Hadron Forge IT

Call Hadron Forge IT

572-212-2252

Experience

Experience History

A sector-focused record of infrastructure leadership, systems administration, technical documentation, and operational support. Public identifiers are intentionally generalized for privacy and security.

What this experience represents

Robert Towler’s background combines military aviation and technical service, enterprise infrastructure administration, security-minded documentation, healthcare-adjacent systems support, public safety operations, nonprofit continuity work, gaming infrastructure, and field-tested operational discipline. Across sectors, his pattern stays consistent: secure the environment, reduce failure points, document what matters, and leave systems stronger than he found them.

Infrastructure Architecture Systems Administration Documentation Leadership Healthcare Support Public Safety Environments Military Aviation IFTE and ULLS-A(E) HAZMAT and Safety
Multi-Client Infrastructure Administration and CIO-Level Advisory Healthcare support • Nonprofit operations • 3CX • Fortinet • Access control • SOP development

Scope of work

In a multi-client advisory and hands-on infrastructure role, Robert supported healthcare-adjacent and nonprofit environments that required dependable connectivity, clean change control, and strong physical and logical security. The work ranged from network planning and procurement through detailed runbooks, endpoint strategy, and communications continuity.

Core responsibilities

  • Maintained and improved EHR, EMR, LIS, radiology-adjacent, and secure communications environments.
  • Supported 3CX voice systems, facility access controls, gate and badge systems, and continuity-sensitive hotline infrastructure.
  • Produced detailed SOPs, infrastructure reports, onboarding and offboarding procedures, and patching guidance.
  • Coordinated hardware and licensing research, renewal planning, and standardized security tooling.
  • Documented multi-ISP failover, FortiGate, FortiSwitch, and FortiAP environments in a way leadership could review and approve with confidence.

How this experience translates

  • Comfortable operating where privacy, uptime, and escalation discipline matter.
  • Strong ability to bridge technical implementation with stakeholder communication.
  • Experienced in healthcare-adjacent environments where documentation quality matters as much as the technical fix itself.
  • Able to support both executive planning and hands-on remediation, often in the same engagement.
Public wording is intentionally generalized to protect client privacy while still showing the scope and seriousness of the work.
Public Safety, Detention, and Justice-Oriented Infrastructure Detention networks • CJIS-minded controls • HIPAA-adjacent medical segmentation • Grants • SOPs

Operational environment

Robert led modernization work in a county-level law enforcement and detention environment where network stability, secure remote connectivity, procedural rigor, and audit-minded controls were necessary. The scope included headquarters operations, detention infrastructure, medical segmentation, and remote or offsite endpoints.

Primary contributions

  • Developed a large standard operating procedure set covering maintenance, encryption direction, connectivity standards, and operational consistency.
  • Published infrastructure reports tied to compliance-minded hardening, end-of-life planning, and identity and MFA improvements.
  • Segmented medical and detention-adjacent systems to support secure connectivity with outside healthcare portals.
  • Built documentation around incident response, continuity, disaster recovery, HIPAA-aligned practices, and formalized systems planning.
  • Researched and supported dozens of grant initiatives tied to modernization, firewalls, endpoint security, and backup resiliency.

Why this matters

  • Demonstrates experience in environments where operational failure has immediate public consequences.
  • Shows ability to build controls for mixed-use environments with detention, medical, administrative, and remote-site requirements.
  • Reflects strong written discipline through plans, procedures, risk documentation, and technical briefings.
  • Shows comfort working where security, public trust, and continuity requirements all intersect.
Agency names, facility names, and local references are intentionally generalized on this public version.
Gaming, Revenue-Critical, and Always-On Network Operations High availability • Vendor segmentation • Multi-ISP failover • Access control • Compliance-facing reporting

Environment profile

In a revenue-sensitive gaming and entertainment setting, Robert supported a large device footprint across physical and virtual servers, managed switches, gaming-floor equipment, voice systems, access control, and branch connectivity. The work required stable uptime, careful vendor coordination, and strong awareness of compliance and audit expectations.

Technical scope

  • Maintained firewalls, VPNs, IDF and MDF environments, point-to-point links, fiber and Ethernet paths, and multiple ISP services.
  • Planned and improved failover behavior for revenue-critical operations.
  • Segmented gaming, corporate, guest, and vendor traffic using VLANs and port-level restrictions.
  • Documented vulnerability findings, outdated infrastructure concerns, access logging, and server room controls.
  • Worked across surveillance, security, food and beverage, vendor, and audit-facing dependencies.

Operational value

  • Built experience in environments where downtime is visible, expensive, and unacceptable.
  • Learned to balance vendor access needs with strong segmentation and internal control.
  • Strengthened runbook writing and event triage for always-on operations.
  • Improved future-state planning around cable management, fire suppression research, labeling, and standardization.
Public wording intentionally avoids naming vendors, regulators, tribal entities, and specific sites.
U.S. Army Service, Aviation Support, Network Architecture, and Information Management 14 years honorable service • ULLS-A(E) • SharePoint • LAN/WAN • VSAT • Flight-support environments

Service foundation

Robert’s military service established the discipline that still shapes his technical work. Over 14 years of honorable Army service, he supported aviation and technical operations in environments where documentation, accountability, equipment readiness, and calm troubleshooting were not optional.

