Steven Lee

Systems Engineer II at Avening Management and Technical Services, LLC
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
US
Languages
  • German -

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Derrick Moore

Steve is a top of the line systems administrator who demonstrates his superior technical and leadership skills in the tasks that he's assigned, including those that are difficult and

Brandon Burge

Steve provides his company and colleagues with the skills and know-how to get the job done. While working with Steve I was able to collaborate and work beside him with ease. His enthusiasm to do it right shows that he is a clear leader in his field. Beyond the workplace Steve is always willing to give a helping hand and provide as much help as possible. His technical knowledge far exceeds what is demanded making him an asset to the role he is assigned. I believe Steve could be put on any team and be a valuable asset.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Security +
    CompTIA
    Apr, 2017
    - Oct, 2024

Experience

    • United States
    • Defense and Space Manufacturing
    • 1 - 100 Employee
    • Systems Engineer II
      • May 2014 - Present

      • Lead Engineer responsible for a full range of Global Command & Control System Joint/Air Force (GCCS-J/AF) tasks to include but not limited to RHEL operating system administration, virtualization, system performance monitoring, multi-server troubleshooting, infrastructure upgrades, and information assurance. • Ensure the Common Operational Picture (COP) between 18 Communications Squadron and 613th Air Operations Center is available and operational for the 18th Wing Commander and associated units. • Assist the 18th Communications Squadron with the installation and management of 254 secure encryption devices and 423 SIPRNet devices spanning across four warfighting C4I networks. • Fulfill the functional role and responsibilities of an ISSO as defined within Risk Management Framework for Air Force Information Technology, AFI 17-101. • Perform vulnerability management actions for CCRI preparation; manage risks and mitigation activities for two separate PM system baselines, VTC assets and network infrastructure devices. • Conduct RMF Step 4 Assessment activities involving endpoint security and vulnerability management through ACAS (Nessus), HBSS, and SCCM. • Manage security risks through the Plan of Action and Milestones (POA&M). • Conduct periodic STIG audits, incident response, and disaster recovery activities in support of RMF Step 6 Continuous Monitoring requirements. • Execute procedures that identify and mitigate residual risk consistent with AO approved baseline. • Perform post-accreditation activities to include periodic evaluations and protection from security related events ensuring that newly discovered weaknesses do not negatively impact the IA posture. Key Accomplishments - Achieved 100% CCRI pass rate on two separate accredited PM Guest Systems. - Successfully transitioned GCCS-J ATO baseline form ver. 4.3 to ver. 6.0.

    • United States
    • Computer and Network Security
    • 400 - 500 Employee
    • Systems Engineer II
      • May 2013 - Apr 2014

      • Responsible for performing a full range of Global Command & Control System Joint Air Force (GCCS-J/AF) systems administration tasks to include but not limited to Sun Solaris Unix operating system administration, installation, configuration, system performance monitoring, multi-server troubleshooting, user id/duty position management, infrastructure upgrades and information assurance to ensure operational availability. • Provide software support, validate man-machine interfaces, and correct applicable software interface problems such as panic re-boot, data corruption, cross-compiling, networking, etc. for all GCCS-J/AF related systems. • Perform risk analysis and system configuration audits to ensure that security requirements have been fulfilled. • Recommend courses of action (COA) on deploying and securing information systems. • Conduct security audits and remediation on Command and Control (C2) systems according to Information Assurance guidelines and Department of Defense (DOD) policy. • Successful mitigation of system vulnerabilities for the Command Cyber Readiness Inspection (CCRI) to assist the commander in receiving the best grade for GCCS through the Air Force. • Perform all maintenance actions necessary to render a system or equipment component serviceable by providing remedial /preventive maintenance inspections, fault isolation, installation, de-installation, equipment upgrades, equipment modifications, software assistance, operational verification and documentation.

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Systems Administrator
      • Feb 2010 - Apr 2013

      • Responsible for performing a full range of Global Command & Control System (GCCS) systems administration tasks to include but not limited to Sun Solaris Unix operating system administration, installation, configuration, system performance monitoring, multi-server troubleshooting, user id/duty position management, infrastructure upgrades and information assurance to ensure operational availability. • Provide software support, validate man-machine interfaces, and correct applicable software interface problems such as panic re-boot, data corruption, cross-compiling, networking, etc. for all GCCS related workstations. • Monitor and maintain the GCCS Common Operational Picture (COP) feed between U.S. Pacific Air Force (PACAF) and 18th Wing. • Coordinate with PACAF’s Security Manager to facilitate the creation and management of GCCS user’s accounts, which are required to access various GCCS databases. • Configure Taclanes and Cisco Switches ensuring proper IOS’s and STIG’s are in place for employment • Develop and maintain any technical documentation required by the government or requested by the on-site Quality Assurance Professional (QAP).

