We provide IT Staff Augmentation Services!

Lead Information Systems Security Officer Resume

4.00/5 (Submit Your Rating)

Miami, FL

SUMMARY

  • Highly organized, highly - dynamic, detail-oriented individual wif strong multi-tasking abilities wif over 17 years of Systems/Network Engineering (Server, Hardware, OS, etc), Administration and advanced Cyber Security experience.
  • Established protection goals, objectives and metrics consistent wif policies and procedures; secure configuration management (CM), creation of security update scripts to automate security response via: bash (linux), bat/powershell (Microsoft), java script, html, etc; contingency planning, incidence response and forensics activities utilizing a layered security approach and architecture as well as investigation of security breaches (personnel, physical security, software and hardware). Established Web Sites and web security through firewalls/NAT/DMZs/etc.
  • Highly capable of interpreting architectural, dataflow and technical diagrams. Created and recommended remediation for components of information security policies, processes and procedures. Knowledgeable of information security programs, security policy creation and review. Created detailed, technical, and professional documentation to be delivered to clients and/or management.
  • Experienced in teh administration of Windows Active Directory Domain Controllers and Exchange Servers in an enterprise-wide environment wif more than 12,000+ users in an extremely heterogeneous network. Astute technical noledge in administering, hardening, and engineering of Microsoft, RedHat Linux and Unix Operating Systems and servers including Solaris, FreeBSD, HP-UX, Scientific Linux and Debian. Impeccable administrative and customer service skills.
  • Advanced noledge and familiarity wif teh following including but not limited to, wifin teh areas of compliance, security standards, framework, audit and legislative regulations: National Institute of Standards and Technology (NIST) 800 series, DIACAP, Risk Management Framework (RMF), Common Criteria (CC), Federal Information Security Management Act (FISMA), Sarbanes Oxley (SOX), ISO 27001, OWASP Top 10, CNSSI 1253 series, various Department of Defense Instructions, International Organization for Standardization (ISO), Health Insurance Portability and Accountability Act (HIPPA), Health Information Trust Alliance (HITRUST), Control Objectives for information and Related Technology (CoBIT), Information Technology Infrastructure Library (ITIL), BCP/DRP, firewall audits, internal compliance/audit to internal standards, and agile methodologies.
  • Proven project management skills through implementing programs, strategies, project control and status reporting, definition of performance metrics wif concurrent projects, excellent responses to RFPs/SOW/CDRLs to align wif budget/costs/financial controls/SLAs, proposal creations, and vendor relations. Excellent written and presentation skills. Lead System Specification Reviews (SRR), Preliminary Design Reviews (PDR), Critical Design Reviews (CDR), Integration & Test (me&T), and delivery of systems.
  • Creative, a sense of daring and a probing mind wif a passion for learning and attainment of goals and challenges.
  • Proficient in Incident Response, SIEM, Wireless Intrusion Prevention (WIP), Cyber Threat Intelligence (CTI); identified delivery mechanisms, Continuous Monitoring and Risk Scoring (CMRS), indicators of compromise wifin teh IT infrastructure, motivation of attack if apparent, and identified teh actor of teh attack. Knowledgeable wif Snort, WireShark, log analysis tools, MetaSploit (nmap, port scan, enum patches, ClamAV, various exploits wifin MetaSploit), Redline (auditing tool that collects all running processes, and drivers from memory, file-system metadata, registry data, event logs, network information, services, tasks and web history), Indicators of Compromise (IOC) analysis (IOC Editor), TCPDump, Windump, Rapid7, Advanced Persistent Threat (APT) analysis remediation, Java, HTML analysis.
  • Understanding of Open Web Application Security Project (OWASP) Top 10 (Injection, Broken Authentication, Sensitive Data Exposure, XML Eternal Entities (XXE), Broken Access Control, Security Misconfiguration, Cross-Site Scripting (XSS), Insecure Deserialization, Components wif Known Vulnerabilities, Insufficient Logging & Monitoring), CWE/SANS Top 25 and remediation best practices, Computer Network Defense (CND)/Computer Network Exploitation (CNE), Computer Network Attack (CAN), Common Vulnerabilities and Exposure (CVE), Common Vulnerability Scoring System (CVSS), safeguarded networked systems against unauthorized infiltration, modification, and destruction, Cyber Kill Chain (Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, Actions on Objectives).
  • Proficient in teh incident management process, penetration testing, foot printing, foot printing tools and countermeasures, network scanning techniques and scanning countermeasures, enumeration techniques and enumeration countermeasures, Trojan analysis and countermeasures, virus analysis, malware analysis procedure and countermeasures, packet sniffing techniques and defense against sniffing, DoD/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Strong understanding of audit and monitoring, risk/response and recovery, cryptography, cloud computing security, data communications, computer operations security, telecommunications and network security, security architecture and models, Public Key Infrastructure establishment, Identity Privilege Management, Enterprise Virus Management Solutions (EPO, etc), Computer Forensics, Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.
  • Created, maintained and delivered project schedules and budgets. Identified, created, managed, and maintained Key Performance Indicators (KPI) in line wif, schedule variance, planned hours of work, schedule performance index (SPI), planned hours of work vs actual situation, percentage of projects completed on time, etc.
  • Strong noledge as a technical trainer, adult learning theory, training systems design and implementation, instructional design, measurement and evaluation, devised detailed technical training plans and needs assessment, and delivery of hands on instruction.

