3
James C. Craven 3310 Forest Glen Dr Charleston, SC 29414 Home: (843) 225-0476 E-mail: [email protected] Objective To obtain a challenging Network Engineering position that will use my extensive technical expertise and leadership skills to benefit a successful, growing organization. Experience and Skills SPAWAR (Space and Naval Warfare) LANT Network Lead. Lead a team of over twelve network engineers in support of all SPAWAR east coast network infrastructure engineering and operations on unclassified RDT&E and SIPRnet. Responsible for overseeing network management, engineering, design and operations efforts at sites in Charleston SC, Tampa FL, Fayetteville NC, Portsmouth VA, Norfolk VA, Patuxent River MD, Washington DC, New Orleans LA and Stuttgart GE. Responsible for over 500 Cisco and Juniper switches, routers, firewalls; Ciena DWDM (Dense Wave Division Multiplexing) switches. Responsible for providing engineering solutions for diverse connectivity requirements to Programs of Record such as the Fleet NOC, CANEs, E2C, DCGS-MC, DCGS-N, TacMobile, and GCSS-MC. Coordinated with DREN and/or DISA on multiple occasions to provide a customized, secure, testing environment between SPAWAR and non-SPAWAR enclaves in multiple locations utilizing technologies such as Q-in-Q, L2TPV3, MPLS, GRE, and/or Type I encryption to extend network services in support of project development and testing. Established goals and resourced tasking, providing a cooperative environment where all of the engineers on the team have a voice. Cooperated with other team members, site leads, team leads and RDT & E leadership to tackle complex projects and meet deadlines on multiple projects requiring extensive resources and quick turn around times. Cooperated with other sites to come up with common standards for network hardware and network management software throughout SSC-LANT. Worked directly with other projects/project leads to support test events, project requirements and engineering efforts. Projected future network requirements/upgrades and for upper management allowing for budgetary projections for manpower and equipment. Published Standard Operating Procedures for classified and unclassified network operations outlining policies and procedures for network operations. Enterprise Network Management: Experience managing Wide Area Networks utilizing Orion Solarwinds Network performance monitor, UDT, configuration manager and Netflow traffic analyzer. Utilized Solarwinds Performance monitor to baseline network bandwidth, track network anomalies, actively monitor network device utilization and track network events. Utilized Solarwinds UDT to track network nodes and keep a 90 day history of connectivity on a per port/per switch basis. Utilized Solarwinds configuration manager to track configuration changes, automate configuration updates and backup switch and router configurations. Utilized Solarwinds Netflow traffic analyzer to evaluate security threats, identify threat vectors, and track network traffic trends. Utilized Cisco ACS server and transitioned to FreeRADIUS enabling secure Authentication, Authorization and Accounting (AAA) to secure all infrastructure assets. Developed, integrated, customized SNMP applications into the management framework. Installed Management Information Bases (MIBs) for all managed nodes. Utilized Wireshark for packet and datagram analysis. Utilized NMAP for port scanning and network vulnerability testing. Enterprise Infrastructure Management. Supervised and was instrumental in the installation and configuration of all network infrastructure. Designed, Installed, configured, and maintained Cisco Routers (7600, 7200, 3800, 2900), 1/10 Gigabit Ethernet solutions with Cisco, 6500, 4500X, 3750X and 3750 switches. Managed multiple class B and C IPV4, and a /48 IPV6 network running dual stack with over 5000 nodes up and down the east coast. Implemented subnet management, Network Address Translation (NAT), Enterprise OSPF routing with multiple OSPF processes, route redistribution, route summarization and route filters between multiple enclaves on the intranet and trusted sides of the RDT&E network. Managed BGP routing on the border with DREN and DISA service providers. Set up route policies to customize traffic shaping between multiple DISA links in the Navy Enterprise Datacenter. Extensive experience installing and provisioning, T1, DS3, OC3 and

RESUME

Embed Size (px)

Citation preview

Page 1: RESUME

James C. Craven 3310 Forest Glen Dr

Charleston, SC 29414 Home: (843) 225-0476

E-mail: [email protected] Objective

To obtain a challenging Network Engineering position that will use my extensive technical expertise and leadership skills to benefit a successful, growing organization.

