We provide IT Staff Augmentation Services!

Cybersecurity Sme Resume

3.00/5 (Submit Your Rating)

SUMMARY:

I have 5+ years of Intelligence Analysis including Cyber Security, Counterterrorism, and Information Assurance. Also, 8 years of System Administrator/Technical Support.

OBJECTIVE:

I desire a position that will enable me to utilize the skills I have acquired while working as a Cyber Security SME.

TECHNICAL SKILLS:

  • I2 Analyst’s Notebook
  • Choicepoint
  • Accurint
  • Microsoft Office
  • Microsoft Windows XP
  • Microsoft Windows Administration (Microsoft Management Console - Active Directory)
  • Microsoft Windows 2000 Network Operating System
  • Microsoft Windows 2003 Server
  • C Programming (College experience)
  • SQL Programming (College experience)
  • Oracle8i (College experience)
  • PL/SQL Programming (College experience)
  • Maptitude GIS for Redistricting
  • Tier2 Submit
  • Marplot
  • ALOHA
  • Lotus Notes Client & Domino Server 7, 8
  • SRS Remedy Administration & User
  • HBSS 4.5 Admin
  • JWICS
  • SIPRNet
  • NIPRNet
  • CWE Administration

PROFESSIONAL EXPERIENCE:

Confidential

Cybersecurity SME

Responsibilities:

  • Supervise 15 employees.
  • Constructing ROMs (Rough Order of Magnitude) for contract modifications.
  • Creation of Standard Operating Procedures (SOPs) for CNDSP services: IAVM, INFOCON, Malware Protection, HBSS, ACAS, and Net Defense.
  • Create and facilitate training programs for incoming personnel.
  • Presenting potential opportunities for new CNDSP business to Confidential Business Development staff.
  • Prepare for Evaluator Scoring Metrics (ESM) Computer Network Defense Service Provider (CNDSP) Accreditation; compilation and creation of artifacts.
  • Proposing, recommending, and implementing innovative cyber security solutions to Computer Network Defense (CND) processes.
  • Identifying redundancies in cybersecurity risk prevention processes and produce streamlining for efficiencies and effectiveness.
  • Assess IDS outputs for SIEM correlation.
  • Assessing system security plans and providing system security hardening solutions.
  • Managing day to day duties on site for HPCMP contract including: IAVM, INFOCON, Malware Protection, HBSS, ACAS (Tenable Nessus Scanning), and Net Defense.
  • Facilitating New Hire functions such as badge/CAC generation, facility access, and system access.
  • Reviewing/signing assigned personnel time sheets.
  • Reviewing resumes, interviewing potential hires, and making hiring decisions.
  • Formulating and creating monthly metrics report to meet Performance Work Statement (PWS) criteria for government customer.
  • Creation of Standard Operating Procedures (SOPs) for CNDSP services: IAVM, INFOCON, Malware Protection, HBSS, ACAS, and Net Defense.
  • Acting as the ACAS/Security Center Lead by running SecurityCenter Nessus Scans and generating Scanning metrics.
  • Disseminating IAVM notifications on a weekly basis to HPC customers and storing acknowledgements.
  • Disseminating INFOCON quarterly notices and collecting feedback from HPC customers.

Confidential

Lead HPC HBSS Analyst

Responsibilities:

  • Initiating HBSS services for HPC Army subscriber sites including: c onfiguring, integrating, and operating HBSS and HBSS modules (McAfee Agent, Host Intrusion Prevention System, Policy Auditor, Asset Baseline Monitor, Device Control Module/Data Loss Prevention, Virus Scan Enterprise) on Windows, Solaris, and Linux systems.
  • Create custom queries, reports, and compliance summaries for audits and reviews.
  • Identifying root causes and providing directed solutions.
  • Restructured entire system of subscriber correspondence and troubleshooting.
  • Upgrading ePO Console to the latest versions.
  • Creation of a server generated Site Compliance Report to provide weekly security posture of individual sites.
  • Upgrading McAfee ePO versions.
  • Provide guidance for subscribers performing system administration on HBSS servers and integrate HBSS data (alerts, logs, data feeds, etc.) into existing monitoring, detect, and respond processes, procedures (intrusion detection analysis, auditing, etc.) and systems
  • Provide guidance in all aspects of HBSS support to include account setups, port enabling direction, how to deploy and load agents, deploy and load policies, deploy and load modules and overall monitoring.
  • Creation and upload of signatures to ensure Security Technical Implementation Guides (STIG) compliance, security, and performance.
  • Support Information Assurance personnel to assure security architecture, design, and implementation is in accordance with DoD Regulations.
  • Submit Weekly Activity Reports for HPC systems to senior management.
  • Maintain HPC servers to upload the most recent version of ePO modules.
  • Modify policies for all ePO modules including Host Intrusion Prevention (HIPs) for tuning.

