Assistant Information Assurance Security System Officer Resume
SUMMARY:
- A team player with unparalleled problem solving abilities.
- Possesses multi - platform experience from the personal computer to Enterprise system support.
- System Administration and deployment, configures, and maintains workstation and server platforms running Unix/Linux, VMware, Oracle, Microsoft, Novell, and Apple, Windows. Has experience in wired and wireless network deployment, configuration and maintenance.
- Familiar with IA systems and tools. IT professional with over 20 years of Information technology and networking technology experience.
- Dynamic leader, Retired Confidential veteran of 20 years, with project management and coaching practices with a demonstrated ability to meet challenges under varied conditions.
- 8 years of experience directly related to this SOW/PWS. Is proficient in Information Security and Risk Management in both the public and private sectors.
- He has experience using several network security applications. He is proficient in and accreditation to both DIACAP and NIST/RMF standards.
- Additionally, has experience in developing enterprise-level security governance policies as well as enterprise-level security via LMS Development tools.
- He has a working knowledge of the Risk Management Framework (RMF) and experience in the creation of & Accreditation packages and deliverables.
- He has experience with a number of different security tools, including ones leveraged within the Confidential community these tools.
- Has more than 15 year’s cumulative experience in Information Systems Security. Has 30 years’ experience working with Enterprise networks, systems and equipment supporting US Navy, Air force, Army and other Confidential, Government facilities. He has excellent skills in documentation, risk assessment, and vulnerability assessment. Skills also include excellent reporting and analytical skills.
TECHNICAL SKILLS:
ENTERPRISE SYSTEMS: HP Blade Servers G6,G7, Sun Sparc Server V400 series, T1&T2000 series, T1000, Ultra80, Ultra 10, Ultra, 280R, T5220, Cisco 7200, 3600, 6500, 4500, and 3500 series routers and switches, NAVMACS V5 U70/45, AN/FCC-100, TD-1389, USC-68, DS View 4.1 KVM
SOFTWARE/OS: HP-UX Snap II-III, Linux, BSD, RHEL5.2 thru 6.9, Redhat DoDIIS Linux Build, VMWARE ESXi Server, VMWARE VSPHERE, VMWARE View 4.6, VMWARE Workstation, CENTOS, UBUNTU, FEDORA, Microsoft Windows SvrR2, SUN/Oracle SOLARIS 10, JUMPSTART, and Cisco IOS, VERITAS Cluster Server, VERITAS NET Backup, Spectra Logic T120 robotic tape storage, Disk Suite, Volume Manager, Microsoft SQL Server 2005, ORACLE 10g, HP OPENVIEW Network node Manager, WEBSPHERE, HBSS E- policy, Confidential VMS, CIMS, Linux ghost server TAGI, True Image Server, HAG, NOVADIGM, MDDS, ENMS, WEBshield, Trusted Thin client, POA&M, SimShield, JWICS, EEMTools: Splunk, Snort, ACAS, NESSUS, SECSCAN, STIG VIEWER, SCAP, SUX
WORK EXPERIENCE:
Assistant Information Assurance Security System Officer
Confidential
Responsibilities:
- Ensuring that requests for and accreditation of computer systems are completed in accordance with the published procedures.
- Manage plan of actions and milestones. Ensuring that protective measures for physical security threats such as deadbolt locks on doors, placement of electrical wiring, etc., are in place. Ensuring compliance with all legal requirements concerning the use of commercial proprietary software, e.g., respecting copyrights and obtaining site licenses.
- Maintaining an inventory of hardware and software within the program/development offices or site facility. Coordinating the development of a Contingency Plan and ensuring that the plan is tested and maintained. Ensuring risk analyses are completed to determine cost-effective and essential safeguards.
- Ensuring preparation of security plans for sensitive systems and networks.
- Attending security awareness and related programs and distributing security awareness information to the user community as appropriate. Reporting IT security incidents (including computer viruses not contained by antivirus software) in accordance with established procedures.
- Reporting security incidents not involving IT resources to the appropriate security office.
