McCalister A. Nicholas
**** ******** **.,****** *****, MD 20747
Cellular Phone 301-***-****
**********.********@*****.***
Secret Clearance
PROFESSIONAL OBJECTIVE
To obtain employment with a company which will allow me to utilize my education and craft solutions to challenging problems related to Cyber Security.
EDUCATION
Morgan State University - Bachelors of Science in Information Science & Systems
Graduation Date: May 2006
CompTia Security+ Oracle Certified Administrator (11g) SQL 11g Certified
Technical Skills
Have strong cybersecurity background. Strong technical writing, presentation and communication skills. Strong technical experience and knowledge that includes: patch maintenance, repair, upgrades and configuration of hardware, software and operating systems in an inter-networked environment.
Proficient knowledge of Windows 7, Windows 10, Linux, Active Directory, Security Information and Event Management (SIEM), Cyber Attacks, threats and vulnerabilities, NIST guidelines.
Ability to work under pressure to meet deadlines. Ability to solve difficult problems submitted by customers that requires problem solving skills. Ability to research problems independently. Excellent customer service, communication, and analytical skills. Ability to support high call volume. Ability to interact and work with staff at all levels and handle multiple tasks in a fast paced environment. Ability to communicate complex technical and programmatic information. Ability to work with a team in a diverse environment.
PROFESSIONAL EXPERIENCE
Evolver Inc. Alexandria, VA
Cyber Security Operation Engineer October2014 – Present
Responsible for the confidentiality, integrity and availability of systems information. Implement and maintained access controls on the system such as, account management, account creations, account locks and account terminations. Managed user’s accounts using Active Directory. Implemented solutions with PKI-controlled access. Troubleshoot customer PKI issues. Responsible for maintaining and testing PKI middleware and certificate validation software for user workstations and any software required for Common Access Card (CAC) Personal Identification Number (PIN) Reset. Monitored Network Intrusion Detection (Snort) system. Continuous Monitoring and Network Analysis using both HBSS and Splunk (SIEM). Ran security assessments and audits. Maintained equipment and activity log. Ensured all files and media are checked for viruses and malicious activity. Protected all media used on the system by properly classifying, labeling, controlling, transmitting and destroying. Responsible for evaluating all information systems and meeting the National Industrial Security Program (NISP) security requirements. Reviewed and updated security policies and security operation procedures (SOP). Performed incident response and handling in accordance with NIST Special Publication 800-61. A strong technical background in guiding policy makers and interpreting existing policy in accordance with Agency objectives. Knowledge of security controls and how to create appropriate documentation of system security postures using them. Monitor multiple advanced cyber technologies to identify, investigate, isolate, eradicate and report potential threat activity or threat actors from exploiting IT assets. Research security trends, new methods and techniques used in unauthorized access of data in order to preemptively eliminate the possibility of system breaches. Ability to quickly identify cyber security breaches and provide the most adequate solution.
Evolver Inc. Alexandria, VA
System Engineer / DBA March 2010 – September2014
Analyzes system requirements and concept of operations documents, acquisition plans, and system descriptions to develop evaluation and test plans and procedures, prepare for and conduct the data collection and analysis, and report status and results. Supports the development of Government test and evaluation documentation e.g., Test & Evaluation (T&E) Strategy, Test Readiness Assessments, and T&E Reports for US Patent & Trademark Office. Reviews and validates baseline security configurations for operating systems, applications, and networking and telecommunications equipment. Work with other test organizations to support T&E program integration. Performed Laptop analysis on newly purchased equipment to ensure all laptops and installed software are patched, compatible and secure from and threats and vulnerabilities before deploying to users. Understanding of smart card technology and tested on systems to ensure proper functioning without any security holes. Write security plans and procedures (writing and revising security plans, procedures/instructions, fixed facility checklists, SOP and information security plans and procedures as needed). Attended meeting and worked with IT department and members of the information security team to develop strategies and plans to enforce security requirements and address identified risks. Assist in the coordination and completion of information security standards, process and procedure. Participate in evaluation of final results of applied research and development projects. Meet with Hewlett-Packard (HP) representatives to discuss products and new software. Write, review and edit replies to Request for Proposals (RFP) in accordance with client specifications. Upgraded and migrated databases from 10g to 11gR2 with minimum downtime. Installation, configuration and maintenance of Physical Standby using Oracle Data Guard for Disaster recovery process on Oracle 10g, 11g. Perform physical and logical designing of the database, which includes the distribution of data-files on different disks. Serve as Government’s technical advisor on the preparation and successful completion of development test programs.
Hire Strategy – McKinsey & Company, Inc. Washington, D.C.
Desktop Support October 2007 –March 2010
Provided technical support for Windows Operating System and applications for system users. Answered, evaluated and prioritized incoming telephone, voice mail, email and in-person requests for assistance from users experiencing problems with hardware, software, networking, and other computer-related or audio visual technologies. Coordinated and provides technical training for system users. Installed and modified personal computer and network hardware and software. Responsible for updating and documenting desktop and laptop images. Installed and configured hardware. Installed and configured Operating Systems and applications. Documented system changes, issues and resolutions. Maintained all equipment inventory log sheets. Monitored network and resolved problems directly or as needed coordinated with the appropriate technician, consultant or vendor for prompt response and resolution. Provided excellent customer service to all levels of McKinsey & Company staff members. Managed and technically supported Blackberry devices, telephone and fax equipment and network printers. Managed AV equipment for conference rooms and HD Video Conference calls to assure that equipment is properly configured and operational at all times