Michael A. Keys
***A Taylor Road
Greer, S.C. ***51
ac129f@r.postjobfree.com
Goal:
To work for an organization as a Remote Security/Network Engineer/Help Desk/Desktop support in a medium to large enterprise data center. I am currently studying Python, Threat Modeling, Guidelines on Firewalls and Policy, Splunk, and Sail Point with regards to asset categorization as well as compliance (governance in mind).
Salary: negotiable
SUMMARY
Years of experience working in Mainframe environments both Federal and Public.
Years of experience with Access Control, Information Security Governance and Risk Management, Security Architecture & Design, and Telecommunications & Networking.
Year of experience in desktop support in networked environments.
5 years of managing the installation of voice, data, and video circuits including copper and fiber wiring with ability to read blueprints and schematics.
Years of UNIX and Linux experience (scripting and system administration)
10 years of designing, troubleshooting, SIEM dashboards for signature-based correlation of events in Cisco, RSA Envision, Log Rhythm, Juniper, McAfee, Splunk, Websense, and Sail Point (Identity Access and Governance).
COMPUTER SKILLS
Operating Systems
Windows
Windows Server/ HYPER-V/Virtualization
Linux Operating Systems
Unix Operating Systems
PowerShell
Network Infrastructure Implementation
SCCM, Group Policy, Active Directory, Symantec Enterprise security
Knowledge Base:
TCP IP Troubleshooting/Utilities
Cisco VPN Concentrators/ Cisco Load Balancers
Cisco Router hardware & software configurations
UNIX Software Administration
Vulnerability scanning and assessment
Threat Risk Modeling
Guides on Firewalls and Firewall Policy (800-41)
NIST Special Publication (800-53 r4)
HIPAA
Sarbanes Oxley
PCI DSS
Applications:
Microsoft MS-Office
HP’s Omni back Data Protector for system backups and restores
AHD automated help desk
Tivoli
Web sphere
Remedy
Kronos
Genesis
IBM’s Tivoli Enterprise Console (TEC)
IBM’S Tivoli Workload Scheduler (TWS)
IBM’s Sterling Connect - Enterprise
Job Scheduling Console (JSC)
Enterprise Symmetric Storage EMC, IBM, HDS, DELL(SAN)
Air Defense, Air Watch
Cisco VMS, Pix, Switching Modules, ASA Firewalls, NAC, NAT, IDS/IPS sensors maintenance, signature updates and configuration
Net forensics, Cisco MARS, RSA Envision, Blue Coat, RSA Secur-ID
Net scout
Solar winds
TACACS+
VMware
Novell Access Manager (NAM)
Wireshark
Siebel
BMC
Network protocols – TCP/IP, UDP, DHCP, ARP, DNS, NAT, FTP, SNMP, SMTP, SSH, SSL, VPN, HTTP and HTTPS
EXPERIENCE
Information Security Analyst/Service Desk November 21, 2016 to Present
Hexaware
Herndon, Va.
I performed primary duties in Identity and Access Management provisioning and de-provisioning of client access to high risk applications as well as low risk applications. I performed associated tasks for Quality Control to ensure clients were not given access to applications that were not approved by management.
Information Security Consultant Greer, South Carolina
May 2014 – Present
May 2014
Vulnerability Scans performed
I performed an assessment of alarming messages were sent to office desktop computers.
Disconnected affected desktops and reimaged.
Restored shared drives, folders.
I proposed a solution to separate certain data as critical and non-critical.
I signed confidentially agreement.
June 2014
Install, configured antivirus for existing and new desktops.
Installed the most current patches for virtual machines.
I created new snapshots of virtual machines for disaster recovery.
Implemented patch procedures for vulnerabilities.
Proposed a backup solution.
I signed confidentially agreement.
August 2014
Cabling
Pulled CAT5 cabling for desktops.
Setup, configured multiple desktops.
Expanded sales to include mass market accounts.
September 2014
Cabling and network installed
Pulled Cat5 cabling for desktops.
Unpacked, setup of desktops.
Installed local area network without internet connectivity.
November 2014
I received a request to investigate a computer server due to performance issues and possible malware infections.
I performed an upgrade to existing server, and configured new system for small business.
I created a system image of upgraded system for disaster recovery.
I sent proposal to owner for anti-virus and backups solutions with associated cost analysis for implementation when needed.
Jan 2015
Consultant
Prepared documentation for small business cyber security framework (NIST)
Prepared PowerPoint presentations as a subcontractor.
I participated in the writing of a baseline security policy for a small business.
May 2015
I had left knee surgery.
Oct 2015
I performed a security assessment of current environment.
I performed malware/virus removal on lawyer’s office desktop systems.
I installed antivirus software on all systems.
I contracted to perform network check every 3 months; security assessments.
Jan 2016 to March 2016.
I collaborated on a SEIM project to evaluate, recommend the steps to upgrade existing IDS/IPS for a top 50 company.
I helped to perform internal as well as external perimeter vulnerability scanning.
