ADAM STENGER
**** ********* *******, ** ***** Phone: 217-***-**** ****@*******.**
Certifications INFORMATION SECURITY SPECIALIST
GSEC, 2006 Multicertified Expert in Enterprise Security Strategies
CEH, 2007 Infosec specialist whose qualifications include CEH, GSEC, GCFA, and GCWN designations;
GCFA, 2007 and detailed knowledge of security tools, technologies and best practices. Eight years of
GCWN, 2006 experience in the creation and deployment of solutions protecting networks, systems and
MCP, A+, Net+ information assets for diverse companies and organizations.
Key Skills Technology Summary
Network & System
Security
Risk Management
Vulnerability Assessments
Security SIEM (ArcSight ESM); Vulnerability assessment (IP360); Intrusion
Authentication & Access
Technologies: Detection (Dragon IDS); SSH; SSL; Digital Certificates; Anti Virus Tools
Control
(Norton, Symantec, Ghost, etc.)
System Monitoring
Systems: Unix Based Systems (Linux, BSD); Windows (all)
Regulatory Compliance
Networking: LANs, WANs, VPNs, Routers, Firewalls, TCP/IP
System Integration
Software: Encase Enterprise (forensics); various penetration testing tools;
Planning
IT Experience
Multitier Network
Archer Daniels Midland Co., I.T. Security Engineer, 2005 Present
Architectures
Decatur, IL
Education
Decatur Electronics, Inc., Systems Administrator, 2002 2005
SOUTHERN ILLINOIS
Decatur, IL
UNIVERSITY,
Allen Engineering Corp., Network Administrator, 1999 2002
Carbondale, IL
Decatur, IL
BS in Industrial
Technology, 2001
Became an expert in information systems security for multiple clients and employers. Recent
Project Highlights:
SEM implementation: Initiated and implemented ADM’s Security Event Management
solution (ArcSight) allowing the I.T. Security group to aggregate and correlate logs from a
variety of network attached devices.
VA expansion: Expanded Vulnerability Assessment to include various plant networks and
joint ventures in addition to office locations.
IDS Expansion: Expanded ADM’s Network Intrusion Detection System from Corporate
Headquarters only to datacenters located in Europe and South America as well as
additional locations in the United States greatly increasing visibility from an IDS point of
view.
Security Template design: Standardized best practice templates for use in securing various
devices on the network (servers, switches, routers, etc.).
Penetration testing: Assisted third party in conducting in depth network penetration
tests. Incorporated findings into company standards and procedures.
Risk Management: Protected vulnerable networks following detailed risk assessments.
Guided cross functional teams in the design, validation, acceptance testing and
implementation of secure, networked communications across remote sites for several key
clients.
Able to Relocate & Travel Extensively Available for Full Time & Contract Assignments