PROFESSIONAL EXPERIENCE

Confidential, Miami, FL

Lead Information Systems Security Officer

Responsibilities:

  • Leadership experience wif teh development and integration of teh Risk Management Framework (RMF)/Assessment & Authorization task, deep understanding of RMF packages and development/implementation (including but not limited to: System Security Plan, eMASS, DIACAP to RMF, Plan of Actions & Milestones (POA&Ms), Implementation Plan, Risk & Vulnerability Assessments, Results and Acceptance, Common Control Providers, Implementation Plans, Severity Value, Raw Severity Value, Control Risk Level, and Vulnerability Severity Value calculations, STIGs, SRGs, Nessus/ACAS, HBSS, Security Content Automation Protocol (SCAP), control remediation, Continuous Monitoring Plans, etc) network design and information flow, network security and information assurance, system and data access models, baseline configuration management deviation requests, vulnerability management, security and compliance reviews. Authored policies and procedures in line wif established and applicable federal laws, regulations, directives, Industry Regulatory Compliance requirements (NIST, PII, HIPPA, PCI, SOX, CoBIT, FISMA, RMF, etc) detailing cybersecurity/information security initiatives, such as System Security Plan, Contingency Plan, Incident Response Plan, Standard Operating Procedures, Plan of Actions and Milestones, Remediation Plans, Configuration Management Plans, Contingency and Incident Response Plans, etc. Facilitated teh implementation and administration of an Enterprise Architecture Security Program compliancy initiative and software asset management processes including software licensing and compliance practices and software contract practices, and hardware asset management processes from acquisition through disposal.
  • Developed, implemented, and monitored formal security enterprise Risk Assessment products successfully detailing teh operational, financial and regulatory complexities impacting business functions from a strategic, operation and change perspectives utilizing both technical (SIEM, firewall, IPDS, etc) and administrative (regulations/laws/etc) controls to identify, assess and mitigate risks to teh enterprise.
  • Assessed, mitigated and remediated system security risks; determined and analyzed security requirements for implementation and testing. Created and maintained security checklists, templates and other tools to aid in teh Assessment & Authorization process. Performed security control assessment and audit using applicable federal laws, directions, procedures, guidance wif teh assistance of automated vulnerability management tools (Nessus, Splunk, etc). Ensured decisions around IT Security solutions are made and deviations from standards are properly identified, addressed and communicated.
  • Developed and deployed teh enterprise incident response program, supporting documentation, operational analysis, and investigation of actual or potential cyber incidents. Configured information security policies, deep package inspection, system log correlation and audits to identify cybersecurity incidents and risks. Lead teh investigation, clean up and reporting of malware infections. Performed detailed network forensic analysis and investigations of security events and incidents by analyzing network traffic, end points, servers, firewalls, and Intrusion Prevention/Detection Systems (IDPS), SIEM. Employed defense-in-depth principles and practices, collected intrusion artifacts to enable mitigation of cyber network defense (CND) incidents. Analyzed actions taken by malicious actors to determine initial infection vectors (zero-day, etc), timeline of activity and any data loss associated wif incidents. Performed on-demand and periodic system audits and vulnerability assessments including Identity Access Management (IAM) audits, application audits and web audits.

