We provide IT Staff Augmentation Services!

Data Science Team Lead Sme Instructor Resume

4.00/5 (Submit Your Rating)

Columbia, MD

SUMMARY:

Data scientist with over 20 years of subject matter expertise and robust knowledge in information technology, data science, machine learning, big data analytics, cyber security incident response and cyber security intelligence training. Advanced capabilities in Data Science methodologies and techniques of Data Extraction, Data Mining, Data Wrangling, Feature Extraction, Statistical Modeling, Predictive Modeling, and Data Visualization.

SKILL:

Programming: Python, SQL, git/github, Matlab, R, command line

Python Packages: Jupyter, Pandas, Numpy, Matplotlib, Scikit - learn, Scipy, TensorFlow

Web Development: HTML5/CSS3, d3.js

Data Analysis Tools: Advanced MS-Excel, Tableau, Google Analytics. Apache Spark, Neo4j

Cyber Security: Symantec Endpoint Security, FireEye IPS, McAfree ePO, Splunk, Snort, Malware analysis

Databases: Oracle 11g, SQLite3, MySQL, MongoDB

Software Management: JIRA, IBM ClearCase & ClearQuest, Microsoft Office

WORK EXPERIENCE:

Data Science Team Lead SME Instructor

Confidential, Columbia, MD

Responsibilities:

  • Supervised, trained, and supported data science team on course curriculum development and implementation to include onsite and virtual trainings, hands-on exercises, workshops, and high-quality instructional videos.
  • Developed, trained, and deployed supervised and unsupervised machine learning models and custom classification algorithms.
  • Designed and developed introductory data science course instructional materials, machine learning algorithm Jupyter Notebooks on (Clustering, Regression, Time Series & Classification) and data visualizations using Python and Tableau.
  • Instructed military and government personal on concepts of data science process, machine learning and deep learning fundamentals, challenges, best practices speci cally model selection, model tting, results evaluation, transfer learning, ne-tuning and terminology.
  • Supervised, assessed, and mentored data scientist team on data science processes and key machine learning techniques including clustering, classification, regression, text mining, and neural networks.

Data Scientist SME

Confidential, Fort Meade, MD

Responsibilities:

  • Built, trained, and validated machine learning models using python to aggregate data, create summary statistics and visualizations, and automatically email reports enabling the client to analyze patterns in large datasets.
  • Designed and evaluated hypothesis, preprocess data and variable selection, handling exceptions and assumption, develop models using machine learning in Python & TensorFlow.
  • Performed data cleaning and feature engineering on large unstructured and semi structured datasets via Jupyter Notebooks using Python and R.
  • Developed, monitored, and configured Neo4j workflow to visualize and analyze customer data quality, accuracy, and integrity.
  • Developed custom machine learning segmentation algorithms using python to increase the speed and accuracy of customer analytics and intelligence decision making.
  • Built predictive models using various machine learning tools to predict and analyze machine learning algorithm concept drift.
  • Designed and deployed one-off and batch supervised machine learning models for ad-hoc customer collection needs.
  • Extensive usage of Python libraries, Pandas, NumPy, Sci kit Learn, Matplotlib, Seaborn, Stats-models, SciPy, MLlib, NLTK, Spacy, etc.
  • Subject matter expertise in social network analysis, supply chain analysis, forensic accounting, pattern of life, natural language processing, social media analysis, classification algorithms, and image processing.

Cyber Security Engineer

Confidential

Responsibilities:

