Post Job Free

Resume

Sign in

Security Systems

Location:
King George, VA, 22485
Posted:
April 13, 2011

Contact this candidate

Resume:

CLEARANCE:

TOP SECRET SCI POLYGRAPH

EDUCATION: AA Degree-Computer Forensic Investigator College/University:

UMUC College - FT Belvoir, Va. (01/24/2007)-(Present)

Technical School: United States Army - FT. Gordon, Ga. Telecommunications

Maintainer(74C MOS) (04/01/2002)-(08/04/2002)

TRAINING:

Air Defense-Wireless Intrusion Detection Systems/WarDriving-05/01/2007,

Personally Identifiable Information (PII) Reporting-06/09/2007, Information

Assurance Vulnerability Alerts (IAVA's) Scans-07/09/2007, Retina Scanning

Tool/Hercules-07/09/2007, Barracuda/Blue Coat Web Filter Administrator

08/01/09, CISSP Boot Camp-08/03/2008, ARC Sight-(Intrusion Detection

Systems)-11/21/2008, Forensic Guidance Tool-(Encase)-06/21/2010, Xacta-

07/07/2007

WORK EXPERIENCE:

SAIC/National Geospatial Agency (NGA)

Security IT Forensic Investigator

04/2010-Present

Investigated fraud, data spills, network penetration, and eradicate

computer viruses and malicious code.

Participate in technical meetings and working groups to address issues

related to computer security and vulnerabilities.

Prepare, write and present reports and briefings as required.

Develop reports, information, and recommendations that support the

implementation of Government security requirements.

Monitor the implementation of security requirements for Government and

Industry facilities and systems.

Incorporated all security disciplines, recommend and develop requirements,

specifications, designs, and procedures to satisfy program security policy

and planning guidance.

Provided evaluations of programs and system vulnerabilities as they relate

to security and develop programmatic or procedural countermeasures

necessary to protect program operation.

Department Of Defense/Army Materiel Command (AMC) Bagram Afghanistan

Supervisor of Operating Systems/System Administrator

01/2010- 04/2010

Managed and supervised operating systems and system administration support

for assigned computer systems used throughout the base and serviced

activities.

Handled complex software/hardware system activities which involved

difficult techniques, rapidly evolving technology and critical demands for

reliability and efficiency.

Analyzed and traced system program failures involving the inter-

relationships of software sub-systems, applications programs and hardware.

Advised users on programming techniques to optimize interaction between

applications programs and platform performance.

Evaluated a broad range of software/hardware systems and developed

implementation techniques for integration into the existing environment.

Performed research and evaluation in the areas of advanced computer

platforms, operating systems, and network connectivity techniques, software

systems design concepts, and logic and software/hardware inter-active

control plans.

Maintained existing servers and minicomputer systems at optimum efficiency

levels, continually evaluating systems effectiveness in local operating

environment, revising innovative improvements as solutions to problems and

consulting with operating officials.

Devised comprehensive test procedures to allow periodic verification of

software/hardware operating limits and users options.

Analyzed and evaluated new technology proposals, trends, and concepts with

particular emphasis on such specialties as operating systems, computer

graphics systems telecommunications terminal systems, library systems.

Integrated requirements into the locally managed world-wide interactive

communications network and the interface of local inter-active systems into

DOD level.

Sarum LLC

Information Assurance Vulnerability Manager (IAVM)

11/2008-01/2010

Responsible for ensuring Systems & Network Security, maintaining

performance & high availability of Servers, Network, Databases &

applications and ensured the confidentiality, integrity, and availability

of systems, networks, and data through the planning, analysis, development,

implementation, maintenance, and enhancement of information systems

security programs, policies, procedures, and tools. Monitor security logs

to uncover possible security violations, (unauthorized activity).

Creates reports showing security violations.

Provides consultation to management on access control rules.

Member of a critical Information Assurance Vulnerability Management (IAVM)

team whose main focus was weekly Retina scanning and reporting for the

Defense Threat Reduction Agency (DTRA) onsite servers and workstations

compliance against latest vulnerabilities.

Monitored agency wide IAVM compliance and reported directly to Government

Functional Representative (GFR).

Assisted the team lead of the IAVM team through aggressive testing cycle of

newly released IAVA patches against all workstation and server images,

created non-Microsoft patches where needed and delivered results to GFR.

Monitor, analyze, and resolve network using intrusion detection sensors

alerts/vulnerabilities using ArcSight reporting websites.

Detect/resolve positive, false positive and false negative intrusion

attempts. Coordinate with the Help Desk, Server Support, Network, and

Telecommunication teams to disseminate and escalate outages/incidents.

Block suspicious websites and spam email through Barracuda Web filter and

Barracuda spam/virus firewall.

Monitor the status of various network nodes with SolarWinds. Track and

resolve network security related trouble tickets through HEAT trouble

ticket database.!UNIX server OS level hardening, applying security patches,

Logging, Monitoring multiple services.

Department Of Defense

Information Assurance Security Officer (IASO)

06/2007-11/2008

Reported and monitored security logs to uncover possible security

violations, (unauthorized activity).

Creates reports showing security violations, provides consultation to

management on access control rules

Reported security incidents and technical vulnerabilities to the Regional

Army Computer Emergency Response Team (RCERT) in FT. Huachuca, AZ.

