Resume

Sign in

Active Directory Management

Location:
Columbia, South Carolina, United States
Salary:
125,000
Posted:
February 23, 2018

Contact this candidate

Resume:

Nicholas E Vigneur

Leader / Information Security Specialist

CLEARANCE: Current: (TS/SCI with C.I. Poly)

EDUCATION:

Liberty University (2014 – 2017)

BS, Science, General Studies. (In Progress)

CURRENT IT CREDENTIALS:

COMPTIA A+(CE), SEC+(CE), CASP, EC COUNCIL CEH

IT Training Completed:

COMPTIA Linux +

Cisco Certified Network Associate

SCCM

Developed Skillsets

Ability to work effectively, as well as independently, in a team environment

Strong analytical skills and ability to solve complex technical problems

Strong organizational, multi-tasking, and prioritizing skills

Excellent verbal, written, and interpersonal communication skill

Experience documenting and reporting test results

7+ years of PAC2000 experience / Remedy

Strong relationship management skills

Leadership or management experience

Microsoft Visio experience

SharePoint experience

Advanced Microsoft Office (Word, Excel, Outlook, PowerPoint, Access, and Project) skills

7+ years of business systems analysis experience, business systems design experience

3 + years of experience managing Microsoft Active Directory Group Policy Objects (GPOs)

Knowledge and understanding of technology testing: software security and common commercial testing tools.

Knowledge and understanding of security solutions including: authentication and directory services, virtual private networks, application systems and public key infrastructures

Ability to organize and manage multiple priorities

Outstanding problem-solving skills

Strong negotiating skills

Working Knowledge of a wide variety of Software Network Mapping Technologies

Zen Map, Director Suite (to include Insight), ACAS, Retina, Nessus Vulnerability Tools, Solar Winds Tools, and Various other Port Sniffing Tools.

Windows Server 2008-Present, Virtual Machine ESXI, Linux, Unix.

Various Penetration Testing Suites: Kali Linux (Pen Test Tools) Programming Language of Python, Linux, UNIX and Perl. Detailed knowledge of SNORT and various Packet Sniffing tools used for Packet Analysis. Prior experience with network intrusion detection and monitoring (review Korea Section), and utilizing tools such as Retina for Analysis and Vulnerability assessments. Experienced security specialist familiar with Defense in Depth design and network topographies.

Seasoned Information Security specialist strong working knowledge of DoDI 8570 policies and RMF NIST 800.53 Rev. 4, Department of the Army AR 25-1, AR 25-2. Meet the DoDI 8570 policy requirements for IAT III and IAM II. In depth experience with various chain of custody associated with digital forensics and data analysis and procedures for performing recovery and incident response handling procedures in accordance to DoDi polices and BBB standards.

CURRENT IA AND COMPUTING ENVIRONMENT CERTIFICATIONS

CompTIA A+ CE – Core Component Information – Hardware

CompTIA S+ CE – IA Security Specialist / Network Inf. Specialist

CompTIA CASP CE – Certified Advanced Security Professional / Network Inf. Specialist

EC CEH – EC Council Certified Ethical Hacker

CONTINUING EDUCATION

Current Course Completions Pending Testing:

CompTIA Linux+,

Cisco Certified Network Associate CCNA

Microsoft Administrating and Deploying System Center 2012 Config. Manager.

Certified Information Systems Security Professional (2016)

Lean Six Sigma= Green Belt (2016)

PROFESSIONAL EXPERIENCE

Kforce – Client DCITA DOD Prime Contractor October 23, 2017 - Present

Senior Instructor – Cyber Security Speciality

Primary instructor for Power Shell for Responders and Threat Emulation.

Responsible for day to day teaching and lecturing

Responsible for technical writing and course development

Re-wrote the Threat Emulation using the accepted model for cyber threat training.

Developed a teaching model to teach “boot camp” style training using my own adult compressed

Learning method for Microsoft Power-shell for responders and programming methods.

Class sizes on average were 21 seasoned and formally trained cyber security experts

Recognized my upper management for my expert approach to teaching.

