information Systems Security Professional (CISSP)
    (ISC)²
    Oct, 2012
    - Oct, 2024
  • Microsoft Certified Systems Engineer (MCSE)
    Microsoft
    Oct, 2004
    - Oct, 2024
  • Cisco Certified Network Administator (CCNA)
    Cisco
    Jan, 2000
    - Oct, 2024
  • MCSE: Cloud Platform and Infrastructure
    Microsoft

Experience

    • United States
    • Defense and Space Manufacturing
    • 100 - 200 Employee
    • System Administrator III
      • Dec 2018 - Present

      Responsible for managing all aspects of multiple Active Directory environments used for the testing of military assets within the Space Testing and Training Range (STTR) at various security levels. Assists in the evaluation of solutions, including third party and custom developed applications, interacts with cyber security groups to ensure architectures and strategy fits within requirements to maintain compliance, and provides call support to the users of the systems.• Administer Microsoft Windows 2016 server enterprise environments controlling Users, File Shares, Group Policies, Active Directory, Radius, and DNS.• Operates and maintains ACAS systems on RedHat Linux for vulnerability assessment.• Operates and maintains McAfee ePO and associated applications.• Operates and maintains Cisco switch infrastructures.• Developed and implemented a patching and reboot solution to streamline the deployment of updates to domain workstations while minimizing the need for hands on maintenance.• Evaluated and upgraded testing domain systems to bring operating systems to Windows Server 2016 along with updating utilized applications to their latest versions.• Researched and recommended hardware solutions that will allow the expansion of network services while meeting security mandates.• Troubleshot and resolved operations faults in a tape backup solution that restored the ability to capture point in time snapshots of operating virtual machines.• Evaluated previously implemented scripting solution used to capture archived log files that was failing to operate. Restored the ability to archive those logs to meet security guidelines.

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Senior Systems Administrator and Team Lead
      • Sep 2014 - Dec 2018

      Oversees management of capacity resources for the entire NORAD/USNORTHCOM infrastructure. Recommends and oversees new builds, configures, troubleshoots and integrates new and existing servers to provide service enhancements, application deployments and infrastructure upgrades. • Evaluate vendor products and recommend purchases consistent with the organization’s short and long term objectives.• Recommend and implement network policies and procedures and ensure adherence to security procedures (familiarity of the DISA STIG library to prepare for Command Cyber Readiness Inspections (CCRI)).• Administer Microsoft Windows 2003, 2008 and 2012 server enterprise environments controlling Users, File Shares, Group Policies, Active Directory, Certificate Services, Radius, DHCP and DNS.• Designed and implemented a DNSSEC (Domain Name Server Security) infrastructure based on the Windows Server 2012 R2 platform, including the upgrade of all current domain controllers.• Designed and implemented a Role Based Access Control (RBAC) solution for three network domains.• Designed and implemented 4 separate classified domains for remote locations comprising all aspects of Active Directory infrastructure• Secured incoming Windows 10 systems following DISA STIG requirements to 99.7%• Worked to secure Windows Server 2012R2 OSs for domain controllers and member servers to a 95.5% DISA STIG rating.• Designed and implemented an updated DNS caching and website blocking infrastructure based on Windows Server 2012R2 to replace legacy BIND based systems.• Implemented new enterprise subordinate Certification Authority (CA) servers based on Windows Server 2012R2 and phased out legacy Windows Server 2003 systems on NIPRNET and SIPRNET.• NIPRNET, SIPRNET, and NEN (Canadian Network) Operations• Microsoft System Center Service Manager (SCSM) • Microsoft System Center Operations Manager (SCOM) • VMware Products including ESXi and vCenter

    • Malaysia
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Senior System Administrator
      • Jul 2014 - Sep 2014

      Responsibilities include supporting AFSCN Command and Control mission systems as a System Administrator. System’s administration duties are performed on Distributed Communications Controller (DCC) and Electronic Schedule Dissemination (ESD) and other systems as directed by the contract. Provides system account management, system security, data backup, data restore and event log analysis. Provide workstation and server status monitoring, troubleshooting and system maintenance coordination to include preparing maintenance and installation deliverables, completing customer briefs and opening/closing jobs IAW local policies. Reviews maintenance policies, recommends changes and edits in-room procedures to maintain consistency with operating requirements/changes. Interfaces, recommends and reacts to customer inquiries. Maintains applicable inventories IAW local policy. Provides Information Assurance support to include processing Information System Access Control Documentation, End Point Security support and Remanence Security support for all Squadron Information Systems.• Reviewed local procedures for system implementation based on a Windows XP platform and prepared & tested new procedures for accomplishing the same tasks based on a newer Windows 7 platform.

