Cyber Security Engineer Resume
San Diego, CA
SUMMARY
- IT professional with 15 years of combined technical experience in Cyber Security Engineering, Lab/System Administration
- Network Administration with emphasis on Electronics, IT Security Technical Support, Network Analysis, Associate level Network Engineering, Solution Validation Testing and Host Based Security System (HBSS) Administration.
- Specialize in creating, maintaining, testing and securing networks/systems of different security classifications on Windows/*NIX platforms, Cisco/Juniper networking devices
- content filters and data encryption devices. Utilize superb troubleshooting capabilities on hardware, software, and networking issues to prevent unnecessary outage time to maintain excellent customer service. Proven successful in learning and comprehending new systems and methods consistently
TECHNICAL SKILLS
Operating Systems: Microsoft Windows XP/Vista/7/8/10, Microsoft Server 2000/2003/2008 R2/2012, UNIX, Oracle 11g R1/R2; Oracle/Sun Microsystems Solaris 8, Ubuntu Linux, OSX, Cisco IOS, Red Hat Enterprise Linux (RHEL), Confidential - UX
Hardware: Cisco Routers, Cisco Switches, Cisco PIX Firewalls, Juniper SRX/Netscreen VPN Firewalls, VoIP, Data Terminal/Data Communication Equipment, Military Data Encryption Devices, TACLANE, Fiber Optics, Confidential /Dell Servers, Dell/EMC SAN, Tandberg VTC suite, Shout VX400 Voice Switch, SUN Microsystems SPARC workstations, Promina, ATM, SOCOM Special Force Deployable Node (SDN)- Medium, Basic Access Module (BAM) Telephony, TACLAN, Wireless Access Points (WAPs)
Software: Microsoft Exchange Server 2003/2007, Microsoft Server 2000/2003/2008/2012 , Microsoft Office Suite 2003/2007/2010/2013 , Microsoft SQL Server 2003/2008, VMware Server, Workstation, ESX/ESXi, vSphere/vCenter, Remedy Trouble Ticketing, Cisco Call Manager/Express, Domain Controllers, DNS, DHCP, Active Directory, Group Policy Management, Norton/McAfee/Symantec Endpoint Anti-virus, Norton Ghost, Symantec Backup Utility, ActivIdentity Smartcard, VERITAS, Confidential Service Manager, Retina Scan, Confidential Operations Orchestration, Salesforce, Microsoft System Center Operations Manager (SCOM), ACAS Scanning, RADIA/CAE, Confidential Enterprise Management Tool, Microsoft System Center Configuration Manager (SCCM) Image Deployment, HBSS/McAfee ePolicy Orchestrator 5.3, McAfee Agent Suite, HIPS, ACAS
Soft Skills: Customer Service-oriented, Goal Driven, Persistent, Ambitious, Multi-faceted, Excellent Oral/Written Communication, Superb Leadership/Followership Qualities, Bilingual (English and Spanish), Agile/Scrum/Kanban, C&A package/DIACAP prep, POA&M, STIGs, ST&E, Technical/Developmental Documentation, Test Plans/Test Procedure prep
PROFESSIONAL EXPERIENCE
Confidential, San Diego, CA
Cyber Security Engineer/Information System Security Engineer
Responsibilities:
- Oversee NMCI Certification and Accreditation package development, validation, and inspection for cyber security controls that ensures DoD security requirements met
- Architect DIACAP packages per Information Assurance Managers (IAM) directive which facilitates an Authority To Operate (ATO) on NMCI
- Apply best practices and processes to capture, refine, and assist in the prioritization of requirements based on risk, engineering principles, and DoN/NGEN guidelines
- Produce security architecture, design, development, and configuration of enterprise solutions to support formal Security Test and Evaluation
- Participate in the development, implementation, and review of security controls for solutions under Government purview
- Liaise with Government security staff to resolve security concerns throughout solution certification/accreditation lifecycle
- Provide guidance and support to self-testing, security control assessment, and preparation of Plans of Action and Milestones (POA&M)
- Present mitigation alternatives to support technical security engineering and capability-based security analysis of solution architectures
Confidential, San Diego, CA
Lab/Host-Based Security Systems Administrator - Team Lead
Responsibilities:
- Led system team supporting end user services proven to deliver timely cadence of user story completion
- Administered HBSS assets on lab domains which enabled production security policies for NGEN solutions
- Oversaw Patch Management/Software Distribution system that aided in projects’ Info Assurance compliance
- Managed Domain Group Policy Objects that facilitated policy creation for DISA STIG hardening on NMCI
- Troubleshot Active Directory Domains which maintained optimal up-time for engineering development
- Executed ACAS scans on lab assets to ensure DoD cybersecurity posture for future enterprise solutions
- Maintained test lab infrastructure as necessary to include racking/stacking, cabling, and troubleshooting
- Deployed DISA compliant virtual machines to allow for solution creation on hardened baseline builds
Confidential
Silo Lead/Test Analyst
Responsibilities:
- Oversaw silo team that analyzed the results of the testing process and recommended resolutions for project success
- Developed test documentation needed to validate solutions implemented on government networks
- Utilized client testing methodology as basis for developing test scenarios for testing of end user services
- Reviewed testing scenarios and test cases to demonstrate conformance to all functional and non-functional requirements, which correlates with government specifications
- Remediated vulnerability scan findings which enabled solutions meet U.S. Navy’s security standards
- Defined, identified, collected and organized detailed information relating to testing requirements
- Interacted with project engineering teams to gain an understanding of the business environment, technical context, and conformance criteria
- Understood and used automated testing processes/tools to confirm government standards are met
- Maintained continuity on tools, techniques and technologies used to verify production readiness
- Supported knowledge management processes through participation in testing discussion, communities and improving testing collateral through lessons learned