We provide IT Staff Augmentation Services!

Cyber Security Architect Resume

4.00/5 (Submit Your Rating)

SUMMARY:

  • RMF Accreditation | Defensive Cyber Operations | Offensive Cyber Operations
  • Multifaceted Information Assurance Manager/Cyber Security Professional with over 13 years’ experience that possesses leadership abilities that directly translate into first class customer satisfaction with military precision.
  • I have a battle tested track record of supporting network technologies, offensive and defensive cyber security operations, vulnerability identification, exploitation and mitigation training others, standardizing operating procedures, implementing, diagnosing, supporting, and troubleshooting network technologies, RMF accreditation procedures and guidelines.
  • My Security Engineer experience also includes troubleshooting application software, messaging systems, backup and recovery, and resolving network connectivity issues, configuring, updating and securing CISCO routers and switches, configuring VPNs, load balancers, VoIP phones and firewalls.
  • Military trained master training specialist with technical subject matter expertise that excels in risk, vulnerability, and threat mitigation.
  • I possess an unyielding work ethic, uncanny leadership, interpersonal communication, and teamwork skills.

AREAS OF EXPERTISE:

  • Project Management
  • RMF
  • Security Assessment
  • Reverse Engineering
  • ACAS
  • RETINA
  • Metasploit
  • Social Engineering
  • Curriculum Development
  • Penetration Testing
  • Oral/Written Communication
  • ArcSight
  • Threat Mitigation
  • HBSS
  • Nessus
  • EMASS
  • Training and Education
  • Cisco Routing and Switching
  • Quality Assurance
  • Splunk
  • Exploitation Methodologies
  • Wireshark
  • VRAM
  • SIEM

TECHNICAL EXPERTISE:

Software: Active Directory, Server 2012, RetinA, VRAM, HBSS, Cisco Packet Tracer, MS Project, Microsoft Office (Word, Excel, PowerPoint, Access, Outlook) Cisco IOS, Cisco Call Manager, Remedy, Sharepoint, VMware, VSphere, Backtrack, Metasploit, Kali Linux, ACAS, Instructional Delivery, Curriculum Development, VRAM, eMASS, HBSS, Kali Linux, Metasploit, Backtrack, NMAP, Wireshark, Splunk, Arbor, Acropolis, VMS, RMF, Confidential, SHARKSEER, NOESIS, JIMS, Arcsight, exploitation methodologies

Hardware: Cisco Routers and Switches, Desktop and laptop computers, IPS/NIPS, IPX, Firewalls, VOSIP Telephony

PROFESSIONAL EXPERIENCE:

Confidential

Cyber Security Architect

Responsibilities:

  • Provided intelligence that supporting the Customer’s physical and cyber - environment risk management programs, network security programs, insider threat programs, human resource programs, foreign travel programs, critical infrastructure and supply chain programs.
  • Conducted advanced open source intelligence (OSINT) investigative research on the surface, deep, and dark web to identify indicators of nefarious activity targeting customer landscape and ecosystems as well as proactively searched and reported on relevant cyber threats.
  • Created and conducted training on investigative and intelligence research and analysis techniques.
  • Responsible for running weekly and monthly compliance scans and reporting findings to leadership and recommending appropriate mitigation steps.
  • Provided technical implementation of security solutions comprised of COTS as well as custom-developed products.
  • Prepared of documentation supporting Assessment & Authorization activities Arranged the support and/or lead Security Testing & Evaluation activities for program sell-off of security related requirement.
  • Demonstrated expert level knowledge of current IA policies as a contributor to the architecture and design of secure solutions to support customer needs and requirements.
  • Managed the day to day threats including ie: phishing, malware, unauthorized access and other types of security violations

Confidential

Cyber Security Engineer

Responsibilities:

  • Assisted with: implementing Secure Technical Implementation Guides (STIGs) to secure operating systems, databases, and information technologies in accordance with documented standards, supporting field team members in information-centric life cycle management services to clients after fielding of the system including patch validation & deployment, vulnerability management, log review, incident response.
  • Supported the continued growth of the Information security department by conducting online and in-person seminars and workshops to demonstrate the value of information security with potential clients, identifying and pursuing follow-on/add-on opportunities with existing clients, and identifying and pursuing new business opportunities in adjacent verticals, configuring, managing, and maintaining networking equipment (switches, routers, etc.), information security equipment (firewalls, IPS/IDS, SIEM), Assist with configuring, managing, and maintaining both Windows and Linux operating systems.
  • Served as a leader of project teams in a cross-functional environment.Served as a recognized expert to other IT groups on Security Operations Center and incident response related matters.
  • Provided development guidance with the identification, implementation, and maintenance of organization information security policies and procedures in coordination with organization management and administration.
  • Performed initial and periodic security assessments for incidents and conducts related ongoing investigative activities in coordination with the other corporate functions.

