SlideShare a Scribd company logo
1 of 3
Neil K. Bailey
W A S H I N G T O N , D C 2 0 0 3 2 | ( 2 0 2 ) - 5 7 7 - 2 1 6 5 | N E I L _ K _ B A I L E Y @ Y A H O O . C O M
Solutions-oriented Network Engineer with notable success identifying, evaluating and providing solutions to complex
problems; Possesses strong communications skills that contribute to the building of collaborative relationships to benefit
company objectives; Organized self-motivator who can add value to all levels of an organization.
CORE COMPETENCIES:
Cyber Security Procedure Access Control Systems TCP/IP
Database Management IBM Maximo Systems Programing
Cost Efficiency Intrusion Detections Systems (IDS)
SOFTWARE: iStar Software & Associated Hardware, IBM Maximo Asset Management Enterprise, MS Office Programs
EDUCATION: B.S Computer Information Systems, Bowie State University-Bowie, Maryland | May 2002
CERTIFICATION: Security + Certification, Anticipated Completion Date | June 2016
Cyber Security Awareness Certificate, Foreign Service Institute, U.S. Department of State | December 2012
Software House Corporate Education Program / Certification in the C-Cure 800 / 8000 integrated Security
Management System, apC Advanced Processing Controller, Tyco Software House Corporate Education
Program / Certification in the C-Cure 800 / 8000 Advanced Integrator Course.
PROFESSIONAL EXPERIENCE
Network Engineer, Siemens Government Services, Inc. September 2008-May 2013
(U.S. State Department Diplomatic Security Division)
Washington, D.C
Performed database management support to the State Department enterprise operations of SQL server database systems and
participates in the analysis, and development of systems. Troubleshoot and provide guidance on technical program problems.
Monitor and perform data backups. Conduct technical analyses of the functional and management aspects of programs
and projects using data-related policies, directives and procedures.
Database Management
• Managed the security, integrity, tracking, and accuracy of the electronic data records for All of State Department
regulatory documents; Configured and troubleshoot Network Client DVR’s for communication los
• Responsible for the integrity of all Software and Hardware inventory related information for U.S. State Department.
• Worked on a variety of special projects to program, and build new iStar panels by performing research on a wide
range of material and information using the C-Cure 800/900 System software.
• Assigned passwords & access control level rights.
Database Maintenance
• Performed software security platform upgrade for State Department
• Assisted in the maintenance of a document accountability database and associated correspondence
Bailey Resume 1
• Assisted IT team in performing quarterly inventory stock counts to State Department network supplies, and perform
statistical reports and materials provided by vendor to ensure that all physical inventory and quality procedures are in
line with Departments requirements.
• Maintained an archiving system of information in the electronic C-Cure databases for all of U.S. State Department.
• Performed Disaster data recovery to All State Departments Servers.
• Performed IP address upgrades to DVR’s and iStar panels.
• Performed Disaster data recovery to All State Departments Servers.
• Performed daily reports of communication failure to network servers.
• Conducted weekly and daily backup reports for all network servers.
Key Contributions:
• Received award for the successful completion of sizable project at the State Department and its World Bank location.
This involved upgrading the Agency’s security software platform and developed and maintained linkage with its Office
of the Coordinator for cyber polices.
• Developing budget for network equipment resulting in year-over-year savings of 20% and equipment cost reduction of
$250,000 dollars.
• Managed programing project of a $7.5 million dollar CCure Database upgrade that increased efficiency by 27% and
reduced errors by 18%
Assistant Supervisor, DRS Technologies, May 2006- July 2007
(U.S. Pentagon Force Protection Agency)
Alexandria, VA
Responsible for monitoring fire, burglary and office alarms; handle emergency calls and dispatch pentagon police for
Response; Coordinated with multiple divisions to secure and schedule security coverage for various site-wide events
throughout day
• Provided support to Capitol Hill Police personnel to provide prompt and effective response to emergency citations.
• Monitored intrusion alarms; for the Secretary of Defense residence, The Vice Chairman, and other DOD facilities as
well as all external and internal alarms on the House and Senate side of the Capitol; Troubleshoot faulty alarms
systems.
• Conducted security violation investigation reports.
• Configured security cameras for instillation.
• Assisted and supervised a staff of four operators at the Alarm Control Center.
Lead Security Systems Operator, Quanta Systems Corp. September 2002-June 2008
(U.S. Treasury Police)
Washington, D.C
Reviewed, tracked, and monitored security clearance processing activities with appropriate government personnel to achieve
appropriate clearance actions
• Provided protective detail support to timely threat analysis, intelligence operational, and crisis management
assistance, utilizing, NCIC / WALES which required thorough knowledge in law enforcement policies and procedures,
planning, emergency management as it relates to the intelligence process.
• Prepared quarterly and annual reports to the Departments’ Chief, Captains, Sergeants, and the Personnel Security
Investigations team on matters involving various security violations.
• Monitored Close Caption TV (CCTV) cameras to detect any security breaches in and around the facility and dispatching
Police personnel to respond if necessary; Assisted Treasury police, Park police, and Capital police, in the event of
security threats. Download video evidence, analyzes technical data to determine solutions.
• Operated a Fire Management System (FMS) in the facility to ensure the safety of all employees; Conducted authorize
tests of security systems to ensure proper operation and /or determine the need for maintenance
Bailey Resume 2
Key Contributions:
Certified and qualified to managed and maintain Fire Management System for United States Treasury Department
• Recognized for heroism for saving officer who was experiencing life threating emergency while on post
• Awarded Communications operator of the year for excellent service to the Agency
Bailey Resume 3

