Supervisory It Specialist Resume
3.00/5 (Submit Your Rating)
Fort Belvoir, VA
PROFESSIONAL EXPERIENCE
Confidential, Fort Belvoir, VA
Supervisory IT Specialist
Responsibilities:
- Serves as technical Supervisory IT Specialist and Section Chief for Computer Defense Assistant Program (CDAP) Section to manage and direct a team of cyber security engineers to perform Penetration Testing, Red Team, Network Assessment Visit (NAV), Network Damage Assessment (NDA) and Cyber Opposing Force (OPFOR).
- Oversees the Army Penetration Testing Certificate (APTC) training program to train, certify, and track the Army Penetration Testing Technician (APTT) in accordance with (IAW) AR 380 - 53 Communication Security Monitor and AR 25-2 Information Assurance.
- Supervises subordinate staff including approving leave, enforcing brigade and battalion policies, standards and procedures, recommending awards, developing employee position descriptions and performance standards, and assisting in the preparation of Individual Development Plans. Performs the administrative and human resource management functions relative to the staff supervised.
- Serves as a subject-matter-expert (SME) to advise the Detachment Chief on technical issues of computer/information, network security, diagnostic methods and potential solutions cyberspace operation missions. Serves as a SME on both information security compliance topics as well as SME on the tools, techniques, procedures, methods and processes that are used for the cyber security operations.
- Serves as principal technical authority and lead specialist to manage and direct a team of cyber security engineers who perform the CDAP core missions, which includes penetration testing, Red Team, Network Assessment Visit (NAV), Network Damage Assessment (NDA) and Cyber Opposing Force (OPFOR).
- Directs and leads a team of civilian, military and contractor personnel to conduct threat/vulnerability analysis, and exploitation development in support of Offensive Cyber Operations (OCO) and Defensive Cyber Operations (DCO).
- Provides leadership to develop, manage, and enhance the long-term plan for CDAP, CTC missions and cyberspace operations that anticipate, identify, evaluate, mitigate and minimize the risks associated with the systems vulnerabilities.
- Reviews and recommends effective solutions to customer problems based on an understanding of how the network infrastructure and services interrelate and support the cyber operation missions and the viewpoints of the consumers of those products and services. Have an in-depth understanding the range of successful cybersecurity practices requires defining both high quality cybersecurity knowledge content and a well-organized network structure of the knowledge within an organization
- Directs, monitors and evaluates the system documentation for all assignments IAW DoD, and Army regulations, policies and directives. Determines CDAP equipment related needs and performs cost analysis for purchasing purpose.
- Currently holds DoD IAT Level III, CSSP Auditor and Army Penetration Test Technician (APTT) certifications. Serves as Cyber Opposing Force (Cyber OPFOR) Technical Lead for a team of up to six operators to perform the offensive cyber operation techniques, vulnerability assessment, compliance test, application assessment and penetration testing on both classified & unclassified Army tactical networks.
- Oversees the Army Penetration Testing mission to test and evaluate through exploitation to assess the Army network defense capabilities, the ability of the system administrator, incident response team to detect the presence and mitigate effects of a malicious actor.
- Serves as an Expeditionary Cyber Opposing-Force (ECO) Operations Lead to support and advise the management on matters of Threat Cyber Operations in order to test and evaluate the network defense capabilities and operational security postures of the Army unit based on the real world threats.
- Utilizes approved proprietary Army developed tools, specialized tools, including open-source tools available on Kali Linux in order to detect and exploit the system vulnerabilities. Documents the testing procedures, techniques, tactics, and procedures (TTP) and action taken to brief the leadership, and stakeholder.
- Performs Cyber OPFOR Technical Lead to develop penetration testing techniques, rules of engagement (ROE) and computer exploitation methodologies to gains access, expand access, and maintain undetected access of the Army Mission Command Systems at the Combat Training Center (CTC), Combatant Command exercises and other government/military forces worldwide.
- Provides training and mentoring to the newly assigned military and civilian personnel on the Penetration Testing Methodology, open-source research, reconnaissance operations, and computer exploitation techniques, including Army Penetration Test Methodology. Assists and guides team members in acquiring the required certifications IAW DoD 8570.01 and the Army regulations.
