We provide IT Staff Augmentation Services!

Cyber Defense Analyst Resume

Arlington, VA

SUMMARY:

Technically savvy IT professional seeking job experience in fields relating to Computer Science, including High Performance Computing (HPC), Information Technology, Information Security, Cyber Security, Cloud Computing, Computer Programming, and System Integration.

TECHNOLOGY COMPETENCIES:

  • Intel - based PCs
  • Intel-based Macs
  • LittleFe Mobile Cluster
  • RaspberryPi 2/3
  • Android and iOS devices pfSense Firewall
  • AWS
  • Microsoft Visual Basic
  • C Programming Language
  • C++ Programming Language
  • Batch scripting
  • BASH scripting
  • JavaScript
  • PHP
  • Python- in progress
  • Microsoft Office Suite
  • Oracle Virtualbox
  • VMWare Workstation
  • Vi
  • Wireshark
  • EnCase
  • Netwitness
  • Nessus
  • Autopsy
  • Splunk
  • Solarwinds
  • Microsoft Windows 9x - 10
  • Linux (Debian/RedHat based) macOS (OS X)
  • Windows Server r2
  • ChromeOS
  • MS-DOS

WORK EXPERIENCE:

Confidential, Arlington, VA

Cyber Defense Analyst

Responsibilities:

  • Assist Confidential federal lead and team lead with coordinating, executing, and completing enterprise-wide phishing exercise
  • Index results by agency, highlighting first time clickers and repeat offenders per quarter, per fiscal year
  • Developed Splunk alerts for the SOC analysts to inform the team of threats
  • Monitor incident response alerts from Splunk and ePO for threat intelligence
  • Reviewed vulnerability scan reports to vet requests to introduce hardware and software into the enterprise
  • Research phishing and attempted malware infections using Splunk and Cisco Threat Grid
  • Research data exfiltration attempts and potentially compromised workstations with Command and Control activity using Cisco Stealthwatch and Splunk
  • Maintain incident and vulnerability database for SOC
  • Incidents are either cyber or non-cyber
  • Reported from Confidential or the enterprise
  • Vulnerability reports are collected from Confidential and disseminated to the enterprise operation teams
  • Teams must report back with compliance or compliance plan
  • Perform forensic analysis using Autopsy and FTK Imager

Confidential, Manassas, VA

Senior Cyber Security Engineer

Responsibilities:

  • Assisted project manager with shaping SOC operations at HUD
  • Learned logistics of Hyperion program for and development purposes
  • Investigate computer related crimes within the organization
  • Discovered vulnerabilities using Nessus
  • Utilized tools given to prevent malicious hacking attempts, and document findings
  • Network administration
  • Configured HP switches for VLAN and VOIP
  • Deployed domain infrastructure using samba and CentOS
  • Help desk tasks
  • Provisioned/de-provisioned users from all company services
  • Setup peripherals (printers, mobile devices, etc.)
  • Advised users with troubleshooting, etc.
  • Designed technical diagrams
  • Produced and modified SOPs based on new security events, alerts, and compliance
  • Analyzed PCAP and log files from Confidential
  • Managed company assets
  • Administered and aided in managing infrastructure design and implementation
  • Assisted in company research and development
  • Perform vendor management of resources for company move to new facility
  • Assisted in deployment of MSSP infrastructure in AWS
  • Deployed 19 VMs for specific services in the northern VA. Availability zone
  • Deployed script to apply password policies to infrastructure nodes
  • Assisted in deployment of Splunk demo in AWS
  • Used Splunk CloudFormation Tools for deployment, deploys a number of instances and links an S3 bucket for storage
  • Generated Keypair account for admin and demo accounts
  • Setup Public IP and security groups to access demo from the web
  • Assisted company in ISO 27001 and DFARS compliance

Confidential, Washington, DC

Chief Information Officer

Responsibilities:

  • Establish Confidential ’s technical vision and leads all aspects of Confidential ’s technological development
  • Directs Confidential ’s strategic direction, development and future growth
  • Works in a consultative fashion with program managers, in HPC, Geographic Information Systems (GIS), Robotics, Networking, as an advisor of technologies that may improve their efficiency and effectiveness
  • Provide leadership to program managers in a fashion that supports the company’s culture, mission, and values
  • Conducts research and case studies on leading edge technologies and makes determinations on the probability of implementation
  • Acts as a good steward of Confidential resources and ensures control of information technology and program budgets

Systems and Network Administrator

Confidential

Responsibilities:

  • Maintain and service all computer hardware/software for Confidential
  • Maintain Active Directory user accounts and server software installations
  • Monitor local and remote connections to Confidential ’s servers and computers
  • Assist Pre-college students in developing research and communication skills for projects in advanced computing and contemporary mathematics
  • Assist GIS Administrator in teaching student how to use ESRI ArcGIS program
  • Provide assignments utilizing the RaspberryPi platform and Scratch in order to teach analytical thinking skills to students.

Confidential, Washington, DC

Internet Technology Specialist

Responsibilities:

  • Ensure the successful execution of all incident response policies, procedures, guidelines, and response actions
  • Perform threat monitoring activities, keeping informed of industry trends to ensure operational awareness
  • Prepare documentation for annual audits
  • Perform scheduled audits of user accounts for policy violations
  • Identified and blocked malicious indicators using FireEye and Sourcefire
  • Investigated potentially infected workstations using ProofPoint, Encase, and IronPort
  • Assist in the development/implementation of new guidelines and standard operating procedures
  • Monitor the Confidential portal and processed reports
  • Review data center access logs
  • Lead response efforts in incident response remediation
  • Perform risk assessment on suspicious domains

Confidential, Bowie, MD

Technical Student Assistant

Responsibilities:

  • Assisted staff in troubleshooting technical issues
  • Performed quality control of scanned student admission documents
  • Managed, updated, and sorted potential student files

Help Desk Manager

Confidential

Responsibilities:

  • Inventoried, maintained and serviced technological equipment used and stored in the library
  • Assisted users with troubleshooting issues and provided consultation on dealing with technological issues

Hire Now