John Weaver

John Weaver

Followers of John Weaver276 followers
location of John WeaverOmaha Metropolitan Area

Connect with John Weaver to Send Message

Connect

Connect with John Weaver to Send Message

Connect
  • Timeline

  • About me

    Senior Systems Engineer, Virtualization Engineer, Cybersecurity / IT Security Specialist, Windows, and Linux Engineer, Networking

  • Education

    • ITT Technical Institute-Indianapolis

      1991 - 1992
      Bachelor of Applied Science Electronics Engineering Technology

      Highest HonorsGPA: 3.97

    • ITT Technical Institute-Wyoming

      1989 - 1991
      Diploma Electronics Engineering Technology

      Highest HonorsMember: National Vocational Technical Honors Society

  • Experience

    • Hewlett-Packard

      Oct 1997 - Oct 2008

      Support migration of 1,000+ Wintel servers, both Physical and Virtual, from customer sites to Data CentersPerform server remote take-over, install OS, system configuration, install Tools and Applications, Patching, Vulnerability Scans, Remediations, and MitigationsClean-up servers migrated with Platespin or VM ConverterMigrate Users, Groups, NTFS and Share Permissions, User DataUse Active Directory to create/delete/add/nest User, Computer, and Group objectsConfigure and execute data copies for UAT and Go-Live using RoboCopy and SecureCopyTroubleshoot functionality and connectivity of servers and applications for UAT and Go-LiveCreate Microsoft Windows 2003 Active-Passive ClustersProvide troubleshooting, root cause analysis, and problem resolution for software, hardware, network, and Windows Server operating systemsCommunicate with the customer via e-mail, meetings, and one-on-one conversationsSkilled at working with the customer to effect technical solutions or to answer customer’s technical concernsSeamlessly coordinate with multiple virtual teams in disperse geographic locations to accomplish goalsCreate and maintain procedural documentation, reports, templates, technical documentationTrain new team members in team procedures, troubleshooting techniques, information finding, and escalation proceduresKnowledgeable in Active Directory Group Policy Objects Show less Support Daily, Weekly, Monthly, and Yearly backups of varying importance across Windows 2000 Server, Windows Server 2003, Sun UNIX, and HP UNIX platformsPerform Sev1 and Sev2 Restores as neededWork with multiple virtual teams in disperse geographic locations to accomplish goalsCreate and maintain procedural documentation, reports, templates, technical documentationTrain new team members in team procedures, troubleshooting techniques, information finding, and escalation proceduresWork in a leveraged support model, supporting scores of customersProvide on-call support; assist when additional experience is requiredPerform Technical Interviews of job candidates to identify individuals with appropriate skills Backup Software included Tivoli Storage Manager, Netbackup, Legato/Networker/Solstice, ARCserv, HP Omniback, Backupexec, and HP DataProtector Show less Support Daily, Weekly, Monthly, and Yearly backups of varying importance across Windows 2000 Server, Windows Server 2003, Sun UNIX, and HP UNIX platformsPerform Sev1 and Sev2 Restores as neededWork with multiple virtual teams in disperse geographic locations to accomplish goalsCreate and maintain procedural documentation, reports, templates, technical documentationTrain new team members in use of seven backup/restore software packages, troubleshooting techniques, information finding, and escalation proceduresBackup Software included Tivoli Storage Manager, Netbackup, Legato/Networker/Solstice, ARCserv, HP Omniback, Backupexec, and HP DataProtector Show less Provide technical support and leadership for migration of desktop and laptop computers from Windows 95, Windows 98, and Windows NT 4 to Windows 2000 ProfessionalWork with various teams to prepare sites for migration, including designing migration room and developing method of migrations given site restrictionsTrain and mentor technicians responsible for performing migrationsCommunicate with customer through e-mail, meetings, and one-on-one conversationsCreate documents and improved upon existing documents used to track items related to migration (pre-migration, migration, post-migration quality assurance checklists; inventory, laptop drop-off and pick-up, and tracking of hours worked spreadsheets, etc.) Provide troubleshooting, root cause analysis, and problem resolution for Windows 2000 platforms during and after migrationUse Active Directory to create/delete/add/nest User, Computer, and Group objects Show less Assist technical lead by providing technical and procedural guidance to other deployment techniciansMigrate desktop and laptop computers from Windows 95, Windows 98, and Windows NT 4 to Windows 2000 ProfessionalWork with various teams to prepare sites for migration, including designing migration room and developing method of migrations given site restrictionsTrain and mentor technicians responsible for performing migrationsProvide troubleshooting, root cause analysis, and problem resolution for Windows 2000 platforms during and after migration Show less Novell Server Team, New Center One Campus and Renaissance Center in DetroitNovell Server Team, Service Management Center in TroyPerform backup tape rotation, file restores, user account creation, server directory space restrictions, and moreMigrate sites to Renaissance Center: includes obtaining a list of users, their IDs, their group memberships, the groups’ rights to directories, a tape backup of the transferring server’s data, prepping a server to receive the data, restoring the data onto a Renaissance Center server, creating the user accounts, creating the groups, establishing the groups’ rights to the directories that were restored, establishing the user account group memberships, creating Shares, reinstating Share and NTFS permissions, and testing to make sure that each of these steps were completed successfullyOn-call pager duty during and after normal business hoursTroubleshoot hardware, network, and software troubles as they pertained to the Novell servers. This included but was not limited to troubleshooting, sometimes replacing, or re-installing hard drives in a RAID-5 array, Network Interface Cards (NICs), system boards (main boards), video adapter cards, and Novell server software componentsParticipate in Change Control Review process and adhere to the Change Control process for all changesEnsure proper ventilation of and room temperature for serversEnsure physical access controls (locked server racks, badge reader-accessible server room, bade reader-accessible foyer to server room, padlock-protected shielded door to server room foyer, redundant power supplies, visitor sign-in forms, humans preventing tailgaiting) exist and are being effectively utilized Show less

