CLEARANCE:
TOP SECRET SCI POLYGRAPH
EDUCATION: AA Degree-Computer Forensic Investigator College/University:
UMUC College - FT Belvoir, Va. (01/24/2007)-(Present)
Technical School: United States Army - FT. Gordon, Ga. Telecommunications
Maintainer(74C MOS) (04/01/2002)-(08/04/2002)
TRAINING:
Air Defense-Wireless Intrusion Detection Systems/WarDriving-05/01/2007,
Personally Identifiable Information (PII) Reporting-06/09/2007, Information
Assurance Vulnerability Alerts (IAVA's) Scans-07/09/2007, Retina Scanning
Tool/Hercules-07/09/2007, Barracuda/Blue Coat Web Filter Administrator
08/01/09, CISSP Boot Camp-08/03/2008, ARC Sight-(Intrusion Detection
Systems)-11/21/2008, Forensic Guidance Tool-(Encase)-06/21/2010, Xacta-
07/07/2007
WORK EXPERIENCE:
SAIC/National Geospatial Agency (NGA)
Security IT Forensic Investigator
04/2010-Present
Investigated fraud, data spills, network penetration, and eradicate
computer viruses and malicious code.
Participate in technical meetings and working groups to address issues
related to computer security and vulnerabilities.
Prepare, write and present reports and briefings as required.
Develop reports, information, and recommendations that support the
implementation of Government security requirements.
Monitor the implementation of security requirements for Government and
Industry facilities and systems.
Incorporated all security disciplines, recommend and develop requirements,
specifications, designs, and procedures to satisfy program security policy
and planning guidance.
Provided evaluations of programs and system vulnerabilities as they relate
to security and develop programmatic or procedural countermeasures
necessary to protect program operation.
Department Of Defense/Army Materiel Command (AMC) Bagram Afghanistan
Supervisor of Operating Systems/System Administrator
01/2010- 04/2010
Managed and supervised operating systems and system administration support
for assigned computer systems used throughout the base and serviced
activities.
Handled complex software/hardware system activities which involved
difficult techniques, rapidly evolving technology and critical demands for
reliability and efficiency.
Analyzed and traced system program failures involving the inter-
relationships of software sub-systems, applications programs and hardware.
Advised users on programming techniques to optimize interaction between
applications programs and platform performance.
Evaluated a broad range of software/hardware systems and developed
implementation techniques for integration into the existing environment.
Performed research and evaluation in the areas of advanced computer
platforms, operating systems, and network connectivity techniques, software
systems design concepts, and logic and software/hardware inter-active
control plans.
Maintained existing servers and minicomputer systems at optimum efficiency
levels, continually evaluating systems effectiveness in local operating
environment, revising innovative improvements as solutions to problems and
consulting with operating officials.
Devised comprehensive test procedures to allow periodic verification of
software/hardware operating limits and users options.
Analyzed and evaluated new technology proposals, trends, and concepts with
particular emphasis on such specialties as operating systems, computer
graphics systems telecommunications terminal systems, library systems.
Integrated requirements into the locally managed world-wide interactive
communications network and the interface of local inter-active systems into
DOD level.
Sarum LLC
Information Assurance Vulnerability Manager (IAVM)
11/2008-01/2010
Responsible for ensuring Systems & Network Security, maintaining
performance & high availability of Servers, Network, Databases &
applications and ensured the confidentiality, integrity, and availability
of systems, networks, and data through the planning, analysis, development,
implementation, maintenance, and enhancement of information systems
security programs, policies, procedures, and tools. Monitor security logs
to uncover possible security violations, (unauthorized activity).
Creates reports showing security violations.
Provides consultation to management on access control rules.
Member of a critical Information Assurance Vulnerability Management (IAVM)
team whose main focus was weekly Retina scanning and reporting for the
Defense Threat Reduction Agency (DTRA) onsite servers and workstations
compliance against latest vulnerabilities.
Monitored agency wide IAVM compliance and reported directly to Government
Functional Representative (GFR).
Assisted the team lead of the IAVM team through aggressive testing cycle of
newly released IAVA patches against all workstation and server images,
created non-Microsoft patches where needed and delivered results to GFR.
Monitor, analyze, and resolve network using intrusion detection sensors
alerts/vulnerabilities using ArcSight reporting websites.
Detect/resolve positive, false positive and false negative intrusion
attempts. Coordinate with the Help Desk, Server Support, Network, and
Telecommunication teams to disseminate and escalate outages/incidents.
Block suspicious websites and spam email through Barracuda Web filter and
Barracuda spam/virus firewall.
Monitor the status of various network nodes with SolarWinds. Track and
resolve network security related trouble tickets through HEAT trouble
ticket database.!UNIX server OS level hardening, applying security patches,
Logging, Monitoring multiple services.
Department Of Defense
Information Assurance Security Officer (IASO)
06/2007-11/2008
Reported and monitored security logs to uncover possible security
violations, (unauthorized activity).
Creates reports showing security violations, provides consultation to
management on access control rules
Reported security incidents and technical vulnerabilities to the Regional
Army Computer Emergency Response Team (RCERT) in FT. Huachuca, AZ.
Researched and implements upgrades to security software and devices.
