Cyber Security Consulting Resume
4.00/5 (Submit Your Rating)
Dallas, TX
SUMMARY
- Twenty - Five years of proven research and development experience, including cyber security and information technology projects within the Department of Energy (DOE) and private sector facilities.
- Established cyber security architecture profile, threat analysis, risk assessment process, asset risk evaluation, gap analysis, and risk remediation and mitigation strategies
- Demonstrated experience establishing a Risk Management process for PCI DSS compliance using the National Institute of Standards and Technology (NIST) 800-53, 800-30, 800-37 & 800-39
- Demonstrated experience establishing a Risk Management process for a large east coast utility using the National Institute of Standards and Technology (NIST) 800-30, 800-37 and the NISTIR 7628 controls crosswalks to the CIP controls for CIP compliance
- Working knowledge of the, NIST Standards, SOX, PCI DSS, ISA-99, ISO 27002, ISO 15408, HIPAA & HITECH standards, NERC CIP, and NRC 10 CFR 73.54 (Cyber Security Rule) regulation
- Working knowledge of numerous automation tools, scripts, packet sniffers, and other equipment necessary to instrument and automate security evaluation processes
- Demonstrated experience assessing, configuring, and testing security applications and systems, such as Cisco or MacAfee firewalls, security appliances, IDS/IPS, SSL or TLS, IPSec, and web services security. Implementation/Configuration Security Information Event Monitoring system (SIEM)
- Other Security Skills: Audits, Penetration testing, Vulnerability assessments, and Low-level / Hardware security impact assessment
- Demonstrated experience using Agile and Xtreme programming methodology and the Object-Oriented paradigm for languages such as Java, C++, C and the .Net Framework using ADO, ASP, and VB for MS SQL Server; served as system administrator performing duties that included managing and maintaining UNIX, Linux, and Windows systems
- Developed web interfaces for real-time sensors utilizing HTML5, SQL, CSS, and MySQL DB
- Directed vulnerability assessment for Cyber Security Planning and NRC regulations that included NEI 08-09 and NRC Regulatory Guide 5.71
- Demonstrated experience working with Siemens TG 2000 SCADA system (Sicam Pas RTUs, S7-300 PLCs, and 7SJ61 Relays) and the Subnet SCADA system, a complete substation automation system with multiple vendor relays, PMU's, network switches, routers, substation managers, GPS time clock, PLC's, panel metering, power quality metering, and other equipment
- Working knowledge of SCADA and ICS protocols that include DNP3, 61850, Modbus, Profibus, Zigbee, and TCP/IP
- Metering Skills: AMI Functional Testing, AMI Acceptance Testing, AMI Test Practice Design, and AEIC and C12 Metering Guidance
PROFESSIONAL EXPERIENCE
Confidential, Dallas, TX
Cyber Security Consulting
Responsibilities:
- Developing a cyber security conference that is industry focused regarding business practices leveraging the best cyber solution and practices offered by the federal government. The conference is focused in four key areas:
- Conformity Assessment Risk management using the NIST Cyber Security Framework (CF) and the Cyber Security Capability Maturity Model (C2M2)
- Data Analysis Big Data and the associated analytic tools coupled with cloud, mobile, and social computing
- Supply Chain Risk Management Risk management, information sharing, and trust mechanisms
- Technical Privacy Standards The Fair Information Practice Principles (FIPP) for evaluating and mitigating privacy impact
Confidential, Knoxville, TN
PCI Security Analyst
Responsibilities:
- Developing policies and procedures (Corporate PCI plan, Incident response plan, Project management plan, etc.)
- Executing the risk management process that included gap analysis for PCI DSS requirements
- Coordinating compliance (SQA and AOC) with the merchant bank and external vulnerability scans (ASV)
- Coordinating compliance with QSA and penetration testing for internal assessments and software development
- Exercising Incident response with IT personnel and C-level management
- Executing vulnerability management process with updates from US-CERT
- Providing awareness for security threats and remediation
- Coordinating asset monitoring using Security Information Event Monitoring (SIEM)
Confidential, Knoxville, TN
Software Consulting
Responsibilities:
- Software Consulting for Confidential on a database applications contract using VB.net implemented on the .NET Framework. Microsoft Studio was the development environment, and Agile/Xtreme programming was the software development life cycle methodology.
