We provide IT Staff Augmentation Services!

Cnd And Insider Threat Analyst, Team Lead Resume

5.00/5 (Submit Your Rating)

Quantico, VA

SUMMARY OF SKILLS:

  • Conveying excellent oral and written communication skills in many areas of business administration and HR management.
  • Resolving problems, prioritizing tasks, maintaining professionalism at all times, and very customer service oriented.
  • Demonstrating highly effective analytical, technical, organizational, and interpersonal skills.
  • Can work independently or as a team player for maximum viability.
  • Work well as a team lead to organize projects, deadlines, meetings, interdepartmental coordination, etc.
  • Designing presentations, posters, newsletters, flyers, logos, and other promotional materials.
  • Coordinating arrangements for conferences, meetings, & events.
  • Working with upper management for maximum results from hiring.
  • Working with and recruiting the best possible matches for projects and training them to establish a strong base for the companies.
  • Establishing needs and risk assessments for all departments and organizational units.

TECHNICAL / COMPUTER SKILLS:

Technical knowledge in the following fields: Accounting, Construction, Statistics, Finance, Server configuration and support, Civil Engineering, Physics, Network configuration and support, computer modeling, specialized cyber security, cyber intelligence, intelligence network and system security, data at rest security, incident analysis, log analysis, network and system defense, IDS and IPS security.

Other technical skills: Business & Creative Writing, Proofreading & Editing, Preparation / Editing / Submission of Manuscripts & Reports, Scientific & Statistical Typing, and research for projects and development. Writing SOPs, policies, procedures, proposals, etc. for IT, Information Assurance, cyber security, and related issues.

Security Tools: McAfee Enterprise Security Manager, McAfee ePO (v3.5 and up) and Confidential related modules ( Confidential, VSE, DLP/DCM), SolarWinds, Splunk v6 and up, Tenable Confidential 4.0 and above, Tenable Confidential v5 and above, STIGs, eMASS, etc.

Microsoft: Access, Excel, SQL, Outlook, PowerPoint, Visio, Word, MS Exchange, SharePoint, Small Business Accounting, Project, OneNote, and Publisher.

Adobe: Acrobat, Photoshop, Premiere

Other: , Dreamweaver, Lotus Notes, QuickBooks Pro, Quicken, AutoCAD, Autodesk Civil 3D

Operating Systems: Windows XP, 7, 8, 10, MSDOS, MS Server 2000 - 2016, RHEL and CENTOS Linux.

EXPERIENCE:

Confidential, Quantico, VA

CND and Insider Threat Analyst, Team Lead

Responsibilities:

  • Responsible for providing CND and IA analysis, and incident response. Assisting with incident response and real - time network monitoring.
  • Also, responsible for reviewing all security-related logs. Such as reviewing proxy, firewall, DNS, etc. Analyze customer requirements for security issues, work with Confidential compliance requirements, IA requirements for Confidential .
  • Having to identify security related solutions on current networks as well as planning for future expansions and improvements.
  • Planning and determining best needs for Confidential as well as making changes as needed to existing systems. Have been providing support for persistent monitoring of all designated networks, enclaves, and systems. Interprets, analyzes, and reports all events and anomalies in accordance with Computer Network directives, including initiating, responding, and reporting discovered events. Managed and executed first-level responses and addresses reported or detected incidents.
  • Reported to and coordinated with external organizations and authorities. Coordinated and distributed directives, vulnerability, and threat advisories to identified consumers.
  • Using a SIEM tool, mainly McAfee Enterprise Security Manager, to gather logs, events, alerts, etc. in order to analyze the network and server activity.
  • Monitoring external access to the network and devices, as well as internal changes to the same. Work with Confidential and all of its components in order to better secure and monitor Confidential assets.
  • Also, working as an Confidential admin when required to implement IAVM/CTO/FRAGO/INFOCON guidance. Working with ePO 4.5 and 4.6, E-policy orchestration tools, Host Intrusion Prevention Systems ( Confidential ) via Confidential, McAfee Anti-Virus (AV), and relating products to keep network and host environment secure. Working to engineer better solutions for Confidential and tie it into the rest of the CND response system. Also, assisted with Confidential preparation on Confidential and all other CND efforts.
  • Working with and preventing issues with vulnerabilities using Tenable Confidential /Security Center in Confidential, implementing STIGs, NSA guides, Security Checklists, and Security Readiness Review Scripts. Conducting activities with Threat Indicators such as working with malware prevention/response, Confidential, Spillage, abnormal network activity, scans, root level compromises, and conducting spot checks for systems on Confidential networks for DoD and Confidential compliance. This also includes supporting the C&A of Confidential systems with Confidential . Became lead on Confidential project in October 2014. Working with previous and current versions of Confidential scanner and Tenable SC.
  • Briefing and training program managers, project leads, application managers, system administrators, and IA leads on IA, Incident Response, CND efforts, and methods for securing all of the Confidential systems. Serving as the Cyber Incident Response Team coordinator and policy developer for all CIRT policy creation and implementation. Using CND tools Sourcefire 4.10 and 5.2, Splunk 6 for Enterprise, McAfee Firewall and Firewall Reporter, McAfee Enterprise Security Manager 9 and its appliances, and other Confidential implemented tools. Worked with Guidance Software EnCase 7 and up for forensic investigations, CND activities, and Insider Threat work. Working to develop more analytical tools via Python for in-house big data processing, especially for high usage applications that Confidential agents and managers use.

