We provide IT Staff Augmentation Services!

Cyber Security Architect Resume

3.00/5 (Submit Your Rating)

SUMMARY

Over 13 years of experience as a Cyber Security Professional. DoD 8570.1 IAT/IAM III Certified. Adept at Linux and Windows systems administration. Effective at directing and managing teams. Experienced with managing the certification and accreditation of classified enclaves. Committed to maintaining technical skills and up - to-date industry knowledge. Thorough and detailed technical documentation skills. Able to assess and resolve issues quickly. Strong ability to manage multiple projects simultaneously in deadline driven environments.

AREAS OF EXPERTISE

  • Linux & Windows System Admin
  • Training & Mentorship
  • Process Improvement
  • IT & Cyber Security
  • Customer Support
  • Systems Analysis
  • Technical Documentation
  • Vulnerability Assessments

TECHNICAL SKILLS

Software: ACAS (Nessus and Security Center), SCAP Compliance Checker (SCC) Tool, STIG Viewer, Microsoft Visio, OfflineWSUS, Microsoft Visio 2010 & 2013, Wireshark, NMap, PuTTY, WinSCP, BC Commander, SharePoint, Microsoft Office Suite 2013 and older, Open Office Suite, LibreOffice Suite, VMware Workstation, vCenter, Active Directory, DNS, PBIS / Likewise, Acronis, CloneZilla, Symantec, ClamAV, McAfee, AVG, Cygwin.

Operating Systems: Windows 10 and older, Windows Server 2012 R2 and older, CentOS 7 and older, Red Hat Enterprise Linux 7 and older, AIX 7 and older, Solaris 11 and older, Ubuntu, Kali Linux, OpenSUSE, Fedora.

PROFESSIONAL EXPERIENCE

Cyber Security Architect

Confidential

Responsibilities:

  • Manage Assured Compliance Assessment Solution (ACAS) configuration settings such as Nessus Scanner connectivity, Security Center uptime, Scan Zones, Repositories Organizations, Users & Roles, Audit Files, Credentials, Scan Policies, Plugins & Feeds, and Licenses. Update ACAS Plugins & Feeds monthly in accordance with 30-Day Patch Cycle.
  • Create and execute monthly Active Scans in SecurityCenter against all Windows, Red Hat, Solaris, AIX, Network Devices, and printers within classified accredited boundary to help support the security posture of Infrastructure Systems and Mission Systems.
  • Configure ACAS laptop to run scans against (special purpose) fielded Mission systems on different subnets.
  • Produce monthly Nessus and SecurityCenter scan reports for remediation of Critical, High, and Medium findings within patch cycle.
  • Install, Configure, and run Security Content Automation Protocol (SCAP) scans using the SCC tool on all Windows, Solaris, Red Hat, and related software on systems that have related SCAP content on DISA’s IASE website.
  • Maintain updated SCAP content each 1-3 month release cycle.
  • Create and check all systems and related software against STIG Checklists using the latest STIG Viewer tool, SCAP benchmark results, and manual STIGs.
  • Provide ACAS, SCAP, and STIG checklist reports to Systems Administrators, Management, and Cyber Team to chart security metrics. Also responsible for ensuring ACAS subnet scans (pre/post­patch) results are uploaded to the (Missile Defense Agency) MDA SecurityCenter to meet monthly requirements.
  • Provide Systems Administration support on all Linux, UNIX, and Windows systems in accordance with remediation efforts.

Cyber Security Engineer

Confidential

Responsibilities:

  • Conducted vulnerability assessments of systems utilizing DoD approved IA tools (Retina and DISA STIG).
  • Researched and reported metrics on IAVA notices.
  • Facilitated STIG compliant operating system baselines for secure system build efforts.
  • Generated various technical documents and operating procedures as required by customer.

Information Assurance Engineer

Confidential

Responsibilities:

  • Provide IAVA Patch Management support using Microsoft Windows WSUS server Author detailed System Test Procedures (STPs)
  • Perform extensive software testing on TAIS software application involving ADSI server and Personalized Mobile Server Units (MSUs)
  • Perform vulnerability scans using SCAP and Retina.
  • Manage security posture of four (4) virtual workstations (3-Windows Enterprise and 1-Fedora 10) using MS Windows vCenter.

Systems Security Administrator

Confidential

Responsibilities:

  • Apply MS Windows operating system updates, patches, STIG configuration changes, and performed weekly audits.
  • Provided user account management via Active Directory.
  • Provided user support.
  • Created and managed group policy settings.
  • Performed monthly backups and archives using CloneZilla.
  • Stood up PCs and workstations. Installed, configured, and hardened operating systems per DISA STIG requirements to support business needs.
  • Provided systems administration and desktop support for MS Windows and RedHat systems.
  • Provide engineering support for customer’s test preparation and on-site support test events.

System Administrator

Confidential

Responsibilities:

  • Provided systems administration and network support for classified labs.
  • Serviced the help desk and redressed user software and hardware issues via phone and/or physically. Recorded all user issues in a trouble ticket management system.
  • Documented technical problems, troubleshooting methods, and resolutions.
  • Authored and maintained STPs, Checklists, Network diagrams, and Hardware/Software lists.
  • Provided data management support.
  • Ensured classified closed area processes and procedures were followed by all users.
  • Administered Microsoft Server 2003, XP, Vista, Ubuntu, and HP-UX on various platforms.
  • Installed, configured, and managed printers, hubs, and routers.
  • Performed upgrades and replacements to hardware with minimal downtime.
  • Installed updates and patches to operating systems and software applications weekly.
  • Managed user and group accounts and delegated privileges accordingly.

System Administrator

Confidential

Responsibilities:

  • Provided helpdesk support to users on GMD program.
  • Documented technical problems, troubleshooting methods, and resolutions.
  • Authored and maintained STPs, Checklists, Network diagrams, and Hardware/Software lists.
  • Performed analysis, installation, maintenance and modification of classified LANs, Windows 2003 servers, XP, AIX, and Solaris computing systems.
  • Assisted team in resolution of hardware, software, and system issues.
  • Created and managed user and group accounts and access controls via group policy and Active Directory.
  • Repaired hardware systems when needed. Installed software updates and patches weekly.
  • Performed weekly system audits.
  • Performed full system backups monthly.

We'd love your feedback!