I assisted in the evaluation of patches, licensing issues regarding current physical servers hosting virtual machines. I helped to update out of date vendor patches for their virtual environments, and explained how important that testing as well applying the patches prevents certain attack vectors to management.
I signed confidential agreement.
Information Security Architect (6:45 p.m. – 7:00 a.m. June 5, 2006 - September 2008) (6:45 a.m. to 7:00 p.m. October 2008 to April 2014)
Lowe’s Corporation
Mooresville, North Carolina
Provides security monitoring and first level support on technical/procedural issues of information security utilizing Cisco MARS software, Net forensics, and Air Defense (to monitor wireless Access Points).
Demonstrated on-the-job experience with vulnerability assessment tools (hands on experience) and cyber security engineering. Demonstrated understand of Identity & Access Management (IAM) best practices, and how these relate to regulatory requirements.
Demonstrated experience with security incidents and event management (SIEM, IDS/IPS) and logging environments for security events and alerts to potential (or active) risk or threats, intrusions, and/or compromises.
Demonstrated on-the-job experience communicating and collaborating effectively with program leads and Technical SMEs in support of program milestones or projects that require extensive collaboration over long periods of time.
Collaborated with CISO team to evaluate, test, and deploy IDM/IAM solutions (RSA, ADFS, NAM) to improve identity access control for SSO (single sign on) change request.
Demonstrated on-the-job experience providing guidance and direction on the maintenance of security configuration control of hardware, systems, and application software where needed. Demonstrated support and guidance based in the areas of security architecture design, operations management, business risk assessment, and policy development.
Develops and maintains technical event analysis documentation of configurations and standards for all application platforms, operating systems, and network devices in both the production, development and test environments. Participated in all change requests for vendor access thru corporate firewalls (ASA).
Demonstrated on-the-job experience performing in-depth analysis on reports produced from vulnerability assessment tools and the ability to communicate those results effectively to other project stakeholders.
Provides desktop and server support to resolve information security issues concerning connectivity to the corporate network and logged tickets in Remedy to track incidents.
Identifies asset threats, vulnerabilities, and compensating controls with regards to NIST, PCI-DSS, Sarbanes-Oxley and HIPAA for Audit compliance.
Demonstrated on-the-job experience assessing and guiding the implementation of identified corrections associated with technical vulnerabilities.
Demonstrated experience with the development and maintenance of security policies, standard operating procedures (SOP) documentation for Lowe’s Corporate Information Technology Division.
Collaborated with corporate technical teams (Audit, ISM, CISO and Network Engineering) to identify, resolve, and mitigate events with root cause analysis.
LAN Discovery Techniques
Intrusion and Attack Techniques
802.11 Protocol Analysis
Wireless Intrusion Prevention Systems (WIPS) Implementation
Layer 2 and 3 VPNs used over 802.11 networks
Enterprise/SMB/SOHO/Public-Network Security design models
Managed Endpoint Security Systems802.11 Authentication and Key
COMPUTER OPERATOR 3rd Shift 12:00 to 8:30a September 12, 2005- March 2006
BASF/SIEMENS Business Services, Inc.
4400 MASTERS BLVD
ANDERSON, SOUTH CAROLINA
Tivoli Job Monitoring of application batch processing, batch reruns, hardware failures in the United States, and from remote sites around the world.
Creating and Scheduling of jobs utilizing IBM software Tivoli job scheduler.
Monitoring of backups and restarting failed backups utilizing Hewlett Packard’s Omni back Data Protector Software.
Responsible for performing nightly FTP transfers of data to Germany utilizing IBM Sterling Connect – Enterprise and verifying with customer to ensure data was received.
Monitoring of automated tape library (ADIC), and storage area
Monitoring job failures via TEC (Tivoli Enterprise Console) and addressing any job failures by following the job documentation or escalating any issues or problems to the operation scheduler during the shift.
Responsible for the creation of SAP/R3 Production, quality, and test background jobs according to the Background Job Documentation supplied in the Global SAP Knowledge Center (GSKC).
Monitoring of BASF routers, servers, and WAN links of remote sites for connectivity around the world using the Concord monitoring software.
Logging help desk tickets thru AHD (automated help desk software) for failed jobs, failed desktop or server network connections, and application failures.
Monitoring IBM’s Tivoli Enterprise Console (TEC) messages for fatal, critical (all file systems), warning (archive file systems only), and prompts on all of BASF’s UNIX, Intel, Novell, and Network Systems. In addition, operators are responsible to notify the appropriate UNIX (100+ systems), Database Administrators, and/or SAP Central Basis Group for resolution depending on the Tivoli error message(s).
Preparing turnover reports in detail of any failures to Network Server backups, Network outages, tape issues, and for discussion during morning conference calls for support personnel around the world.
Ensure a clean, safe, secure environment for all personnel.
I-N-I COMPUTER SERVICES January 1996 – December 2004
33 Bennett Drive
Taylors, South Carolina
Owner: Michael Keys
Responsibilities:
Monitoring, configurations and troubleshooting of IBM MVS/XA mainframes.
Desktop computer sales, marketing, setup, configuration, and troubleshooting for lawyers in South Carolina.