      • Systems Administrator / Infrastructure Specialist - Server Build Team

        Aug 2007 - Oct 2008
      • Team Leader - Enterprise Backup and Restore

        Sept 2005 - Aug 2007
      • Systems Administrator - Enterprise Backup and Restore

        Mar 2004 - Aug 2005
      • Technical Deployment Lead - Enterprise Deployment Services

        Aug 2002 - Mar 2004
      • Deployment Technician - Enterprise Deployment Services

        May 2002 - Jul 2002
      • Systems Administrator - UNIX

        Jul 2001 - May 2002
      • Systems Administrator - Windows

        Oct 1999 - Jul 2001
      • Mainframe Support Staff

        Sept 1999 - Oct 1999
      • Systems Administrator - Novell Netware

        Oct 1997 - Sept 1999
    • NCI Information Systems, Inc.

      Oct 2008 - Dec 2010
      Senior Systems Engineer

      Build servers: rack and cable, configure RAID, load OS, install OS components and Tools Provide day-to-day operational support as well as troubleshooting, root cause analysis, and problem resolution for software, hardware, and Windows Server operating systemsCreate server OS images for deploymentDetect vulnerabilities and perform Risk Assessment using scan tools such as DISA Gold Scanner, eEye Retina, and SCAP Compliancy CheckerRemediate and Mitigate vulnerabilities utilizing tools such as Resultant Set of Policy (RSOP), Security Configuration and Analysis, Group Policy Management Console, and Registry EditorCreate detailed explanations of discovered vulnerabilities and the remediation thereofCreate, Implement, and Maintain Active Directory Group Policy Objects providing Server hardening to 100+ servers through hundreds of configured settingsHarden servers using Security Technical Implementation GuidesPrepare servers and workstations for DIACAP review process (Department of Defense Information Assurance Certification and Accreditation Process)Provide recommendations for server and network infrastructure configurationManage accounts, network rights, and access to systems and equipment Provision and maintain an out-of-band management (OOBM) networkStand up Terminal Servers and a Terminal Server Licensing ServerCreate and maintain VMware Templates for rapid deployment of standardized serversAuthor PowerShell and command-line scripts to address specific tasks, such as adding 8,000 users to an Active Directory Group, retrieving and recording detailed information regarding servers, generating a spreadsheet detailing all VMware Virtual Machine Snapshots, and automating the Creation and Deletion of VM Snapshots Show less

    • Caelum Research Corporation

      Jan 2011 - Aug 2011
      Senior Systems Administrator

      Focus on IA requirements during the identification, design, acquisition, installation, upgrade, or replacement of DoD information systemsInstall, test, maintain, and upgrade operating systems software, hardware, and firmware to comply with IA requirementsUtilize tools such as the AR 25-2 Army Regulations, the DoDI 8500.2 IA Control Checklist, and Security Technical Implementation Guides to review IA controls of Information Systems to ensure a secure IA posture and to obtain or maintain an authorization to operateCreate and apply proactive measures, techniques, and procedures commensurate with commercial best practicesAnalyze Information Assurance Vulnerability Bulletins for enclave impact and take or recommend appropriate actionCollect and retain audit data to support technical analysis relating to misuse, penetration reconstruction, or other investigations, and provide this data to appropriate law enforcement or other investigating agenciesConfigure Active Directory Group Policy Objects to ensure that appropriate notice of privacy rights, security responsibilities, and access rules are provided to all individuals accessing DoD Component-owned or –controlled DoD information systemsMaintain Situational Awareness of information systems by performing configuration and vulnerability management, performance monitoring, and reviewing periodic independent evaluationsMaintain IA Posture by implementing recommend changes or improvement to the implementation of assigned IA controls, the assignment of additional IA controls, or changes or improvements to the design of the IS itselfMaintain Artifacts such as system policies, documentation, plans, test procedures, test results, and other evidence that express or enforce the information assurance posture of the DoD IS, contribute to the certification and accreditation information, and provide evidence of compliance with the assigned IA controls Show less