Confidential, Orlando, FL

Information Security

Responsibilities:

  • Cybersecurity (InfoSec) Manager/Information Systems (Cyber)security Engineer/Information Systems Security Officer (ISSO)/Systems Engineer responsible for teh analysis, design, implementation, development, certification and accreditation (C&A), risk assessments, documentation, validation and verification (V&V), delivery, training and compliancy efforts for teh continuous operations of information assurance/cybersecurity enabled multiple virtual simulation systems. Engineered, implemented, and monitored security measures for teh protection of computer systems, networks, and information to preserve teh confidentiality, integrity, availability, and non-repudiation of systems. Prepared and authored various scientific and technical reports in accordance wif established Dept of Defense Information Assurance/Cybersecurity directives including but not limited to: DIACAP, Risk Management Framework (RMF), and other applicable publications. Extensive and advanced experience in preparing Information Assurance/Cybersecurity certification letters, Plan of Actions & Milestones (POA&M) to obtain an Authority-to-Operate (ATO) and Certificate of Networthiness (CoN); Security Technical Implementation Guideline (STIG) deviation lists; Operations Security (OPSEC), mitigation strategies, antivirus/patch management; deployment, installation, configuration, upgrades, and maintenance of teh McAfee VirusScan Enterprise (VSE) and Endpoint Security patches, definitions, etc; vulnerability management, IA/Cybersecurity plans, risk and vulnerability management and security assessments, risk mitigation strategies and management.
  • Participate/Lead teh Cyber Security Incident Response Team (CSIRT). Guided CSIRT to employ strategy, standards, processes and technology to detect, respond and recover from security incidents. Served as security expert in network, operating systems, endpoint protection, mobile devices and application design, and product development by creating and executing detailed Verification and Validation plans and procedures for development and qualification testing of system components; creation of security update scripts to automate security response, contingency planning, incidence response and forensic activities utilizing a layered security architectural approach as well as teh investigation of security breaches (personnel, physical, software and hardware security); authored numerous acceptable use corporate policies and procedures in conjunction wif IT, human resources; access control, analyzed systems for vulnerabilities, identification/authentication (SSO), cost benefit analyses reports, Public Key Infrastructure (PKI), encryption, audit and backup solutions, content filtering, website security/firewalls, design, implementation, deployment, and validation of security controls; identity management, security policy analyses, security governance, incident response.
  • Applied systems engineering (cybersecurity) principles in interdisciplinary and/or collaborative approach in technical planning, design, development, system integration and implementation, supportability and TEMPeffectiveness analysis lifecycle balanced system of systems and system solutions wifin a Scrum development model. Evaluated customer/operational needs to define system performance requirements integrate technical parameters and assure compatibility of all physical, functional and program interfaces. Performed various analyses to optimize total security for system of systems and/or system architecture in accordance wif teh secure SDLC process. Performed analyses for affordability, safety, reliability, maintainability, testability, human systems integration, survivability, source code review, vulnerability, susceptibility, system security, regulatory, certification, product assurance and other specialties secure quality factors into a preferred configuration to ensure mission success.
  • As a Network Engineer, successfully configured, designed, and implemented Cisco Call Manager (CUCM X), CISCO routers/switches/VLANs/etc, CISCO ASA 55XX firewall, WebSense, VMWare/hyperV, Windows 2012 R2, Active directory, PKI, authentication/authorization, data-at-rest encryption, and network segmentation.
  • An TEMPeffective security architect for several enterprise-wide security projects, designed, implemented and deployed defense-in-depth infrastructure engineering and security architecture that included security controls across multiple technology stacks of teh OSI model. Experienced in intrusion prevention/detection systems (IPDS), firewall configuration (Fortigate, Palo Alto, CISCO ASA 55XX), SIEM (Splunk, LogRhythm, SolarWinds, etc) security assessment tool/methodology for networks (OSPF, BGP, VPN, FTP/SFTP/VSFTPD), end point security (McAFee, Symantec, Carbon Black) systems, database and applications/web related protocols (TCP/IP, UDP, IPSEC, HTTPS, etc), web development, authentication and authorization schemes (Active Directory, LDAP, RADIUS, etc), gateways (web/email), DNS Security, Internet security, encryption, web filters (Bluecoat/proxies), SQL, advanced noledge of web application, operating system, hardware, software, database, and network attacks, exploitations and defenses spanning teh 7 layers of teh Open System Interconnect (OSI) Model.
  • Responsible for defining, building and implementing network test and compliance methodologies. Utilized black box/white box testing via industry standards/methodologies, functional testing, non-functional (performance, scalability, usability), analysis of user requirements, test design, test tools selection and regression testing. DevOps engineer: designed, developed, applied security configurations/hardening, tested, deployed and delivered system platform for production usage. Utilized DevOps process based on teh Atlassian stack: Jira, Confluence, Bamboo, Git/BitBucket. Developed solutions for teh automation, security, audit and compliance monitoring, and auto remediation of common infrastructure and applications components and services.
  • Developed security architecture requirements for LANs, routers/switches, firewalls, webservers, including teh utilization of encryption/PKI. Strong understanding of application, system, network and enterprise-level security issues and methods, processes, and procedures to mitigate, remediate, and/or harden said security issues.
  • Extensive experience in TEMPeffectively installing, configuring and securing all major operating systems (Windows 7/8/10, Windows 2003/2008/2012, Red Hat 5.5-6.5, Unix, Linux, Android, Mac), tablets, wireless devices, routers, switches, hardware, databases, firmware, and virtualization solution (VMware ESXi, Vsphere, HyperV) clusters, Storage Area Network (SAN).
  • Experienced in performing penetration tests (MetaSploit, etc), audits and vulnerability assessments using industry-standard vulnerability scanners (RETINA, Nessus, etc), implementing and hardening operating systems (Red Hat Linux, Microsoft desktop and server images), software, firmware, networked (routers, switches, firewalls) device. Installed, configured, integrated, and administrated HBSS McAfee security suite, Syslog servers and Nessus ACAS.

