We provide IT Staff Augmentation Services!

Senior Cybersecurity Analyst Resume

5.00/5 (Submit Your Rating)

SUMMARY:

  • Confidential has over twenty - five years’ experience with all aspects of computing and telecommunications.
  • Confidential has been variously a hardware engineer, a network engineer, a network security engineer, a network capacity analyst, a network performance and management consultant, a software engineer/architect and a cybersecurity analyst.

PROFESSIONAL EXPERIENCE:

Senior CyberSecurity Analyst

Confidential

Responsibilities:
  • Tier 2 Malware Analyst for the Department of State’s Cyber Incident Response Team (CIRT). Perform analysis of IDS, Hunter, AV and HIPS alerts, IOC’s from three letter agencies and US-CERT, malware, malicious websites, suspect email attachments and phishing campaigns. Recommend remediation and prevention steps based on malware behavior and threat assessment. Develop IOC’s from malware activities such as Confidential, Confidential, Confidential, to the registry, RAT installations, DNS requests, or other callouts. Analyze HTML, PHP, and/or JavaScript to identity malicious domains and C&C servers. Identify websites, domains or IP addresses to block or blackhole. Use cybersecurity Big Data tools to investigate possible historic incidents, develop attack timelines, identify infection events and identify threat actors.

SENIOR Professional Technical Staff

Confidential

Responsibilities:
  • Software development lead and computer engineer for a discrete-event simulation of radar performance in a ballistic missile defense system. Lead architect for the multi-threaded simulation and associated computing environment. Simulation was 500K LOC and ran on a virtualized High Throughput Computing grid. The simulation was written in Java and C++ and used GPGPU acceleration written in CUDA for 1024K x 1024K Fast-Fourier Transforms.

Associate

Confidential

Responsibilities:
  • Software development lead for the Link-16 model that was part of the Integrated Architecture Behavior Model created by Joint Single Integrated Air Picture Systems Engineering Organization. Link-16 is a Time Division Multiple Access Tactical Data network used by the US military and NATO. The behavior model was designed and developed using xUML (Executable Unified Modeling Language) and C++.

Principal Consultant

Confidential

Responsibilities:
  • Senior member of the Network Performance Management practice providing application impact studies, network performance assessments, cybersecurity assessments and capacity planning studies for Fortune 100 companies and telecommunications companies. Typical engagement was to interview client IT and network management staff concerning their network and application performance issues; assess security procedures and practices; monitor, capture, and analyze network traffic; conduct security vulnerability assessment; review security architecture; model the network infrastructure, traffic patterns and application behavior using OPNET Modeler; identify infrastructure capacity, configuration, security, or architecture issues; and make recommendations for improvement. Although we were not generally tasked to report on network security issues, if we came across an issue during our engagement, we would brief the client.

Senior technical consultant

Confidential

Responsibilities:
  • Senior member of the Data Solutions Consulting Group providing distributed application profiling, network performance and capacity analysis, and network modeling. Typical engagement was to interview IT staff about their application performance issues, monitor, capture, and analyze network traffic using network sniffers and protocol analyzers; model the network infrastructure, traffic patterns, and application behavior using OPNET Modeler, COMNET III, and Optimal Application Expert; and identify infrastructure capacity issues and make recommendations for improvements or changes.

Network Capacity Analyst

Confidential

Responsibilities:
  • Member of a small team that provided network capacity analysis, planning, and modeling for the first and largest commercial ISP. Network traffic growth trends were modeled using OPNET Modeler, network traffic statistics gathered from the Internet backbone switches and routers owned and operated by UUNet, and new customer subscription rates provided by the sales department.
  • Network build-out was planned based on capacity projections obtained from the network model.
  • Technical Lead DISN Program Office, ATM Security Architecture project. Research and evaluation of security vulnerabilities of newest ATM networking equipment slated for use by DISA. Evaluated interoperability of products by various vendors for compliance with DISN ATM Security Architecture. Because of my experience in the field, I was asked to train counter-intelligence agents how to pull protocol payloads such as clear-text passwords off the wire using tcpdump.

We'd love your feedback!