Apex – For Wells Fargo (18 Month Contract). August 2016 – October 26, 2017

Systems Security Engineer Level II (Apex Title)

Business System Consultant 4 – EMERGING SERVICES (100% Remote)

Business relations expert with seasoned experience in communication of various Citrix solutions to the vendor and Management teams within Wells Fargo by audio / video collaboration.

Responsible for “triaging” different request assigned to Service Management Queue and providing the discovery necessary for assignment to other Service Managers; providing Citrix solution designation.

Works with client to establish and maintain a consistent test methodology and to resolve questions during the testing process

Leads testing discussions with partners to resolve testing challenges and provide solutions to complex test problems.

Consults, in an analytical capacity, to gather and document detailed business requirements, working with the various groups within Technology to understand and re-engineer for greater efficiencies.

Analyzes, and certifies that application-specific software and performs ambiguity reviews of business requirements and functional specification documents

Reviews the testing performed on the various Java, Internet & Intranet based Applications

Engages and works collaboratively with Product team.

Self- motivated, goal oriented and an innovative thinker

Ability to work in highly technical environments and determine potential impacts to the business

Strong technical/system administrative skills to assist with risk assessment and vulnerabilities

demonstrates strong judgment, and ability to work effectively with clients

Maintains expert analytic skills

Strong teambuilding skills in a virtual environment

Demonstrated ability to interact effectively with a variety of contacts, primarily mid to senior level professionals.

Experience with supporting the client environment for both hardware and software products.

Knowledge and understanding of virtualization technologies1+ year of information security experience

Knowledge and understanding of security policies, standards, and best practices documentation development

Excellent oral and written skills able to communicate and direct the direction of meetings and collaboration of technical details to aid in the assistance of solution engineering.

1 + years of Citrix experience

Solid conflict management and decision making skills

Designed and assisted in development of Zen Server builds and Zen Applications for remote client work.

Apex – State of South Carolina, Columbia SC

System Engineer Level II June 2016 – August 2016

Worked with Centos 6 using a Snort Application for Sensors used in Network Intrusion Detection. Used by the state of South Carolina as part of their threat analysis. This was a short-term transition position.

Developed Compliance Artifacts for Century Link to meet state policies

Provide day to day solution engineering

Working with Nessus and Security Suite tools as part of Unified threat management

Assisted in the development of the SCCM client used for software management

Assisted with SCAP scans utilizing IBM “Big Fish” to ensure the creation of POAM’s

Serve as a mentor for other engineers, teaching while doing, and provide opportunities to cross-train peers in parallel with task and project completion.

Navy NAVAIR Cyber Detachment Dec. 28, 2015 – Jun. 2016

Information Technology (I.T.) Management Cyber Specialist - DS-2210-05

Assisted in developing programs that will mitigate network intrusions on integrated system platforms, such as aircrafts, weapons systems, and various other network-based Operating Systems.

Provide subject matter expertise in the areas of 802.11x wireless, AAA, TACACS, RADIUS, and 802.1x Network Admission Control (NAC).

Serve as a network security subject matter expert on cross-organizational project teams focused on implementing technology solutions across a diverse global enterprise environment.

Create comprehensive engineering documentation including functional requirements, design proposals, network diagrams, workflow diagrams, application communications diagrams, configuration documents, support documentation, training materials, and project documents.

Manage and maintain network security systems throughout the technology lifecycle.

Assisted in creating policies and guidelines governed by the DoDI 8570 and the newly updated NIST 800.53 in the ongoing effort to convert DON to RMF (Risk Management Framework)

Developed strategies for Navy Wide implementation in cyber security response and developed testing and engineering solutions at a software and hardware level.

Developed training programs for new Intern’s attending college graduate programs in Computer Sciences.

Utilized a SCAP scan software such as IBM “Big Fish”

3+ years of MS Active Directory experience

Knowledge and understanding of technology support: troubleshooting technology issues with software applications

Worked with the design and implementation of a thin client environment used for Penetration testing.

Rivera Group, Inc. Oct. 09,2015 – Dec. 28, 2015

Information Assurance System Engineer

Oversaw the conversion for DOD agencies in process from the old DIACAP requirements to the new Risk Management Framework (RMF) Model.

