Website: www.davidrchapman.com
LinkedIn: linkedin.com/in/davidrchapman
GitHub: github.com/davidrchapman
IT consultant in Northern California with over 20 years of experience.
Specializations include IT security, systems engineering and administration of physical, virtual, and cloud-based Microsoft Windows and Linux servers, Microsoft Active Directory, Microsoft Exchange, and Microsoft-UNIX integration.
Designed, built, and supported highly available multi-site external DNS Infoblox/BIND environment on CentOS Linux with Ansible
Consulted with managed services clients and prospective clients to design, install, and maintain customized business-oriented solutions including VMware vSphere virtualization environments, Microsoft Windows Server and Active Directory, Microsoft Exchange, Office 365, and Linux Server environments.
Worked with clients to resolve issues with and maintain existing systems
Planned and performed long term network traffic packet capture at multiple sites in the Sacramento and datacenter network
Performed extensive network traffic analysis to resolve application performance issue
Documented and presented findings and recommendations to management
Worked with network staff to implement SPAN port configuration changes in Cisco switch environment
Reviewed the CalPERS enterprise WAN/LAN network architecture to assess performance and availability
Documented network architecture and operational procedures of network infrastructure team
Documented and presented findings and recommendations to management
Configured and deployed EMC Application Discovery Management Platform (ADM) devices in client network environments
Worked with clients to implement SPAN port configuration changes in Cisco switch environments
Developed system for generating custom reports using Python scripting
Built and supported Microsoft Active Directory and Windows Server infrastructure with IIS and Exchange for corporate and customer environments
Configured Cisco switch and router network with secure VLAN and DMZ access between corporate and customer environments
Configured Cisco firewall with multiple DMZ configuration to partition corporate and customer enterprise environments with RADIUS integration to Active Directory for end-user access
Built and supported Microsoft Active Directory and Windows Server infrastructure to support end-user workstations
Built and supported SUSE Linux server infrastructure to support application and Web services environment
Built and supported Novell E-Directory identity management system for multiple platforms to support application and Web services environment
Built and supported multiple site IPSec VPN WAN with Cisco firewalls with RADIUS integration to Active Directory for end-user access
Built and supported Microsoft Active Directory and Windows Server infrastructure
Built and supported SUSE Linux server environment for application development and testing
Configured Services for UNIX to support SUSE Linux server authentication to Active Directory
Installed and configured Cisco firewall and IPSec VPN with RADIUS integration to Active Directory for end-user access
Supported Red Hat Linux server environment for application development and corporate use with centralized authentication for Linux servers and workstations, and Microsoft Windows workstations
Migrated infrastructure to Microsoft Small Business Server
Installed and configured Cisco firewall and IPSec VPN with RADIUS integration to Active Directory for end-user access
Supported successful sales through extensive, direct contact with enterprise and service provider customers
Designed, and installed intrusion detection and prevention solutions in client environments
Consulted with clients and prospective clients to provide network analysis and profiling to secure critical IT resources and ensure network performance
Developed customized solutions for performing network and security analysis using open source tools
Developed best practices model for successful deployment of intrusion detection/prevention solution in customer networks
Conducted extensive intrusion detection/prevention system tests using publicly available hacker utilities, open source tools, and scripting
Directed and co-authored product user’s guide
Administrated of Microsoft Server and Active Directory domain and Linux server environment
Amazon Web Services: Amazon Linux 2, Certificate Manager, CloudFront, CloudFormation, CloudTrail, CloudWatch, ElastiCache (Redis), Elasticsearch, ELB, GovCloud, IAM, RDS (MySQL), Route 53, S3, SNS, SQS, Systems Manager, VPC, VPN
Cloud Platforms: Amazon AWS, Microsoft Azure
DevOps: Ansible, AWS Systems Manager, AWS CloudFormation, Git, Infastructure as code
DNS Systems: BIND, Infoblox, Microsoft DNS Server
Linux Server: Ubuntu, Debian, Amazon Linux, RHEL/CentOS, Fedora
Linux Services: Apache, BIND, MySQL, PHP, Python, Postfix, Varnish
Microsoft AD: Active Directory 2000 to 2019
Microsoft Exchange: Exchange 2003 to 2013
Microsoft Services: Exchange, IIS, SQL Server, Hyper-V
Microsoft-UNIX Integration: Multi-Platform Authentication and Directory Services
Microsoft Windows Server: Windows NT to Windows Server 2019
Network Enumeration: Nmap, Nessus, eEye Retina
Network Troubleshooting: TCPDump, Wireshark, Etherpeek
Productivity Platforms: Microsoft Office 365 (GCC-High), Google G Suite
Scripting: Microsoft PowerShell, UNIX Shell Scripting, Python
Virtualization: VMware vSphere ESX(i) 4.0 to 5.5, Microsoft Hyper-V
Web: HTML5, CSS3, Python, Drupal CMS, MySQL, Apache, Varnish
ISC2: CISSP #54794
Amazon Web Services AWS Certified Solutions Architect - Associate (SAA) #T9SRW4MKM1FQ1PCS
Microsoft: MCSE
CompTIA: A+, Network+, Security+
Linux Professional Institute: Linux Essentials
B.A. UC Berkeley