    • Lead, AFNET Migration Support
      • Oct 2012 - Jul 2014

      As an Air Force Network (AFNET) Migrations Project Manager, responsible for budgetary planning and scheduling of Client Support Technicians (CSTs) that deploy to Active Directory migrating locations. Tracks CST spending and formulates estimates of current and projected costs travel costs, dials in to numerous telecons on a daily basis to track current progress and anticipated start dates for future migrations and formulates schedules based on those inputs and handles personnel issues with CSTs (tracking vacations, medical issues, etc.) and works to accommodate those issues in migration assignments. Also works in support of the 561st Network Operations Squardon to oversee migration related projects and tasks to completion (finalizing technical issues, processes, and agreements between units and bases that have completed migration related activites).• Executed project management functions, including the management of scheduling and budgetary requirements for 55 traveling personnel responsible for migrating bases into the combined Air Force Network saving $250K over previous years while migrating twice as many users/computers/sites • Leads/participates in daily meetings tracking active migrations and de-conflicting technical limitations for 55 client support technicians• Oversees post-migration related tasks to completion and settles technical issues/agreements between support organizations and 56 Air Force Bases worldwide• Led network connectivity fix actions for remote site. Facilitated new circuit connectivity increasing bandwidth by 300%• Deactivated 30 legacy networks, standardizing network security and reducing maintenance tasks by 53%Software Experience: Microsoft Active Directory, Microsoft Windows Server 2008/R2, Microsoft Exchange Server 2007, Microsoft Exchange Server 2010, BlackBerry Enterprise Server, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Office Products including Project and Visio

    • Guinea
    • International Trade and Development
    • Network Systems Administrator
      • Aug 1994 - Jul 2014

    • Lead, Enterprise Messaging and Collaboration
      • Nov 2011 - Oct 2012

      Manages a 27 person office consisting of military and contracted personnel responsible for maintaining 250 servers handling email virus scanning, Blackberry and iPad configuration and operations, as well as 175K email boxes on both unclassified and classified networks.• Managed a 27-person office responsible for the administration of Unclassified and Classified Microsoft Exchange 2003/2007/2010 servers, McAfee Ironmail Virus/SPAM scanning, and BlackBerry and iOS mobile messaging devices• Organized Microsoft Risk Assessment finding/remediating 85 deficiencies and optimizing email services for 1.2M mailboxes• Assisted with MS Exchange server outage effecting 65 servers. Established recovery plan and restored 100% service to 65K users• Oversaw response to email latency at off base location. Coordinated site visit for Microsoft technicians, restoring services to 3K users in less than 8 hours- Tracks e-mail sanitization & command directed Freedom of Information Act/OSI investigation data restoration• Propelled maintenance team implementing 2.4K messaging patches on 300 enterprise servers and reducing cyber threats 86%• Authored email litigation hold procedures securing evidence/locked 594 users and advancing 3 Department of Justice investigationsHardware Experince: Dell servers, Dell SAN, HP serversSoftware Experience: Microsoft Active Directory, Microsoft Windows 2003 Server, Microsoft Windows Server 2008/R2, Microsoft Exchange Server 2003, Microsoft Exchange Server 2007, Microsoft Exchange Server 2010, Symantec Anti-SPAM, McAfee Ironmail, BlackBerry Enterprise Server, Microsoft Windows XP, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Office Products