Information System Security Officer Level II (ISSO).

As a member of a team, I helped to design the Information Assurance policies and controls under the Risk Management Framework Concept.

Extensive research and development was necessary to meet customer needs for IT services

I was a member of the Oversight review team which ensured CIA (Confidentiality, Integrity, and Authentication) was met after implementation of IA controls.

Required knowledge of IT network infrastructure need for technical writing.

Verbal skills required to teach employees necessary IA standards.

Provided consulting services for ESXi (Virtual Machine) Active Directory and DNS Configurations for various networks within the Army’s network architectures.

Evaluating the adequacy and effectiveness of policies, procedures, processes, initiatives, product and internal controls

Desktop Support Tier 1 (Contractor)

(Wounded Warrior) Security Hill-JBSA Feb. 2015 – Sept. 2015

Provided Customer Technical Desktop support

Troubleshooting Printer, Server, PC – Windows 7

System Administration / Xen Application (Desktop)

Trusted Agent /Server Admin. Microsoft Server R2 2008

Worked inside MPLS Structured Enterprise Services

Top Secret System Administration

JWICS System Administration

Information Assurance Officer

Network Administration and Management

Power Shell / Command Line

Hardware / Software PC Install and Upgrade Experience over 10 Years.

Helped Maintain SCCM Client utilizing remedy ticketing system to push software

Systems Support Technical Specialist Mar. 2014 – Aug. 2015

Army North (Wounded Warrior) - Patient Status

Served as an IT Specialist for a diverse technical environment including:

VSphere, Data Analysis, Information Assurance, network infrastructure redesign, desktop troubleshooting (touch labor), software/hardware upgrades.

Worked inside mobile surveillance and reconnaissance vehicles that maintain multiple tools needed to perform analysis and surveillance. Tasks included the development and management of virtual machines, virtual machine servers, switches and network devices.

Provided over 12 years of Information Technology consulting to senior executives, providing modernization of I.T. solutions. Designed and implemented a wide variety of servers/systems roles.

Provided “in depth” infrastructure design by assisting in implementing XenServer with the utilization of Physical IP Machines. Each Station was setup with three small Node Devices. Each XenApp Desktop supported Unclassified, Classified and JWICS Desktop services for Analysts to perform their job. This system was managed and configured to meet DOD requirements on a day to day basis.

Helped establish a working thin client environment for mobile analyst work center. Utilizing a Zen client server software architecture.

Army IT NOC MANAGER (Broad Roles w/ Min. Qual. Personnel) Aug. 2012 – Mar.2014

Server Farm Northern Node of Fiber Ring/Network Administration

Maintained, supported, upgraded and integrated over 10 million dollars in Government IT equipment including Rack Mounted Servers, Power Management, Brocade and Cisco (Version 12.0 and higher) routers. All work in the field and back in the offices where all virtual machines ran on XenApp Servers (v6.5). Developed, managed, and trained 25 Soldiers in IT skills at multiple levels. Managed and maintained multiple diverse types of Top Secret IT equipment. Successfully upgraded a wide variety of services and provided an inventory of lost equipment totaling over six million dollars.

Integrated XenApp/Xen Desktop – configured Access Gateway and Web Interface (5.0, 5.1) creating the interface in the XenApp or Xen Desktop server farm for secure ticket authority. This interface allowed the server authority to use the same server from either Xen Desktop or Desktop Delivery controller. This Software was implemented through various AS networks, supporting over 8900 users within our area of control, and supporting many other locations as well. Software was used for management of the servers’ services for various onsite and offsite locations, including support from upper System Administration from Hawaii. These Servers were associated within the fiber ring that supports Asian/US diplomatic services as part of the SOFA agreement. This Fiber Ring supported IT infrastructure by facilities located out of California permitting upper Divisional Server Management.

If the server farms were in different domains, a two-way trust was established between the multiple domains within the US/Korea networks.

Network Administrator

RSA Token holder, responsible for upgrading, managing, supporting, and integrating as a technical expert with various network issues including outages, data traffic management (watching how resources are routed), and ensuring that outages were managed 24/7 every week.

