We provide IT Staff Augmentation Services!

Resume

2.00/5 (Submit Your Rating)

Pentagon Incident Handler Suffolk, VA

SUMMARY:

  • Senior Cyber Security Analyst with over 15 years of hands - on technical, policy and physical security experience.
  • 5 years’ experience implementing operational and project-based initiatives in support of key business strategies and Information Technology (IT) solutions.
  • Breadth of experiences encompasses: creating IT Governance and shared operational vision, information technology management, human resource allocation, conducting statistical analysis, strategic planning, and utilizing Threat Modeling for optimal enterprise security results.
  • A convincing and credible leader able to coach, motivate, and mentor team members in support of ambitious operational and project goals. Additional strengths include:
  • Executive Communication
  • Metrics Analysis
  • Process Improvement techniques
  • Strategic Security Planning

COMMERCIAL HARDWARE/SOFTWARE KNOWLEDGE:

  • System Center Configuration Center (SCCM)
  • Solaris 8/10
  • Windows XP/Vista/7/10 and 2003/2008 Server
  • Cisco Routers/Switch
  • Solar Winds
  • KIWI system logger analysis
  • Active Directory
  • System Monitor (Xterm)
  • Gold disk
  • Unix/Windows SRR
  • SCAP
  • SCCM analysis
  • Multiplexers
  • Modems
  • SPECTRUM Monitoring systems
  • Remedy Helpdesk
  • Adtran Modems
  • FORE ATM and Timeplex
  • SNDI1910 Modems
  • Firebird 4000, 6000

WORK EXPERIENCE:

Confidential, Suffolk, VA

Pentagon Incident Handler

Responsibilities:

  • Forensic analysis of digital information. Ensures chain of custody and control procedures, documents procedures and findings in a manner suitable for courtroom presentation and prepares comprehensive written notes and reports
  • Identify network computer intrusion
  • Investigate computer fraud and other electronic crimes against network assets.
  • Contributes to completion of milestones associated with specific projects.
  • Provides solutions to a variety of technical problems of moderate scope and complexity.
  • Exercises judgment within defined procedures and practices to determine appropriate action.
  • Frequently uses an application of technical standards, principles, theories, concepts and techniques.

Confidential, Suffolk, VA

Sr. CND/Vulnerability Analyst

Responsibilities:

  • Directly responsible for creating and Implementing Joint Staff Risk Management (flaw remediation) Program with consideration to the organization’s goals, identifying accountable management and charged with carrying out risk-related functions (e.g., planning, organizing, coordinating, implementing, monitoring, and controlling Joint Staff risk management program).

Confidential, Suffolk, VA

Senior Info System Security Analyst

Responsibilities:

  • Directly responsible for the engagement of Flag Officer (Admiral), Executives (C-Level), Senior Executive Service (SES) and various IT Directors of their command cyber security postures. Manage Cyber Security Inspection / Command Cyber Readiness Inspection ( Confidential teams on behalf of Fleet Cyber Communication ( Confidential ) / Defense Information Systems Agency (DISA) to meet Cyber Security Inspection and Certification Program ( Confidential ) and the Office of Compliance and Assessment (OCA) directorate deliverables
  • As one of three Department of the Confidential Team Leads, I am the technical Point of Contact to organize the work completed by a team of civilians and contractors that forms the nucleus of the inspection body that travels worldwide to audit naval networks to identify vulnerabilities to Department of Defense Information Network.

Cyber Security Trends Analyst

Confidential

Responsibilities:

  • Analyzed and compiled data into usable/productive formats to support leadership briefings and enhance ability to identify shortfalls in cyber security manning, training, or system performance.
  • Conducted all data analysis, studies, pilot programs, or inspection follow-up as deemed necessary.
  • Supported security assessment reports, plans of action and milestones through data trending metrics.
  • Provided high level insight into findings, mitigation and assisted in creating after action plans.

Confidential

Technical Lead

Responsibilities:

  • Votes to quarantine and/or disconnect Combatant Command's is based on the risk to the Confidential 's Global Information Grid ( Confidential ).
  • Outstanding CAT I, II, III vulnerability findings, non-compliance with Confidential 8500.2 Certification and Accreditation requirements, or failure to generate an After Action Report ( Confidential ) within post-inspection timeframe resulted in 25% disconnection/quarantine from the Confidential 's Confidential .

