We provide IT Staff Augmentation Services!

Sr. Vulnerability Management Specialist Resume

2.00/5 (Submit Your Rating)

SUMMARY:

  • Manager, Information Security, Infrastructure Governance (Clearable) Skilled IT and Compliance Specialist.
  • Highly experienced in supporting internal Marriott International network applications and tools.
  • Experienced in government telecommunication centers through multi - level tier network supports, system supports, help desk support, network engineering and watch officer duties.
  • Proven management and leadership abilities with hands-on experience directly supporting high profile customers.

TECHNICAL SKILLS:

Platforms: Windows Server 2000/2003; Exchange 2003/2007; Active Directory 2003; MS Systems Monitor; Microsoft Windows 98, NT, 2000,XP, Vista suites, Windows 7; Communications Gateway Server; Mac OS; Knowledge of Citrix Linux and Unix

Networking: TCP/IP; Novell; ISO/OSI; SMS/SQL; Ethernet; Token Ring; SecureID; PGP; PKI; Automated Digital Network System (ADNS); SIPRNet/NIPRNet; Web technologies; Microsoft SQL 2000

Equipment: Video Codec Encryption; Confidential Keying Devices (KG84A, KIV-7, KG194, KG-95, KG-94); Polycom Ultra, Super, Extra, and High Frequency Satellite Proclamation; Multi-Port Control Units; Pentagon Automated Control System (PACS) satellite

Tools: IBM BigFix; RSA Data Loss Prevention; BMC Remedy; Maark1; IBM Webreports, LAN Manager; What’s Up Gold; Altiris; Symantec Endpoint Protection Client; Symantec Backup Exec, VMWare; IBM Tivoli; Lotus Notes; Microsoft Office Suite Microsoft Project; Microsoft FrontPage; Adobe Photoshop; Visio IT infrastructure WAN; ATM; Juniper; Microsoft Windows 98, NT, 2000, XP, Vista

Languages: Knowledge of Linux, UNIX, and HTML

EXPERIENCE:

Confidential

Sr. Vulnerability Management Specialist

Responsibilities:

  • Patch and Vulnerability Management Specialist responsible for supporting all devices connected to the network are known, identified, scanned for vulnerabilities, and patched and remediated as needed.
  • Ensure a consistent and coordinated response to ongoing security threats across the network ensuring connected hosts continue to operate safely and securely.
  • Prepare security documentation and periodic reports.
  • Monitored all devices running on the network using Fore Scout Counteract, Nessus, Tenable Security Center, IBM BigFix, and NMAP
  • Deploy IBM Big Fix agents to all devices with a supported agent (Including Windows, Mac OS, and Unix/Linux).
  • Review the IBM Big Fix console daily to identify patches that need to be deployed to Confidential devices.
  • Use the Big Fix console and/or Microsoft SCCM to deploy all needed patches to all Confidential devices, leveraging local IT staff as needed.
  • Ensure that vulnerability scans are performed on a recurring basis for every device running on the network.
  • Ensure prompt and timely remediation of all Critical and High vulnerabilities, as well as Medium vulnerabilities as required by agency policy.
  • Use IBM App Scan tool to regularly scan Web content and internally-developed applications for vulnerabilities and coordinate with Web and application developers to remediate Critical and High vulnerabilities.
  • Produce metrics that support the agency Cybersecurity strategic direction.
  • Assist in the development and maintenance of new procedural documentation including refinements to existing Patch and Vulnerability Management policies.

Confidential

Compliance Analyst

Responsibilities:

  • Responsibilities included conducting ISM 7/32 vulnerability sever scans and firewall change request. Supported all franchise and managed properties. Processed evaluating remedy tickets and facilitating remediation of vulnerabilities found during scan request.
  • Built strong relationships with contacts and clients enabling to quickly assist requestors with uncommon requests, questions, or issues with vulnerability remediation.
  • Inventoried network resources to process property file and print server scans for credit card social security numbers.
  • Notified executive leadership and system managers of vulnerabilities found on international and statewide properties and over 600 file and print servers.
  • Assisted in updating over 20K network critical BIGFIX clients while working closely with the previous Bigfix architect.
  • Assisted in recovering network wide virus outbreak by manually removing infected files from Marriott servers.
  • Assisted in removing unauthorized device access from the Marriott network.
  • Processed contractor laptop request authorizations.
  • Assisted in removal of XP devices during network migration to windows 7 enterprise.
  • Processed network wide naclite blocking and requests.
  • Received consultant of the month November 2014 for outstanding service to the Marriott International client.