Experience and Skills

SPAWAR (Space and Naval Warfare) LANT Network Lead. Lead a team of over twelve network engineers in support of all SPAWAR east coast network infrastructure engineering and operations on unclassified RDT&E and SIPRnet. Responsible for overseeing network management, engineering, design and operations efforts at sites in Charleston SC, Tampa FL, Fayetteville NC, Portsmouth VA, Norfolk VA, Patuxent River MD, Washington DC, New Orleans LA and Stuttgart GE. Responsible for over 500 Cisco and Juniper switches, routers, firewalls; Ciena DWDM (Dense Wave Division Multiplexing) switches. Responsible for providing engineering solutions for diverse connectivity requirements to Programs of Record such as the Fleet NOC, CANEs, E2C, DCGS-MC, DCGS-N, TacMobile, and GCSS-MC. Coordinated with DREN and/or DISA on multiple occasions to provide a customized, secure, testing environment between SPAWAR and non-SPAWAR enclaves in multiple locations utilizing technologies such as Q-in-Q, L2TPV3, MPLS, GRE, and/or Type I encryption to extend network services in support of project development and testing. Established goals and resourced tasking, providing a cooperative environment where all of the engineers on the team have a voice. Cooperated with other team members, site leads, team leads and RDT & E leadership to tackle complex projects and meet deadlines on multiple projects requiring extensive resources and quick turn around times. Cooperated with other sites to come up with common standards for network hardware and network management software throughout SSC-LANT. Worked directly with other projects/project leads to support test events, project requirements and engineering efforts. Projected future network requirements/upgrades and for upper management allowing for budgetary projections for manpower and equipment. Published Standard Operating Procedures for classified and unclassified network operations outlining policies and procedures for network operations. Enterprise Network Management: Experience managing Wide Area Networks utilizing Orion Solarwinds Network performance monitor, UDT, configuration manager and Netflow traffic analyzer. Utilized Solarwinds Performance monitor to baseline network bandwidth, track network anomalies, actively monitor network device utilization and track network events. Utilized Solarwinds UDT to track network nodes and keep a 90 day history of connectivity on a per port/per switch basis. Utilized Solarwinds configuration manager to track configuration changes, automate configuration updates and backup switch and router configurations. Utilized Solarwinds Netflow traffic analyzer to evaluate security threats, identify threat vectors, and track network traffic trends. Utilized Cisco ACS server and transitioned to FreeRADIUS enabling secure Authentication, Authorization and Accounting (AAA) to secure all infrastructure assets. Developed, integrated, customized SNMP applications into the management framework. Installed Management Information Bases (MIBs) for all managed nodes. Utilized Wireshark for packet and datagram analysis. Utilized NMAP for port scanning and network vulnerability testing.

Enterprise Infrastructure Management. Supervised and was instrumental in the installation and configuration of all network infrastructure. Designed, Installed, configured, and maintained Cisco Routers (7600, 7200, 3800, 2900), 1/10 Gigabit Ethernet solutions with Cisco, 6500, 4500X, 3750X and 3750 switches. Managed multiple class B and C IPV4, and a /48 IPV6 network running dual stack with over 5000 nodes up and down the east coast. Implemented subnet management, Network Address Translation (NAT), Enterprise OSPF routing with multiple OSPF processes, route redistribution, route summarization and route filters between multiple enclaves on the intranet and trusted sides of the RDT&E network. Managed BGP routing on the border with DREN and DISA service providers. Set up route policies to customize traffic shaping between multiple DISA links in the Navy Enterprise Datacenter. Extensive experience installing and provisioning, T1, DS3, OC3 and

Page 2: RESUME

OC12 DISA point to point and routed circuits. Extensive experience with routing protocols such as BGP4, OSPF, IGRP, EIGRP and RIP. Engineered Ethernet to serial communications channels over RICI T1, DS3 and OC3 Ethernet to serial converters. Set up secured SNMPv3, SYSLOG, NTP, and SSH for all network nodes. Set up redundant layer 3 interfaces utilizing VRRP and HSRP. Extensive spanning tree experience with PVST+, Rapid PVST+, and MST on single and multivendor solutions. Extensive experience with DOT1Q trunking, VTP, GVRP, Port channels and LAG. Tested and evaluated new Infrastructure software and Hardware from multiple vendors in preparation for future network upgrades and projects. Designed and implemented multicast routing to provide access to real time and streaming video. Designed and implemented IPV6 test bed utilizing Cisco and Juniper routers in preparation for IPV6 enterprise implementation. Worked with service providers such as DREN and DISA to provide redundant wide area connectivity for the RDT & E network, SIPRnet and SPAWAR Charleston Data Center. Engineered a customized Juniper router configuration that allows for true loopback testing on long haul MetroEthernet circuits. Information Assurance. Maintained the border security enclave comprised of Juniper SRXs and Netscreen ISG 2000 firewalls. Maintained firewall zones, policies and VPN connectivity. Utilized L2TPV3 over site to site VPNs in a hub spoke configuration to extend secure VLAN services to Stuttgart Germany. Managed SA4500 VPN concentrator. Configured and engineered NAC across the entire SSC-LANT enclave. Collaborated with senior system administrators to engineer a port based DOT1X solution that relied on LDAP, Free RADIUS and in house developed remediation tools. Engineered IPV4 and IPV6 STIG templates and ACLs to secure all network switches and routers. Configured OOBM networks for the RDT&E sites in Charleston, Saint Julien’s Creek and Norfolk. Implemented DISA STIGS on all network equipment. Implemented control plane policing on all Layer 3 devices to prevent DOS and DDOS attacks. Instrumental in securing all Juniper SSG, Netscreen, M series router, 8500EX and 4200EX switches in preparation for a Navy Cyber Security Inspection in which the border security enclave mentioned above had no significant findings. Spearheaded the network infrastructure portion of multiple accreditation efforts in the Charleston Navy Enterprise Data Center, SSC-LANT RDT&E unclassified and SIPR networks. Optical Networking. Maintained a DWDM ring comprised of Ciena 4200 DWDM equipment to extend connectivity from the SPAWAR campus in Charleston to three additional sites on the old Charleston Naval shipyard. Utilized a leased single mode fiber ring and four DWDM nodes to extend and expand network connectivity to four large mini campuses providing an aggregate bandwidth per site of 10 Gigabits with the potential to expand to over 80 Gigabits per site as requirements evolvedd. Provided optical cross connects for voice, video, and network services as well as dedicated circuits for special projects such as JIOR, Triton Range, and the Navy T&E network. Network Research and Development. Researched the SDN Openflow standard and how it might be utilized to shape traffic flows and provide a more granular automated security posture. Teamed with the Applied Physics Lab at John’s Hopkins to pilot Integrated Active Cyber Defense. The pilot would use an active orchestration tool that utilizes live threat feeds and make real time decisions on active cyber threats. Researched Named Data Networking, a collaborative effort between academia and industry to replace TCP/IP with named networks. As of right now the National Science Foundation is the only Federal representation with in the test bed. Researched new Ciena DWDM equipment. Ciena is now capable of providing 180 channels of 100 gigabits on one pair of single mode fiber to include submarine cabling between the US, Europe and Asia.