Confidential

Consultant

Responsibilities:

  • Migrated legacy applications to teh Amazon Web Services (AWS) infrastructure. Reviewed current Security Information and Event Management (SIEM) infrastructure and authored technical white papers for continuation of architecture deployment for customer. Provided oversight of enhancements and tuning of Information Security monitoring tools to collect, integrate and correlate security events, establish operational threshold levels to establish relevant alarms and notifications, and ensure continuous functionality, availability and enhancement of teh tools.
  • Installed Splunk ENT 6 on Linux and Windows platforms on Amazon Elastic Container Service (ECS) S3 buckets, created reports/pivotal reports, created and fine-tuned alerts, dashboard creation, Search Processing Language (SPL) string creation per customer requirements. Trained users in SPL fundamentals, getting data in Splunk, basic searching, using fields, best practices, transforming commands, reports and dashboards, pivot (user designed reports) and datasets, lookups, scheduled reports and alerts, common searching parameters and log analysis using Splunk. Installed *nix and Windows forwarders on clients to be indexed by teh Splunk deployment server. Hands-on experience wif log collection and analysis, network and host monitoring platforms using Splunk.
  • Designed, analyzed, and validated architectural solutions and implementations, creating secure architectural patterns for both enterprise and cloud environments, helping to find and highlight opportunities for broad or systematic improvements. Provided technical feedback and support to teh engineering group concerning teh infrastructure-as-a-service (IaaS) and software-as-a-service (SaaS) strategy across a hybrid cloud infrastructure model (access/authentication/accounting *triple A*)
  • Performed as a Cybersecurity/Information Security SME in threat intelligence, web applications, networking appliances (CISCO 55XX firewalls, IDS/IPS, Snort), and SQL 2008/2012 databases/queries/syntax, vulnerability management, threat intelligence, incident response, network security endpoints, aggregation and analysis of data (data analytics) from proprietary threat intelligence tools.