More Related Content

What's hot

SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
 
Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...John M. Willis
 
Recent changes to the 20 critical controls
Recent changes to the 20 critical controlsRecent changes to the 20 critical controls
Recent changes to the 20 critical controlsEnclaveSecurity
 
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
20 Critical Controls for Effective Cyber Defense (A must read for security pr...20 Critical Controls for Effective Cyber Defense (A must read for security pr...
20 Critical Controls for Effective Cyber Defense (A must read for security pr...Tahir Abbas
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyEnclaveSecurity
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controlsEnclaveSecurity
 
From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air ControlEnergySec
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Tom Reinheimer
 
Leveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber SecurityLeveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber SecurityJohn Gilligan
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseEnclaveSecurity
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-enKBIZEAU
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...EnergySec
 
NIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation ProcessNIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation Processtimmcguinness
 

What's hot (20)

Securitymetrics
SecuritymetricsSecuritymetrics
Securitymetrics
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Tech r35
Tech r35Tech r35
Tech r35
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
 
Pre incident fire
Pre incident firePre incident fire
Pre incident fire
 
Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...
 
Recent changes to the 20 critical controls
Recent changes to the 20 critical controlsRecent changes to the 20 critical controls
Recent changes to the 20 critical controls
 
Contract Security Officer Services
Contract Security Officer ServicesContract Security Officer Services
Contract Security Officer Services
 
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
20 Critical Controls for Effective Cyber Defense (A must read for security pr...20 Critical Controls for Effective Cyber Defense (A must read for security pr...
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air Control
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016
 
Leveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber SecurityLeveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber Security
 
Resume_Santoro_Aug_2016
Resume_Santoro_Aug_2016Resume_Santoro_Aug_2016
Resume_Santoro_Aug_2016
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized Defense
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-en
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
NIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation ProcessNIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation Process
 

Viewers also liked

Concept desing of new electricity market of Ukraine
Concept desing of new electricity market of UkraineConcept desing of new electricity market of Ukraine
Concept desing of new electricity market of UkraineStanislav Masevych
 
السيرة الذاتية - لغة عربية
السيرة الذاتية - لغة عربيةالسيرة الذاتية - لغة عربية
السيرة الذاتية - لغة عربيةTarik Dandan
 
امراض اسماك عملي
امراض اسماك عمليامراض اسماك عملي
امراض اسماك عمليanw001
 
kintone cafe東京vol3 「kintoneの開発が楽しい3つの理由」
kintone cafe東京vol3 「kintoneの開発が楽しい3つの理由」kintone cafe東京vol3 「kintoneの開発が楽しい3つの理由」
kintone cafe東京vol3 「kintoneの開発が楽しい3つの理由」JOYZO
 