- Provides Red Team, cyber opposing force capability, computer network exploitation, attack tactics and techniques for the test & evaluate the Information Assurance (IA), Computer Network Defense (CND), and Operation Security posture of the military. Deploys to locations worldwide to evaluate and test network defense capabilities of Brigade, Division and Corps elements. Conducts Computer Network Attack (CNA), Computer Network Operations (CNO) and Computer Network Exploit (CNE) to identify the vulnerabilities. Researches, develops, implements and optimizes custom advanced exploitation TTP for Cyber Opposition Force operation conducted on the tactical and strategic military networks.
- Works closely with Cyber Support Detachment (CSD) to provide policy recommendations, and technical guidance to commanders and staffs for protecting and operating information networks and systems. Enables Cyberspace Planning, Operations, Integration and Synchronization activities by leveraging capabilities of Offensive Cyber Operations (OCO) and Defensive Counter Cyber Operations ISO Warfighter full spectrum operations.
- Serves as senior IT Specialist of computer hardware and software responsible for coordinating and providing technical support. Supports integrated opposing force (OPFOR) capability with the primary focus of supporting the operation and readiness of the Battle Command Systems (BCS) and Information Operations (IO) functions. Supports testing and training capability by maintaining the robust Computer Network Defense (CND) and Computer Network Operations (CNO) training programs with the objective of increasing manpower availability and proficiency as it relates to CND/CNO test and training events.
- Prepares computer equipment and pre-mission training prior to deploy to CTC missions. Plans, coordinates, and executes Threat Cyber in accordance with approved intelligence information. Analyzes network scan results to determine and categorize potential vulnerabilities of networks. Provides direction to military, government, and/or contractor IT specialists supporting opposition force (OPFOR) operations. Responsible for maintenance and configuration management of OPFOR equipment during penetration test and training events. Supports penetration test and training events through effective portrayal of OPFOR Cyber, to include, Computer Network Attack (CNA), Computer Network Exploitation (CNE), and Computer Network Defense (CND). Provides penetration test and training data for post-test analysis.
- Responsible for IO lab computer equipment requirements. Determines IO Lab computer related needs and conducts cost benefit analysis on future equipment, software and capabilities. Tests and evaluates systems and programs used on assessments. Prepares and adjusts needed reference documents (SOPs, manuals).
- Provides expertise and support in network architecture, hardware and software configuration, and system requirements for the cyber range. Assists other members in utilizing IO Lab for training in vulnerability assessment or computer security procedures. Provides test and training support when cyber range is connected to other remote laboratory networks locations for CNA/CND simulations.
- Researches DoD, Army, Computer Defense Assistant Program (CDAP) and other applicable regulations in order to support OPFOR mission effectively. Serves as technical subject matter expert (SME) to conduct penetration testing (PenTest) on the LandWarNet (LWN) IAW Army Regulation-AR 25-2, Information Assurance (IA), AR 380-53 and Communications (COMSEC) Monitoring.
Confidential, Fort Meade, Maryland
Information Technology Specialist
Responsibilities:
- Served as senior lead IA for DoD Vulnerability Management System (VMS) to collect/monitor the Information Assurance Vulnerability Alert (IAVM) compliance from each Combatant Command, Service, and Agency (CC/S/A) within the assigned network operation sites. Analyzed and validated the vulnerability, installed and configured the security patch/hotfixes in accordance with DoD’s requirements and recommendations. Identified the risk level using the Risk Reporting Matrix, and determined the effect, and aid in setting risk mitigation process. Monitored and evaluated systems to ensure compliance with IT security requirements. Refined the description of the risk and documented the result in the program risk database.
- Led a team of civilian and contractor personnel to support in defining and maintaining network architecture and infrastructure. Performed configuring and optimizing network servers, hubs, routers, and switches. Monitored network capacity and performance, included diagnosing and resolving network problems. Performed installing, testing, maintaining, and upgrading network operating systems software for division. Ensuring the rigorous application of information security/ information assurance policies, principles, and practices in the delivery of network services.