Confidential

Lead Systems Engineer/Project Manager

Responsibilities:

  • Served as teh lead Systems Engineer for teh Marine Corps Biometrics Program-Afghanistan. Performed system engineering functions for hardware, network, and software components including but not limited to: requirements specification and management; product and design evaluation, trade-off and selection; human and systems integration; simulation and performance analysis in a laboratory environment; biometrics application (facial recognition and detection, retina analysis, finger print analysis, biometric sensors); designed and documented server builds and technical details for change control; built, tested and executed teh installation of new or modified operating systems and applications software and hardware for desktop and server core images per Marine Corps customer requirements through teh utilization of industry-standard deployment processes. Identified, created, managed, and maintained Key Performance Indicators (KPI) in relation to cost, customer support tickets, employee turnover rate (ETR), inbound/outbound support calls handled per each engineer, and resource utilization.
  • Authored teh Confidential Biometrics Program Systems Engineering and Migration Plan (SEMP) that articulated and communicated teh technical planning and execution of teh Biometrics Automated Toolset (BAT) system and teh Secure Electronic Enrollment Kit II (SEEK II) through its System Development Life Cycle (SDLC); from teh system’s migration to its end-of-life.
  • Managed system resources including but not limited to: performance and capacity planning, availability, cyber security/information assurance, serviceability and recoverability of all high-utilization biometrics systems for teh Marine Corps Biometrics Program-Afghanistan wif an emphasis on: database and application design, engineering, and testing; database administration, management, installation, maintenance, and support of teh SQL server and database architecture, optimization of stored procedures, and database troubleshooting; server scripting in an enterprise level utilizing Systems Engineering best practices to attain teh highest and most logical outcome possible; engineered cyber security and information assurance solutions to attain teh highest level of network security; modified and integrated existing system configurations; researched, tested, implemented, and integrated cutting edge COTS products, services and protocols into teh network infrastructure.
  • Managed networked appliances (Tipping Point, CISCO, Juniper).Diagnosed and resolved complex level-3 technical support issues that involved teh production and application of teh computing environment and components that are not functional. Installed, configured, administered and maintained Windows servers throughout a geographically dispersed configuration including but not limited to: WinServ 2008 r2, Active Directory, DNS, DHCP, WDS, IIS, WSUS, SCCM 2007, SCOM 2007, WebDAV, SQL 2008, .Net FrameWork, VMWare ESX-me cluster, backup through RAID, disaster and file system recovery, WireShark, Splunk, Logrythm, TCP/IP, MS SOAP, and performance tuning of McAfee HBSS (Virus Scan Enterprise 7.X) products and antivirus definitions.
  • Built and maintained a secure network that stores cardholder (PCI-DSS) data, information (HIPPA), restricted access to data, tracked and monitored all access to networked resources storing cardholder data/information, regularly and methodically tested security systems and processes.
  • Oversaw all aspects of teh Marine Corps Biometrics Program-Afghanistan including, but not limited to: Enterprise Solutions Assurance, Information Technology Security (ITSEC); Cybersecurity/Information Assurance (IA); Information Security Governance and Risk Management and Vulnerability Assessment; Disaster Recovery Planning (DRP); Business Continuity (BCP) and Disaster Recovery Planning; Security Information and Event Management (SIEM); Access Control (Identity Access Management/LDAP/RADIUS,etc); Security Network Architecture and Design; and Customer Relationship Management.

Confidential, Fort Meade, MD

Systems Engineer

Responsibilities:

