Computer Security Consultant Resume
SUMMARY
- Execute information transfer with state - of-art multi-satellites on a global basis; operate, manage and provide hardware and software support to multi-media Automated Information Systems (AIS) to include: mainframes, mini, and microcomputers, Local Area Networks (LAN'S), Wide Area Networks (WAN'S), and telecommunications; apply diagnostic and restorable techniques utilizing knowledge of electronic and operational system theory; advise on capabilities, limitations, and condition of equipment; implement production control procedures including input/output quality control support; implement and monitor security procedures; perform assigned mission organizational level maintenance and repair of Command, Control, Communications, Computer, and Intelligence Systems; 4 years of assisting in recruiting.
- Graduate of the US Navy IT “A” School and the Joint Military Network Integrated Control School with over 14yrs. of hands-on computer and electronics equipment installation, maintenance, troubleshooting, Information Assurance, and cyber security experience. Many years of experience includes the installation, configuration, and maintenance of:
TECHNICAL SKILLS
Hardware: printers, scanners, switches, hubs, modems
Software: Windows 2000, XP, 2003, NT, 98, UNIX
Applications: Microsoft Office, Spreadsheet, Excel, Power Point, Word
Peripheral Equipment: Keyboards, Monitors, switch boxes, pointing devices (mice), speakers, receivers and is qualified for executing information transfer with state-of-art multi-media technology such as fiber optics, digital microwave, and tactical and commercial satellites. Operates, manages and provides hardware and software support to multi-media Automated Information Systems (AIS) on a global basis.
PROFESSIONAL EXPERIENCE
Confidential
Computer Security Consultant
Responsibilities:
- Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information utilizing McAfee ePolicy Orchestrator (McAfee ePO), McAfee Realtime, HP Network Node Manager (NNMI), and QRadar.
- Perform preliminary forensic evaluations of internal systems.
- Evaluate/deconstruct malware through open-source and vendor provided tools.
- Tasks other analysts and directs efforts to analyze the IDS and remediate security issues found.
- Trains incoming analysts and Shift leads in roles and responsibilities.
- Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems; assists with implementation of counter-measures or mitigating controls.
- Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty.
- Evaluate firewall change requests and assess organizational risks; Email security monitoring including message identification, notification searches and analysis requests.
- Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
- Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
- Prepares briefings and reports of analysis methodology and results.
- Creates and maintains Standard Operating Procedures and other similar documentation.
Confidential
Network Security Analyst
Responsibilities:
- Responsible for performing daily information security monitoring activities and supporting internal vulnerability/penetration testing activities for enterprise-wide General Dynamics - Ordnance and Tactical Systems (GD-OTS). Involved in the design and implementation of existing and new information systems, applications and data solutions, particularly enterprise-wide cyber security systems and networks by performing the following duties:
- Monitors and advises Information Security Officer and Chief Information Officer on moderately-complex Information Security issues related to GD-OTS Information assets to ensure compliance with General Dynamics OTS Information Security standard practices.
- Coordinates and executes comprehensive Information Technology/Information Security projects, participates in the design, testing and implementation of state-of-the-art secure operating systems, networks and database products. involved in a wide range of security issues including architecture, firewalls, electronic data traffic, network access, intrusion detection, security policy compliance monitoring tools, intrusion prevention technologies, anti-virus, anti-spam/spyware, secures remove access, strong authentication technologies and privacy software including encryption technology, penetration and vulnerability analysis tools.
- Participates in the development and establishment of Information Security policies, procedures, guidelines and standard practices.
- Supports formal design reviews, audits and other practices as necessary.
- Conducts moderately-complex, organization-wide data classification reviews and security audits to ensure compliance with General Dynamics Information Security standard practices.
- Coordinates with vendors, suppliers, and OTS IT Staff, the installation of technical system upgrades, patches and configurations in accordance with established IT policies and procedures.
- Collaborates with Information Technology, Human Resources and Legal Departments to manage complex security incidents, threats and vulnerabilities.
- Creates, manages and maintains systems documentation, including required documentation per departmental policies and procedures, incident reports and system configurations.
- Performs complex analysis at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal.
- Responsible for the day-to-day operational maintenance, support and upgrades for operating systems, workstations and other security platforms.
- Ensures the complex data/media recoverability by implementing a schedule of system backups and database archive operations.