- Providing input to appropriate IT security personnel for preparation of reports to higher authority concerning sensitive and/or national security information systems.
Senior Computer Security Specialist
Confidential, Portsmouth, VA
Responsibilities:
- Under this position, his major tasking includes successfully assisting in DIACAP & Accreditation (C&A) package resulting in the Authority-To-Operate (ATO) SeaWatch.
- He has also assisted in the completion the new classified Risk Management Framework (RMF) Assessment & Authorization (A&A) package for SeaWatch.
- Develop, review, analyze and update system security documentation, policies, procedures, technical vulnerability assessments and other and Accreditation (C&A) documentation in order to achieve Authority-to-Operate (ATO) and Interim-Authority-to-Test ( Confidential ) for Confidential and other USCG systems.
- He continues to evaluate the ever changing security posture, regulations, requirements, and legislation and standards, which ensures Confidential IA compliance.
- He assisted in the development of Confidential ATO package under the new NIST guidelines.
- Perform system vulnerability scans at Confidential C3CEN and supports C3CEN TISCOM VAT scan aboard US Coast Guard Cutters.
Sr. Cyber Security Specialist
Confidential, Suffolk, VA
Responsibilities:
- Deploy Security scan, and conduct security assessment examines and analyze technical safeguards.
- Provide mitigation strategies to the Risk Management framework process.
- Performed STIG’s and security checks, system updates on Solaris, Suse, LINUX Red Hat Servers
- Ensured sensitive data protection by maintaining Confidential security requirements on all Solaris servers and provided compliance reports.
- Conducted daily SUID File Baselines checks and Audit Trails.
- Conducted scans for information assurance vulnerabilities. Provided daily scans that checked for unusual or unauthorized activity by system administrators.
- Maintained Unix Virus Scan engine and DAT updates. Maintained ACAS compliance on all enclaves, ensuring systems that cannot be patched within the required timeline had an approved Plan of Action and Milestones (POA&M). Designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, applications and/or provide mitigation strategies.
- Ensures system security needs are established and maintained for various objects/matters.
- Integrates new architectural features into existing infrastructures, design cyber security architectural artifacts, provide architectural analysis of cyber security features and relate existing system to future needs and trends.
- Evaluates computer software and network for threats and/or malware; collect data from a variety of network security tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment.
- Employs and provides computer advanced forensic tools, technique, and intrusion support for attack reconstruction and high technology investigations, while reviewing threat data from various sources
Cyber System Security Engineer
Confidential, North Carolina
Responsibilities:
- Deploy Sec scan, and conduct Risk Management framework process, the security assessment examines and analyze technical safeguards.
- Performed STIG’s and security checks, system updates on UNIX, LINUX Servers Ensured sensitive data protection by maintaining Confidential security requirements on all Solaris servers and provided compliance reports.
- Conducted daily SUID File Baselines checks and Audit Trails.
- Conducted scans for information assurance vulnerabilities.
- Provided daily scans that checked for unusual or unauthorized activity by system administrators. Maintained Unix Virus Scan engine and DAT updates.
- Maintained IAVA compliance on all enclaves, ensuring systems that cannot be patched within the required timeline had an approved Plan of Action and Milestones (POA&M).
- Designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, applications and/or provide mitigation strategies.
- Ensures system security needs are established and maintained for various objects/matters.
- Integrates new architectural features into existing infrastructures, design cyber security architectural artifacts, provide architectural analysis of cyber security features and relate existing system to future needs and trends.
- Evaluates computer software and network for threats and/or malware; collect data from a variety of network security tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment.
- Employs and provides computer advanced forensic tools, technique, and intrusion support for attack reconstruction and high technology investigations, while reviewing threat data from various sources.
Sr. Cyber Systems Engineer
Confidential, Herndon, Virginia
Responsibilities:
- In support of JWICS install and configure and test MDDS, Trusted Gateway System™ (TGS), SimShield, Trusted Thin Client® (TTC), WEBshield, EEM Metrics collection system access to networks at different classification levels (e.g., Top Secret/SCI, Secret, and Sensitive But Unclassified) Virtual Access Implementation (VAI), Remote Access Implementation (RAI), Apache HTTP Server and OpenSSL, Including Cross Domain Solutions.