Confidential, Quantico, VA

Computer Network Defense Engineer/ Cyber Security Analyst

Responsibilities:

  • Responsible for providing CND and IA analysis, and incident response.
  • Assisting with incident response and real-time network monitoring. Also responsible for reviewing all security-related logs.
  • Such as reviewing proxy, firewall, DNS, etc.
  • Analyze customer requirements for security issues, work with Confidential compliance requirements, IA requirements for Confidential .
  • Having to identify security related solutions on current networks as well as planning for future expansions and improvements. Planning and determining best needs for Confidential as well as making changes as needed to existing systems.
  • Have been providing support for for persistent monitoring of all designated networks, enclaves, and systems. Interprets, analyzes, and reports all events and anomalies in accordance with Computer Network directives, including initiating, responding, and reporting discovered events.
  • Managed and executed first-level responses and addresses reported or detected incidents.
  • Reported to and coordinated with external organizations and authorities. Coordinated and distributed directives, vulnerability, and threat advisories to identified consumers.
  • Working with ePO 4.5 and 4.6, E-policy orchestration tools, Host Intrusion Prevention Systems ( Confidential ) via Confidential, McAfee Anti-Virus (AV), and relating products to keep network and host environment secure.
  • Working to engineer better solutions for Confidential and tie it into the rest of the CND response system. Also assisted with Confidential preparation on Confidential and all other CND efforts. Working with and preventing issues with vulnerabilities using Retina, Tenable Confidential /Security Center in Confidential, implementing STIGs, NSA guides, Security Checklists, and Security Readiness Review Scripts.
  • Conducting activities with Threat Indicators such as working with malware prevention/response, Confidential, Spillage, abnormal network activity, scans, root level compromises, and conducting spot checks for systems on Confidential networks for DoD and Confidential compliance.
  • This also includes supporting the C&A of Confidential systems with Confidential .
  • Became lead on Confidential project in October 2014. Completed training on using Confidential 4.6, 4.7 and 4.8, taking over project and working with Ops and Enterprise Security to implement scans and reporting.
  • Briefing and training program managers, project leads, application managers, system administrators, and IA leads on IA, Incident Response, CND efforts, and methods for securing all of the Confidential systems.
  • Serving as the Cyber Incident Response Team coordinator and policy developer for all CIRT policy creation and implementation.
  • Using CND tools Sourcefire 4.10 and 5.2, Splunk 6 for Enterprise, McAfee Firewall and Firewall Reporter, McAfee Enterprise Security Manager 9 and its appliances, and other Confidential implemented tools.