Confidential

Cyber Information Assurance Analyst

Responsibilities:

  • Serve as a team member and validator for Confidential programs or projects.
  • Perform broad project management responsibilities.
  • Work with Confidential clients in certification and accreditation (C&A) activities per the Confidential process.
  • Develop and execute C&A schedules, develop and modify C&A documentation, work with engineers to analyze the information assurance (IA) architecture of IT systems for compliance with Confidential policies, analyze and execute test plans, and assess the IA risk of IT systems, documenting them in formal risk assessments.
  • Liaise with the client during team meetings and one-on-one on the completion of C&A documents.
  • Review Confidential package documents for integrity and completeness, regarding testing and risk analysis.
  • Provide guidance to Software Developers, Systems Engineers, and Operations staff on system security, Certification & Accreditation (C&A) issues, information security policy, and determine security issues and impacts.
  • Perform system C&A planning, assessment validation, testing, and liaison activities.
  • Support the preparation, submission and maintenance of Trusted Facility Manuals, System Security Plans (SSP), Security Concept of Operations (CONOPS), Security Requirements Traceability Matrix (SRTM), and other security related documentation for compliance with security features and enhancements.
  • Ensured that applicable Risk Management Framework (RMF) controls were implemented successfully and evidence/test results of successful implementation were documented in the Enterprise Mission Assurance Support Service system (eMASS). Monitored and tested a subset of applicable controls and captured the results in eMASS.
  • Identified and documented RMF and Authority to Operate (ATO) related requirement deficiencies in a Plan of Action and Milestones (POA&M), within eMASS.
  • Worked closely with leadership and project personnel in order to address and close deficiencies captured in the POA&M.

Confidential

Defensive Cyber Operations Analyst

Responsibilities:

  • Provide expertise on development of strategic plans and implementation of defensive hardening initiatives.
  • Develop and maintain constant communications with Confidential, Confidential, CC/S/A/FA counterparts to gather customer requirements.
  • Help to identify Confidential HQ Future planning shortfalls or process gaps.
  • Maintain awareness of current and developing cyber threats, tactics, procedures, and vulnerabilities that have the potential to impact the Confidential .
  • Translate customer requirements and technology trends into recommendations that provide senior leadership with a flexible, cost-effective and technical framework that will adapt to the constantly changing cyber threat. Maintain awareness of Confidential directives, orders, alerts, and messages and deconflict with strategic plans.
  • Maintain awareness of Confidential Operations and DCO IDM missions.
  • Effectively communicate (written and oral) implementation plans to senior leaders.
  • Determine and implement means of measuring effectiveness of strategic plans. Analyze and seek opportunities that suggest current Confidential Ops or DCO-IDM actions being taken may require revision and that a different operational approach may be required to achieve the desired end state.
  • Analyze indicators that are approved and revalidate to ensure they remain achievable or recommend discontinuance if no longer desired. Develop course of action (COAs) outlining suggestions or change recommendations (written or verbal).
  • Ensure synchronization of JFHQ- Confidential missions into deliberate plans through internal and external collaboration and coordination with Confidential, service cyber components, combatant commands, and defense agencies, as appropriate. Include the integration of special projects into planning.
  • Assist in developing, revising, and coordinating campaign plans and orders in support of assigned missions.
  • Conducts contingency campaign planning; prepare plans in support of anticipated campaigns or major operations.
  • Maintain standing JFHQ- Confidential cyberspace campaign, contingency, and operational plans.
  • Attend Confidential JPGs and direct future planning through the JFHQ- Confidential joint planning groups (JPGs)

Confidential

Fleet System Engineer/IAM

Responsibilities:

  • Provided CND assistance in isolation, containment, and recovery from unauthorized activity.
  • Led the creation and processing of computer incident reports.
  • Performed over 520 hours of forensic and log file analysis to evaluate intrusion methods and establish mitigation and recovery plans.
  • Conducted comprehensive audits of Confidential organizations for compliance with various Confidential directives, instructions, policies.
  • Responsible for the overall procurement, development, integration, modification, operation, maintenance, and disposal of information systems.
  • Addressed the operational interests of the user community while ensuring compliance within the applicable security requirements.
  • Responsible for the development and maintenance of the SSP while ensuring the system is deployable and operated with the required security controls.
  • Ensured the appropriate operational security posture is maintained for an information system or IS.
  • Served as principal advisor on all matters, technical and otherwise involving the security of an IS.
  • Advised the N6 Deputy on all matters pertaining to Information Assurance (IA). Served as the primary liaison with the Confidential IA team, for Cyber Security matters to include policies, SAAR forms, new equipment utilization, vulnerabilities, and Information Assurance Work Force (IAWF) training in incident handling as it pertains to Computer Network Defense.
  • Assisted and advised users with network security issues to include, but not limited to security vulnerabilities, viruses, suspicious network activity, MALWARE, and authorized software.
  • Directed and verified compliance with operating system security controls, computer system security controls, and application layer security controls.
  • Assisted in the development and execution of security policies, plans, and procedures; design and implementation of data network security measures, information system security incident handling and response, and vulnerability assessment and management.
  • Perform risk assessments, and evaluations in order to ensure network security.
  • Provide mandated Cyber Security Training to users in accordance with DoDI 8570.
  • Developed Certification and Accreditation Packages for HQMC and Confidential level approval.