Served as a member of a team that upgraded the network.

Provided technical scripting for both Cisco and Brocade devices.

Touch labor that required a technician to run cables (both fiber and cat 6e), install switches/routers, and remove unauthorized devices, port tracing, and basic trouble shooting on a variety of users internal and municipal networks.

Server Administrator

Provided hands-on support by managing various servers, to include Microsoft Server 2008 R2, Active Directory (Creating User’s accounts), Disabling/enabling, provisioning users for network access.

Provided technical expertise in the upgrading process of over 200 Servers to Virtual Machines (Xen Server) running on Dell blade servers in our Northern Node facility.

Provided enterprise services utilizing all aspects of cloud-based tools to provide security and management. Utilizing such tools as DFS, Outlook Server, and various Domain Servers with a wide variety of uses.

Modernization project (Migrating single (one machine) servers to Virtual Machine environment) managing STIG requirements, Server Patches (Software updates), and Domain Controller design for use in a Domain tree (Server/Client). Provided services for the network resulting in greater security and faster services for users on the network and for migration of data and the utilizations of servers.

Information Assurance Manager Level II (IAMII)

Provided cyber security response by developing an internal, defense in-depth (DID) network hardening leading to greater compliance of systems and users. I also implemented a daily tracking system which I briefed to the executive management on a weekly basis. Making management aware of the overall violations across the network resulted in developing policies (and greater accountability of management) that enforced users who had access to the network (both Local Nationals and U.S personnel) to be more aware that they are being monitored and held accountable for their actions.

Determined the vulnerability of servers using Retina/Hercules from an IA perspective. Integrated Citrix Servers due to its compatibility, managed SAN storage, and loaded interfaces for server administrations. These interfaces included XenServer and XenApp.

These simple procedures also led to the proper management of vulnerabilities and the greater awareness of System Administrators to implementation Group Polices and the patching of a wide variety of servers/systems; these servers consisted of Citrix XenServer and VM Servers. Examples of this included the improper use of devices connected to the system (I.E. Cell phones plugged into the network which would attempt to update to servers in China and Russia).

The proper management Category I, II, II, IV violations provided immediate incident response and the introduction of (Host Intrusion Systems) which provided instant responses on a 24-hour basis. These actions included the disabling/re-enabling of user’s accounts and a requirement (based on violations, to explain to management and get approval to get back on the network) Port blocking at a level 2 of the network, server/client vulnerability daily assessments.

Utilizing IA tools such as Retina led to quicker responses by unit level Server Administrators to act quickly to resolve server vulnerabilities, knowing that their devices could be removed from the network, thus, correcting a known deficiency identified by the Department of Defense (DOD) Information Assurance Certification and Accreditation process (DIACAP) during the prior accreditation process. Followed the correct procedures outlined in DoDI 8570 and Army Regulation 25-1 and 25-2.

These actions and policy development resulted in 100% compliance of Defense Information System Agency (DISA) requirements. In addition, as an active member of policy development, I assisted in the development of the Continuity of Operations Program (COOP). Reviewing various back up procedures (which was a huge internal issue as everything was migrating over to Enterprise services), System Administrators corrected the procedures and the removal of Physical Servers, and Migrated to Virtual Servers (Citrix Zen Server integrating XenApp/Xen Desktop). This resulted in 100% data recovery of important systems/servers and continuity, scalability, and continuity of services to users.

System Analyst / Integrator

Utilized a wide variety of software to include Citrix, Microsoft Server 2008 R2, Retina, data analyst sniffing tools (such as Wireshark), Virtual Machine, Linux, Cobalt, Unix, Microsoft Power Shell (For baseline script design), Share Point Admin Design, Cold Fusion (HTML Injection/Design tool Java, Visual Basic, Oracle Database, SQL Server (also Client Modification for Remote Purposes), Access for Excel Databases.

Ampcus Inc. (Contractor while on Active Duty) Feb. 2011- Aug.2012

Senior System Analyst – SC National Guard Nation Wide Project

Provided IT Solutions for a Multi-Tiered Network with Explicit Deny Firewalls.