Confidential

Systems Administrator II

Responsibilities:

  • Grants system access, created user accounts, and created and managed shares using MS Windows Active Directory Management for MS Windows Server.
  • Provides technical customer support and in depth trouble shooting to computer users for networks and applications.
  • Utilizes Windows Event Manager to troubleshoot and diagnose system problems and anomalies.

Confidential

Systems Administrator Team Lead

Responsibilities:

  • Supervise team of 12 contractors.
  • Track arrivals/lateness of team, advise PM of flagrent issues.
  • Ensure coverage of important meetings.
  • Monitor work queues and phone system.
  • Monitor senior management taskings.
  • Compile and analyze monthly team metrics and submit to PM.
  • Formulate and conduct trainings.

Confidential

Resource Specialist/Technical Writer

Responsibilities:

  • Responsible for technically vetting Information Technology (IT) candidates with experience in the IT fields of which I have experience in.
  • Utilized technical writing skills to submit candidates for various government contract positions.

Confidential

Senior Network Security Analyst

Responsibilities:

  • Managed routine Retina scanning of classified systems.
  • Researched and analyzed both classified and unclassified intelligence/data on upcoming or current malicious code occurrences and explotation trends for both technical and non - technical audiences.
  • Staying abreast of emerging malware threats and their subsequent system effects.
  • Wrote and presented intelligence briefs for the daily 630 meeting with the CIO-DIA based on reported malicious threats and cyber trends. Also briefed the prior day’s incidents and disseminated intelligence products.
  • Assisted in IAVA/Patch Management according to DoD/NIST standards.
  • Coordinated with other IC CND offices and agencies as the first response for malware incidents and events.
  • Served as the Day shift Lead Watch Officer for the DIA/ODNI’s Intelligence Community-Incident Reporting Center ( Confidential ) contract.
  • Worked in a 24x7 watch office supporting the DIA/ODNI’s Intelligence Community-Incident Reporting Center ( Confidential ).
  • Compiled daily reports of all incidents/products, produced Intel products based on current trends, malware threats etc.
  • Trained incoming staff.
  • Managed the watch schedule for the Project Manager.
  • Updated the daily shift log with all correspondence
  • Coordinated and met with other of Cyber Watch leads.

Confidential

Project Lead

Responsibilities:

  • Reconciled contract time cards and logs with corporate records to verify accuracy of submissions for the DoD’s DIA/ODNI’s Confidential and ODNI’s IARPA Contract.
  • Maintained DoD 8570 compliance.
  • Approved timecards and PTO requests.
  • Provided initial and periodic counseling for annual performance evaluations per ISO guidelines.
  • Prescreened potential new employees
  • Ensured clearance and visitor requests were processed to accommodate Meet and Greets/customer interviews.
  • Briefed and provided input during corporate monthly business development meetings.
  • Assisted in new business development, contributing to contract proposals.

Network Security Analyst

Confidential

Responsibilities:

  • Researched and analyzed both classified and unclassified intelligence/data on upcoming or current malicious code occurrences and exploitation trends for both technical and non-technical audiences.
  • Staying abreast of emerging malware threats and their subsequent system effects.
  • Worked in a 24x7 watch office supporting the DIA/ODNI’s Intelligence Community-Incident Reporting Center ( Confidential ).
  • Authored unclassified reports of interest related to current cyber trends.
  • Acted as the first point of contact for cyber related incident reporting and management of IC networks.
  • Served as the Incident Manager for maintaining and updating spills from classified and unclassified systems.
  • Contacted and received incident reporting from key IC Agencies for the latest malicious activity and threats.
  • Updated the SharePoint log of all incoming/outgoing phone calls, emails, and related issues.
  • Briefed incoming shifts on the pertinent issues that occurred during the previous shift.

