Cybersecurity Team Lead It Specialist Resume
2.00/5 (Submit Your Rating)
SUMMARY:
- Over 26 years’ experience in information systems as a Cyber Security Analyst, System Administrator, Network Manager, Cyber Security Engineer, Computer Technician and Customer Support.
- Successfully managed over 800 computer systems including Windows and Unix servers, Cisco Routers, Switches, and Firewalls at more than 40 different locations.
- Knowledge and experience implementing the Department of Defense (DoD) Security Programs and Information Assurance Certification and Accreditation process and activities.
TECHNICAL SKILLS:
- DoD RMF and A&A
- Project management
- Policy and procedure development and implementation
- Vulnerability scanning software and Vulnerability Management
- Implementation, administration, and monitoring of Firewalls, Windows servers, and network hardware.
- Anti - Virus software deployment and administration
- Patch Deployment
- Remote management utilities
- VMware on both Windows servers and Linux operating systems
- Excellent customer service and interpersonal skills providing the ability to communicate with individuals across all levels and diverse cultures
- Excellent vendor relation skills
- Ability to prioritize and manage broad range of responsibilities effectively
- Ability to understand long term goals and manage toward those ends
PROFESSIONAL EXPERIENCE:
Confidential
Cybersecurity Team Lead IT Specialist
Responsibilities:
- Providing technical support and guidance to staff in matters relating to information security, cybersecurity, and Information assurance. defining IT security requirements for programs enclaves, and networks.
- Conducting security evaluations and analysis of information systems and networks to identify vulnerabilities and risks.
- Ensuring network and information systems security is integrated into the lifecycle of a system/network.
- Conducting systems security evaluations, audits, and reviews; providing guidance to network and systems design to ensure implementation of appropriate systems security policies. Developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures.
- Utilizing multiple tools and research forums to define the risk posture of a system, network or applications; in order to synthesize the research into a written risk assessments and recommendations. providing guidance to in network and systems design to ensure implementation of appropriate systems security policies; assesses security events to determine impact and implements corrective actions.
- Performing risk analysis of systems based on architecture and implementation of security features and determines residual risk to operations based on the analysis
- Perform Risk Management Framework (RMF) activities by evaluating the confidentiality, integrity, and availability of applications, systems, and networks.
- Collaborating with organizational managers to support organizational objectives: identify IT security program implications of new technologies or upgrades.
- Reviewing and analyzing threats and vulnerabilities to a given environment in order to develop a risk posture determination.
- Developing Creating, Tracking, and Reviewing Plan Of Action and Milestones (POAMs) in order to identify system weaknesses and the tasks needed to mitigate or resolve them.
- Assuming responsibilities for completion of assigned projects within the scope of command objectives, priorities and time and resource constraints.
System/Network Administrator
Responsibilities:
- Planned and managed projects.
- Applied a wide variety of applications, operating systems, protocols, and equipment, as well use methods and practices to troubleshoot, recover, adjust, modify, improve and secure IT systems
- Served as the Information Assurance Security Officer (IASO) and Information Management Officer (IMO)
- Developed and implemented system security plans, policies and preventive maintenance schedules
- Ensured compliance with established Information Assurance Vulnerability Management (IAVM) programs, corporate and enterprise-wide anti-virus programs, user and administrative account management, auditing, and other on-device technical security controls utilizing a variety of assessment and mitigation tools, hardware appliances, software programs, processes, and strategies
- Managed and conducted risk and vulnerability assessments of planned and installed Information Systems to identify vulnerabilities, risks, and potential needs
- Developed and interpreted IT related DOD, US Army, Fort Bragg, and industry standard policies, standards and guidelines including ISO 27000, ISO 27001, ISO 27002, PCI, NIST, and HIPPA utilized systems diagnostic tools, fault identification techniques, and problem-solving methods, runs tests to verify operability and functionality of all directorate systems, servers, Redundant Array of Independent Disks (RAID), networking equipment to include network interface cards, DSL equipment, modems, cabling, hubs, repeaters, Cisco Firewall, Routers, and Switches
- Installed new releases of the operating system (Windows XP, Vista, 7, and 8, Windows Server 2003, 2008, and 2012, and Unix/Linux) and software applications for clients and servers as well as security updates and patches to the operating system and software applications plus vulnerability mitigation.
- Performed file maintenance and scheduled system backups
- Isolated causes of system problem between hardware, system software, interconnectivity, and applications programs
- Resolved equipment and software compatibility issues and resolves questions concerning telecommunications protocols; modems, front-end processor/controller, and other interface problems
- Conducted advanced malware research to remain abreast of emerging cyber threats.
- Planned, designed and reviewed designs of information systems
- Installed and configured Public Key Infrastructure (PKI)
- Installed and configured encryption on client workstations
- Provided training, consultation and technical support services to command, co-workers, contractors and users on subjects as local area networking, wide area networking, operating system architecture and capabilities, commercial off-the shelf (COTS) software, corporate application software, system utility capabilities, standards and procedures, configuration management, performance management, and capacity planning
- Prepared and presented reports and briefings to the technical staff and managers
- Oversaw warranty and vendor repair of all software and hardware
- Tools utilizing include Kali Linux, Python, Powershell, Nmap, Wireshark, WebScarab, and Burp Suite.In 2000, 2006, 2010 I received a customer service award In 2000, 2006, 2010 for outstanding customer service.received In March 2015 award for outstanding performance for a project that was done in November and December 2014.