Computer Security Technical Specialist Resume
3.00/5 (Submit Your Rating)
Jacksonville, FloridA
SUMMARY
- Seeking Cyber Security Analyst / Penetration Tester / Ethical Hacker position. Knowledgeable in application and network penetration, ethical hacking methodology, and the use of penetration tools. Strong written and verbal communication skills.
TECHNICAL SKILLS
- Windows, Linux
- Scanning & Enumerating with Nmap
- Network Capture/Analysis w/ Wireshark
- Penetration Testing using Kali Linux 2.0
- Use of Exploits w/ Metasploit Framework
- Social Engineering, Phishing, Vishing
- Defeating Physical Security Measures
- Physical Security Assessments
- Intelligence Gathering through Open
PROFESSIONAL EXPERIENCE
Confidential, Jacksonville, Florida
Computer Security Technical Specialist
Responsibilities:
- Primary Carbon Black Protection administrator for entire enterprise.
- Responsible for crafting applicable rules and policies, analyzing blocks and alerts, and preventing cyber - attacks through application control.
- Secondary duties include Enterprise Vulnerability Management Program (EVMP) Liaison, Incident Response / Threat Hunting Team, Threat Intelligence and Analysis Reporting, Web Application Testing
- Using personal initiative, developed one database for tracking vulnerability exceptions, and another one for tracking Web Application Testing.
- Both databases were incorporated into the company’s Standard Operating Procedures (SOPS), and increased efficiency, reporting capability, and effectiveness in these areas.
Confidential, Jacksonville, Florida
IT Security Contractor
Responsibilities:
- Responsible for analyzing and processing reported suspicious phishing emails. Investigating email source using email header analysis, IP queries, DNS queries, and URL lookups. Participated in conducting monthly email phishing campaigns to test user awareness of current phishing techniques using Cofense/PhishMe.
- Analyzed and processed Symantec Managed Security Services Program (MSSP) incident tickets. Conducted detailed analysis of reported host using Splunk SIEM searches, Palo Alto IPS traffic analysis, database searches, blacklist lookups, and comparison of reported activity against current threat models.
- Secondary duties include Cisco Meraki Wireless Network administration, Threat Intelligence and Analysis Reporting.
Confidential
Limited Surety Agent / Fugitive Recovery Specialist
Responsibilities:
- Licensed and appointed Limited Surety Agent (Bail Bondsman).
- Leveraged open source intelligence, informants, surveillance operations, and commercially available technologies (information databases, GPS trackers, etc.) to locate and apprehend bail fugitives.
- Conducted 315 successful fugitive recovery operations saving clients more than $1,000,000, with ZERO residual liability to clients, and ZERO serious injuries to defendants.
Confidential
Physical / Personal Security Specialist
Responsibilities:
- Responsible for conducting high threat protective services operations in support of the United States Ambassador to Iraq, Chief of Mission, and other mission-essential Confidential . State Department personnel.
- Served as Executive Protection Agent to Confidential . Presidential candidate, Mitt Romney, presidential campaign.