Certifications Comptia Advanced Security Practitioner (CASP) December 12, 2016

Comptia Security+ February 12, 2011 Cisco Certified Networking Associate Routing and Switching (CCNA RS) April 16, 2011

Cisco Certified Networking Associate Security (CCNA Security) March 7, 2014 Juniper JNCIA April 20, 2016 Accomplishments

• Maintained 99.9999 efficiency “up time” rating on all network nodes and resources.. • Designed and installed one of the first Cisco Enterprise Gigabit networks in the Navy.

Page 3: RESUME

• Developed an online training plan and conducted classes to train future members of the SSC-LANT Enterprise Network administration team.

• Was awarded Mentor of the Quarter at SSC-LANT for quarter 3 of fiscal year 2015. • Developed and implemented a long-range plan to integrate all site networks into an

Enterprise network comprised of comprised multi sites up and down the east coast. • Discovered and corrected routing inconsistencies that were slowing corporate operations. • Coordinated the installation of an enterprise intranet at our remote and local sites. • Worked multiple inspections and network accreditation efforts with no significant security

findings due to the strict implementation of DISA STIGS on network assets. • Worked with the Johns Hopkins Applied Physics Lab to develop a pilot of IACD (Integrated

Active Cyber Defense). Once operational the product will provide active cyber defense utilizing active threat feeds, an orchestration engine and SDN openC2 command sets for automated reconfiguration of IA and network infrastructure.

• Led the charge in the integration of multiple naval projects into the RDT&E switch fabric. Projects such as the Navy Fleet NOC and CANEs utilized our transport fabric to research and develop critical naval afloat systems.

• Coordinated with engineers from JMETC to set with live data feeds from NAVAIR at Patuxent River across SDREN to the DCGS-MC node here in Charleston.

• Stood up the first NDEC (Naval Approved Enterprise Datacenter) in Charleston and was instrumental in transitioning high level projects from NAVSEA, NAVAIR, and JEOD into the datacenter IA and switching fabric.

Relevant Work History Department of The Navy, 1 Innovation Dr, Hanahan SC Senior Network Engineer, April 2004 – Present. Government Solutions Group., 3765 Colonel Vanderhorst Cir, Mount Pleasant, SC. Senior Engineer, October 2003 – April 2004. Scientific Research Corp., 3860 Faber Place Dr. Ste. 100, North Charleston, SC . Network Engineer, October 2001 – October 2003.

Signal Corporation, 4995 La Crosse Road, North Charleston, SC. Network Engineer, February 1999 - October 2001.

GTE Federal Systems Division, Eielson AFB Bldg 3112, Alaska. Network Manager, August 1997 - February 1999.

Department of Air Force, Eielson AFB Bldg 2262, Alaska. Network Manager/Equipment Control Officer, September 1996 - August 1997.

United States Air Force, Eielson AFB Bldg 2262, Alaska. LAN/WAN Manager, August 1992 - September 1996.

United States Air Force, Wright Patterson AFB Bldg 262, Ohio. Network Technician. January 1991 - August 1992.

Education and Training

Cisco Introduction to Cisco Router Configuration Course, 40 Hours. Cisco Advanced Cisco Router Configuration Course, 40 Hours. PERL Programming Course #SL130, Entry Level PERL programming, 40 Hours. Netscreen Firewall Entry level Firewall configuration and maintenance, 40 Hours. Configuring Juniper Network Routers Intermediate routing and MPLS, 40 Hours. JNCIA Training. Juniper Networks Certified Associate training, 40 Hours

Security Clearance - Top Secret References available upon request