  • Supported research, development, testing and integration (RDT&me) of teh Enterprise Network Mapping and Leak Detection Systems (ENMLDS) program for teh Defense Information Agency (DISA) and Dept. of Defense (DoD). Provided Computer Network Defense (CND) situational awareness of teh Global Information Grid (GIG) through teh engineering, architecture, fielding, testing of network security sensors (Splunk, SolarWinds, etc) and products and developed solutions for teh confidentiality, integrity, and availability of teh GIG.
  • Conducted internal and external network testing in a controlled environment to develop solutions for teh production environment. Globally deployed and tested software/hardware solutions to teh production environment using HP’s ILO suite of solutions.
  • Spear-headed teh development of teh ENMLDS DoD Information Assurance Certification and Accreditation Process (DIACAP) packages to include: Security Plan of Actions and Milestones (POA&M), identified mitigation strategy/solutions, reviewed/mitigated findings via VMS/eMass, submittal of requisite accreditation and registration documentation for teh DIACAP package, reviewed Information Assurance Vulnerability Assessment (IAVA) compliancy for teh Dept of Defense ENMLDS program.
  • Skilled in utilizing IT security audit tools to carry out activities related to teh security certification and accreditation of assigned IT systems. Communicated wif various customers on technical and engineering issues relative to product. Set and observed all technical and architectural standards as previously stated wifin teh Statement of Work. Evaluated, tested, deployed, and maintained vendor-specific software and hardware for teh Department of Defense production environment.
  • Experience in areas of software design, hardware design, computer networking, cloud computing via a virtualized environment, operating systems, system design and manufacturing supporting server and storage products. Systems planning, configuring systems, installing software, providing guidance in technical meetings, defining standards, assisting wif research and design for architectural issues, assisting/providing status updates, attending project meetings and implementation support of new applicationsImplemented authentication and authorization technologies including but not limited to usernames and passwords, Public Key Infrastructure (PKI), digital certificates, and two-factor authentication.
  • Provided advanced systems administration and network management, engineering, maintenance, installation and refurbishment of over 67 Windows Server 2003/2008, 7 Redhat Linux 5.8 server, and 14 HP-UX servers; housing NetIQ, SAMBA, WebSphere, SQL database and various proprietary in-house applications for production utilization. Proficiently administered an active directory domain controller wif over 2000+ users ; troubleshoot active directory domain controller related services and issues including but not limited to: Domain Name Services, DHCP, GPOs, LDAP, RADIUS, user and computer policy management, identity access management (IAM), directory domain controller replication issues, user and email management through active directory domain controller users and computers.
  • Performed Information Assurance administration and maintenance on all 88 servers via defense and industry-wide standards utilizing DISA STIGs, Gold Disk, Security Readiness Review (SRR), Host Based Security System (HBSS), McAfee Virus Scan Enterprise, DLP, ePO, RSD, MA, etc, and Retina Network Security Scanner. Performed IBM WebSphere/webserver administration.
  • Participated in various security compliance reviews, risk and vulnerabilities assessments, audits and review of planned and installed IT systems to identify vulnerabilities, risks, and protection of these assets to ensure confidentiality, integrity, and availability of these networked assets.
  • Performed back-ups to data via VERITAS Volume Manager and NetApp Backup Manager. Created, installed, configured, and managed all aspects of teh VMware ESXi environment including teh installation of over 20+ ESXi hosts and over 10 VMware infrastructure servers and implementing updates and patches and fine-tuning teh configuration to attain teh best balance of performance resource and optimization and availability.
  • Developed scripts for recovery, performance diagnostics and to stream-line administration via Shell, VBscript, BASH and Jscript. Proven installation and administration of Virtual Private Networks (VPN) per customer requirements.

Confidential

Authorized Service Interruption Manager/Security Operations Controller

Responsibilities:

  • Provided a single point of coordination for communications connectivity, outage response, HAZCONs or events affecting systems and networks, and processed requests for Authorized Service Interruptions (ASIs) throughout teh entire Greater Kabul Metropolitan Area including 5 major bases, and 12 forward-operating bases during real-time operations in Afghanistan, servicing over 12,000+ users. Monitored networks in an enterprise environment to identify and prevent unauthorized use and disclosure of information networks.
  • Assisted 5 major technical control facilities in outage restorals. Directs operational adjustments to technical control, telecommunications transmission equipment, and Network and System Security Operations Center (NOC/SOC) to maximize optimal circuit up time.
  • Oversaw and facilitated research, evaluation, and teh secure selection of hardware, software, and product standards, infrastructure projects to harmonize customer requirements. Conducted performance testing of new technologies as required on all upgrades to teh existing infrastructure. Ensured proper procedures and governance reviews were followed based on directives.
  • Provided technical support and information assurance (cybersecurity) initiatives to over 20 Windows 2003/2008r2 active directory domain controller wif over 500 users and messaging services, and 1200 computers in a highly demanding work scenario. Reviewed and analyzed alerts and logs from SIEM appliances (McAfee Enterprise Security Manager, SolarWinds, Splunk, Logrythm) IPDS, AV, and other security threat data sources.
  • Responsible and accountable for SOC strategy, incident monitoring, detection, analysis, and handling; monitoring security systems and analyzing alarms and events for potential threats and intrusions; categorizing alarms and events; notifying client POC of all incidents, system outages, system health degradation; generating and submitting security incident tickets and reports; and analyzing and assessing incidents, or suspected incidents, that are reported from internal and external sources.
  • Monitored, corrected and modified access control lists (ACLs) by manipulating CISCO series routers as needed to improve systems and networks for over 55 medium to large networks spanning a global wide area network (Global Information Grid.
  • Administered and troubleshoot 15 internal and external DNS servers running RedHat Linux 6.0 wifin teh Department of Defense (DoD) unclassified and classified domains. Acted as teh lead shift systems administrator providing guidance and direction to less experienced employees wif; adding/deleting users, creating security groups and distribution lists, managing GPOs, network security through IAVAs and information assurance/security, file permissions, file system integrity, troubleshooting active directory domain controller issues of over 100+ active directory domain controllers.
  • Assisted in securing networks and ensured government standards of command and control information security protection measures were maintained wifin teh Security Operations Center. Performed incidence detection and response while conducting analysis of security log data while analyzing and recommending mitigation techniques for cyber threats by using SolarWinds and LogRythm SIEM solutions. Skilled in manipulating perimeter firewalls and Intrusion Protection/Detection System and McAfee’s Host Based Security System suite (VSE, HIPS, PA, ABM, DCM, APS, etc).
  • Established and provided IP services, Internet services and electronic mail connectivity to various Naval organizations expanding a globally dispersed area through DNS transfers of MX records, A records, SOA records, and NS records.
  • Served as teh lead engineer that provided direction to junior personnel for organizations requesting expeditious IP connectivity for web browsing and electronic mail by means of querying recursive lookups through cached local DNS records, querying DNS Top Level Domains (TLD), and querying authoritative DNS servers through teh Global Information Grid (GIG). TEMPEffective DNS security engineer for a major Network/Security Operations Center (NOC/SOC) using network monitoring tools (SIEM, Solarwinds, Splunk, WebSense, etc).
  • Maintained, troubleshoot, monitored, responded and reported on network security infrastructure systems and services, and information assurance; including but not limited to: network security log analysis, firewall maintenance and monitoring, IPS fine tuning and administration, intrusion anomaly detection and analysis, and trend reporting for management review. Implemented operating systems hardening best-practices and procedures through security applications to achieve a comprehensive network, application, database, hardware, and system security. Drafted and recommended procedure changes that ensures TEMPeffective and efficient management of IT assets through teh assets life cycle.

Confidential

Senior Information Management Officer

Responsibilities:

  • Managed, administered, and configured Windows 2003 servers for 760 user accounts spread across Afghanistan. Administered, engineered and managed SharePoint portal for teh Joint Improvised Explosive Device Defeat Organization (JIEDDO) Counter-IED (CIED) division supporting teh entire Afghanistan area of responsibility.
  • Conducted information assurance/cybersecurity audits and reviews of hardware, software, and service asset data to ensure that system’s operation and management are in compliance wif established Department of Defense directives.
  • Experienced in utilizing web authoring tools including HTML, XHTML, XML, CSS, WebSphere, and web forms to improve public-facing websites.
  • Installed and administered teh Biometric Automated ToolSet (BATS) utilized for counter-insurgency techniques in support of teh JIEDDO initiative. Focal point for teh integration and deployment of teh Handheld Intragency Identity Detection Equipment (HIIDE) to various Forward Operating Bases across Afghanistan.
  • Exemplary resourcefulness in delivering and providing network, system, and cybersecurity support to five organizations, 9 servers in an active directory domain, 650 workstations, 760 user accounts at 27 Forward Operating Bases across Afghanistan. Routine maintenance in an Active Directory environment of over 760 user accounts. Personally corrected over 1,200 technical deficiencies through trouble call responses.
  • Data Center Engineer who responded to over 450 trouble calls, directly supporting over 5,000 Navy-Marine Corps Intranet Users in conjoining Navy and Marine Corps installations throughout teh United States wifin teh Network Operations Center and Security Operations Center in an enterprise level. Maintained and administered over 230 CITRIX Xen App clients to enable application delivery to end-users in a Windows environment.
  • Engineered and maintained servers, hardware, routers, switches, software, etc that provided cloud computing platforms/stacks to over 12,500 clients/users via infrastructure-as-a-service (IaaS) as virtual machines; software-as-a-service (SaaS) of help desk, human resources, and web services applications; identity-as-a-service (IDaaS) of user credentials (access management) through secure implementation of single sign-on, directory services, and authentication services in a virtualized cloud computing environment.
  • Proficiently administered over 7000+ Active Directory domain controllers including but not limited to: setting up network/file access restrictions; troubleshooting of user accounts, user account creation/deletion, backups and restores procedures through MS Active Directory domain controllers; virus protection through Symantec/McAfee anti-virus solution; authorization/authentication/accounting; web content filtering; firewall administration; patch management services; group policies through GPO. Supervised and mentored civilian and military personnel to conduct TEMPeffective NMCI troubleshooting procedures. Maintained, and managed data storage, e-mail, information assurance/security and web services through real-time monitoring, fault recognition, isolation and resolution.
  • NMCI Field Engineer processed, tracked and resolved over 2,000 trouble tickets to over 12,500 users in a highly dynamic and demanding organization. Utilized Remedy Ticket Tracking System to document and resolve cases. Utilized Norton Ghost and other reimaging software for reimaging high-level computers for production utilization.

Confidential

Systems Administrator

Responsibilities:

  • Completed teh migration of Windows NT server to Windows 2000 server environment for 3 medium to large size organizations. Administered an active directory domain of over 30 servers wif exchange email services, file/print, DHCP, various application, antivirus and patch management on all servers wifin various classified (SIPR/CX-me) and unclassified (NIPR) domains for 4 medium to large size organizations consisting of over 6,000 users. Assisted in teh migration of over 2500 workstations from Windows NT to Windows 2000. Troubleshot 4 network servers, 200 user profiles, cannibalized and rebuilt over 50 computers.
  • Implemented Public Key Infrastructure (PKI) and information assurance initiatives in a large size organization, contributing to a more secure environment.
  • Primary WebMaster for 4 medium to large size organizations, facilitating optimum information dissemination throughout teh Pacific Fleet area of responsibility.
  • As teh Technical Control Facility (TCF) Shift Supervisor, provided a full spectrum of capabilities in support of low probability of interception and low probability of detection of global voice and data communications operations throughout teh Fifth Fleet Area of Operations during real, war-time operations. Trained and lead junior technical control facility personnel in teh day-to-day operations of teh TCF.
  • Impeccable support to both secure and non-secure communications and transmission systems which included but not limited to: local area networks, wide area networked systems, network management equipment, asynchronous transfer mode (ATM) equipment, internet protocol (IP) equipment, channel banks, high-to-low level multiplexing systems and equipment, satellite communications (SATCOM), switching systems, channel service units/digital service units (CSU/DSU), cryptographic equipment and interfaces, test and patch facilities, signal conversion, interface equipment, single and multi-mode fiber optics, emission control and security (EMCON/EMSEC), communications security (COMSEC), electronic keying management system (EKMS), fiber optics, multiplexing equipment, laser, wireless, radio frequency (RF), UHF/EHF/SHF, MLOS, microwave frequency, tactical interfaces, fiber-to-copper and copper links, repeaters, switching protection, information assurance/security and cryptographic equipment.
  • Responsible for proper performance of quality control checks, isolating disruptions, and coordination of restoral of over 600 Department of Defense communications circuits traversing ultra-high frequency, super high frequency, extremely high frequency, and fiber optic mediums.
  • Assisted in over 150 communications upgrades and installs. Configured circuits, networks, and systems based on DISA standards, and teh results of quality assurance testings.

We'd love your feedback!