- Served as Sr. Systems Analyst to develop plans and objectives related to SATCOM, Standardized Tactical Entry Point (STEP) and Defense Information System Network Tactical Edge (DISN-TE) systems which advance organizational missions, goals and/or requirements. Provided collection and analyses to enable senior level officials to identify trends and needs for adjustments to meet stated objectives. Effectively drafted planning and programming documents according to the stated SATCOM requirements. Assessed programs for compliance with the directives and standards, providing accurate and timely advice, guidance and input concerning compliance issues. Effectively evaluated alternative courses of action and make recommendations based on program knowledge and judgment. Analyzed requirements and the impact of new technologies when developing studies. Compiled, organized and analyzed data that is accurate, reliable and beneficial to the accreditation and certification of systems.
- Served as Principal IA Security Manager for SATCOM, Standardized Tactical Entry Point (STEP) and Defense Information System Network Tactical Edge (DISN-TE) through effecting updates, applying acknowledgment of new vulnerabilities in preparing POAM's and updating current findings status on all equipment. Applied all DISN-TE network security patches/updates for all telecommunication devices (Cisco, Microsoft, Juniper, iDirect, and other IP devices) from Confidential HQ's Network Operation Management System (NOMS) to all the current operational sites (Landstuhl, Ft Buckner, Arifjan, and Camp Roberts), and emerging site augmentations (Ft Belvoir and Croughton). Validated all updates to ensure no adverse effects on the network by applying information to appropriate Vulnerability Management System (VMS) accounts weekly or as needed based on current new vulnerability releases. Prepared information security policies, standards, strategic plans, and forecasted in support of operational requirements, and to develop new methods, approaches, and procedures.
- Performed the User Acceptance Test for the Common Network Planning Software (CNPS) and reported the problems to the development team for fixing. Participated in testing as the Government Representative as required, and ensure compliant evaluations. Reviewed the testing plans to ensure engineering and administrative consistency and that previously engineered requirements for the CNPS are being satisfied.
- Served as a SharePoint Site Manager for division site and primary site owner for branch. Maintained Top-Level site within site collection, and to administers, and maintains all sub-sites to enforce site standards in layouts, security processes. Managed site layout (look and feel), structure, and content. Provided one-on-one troubleshooting, and acted as the liaison between end-users in their organization and the Tier 2 Intranet Support Team. Ensured users are granted appropriate access to internal portal content, as defined by the security functionality provided within the associated content stores. Created/Modified/Deleted lists and libraries, sub sites and workspaces required to meet organizational needs. Published/Approved site content. Managed Recycle bin, site features and site analytics. Provided SharePoint end-users with best practices, policies, and procedures for using SharePoint in their daily activities.
- Utilized multiple tools as Nintex and Quest to build, and enhance custom web part, advanced page, calendar, form, social media list, workflow functionalities, and enhance document management. Performed coding, reviewing, testing, and work closely with senior branch members to conceptualize, design, and launch the newly designed site to the community and customer. Used web part to display, edit, and modify list item data. Customized lists, libraries, and links as mission required, and creates workflows to automate the mission support processes.
- Effectively supported the mission by researching the DoD and other applicable information assurance (IA) policies & regulations. Serves as subject matter expert (SME) for information systems.
- Performed computer engineering assignments associated with the implementation and transition of DOD SATCOM, Military Communication Satellite Systems (MILSATCOM), subsystems and components, proposed and existing communication satellite systems, and electronic data processing systems and their integration with information systems networks.
Confidential, Fort Meade, Maryland
Information Technology Specialist
Responsibilities:
- Served as Principal SATCOM, Standardized Tactical Entry Point (STEP) and Defense Information System Network Tactical Edge (DISN-TE) IA Security Manager through effecting updates, applying acknowledgment of new vulnerabilities in preparing POAM's and updating current findings status on all equipment. Applied all DISN-TE network security patches/updates for all telecommunication devices (Cisco, Microsoft, Juniper, iDirect, and other IP devices) from Confidential HQ's Network Operation Management System (NOMS) to all the current operational sites (Landstuhl, Ft Buckner, Arifjan, and Camp Roberts), and emerging site augmentations (Ft Belvoir and Croughton). Validated all updates to ensure no adverse effects on the network by applying information to appropriate Vulnerability Management System (VMS) accounts weekly or as needed based on current new vulnerability releases.Performed Sr. System Administrator for DoD Vulnerability Management System (VMS) to collect/monitor the Information Assurance Vulnerability Alert (IAVM) compliance from each Combatant Command, Service, and Agency (CC/S/A) within the assigned network operation sites. Analyzed and validated the vulnerability, installed and configured the security patch/hotfixes in accordance with DoD’s requirements and recommendations. Identified the risk level using the Risk Reporting Matrix, and determined the effect, and aid in setting risk mitigation process. Refined the description of the risk and documented the result in the program risk database.