Researched and implements upgrades to security software and devices.

Supports and promotes security processes and standards; and the other Army

agencies as required and implement protection measures.

Created and implemented the Ft. Belvoir incident response plan and the

classified spillage check list for Department of Information Management

(DOIM). Provided administrative assistance on the Secure Network Sever as

well as Firewalls as the Blue Coat Web filtering Administrator; blocking

and allowing access to websites that were potential threats protecting our

users and networks from Internet threats and abuse, including spyware,

phishing attacks, P2P traffic, IM and streaming traffic, adult content, and

many others.

Researched IP owner; collects and maintains current organizational POC

information when working issues.

Reviewed all Automated Information Systems (AIS) networks to ensure that

accreditation is appropriate, as well as cost effective, for the system

being evaluated.

Provided assistance to installation users in securing Army Information

Systems and the growing complex of personal computers (PCs), local area

networks (LANs), and wide area networks (WANs).

Provided appropriate input to assist the Information Assurance Division in

the evaluation, development, and implementation of security plans,

policies, and procedures.

Worked with the Regional CONUS Emergency Response team (RCERT) remedy

tickets. CONUS Theater Network Operations and Security Center task orders

and other issues as required.

Provided information technology community with an optimum systems security

posture into the foreseeable future.

Provided assistance to Reports all levels of Information Systems Security

vulnerabilities in the manner appropriate to the risk involved.

Prepared documentation of Information vulnerabilities for the Deputy

Directorate of Information Management.

Assisted with the development, implementation, and scrutiny of security

policies, procedures, software, and hardware items to sustain system

accreditation.

Provided a full range of Information Systems Security related services to

evaluate, repair, and document the security posture of installation network

resources.

Performed coordination duties by interfacing with the customer on

Information Systems Security issues.

Researched IP owner; collects and maintains current organizational POC

information when working issues.

Configure products for Intrusion detection sensor, analysis of security

risks, vulnerabilities.

K-Force Government Solutions

Systems Analyst/Administrator

10/2004-06/2007

Added, deleted, and modified accounts on Microsoft Windows based

workstations and Microsoft Exchange systems.

Identified and resolved problems arising in the operation of PC systems

hardware, systems software and application programs.

Operation of first level hardware tests and diagnostic routines, analysis

of results, and implementation of repair solutions where applicable.

Performed system analyses in existing workloads, databases, operational

functions, etc. Developed, wrote, and maintained programs for enhancements

to the database management system unique to the Agency.

Supported customer needs by identifying problems/needs and planning,

coordinating, modifying, implementing, and troubleshooting systems

capabilities to ensure IT systems satisfy customer and mission

requirements.

Monitored computer systems and associated peripheral devices to ensure they

are highly maintained, and ready to support: real-world crisis.

Designed and modified database structure and data links/mapping between

databases.

Capable of implementing recovery procedures. assembly and configuration of

microcomputers and peripheral devices including, but not limited to,

printers, CD-ROMs, floppy drives, hard drives, tape backup systems,

scanners, modems, input devices, and internal boards.

Monitored units of disk storage, i.e. Data files, Redo Files, Archive Log

Files, and extents.

Command Technologies, Inc.

Functional Network Technician

06/2003-10/2004

Provided technical support, network and help desk support for the United

States Air Force.

Oversaw contract development of hardware, software and communications

installation plans, considered the latest techniques and

interface/compatibility TCP/ICP requirements to existing equipment which

encompass multi-vendor interconnections.

Installed and oversees installations automation equipment, software, writes

batch files, sets up menus, made minor modifications as necessary, and

tested systems to ensure optimum operation to fill user requirements.

Maintained compatibility of all organization information systems and

applications.

Managed systems, troubleshoots, diagnoses, corrected errors and

malfunctions and resolved hardware level, systems level, communications

interfacing, and applications level compatibility problems on both

networked and stand-alone equipment.

CTWP/Minolta

Field Service Technician/Copier

04/2003-06/2003

Provided the assembling and delivery of copier machines to business

customers, provided technical assistance to customers to minimize

disruptions of computer operations.

Exercised responsibility for maintaining the accuracy and integrity of the

help desk database.

Received phone calls, walk-ins, or computer generated Request for

Information Technology Services (RITS) from Depot personnel.

Resolved a wide variety of problems, to include LAN and WAN technical

problems, a variety of problems emanating from the UNIX and NT operating

systems, and Depot-wide applications.

Tested and analyzed computer hardware and software malfunctions to resolve

physical and logical processing problems.

United States Army

Telecommunications Maintainer

06/1992-04/2003

Checked and prepared all COMSEC maintenance forms, logs, and reports

pertaining to COMSEC material accountability.

Trained and instructed operators in matters pertaining to COMSEC equipment

keying material to ensure continuity of operations and adherence to

establish policy and procedures to make sure employees adhered to all

COMSEC procedures.

Handled secret information and made sure that key tape (An early stand-

alone data entry machine that stored data on magnetic tape for computer

entry), is handled using proper procedures and destroyed using proper

procedures.

Responsible for making sure that when a secure message was being

transmitted, both communicators are using the proper key-mats (devices

which allow someone to access and send secure messages) and were loading

and destroying the information at the appropriate times



Contact this candidate