Confidential

Windows Admin / AV Technician

Responsibilities:

  • Managed and Maintain IT Systems for the National Cybersecurity and Communications Integration Center ( Confidential ) - a 24-hour, Confidential -led coordinated watch and warning center that coordinates national efforts to address threats and incidents affecting the nation's critical information technology and cyber infrastructure.
  • Supported Windows servers as part of a team managing a number of windows based servers running database and collaboration applications and coordinated the troubleshooting of desktop related issues with various third party vendors.
  • Insured Crypto Logical Devices were up to date and fully operational. In order to support real world events at a moment’s notice.
  • Supported high profile clients with critical Confidential conferences providing Confidential supervision, oversight, engineering, and operational support for both classified and unclassified Confidential Bridge Management services.
  • Worked closely to coordinate Confidential set up with the Confidential support Conference Center and Meeting support center while providing comprehensive desktop and help desk support for the Confidential program.

Confidential

Network Support Engineer

Responsibilities:

  • Designed, tested, implemented, and maintained network, support systems and software used in conjunction with the Critical infrastructure Warning Information Network (CWIN), a Department of Homeland Security ( Confidential ) Mission-Critical system . The project included the configuration of the operating system and changes to the configuration as needed over time.
  • Provided maintenance and support related to the deployment and usage of Citrix products, Structured Query Language (SQL), Internet Information Server (IIS), and Web-based technologies across the enterprise.
  • Maintained accountability for IT-related assets. Tracked new site deployments, packaged equipment for delivery, and generated postage using shipping software.
  • Coordinated on-site installations and engineering-level support services. Designed and delivered in-house training on installation, customer service, Altiris, and ActivCard.
  • Served as Backup Lead responsible for designing the tape backup system ( Confidential Power Vault 124-T) and researched the replacement system ( Confidential DD640 Digital Backup System), which was implemented as part of an approved Technical Refresh Plan approved by the Confidential customer.
  • Served as Symantec Endpoint Protection Lead responsible for all aspects of the Symantec Antivirus Definitions & Security Updates scanning of servers and applying needed changes on the network management console.
  • Administered virtual and physical Microsoft Windows 2003 servers. Responsible for troubleshooting Windows 2003 security settings, active directory DNS, DHCP, TCP/IP and IIS.
  • Administered secure network intranet Daily News Feeds, RRS Feeds, News Groups, Group and Individual user access to authorized documentation, network address book site index and all contents needed to successfully navigate the CWIN Network.
  • Administered troubleshooting for various systems including Microsoft exchange, Citrix Presentation Servers and Web Interfaces, Altiris, VMWare, Arcserve Symantec Backup Exec and Symantec Endpoint protection.
  • Led the migration of the commercial hosted data centers to the Confidential data centers (DC1 and DC2). This migration had no interruption to the user base during migration and post-migration. Deployed and managed configurations for Windows Exchange Server and Windows 2003/2008R2 Servers.
  • Maintained support for two data centers, one operations center and over 200 global users . Installed patches and upgrades to the operating system as needed with DISA / Confidential security Gold Disk requirements and remediation’s and network safe change request.
  • Provided first-tier support and problem escalation for DTS-PO service offerings, network operations, equipment and installations.
  • Maintained records on customer service requests and resolutions via Lotus Notes/Remedy. Supported information sharing throughout DTS-PO and responded to internal requests for information and reporting data. Fielded and responded, as appropriate, to all calls entering DTS-PO, as a first contact filter.

Confidential

Watch Officer

Responsibilities:

  • Provided assistance to the Secretary's Operations Center in initiating and sustaining all emergency medical response missions and functions.
  • Served as a contact with counterparts in various Federal, State, local and voluntary agencies to coordinate the activation and deployment of the Confidential, specialty teams, resources, equipment, personnel and other assets as needed to supplement medical resources during disasters and emergencies.
  • Assisted with training of the Secretary's Operations Center (SOC) personnel defining procedures that support the SOC response operations.

Confidential

Logistics Coordinator

Responsibilities:

  • Coordinated, planned, and executed travel arrangements for the Department of Health and Human Services’ (HHS) Public Health Service Officers, Federal employees, corporate medical teams, and individual medical volunteers for Federal medical response to Gulf Coast hurricane stricken areas.
  • Implemented authorization and vouchering procedures using the GovTrip system.