Supports and promotes security processes and standards; and the other Army
agencies as required and implement protection measures.
Created and implemented the Ft. Belvoir incident response plan and the
classified spillage check list for Department of Information Management
(DOIM). Provided administrative assistance on the Secure Network Sever as
well as Firewalls as the Blue Coat Web filtering Administrator; blocking
and allowing access to websites that were potential threats protecting our
users and networks from Internet threats and abuse, including spyware,
phishing attacks, P2P traffic, IM and streaming traffic, adult content, and
many others.
Researched IP owner; collects and maintains current organizational POC
information when working issues.
Reviewed all Automated Information Systems (AIS) networks to ensure that
accreditation is appropriate, as well as cost effective, for the system
being evaluated.
Provided assistance to installation users in securing Army Information
Systems and the growing complex of personal computers (PCs), local area
networks (LANs), and wide area networks (WANs).
Provided appropriate input to assist the Information Assurance Division in
the evaluation, development, and implementation of security plans,
policies, and procedures.
Worked with the Regional CONUS Emergency Response team (RCERT) remedy
tickets. CONUS Theater Network Operations and Security Center task orders
and other issues as required.
Provided information technology community with an optimum systems security
posture into the foreseeable future.
Provided assistance to Reports all levels of Information Systems Security
vulnerabilities in the manner appropriate to the risk involved.
Prepared documentation of Information vulnerabilities for the Deputy
Directorate of Information Management.
Assisted with the development, implementation, and scrutiny of security
policies, procedures, software, and hardware items to sustain system
accreditation.
Provided a full range of Information Systems Security related services to
evaluate, repair, and document the security posture of installation network
resources.
Performed coordination duties by interfacing with the customer on
Information Systems Security issues.
Researched IP owner; collects and maintains current organizational POC
information when working issues.
Configure products for Intrusion detection sensor, analysis of security
risks, vulnerabilities.
K-Force Government Solutions
Systems Analyst/Administrator
10/2004-06/2007
Added, deleted, and modified accounts on Microsoft Windows based
workstations and Microsoft Exchange systems.
Identified and resolved problems arising in the operation of PC systems
hardware, systems software and application programs.
Operation of first level hardware tests and diagnostic routines, analysis
of results, and implementation of repair solutions where applicable.
Performed system analyses in existing workloads, databases, operational
functions, etc. Developed, wrote, and maintained programs for enhancements
to the database management system unique to the Agency.
Supported customer needs by identifying problems/needs and planning,
coordinating, modifying, implementing, and troubleshooting systems
capabilities to ensure IT systems satisfy customer and mission
requirements.
Monitored computer systems and associated peripheral devices to ensure they
are highly maintained, and ready to support: real-world crisis.
Designed and modified database structure and data links/mapping between
databases.
Capable of implementing recovery procedures. assembly and configuration of
microcomputers and peripheral devices including, but not limited to,
printers, CD-ROMs, floppy drives, hard drives, tape backup systems,
scanners, modems, input devices, and internal boards.
Monitored units of disk storage, i.e. Data files, Redo Files, Archive Log
Files, and extents.
Command Technologies, Inc.
Functional Network Technician
06/2003-10/2004
Provided technical support, network and help desk support for the United
States Air Force.
Oversaw contract development of hardware, software and communications
installation plans, considered the latest techniques and
interface/compatibility TCP/ICP requirements to existing equipment which
encompass multi-vendor interconnections.
Installed and oversees installations automation equipment, software, writes
batch files, sets up menus, made minor modifications as necessary, and
tested systems to ensure optimum operation to fill user requirements.
Maintained compatibility of all organization information systems and
applications.
Managed systems, troubleshoots, diagnoses, corrected errors and
malfunctions and resolved hardware level, systems level, communications
interfacing, and applications level compatibility problems on both
networked and stand-alone equipment.
CTWP/Minolta
Field Service Technician/Copier
04/2003-06/2003
Provided the assembling and delivery of copier machines to business
customers, provided technical assistance to customers to minimize
disruptions of computer operations.
Exercised responsibility for maintaining the accuracy and integrity of the
help desk database.
Received phone calls, walk-ins, or computer generated Request for
Information Technology Services (RITS) from Depot personnel.
Resolved a wide variety of problems, to include LAN and WAN technical
problems, a variety of problems emanating from the UNIX and NT operating
systems, and Depot-wide applications.
Tested and analyzed computer hardware and software malfunctions to resolve
physical and logical processing problems.
United States Army
Telecommunications Maintainer
06/1992-04/2003
Checked and prepared all COMSEC maintenance forms, logs, and reports
pertaining to COMSEC material accountability.
Trained and instructed operators in matters pertaining to COMSEC equipment
keying material to ensure continuity of operations and adherence to
establish policy and procedures to make sure employees adhered to all
COMSEC procedures.
Handled secret information and made sure that key tape (An early stand-
alone data entry machine that stored data on magnetic tape for computer
entry), is handled using proper procedures and destroyed using proper
procedures.
Responsible for making sure that when a secure message was being
transmitted, both communicators are using the proper key-mats (devices
which allow someone to access and send secure messages) and were loading
and destroying the information at the appropriate times