    • Lead, Intelligence Systems
      • Jan 2010 - Oct 2011

      Handles day to day maintenance of client network systems. Additionally handling the purchase and replacement of lifecycle systems, computer budgetary planning, and administration of systems ranging from Unclassified to above Top Secret• Responsible for day to day maintenance and security of 115 Windows XP/Vista/7 client systems• Facilitated $21K purchase and acquisition of hardware to replace end-of-lifecycle systems and software for 2 networks and 20 people• Handled budgetary planning for future hardware purchases for Director’s IT Tech refresh plan, increasing mission readiness by 33%• Implemented $61K NSA approved switch upgrade plan ensuring the security for systems ranging in classification from Unclassified to Top Secret/SCI• Drove fix actions for 500+ help tickets securing 100+ systems and providing crucial unclassified/classified mission capabilities• Configured Blackberry CAC readers increasing security for 15 devices ahead of DoD required timetable• Finished 78 IA certs for acct access and coordinating SIPRNET firewall configuration to Defense Intelligence Agency linking NASIC liaison to DoD mission• Facilitated 6 multi-point desktop VTCs eliminating over $6K TDY costs and enabling key A2-NAF coordination• Instituted Windows 7 migration procedures securing user data from potential loss eliminating negative mission impacts• Tackled 71 AF NOTAM suspenses increasing unclassified network cyber defense and eliminating vulnerabilities/virusesHardware Experince: Dell workstations, HP Printers, BlackBerry Handhelds, CAT5 TerminationSoftware Experience: Microsoft Active Directory, BlackBerry Enterprise Server, Microsoft Windows XP, Microsoft Windows Vista, Microsoft Office Products, Remedy

    • Lead, Network Infrastructure
      • Aug 2008 - Aug 2009

      Managed 14-man office controlling computer network infrastructure and telephone switch administration at the Combined Air and Space Operations Center, Al Udeid AB, Qatar.• Managed 14-person office controlling network, VOIP and regular telephone infrastructure maintaining a 99.9% uptime rate• Corrected 82 network vulnerabilities, optimizing network operations and securing $23M system from cyber threats• Configured, installed and maintained over 600 Cisco networking devices including VOIP, Routers and switches on $65M weapon system comprised of 8 separate & secure domains• Engineered emergency commercial satellite solution for 2-Star general--24/7 HQ reachback during global communication crisis• Identified and corrected fiber optic connectivity fault, restored live full motion video for 8 separate Predator aircraft feeds• Managed CAOC's 8 data networks--120 tickets/1.2K terabytes of data/99.99% uptime 24/7 Command and Control to warfighters• Identified/replaced faulty core switches & restored connectivity to 110 devices enabling seamless Air Tasking Order productionHardware Experince: Cisco Routers and Switches, Fiber Optic Termination, CAT5 Termination, Fiber Optic Testing, CAT5 TestingSoftware Experience: Cisco Unified Communications Manager, Windows 2000, Microsoft Office Products including Visio

    • Network Systems Administrator
      • Feb 2004 - Aug 2008

      Day to day server administration on Windows unclassified and classified networks. Duties included systems patching, backups, configuration, Executive Level Support, and network migration.• 4 years experience as the lead administrator configuring, managing, and maintaining the Air Force Operational Test and Evaluation Center’s (AFOTEC) classified network, its servers and workstations supporting 600 users and 100 workstations• Designed and implemented the conversion of the system architecture from a Windows NT domain to a Windows 2003 Active Directory based system• Responsible for the conversion from Microsoft Exchange Server 5.5 to Exchange 2003• Responsible for the upgrade of user workstations on the classified network from the Windows 2000 operating system to Windows XP and Office 2003• Server team member responsible for the design, configuration and maintenance of AFOTEC’s unclassified network consisting of 85 servers supporting 1100 users located at 27 sites around the continental United States• Performs system start-ups, backups, data restoration, performance evaluations and maintenance on servers• Designed & constructed the Active Directory domain on the AFOTEC Classified Network increasing reliability, availability and security ofclassified operational test and evaluation data• Defended AFOTEC's virtual perimeter-drove security initiatives identifying and plugging 44,365 network security holes• Deployed Windows Software Update Server/enabled automatic push of patches• Designed aggressive classified network; upgraded encryption devicesimproved speed & reliability 1000%Hardware Experince: Dell servers, Dell SAN, HP servers, CAT5 TerminationSoftware Experience: Microsoft Active Directory, Microsoft Windows 2000 Server, Microsoft Windows 2003 Server, Exchange Server 5.5, Exchange Server 2003, BlackBerry Enterprise Server, Windows 2000, Windows XP, Microsoft SMS, Microsoft WSUS, Microsoft Office Products