Confidential

Policy Analyst

Responsibilities:

  • Assisted in the creation of custom checks/benchmarks for 41,750 Air Force network assets.
  • Recommended GPO settings to resolve compliance failures.
  • Worked closely with programmers, aiding in the writing of custom scripts to automate manual checks and resolve compliance failures.
  • Worked closely with programmers to develop and test custom policy checks based on operational needs.
  • Maintained SME-level knowledge of current and future Policy Auditor components; provided SME-level input for development of Air Force PA Confidential products.
  • Experience working with NIST Special Publications and C & A process methodology
  • Familiarity and experience with the Confidential program; vulnerability tracking, reporting and remediation using Confidential VMS, OCRS, VRAM and Sailor 2.1.
  • Firm understanding of CJCSM 6510.01. FIRM understanding of Confidential CND orders, directives and reporting products. Firm understanding of Air Force directives: AFIMAN(Information Assurance),AFI (COMSEC), AFSSI,TCNO,CCO.

Confidential

Senior Information Assurance Analyst

Responsibilities:

  • Draft and Verification of Letter of Justification (LOJ)
  • Responsible for all aspects of Camp Marmal / Pratt physical network security
  • Ensured 99.75% IAVA compliancy through three enclaves, SIPR, NIPR and CENTRIX. in adherence to AR-25-1, AR 25-2,AR-25-1, Confidential 8500.1, Confidential 8500.2 and STIG directives
  • Managed Personnel: 75 Information Management Officers (IMO)
  • Managed Personnel: 36 Confidential 580th Confidential CO IA Workforce and General Workforce (DSST)
  • DIACAP: Developed Camp Marmal / Camp Pratt IATT and IATO packages.
  • Coordinated and audited regional weekly scanning results of three US networks for IAVA compliance by unit or base IA Officers. Coordinated with ISAF InfoSec Officers on Afghan Mission Network security issues and information spillages. Brief RC-North regional status and issues in weekly Afghanistan IA Working Group meetings.
  • Camp Marmal / Pratt liaison for U.S. Army Criminal Investigation Command (CID)
  • Data Loss Prevention Analyst (DLP)
  • Reported and investigated Negligent Discharge of Classified Information (NCDI and Spillage) Cross Domain Violation (CDV)
  • Web Risk Assessment Analyst with direct report to O-5 and other senior leadership (Blue Coat)
  • Reviewed and implemented Network Defense Actions ( NDA)
  • Developed triage policies and procedures to evaluate suspicious activity; performed blocking of Internet protocol (IP) networks; monitored, operated, and maintained network and host-based Intrusion, Detection System (IDS) sensors; and provide host-based security management service

Confidential, Portsmouth, VA

Information Assurance Engineer

Responsibilities:

  • The Certification Test and Evaluation (CT&E) and Security Test and Evaluation (ST&E) and its resulting security reports of critical navigation systems
  • Development and validation of system security policy in compliance of Confidential mandates.
  • Presented security strategies and participated in security related meetings and forums to render a compliant and stringent security posture encompassing Enhanced Compliance Validation (ECV) and Independent Verification and Validation (IV&V) within the Certification and Accreditation (CA) process.

Confidential, Chesapeake, VA

Network Security Engineer

Responsibilities:

  • Cisco Access Control Lists ( Confidential ) to control entry to fleet assets. Develop POA&M and assisting in the transition and/or termination of legacy networks.
  • Created command essential databases, to assist in IA vulnerability/mitigation tracking.
  • Assisted affiliated commands with recommended modifications and/or propose solutions to conform to monthly auditing tasks. Assisted in analyzing and evaluating the security requirements of naval networks meeting UTNP/CTNP compliance.
  • Drafted Executive Summaries and Command Specific Audit policies. Assisting in the support and development of DITSCAP documentation. Reviewed, analyzed, and created security accreditation documentation for Confidential networks.
  • Developed and supported network Interim Authority To Operate (IATO) packages for the IA suites located in the National Capital Region ( Confidential ).

We'd love your feedback!