- Served as Sr. Systems Analyst to develop plans and objectives related to SATCOM, Standardized Tactical Entry Point (STEP) and Defense Information System Network Tactical Edge (DISN-TE) systems which advance organizational missions, goals and/or requirements. Provided collection and analyses to enable senior level officials to identify trends and needs for adjustments to meet stated objectives. Effectively drafted planning and programming documents according to the stated SATCOM requirements. Assessed programs for compliance with the directives and standards, providing accurate and timely advice, guidance and input concerning compliance issues. Effectively evaluated alternative courses of action and make recommendations based on program knowledge and judgment. Analyzed requirements and the impact of new technologies when developing studies. Compiled, organized and analyzed data that is accurate, reliable and beneficial to the accreditation and certification of systems.
- Served as a SharePoint Site Manager for division site and primary site owner for branch. Maintained Top-Level site within site collection, and to administers, and maintains all sub-sites to enforce site standards in layouts, security processes. Managed site layout (look and feel), structure, and content. Provided one-on-one troubleshooting, and acted as the liaison between end-users in their organization and the Tier 2 Intranet Support Team. Ensured users are granted appropriate access to internal portal content, as defined by the security functionality provided within the associated content stores. Created/Modified/Deleted lists and libraries, sub sites and workspaces required to meet organizational needs. Published/Approved site content. Managed Recycle bin, site features and site analytics. Provided SharePoint end-users with best practices, policies, and procedures for using SharePoint in their daily activities.
- Utilized multiple tools as Nintex and Quest to build, and enhance custom web part, advanced page, calendar, form, social media list, workflow functionalities, and enhance document management. Performed technical coding, reviewing, testing, and work closely with senior branch members to conceptualize, design, and launch the newly designed site to the community and customer. Used web part to display, edit, and modify list item data. Customized lists, libraries, and links as mission required, and creates workflows to automate the mission support processes.
- Primary point of contact for the end user within the branch requiring assistance with computer hardware, software problem or other IT inquiries. Oversaw hardware, software, network peripherals and related technology systems. Guided all aspects of administration to ensure optimum acquisition, development, methodology, functionality, and security.
- Provided direct support to the Joint Staff and USSTRATCOM by performing a Technical Assessor role to DSCS/WGS current and future SATCOM requirements and providing submission to the Joint C4I Decision Support Center (JCDSC) for inclusion into the SATCOM Data Base (SDB) and subsequently submission to the Joint SATCOM Panel (JSP) for final approval. Attended monthly JSP meetings to track actions and ensured their closure in accordance with specified due dates. Served as Sr. Technical Assessor function to support completion of annual revalidation of SDB requirements within time allotment. Responded to queries as applicable within specified timeframes. Effectively evaluated alternative courses of action and makes sound recommendations based on program knowledge and sound judgment.
- Assisted Control System Subject Matter Expert (SME) in completing testing the Common Network Planning Software (CNPS). Monitored the implementation of the Joint Management and Operations Subsystem (JMOS). Tracked the development of the Integrated Satellite Communications (SATCOM)-Global Information Grid (GIG) Operations and Management (ISOM) Joint Capability Technology Demonstrations (JCTD) capability to ensure meeting objectives. Participated in testing as the Government Representative as required, and ensure compliant evaluations. Reviewed the testing plans to ensure engineering and administrative consistency and that previously engineered requirements for the CNPS are being satisfied.
- Performed computer engineering assignments associated with the implementation and transition of DOD SATCOM, Military Communication Satellite Systems (MILSATCOM), subsystems and components, proposed and existing communication satellite systems, and electronic data processing systems and their integration with information systems networks.
- Served as the principal technical liaison for the development of Terminal and Modem Certifications database to ensure all the capability are compliant with Software Requirements Specification (SRS). Defined and validated the need for proposed new or improved systems through consultation with program officials in customer program organizations. Reviewed design and functional requirements that support the need for the terminal and modem certification process, and identify and evaluate potential systems design approaches. Determined best approaches for systems implementation within the technical environment, and works with software developers to isolate and solve design problems encountered during testing and implementation stages.