Confidential, Fairfax, VA

Information Assurance Engineer Lead/Cyber Security Operations Engineer

Responsibilities:

  • Job duties typically included planning and implementing security measures to protect computer systems, networks and data.
  • I was responsible for protecting all sensitive information within a company and responsible for insuring all networks have adequate security to prevent unauthorized access.
  • Developed reports to share with administrators about the efficiency of security policies and recommend any changes.
  • I ensured that all security systems are current with any software or hardware changes in the company.
  • Planned and documented all security information in the company including physical and internet security.
  • Worked with the Network Engineering teams and help shape engineering designs and implementations to support the various IA projects, tools, and policies across both LAN systems as well WAN systems.
  • Defined operations, security and integration tool requirements to allow users to evaluate and analyze their network resources for performance and scalability in test-bed and modeled environments.
  • Developed security procedures for design reviews, and for operational monitoring, recording, and responding to security events.
  • Identified system requirements for operations and security, and works with other engineers and staff to develop designs and integrate components.
  • Developed the operations, management, integration & security requirements.
  • Created and implementing IA policies as part of the Enterprise Cyber Defense team.
  • Performed enterprise audit functions to include identifying vulnerabilities and assessing the DTS-PO enterprise security posture
  • Performed day-to-day collection, analysis, and security event handling activities
  • Provided Security Incident and Indications/Warnings Analysis and Response and Coordinated with other agency entities as required
  • Performed ad hoc vulnerability scanning using Tenable Security Center
  • Performed technician level functions on all the IA tools, ensure auditing tools, analysis and reporting are compliant and current, and ensure compliance with policies and procedures.
  • Created, tested and implemented network disaster recovery plans.
  • Performing risk assessments and testing of data processing systems.
  • Performed real-time situational IA awareness and continuous monitoring, develop concepts and architectures for performing intrusion detection and protection of DTS-PO systems, and tune activities on agents
  • Served as the Cyber Incident Response Team Lead (CIRT)
  • Identified and access events
  • Gathered evidence and determine if an event is an incident
  • Reported incidents
  • Took action to contain/limit the damage and prevent any further damage from happening
  • Ensured the removal of malicious or illicit content and clean affected systems
  • Assisted with the restoration of affected systems
  • Documented lessons learned
  • Performed equipment maintenance activities coordinating with vendors as necessary
  • Performed Systems Administration and technician level functions for the IA tool suite (comprised of HIDS, NIDS and VMS). SEIM (Arcsight, Tenable LCE, Splunk) and IDS (Sourcefire and Tripwire) Also using EnCase and Tenable LCE/PVS for other monitoring capabilities.
  • Monitored vulnerability announcements and create a local remediation repository
  • Developed technology solutions and inventory IA resources, user vulnerability scanning tools to support Certification and Accreditation, verify remediation using vulnerability scanning tools, Procure IA equipment, software and resources consistent with Federal Acquisition Regulations, and ensure compliance with policies and procedures and managing Enterprise Audit functions

Confidential, FT Meade, MD

Security and Systems Engineer

Responsibilities:

  • I provided expert support, analysis and research into exceptionally complex problems, and processes relating to the subject matter.
  • I also served as technical expert on executive-level project teams providing technical direction, interpretation and alternatives.
  • Worked independently and demonstrated exceptional written and oral communications skills.
  • Guided the successful completion of major programs and may function in a project leadership role.
  • I developed technical solutions to complex problems that require the regular use of ingenuity and creativity. Work is performed without appreciable direction.
  • I was assigned as the lead of the Functional Testing team for testing on McAfee products including ePO Orchestrator, Confidential Protection Products, misc GOTS products, etc.
  • I am also now working with the Confidential IA package which includes installing, upgrading, testing and maintaining the baseline for Confidential with Security Center and Confidential scanner.
  • Another product I worked on as a primary was eMASS 4.X. We had versions 4.2 and above in the lab and I was the project as a lead tester/engineer. I also served as the lab manager for the IA5 team, in charge of managing all access to lab systems as well as managing the equipment itself. Other items part of the everyday work was:
  • Tracked projects and helping PM manage projects and assignments to the rest of the teams. Helping lead a team of 6.
  • Worked with VMware ESX Server/Client 4.0 and up, environment on a daily environment
  • Worked with the Windows Product Family (i.e. Window XP, 2003, 2008, etc.)
  • Worked with 8500.1/8500.2 Directives and Information Assurance (IA) Guidance (i.e. Security Technical Implementation Guides (STIGs) for Confidential, Windows Family, UNIX/Linux Variants, MS SQL 2005/2008)
  • Worked with one of the Vulnerability Assessment tools (i.e. Retina, REM, EUS, etc.)
  • Used McAfee ePO Orchestrator Server 4.x, Confidential 6.0 and up, VSE up to v8.8, Policy Auditor, and testing all of its components along with 3rd party applications
  • Worked with SharePoint environments. Including migrating from 2007 to 2010. This includes, but is not limited to: gathering requirements, writing up the plan, deploying resources, migrating, testing, and deploying final SharePoint site(s) for site. Also working with Exchange 2007 and 2010.
  • Worked writing and updating technical documentation (i.e. Data Migration and Deployment Plans, Engineering / Architecture Design Documents)
  • Worked with RDBMS databases mainly Microsoft SQL 2008 and 2008 but also some familiarity with Oracle.
  • Wrote detailed test procedures and test plans, Software functional testing, regression testing as needed, while working with the Certification and Accreditation team.
  • Worked with security products, Confidential (including Security Center 4/5 and Confidential 4/5) and eMASS 4.2 and above.

Confidential, Washington, DC

Sr. Systems Administrator

Responsibilities:

  • Windows systems administration including installing system security patches, hot-fixes, Information Assurance Vulnerability Action (IAVA) directives, Security Technical Information Guides (STIGs)/Security Readiness Review Evaluation Scripts (SRRs),
  • Used standards for NIST, Confidential, NETWARCOM, COMSEC, and many others as a template for security and operational procedures.
  • Reviewed tasks, issues, and recommend changes to reduce problem reoccurrences, performing server support, network administration functions, and Automated Information Systems assistance.
  • Configured network and server software, hardware and peripheral devices to resolve network issues.
  • Provided performance metrics, work load status update, and project status updates at weekly workload tracking meetings.
  • Provided VMware Virtual Server environment and ESX hosts and VMWare project support within the AAUSN.
  • Worked with RDBMS databases mainly Microsoft SQL 2008 and 2008 but also some familiarity with Oracle. With Oracle I worked with the front end products and learned how they worked with applications as well as some minor configurations when working with Oracle.
  • Great deal of use for network (WAN and LAN) routing, TCP, IP, DNS, WINS, DHCP, and other related internet protocols. Also, using many Windows server tools and applications, Active Directory, and
  • Provided on the Program Management Tool application level support (maintenance, troubleshooting, patches, upgrades), to include but not limited to tools such as SharePoint (MOSS 2007), ARIS, ASAP, MS Project, and using 8 years of Server & Systems Administrator Experience on Windows 2000/2003/2008 Server
  • MS Outlook 2007/2010 and MS Exchange 2007, Network monitoring using ITA and OIT provided tool
  • Tracked projects and assignments to the rest of the teams. Helping lead a team of 3.

Confidential, Washington, DC

Systems Administrator

Responsibilities:

  • Provided operational support for OPRNET servers running Microsoft Windows 2003/2008 servers, Microsoft Exchange server 2003, Microsoft SQL 2000/2005 server, and Confidential Backup Exec 12 for Windows. Provide system administration support for OPRNET with Microsoft Windows Active Directory and Windows XP Professional workstations.
  • Worked with SharePoint environments. Including migrating from 2007 to 2010. This includes, but is not limited to: gathering requirements, writing up the plan, deploying resources, migrating, testing, and deploying final SharePoint site(s) for site. Test and implement the SharePoint environment for local users to document share as well as hosting the department’s intranet.
  • Scanned and reported vulnerabilities. Testing and applying updates, hot fixes and service packs using WSUS and BigFix.
  • Used tools such as Retina, Hercules, WSUS, McAfee ePO, Confidential Gold Disk, SRR's, Confidential STIGs' NMP, and Confidential to search and patch security vulnerabilities.
  • Used standards for NIST, Confidential, NETWARCOM, COMSEC, and many others as a template for security and operational procedures
  • Provided updates to Standard Operating Procedures and other documentation.
  • Tested and deployed new hardware or software products for implementation in the OPRNET environment
  • Assisted OPR staff in statistical research and data analysis and creating reports and databases as needed in Microsoft Access 2003 databases as well as Microsoft SQL 2000/2005 databases.
  • Managed and maintain optimum level of performance of the Microsoft SQL server 2000/2005 databases used at OPR.
  • Delivered emergency and COOP support, including reporting to alternate sites, when necessary.
  • Advised OPR IT staff and OPR Management on solutions or options to improve the network’s functionality and security.