- Works with external service providers and vendors to identify, select, and implement complex technology solutions to protect the confidentiality, integrity and availability of Information Systems.
- Conducts internal audits of hardware and software, Active Directory and Applications to ensure compliance with established standards, policies and configuration guidelines.
- Provides recommendations and resolves non-standard integration/testing issues.
- Develops implements and maintains the complex security access architecture for enterprise applications and network infrastructure.
- Confers with management, programmers, risk assessment staff, auditors, facilities and security departments, and other personnel to identify and plan for data security for data, software applications, and hardware, telecommunications, and computer installations.
- Monitors complex electronic data communications, applications, databases and other information assets for compliance with security policies and procedures including maintaining appropriate documentation of compliance.
- Reviews computer logs and messages to identify and report on possible violations of security.
- Works with auditors, law enforcement and legal representatives in investigations of possible security violations and compliance.
- Develops, coordinates, and implements disaster or emergency recovery procedures for information systems and computer environment.
- Participates in Information Security related briefings, educational events, seminars and training classes.
- Perform daily security monitoring activity
- Analyzes present perimeter security communication traffic through the monitoring of server logs and intrusion detection devices within ArcSight SIEM; Monitor the health of Smart Connectors and the devices that report to them
- Maintain and develop metrics and reports for presentation to management and daily meetings concerning unauthorized network activity and traffic
- Detect unusual traffic and intrusions into the company’s network
- Analyze and report vulnerability scanner data for unpatched vulnerabilities that introduce risk to the enterprise network
- Assist in the review of security architecture changes
- Experienced using ArcSight Security Information Event Management, Unix, IDS, IPS and desktop firewall tools
- Experienced using Tenable, Nessus, Tripwire, Netittness, Symantec End Point, and LANDesk ticketing system
Confidential
Sr. Computer Network Defense Analyst
Responsibilities:
- Responsible for security monitoring, analyzing security alerts using a security tools and escalating them to local support personnel.
- Provide first level IDS monitoring, analysis and incident response to information security alerts events.
- Analyze network traffic and IDS alerts, prioritize and differentiate between potential intrusion attempts and false alarms.
- Tracking investigations to resolution.
- Advise incident responders in the steps to take to investigate and resolve computer security incidents.
- Create IDS filters to eliminate false positives.
- Required to multitask and give equal attention to a variety of functions while under pressure while having the ability to make quick and informed decisions.
- Strong written and oral communication skills and am self-directed and independent.
- Responsible for briefing the government on current cyber intelligence within the IC (Intelligence Community).
- Working knowledge in Intrusion Detection System (IDS) monitoring, incident response, information assurance, computer security best practices, system hardening, vulnerability assessment, vulnerability management, antivirus, firewalls, and techniques for analyzing TCP/IP network traffic and event logs.
- Experience using ArcSight, Niksun, Websense, Mcafee, WireShark, analyzing PCAP data, and using HBSS.
- Monitored and maintained operation of ePO 4.0 server for HBSS. Ensured that the HBSS server is up to date with current releases, that all clients are communicating with the servers, and are installed/maintained according to DOD policy.
- Research, recommend, evaluate and implement enterprise infrastructure security solutions that identify and/or protect from potential threats and respond to security violations.
- Use current information security technology disciplines and industry standards to ensure confidentiality, integrity, and availability of information assets.
- Support and maintain existing security solutions and technologies
- Recognizes and identifies potential areas where existing IT security policies and procedures require change, or where new ones need to be developed.
- I conduct investigations of security violations and, breaches, provide reports and analyses, and recommend solutions and participate in incident handling.
Confidential
Information Technology Specialist/Information Assurance Officer
Responsibilities:
- Performed duties at NETWARCOM to assist with global C51 responsibilities for the fleet and shore establishment for U.S. Strategic Command (USSTRATCOM) for Networks and Space, and as Navy’s Information and Space Component to other Combatant Commanders as required.
- Ensured that the Navy’s network is compliance OCONUS. I’m proficient with IAVMs, CTO, Retina Scans, CARs, ANOs and etc.
- Responsible for the development, testing, quality assurance, and management of network systems used for transmission of information in voice, data, and/or video formats.
- Utilized and have a working knowledge of the FISMA and DICAP process.
- Ensured all information systems are operated, maintained, and disposed of in accordance with security policies and practices outlined in the Navy’s Certification and Accreditation Handbook.