Confidential, Chantilly, Virginia
Senior Systems Analyst
Responsibilities:
- Served as Senior Systems Analyst to support the development of a Monitoring and Control (M&C) System for a DoD satellite communications network that Confidential is developing for the US Army. Performed Monitor & Control (M&C) system test planning, development of test procedures and documentation of test results for required M&C functions. Developed and tested the Configuration Management (CM) system, Human Computer Interface (HCI) and related database development efforts that are part of the overall M&C system.
- Responsible for software testing on the new release of the Protected Anti-Jam/Anti-Scintillation Wideband Net-Centric System (PAAWNS) and the collaborative tools. Developed software dialogs for the Human Computer Interface (HCI) and create AUI (Advanced User Interface) applications for the functional testing of the system. Developed and maintained an implementation plan for the ongoing testing effort.
- Setup the Cluster and Distributed Replicated Block Device (DRBD) Test Bed for PMC Cluster Development and instantiate a replicating filesystem. Installed and configured DRBD and Heartbeat for replicated storage solution between servers. Configured and troubleshoot Clonezilla server/client for software development/testing, and data recovery.
- Developed and maintained relationships with customers with diverse needs. Provided moderately technical or complex information about products and services. Assessed the needs of customers and identified or tailored products and/or services to meet their needs. Resolved fairly complex or non-routine problems, questions, or complaints and direct the most complex problems, questions, or complaints to the appropriate person.
- Performed Senior System Administration (SA) duties on Microsoft Windows and Linux operating systems (OS), including installing, setting up, configuring, analyzing, and maintaining network equipment, network appliance, and 3COM switch box. Created Standard Operation Procedure (SOP) and provided technical support to the client. Configured and setup all new install projects for servers, switches, network appliances and other network resources.
- Setup and configured Diskless Remote Boot in Linux (DRBL), Dynamic Host Configuration Protocol, and Trivial File Transfer Protocol servers to use the Clonzilla for cloning the system, data recovery, and software update/backup. Installed and configured Preboot Execution Environment (PXE) server on the client machine for multicasting that is supported in Clonezilla server.
- Reviewed the complex data from multiple sources and determine relevant information to a given situation. Drafted, edited and disseminated written reports and status updates that are factual, timely and relatively error free.
- Maintained detailed documentation throughout all phases of Research and Development (R&D). Regularly conducted tests as required to evaluate product performance, and design data processing procedures. Upon the successful implementation of the product tested, provide life-cycle configuration management (CM) as described in the Concept of Operations (CONOPS). Review and process the Security Readiness Review (SRR) and Information Assurance Vulnerability Alert (IAVA) to ensure the developing platforms comply with the requirement
Confidential, Torrance, California
Software Test Engineer
Responsibilities:
- Assigned as Software Test Engineer to the Joint Surveillance Target Attack Radar System (J-STARS) team to perform functional, acceptance, and environmental tests on the J-STARS electronic system in production at Confidential . Directed engineering team responsible for configuration and installation of test equipment.
- Monitored and reviewed test results, especially test failure to verify that the measured performance is in compliance with the specifications. Analyzed negative trend, and reviewed potential shortfalls against expectation. Revised the Acceptance Test Procedure (ATP) to in corporate requirements changes into the existing software test plan. Designed, implemented and debugged software changes in Visual Basic. Set up and verified functional test, and reliability acceptance test (RAT) under vibration and thermal test environment.
- Supervised the test technicians to ensure quality control and that all projects were completed on time and within budget. Performed laboratory test, routine preventive maintenance, and quality control procedures. Integrated new hardware and software into the existing system. Upgraded the special test equipment (STE) computer to support the test mission. Monitored the test technicians to ensure all testing performance is in compliance with U.S. Air Force’s requirements.
- Worked closely with the software development team in evaluating and implementing technology solutions required to optimize the production environment.
- Effectively managed timeline and budgets, and analyzed, designed, and implemented cost-effective solutions. Conducted system analysis, and defined customer’s requirements. Troubleshot incidents reported by the end users, and provided full life-cycle support to new processes and systems.