Confidential

Communications Watch Officer

Responsibilities:

  • Keyed and configured encrypted telephone systems for classified voice and data transmissions.
  • Supported PTC Confidential / Legacy C2 message customers and internal PTC operations groups.
  • Operated the Defense Message Distribution System ( Confidential ), Confidential, and Legacy messaging on unclassified, secret and top-secret systems for high precedence messages.
  • Provided PTC/MSC customers with message preparation and handling assistance and services including JANAP/ Confidential formatting, provided authorized customers with paper, diskette or CD-ROM copies and manual review of designated messages that require special handling prior to actual distribution.
  • Monitored PACS and Decision Agent terminals for message intercepts. Resolved Confidential routing problems, Confidential non-delivery problems, and viruses in Confidential messages or attachments.
  • Configured the set up of Video Telecommunications Conferences ( Confidential )
  • Entrusted with the administration of unclassified and classified local area networks (LANs) and wide area networks (WANs).
  • Responsible for the overall Defense Messaging System ( Confidential ). Database controller for the Northeast Region, which included over 100 Navy ships and military bases within 150 miles.
  • Served as administrator for the transition of over 50 Military Sealift Commands worldwide to the Confidential .
  • Ensure that message traffic was profiled and disseminated properly with Defense Messaging Distribution System ( Confidential ).
  • Maintained network security for two LANs.
  • Managed the creation user accounts for classified/unclassified users.
  • Utilized X.509 certificates embedded in Confidential cards to authenticate users. This was in support of Department of Defense ( Confidential ) organizational messaging.
  • Ensured Information Assurance by securely passing encrypted codes between multiple systems.

Confidential

Chief Watch Officer, Arlington, VA

Responsibilities:

  • Responsible for the overall effectiveness and efficiency of message center operations and voice communications maintenance and equipment.
  • Operated the Confidential, Confidential, Confidential, and Legacy messaging on unclassified, secret and top secret systems for high precedence messages.
  • Tracked and resolved all non-delivery reports. Ensured proper handling and destruction of Top Secret material and maintained records of disclosure.
  • Set up Video Teleconference Cart ( Confidential ) which ensured rapid, secure, efficient and reliable operations during time of war of while maintaining military C4I Systems.
  • Utilized knowledge and experience in aspects of video conferencing through design and layout of a conference room system; to complex troubleshooting and analysis with multiple equipment vendors.
  • Responsible for video conferencing matters from reports on emerging technology to managing every detail of conference room integrations
  • Configured over 200 Video Teleconferences (Crestron, Tandberg) for high ranking officials.
  • Developed and maintained command website using programs such as Macromedia DreamWeaver and Microsoft FrontPage while ensuring compliance with Confidential and SECNAV policies for public websites.
  • Revised organizational standard operating procedures.
  • Installed, configured and programmed networking equipment to include routers, network encryption devices, switches, channel switch units (CSU), digital switch units (DSU) and multiplexers using military and commercial protocols.
  • Performed all software upgrades and troubleshooting of the operating system and switch hardware using appropriate software solutions or diagnostic equipment.
  • Operated, managed and controlled telecommunication transmissions, computer networks, terminals and processing equipment.
  • Transmitted, received, and processed all forms of telecommunication using state of the art multimedia technology.
  • Trained and supervised new members in the office.
  • Supervised the operation and maintenance of secure satellite circuits and associated cryptographic equipment of the Naval Tactical Telecommunications System (NTTS) Supervisor.
  • Responsible for the installation of secure phones for official government use. Responsible for the accounting and operations of all STU III/STE terminal and keying material held by all Chief of Naval Operations staff codes as the STU III Custodian.
  • Trained civilian personnel on Navy procedures, policies, and daily operations.

Assistant Leading Petty Officer/Team Leader

Confidential, San Diego, CA

Responsibilities:

  • Operated and maintained telecommunications equipment, satellite equipment, computers, and peripheral equipment.
  • Served as System Administrator for a 850 workstation workstation, a 4 NT Server network
  • Supervised the building and installation of 500 workstations for the Leased PC program.
  • Served as Confidential Custodian for cryptographic equipment and satellite antennas.
  • Administered the Microsoft Exchange Server.
  • Performed fiber installations for shipboard LAN.
  • Performed startup and shut down procedures on Navmax and Dama units which ensured ship to fleet communications. Maintained steady sync with onboard whisky satellite which provided incoming and outgoing messages vital to the ship’s moral and general and tactical operations and movements.
  • Awarded for excellence in radio communications and action station.
  • Served as satellite voice/data communications specialist. Designed the ships webpage using Microsoft Frontpage. The Intranet resource made it easier for personnel onboard to have access to worldwide Navy material along with ships specific information.
  • Maintained weekly Preventive Maintenance System (PMS) to ensure maintenance was done correctly and within time scheduled.
  • Served on the ESWS (Enlisted Surface Warfare Specialist) committee and administered weekly training on satellite communications.
  • Responsible for system administration of shipboard unclassified and classified LANs. Maintained every aspect of the shipboard servers, including backups, proper usage, trouble calls and any software upgrades. Enabled of satellite connectivity to ensure proper communications.
  • Supported various communication devices such as multiplexers and crypto devices.

We'd love your feedback!