Cyber Security Operations Engineer Resume
5.00/5 (Submit Your Rating)
SUMMARY
- Cyber Security Engineer with an active TS/SCI clearance, eLearnSecurity eJPT, EC - Council (EC) C|EH, EC C|ND, CompTIA CySA+, and CompTIA Sec+.
- Currently studying for the EC E|CSA, CompTIA CASP, CompTIA Linux+, Offensive Security OSCP, and (ISC) 2 Certified Information Systems Security Professional (CISSP) certifications.
- Possesses a strong analytic background, derived from eight years of experience as a US Army Signal Intelligence Analyst.
- Experienced working in * NIX, and Windows based physical or virtual environments .
- Knowledgeable of known threat vectors and exploitation methodologies.
- Demonstrated experience using several vulnerability and network scanning tools, programming/scripting languages (such as Python, Ruby, Perl, Java, and more) and applying secure coding practices.
- Trained in mobile, cellular, web, and network exploitation.
AREAS OF EXPERTISE
- Network Pentesting
- Web Pentesting
- Database Auditing
- Password Auditing
- Scripting/Programming
- Network Security
- Mobile Security
- Reporting
TECHNICAL SKILLS
- Kali
- Nikto
- SEToolkit
- Burp Suite
- Hydra
- Nessus
- Beef
- SQLmap
- John
- NMAP
- Wireshark
- Black Arch
- Maltego
- Metasploit
- OpenVAS
- Owasp - Zap
- Sparta
- WPScan
- Hping3
- IOC Editor
- LMD
- OSSIM
- Snort
- HBSS
- BackdoorMan
- Loki
- Splunk
- OTX
- Redline
- NProcWatch
- Sysmon
- NeoPI
- YaraGen
- NetWitness
- ELK
PROFESSIONAL EXPERIENCE
Confidential
CYBER SECURITY OPERATIONS ENGINEER
Responsibilities:
- Accurately utilized open source pen testing methodologies to footprint, scan, enumerate, and attack vulnerable services and applications; resulted in the ability to demonstrate to clients their weaknesses and suggests multiple ways to mitigate the identified risk.
- Expertly utilized penetration testing frameworks and operating systems such as Kali Linux and Black Arch Linux to assess client systems; resulted in the ability to implement low cost APT modeled attack methods and technology while enabling organizations to identify and remediate known vulnerabilities.
- Assessed over 1000 NIST Controls and CCI’s per system, via Risk Management Framework, for the hundreds of Air Force systems in our AO; providing leadership with a clear picture of the risk involved with authorizing a given system.
- Demonstrated knowledge and experience using exploit modules and payloads through the use of bash or python scripting and frameworks such as Metasploit; decreased overall amount of time necessary to test security features by implementing a more automated approach.
- Demonstrated ability to properly identify and establish footholds for the purposes of pivoting to non-routable systems; allowing for the ability to prove how attackers may attempt to navigate logically separated network segments.
- Experienced in the exploitation and manipulation of multiple web application attack vectors to include SQL injection, cross-site scripting, session-hijacking, local/remote file inclusion, password attacks and more.
- Engaged in use of debuggers against applications to identify vulnerabilities within the code itself; upon identification of a vulnerability, exploits were written and executed against the machine, resulting in various levels of access.
- Capable of launching social engineering attacks and utilizing credential harvesting tools such as the Social Engineering Toolkit.
- Demonstrated knowledge and experience using protocol scanners and enumeration tools to identify open ports and services on target network hosts and devices; allowed for the opportunity to identify vulnerabilities and exploits available to use against available host services.
- Experienced in performing black-box and gray-box penetration test using automated and manual platforms while targeting business modeled Windows and Linux servers and systems.
- Utilized the Enterprise Assurance Support Service (eMASS) as a primary assessment tool; provided for the ability to track and maintain package resources and lines of communication throughout the life of the product.
- Conducted security and compliance assessments of Air Force systems using various tools and STIGs.
Confidential
WATCH OFFICER/CYBER SECURITY ANALYST
Responsibilities:
- Coordinated Computer Network Defense (CND) efforts for over 50 organizations; resulting in the establishment of a clear line of communication amongst the many organizations for all CND efforts.
- Hosted weekly meetings aimed at allowing multiple CND teams from different organizations to share current items of interest while also updating the community at large of any items of concern; effectively allowed for information to be shared amongst all participating teams in a real-time centralized manner.
- Maintained statistics and statuses of all network related incidents in a centralized location; granting all involved parties the ability to immediately be notified of any changes in status or completion of mitigation efforts.
- Utilized network mapping and status tools to maintain situational awareness of all organizational network nodes in near real-time; allowing for the ability to escalate notices of down system nodes to the proper element for remediation.
SIGNALS INTELLIGENCE ANALYST
Confidential
Responsibilities:
- Conducted remote security and vulnerability assessments aimed at target digital and cellular networks; successfully resulted in the ability to plan and successfully implement network and system level implants while avoiding detection.
- Provided analytical and technical support to Army Cyber personnel performing remote network assessments while acting as a liaison between 10 th Special Forces Group Airborne (10 SFG(A)) and Special Operations Command Europe (SOCEUR).
- Regularly advised 10 SFG(A) leadership on digital and cellular network vulnerabilities prior to conducting mission; this resulted in being specifically requested to act as a consultant for digital and cellular exploitation ventures for multiple Special Operation Command forward deployed elements.
- Maintained situational awareness of 100% of all digital network events that occurred on shift, while operating as the primary DNI analyst; resulting in the ability to swiftly respond and recommend actions for digital network threats.
- Developed and implemented a standard training plan for analytic competency while training and mentoring over 30 analysts assigned to 10SFG(A); increased overall mission readiness and productivity by 75%.
- Successfully integrated newly procured capabilities into the workforce, while seamlessly enhancing the unit’s performance and mission capabilities; produced unrivaled technical documentation and visuals aids for consumption by all members of the 10 th Special Forces Group intelligence community.
- Interpreted and disseminated legal policy information and documentation throughout all SIGINT elements within 10 th SFG(A) in a timely and efficient manner as the lead Analyst in the Technical Control and Analysis Element (TCAE), enabling all 10 th SFG(A) SIGINT personnel to legally perform all necessary activities while remaining 100% compliant with all governing laws and policies.
- Swiftly and accurately accomplished 100% of all daily requirements established by the Group Commander, while managing two 5-man shifts assigned to find, analyze, and disseminate information pertaining to threats in several areas of interest to include CENTCOM, EUCOM, AND AFRICOM areas of responsibility.
- Delivered near real-time intelligence to Department of Defense assets forward deployed to Afghanistan in support of OPERATION ENDURING FREEDOM, while performing alluties as the shift SGA; increased the accuracy and timeliness of all information disseminated to forward-deployed units.