- Promoted safety awareness and maintained safety, quality, and productivity goals. Routinely performed quality check, and ensured that all standards are met for a variety of complex applications. Skillfully integrated processes and systems into existing applications.
Confidential, Arlington, VA
Information Technology Specialist
Responsibilities:
- Evaluated commercial off-the-shelf (COTS) hardware/software packages to recommend the equipment upgrade to enhance the existing systems. Installed and configured commercial off-the-shelf (COTS) software and hardware packages to support the mission.
- Managed, maintained and monitored circuit configuration for the Terrestrial Critical Control Circuit (TCCC) network of the Defense Satellite Communications Systems (DSCS). The TCCC (141 worldwide operational stations) provides classified, secure connectivity to the worldwide DSCS system. Contacted and coordinated with different operation centers in order to process and prepare Telecommunication Service Request (TSR) initiatives.
- Performed Sr. System Administrator’s duties to install, configure, troubleshoot and maintain PC, laptops, peripheral devices, such as hard disk, CD/DVD drives, printers, SCSI adapters, and scanners in the DSCS Program Office. Installed, updated, and configured security patches for vulnerability checks to comply with DoD standards.
- Ensured technical safeguards were in place to provide controlled user access, integrity of electronic mail, applications and user data. Conducted systems security plans and disaster recovery procedures and performed Senior System Administrator’s duties to troubleshoot, maintain, and configure both classified & unclassified PCs, software, and peripherals.
- Responded to telephone, electronic mail, and/or walk-in requests for support to various IT systems and equipments and ensured they were in compliance with IT and/or SATCOM service level agreements.
- Reviewed implementation plans to ensure that system resources are available to support both the long and short-term requirements of Confidential and DoD. Recommended acceptance of deliverables from the contractor as being within scope and contract. Tracked and logged all pertinent case information, analyzed incoming agreements for inconsistencies. Engaged in research and development projects to improve the capabilities for data, voice, transmission, integrated networks, and systems.
- Served as Technical Evaluator for the Source Selection Evaluation Board of Department of Defense, Dept of the Army, HQs US Army Communication Electronics Command for the Replacement Defense Satellite Communication System Frequency Division Multiple Access Control System (RFDCS). Inputted acquired data into the departmental tracking system, and incorporated amendments into contract revision. Tracked and analyzed the proposal to identify potential problems, and reviewed agreements accurately and precisely.
- Provided daily support for the Secret Internet Protocol Router Network (SIPRNET) within the DSCS Program Office. Analyzed complex problems of software integration and test support for the DSCS and Defense Information Switch Network (DISN) system integration.
- Developed and maintained the webpage for the DSCS Program Office, and the Confidential ’s Intern Program Office. Used HTML, Macromedia Dreamweaver, Adobe Photoshop, Cascading Style Sheets (CSS), FrontPage and Visual Basic to develop, publish web pages, and enhanced the site with images and graphics. Reviewed and validated the website to ensure all the pages complied with Section 508 of the Rehabilitation Act (29 U.S.C. 794d), as amended by the Workforce Investment Act of 1998.
- Configured and customized vendor-developed databases that are used to track satellite assets. Developed SQL (Structure Query Language) programs to retrieve and display data from the DITMS (Defense Information Technology Management System) database. Coordinated backup and recovery as well as disaster planning initiatives.
Confidential, Bethesda, Maryland
Computer Assistant
Responsibilities:
- Designed and wrote various computer applications in C, Visual Basic and spreadsheet programs for researchers at the Confidential to perform data analyses, classifications, and trending. Conducted systems security plans and disaster recovery procedures.
- Performed network and desktop-based detection of viruses to counter/eliminate/control. Detected, contained and eliminated virus infestations.
- Performed system administration’s duties, included file maintenance, and data backup tasks. Installed, configured and troubleshot a wide array of commercial off-the-shelf (COTS) software, included custom applications.
- Configured new PC/workstations to connect to the Internet and Confidential ’s LAN. Primary point of contact for users requiring assistance with computer hardware, software problem or other inquiries. Performed network and desktop-based detection of viruses to counter/eliminate/control the infestations.
- Performed database administration, file maintenance, and data backup tasks. Installed and troubleshot a wide array of software, including custom applications.