West Suffolk Trust Recycling Presentation-26112014
West Suffolk Trust Recycling Presentation-26112014West Suffolk Trust Recycling Presentation-26112014
West Suffolk Trust Recycling Presentation-26112014Mike Thompson
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled PresentationLisa Compton
 
Renewable energy production at the new electricity market of Ukraine - Stanis...
Renewable energy production at the new electricity market of Ukraine - Stanis...Renewable energy production at the new electricity market of Ukraine - Stanis...
Renewable energy production at the new electricity market of Ukraine - Stanis...Stanislav Masevych
 
OSC2 Climate Collaborative and Regen Program
OSC2 Climate Collaborative and Regen Program OSC2 Climate Collaborative and Regen Program
OSC2 Climate Collaborative and Regen Program Lara Jackle Dickinson
 
Поддержание климата в бассейнах
Поддержание климата в бассейнахПоддержание климата в бассейнах
Поддержание климата в бассейнахAlex Shanti
 
Qué es dios para la humanidad
Qué es dios para la humanidadQué es dios para la humanidad
Qué es dios para la humanidadHenry River
 
trung tâm mua đồng hồ casio 6 kim
trung tâm mua đồng hồ casio 6 kimtrung tâm mua đồng hồ casio 6 kim
trung tâm mua đồng hồ casio 6 kimkenyetta241
 

Viewers also liked (17)

Pdf para blog
Pdf para blogPdf para blog
Pdf para blog
 
Concept desing of new electricity market of Ukraine
Concept desing of new electricity market of UkraineConcept desing of new electricity market of Ukraine
Concept desing of new electricity market of Ukraine
 
السيرة الذاتية - لغة عربية
السيرة الذاتية - لغة عربيةالسيرة الذاتية - لغة عربية
السيرة الذاتية - لغة عربية
 
امراض اسماك عملي
امراض اسماك عمليامراض اسماك عملي
امراض اسماك عملي
 
kintone cafe東京vol3 「kintoneの開発が楽しい3つの理由」
kintone cafe東京vol3 「kintoneの開発が楽しい3つの理由」kintone cafe東京vol3 「kintoneの開発が楽しい3つの理由」
kintone cafe東京vol3 「kintoneの開発が楽しい3つの理由」
 
West Suffolk Trust Recycling Presentation-26112014
West Suffolk Trust Recycling Presentation-26112014West Suffolk Trust Recycling Presentation-26112014
West Suffolk Trust Recycling Presentation-26112014
 
Light
LightLight
Light
 
p zoek Kennismakingsfolder vetera-oldtimers
p zoek Kennismakingsfolder vetera-oldtimersp zoek Kennismakingsfolder vetera-oldtimers
p zoek Kennismakingsfolder vetera-oldtimers
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Jeff lynne
Jeff lynneJeff lynne
Jeff lynne
 
Renewable energy production at the new electricity market of Ukraine - Stanis...
Renewable energy production at the new electricity market of Ukraine - Stanis...Renewable energy production at the new electricity market of Ukraine - Stanis...
Renewable energy production at the new electricity market of Ukraine - Stanis...
 
DICKSON CV
DICKSON CVDICKSON CV
DICKSON CV
 
OSC2 Climate Collaborative and Regen Program
OSC2 Climate Collaborative and Regen Program OSC2 Climate Collaborative and Regen Program
OSC2 Climate Collaborative and Regen Program
 
Поддержание климата в бассейнах
Поддержание климата в бассейнахПоддержание климата в бассейнах
Поддержание климата в бассейнах
 
Qué es dios para la humanidad
Qué es dios para la humanidadQué es dios para la humanidad
Qué es dios para la humanidad
 
trung tâm mua đồng hồ casio 6 kim
trung tâm mua đồng hồ casio 6 kimtrung tâm mua đồng hồ casio 6 kim
trung tâm mua đồng hồ casio 6 kim
 
Proyecto ciber
Proyecto ciberProyecto ciber
Proyecto ciber
 

Similar to Neil Bailey Resume 2016 (1)

Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton ResumeJesse Hinton
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1jjdoylecomcast
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume todayNana Owusu
 