AS/400 maintenance and troubleshooting for the City of Fountain Inn, City of Liberty in South Carolina.
Network installation and cabling for RE/Max and Century 21 in Maryland, and consulted on Web site development project.
Cat5 cabling contract for the cities of Fountain Inn and Liberty, South Carolina.
Provide onsite desktop troubleshooting for lawyers around the Upstate under certain maintenance contracts.
Configuration of TEC (Tivoli Enterprise Console) for operations staff for failed UNIX jobs, of which fatal, critical, warning messages of all file systems were needed.
Consultation with Blue Ridge Computer Systems to implement Omegamon II for MVS monitoring environment, and Windows NT 4.0 Server for resource sharing of file and printers services.
Analyzed network design and configuration for several companies, and initiated corrective action when necessary to ensure a cost effective solution.
COMPUTER WAN/LAN SPECIALIST MARCH 1990 - January 1996
Department of Defense, BUMED
Naval Medical Information Management Center, Operations Department
8901 Wisconsin Avenue
Bethesda MD. 20889
Primary responsibilities include desktop administration, selection, and installation, monitoring, and troubleshooting of end users environments around the globe for all Naval Hospitals.
Windows NT 4.0 Server configuration, installation, deployment, and monitoring for file and print sharing. Provides procedural documentation to record and explain the results of the above effort.
Analyze problems and determine the best technical solution to integration issues.
Cisco AGS+ router installation, configuration, deployment, troubleshooting, and monitoring for all Naval Hospitals of which included travel to each site.
Create and maintain voice and data circuits including copper, and fiber wiring to each of the Main hospitals and any outlaying medical clinics or dental clinics.
COMPUTER OPERATOR
DEPARTMENT OF DEFENSE, NMIMC, October 1987 -February 1990
Console monitoring of TSO, ISPF, and VTAM for unusual conditions that impact performance.
Initiate system backups and restore operations initial program load (IPL).
Monitor Amdahl 5890/190e MVS/XA/Jes2 mainframe environment consoles via Omegamon.
Diagnose any workflow issues to process new requirements within existing schedules and procedures (JES job entry subsystem).
I maintained a professional attitude with system programmers, system analysts, end users, and service technicians from IBM, AMDAHL, MEMOREX, STORAGETEK, and many others.
Ensure a clean and safe work environment.
COMPUTER ASSISTANT September 1984 - September 1987
DEPARTMENT OF DEFENSE, NNMC
Maintained magnetic tapes for processing of batch jobs.
Prepared test plans utilizing FATS (fast analysis of tape surfaces.
Maintained integrity of data with tapes cleaner Kybe Series 440.
Analyzes documentation provided with new or revised programs.
Enters necessary scheduling data via remote terminal into automated scheduling system.
Provides assistance to Remote Job Entry (RJE) and Time Sharing (TSO) users who have terminal, card reader, tape drive and or printer capabilities.
MEDICAL RECORDS TECHNICIAN September 1979 – August 1984
8901 Wisconsin Avenue
NNMC, Bethesda, Maryland 20814
I received a certificate in medical terminology.
I maintained medical records for active duty military, retirees, dependents, and members of the public health service.
I have superior knowledge of the use of the terminal digit system for filing, retrieving, tracking, and retiring of medical treatment records utilizing the social security number.
I have retired numerous medical records to St. Louis, Missouri for offsite storage for federal documents.
EDUCATION
Graduated Howard D. Woodson Senior High School June 1979
Pursing Bachelor of Science in Computer Information Systems
Strayer University, Washington, D.C.
Classes completed:
System Analysis and Design
UNIX Operating System
C Programming 1
Software Engineering
Introduction to Business
COBOL Programming 1
Communications 1
COBOL Programming 2
Introduction to College Math 1
Communications 2
Distributed Communication Systems
Introduction to Psychology
Principles of Economics
Accounting 1
Computer Operating Systems
Introduction to Networking
Communications 3
Introduction Local Area Networks
LAN Administration
Cisco Router AGS+ Software Training
Cisco Router AGS+ Installation and Maintenance
January-December 2005 (Greenville, SC Campus) Junior
Introduction to Relational Database Management Systems
The Origins of Western Culture
Introduction to Sociology
Administering Windows desktop clients
Windows 2003 Server Administration
Network Infrastructure Implementation
January-December 2006 (Greenville, SC Campus) Senior
Java Programming 1
Introduction to Art, Music, Literature
History and Methods of Science
Object-Oriented Programming 1
153.0 credits completed (180.0 for Bachelor of Science degree)
Windows Server Administration Fundamentals Completed January 2015
Networking Fundamentals Completed March 2015
Windows 10 Technical Preview Fundamentals for IT Pros Completed April 2015
Software Development Fundamentals currently studying June 2015
C# Fundamentals for Absolute Beginners currently studying September 201
Security Fundamentals currently studying January 2016
Introduction to Programming with Python currently studying April 2016
NIST 800-37 Guide to Applying the Risk Management Framework
ITIL Service Strategy, Service Design, Service Transition, Service Operation, Continual Service Improvement (2011 – 2013)