  • Monitor, analyze, and investigate infrastructure traffic, IDS alerts and system logs for threats/Indicators of Compromise (IOCs) via Sourcefire, ArcSight SIEM/Logger, Net Scout, Security Onion, and Blue Coat Reporter.
  • Built RESTful API’s in Django that enabled intelligence reporting analytics team to increase reporting speed by 28%.
  • Configured and maintained development-environment of Hadoop clusters and backend databases.
  • Used Splunk to monitor and debug internal intelligence production systems using queries and dashboards.
  • Created scripts (REGEX) to parse DNS, firewall, Email, Proxy Gateway, WEB, IDS/IPS, Endpoint Protection, and Server logs for alerts and for incident analysis.
  • Perform network and host vulnerability scanning using such tools at ACAS, NAP, McAfee ePolicy/Orchestrator (EPO), NESSUS, Flying Squirrel and Tanium to ensure identification of specific operating system and application misconfigurations and vulnerabilities remediation.
  • Perform packet capture (PCAP) analysis using various tools such as Wireshark TcpDump determine False/True Positive signature alerts.
  • Perform real-time and proactive analysis on various data sources, such as anti-virus logs, firewall logs, DS & IPS data, event logs, and other host based and network-based artifacts.
  • Assists technical lead and network operations with implementation, execution, and remediation of periodic vulnerability assessments.
  • Created deployed and tuned custom intrusion policy signatures (REGEX) via CISCO SourceFire.
  • Created custom ArcSight Dashboards to monitor network security appliances (alerts/events).
  • Extensive knowledge of Network Infrastructure tools and concepts including routers, firewalls, switches, and associated TCP/IP network protocols.
  • Expert experience in using network-monitoring tools such as Bluecoat, ArcSight ESM, Sourcefire, Cisco IronPort, Symantec antivirus software, Tanium and other host base and point network monitoring tools.
  • Experience configuring and deploying McAfee modules and products like McAfee ePO, McAfee VSE, McAfee HIPS, McAfee Endpoint Encryption, McAfee Network DLP, McAfee DLP Endpoint, McAfee SIEM.
  • Extensive knowledge of best practice standards such as the Center for Internet Security (CIS), NIST Cybersecurity Framework, FFIEC Regulatory Cybersecurity Standards, FIPS, ITIL and COBIT.

Senior Cyber Security Instructor

Confidential, Linthicum, MD

Responsibilities:

  • Conducted classroom training on various cyber security topics such as: Malware Analysis, Windows Forensics, Digital Forensics, Basic and Advanced Forensics Examinations, Wireless Cyber Security Fundamentals and Network Intrusion Analysis.
  • Created and developed Network Traffic Collection course. This course consisted of Windows, Linux, and packet analysis, with emphasis on TCPDump, Wireshark, NMAP, Nessus and other network security fundamental concepts.
  • Subject Matter Expertise (SME) in Windows Administration and security concepts; Linux Administration (Red Hat/ CentOS/Unbuntu) and security concepts; Linux CLI usage & Bash Scripting and Windows PowerShell CLI.
  • Used and taught cyber security tools such as Kali Linux, Metasploit, FTK Imager, Encase, MD5Deep, HashMyFiles, Wireshark, TCPDump, Wireshark, Snort, Burpsuite and Volatility.
  • Experience with SIEM technologies (SecurityCenter and Splunk), Firewalls, both network and host based; Application or web content filtering; IDS/IPS
  • Developed internal communication platform using Nodejs and MongoDB, allowing project management team to discuss and create improvements to projects.
  • Experience with security policies, standards, RMF, ISO 27K, NIST, NIST and FISMA
  • Experience Amazon Web Services (AWS) EC2, RDS, S3, VPC, IAM, Cloud Formation and CloudWatch.

Senior Cyber Security Instructor

Confidential, Alexandria, VA

Responsibilities:

  • SME in Windows administration and security concepts; Linux administration and security concepts; Linux CLI usage & scripting; and Networking
  • Created Python scripts to analyze student test data from Excel and automate manual processes.
  • Used and taught cyber security tools and distributions such as Kali Linux, Metasploit, FTK Imager Lite, Log2Timeline, Dump it, MD5Deep, HashMyFiles, Wireshark, TCPDump, Tshark, Snort, and Volatility.
  • Designed, developed, and trained Instructional Design/Web-based training for cyber intelligence analyst customers to include all instructional materials (training curriculum, job aids, reference guides, immersion exercises, and simulations).

Senior Cyber Intelligence Analyst

Confidential, Annapolis Junction, MD

Responsibilities:

