Resume

Sign in

Information Security Microsoft Office

Location:
Grove City, Ohio, United States
Salary:
70000
Posted:
January 17, 2018

Contact this candidate

TERRELL BOWDEN ac32qw@r.postjobfree.com http://www.beyond.com/Terrell-Bowden

**** ********** ** **** **** Grove City, OH 43123 614-***-**** (cell) Objective

To obtain a position as an Information Security professional/manager utilizing diverse background and skills in managing, planning, implementing, and monitoring information systems, infrastructure networks and help desk environments and their security measures. Professional Summary:

15 years’ experience in Information Technology.

6 years’ experience in Information Security

3 years’ experience Incident Response

Built Information Security paradigm BEFORE certifications

Certified Master Instructor (MS Office)

Project Management And Budgeting

Infrastructure Support / IT Support / Help Desk

Information Security Best Practices

Computer Networking, System Security

Vulnerability Analysis, Assessment And Identification

Project, Human, and Resource Management

Vendor Relationship Management / Communication Skills

Backup / Disaster Recovery Best Practices

Network And Systems Administration / Security Management Group Policy Management / Automated Application Deployment

Network Access, Resource And Permissions Management

Active Directory Management

Information Security Training Sessions For Users

Identify Vulnerabilities And Potential Indicators Of Attack

Threat Mitigation / Defense Strategies And Techniques

Antivirus & Antimalware Architecture

OS Hardening / Firewall Hardening / Desktop Hardening / Web

PowerBroker Desktops / MSBSA

Intrusion Detection Monitoring And Alerting / Spiceworks / Nmap

Firewall And Network Traffic Log Monitoring And Management

IT Security Policies And Procedures – Development And Implementation

Retina CS Vulnerability Scanner / Qualys (via Web) / Tripwire Certifications:

CompTia CSA+ (Cyber Security) Certified Ethical Hacker v9 (C EHv9) Certified Hacker Forensics Investigator (CHFI) Education:

Western Governors University, Salt Lake, UT MS : Information Security Completion Date : 5/2017

South University, Savannah, GA (3.97) BS : Information Technology Security Completion Date : 12/2013 TOOLS Snapshot

Google Apps / Postini / Proofpoint (Email, TAP)

Cybereason / ServiceNow

Group Policy / PowerBroker / NetGear / Dell SomicWALL / Cisco ASA

FireEye – WebMPS 7000, MAS 4310, HX 4000, MIR

Nitro / McAfee Enterprise Security, ePO / MalwareBytes / Comodo Security / JRT / Rkill / SuperAntiSpyware / AdwCleaner

Splunk / Carbon Black / Spiceworks / ThreatGrid / PEAR

VirusTotal, Robtex, Malwr, TcpIpUtils, Securi, Comodo Link Inspector, Dr Web, Payload Security, KrebsOnSecurity, Herd Protect

Defense In Depth Paradigm (Web Proxy -> Firewall -> Network IDS/IPS -> Group Policy Mgmt -> Servers -> Host -> OS Hardening )

Frameworks : NIST 800-53r4, 800-61r2, 800-68r1, 800-122, 800-18r1, HIPAA, HITECH, PCI-DSS, FFIEC OWASP Professional Experience:

Battelle Memorial Institute Columbus, OH June 2015 – Dec 2017 IT Security Analyst II Location : Columbus, OH

Incident Response / Incident Response Plans and Revisions / Governance & Compliance / Remediation / Threat IOC Research

Conduct investigations of reported information security events and incidents

Conduct data captures from suspect systems within the corporate network.

Analyze data provided from other departments in order to determine the severity of the event and make a determination if an incident has occurred.

Coordinate investigations among the information security, information technology, and other support and research organizations.

Perform specialized analysis to support routine business functions and project/task activities.

Perform security monitoring, testing and oversight activities.

First line of defense in the detection and remediation of security violations and cyber threats.

Collaborate with security and technical teams to implement, maintain, and communicate security policies and controls.

Prioritize assigned tasks and projects based upon directives.

Monitor and assess security industry trends and assist IT and security teams to identify emerging threats and technologies. Randstad Technologies Columbus, OH Mar 2015 – June 2015 IT Security Analyst (CTH) Client : Battelle Location : Columbus, OH

Conduct investigations of reported information security events and incidents.

Conduct data captures from suspect systems within the corporate network.

Analyze data provided from other departments in order to determine the severity of the event and make a determination if an incident has occurred.

Coordinate investigations among the information security, information technology, and other support and research organizations.

Perform specialized analysis to support routine business functions and project/task activities.

Multi-Task

Task Prioritization

Quick Utilization Of Multiple Systems

Proactive Incident Triage & Response

FireEye – WebMPS 7000, MAS 4310, HX 4000, MIR

Nitro / McAfee Enterprise Security, ePO

ServiceNow

Delaware General Health District Delaware, OH Apr 2006 – Mar 2015 IT Specialist II

Develop and execute schedules for testing & agency wide installation of software

Review and evaluate systems and systems documentation, test results and security impact on network infrastructure

Work with agency managers & supervisors to provide hardware, software & other needed technical resources

Security advisor to managers on all workplace matters of software, hardware and network

Develop hardware & software requests & project proposals

Develop agency wide information security awareness training (annual presentation)

Develop agency wide information security policies

Develop agency wide network user policies

Engage weekly vulnerability assessment scans, reporting and remediation

Engage weekly intrusion detection scans, reporting and remediation

Engage daily network inventory, health, and bandwidth scans, reporting and remediation

Engage daily aggregation of Security Information Event Management software for prioritized reporting and remediation

Develop and execute network intrusion exercises, analyze results and improve relevant policies, standards and procedures

Contemplate potential threats, known and unknown, and strategize threat defense paradigms

Project management – manage multiple projects simultaneously and manage multiple vendors simultaneously

Develop disaster recovery policies, procedures and standards.

