Data Chief Resume Profile
2.00/5 (Submit Your Rating)
Work Experience
Confidential
Data Chief / Operate Defend Network Perimeter and Network Traffic
- Generated and presented operational status and security posture briefings for USMC 2-Star General G-3 Operations Reporting
- Trained in US Army CNO Cyberspace Operations Planning course and have been performing these duties while on Active USMC Service
- Performed DCO Defensive Computer Operations for the enclave. This required the analysis and operations awareness of current threats to the network and a review of FLASH messages from cognizant CNDSPs for preparation for action against hostile attackers
- Linux Administration, Bash Scripting, Security and Network Problem Solving, and Algorithm Design based on known and predicted TTPs
- o Utilized pseudo code to design programs as solutions to problems
- o Hands-on debugging, testing, and documenting activities.
- o Studied the logic of constructing a computer program, and the practical application of integrated program modules into a cohesive security application. Open source security intrusion detection and analysis tools actively utilized
- Researched, evaluated, and produced original content evaluative reports on enterprise tool sets to improve cyber defensive capabilities for the network. Performed integrated into the holistic system of systems program, while increasing enclave efficiency and security.
- Review, Digest, and Implement cyber directives and orders, while suggesting technical solutions for Computer Network Defense
- Performed current compliance requirements for networks under my purview. Briefed staff and Leadership on the threat matrixes in the absence of predetermined Standing Orders, Standard Operating Procedure SOP playbooks, and continuing to perform look-forward operate, defend, and protect the enclave
- Prepare and issue command cyber security orders and directives from Federal and Service Agencies, with detailed, forward looking strategies for the mitigation of ongoing threats and designing blocks and strategies for potential risk vectors. Developed methods to increase training of end-users for cyber awareness and hygiene for current and future threat risks and TTPs
- Develop documentation for executive level personnel to assist in solving complex technical problems and meeting security objectives. Developed a statistical information paper on current state of network availability, and confidentiality to include recommendations for future designs
- Worked with team to establish a standard process for cyber-threat mitigation in support of geographic and DODIN network requirements. Collaborated intelligence operations with adjacent sections to include Network Operations, Intelligence, and Future/Current Operations.
- Completed risk assessments on current cyber security threats to determine residual and real risk during selection, design, implementation, and sustainment of legacy system components and software
- Install, configure, and plan technical security hardware and software to ensure required controls for mission-critical network systems. Performed and led the integration of commercial networking systems into GOTS based network and system configurations, to include encryption devices and access rule based network protective devices.
- Worked with network administrators as a consultant on threat mitigation to include minimizing needed services, implementing least privilege, and intrusion detection and analysis. This effort included use of modeling and simulation of network environments to ensure legacy systems would interact with new technologies and designs. Implemented and monitored security measures for information systems during regular and on-demand exercises and production environments
- Plan and design Local Area and Wide Area Networks and link heterogeneous DODIN and Joint architectures networks through the application of appropriate data and telecommunications hardware and software industry best practices. Execute plans for tactical data communications systems and database integration in order to ensure availability of systems and services.
Confidential
- Support Microsoft Windows XP/Vista/7 clients on AD domain Create and update system baseline images for recovery operation Create, manage, and recover user profiles
- Desktop support - Hardware/ software troubleshooting and installation Respond to trouble calls and worked through issues while documenting the resolution Record issues and resolutions Provide employee training on desktop software to include COTS, Agency-specific Management Software, and Government electronic filing systems.
- Train all employees on new software, hardware, and software changes after updates. Install, configure, update, and troubleshoot agency management system. Install, configure, update, and troubleshoot electronic document storage software and databases. Evaluate and coordinate all vendor purchases that are of a technical nature. Manage Active Directory accounts and Organizational Unit management. Work with and participate on Business Continuity operations and planning to scope, plan, and test SOPs
Confidential
Technical Consultant
- Perform audits and support systems/networks Design and plan network layout Evaluate client needs in accordance with local, state, and federal regulations install and configure all network peripherals. Install and configure network printers and or local printers.
- Install routers and configure WAN, VPN, IPSEC connections Implement wireless Access Points/ routers with necessary security.
- Domain Controller/ file server/ workstation integrations Complete analysis of business needs and existing infrastructure Evaluate GAPS research and test hardware/software technologies in lab environment to make recommendations Create automated scripts to automate improving availability
- Support Microsoft Win2k, Win2k3, and SBS 2k3
- Microsoft Exchange Domain Controllers, Active Directory, Terminal Services, DNS, DHCP
- Create and Manage Organizational Units, Group Policy Objects, Exchange Message Stores
- Implement Group Policies, Organizational Units, User Groups Scalability Design
- Data backup/ recovery planning Configure, monitor, test, and evaluate automated backup procedures