  • Subject Matter Expert (SME) responsible for planning, preparation, coordination, validation, and submission of multi-INT (HUMINT, SIGINT, OSINT, MASINT, GEOINT) collection requirements using collection management tasking applications, HOTR, MRS, NSRP, GIMS, INTELINK, ANCHORY, OSIS, COLISEUM, NCI client, and ISM daily to meet CYBERCOM intelligence needs.
  • Developed, maintained, and updated Confidential collection plans based on Confidential Priority Intelligence Requirements (PIRs) prioritized in support of intelligence planning teams and Confidential Commander’s specific targets.
  • Developed, created, and published multiple SIGINT HUMINT and OSINT collection management requirements on behalf of Confidential J2 for cyber-CND/CNO tactical and strategic support.
  • Expertise proficiency in use of Tripwire, Palantir, MIDB, CYBERCOP, Cyber Threat Matrix, AMHS, Foxtrail, CENTAR, iSpace, and Pathfinder.
  • Created and deployed customer internal web pages using HTML, JSP, JavaScript and CSS for intelligence analytical reports.
  • Briefed Confidential senior military and civilian leadership up to the FO/GO level, and staff on cyber analytical intelligence products, intelligence gaps, and assessment collection efficiency.
  • Severed as Confidential RFI manager responding to national and theater level requests providing complete and accurate intelligence information to customers.
  • Planed developed and managed collection assets through the Intelligence, Surveillance, and Reconnaissance (ISR) de-confliction planning process to meet Confidential J2 ad-hoc intelligence needs Confidential J2 Information Assurance Liaison Officer (LNO) to Confidential
  • Duty Officer to understand, manage, and mitigate incidents effecting DoDIN.
  • Developed and published diagnostic strategies, POA&M, and mitigation response process to meet JFHQ-DoDIN network defense and incident response intelligence gaps.
  • Developed six step incident response templates to focus on RMF regulatory standards and compliance.
  • Provided Confidential senior military and civilian staff with clear and concise daily intelligence briefings as it relates to Cyber Network Defense operations
  • Experienced with DoD Information Assurance Certification and Accreditation Process (DIACAP) to Risk Management Framework transformation.
  • SME experience with vulnerability assessment scanning tools and techniques such as Nessus, Nmap, Masscan, CORE IMPACT and Wireshark
  • Developed various intelligence and operational remediation reports in support of Cyber Network Defense (CND) operations.
  • Subject Matter Expert (SME) hands on experience with cyber security-related software such as SCAP, Open SCAP, STIGS, STIG Viewer, eMass, Netflow and HBSS.

Cyber Information Security Specialist

Confidential, Annapolis Junction, MD

Responsibilities:

  • Developed, managed, and briefed comprehensive security assessment to Confidential J2 senior military and civilian leadership up to the FO/GO on DODIN incident response, analysis, and mitigation status
  • Participated in multiple high visibility, strategic level initiatives, providing thought leadership and fostering interagency cooperation and interaction via working groups in the areas of IA policy development, continuous monitoring process development and implementation with DISA and affiliated agencies, and DOD component (CC/S/A, Defense Industrial Base) IA policy and process compliance.
  • Coordinated and assisted NetOps workforce in the execution of current Computer Network Defense (CND) and Information Assurance (IA) plans, policies, and procedures.
  • Participated in security risk assessments and mitigation strategies of DODIN systems to identify areas of potential threat and document findings.
  • Proficient in use of IDS/IPS tools: ISS, Snort, Sourcefire.
  • Proficient in use Nessus, ISS, Foundscan, Nmap, and other vulnerability assessment tools.
  • SME knowledge in Security Standards/Guidelines: STIG, NIST, FISMA, FIPS, and HIPAA.

Geospatial Operations Project Manager

Confidential, Bethesda, MD

Responsibilities:

  • Performed the role of lead UGO Project Manager to select Defense, Civil and Intelligence GEOINT Communities to optimize the allocation and integration of inputs necessary to meet pre-defined objectives.
  • Managed and tracked system lifecycle support activities to include planning, design, integration testing and transition to sustainment of Network Management Systems to include Event Management, Configuration Management, and Trouble and Report Management systems.
  • Developed wrote and publish multiple training programs, communications strategies, helping organizations succeed though team-building, and strategic planning.
  • Served as an ambassador diplomatically coordinating and interfacing with UGO account representatives.
  • Expertise proficiency in MS Project, Visio, and other critical chain project management techniques to meet time, cost, and project execution.
  • Conducted imaging of hard drives and removable media. Perform Forensic examination of acquired image in support of customer counterintelligence efforts. Responsibility included: acquiring and exploiting digital images using commercial forensic tools to perform searches, locate hidden or modified software and locate records of user activity.
  • Briefed senior leaders (0-6 to GS15), division chiefs (SES to DISL), and staff to develop and promote policies, programs, and process improvements reinforcing UGO project management objectives.

Intelligence Collection Manager

Confidential, Reston, VA

Responsibilities:

  • Developed collection requirements and collection strategies in support of analysis issues.
  • Managed analysis of issues related to homeland security, civil applications, and law enforcement requirements.
  • Lead integrator on a multi - intelligence collection strategy plan to achieve common operational picture.
  • Experienced in GEOINT, and C4ISR collection management processes and procedures
  • Experienced in the extraction of vector data using exploitation applications such as ArcGIS and ERDAS Imagine
  • Assisted in the development of the collection manager operation instructions (OI) manuals.
  • Briefed state/ local government officials and U.S inter-agency officials on multi-intelligence collection strategies.
  • Developed standard operation procedure (SOP) manuals for the collection management team.
  • Expertise experience in collection management tasking applications such as, HOTR, MRS, M3, Tripwire, RMS and WISE.

