We provide IT Staff Augmentation Services!

Computer Security Technical Specialist Resume

3.00/5 (Submit Your Rating)

Jacksonville, FloridA

SUMMARY

  • Seeking Cyber Security Analyst / Penetration Tester / Ethical Hacker position. Knowledgeable in application and network penetration, ethical hacking methodology, and the use of penetration tools. Strong written and verbal communication skills.

TECHNICAL SKILLS

  • Windows, Linux
  • Scanning & Enumerating with Nmap
  • Network Capture/Analysis w/ Wireshark
  • Penetration Testing using Kali Linux 2.0
  • Use of Exploits w/ Metasploit Framework
  • Social Engineering, Phishing, Vishing
  • Defeating Physical Security Measures
  • Physical Security Assessments
  • Intelligence Gathering through Open

PROFESSIONAL EXPERIENCE

Confidential, Jacksonville, Florida

Computer Security Technical Specialist

Responsibilities:

  • Primary Carbon Black Protection administrator for entire enterprise.
  • Responsible for crafting applicable rules and policies, analyzing blocks and alerts, and preventing cyber - attacks through application control.
  • Secondary duties include Enterprise Vulnerability Management Program (EVMP) Liaison, Incident Response / Threat Hunting Team, Threat Intelligence and Analysis Reporting, Web Application Testing
  • Using personal initiative, developed one database for tracking vulnerability exceptions, and another one for tracking Web Application Testing.
  • Both databases were incorporated into the company’s Standard Operating Procedures (SOPS), and increased efficiency, reporting capability, and effectiveness in these areas.

Confidential, Jacksonville, Florida

IT Security Contractor

Responsibilities:

  • Responsible for analyzing and processing reported suspicious phishing emails. Investigating email source using email header analysis, IP queries, DNS queries, and URL lookups. Participated in conducting monthly email phishing campaigns to test user awareness of current phishing techniques using Cofense/PhishMe.
  • Analyzed and processed Symantec Managed Security Services Program (MSSP) incident tickets. Conducted detailed analysis of reported host using Splunk SIEM searches, Palo Alto IPS traffic analysis, database searches, blacklist lookups, and comparison of reported activity against current threat models.
  • Secondary duties include Cisco Meraki Wireless Network administration, Threat Intelligence and Analysis Reporting.

Confidential

Limited Surety Agent / Fugitive Recovery Specialist

Responsibilities:

  • Licensed and appointed Limited Surety Agent (Bail Bondsman).
  • Leveraged open source intelligence, informants, surveillance operations, and commercially available technologies (information databases, GPS trackers, etc.) to locate and apprehend bail fugitives.
  • Conducted 315 successful fugitive recovery operations saving clients more than $1,000,000, with ZERO residual liability to clients, and ZERO serious injuries to defendants.

Confidential

Physical / Personal Security Specialist

Responsibilities:

  • Responsible for conducting high threat protective services operations in support of the United States Ambassador to Iraq, Chief of Mission, and other mission-essential Confidential . State Department personnel.
  • Served as Executive Protection Agent to Confidential . Presidential candidate, Mitt Romney, presidential campaign.

We'd love your feedback!