Information systems and mission support

  • Directed and supported LAN, WAN, wireless, satellite-connected, and aviation-maintenance support environments.
  • Administered Windows Server-based systems with services such as DHCP, DNS, and Active Directory.
  • Managed websites, SharePoint, SQL-backed workflows, and ULLS-A(E) environments supporting aviation maintenance and logistics functions.
  • Maintained mission-critical backups, structured processes, and information flows for operational users under pressure.
  • Supervised, mentored, and trained soldiers and technical personnel while maintaining accountability for high-value equipment and sensitive systems.

Operational character

  • Worked in combat and overseas support environments without relying on guesswork or informal process.
  • Handled systems where weak documentation could become an operational problem.
  • Applied structured troubleshooting, scripting, and anomaly review well before those methods became common language in civilian security operations.
  • Brought the same mindset into civilian infrastructure work: readiness, traceability, control, and repeatability.
Installations, units, and operational details are intentionally generalized in this public version.
MOS and Technical Military Experience 35Y • 94Y • 15P • 74D • Electronics • IFTE • Flight operations support • CBRN

35Y, Integrated Family of Test Equipment Operator/Maintainer

Early technical service included 35Y duties centered on automated test equipment, component-level troubleshooting, adjustment, alignment, and repair of supported systems. This is where Robert’s electronics discipline, diagnostic structure, and procedural mindset were built.

94Y, IFTE Operator/Maintainer

Later service under 94Y expanded that foundation into supervised maintenance support, Base Shop Test Facility operations, test program set use, fault isolation, PMCS, equipment modifications, maintenance records, and technical guidance for lower-ranking soldiers.

15P, Aviation Operations Specialist

Aviation operations support included flight clearances, records control, notices to airmen, weather and navigation data handling, classified material safeguarding, overdue-flight monitoring, reporting procedures, and operational support to tactical flight functions.

74D, Chemical Operations Specialist

Reserve-side service included 74D responsibilities tied to CBRN and hazardous-material awareness, detection and decontamination support, training, reporting, preparedness, and safety-minded operational oversight.

Why the MOS history matters

  • 35Y and 94Y explain the component-level diagnostic depth behind his later IT work.
  • 15P explains his comfort with flight-line, mission-timing, records integrity, and operations support.
  • 74D and related training explain his structured approach to safety, hazardous-material awareness, accountability, and preparedness.
  • Together, these experiences created a systems leader who understands both the equipment and the operational consequences around it.
Military Training, Leadership Development, Safety, and Inspection Discipline ALC • WLC • BNCOC • Safety • HAZMAT • Training Development • Inspection results

Leadership and development courses

  • Completed Warrior Leader Course, Basic Noncommissioned Officer training, and Electronic Maintenance Advanced Leader Course.
  • Held training-development-related qualification experience and leadership-focused structured self-development coursework.
  • Completed additional supervisor, manager, and safety-related training that reinforced communication, resource management, and structured leadership.

Safety and HAZMAT-related training

  • Completed HAZMAT familiarization and safety in transportation training.
  • Completed hazardous-material handling and related safety coursework.
  • Completed commanders safety, additional duty safety, and risk management coursework.

Inspection and readiness culture

  • Recognized multiple times for strong inspection outcomes and for disciplined technical performance.
  • Built repeatable processes that could survive annual reviews, personnel turnover, and operational pressure.
  • Carried that same inspection mindset into civilian SOP work, infrastructure assessments, and compliance-facing reporting.
This section is intentionally framed around skill development and discipline rather than unit-level public detail.
Additional Professional Experience That Strengthened Technical Leadership CAD and drafting • Construction • Heavy haul • HAZMAT • Utility installation • Small business ownership

Design, fieldwork, and operations outside IT

  • Operated a custom residential design business producing non-engineered plans and 3D renderings.
  • Worked in CAD and field-operations roles supporting utility and energy-related environments.
  • Led underground utility crews responsible for safety, coordination, and accurate field execution.
  • Handled heavy haul and HAZMAT-related transport work under regulatory and scheduling constraints.

How that experience helps his IT work

  • Strengthened project life-cycle thinking, blueprint reading, documentation accuracy, and field coordination.
  • Improved communication with non-technical stakeholders and executive decision-makers.
  • Reinforced respect for safety, sequencing, resource planning, and real-world consequences.
  • Contributed to a style of leadership that is practical, grounded, and comfortable under pressure.
Core Capability Summary Networks • Servers • Security • Documentation • Training • Response under pressure

Technical strengths

  • Network segmentation, routing, switching, VPNs, WAN and site connectivity.
  • Windows Server environments, Active Directory, DNS, DHCP, SQL-backed systems, virtualization, and backup strategy.
  • Security tooling, endpoint strategy, vulnerability assessments, and compliance-minded hardening.
  • Healthcare-adjacent, public safety, nonprofit, gaming, and mixed operational environments.
  • Runbooks, SOPs, assessments, technical plans, and documentation leadership.

Leadership traits reflected in the record

  • Trainer and mentor with experience supervising small and mid-sized teams.
  • Comfortable with emergency response, extended coverage, and degraded environments.
  • Strong bias toward structure, accountability, and operational clarity.
  • Able to translate complex technical realities into procedures, plans, and stakeholder-ready summaries.