Counterintelligence Collection Manager

Confidential, Arlington, VA

Responsibilities:

  • Served as the lead trainer for the CI collection management course.
  • Managed and tracked IIRs and IIR Evaluations in Portico, WISE, and M3.
  • Coordinated and assisted in the development of the CI collection manager's course curriculum at the Joint Counterintelligence Training Academy (JCITA).
  • Assisted in writing the PRISM 4.2 HUMINT training manual.
  • Developed training materials for CI collection manager s course.

All Source Intelligence Collection Manager

Confidential, Suitland, MD

Responsibilities:

  • Expertise experience in TCPED collection management cycle, and request for information (RFI) process.
  • Managed, prepared, and tasked routine/standing, ad-hoc and time sensitive collection management requirements.
  • Developed collection management strategy and training aids for newly assigned personally.
  • Expertise experience in collection management tasking applications such as, HOTR, MRS, NSRP, RMS and WISE.
  • Managed and prepared ad-hoc and time sensitive geospatial products by multiple GEOINT sources to include NTM satellites, commercial satellites, and airborne satellites.
  • Briefed senior military/government civilians CONUS and OCONUS on collection management applications, technical intelligence, acquisition, and operational communities.
  • Coordinated and provided briefings to senior military and government civilians.
  • Expertise experience in BVI, PRISM, JCE, JTT, Flight Control collection management applications.
  • Assisted in writing PRISM 4.2 SIGINT training manual.
  • Experienced in IMINT, SIGINT, and C4ISR collection management processes and procedures.
  • Developed and implemented curriculum-based training products intelligence for related systems.
  • Experienced in Instructional Systems Design (ISD)
  • Assisted in assessments, evaluation, and certification of new personal.
  • Managed and maintained a training management plan in support of a geographically dispersed workforce.
  • Subject Matter Expert (SME) in ISR collection management

Senior Resource Operator/Coordinator

Confidential

Responsibilities:

  • Troubleshoot, report, and logged any UNIX, NT, and Windows problems that affected day-to-day operation.
  • Performed collection using state-of-the-art automated systems and special purpose multi-million-dollar subsystems to satisfy worldwide joint-service tasking requirements.
  • Performed on-line analysis of intercepted signals, and routed signals of interest to their appropriate end devices.
  • Managed, configured, and operated an end-to-end collection/processing system for tasked targets.
  • Instructed over 50 or more senior personal in collection management and IT support operations.
  • Assisted in assessments, evaluation, and certification of newly assigned multi service personal.
  • Accountable for the timely and accurate input, resolution, and status of services request to customers to maintain IT day-to-day operation.

Signals Analyst/IT Support Specialist

Confidential, MD

Responsibilities:

  • Performed accepted and/or experimental analytical techniques and software packages on new or developmental signals of interest (SOI).
  • Configured and arranged Windows software packages/Microsoft suites to meet operational use.
  • Utilized unique multi - million-dollar equipment, and electronic components to operate specialized analytical position.
  • Utilized call management, problem resolution, problem escalation, techniques for customer/operation support.
  • Managed and trained over 25 multi-service member's highly technical computer systems and analytical software.
  • Troubleshoot, reported, and logged any UNIX, NT, and Windows problems that affect day-to-day operation.
  • Served as head liaison between offices of primary interest, and various field sites.
  • Served as a Tier 1 Support and an initial point of contact for customers to report problems, obtain call/problem status and/or product information.

Collection Manager/Help Desk Support

Confidential

Responsibilities:

  • Served as a Tier 1 Support and an initial point of contact for customers to report problems, obtain call/problem status and/or product information.
  • Managed collected, processed, and forwarded SIGINT requirements.
  • Performed collection using several state - of-the-art highly automated systems valued at more than $20 million to satisfy worldwide tasking requirements.
  • Performed on-line analysis of intercept and routes signals of interest to their appropriate end devices/signal processing.
  • Assisted in evaluation and training of newly assigned personal with a trained personal with test scores above 95%.
  • Compiled and forwarded data from cross-division mission tasking to national level customers.
  • Instructed over 30 personals in maintaining systems performance logs/scheduled health check-ups on UNIX and NT hardware.
  • Resolved, updated, and provided guidelines and status on tickets relating to production, products, hardware and software, Windows NT, office automation applications, and network management.

We'd love your feedback!