    • US Army

      Aug 2011 - Mar 2013
      IT Security Specialist

      Ensure the Information Assurance of entrusted information systems through a defense-in-depth approach that integrates the capabilities of personnel, operations, and technology to protect and defend information and information systems by ensuring the maintenance of an appropriate level of confidentiality, integrity, authentication, non-repudiation, and availabilityParticipate in the DoDI 8510.01 Information Assurance Certification and Accreditation Process (DIACAP) and DIACAP Implementation Plan (DIP) by identifying, implementing, validating, certifying, and managing IA capabilities and services, expressed as IA controls, including testing in a live environment, in accordance with statutory, Federal, and DoD requirementsCreate project work-plan estimates (PWEs) for validation efforts, determining technological, chronological, personnel, and financial requirementsPerform technical examinations of Windows, Linux, UNIX, Cisco, and VMware information systems; applications, video teleconferencing (VTC) equipmentLead teams in the validation of Classified systems such as those supporting Unmanned Ariel Vehicles (UAVs), a component of a tank, and the National Guard Bureau’s networksEducate and encourage IA workforce regarding the importance of maintaining Artifacts such as system policies, documentation, plans, test procedures, test results, change logs, activity checklists, and other evidence that express or enforce the information assurance (IA) posture of the DoD ISs, contribute to the certification and accreditation (C&A) information, and provide evidence of compliance with the assigned IA controlsEnsure the successful completion of long-term projects by setting milestones, analyzing current status against expected, and implementing any needed corrective actionsBrief Majors, Colonels, and Generals regarding the security posture of IT systems Show less

    • Ingersoll Consulting Inc

      Mar 2013 - Oct 2015

      Perform Risk Management life cycle activities to secure information systems for four Federal Bureau of Investigation field office (FO) divisions and their fifty associated offices. Support four Chief Security Officers (CSOs) by providing policy interpretation, recommendations for security enhancements, authoring and delivering security awareness briefings, providing incident response, and being the “go-to guy” when answers to security-related questions are not readily available, such as when implementing new technology. Show less (Continued from position above.)Support Certification and Accreditation of the IS.- Perform Internal Audit of more than a dozen sites using Risk Management Framework- Create and maintain a Plan of Actions and Milestones (POA&M)- Identify Vulnerabilities, then devise and implement corrective solutions- Create and Maintain System Documentation such as a Business Impact Analysis, Master System Security Plan, System Security Design Document, Disaster Recovery Plan, Incident Response Plan, Continuity of Operations Plan, Physical and Environmental Artifact, Data Flow Diagram, Hardware List, Software List, and a Cryptographic Artifact- Ensure system security requirements are complied with, or obtain official risk acceptance as needed- Establish and safeguard audit trails and ensure their review, and make them available, when required, to the Chief Security Officer (CSO) or the Information System Security Manager (ISSM)- Ensure proper retention of audit logs in accordance with relevant agency policies- Ensure awareness and precautionary measures are exercised to prevent introduction and/or proliferation of malicious code- Manage review and release of media and/or memory components (their issuance, verification, collection, and destruction)- Create and deliver INFOSEC training to end users- Create and maintain Interconnection Security Agreement (ISA), Memorandums of Understanding (MOU), and Memorandums of Agreement (MOA)- Create and implement table-top exercises- Ensure compliance with IS Patching per agency policies Show less

      • Regional Information Systems Security Officer (ISSO)

        Mar 2013 - Oct 2015
      • Information Systems Security Officer (ISSO)