Confidential, Patuxent River, MD

Windows Integration Administrator

Responsibilities:

  • Worked on Microsoft Windows OS based, COTS (commercial off the shelf) applications support, multi-location server/application design and operations including Oracle Primavera 5.0 and 6.2, Serena Dimensions, Microsoft Office SharePoint Server 2007, and HP Quality Center.
  • Demonstrated experience in creating and troubleshooting enterprise services that necessitated the understanding of the complex interactions among applications, databases, server operating systems, internet/network protocols, and client configurations.
  • Demonstrated thorough understanding of application and data security issues resident in enterprise class environment. This includes all levels of security and their understanding such as IAVAs and INFOCOMs.
  • Coordinated with Information Assurance and Server Teams to ensure the servers are maintained in accordance to site security standards. Using and reporting with scanning tools such as the Confidential, Retina, Gold Disk tools.
  • Worked with SharePoint environments. Including migrating from 2001 to 2003, 2001 to 2007, 2003 to 2007, and a 2010 test environment. This includes, but is not limited to: gathering requirements, writing up the plan, deploying resources, migrating, testing, and deploying final SharePoint site(s) for site. This process was introduced and handed over to myself and my team for multiple sites.
  • Used tools such as Retina, Hercules, WSUS, McAfee ePO, Confidential Gold Disk, SRR's, Confidential STIGs' NMP, and Confidential to search and patch security vulnerabilities.
  • Used standards for NIST, Confidential, NETWARCOM, COMSEC, and many others as a template for security and operational procedures
  • Patched all systems under ERP custody with tools such as SCCM, Altiris, and WSUS and in the test environment, BigFix as well as manually patching as needed.
  • Worked in a high-tech organization with the skills necessary to maintain agility and to make critical decisions under pressure in a fast-paced environment on a day to day basis. I also used this knowledge to progress through long term projects.
  • Monitored the trouble ticketing system (HEAT) and responded to customer requests for assistance with Windows server applications and provided guidance and work leadership to less-experienced analysts.
  • Researched new Windows software and hardware requirements created and maintain documentation and procedures for Windows application support. Analyzed and coordinated application/front-end/system/interface outages and interruptions.
  • I showed a strong problem-solving methodology and the ability to work with individuals at all levels of the organization as well as external vendors are required.
  • I implemented and documented a great deal of processes, procedures, and results metrics for the purpose of continuous operational improvement and adherence.
  • Experience with supporting Web/application farm architectures and technologies (Websphere, Apache, IIS, Java, Jboss 4.0.X to 5.0.X, and JDBC)
  • Worked with RDBMS databases mainly Microsoft SQL 2005 but also some familiarity with Oracle. With Oracle I worked with the front end products and learned how they worked with applications as well as some minor configurations when working with Oracle.
  • Great deal of use for network (WAN and LAN) routing, TCP, IP, DNS, WINS, DHCP, and other related internet protocols. Also, using many Windows server tools and applications, Active Directory, and
  • Provided on the Program Management Tool application level support (maintenance, troubleshooting, patches, upgrades), to include but not limited to tools such as SharePoint (MOSS 2007), ARIS, ASAP, MS Project, DOORS, Dimensions, Primavera and Risk Radar.
  • Limited exposure to Citrix and its Xen App 5.0 and up. Working with mainly Web Interface.
  • Tracking projects and helping PM manage projects and assignments to the rest of the teams. Helping lead a team of 6 with tasking and project management.

