We provide IT Staff Augmentation Services!

Senior Cyber Fusion Analyst Resume

5.00/5 (Submit Your Rating)

FL

SUMMARY:

  • Results - driven professional with cross-functional experience in leading and managing diverse business projects to support both private entities and military operations; possess comprehensive understanding of information technology and management functions, networks, infrastructure, and evaluation and resolution of complex problems throughout the project life-cycle, from initial feasibility analysis and conceptual design through documentation, testing, implementation, quality review and enhancement; includes extensive knowledge of the principles, methods, or tools for developing, scheduling, coordinating and managing projects and resources.

TECHNICAL SKILLS:

Operating Systems:: Windows 10, Windows 8, Windows 7, Windows Vista

Software Applications: MS Office 20013 / multiple MS Software, Remedy, SNMPc, Orion, Solarwinds, Spectrum, InfoVista, Prime

Networking Protocols: TCP/IP, SSH, FTP, PPP, IEEE 802.11, 802.1X, 802.1Q, OSI Protocols

Information Technology Software / Hardware: Routers, switches, firewalls, TACLANEs (KG-175A, KG-175D), HBSS, HIPS, IDS, IPS, RDS, Prominas, Secure and Non-Secure IPXs, VTCs, personal computers and laptops, backup domain controllers, print servers,printers, and related peripherals: USB, scanners, modems, etc.

PROFESSIONAL EXPERIENCE:

Senior Cyber Fusion Analyst

Confidential, FL

Responsibilities:
  • Develops, creates, and disseminates actionable intelligence based cyber fusion products that enhance Confidential ’s ability to monitor, detect, analyze, and defend CNDSP subscribers and the DoDIN against existing and emerging threats.
  • Reviews customized solutions to Cyber Security requirements for DODIN services and components in support of CCMD.
  • Provides subject matter expertize across a broad range of topics including sensor technologies, packet capture technologies, Cyber Kill Chain Methodologies, advanced signature and behavioral based detections, malware analysis tools, process improvement, training, and evaluations of emerging technologies.
  • Produces in-depth analysis of incidents by: determining the incidents’ nature and formulating responses, identifying and correlating event and incident data, determining actions to be taken, and determining possible effects on the DoDIN and on networks of customers and other organizations.
  • Performs statistical analyses and trending by gathering and analyzing metrics of incidents/events.
  • Performs tracking of enterprise and customer countermeasure actions; synchronization with NetOps, Cyber Fusion (CF), DCC, DNCs, CYBERCOM, NSA, etc., Provide recommendations of countermeasure actions.
  • Detects and reports notice of Detects and reports notice of suspicious/malicious network traffic or similar activities for customer situational Awareness.

Information Technology Specialist / Network Administrator / Supervisory

Confidential, Texas

Responsibilities:
  • Responsible for the planning, evaluating, coordinating, and implementing Secure Internet Protocol Router Network (SIPRNet) connections for users requiring access to the installation "Classified" network and the Non-sensitive Internet Protocol Router Network (NIPRNet).
  • Responsible for evaluating operations in terms of meeting user needs, capabilities, costs, etc. and to ensure a high grade of service .
  • Identify and allocate main line/equipment data stream ports for proper function and speed.
  • Use standard analytical techniques to determine the number of peripherals allowable, amount and types of connectivity, and the bandwidth requirements.
  • Troubleshoot all Information Technology problems to determine the potential problem.