        Mar 2013 - Mar 2013
    • The NorthTide Group, LLC

      Oct 2015 - Jun 2019
      Datacenter Engineer

      Engineer network solutions to address infrastructure requirements. Work with infrastructure teams such as SAN Storage, Virtualization, and Web Applications to identify requirements. Design, test, and implement solutions for the core network of multiple data centers. Deploy, configure, and maintain virtual and physical load balancers to support desktop virtualization and web site needs.Datacenter Engineering project: - Engineer network solutions to address infrastructure requirements. Work with teams such as Infrastructure, SAN Storage, Virtualization, and Web Applications to identify requirements. Design, test, and implement solutions for the core network of multiple data centers- Deploy, configure, and maintain virtual and physical application delivery controllers (ADCs) to support desktop virtualization and application needs- Harden network components using NIST 800-53, DoD 8500.2 IA Controls, Security Technical Implementation Guides (STIGs), and vendor-provided Military Deployment Guides as guidance- Generate 40s Rack Elevation, 60s Overview, and 70s Cable Installation drawings for multiple datacenters and for multiple security classifications. Ensure accuracy by verifying diagrams against actual build- Identify and Resolve issues with ADCs, network switches, and firewalls when undesired symptoms present - Register systems with Infoblox to populate IP Address Management (IPAM) database - Configure Cisco Identity Services Engine (ISE) to accept, validate, and approve authentication and access requests from F5 application delivery controllers and other network devices- Configure network switches as needed to support operational needs. Modify ports, VLANs, Port Channels- Troubleshoot network configuration when undesirable symptoms present Show less

    • TEKsystems

      Jul 2019 - Jan 2020
      Senior Systems Engineer

      Hired as an Information Systems engineer, accepted additional role as the site’s Network engineer.Operations Management: - Deploy, configure, and maintain network switches, routers, WAN optimization appliances, High Assurance Internet Protocol Encryptor (HAIPE) devices- Engage and work with multiple organizations to ensure the proper connection of new circuits to the site and swing existing circuits between buildings on site; maintain list of circuit connections - Configure network switches and routers. Modify ports, VLANs, Port Channels, IP configurations, Routes- Password Recover switches and routers when previous engineers could not recall local credentials- Image end-user computing devices (EUCDs); update EUCDs; troubleshoot and resolve issues with EUCDs; ensure EUCDs are registered in Microsoft System Center Configuration Manager (SCCM)- Create and maintain network drawings (rack elevations, functional overviews, and cable installation)- Install, configure, and maintain various server types (file, virtualization, backup) Show less

    • Booz Allen Hamilton

      Feb 2020 - Nov 2024
      Systems Engineer / Virtualization Engineer

      Supporting training missions of Joint Forces, responsibilities included the design, installation, configuration, securing, and maintenance of much of the infrastructure components of the Joint Integrated Missile Defense Missile Warning Training System (JIMDTS). Duties: - Design, deploy, configure, security harden, and maintain: o Active Directory (AD) Forests, Domains, Domain Controllers (DCs), Group Policy Objects (GPOs) o VMware ESXi, vCenter Server, Virtual Machines (VMs), Horizon View o Red Hat Enterprise Linux (RHEL) systems o Windows Servers and Windows Workstations, Windows Server Update Services (WSUS)o Domain Naming Systems (DNS), supporting two-way, transient trusts between multiple domainso Dynamic Host Configuration Protocol (DHCP) servers for multiple domainso NetApp storage systemso Public Key Infrastructure (PKI)o Network Time Protocol (NTP) - Given a budget and general requirements, spec out technical solutions to meet those constraints - Rack servers, configure integrated lights-out connectivity, remotely update all firmware components as applicable, remotely install and configure operating systems, security harden systems, validate functionality of systems, and collaborate with information assurance personnel to ensure successful completion of security readiness reviews - Conduct Security Content Automation Protocol (SCAP) Compliancy Checker (SCC) scans to identify vulnerabilities in the security posture of infrastructure and server components (Windows Server OSs, RHEL, VMware ESXi, vCenter Server, & VMs), then harden those systems accordingly, generally using Security Technical Implementation Guides (STIGs) and security best practices- Create PowerShell, Bash, and CMD scripts to automate tasks such as deploying patches or securing systems - Train and mentor engineers and administrators- Author more than 80 documents, including Policies, Procedures, Configuration documentation, and diagrams Show less

  • Licenses & Certifications

    • MCTS - Internet Security and Acceleration (ISA) Server 2006, Configuration

      Microsoft
    • Microsoft Certified IT Professional - Enterprise Administrator (MCITP-EA)

      Microsoft
    • Microsoft Certified IT Professional - Virtualization Administrator (MCITP-VA)

      Microsoft
    • Systems Engineer: Security - Microsoft Windows 2000 (MCSE Security 2000)

      Microsoft
    • Systems Engineer: Security - Microsoft Windows Server 2003 (MCSE Security 2003)

      Microsoft
    • VMware Certified Professional - vSphere 4.1 (VCP4)

      VMware
    • Security+CE & Security+ 2008

      CompTIA
      Aug 2011
    • Certified Information Security Manager (CISM)

      ISACA
      Apr 2015
      View certificate certificate
    • VMware Certified Professional - vSphere 5 (VCP5)

      VMware
    • Cisco Certified Network Associated - Security (CCNA-Security)

      Cisco
      Sept 2012
  • Volunteer Experience

    • Cubmaster

      Issued by Boy Scouts of America on Jul 2013
      Boy Scouts of AmericaAssociated with John Weaver