    • Network Systems Administrator
      • Feb 1999 - Feb 2004

      Lead system administrator in charge of setting up deployable communication packages in austere environments. Operated Windows networks, unclassified and classified, providing initial communication capabilites.• 5 years’ experience designing, implementing, and managing numerous local area networks running the Windows NT Server operating system and its associated databases in remote, forward deployed locations• Served as the lead network administrator for the 28th Expeditionary Communications Squadron Network Control Center, establishing 3 separate classified/unclassified local area networks comprised of over 3000 users.• During the “ILOVEYOU” virus outbreak, loaded the newest virus definitions on 30 base servers and sanitized 4800 email boxes significantly contributing to virus containment. Expertly furthered that containment by instructing co-workers and 50 work group managers on procedures to containand remove the virus• Designed and implemented a full scale network, part of the largest tacticalcommunications enterprise in Air Force history. Provided mission essential secure/non-secure internet, 500 NIPRNET and SIPRNET data connections to 50 workcenters supporting 2000 personnel• Orchestrated a plan to subdivide Iraqi air base into seven separate networks, recovering 1524 network addresses and allowing the separation of US and coalition computers and reducing time to isolate network problems by 50%• Implemented a network topology that increased the base medical facilities’ bandwidth by 1000%, providing medical staff quicker access to critical medical data and patient informationHardware Experince: Cisco Routers and Switches, TACLANE, KIV7 and other cryptographic equipment, HP servers, Theater Deployable Communications (TDC), Fiber Optic Cable TerminationSoftware Experience: Microsoft Active Directory, Microsoft Windows NT Server 4.0, Exchange Server 5.5, Microsoft Windows NT 4.0, Windows 2000, Windows XP, Microsoft Office Products including Visio

    • C4 Systems Network Administrator
      • Feb 1995 - Feb 1999

      4 years experience managing, designing, implementing, and expanding the Global Command and Control System (GCCS) network which supports the Pacific theater and the mission of the Pacific Command (PACOM)• Performed networking hardware configuration to include Routers, Switches, and Modems• Trained in Sun Microsystems computer maintenance as well as experience in dealing with other hardware platforms to include Gateway, Dell, Micron, and IBM• Acted as local administrator dealing with deployable networking and long haul circuit connectivity• Various experience using, managing, and configuring different operating systems to include Solaris 2.3-2.5, Microsoft Windows 95, Windows NT Server and Workstation• Tested equipment and circuits for PACAF's first ever capability of a deployable encrypted network, providing field commanders an integrated data network for joint and coalition force exercise taskings• Installed conduit and fiber optic lines to user terminals throughout the HQ PACAF building, increasing the number of users available to analyze and test GCCS critical applications by 70%• Installed state of the art GCCS network management tools and trained coworkers on capabilities allowing proactive monitoring and providing 75% faster identification and resolution of network connectivity routing problems• Led initiative to transition GCCS from UNIX-based workstations to PCbased solution by designing a server suite reutilizing 20 workstations as application servers for user requirements and saving more than $300K annually and doubling the number of HQ PACAF GCCS users• Helped break ground on new GCCS Top Secret network as Lead Administrator, personally managing all aspects of the critical network with 99.5% uptimeHardware Experince: Cisco Routers and Switches, Fiber Optic Termination, KIV7 and other cryptographic equipmentSoftware Experience: Windws NT Workstation 4.0, Windows NT Server 4.0, Microsoft Office Products including Visio

Education

  • Trident University International
    Master of Science in Information Technology Management, Information Security / Assurance and Digital Forensics
    2011 - 2012
  • TUI University
    Bachelor of Science in Information Technology Management
    2008 - 2010
  • CCAF
    Associates of Information Systems Technology
    1994 - 2007

Community

You need to have a working account to view this content. Click here to join now