- Install and Configure RedHat Linux 5.7, 6.1, SeLinux, DoDIIS Linux Build, Centos 6.3
- Install Snort, test and configure Rule sets.
- Deploy Secscan, in support of Risk Management framework process, security assessment examines and analyze technical safeguards.
- Maintain a Virtual Lab environment VSphere 4.1 VMware ESXi 4.1.0, Ds View 4.1 KVM (Rac) Remote Access Console. Designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, applications and/or provide mitigation strategies.
- Ensures system security needs are established and maintained for various objects/matters. Integrates new architectural features into existing infrastructures, design cyber security architectural artifacts, provide architectural analysis of cyber security features and relate existing system to future needs and trends.
- Evaluates computer software and network for threats and/or malware; collect data from a variety of network security tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment.
- Employs and provides computer advanced forensic tools, technique, and intrusion support for attack reconstruction and high technology investigations, while reviewing threat data from various sources.
GS Information Technology Specialist
Confidential, Norfolk, Virginia
Responsibilities:
- Supporting multiple domains across the Naval base and internationally Responsible for administering the installation, testing, operation, troubleshooting, and maintenance of hardware and software systems in support of the Confidential organization’s IM/IT program.
- Provides advice and recommendations on IM/IT system administration.
- Interpret and applies IM/IT polices, processes and guidelines. Conducted systems and application analysis/design and recommended resolution to problems and issues.
- Managed systems resources including performance, capacity, availability, serviceability, integrity, efficiency and recoverability.
- Built and virtualized servers and performed STIG’s and security checks, system updates on Windows 2008 R2, Linux Redhat Enterprise ESXi Servers Integration and configuration for the systems ICS and SCADA.
- Contributes to the creation of vulnerability risk assessments.
- As a Confidential IA Team member he has provided continuous monitoring activities, including managing POA&Ms; conducting annual assessments, research and development of Confidential Topology and Data flow documentation review/updates; coordinating and documenting annual Contingency Plan Tests (CPTs).
- Conducts a daily review and assessment of IAVM Tracker Database on ensure Confidential compliance to determine the accurate response.
- Perform monthly IA review Confidential STIG guidance. Work well independently as well as with a team. Complete monthly reports to the IA Confidential team lead.
Confidential, Norfolk, Virginia
VDI Linux/Solaris UNIX Administrator/ (GCCS) Administrator
Responsibilities:
- Sun Solaris UNIX and Redhat Enterprise Linux Administrator provided expert technical support to implement Unix Security features and tools for Solaris version 8 thru 10 within enterprise zone enclaves. Performed System backups, archiving security logs and McAfee security, engine and anti- virus signature files and Exchange GAL upgrades, GCCS/COP servers.
- Recognized and extracted key performance elements from UNIX and UNIX-like (i.e. High Assurance Guard-HAG) systems.
- Analyzed the data and implement corrective actions to enhance overall performance and stability.
- Performed audit offloads to tape while providing technical support for Oracle DBA's and developers.
- Familiar with Sun Servers V480, V440, T2000, T1000, Ultra80, Ultra 10, Ultra, 280R, T5220 and dell servers.
- Maintained Remedy ticket System and logging.
- Performed Solaris system Migrations and upgrades from 8 thru 10 and Linux RHEL5.2
- Provided VMS administration in support of UNIX and Windows OS patch and STIG requirements and IAVA updates.
- Installed and configured Go Global software on NIPRNET and SIPRNET servers and client workstations. Performed Oracle Audit offloads.
- Performed STIGs on UNIX and Red Hat Linux servers in compliance with Confidential field Security operations. VDI Administrator familiar with VMware vSphere 4.0 and VMware View 4.6 Administration. Managed over 600 VM's 19 hosts on NIPR and SIPR.