Communication and Network Operations Division Supervisor

Confidential, Texas

Responsibilities:
  • Serve as Lead Manager for the Network Operation Center (NOC), therefore, responsible for the health, welfare, training, readiness, and professional development of 23 subordinates.
  • Plan, coordinate, and supervise installation, operation, maintenance, and management of telecommunications systems for 2 networks running simultaneously (secured and a non-secured), including switching, cable, and automation equipment.
  • Supervise the installation, operation, strapping, re-strapping, preventive maintenance checks and services and unit level maintenance of all communication security devices.
  • Supervised the operation of the Host Based Security System (HBSS). Studied the results of all audits, logs, and reports compiled by HBSS in order to make sound decisions based on policies and regulations placed forward by the Department of Defense.
  • Reviewed security evaluations and vulnerability assessments using the Assured Compliance Assessment Solution (ACAS)
  • Recommended solutions for improved correlation of audit data retrieved by HBSS to detect malicious cyber incidents
  • Provided recommendations for improving audit gathering from the Host Intrusion Prevention System (HIPS), Rouge Detection System (RDS), Intrusion Detection System (IDS) and Intrusion Protection System (IPS) and retention, protection, and use of its output documentation
  • Monitored the network for trusted insider threat, assist with classified data spill detections and clean-up, and provide advice on ports, protocols, and services change requests.
  • Direct restoration and alternate routing of circuits, trunks, links, and systems.
  • Develop frequency operational requirements, telecommunications service requests, and disseminate operations information to ensure communications connectivity; develop and implement unit level signal maintenance programs
  • Assimilate and report system/network statistics.
  • Develop and implement training programs for Signal personnel and provide advice and technical assistance to subordinates and commanders.
  • Operate system control facilities as part of Signal organization management functions.

IT Problem Manager / Change Managing Lead

Confidential, Texas

Responsibilities:
  • Lead the problem solving group through a systematic process to isolate, identify, remediate and resolve assigned problems.
  • Responsible for a specific Information Technology (IT) problem from its originating incident until its resolution.
  • Created and maintained a Problem Investigation ticket to ensure record of documentation.
  • Reactively scanned incidents to verify validity of Problem Investigations assigned from the Enterprise Problem.
  • Requested a Problem Resolution Team (PRT) and remained engaged with the PRT until the completed Root Cause Analysis form was provided.
  • Identified detailed problem resolution tasks across the organization and planed tasks to meet desired targets and needed timeframe.
  • Coordinated resolution efforts with responsible organizations.
  • Proactively scanned incidents for trends, symptoms, workarounds, resolutions, root causes, and any improvement opportunities and scanned incidents for recurrence of problem after a resolution had been implemented on the live environment.
  • Supported implementation of Problem Management process.

Network Operations Lead Manager

Confidential, El Paso, TX

Responsibilities:
  • Served as the Brigade’s Network Operations (NETOPS) System Lead Manager.
  • Accountable for all software and hardware utilized by over 3,500 personnel.
  • Supervised the installation, operation, deployment, provisioning and maintenance of electronic IP based nodal assemblages and all related Communication Security ( COMSEC) devices.
  • Coordinated, integrated, and controlled the operation of IP based nodal systems with associated transmission systems and local subscriber interface equipment.
  • Performed cyber, computer, and network vulnerability assessments.
  • Managed and advised on Information Assurance (IA) and Mission Assurance (MA) techniques and technologies; including antivirus protection, intrusion detection, firewall systems management, COMSEC, Computer Security (COMPUSEC), and Operation Security (OPSEC) to ensure existing and new information systems.
  • D eveloped and implemented security techniques, procedures, and guidance to ensure user access control to computer systems as well as physical buildings and offices.
  • Responsible for health, welfare, and professional development of two Supervisors and two personnel and was also accountable for $5 million worth of signal equipment.

Network Branch Lead Manager

Confidential, Fort Bliss, TX

Responsibilities:
  • Served as Lead Manager for a Network Extension Unit within a signal.
  • Responsible for the health, welfare, training, readiness, and professional development of four supervisors and 12 employees.
  • Supervised the installation, operation, and maintenance of one retransmission team and one Mobile Network Node system consisting of a Shelter, one High Capacity Line of Sight (HCLOS) shelter, and one Satellite Transmission Terminal (STT).
  • Supervised the operation of the HBSS system. Studied the results of all audits, logs, and reports compiled by HBSS in order to make sound decisions based on policies and regulations placed forward by the Department of Defense.

Entry Control Point Manager

Confidential, Fort Campbell, KY

Responsibilities:
  • Performed as a manager responsible for the morale, health, welfare, and professional development of five personnel that have different positions for the Entry Control Point (ECP) during combat operations in Afghanistan.
  • Responsible for the security of 18,000 personnel who live on Bagram Airfield (BAF) and the searching of 3,500 people entering and exciting BAF on a daily basis.

We'd love your feedback!