Thomas Cestone
Details
Law Enforcement
University of Scranton
1974 : 1978
Bachelor of Science - BS
Law Enforcement
University of Scranton
DFAS
Information Technology Cybersecurity Specialist (Systems Analysis Infosec)
Skills
Administration, Army, CISSP online course certificate, Contingency Planning, Continuity of Operations Planning (COOP), Cybersecurity, Former Army Quartermaster Officer 92A00 (Logistics Officer), Former Army Systems Automation Officer, Information Assurance, Infrastructure, IT Operations, Logistics Management, Microsoft Excel, Microsoft Exchange Mail Server, Microsoft Office, Microsoft Outlook, Microsoft PowerPoint, Microsoft System Administration, Microsoft Word, Military, Military Logistics, Military Training, Network Administration, Security, Service Desk, Solaris Unix System Administration, System Administration, Troubleshooting
About
PROFESSIONAL SUMMARY:
More than 40 years of government and military experience as a forward-thinking Information Technology (IT) manager with specific experience single-handedly running all planning, support, compliance, and operations decisions/programs for a large-scale network operations unit serving approximately 12K end users worldwide. Apply vast knowledge of IT principles, concepts, and practices in arriving at robust plans and strategies aimed at ensuring full operational status of assets during both peak and off-peak demand times. Deliver strategic input into systems expansion and modification projects and assist with the necessary support services, e.g., powering down, backups, data transfers, testing, staging, and implementation, to ensure all units adapt to existing IT infrastructures. Offer a wide array of knowledge gained through hands-on real-time work as well as continued professional enrichment in the field of IT. Innovative problem solver who is well versed in performing a wide range of techniques and methods to accomplish a myriad of detailed assignments, to include installations, configurations, repairs, network administration, contingency planning, security scans, reboots, and modifications, on legacy and current hardware, peripherals, and software applications. Exceptional attention to detail; proactively inspect and monitor hardware and peripherals for optimal performance levels and initiate maintenance, as warranted.