Confidential

Offensive Cyber Operations Instructor

Responsibilities:

  • Provided subject matter expertise (SME) in the full-spectrum integration of Cyberspace operations.
  • Provided SME instruction and training in creating defensive and offensive Cyber Ops effects against multiple functional network types and leverage knowledge of defensive and offensive Cyber tactics, techniques, and procedures (TTPs). Instruct Cyber Ops students in a classroom and mission simulator environment.
  • Developed, modified, and updated instructional materials for in-residence courseware, Develop practical application student training missions, mission scenarios, and mission evaluation tests or demonstrations
  • Evaluated and provided feedback to students as they executed offensive operations in the cyber domain to create deny, destruct, degrade, delay, or destruction effecs in the cyber domain via hand crafted training scenarios in a lab environment .
  • Demonstrated subject matter proficiency with numerous exploitation tools ( Kali Linux, Backtrack, Metasploit, Netcat, Nmap, Wireshark, Remnux, and Sysinternals).
  • Instructed students in muttiple courses of instructionleading to their certification as Offensive Security Certified Professionals (OSCP)

Confidential

Information Assurance Manager

Responsibilities:

  • Assisted in the development of System Security Accreditation Agreements (SSAA) documentation in accordance with the DITSCAP/ Confidential guidelines
  • Developed supporting documentation for Interim Authority to Connect (IATC), Interim Authority to Operate (IATO), and Authority to Operate (ATO)
  • Facilitated security and site surveys; Certification Testing & Evaluation (CT&E) and operational Security Testing & Evaluation (ST&E); Respond to FISMA and IA data calls and perform task as directed by the Government leads; Senior IA Specialist and system owner leading to the assurance that the IA requirements were met
  • Liaised with various Government agencies and contractors to process C&A documentation for final approval and Independent Verification and Verification (IV&V) of technical documentation; Ensured that all monitored systems comply with the Confidential Gold disk, STIGs, IAVA, IAVB, IAV-TA, Security Control procedures in addition to FISMA requirements.
  • Reported on all security, IA, and C&A compliance requirements. Ensured that all personnel were in compliance with Confidential 8570.1 certification and training standards.
  • Provided training numerous IA certifications (ITIL V3, Security+, CASP) developed and conducted information assurance, information security training; conducted vulnerability assessments of systems ranging from stand-alone servers to area networks; determined potential vulnerabilities to automated systems caused by natural, manmade, technical, or procedural shortfalls; and performing technical testing of information systems to meet information security requirements.

Confidential

Defense Cyber Watch Supervisor

Responsibilities:

  • Provided help desk support and technical solutions to over 84 command System Administrators.
  • Helped system administrators implement layered defense strategies to assist in the development and implementation of security requirements.
  • Managed watch team during the proactive monitoring, analyzing, and detecting of cyber threats on Navy portion of Global Information Grid (GIG).
  • Ensured accurate computer incident classification and the generation of computer incident reports.
  • Created and implemented IDS signatures for medium sized legacy network. Proficient use of RetinA, and Nessus scanners, Snort.
  • Administered commercial network operating systems within the functional areas of configuration, systems, and performance management.
  • Managed and maintains internal site networks, to include but not limited to MS Exchange, UNIX, and Windows Operating Systems.
  • Conduced Tier 3 level network software and hardware corrective actions.
  • Administered general security concepts and identified potential risks, monitors activity, secures network environments, and enforces security policies and procedures.
  • Managed, monitored, and Maintained 100+ Windows 2003/2008 servers providing the following services: file sharing, messaging availability, print services, and remote administration. Implemented Blackberry IT Policies, configured 300+ Blackberry devices and efficiently managed 500+ Blackberry devices utilizing Blackberry Enterprise Server Microsoft Exchange 4.1. Oversaw the resolution of 8,000+ Tier II/III Remedy service desk tickets helping meet the network Service Level Agreement and maintaining a maximum level of customer satisfaction.
  • Demonstrated technical expertise by utilizing Microsoft Exchange 2003/2007 troubleshooting tools Exmerge, SMTP Diagnostics, Performance Monitor, and Exchange Powershell 2007 to diagnose network performance, site-to-site messaging connectivity and analyze messaging and routing.
  • Installed, configured, maintained numerous pieces of CISCO networking equipment including (4) 5010's, (250) 3750's, (30) 2811's, (20) 4506's, (8) 6509's, (4) 7206's, (25) 2821's, and (4) 3835 routers and switches.
  • Configured and maintained 420 VOSIP phones with CISCO Call Manager enabling secure voice communications for approximately 5000+ customers
  • Provided sustainable, reliable and efficient communications for Afloat and Ground forces in the 5th Fleet Area of Responsibility. Monitored network operations for Confidential Bahrain ONE-Net network consisting of 4500 workstations,127 pieces of cisco networking equipment, 268 pieces of COMSEC equipment.
  • As a Remedy Ticketing System administrator I resolved 5,000+ Tier I, II, and III trouble tickets resulting in 99.8 uptime and 100% mission completion using Remedy Enterprise Ticketing System.
  • Developed training and courseware to establish a baseline for the Electronic Service Desk Department increasing Remedy Ticketing System usage efficiency by %70 percent.

We'd love your feedback!