- Utilized processes of the ITIL process to ensure smooth transitioning.
- Worked closely with the IAM (information assurance manager) and CSO (Chief Security Officer) to ensure the complete compliance of the Navy’s network.
- Performed a variety of functions on a wide range of Information Management (IM) and Information Technology (IT) issues and provided advice and recommendations on network services.
- Interpreted and applied IM and IT policies, processes, and guidelines.
- Responsible for conducting analysis and recommending resolution to network services problems and issues.
- Prepared and presented reports as needed to technical, non-technical and senior personnel.
- Responsible for program development and/or oversight for the administration of installation, testing, operations, troubleshooting, and maintenance of the organization's hardware and software systems.
- Responsible for implementing and integrating new programs and developing new theories, concepts, principles, standards, and methods.
- Served as the senior expert/consultant on network technologies, trends, and operations, dictating network configuration management functions, resolving difficult problems or issues, conducting special studies, and making recommendation on new approaches to delivering services.
Confidential
Enterprise Management Officer
Responsibilities:
- Served as an Enterprise Management Officer (EMO) in support of the Government Customer’s Enterprise Operations.
- Ensured the health and integrity of the agency’s infrastructure.
- Direct representative of the Enterprise Directorate in charge of IT Infrastructure Operation, ensuring the systems and infrastructure is able to support the customer’s Mission.
- Provided operations and support services to the customer’s monitoring infrastructure that operates on multiple networks, systems, applications and servers.
- Promptly performed daily/nightly network, system, application and server monitoring.
- Perform fault isolation, troubleshoot customer problems, take customer trouble calls and enter them into Remedy.
- Perform daily and nightly checklists and update system procedures.
- Made decisions based on impacts to operations and set priority of work.
- Briefed the on-coming shift of all scheduled/unscheduled outages and events.
- Reported significant outages in morning briefs and kept records in the daily log.
- Experienced in computer operations, networking, and adept with Microsoft Windows 2000 desktop & server.
- Knowledge of IT concepts such as TCP/IP, ATM, LAN/WAN networking and knowledge of interpersonal, problem solving, organizational and multi-tasking skills.
- Supervised the enterprise service center for the Confidential Agency that’s comprised of help desk, network, intrusion detection support technicians, and operation support technicians that monitored critical production systems. Report anomalies and changes to infrastructure.
- Along with supervising staff, I had to report and annotate changes to the senior management.
- Monitored all priority 1 and 2 incidents and that they are remedied within the specified service level agreement and requirements to the customer base which is global.
- Performed as a system administrator, performing duties with the use of Active Directory system (conducting administrative functions; such as creating, closing accounts and resetting accesses).
- Monitored critical systems health with the use of HP open view monitoring systems and tools and conducted troubleshooting of networks with the use of network maps and tools.
- Coordinated with technicians and engineers on best approach to resolution according to the ITIL (Information Technology Infrastructure Library) process.
- Developed and deployed service restoration teams in order to restore critical systems vital to the customer and distinguish the RCA (Root Cause Analysis).
- Responsible for acknowledging the vulnerability management system (VMS) for the agency, to the department of defense, and report/open priority incidents on malicious attacks.
Confidential
Sr. TechnicalResource Manager
Responsibilities:
- Supported the Space and Airborne System while acting as a resource manager.
- Provided technical service to major internal and external customers while understanding and applying all principles, concepts and standards.
- Responded to customer inquiries and concerns and identified problems.
- Interfaced with the customer on a daily basis toanalyze network outages to identify trends and determine solutions.
- My responsibilities included, performing at an operational position that ensures the systems are properly configured for maximum availability, optimal processing performance, and maximum data transfer by tracking system and networks throughput.
- Monitored processing system health and status; communicated and documented processing system faults and initiated the monitoring of maintenance activities; analyze system metrics and prepared system performance problem reports.
- Correction and update of documents, contribute to, or make, presentations, attend meetings and reviews, analysis of customer requests to determine needs and recommend appropriate configuration, equipment and software changes to satisfy requests, and training of new Resource Managers. I also have experienced in DPS (Data Processing Systems)
- Experienced with the following systems: Sun Microsystems computers and products (Sun Management Center), networks SAN technology, HP Open View, Vantage Point Operations, VERITAS Cluster Server (VCS), UNIX, and Oracle databases. Also has experience with relational database such as SQL and DB2. I also have knowledge and training on Six Sigma.