Confidential

Systems Administrator

Responsibilities:

  • Granted system access, created user accounts, and created and managed shares using MS Windows Active Directory Management for MS Windows Server.
  • Utilizes Windows Event Manager to troubleshoot and diagnose system problems and anomalies.
  • Created and wrote a user manual for a MS Access database made for specifically for Intelligence Analysts. Provided training for the database as well.
  • Applied patches and ran upgrades for software based on need.
  • Adheres to ITIL standards.
  • Supported SQL databases in a Unix environment.
  • Provided technical customer support and in depth trouble shooting to computer users for networks and applications
  • Performed LAN based and Lotus Notes administration duties including troubleshooting Lotus Notes database and mail file issues
  • Created Lotus Notes Databases from templates
  • Troubleshot various technical issues
  • Served as a SRS Remedy administrator which including creating user accounts in Remedy
  • Served as an administrator for both classified systems and unclassified systems.
  • Assisted with software and hardware upgrades.
  • Installed software on individual machines.
  • Acted as a Team Lead for various work queues.
  • Maintained a building as solo technical support.
  • Carrying a pager to support customer mission after hours and on weekends.
  • Prepared troubleshooting guides for resolved technical issues.

Confidential

Intelligence Analyst

Responsibilities:

  • Performed research and authored reports on subjects as assigned.
  • Intelligence Analyst supporting the FBI’s Foreign Terrorist Tracking Task Force (FTTTF).
  • Accessed open source and agency specific databases.
  • Analyzed information
  • Assessed threat levels on subjects.

Confidential

Intelligence Analyst

Responsibilities:

  • Researched and produced threat oriented Intelligence Bulletins to provide up to the minute responses and information for emerging trends.
  • Edited intelligence reports generated in the analyst's area of assignment.
  • Accessed local and national intelligence information databases to respond to and validate requests for intelligence information.
  • Chaired group efforts to produce intelligence products comprised of two or more members.
  • Contacted other intelligence agencies to collaborate on joint agency initiatives.
  • Produced communications that presented a broad spectrum of issues to other Intelligence Community (IC) and law enforcement entities.
  • Reviewed investigative intelligence reports from various agencies.
  • Serving as a mentor to newly hired Intelligence Analysts.
  • Assisted in developing intelligence collection requirements based on subject matter assignment.
  • Briefed all levels of management on current trends.

Confidential

Technical Analyst

Responsibilities:

  • Provided technical support for supported software on the U.S. EPA Risk Management Plan Reporting Center contract.
  • Tested various supported software.
  • Trained and supervised temporary staff on the receipt and processing of magnetic media.
  • Performed data entry and various data verification functions.
  • Recorded minutes for EPA meetings.
  • Researched data for inquiries.
  • Produced weekly statistical status reports.
  • Repaired damaged Tier2 Submit files.
  • Performed large database cleanouts (20,000+ records).
  • Converted documents to WordPerfect and Word.
  • Created and coordinated mass mail merge mail outs (5,0 00-10, 000).
  • Produced PowerPoint presentations.

Confidential

Property Claims Service Adjuster

Responsibilities:

  • Handled numerous claims on a daily basis.
  • Opened monetary coverage for potentially covered claims.
  • Configured estimates for various residential repairs or replacements.
  • Determined monetary competitiveness of outside estimates.
  • Answered various queries regarding the claims handling process.

Confidential

Redistricting Information Assistant

Responsibilities:

  • Created, updated, and networked an Access database.
  • Entered data into an Access database.
  • Updated features for an Access database.
  • Compiled information and prepared files.
  • Indexed legal case records.
  • Responded to requests for information via phone email regarding redistricting plan status.
  • Repairing various technical and networking problems.
  • Managed redistricting data files for the development of legislative redistricting plans.
  • Entered election and voter turnout data to formulate statistical reports.
  • Used Maptitude for Redistricting GIS software to construct legislative redistricting plans.
  • Prepared output from maps to disseminate to NAACP units and state and local governments by converting Maptitude data to Excel and Adobe PDF files.
  • Prepared presentations and evaluations of current or proposed redistricting data from different states, counties, and localities.

We'd love your feedback!