McElvy Resume 2015
McElvy Resume 2015McElvy Resume 2015
McElvy Resume 2015Debra McElvy
 
Peter Sproull Resume July 2016
Peter Sproull Resume July 2016 Peter Sproull Resume July 2016
Peter Sproull Resume July 2016 Peter Sproull
 
Derrick Wafford resume1
Derrick Wafford resume1 Derrick Wafford resume1
Derrick Wafford resume1 Derrick Wafford
 
Chris Atkins 3.24.16
Chris Atkins 3.24.16Chris Atkins 3.24.16
Chris Atkins 3.24.16Chris Atkins
 
Resume Bruce_Garland
Resume Bruce_GarlandResume Bruce_Garland
Resume Bruce_GarlandBruce Garland
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resumeAlbert Gonzales
 
Joe Green Resume_2017 v5
Joe Green Resume_2017 v5Joe Green Resume_2017 v5
Joe Green Resume_2017 v5Joseph Green
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel Alvior
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum CopyLblum1234
 
Sachie Thorne business resume
Sachie Thorne business resumeSachie Thorne business resume
Sachie Thorne business resumeSachie Thorne
 
Whitney L. Scott Resume 2017
Whitney L. Scott Resume 2017Whitney L. Scott Resume 2017
Whitney L. Scott Resume 2017Whitney Scott
 

Similar to Neil Bailey Resume 2016 (1) (20)

Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton Resume
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume today
 
McElvy Resume 2015
McElvy Resume 2015McElvy Resume 2015
McElvy Resume 2015
 
Peter Sproull Resume July 2016
Peter Sproull Resume July 2016 Peter Sproull Resume July 2016
Peter Sproull Resume July 2016
 
Derrick Wafford resume1
Derrick Wafford resume1 Derrick Wafford resume1
Derrick Wafford resume1
 
Chris Atkins 3.24.16
Chris Atkins 3.24.16Chris Atkins 3.24.16
Chris Atkins 3.24.16
 
Debra Fineberg
Debra FinebergDebra Fineberg
Debra Fineberg
 
Resume Bruce_Garland
Resume Bruce_GarlandResume Bruce_Garland
Resume Bruce_Garland
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
 
johndemunnik_MAY2016
johndemunnik_MAY2016johndemunnik_MAY2016
johndemunnik_MAY2016
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Joe Green Resume_2017 v5
Joe Green Resume_2017 v5Joe Green Resume_2017 v5
Joe Green Resume_2017 v5
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CV
 
ConklinResume2
ConklinResume2ConklinResume2
ConklinResume2
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
 
Sachie Thorne business resume
Sachie Thorne business resumeSachie Thorne business resume
Sachie Thorne business resume
 
Whitney L. Scott Resume 2017
Whitney L. Scott Resume 2017Whitney L. Scott Resume 2017
Whitney L. Scott Resume 2017
 

Neil Bailey Resume 2016 (1)