Confidential
INFORMATION TECHNOLOGY SPECIALIST
Responsibilities:
- In the area of Network Administration, provided technical assistance to computer system users.
- Responsible for answering questions and/or resolving computer problems for clients.
- Provided assistance concerning the use of computer hardware and software, including printing, installation, word-processing, electronic mail, and operating systems.
- Conducted help desk functions and repair fiber optics and a variety of cables.
- Conducted day-to-day operations such as system backups and restores, and add and modify or delete user accounts.
- Installed operating systems, applications and peripherals, troubleshoot user problems, debug command language scripts, and act as the Information Systems Security Officer (ISSO) in access control security (i.e., passwords, access and control lists, etc). Performed advanced Network operations, administration, maintenance and training.
- Established, monitored, and maintained radio frequency (RF) communications systems both ashore and afloat.
- Planned, coordinated establishment, monitored, troubleshot, and restored classified and unclassified RF communication systems that support exchange of voice, data, video and imagery using terrestrial or satellite VLF, LF, MF, HF, VHF, UHF, SHF and EHF frequency spectrums afloat and ashore.
- Performed spectrum management - coordinated and generated frequency assignments for use within area of responsibility, assessed the impact of new frequency requirements upon the existing radio frequency environment, maintained a history of interference incidents and frequency employment files
- Initiated action as appropriate to prevent and/or correct harmful interference, and resolved joint and space interference in the area of message processing.
- Provided message handling, storage, and retrieval of incoming and outgoing messages afloat and ashore.
- Ensured connectivity between shipboard LAN and message delivery systems ashore while administering user profiles, and maintained directory information tree.
- While acting as the lead IT(Information Technology Specialist Manager), I was responsible for developing and executing Emergency Action Plan and implementing communications security; reporting Information Security and Communications Security compliance, identifying, evaluating, and reporting security incidents.
- Performed combat system training team duties, managed personnel security clearance requirements, security programs, system operations, automated data processing software, audit data, security and network documentation, and security system logs. Prepared for information system risk assessments, updates information systems operating procedures; identified database security concerns and information systems security risks, and malicious codes.
- Developed information systems security policies, network policies, and procedures for network administration. Implemented policies and reporting process, security programs, new operation procedures, and requirements for disposition of Automated Information Systems equipment and media.
- Determined computer software for migration or installation, including associated costs, problems, and time while verifying security controls upon network restoration and executed reporting requirements to various agencies.
Confidential
Supervisor
Responsibilities:
- Assisted in daily satellites communication for the fleet, air force, marines, army and etc.
- Also assisted SPAWAR/JFCOM in maintaining and monitoring over 20 DAMA channels in HP Open view for means of communication in the CONUS (Continental United States), Europe, Pacific, and Atlantic.
- Responsible for daily system backups.
- Operated SMC (Satellite Management Center) that consisted of Resource Controllers (RC) - 2 PC's running or Windows NT 4.0 to monitor 10,000 networks, 8 satellite channels, and near 50,000 users on Via Sat government issued software. Other equipment includes, Network Management System (NMS) - 1 Sun Microcomputer running UNIX based operating system that holds a database of network, user terminals, satellite channel set-ups, Relay Bus Controller (RBC) - 1 MS-DOS application providing timing for satellite channels, modems - MD-1324 (16 of them), and radios - RT-1771 (16 as well).
- Responsible for troubleshooting KG-84 and KG-85 crypto for means of communicatio
- Supervised 10-30 personnel on the watch standing floor while providing level-one technical supportto the fleet via phone and UNIX based system/subsystems.
- Maintained LAN/WAN and TCP/IP connectivity on daily systems including NOVA.
- Duties were to make sure the traffic flow, Routine-Flash ran smoothly on systems such as, FSM (FLEET SIPRNET MESSAGING), SHF (Super High Frequency) Gateguard, CBIS (Cudix Broadcast Subsystem), and CUDIX (Common User Digital Interface Exchange System).
- Other responsibilities included monthly PMS (Preventive and Corrective Maintenance) on computer systems and equipment such as modems, printers, and routers 7200 series.
- Initiated weekly virus scans of each node on the network and installed weekly patches to the operating system.
- Conducted several maintenance on the Automated Digital Network System (ADNS) by installing daily patches downloaded. Maintained 6 Cisco routers for the system.