Confidential, TN
Communications and Information System Security
Responsibilities:
- Directed electric utilities in Risk-based threat assessments, actively participating in standards regulatory compliance groups, and risk assessments in order to provide our clients with holistic security solutions that meets and exceeds industry expectation
- Examples of the participation include NISTIR 7628 risk assessment, Risk Gap Analysis, IEC 61850, DNP3, National Electric Sector Cyber Security Organization Resource (NESCOR) Smart Grid Failure Scenarios, and the NERC CIP 4 & 5 standards
- Advised utility customer consulting on security vulnerabilities, evaluation for third party processes, and architecture design, Web application security, and social engineering
- Evaluated Smart Grid Lab testing on power system asset that include, reclosures, relays, communication access points, AMI smart meters, HAN devices, IEDs and power system center solutions
- Additonally, supports utility customers with reporting development that accurately characterize operational security through examination and correlation of test results in a consistent and reliable way
- Active participation in the EnerNex penetration testing layered methodology influenced by NIST 800-82 and NIST 800-115 that provided penetration-testing services. Supported proposal development in responding to RFPs. participated in the Industrial Control Systems Cyber Emergency Response red/blue team exercise sponsored by the Department of Homeland Security (DHS)
Confidential
Data System Sciences and Engineering
Responsibilities:
- The Vulnerability Assessment complied with the client’s Cyber Security Plan and NRC regulations that included the requirements of NEI 08-09 Cyber Security Plan for nuclear power reactors and NRC Regulatory Guide 5.71, “Cyber Security Programs for Nuclear Facilities”
- Served as the cyber security officer for the ORNL Center for Medicare and Medicaid Services (CMS)
- Duties include establishing policies, controls, and procedures using HIPAA, HITECH, FISMA, and NIST standards and guidelines for a health information system project
- Served as investigator managing research for the Grid Threat Radar a Laboratory Directed Research and Development (LDRD) project
- This LDRD project is a novel approach to creating a nation-scale cyber threat-alerting tool for the electric grid. A significant element of this research is the cyber-attack-pattern taxonomy that is used in attack analysis for the real-time situational awareness and event correlation
- Served as TEMPprincipal investigator managing research for the Distributed Computational Intelligence for Active Response to Cyber Threats a Laboratory Directed Research and Development (LDRD) project
- This LDRD project was a novel anomaly detection system that used probabilistic modeling, Latent Dirichlet Allocation, and Petri nets to detect anomalous behavior and respond appropriately
- Served as TEMPprincipal investigator and researcher for the DOE Office of Electricity and the Department of Homeland (DHS) for cyber analysis and infrastructure security
- Managed cyber research program development for Control Systems Security, Penetration Testing, and numerous Software Development projects
Confidential
Technical Staff Member
Responsibilities:
- Served as TEMPprincipal investigator for the intelligence community program for cyber analysis and infrastructure modeling in the Global War on Terror and the new emerging Asymmetric Threat
- Served as the IC COOP TEMPprincipal investigator providing solutions for telecommunication and electrical system analysis
- Directed LANL Cyber Research Organization with program development for Process Control Security, DHS fast response initiative for hurricane analysis, and Cyber Storm the DHS cyber security exercise
- In addition, manage numerous software development projects
Confidential
Principle Engineer/Scientist
Responsibilities:
- In the National Security Organization, served as a research staff member for the SCADA testbed, cyber security testbed, and numerous R&D and software development projects
- Held a SANS certification (GSEC 1 ) as a security analyst with experience in handheld and mobile wireless devices
- Managed Cyber research of the INL’s 3G GSM wireless test-bed - network analysis of the A-link and Abis-link protocols that establishes communication between the Based Transceiver Station and Mobile Switching Center
- Laboratory Strategic Initiative point-of-contact for an International collaboration with Spain performing research of Electric Utility Infrastructures Critical Subnetworks Modeling
- Developed and deployed a web-based application using Java for vulnerability characterization of Wireless Handheld Devices. The project included researching Wireless protocols: 802.11b, 802.11a, 802.1x, WEP, and WAP vulnerabilities and countermeasures.
- Managed critical infrastructure and counterterrorism research initiatives for multiple Federal Agencies