  • 1. Neil K. Bailey W A S H I N G T O N , D C 2 0 0 3 2 | ( 2 0 2 ) - 5 7 7 - 2 1 6 5 | N E I L _ K _ B A I L E Y @ Y A H O O . C O M Solutions-oriented Network Engineer with notable success identifying, evaluating and providing solutions to complex problems; Possesses strong communications skills that contribute to the building of collaborative relationships to benefit company objectives; Organized self-motivator who can add value to all levels of an organization. CORE COMPETENCIES: Cyber Security Procedure Access Control Systems TCP/IP Database Management IBM Maximo Systems Programing Cost Efficiency Intrusion Detections Systems (IDS) SOFTWARE: iStar Software & Associated Hardware, IBM Maximo Asset Management Enterprise, MS Office Programs EDUCATION: B.S Computer Information Systems, Bowie State University-Bowie, Maryland | May 2002 CERTIFICATION: Security + Certification, Anticipated Completion Date | June 2016 Cyber Security Awareness Certificate, Foreign Service Institute, U.S. Department of State | December 2012 Software House Corporate Education Program / Certification in the C-Cure 800 / 8000 integrated Security Management System, apC Advanced Processing Controller, Tyco Software House Corporate Education Program / Certification in the C-Cure 800 / 8000 Advanced Integrator Course. PROFESSIONAL EXPERIENCE Network Engineer, Siemens Government Services, Inc. September 2008-May 2013 (U.S. State Department Diplomatic Security Division) Washington, D.C Performed database management support to the State Department enterprise operations of SQL server database systems and participates in the analysis, and development of systems. Troubleshoot and provide guidance on technical program problems. Monitor and perform data backups. Conduct technical analyses of the functional and management aspects of programs and projects using data-related policies, directives and procedures. Database Management • Managed the security, integrity, tracking, and accuracy of the electronic data records for All of State Department regulatory documents; Configured and troubleshoot Network Client DVR’s for communication los • Responsible for the integrity of all Software and Hardware inventory related information for U.S. State Department. • Worked on a variety of special projects to program, and build new iStar panels by performing research on a wide range of material and information using the C-Cure 800/900 System software. • Assigned passwords & access control level rights. Database Maintenance • Performed software security platform upgrade for State Department • Assisted in the maintenance of a document accountability database and associated correspondence Bailey Resume 1
  • 2. • Assisted IT team in performing quarterly inventory stock counts to State Department network supplies, and perform statistical reports and materials provided by vendor to ensure that all physical inventory and quality procedures are in line with Departments requirements. • Maintained an archiving system of information in the electronic C-Cure databases for all of U.S. State Department. • Performed Disaster data recovery to All State Departments Servers. • Performed IP address upgrades to DVR’s and iStar panels. • Performed Disaster data recovery to All State Departments Servers. • Performed daily reports of communication failure to network servers. • Conducted weekly and daily backup reports for all network servers. Key Contributions: • Received award for the successful completion of sizable project at the State Department and its World Bank location. This involved upgrading the Agency’s security software platform and developed and maintained linkage with its Office of the Coordinator for cyber polices. • Developing budget for network equipment resulting in year-over-year savings of 20% and equipment cost reduction of $250,000 dollars. • Managed programing project of a $7.5 million dollar CCure Database upgrade that increased efficiency by 27% and reduced errors by 18% Assistant Supervisor, DRS Technologies, May 2006- July 2007 (U.S. Pentagon Force Protection Agency) Alexandria, VA Responsible for monitoring fire, burglary and office alarms; handle emergency calls and dispatch pentagon police for Response; Coordinated with multiple divisions to secure and schedule security coverage for various site-wide events throughout day • Provided support to Capitol Hill Police personnel to provide prompt and effective response to emergency citations. • Monitored intrusion alarms; for the Secretary of Defense residence, The Vice Chairman, and other DOD facilities as well as all external and internal alarms on the House and Senate side of the Capitol; Troubleshoot faulty alarms systems. • Conducted security violation investigation reports. • Configured security cameras for instillation. • Assisted and supervised a staff of four operators at the Alarm Control Center. Lead Security Systems Operator, Quanta Systems Corp. September 2002-June 2008 (U.S. Treasury Police) Washington, D.C Reviewed, tracked, and monitored security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions • Provided protective detail support to timely threat analysis, intelligence operational, and crisis management assistance, utilizing, NCIC / WALES which required thorough knowledge in law enforcement policies and procedures, planning, emergency management as it relates to the intelligence process. • Prepared quarterly and annual reports to the Departments’ Chief, Captains, Sergeants, and the Personnel Security Investigations team on matters involving various security violations. • Monitored Close Caption TV (CCTV) cameras to detect any security breaches in and around the facility and dispatching Police personnel to respond if necessary; Assisted Treasury police, Park police, and Capital police, in the event of security threats. Download video evidence, analyzes technical data to determine solutions. • Operated a Fire Management System (FMS) in the facility to ensure the safety of all employees; Conducted authorize tests of security systems to ensure proper operation and /or determine the need for maintenance Bailey Resume 2
  • 3. Key Contributions: Certified and qualified to managed and maintain Fire Management System for United States Treasury Department • Recognized for heroism for saving officer who was experiencing life threating emergency while on post • Awarded Communications operator of the year for excellent service to the Agency Bailey Resume 3