Network Security Resume Profile
Availability:
Job Type: Permanent, Temporary, Term, Detail, Presidential Management Fellows, Internships, Telework Work Schedule: Full - Time, Part-Time, Shift Work
Work Experience:
Confidential
I.T. SECURITY SPECIALIST
Duties, Accomplishments and Related Skills:
Team Lead for Attack, Sensor Warning division, providing Incident Response services to Global Network Enterprise Construct for CONUS, OCONUS, Southwest Asia, Korea, Pacific Realm, and Europe Security Operations Centers in support of one million customers. Directing Department and Agency level incident management activities - Responsible for all technical aspects of Army defensive cyber operations Intrusion Detection, Incident Tracking, documentation, analytical investigation, problem closure, and future security threat countermeasures Investigate Vulnerability Threats using tools, processes, and techniques designed to provide fact-based analysis to stakeholders in the Vulnerability Disclosure Process - Employ techniques to improve Vulnerability Analysis Methodology to support interaction with Stakeholders and Constituents in the Vulnerability disclosure process Guarantee expeditious and real-time remediation of intrusions, incidents, and vulnerabilities, comprehend the implications for the security of the network. Contributes to reports describing Vulnerability Mitigation Strategies and Root-Cause Analysis Utilize extensive hands-on experience with intrusion detection systems, LAN/WAN configurations, topologies, and protocols - Contributes to reports describing Vulnerability Mitigation Strategies and Root-Cause Analysis Utilizes extensive hands-on experience with intrusion detection systems, LAN/WAN configurations, topologies, and protocols Employ techniques to improve Vulnerability Analysis Methodology to support interaction with Stakeholders and Constituents in the Vulnerability disclosure process - Operate COTS/GOTS tools to support data collection and reporting to the appropriate authorities analyze all incident data, highlights repeated problems areas, drafts summary graphical for the Deputy Director organize various types of information with careful attention to detail, recognizing and dealing appropriately with confidential and sensitive information while separating fact from opinion and speculation. - Produce situational awareness reports for DoD, NSA NTOC, DISA, Intelligence Community IC among public and private sector, and international partners by collaboratively developing and sharing timely and actionable information Analyze threats and vulnerabilities and coordinate findings with partners to reduce risk to critical infrastructure Rapidly respond to routine and significant incidents to mitigation malicious activity, manage significant situations, and support recovery efforts.
Confidential
Unemployed due to Medical Surgery
Duties, Accomplishments and Related Skills:
I had Back Surgery and required recuperation.
Confidential
Information Technology Security This is a federal job
Duties, Accomplishments and Related Skills:
I served as a key technical resource, with the overall responsibility for network security. Analytical advisor to management at all levels and staff members associated with emerging computer technology, I analyzed appropriate products or services w/clients or customers, defining security project scope, requirements, and deliverables, develop, modify, or provide input to project plans. Provided cyber analytical support to criminal investigations of network intrusions and related malicious activities affecting the U.S. Army's global computer infrastructure, personnel, and/or data. Collected, processed, and analyzed information from computer network architecture volatile data, router logs, firewall logs, intrusion detection system logs, network monitors, and computer audit logs and traditional law enforcement sources. Prepared written reports, visualization charts, link analysis diagrams, and incident timelines. Advanced skill with industry standard COTS/GOTS software such as AccessData Forensic Tool Kit and Guidance Software EnCase applications Administered two separate networks Used innovative digital investigative analysis methods Conducted and collaborated investigations of highly sensitive, complex and difficult nature Conducted analysis of alleged illegal activity in the area of network security, Internet, and compiled evidence of alleged activity Acted as a technical advisor for operation and development of networks, Internet, computer forensics, computer security, and critical infrastructure issues. Established and implemented or tested systems security contingency plans and disaster recovery procedures. Developed and implemented programs to ensure that systems, network, and data users were aware of, understood, and adhered to systems security policies and procedures. Contributed in network and systems design to ensure implementation of appropriate systems security policies facilitated the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes. Assessed security events to determine impact and implemented corrective actions. Assured the rigorous application of information security/ information assurance policies, principles, and practices in the delivery of all IT services. Performed needs analyses to define opportunities for new or improved business process solutions. Certified the rigorous application of information security/ information assurance policies, principles, and practices to the systems analysis process. Analyzed TCP/IP networks and related protocols, LAN/WAN architecture, and operating systems administration to detect and