- Migrated over 500 users from Desktop fat clients to Zero client and thin clients.
- Managed vSphere Performance and troubleshooting utilizing vCenter Server 4.1.0 and VMware PowerCli and PowerShell 5.0.
- Created and Managed Pools and Thinapps desktops and servers utilizing VMware View Administrator 4.6.0. Provided Remediation to ESXi servers utilizing CLi and vSphere client (update Manager) in conjunction with Confidential VMS.
- Deployed new host ESXI servers by building out HP Proliant BL460c G6's and G7 Blade servers.
- Maintained Data stores and virtualized resources; created and cloned with vSphere.
- Maintained Windows 2008 R2 Active Directory links with VMview Administrator by creating pools and managing snapshots and desktop align systems policy and provide performance tweaking and troubleshooting.
- Virtualized software and programs utilizing Thinapps 4.6.0 custom to the end users.
- Created and deployed Image updates
- . Familiar with Arcsight and CommVault configurations for backup and restoral.
- Troubleshoot ILO server support during server faults and restoral procedures'.
- Performed STIGs on ESXi server images to include Window 7 Enterprise and staging and installing Confidential patch updates.
Network Engineer/Security Engineer
Confidential, Norfolk, VA
Responsibilities:
- Sun Solaris UNIX Administrator with 10 years’ experience in complex, secure and classified environments.
- Performed Solaris upgrades and migration. Familiar with Solaris version 9 to 10. Performed UNIX security system hardening procedures.
- Ensured sensitive data protection by maintaining Confidential security requirements on all Solaris servers and .provided compliance reports.
- Conducted daily SUID File Baselines checks and Audit Trails.
- Conducted scans for information assurance vulnerabilities.
- Provided daily scans that checked for unusual or unauthorized activity by system administrators.
- Maintained Unix Virus Scan engine and DAT updates.
- Maintained IAVA compliance on all enclaves, ensuring systems that cannot be patched within the required timeline had an approved Plan of Action and Milestones (POA&M).
- Ensured daily system backups are completed and verified.
- Conducted daily fiber network connection interfaces checks. Responsible for the backup of all servers and recovery of lost or corrupted data.
- Maintained an offsite backup and storage system using a Jumpstart (VERITAS Net backup) UNIX Disk Volume Management, Disk Suite/Solaris Volume Manager model. Familiar with Spectra Logic T120 robotic tape storage system. Implemented tape backup encryption.
- Maintained fiber optic connections to servers and robotic backup and storage systems in four enclaves.
- Responsible for 24 x 7 support of over 60 Sun Sparc servers and management across four different enclaves.
- Provided troubleshooting and assistance to various personnel including firewall engineers, database administrators and web developers.
- Provided weekly and Monthly reports to the Project Managers that included status of offsite projects and personnel completion rate to Support the Mission Statement of Work.
- Configured Sun hardware and installed and maintained jumpstart servers using Flash archive designed for rapid recovery.
- Demonstrated an Enterprise working knowledge of NIS, DNS, Send Mail, LDAP and NFS.
- Conducted daily performance monitoring while maintaining system repairs and service utilizing collaborative information Management System (CIMS) which is similar to remedy.
- Performed server builds and Firmware upgrades patch installs on x86 and Sun Sparc servers and storage devices.
Confidential
Security System Engineer
Responsibilities:
- Provided system support for network various IDS and intrusion prevention systems.
- Maintained vulnerability management system utilizing McAfee's Intrushield, E-policy, HBSS, and HIPS.
- Installed and Configure Centos and Redhat Snort Servers, Install and Configure Juniper appliances and various IDS/IPS appliances.
- Performed network and host intrusion detection systems scan utilizing Retina, Nessus, NMAP, and TCP dump.
- Administration of IAVA system and Implementation of security policy and regulations.
- Provided assistance to the IAO/ISSM for Completion of SSAA.
- Performed upgrades and Patch installs on Red Hat Enterprise and Windows 2005 servers in support of HBSS E-policy Management system.