My overall purpose was to provide an end solution to the VPN Cloud design for the South Carolina National Guard (Network Operation Center) NOC. This task included detail and sensitive working knowledge of Cloud networking and the internal workings of a Major Government Entities Network. To include IGP, BGP, Load balancing of a network, and VRF lite configurations utilizing Cisco based equipment.

Provided customer service and consultation services to high ranking officials within the organization for Verizon and the SC National Guard. Implemented Group Polices and the patching of a wide variety of servers/systems.

Researched solutions on a broad spectrum of uses for a non-dynamic, non-corporate network, using new network designs and topographical information to solve a wide variety of issues regarding VPN cloud.

System Admin / Information Assurance Officer Dec. 2011 - Aug.2012

Army Various Locations – Fort Jackson, Columbia, SC

Information Assurance Management while serving at the Network Enterprise Center (NEC) Yongsan Korea.

Served for 2 consecutive terms as the IAM for all Yongsan installation for over 9000 users.

Worked with various technologies with server integration using XenApp and XenDesktop as well as various virtual technologies such as VMWare.

Managed the entire migration in the (Asia Cyber Ring) from regular servers to a virtual environment. The migration and integration went from physical servers to a virtual environment that encompassed Citrix Xen Servers, XenApp and XenDesktop applications. This gave Yongsan operations streamlined production, valiant security posture and overall performance.

Provided network security infrastructure support with emphasis on server management and vulnerability assessments.

Maintained weekly scans utilizing Retina. Managing over 200 Xen Servers over the course of my tenure with the DOD.

Provided expertise in policy and direction of the overall IT infrastructure to senior management.

Provided experienced and direct involvement in COOP planning, Server and Network migration to cloud. Enterprise security requirements directed from DOD DISA.

Served as the IAM for US Army 171st Military element, providing Information Assurance guidance to the overall organization on a day to day basis.

System Administrator/IA Officer Jan. 2011 – Dec. 2011

4th Sustainment Brigade Network Admin/System Admin- Killeen TX

Served as the System Administrator for 4th Sustainment Infantry Brigade.

Supported day to day technical support by providing repairs to over 1200 users.

Responsible for user administration and creation of new accounts.

Provided Information Assurance management for the entire organization. Provided technical expertise to include policy and project planning to higher management.

Supported combat network topography design, including installation of a wide variety of services. These services consisted of such equipment: firewalls, routers, and switches all requiring specific DOD configurations. In addition, many DOD exercises and combat networks required domain controlled environments. This was created and managed from virtual machines, created on specific government racks designed for field use. Some of the service provided included: Outlook, Active Directory, and various other server roles. Provided full Video Telephone Conferencing and Call Management services for Secret/Unclassified missions.

US ARMY Signal School Dec. 2009 -Dec. 2010

Fort Gordon, Augusta GA

US Army training for signal specific equipment

Networking – CCNA training

Basic troubleshooting A+

Linux+ Core programming

Security + Course

US Army Service entry dates to include

Combat Tour Northern Mosul Iraq Nov. 2006 - Dec. 2009

Construction Engineering Combat

Served as a carpenter

Plumbing/ Pipe Fitting

IT Technical support

Operations Combat Support

Logistics

Military movement operations

Electrical wiring rough construction

Truck Commander for multiple military projects

Project lead

Team lead- Combat Element Support

Team member for military projects/ Wartime Support Services

Enlistment as a 21K (Plumber)-(SGT-Non-Commissioned Officer)

Joined to support war efforts- boots on ground

Construction engineering

Operations Expert

Leader of Junior Soldiers

Middle Management

Combat/ Route Clearance

Communications Expert – Field

Technical advisor to upper leadership

Specialist in Combat Engineering

Cox Cable- Omaha Nebraska Sept. 2005-Nov. 2006

Expert technical support for cable services. (Detailed training for I.T. environment)

Information technology's help desk support

Provided over the phone I.T. Support

Technical writing/ Ticketing system

Visual/Audio Technical support

Skilled with difficult customer care

Public speaking



Contact this candidate