remediated vulnerabilities. Guaranteed scan tools were used proficiently for network analysis and implemented scripting tools to make processes more efficient and effective. Applied knowledge of network infrastructure to scan tools to achieve overall best scan results, to include analysis of existing configurations, scan results, etc. I analyzed and documented information systems, to identify threats, risks, vulnerabilities, and recommend mitigation strategies that meet or exceed Compliance ensuring that both unclassified and classified information was afforded appropriate protection in accordance with Executive Orders, Federal laws, regulations, DoD, NIST, and FISMA. Conduct risk and threat analysis to recommend the best IA and security course of actions that allows for the system to meet cost, technical, and schedule requirements. Synchronize with other organizations to assure IA architecture, IA necessities, IA objectives and supporting policies are included at the specific-levels for entry into the IA Program Plan. Monitored project activities and resources for risk mitigation. Managed 10 security staff members and 6 direct reports. -Centralized the direction, coordination, planning, control, and development of a multifaceted information system program valued at 4 Billion -Managed, lead, and administered IA, Security resources, and activities, which led to the of an Approval to Operate within five months -Recognized by management last three years, received an excellent annual performance review Top 3 and cash incentive
Confidential
Team Lead I. T. Specialist Security
Duties, Accomplishments and Related Skills:
Managed the Mint's Computer Security Incident Response Capability MCSIRC 24/7/365 consisting of six IT facilities. Executed vulnerability assessments, threat analysis, and penetration testing. Oversaw the investigation of information security breaches, assisted with disciplinary and legal matters, and interfaced with law enforcement, U. S. Cert, and the Department of Homeland Security DHS as required. Pooled resources on investigations of suspected e-commerce fraud and irregularities. Conducted monthly, quarterly, and annual FISMA compliance metrics. Oversight for system personnel to provide analytical and investigative assistance for IT matters for Mint Internal Affairs and Employee Relations. Served as technical expert for the Disaster Recovery DR program for the agency. Planned and coordinated disaster activities for infrastructure services and other agency components that involved the recovery of the agency's systems at a DR site. Assisted infrastructure services management in planning and implementing major projects by leading and/or providing technical expertise i.e. advising on the feasibility of proposed actions or proposing more efficient means of accomplishing objectives . Conducted a variety of technical tasks, special studies and projects to improve infrastructure topology and services while ensuring DR policies and procedures were adhered to. Stayed abreast on new developments in the information technology IT field and recommended to management new approaches to the work or recently available items of hardware or software which would improve infrastructure services. Performed management control reviews for infrastructure services with full risk assessments. Provided input on new and revised guidance to be incorporated into the agency's IT standards. Provided advice and assistance to other agency components regarding infrastructure services. Conducted security, testing, and evaluation ST E of used software intended to ensure that automated systems are secure from unauthorized use, viral infection, and other problems that would compromise sensitive information in terms of confidentiality, integrity, and availability, or that would compromise other aspects of overall system security. Presented technical direction, guidance, and reviewed completed tasks for technical accuracy, effectiveness, and adherence to applicable federal standards and guidance e.g. NIST, OMB, FISMA, GAO, and HSPD's. Directed a cadre of team members and wide-ranging support on various IT initiatives. Served as Contracting Officer's Technical Representative COTR in monitoring vendor/contractor performance on various contracts valued in access of 10 million. -Defended E-commerce data involved in annual Internet sales worth over 100 million -Protected Information on billions of dollars in gold and silver stored at Fort Knox -Safeguarded Personnel data on 2,500 employees
Confidential
Network Security Monitor Shift Leader
Duties, Accomplishments and Related Skills:
Responsible a 24/7 Network Ops and Security Center supporting computer operations and enterprise level systems administration for ADP systems supporting installation wide and tenant activities within the U.S. Western region encompassing seven states. Implemented and manage enclave rule-sets/filters on specific ports, IP addresses, or customer-defined events. Provided information systems security, IA support, and vulnerability assessments within the installation enclave. Oversaw physical security and CCTV systems for enterprise, regional COMSEC custodian and telecommunications manager. Performed analytical analysis and disseminated IA Vulnerability Alert messages, received, investigated, and documented reports of malicious software attacks, suspicious activities, and penetration attacks. Prepared notifications to RCERT, ACERT, and investigating agency. - Awarded a Full-Ride Scholarship from New Mexico Institute of Technology and the National Science Foundation Scholarship-for-Service Defending Americas Cyberspace program