    • United States
    • Defense and Space Manufacturing
    • 700 & Above Employee
    • Senior Systems Analyst
      • Feb 2008 - Dec 2009

      • Provided technical support as the subject matter expert to the III MEF Information Management Officer and their Major Subordinate Commands (MSC) on GCCS to include the Tactical Common Operational Picture Server (TCS) and the Joint Tactical COP Workstation (JTCW) in addition to collaborative systems. • Participated in planning conferences for the functional design of various Link 16 primary and Link 11 secondary warfighting network architectures within the PACOM-Asia AOR. • Recommended course of action on deploying and securing information systems. • Manage VMWare virtual infrastructure to include Red Hat Enterprise Linux and Windows hosts. • Provided C2 systems interoperability with TCS, Joint Range Extension and the Air Defense Systems Integrator to provide the 1st Marine Air Wing with a near real time air picture via a Link-16 Channel. • Assisted with application integration involving C2 systems within the COP such as the AFATDS, Effects Management Tool (EMT), and Blue Force Tracker (BFT). • Engineered and sustained bilateral network solutions, enhancing security and interoperability between US and coalition forces during exercises and real-world operations. • Assisted in the administration and maintenance of the Combat Operations Center, which integrates NIPRNET, SIPRNET, VoIP Intercom, Workstations, and Visual Display Equipment. • Provided guidance, technical support, troubleshooting and corrective actions on technical and operational procedures as the SME to operators and administrators within the Tactical Air Operations Center.

    • United States
    • Information Technology & Services
    • 700 & Above Employee
    • C4I Systems Analyst
      • Aug 2003 - Feb 2008

      • Administered and provided technical support to III MEF on Command, Control, Communications, Computers and Intelligence (C4I) systems on classified networks in a tactical environment. • Managed and maintained GCCS-J application servers hosting Solaris 8 and end user workstations hosting Windows 2000 including associated hardware components (i.e. printers, monitors, and peripherals) on a mixed UNIX and Windows Active Directory domain. • Installed and administered a GCCS-Top Secret client for the III MEF G-5. • Significantly increased utilization of limited server resources by implementing a virtual server farm using VMWare ESX Server and vSphere technology. • Installed, administered and maintained two Defense Collaboration Tool Suites which consisted of six Dell 2650 Servers and five individual servers located throughout Japan running a Multipoint Control Unit supporting both classified and coalition networks. • Developed and deployed a coalition domain between III MEF and U.S. Forces Korea utilizing MS 2003 Server running Exchange, IIS and a Click to Meet Conferencing Server Suite. • Deployed required information security updates and patches to servers and workstations on the GCCS domain using Windows Software Update Services. • Provided over-the-shoulder training and general technical consulting on Windows workstations, Windows and Unix servers, and C4I systems and software.

    • Safty Diver/Instructor
      • Nov 2002 - Aug 2003

      • Instructed students daily on Helicopter Emergency Egress and Sea Survival Techniques in a formal classroom environment and in a Modular Egress Training Simulator. • Ensured 100% safety of all students underwater and on the surface while at the same time ensuring proper helicopter escape procedures and correct usage of an underwater breathing apparatus. • Instructed students daily on Helicopter Emergency Egress and Sea Survival Techniques in a formal classroom environment and in a Modular Egress Training Simulator. • Ensured 100% safety of all students underwater and on the surface while at the same time ensuring proper helicopter escape procedures and correct usage of an underwater breathing apparatus.

    • Armed Forces
    • 700 & Above Employee
    • Network Administrator/Information Systems Specialist
      • Oct 1995 - Dec 2002

      • Administered and maintained all aspects of a variety of classified, unclassified and coalition networks throughout various garrison and tactical deployed locations to provide secure and reliable access to information. • Enhanced LAN and WAN security by designing and implementing security policies which included the configuration of workstations, servers, router, switches, and network encryption devices. • Administered and maintained a Deployed Security Interdiction Device (DSID). • Ensured backup of mission critical data was performed as scheduled using Veritas Backup Exec 8.6 with ADIC Scalar backup units. • Managed robust Mail routing architectures utilizing X.400, Routing Groups, and SMTP connectors for internal mail, and a SMTP bridgehead with virus scanning capabilities for external connections.

Community

You need to have a working account to view this content. Click here to join now