Confidential, Washington, DC

Sr. Systems Administrator

Responsibilities:

  • Performed systems installations, systems upgrade and maintenance at data centers. Troubleshoot and resolve hardware and software related problems on company web, database and file servers. Configure system and network parameters, troubleshooting and replacing old and outdated Cisco network equipment. Monitor system stability and performance. Help develop tools to monitor and maintain systems.
  • Wrote good documentation and keep the company's manuals up to date.
  • Operating Systems, Windows, NT, XP, Vista, Windows Server 2003 Networking Technologies, VMWare on Windows 2000 and Windows 2003, LAN, WAN, DNS, TCP/IP, Active directory, Exchange, SAN devices for photography users (Only in a small role though)

Confidential, Towson, MD

MIS Manager

Responsibilities:

  • Provides information processing, systems counseling and guidance to management personnel throughout the corporation. Plans and controls departmental staffing, development, organization, hardware acquisitions, and facilities to ensure that they are consistent with the business plan of the corporation.
  • Directs the design, development, and maintenance of systems, programs, and systems software to meet management's information needs.
  • Establishes MIS policies, standards, practices, and security measures to ensure effective and consistent information processing operations and to safeguard information resources. Administers the department's expense budget within budgetary guidelines to contribute to cost-effective operation of the corporation.
  • Selects, develops, and motivates qualified staff to effectively carry out department functions and provide for the continuity of managerial and specialized skills. Maintains knowledge of developments in the area of systems and hardware and incorporates new developments into future systems of the corporation.
  • Operating Systems, Windows, NT, XP, Vista, Windows Server 2003 Networking Technologies: LAN, WAN, DNS, TCP/IP, Active directory, Exchange
  • Tracking projects and reporting to CEO manage in regards to projects and assignments to the rest of the teams. Leading and managing a team of 10. Also managing any vendor interactions.

Confidential, Reidsville, NC

Engineering Systems Analyst

Responsibilities:

  • Prepared product proposals, product requirement specifications, data sheets, application notes, and reference design kits.
  • Established, monitored, and revised goals for the project team.
  • Streamlined company operations, identified more productive methods to achieve top performance, eliminated waste and reduced expenses.
  • Prepared weekly project status reports.
  • Recruited or requested specialized personnel, successfully completing all projects on time and under budget.

Confidential, Richmond, VA

Project Manager

Responsibilities:

  • Directed daily operations of department, analyzing work flow, establishing priorities, developing standards and setting deadlines. Assign and review the work of systems analysts, programmers, and other computer - related workers. Supervised 25 team members and made sure they stayed on task.
  • Interviewed applicants to obtain information on work history, training, education, and job skills to obtain best working environment not only on my project but for the company as a whole.
  • Evaluated recruitment and selection criteria to ensure conformance to professional, statistical, and testing standards, recommending revision as needed.
  • Planned for future staffing requirements, interviewed, and evaluated job applicants, negotiated contracts and consulting firms pricing for open positions
  • Interviewed supervisors to determine specific needs and conducted follow-up placement satisfaction surveys
  • Recruited and trained network and desktop support technicians
  • Configured routers, firewalls, domain name services, e-mail, Web, and ftp services and installed and configured various peripherals: scanners, modems, tape backups, printers, SCSI devices, hubs and switches, and digital imaging devices, Windows, NT, XP, Vista, Windows Server 2003 Networking Technologies: LAN, WAN, DNS, TCP/IP, Active directory, Exchange

Confidential, Ashland, VA

Systems Administrator

Responsibilities:

  • Oversaw setup of servers and desktop workstations
  • Designed and constructed a wide - area network connecting satellite offices to corporate headquarters
  • Configured routers, firewalls, domain name services, e-mail, Web, and ftp services
  • Managed systems configuration and maintenance, problem troubleshooting, planning and directing upgrades, and testing operations to ensure optimum system functionality
  • Created recruitment flyers and presentations, designed, planned, and facilitated business workshops and seminars for potential new hires
  • Brainstormed with management staff to develop more appropriate interviewing questions then previously used, which allowed the organization to judge and hire more qualified employees

We'd love your feedback!