Develop and execute disaster recovery exercises, analyze results and improve relevant policies, standards and procedures

Develop and execute vulnerability and hacking exercises, analyze results and improve relevant policies, standards and procedures

Develop and execute exercises of intrusions and security compromises caused by users, analyze results and improve procedures

Research, document, execute and revise best practices of intrusion detection, network administration, active directory management

Use of Group Policy to strengthen security of Domain and Domain Workstations (Group Policy Management)

Project, Human and Resource Management, Coordination, Implementation, and After Action Analysis

Assist in providing technical security advice in decision making processes

Secure network infrastructure from advanced persistent threats (APT), most notably CryptoLocker and its variants, as well as potential zero-day threats.

Consult with fiscal director on special projects (VPN, Security Enhancements, Document Digitization, etc.)

Submission of Security Bulletins / Emails / HealthENews Articles educating users on security and proactive computer protection

(workplace and home).

Majority Contributor to HealthENews MIS Articles.

Implement wireless internet backup failover protection should primary internet access fail.

Serve as Information Security Specialist / Information Security Advisor

Vendor Relationship Management

Spiceworks - Help Desk / Hardware Inventory / Software Inventory / Network Scanning / Intrusion Detection

Membership in various SpiceCorps Groups (OH, IN, TX) and related forums (Networking/Security/Best Practices / Remote Access/MS Windows/Microsoft/Spiceworks/MalwareBytes/VMware

Fiscal Budgeting Via AccuFund - Spreadsheets : Importing and Formula Validation, Generate Reports

Note – Much automation exists via my custom reports users can execute without assistance. Southwestern College of Business Dayton, OH Apr 2001 – July 2005 Instructor, Applied Business & Computer Applications

Develop new training and certification methodologies and new curriculum development.

Operate, update, maintain and manage computer labs.

Provide classroom instruction, grading, exams assessment, and motivation to 50 students (minimum) per quarter.

Analyzed, reviewed and implemented various textbooks for professional review and curriculum development. Education &Certification:

Western Governors Univ., Salt Lake City, UT Master, Information Security Completion Date : 05/2017

South University, Savannah, GA Major : Info. Technology (Security) Completion Date : 12/2013

Wilberforce University, Wilberforce, OH Major : Computer Science. Dates Attended : 08/1985 - 05/1989

Microsoft Office User Specialist (MOUS) - Access 2007 Expert

Microsoft Office User Specialist (MOUS) - Access 97, 2000 Expert

Microsoft Office User Specialist (MOUS) - Excel 97, 2000 Expert

Microsoft Office User Specialist (MOUS) - PowerPoint 97, 2000 Expert

Microsoft Office User Specialist (MOUS) - Word 97, 2000 Expert

Microsoft Office User Specialist (MOUS) - M A S T E R

Certified Master Instructor - MS Office 97, 2000 Honors / Associations / Organizations:

Certified Ethical Hacker v9 (C EHv9)

Certified Hacker Forensics Investigator (CHFI)

National Technical Honor Society

National Society of Collegiate Scholars

Association for Computing Machinery

Central Ohio VMUG

SpiceCorps Groups – OH, IN, TX

Spiceworks Forum Groups – Networking, Security, Best Practices, Remote Access, MS Windows, MalwareBytes TERRELL BOWDEN

2082 Stringtown Rd Unit #1406 Grove City, OH 43123 614-***-**** (cell) ac32qw@r.postjobfree.com http://www.beyond.com/Terrell-Bowden

Why I Am Best Suited For This Position?

Actively Seeking Relocation, A Fresh Environment And A Progressively Challenging Career

Committed To Getting The Job Done Right, The First Time

Able To Work With Very Little Supervision

Goal-Oriented, Creativity-Driven, Success-Hungry, Teamship-Motivated, Legacy-Inspired What About Me Separates Me From The Other Candidates ?

A Focus On Success

I Don’t Just Serve In A Particular Position, I OWN It

Desire For Complex Continuous Training, Development And Support

Commitment To Being The Best, The Guru, The Expert, The "Go To" Guy

An Avid Thinker, A Proactive Planner And Thinker, An Amazing Analytical Mind

Finish Every Day (Work Life / Home Duties) On A High Note !

GPA - 3.97

Cleveland Indians & Cleveland Browns Fan (yes, I hear the laughs) What Are The Core Values Of My Work Ethic?

Honor, Duty, Sacrifice, Faith, Courteous

Teamwork, Network Socially, Leadership, Responsive, Respect, Positive Progression

Commitment, Honesty, Efficiency, Success, FUN

Confidentiality, Integrity, Availability, Accountability, Authenticity What Could I Say About Me That Is Not On This Resume?

Proven success in user training and support, technical maintenance, and troubleshooting.

Strong practical and theoretical foundation in improving customer service.

Profound motivational and communication skills, written and verbal.

Excellent management, interpersonal, problem-solving and analytical skills and experience.

Dynamic familiarity with relating to and servicing a variety of clientele. My Work Authorization Status?

U. S. Citizen

My Desired Salary?

$70,500 - $85,500 per annum

Where Do I See Myself Five Years From The Hire Date

Supervisory Position, Preferably As Lead Senior Security Specialist Of A Team Or First / Second Level Manager Of A Security Division

Achieve Graduate Level (Master’s) Degree

Still Learning At Information Technology Conferences & Preparing PhD Path Pursuit



Contact this candidate