Sign in

Information Security Information Technlogy Desktop Engineer

Columbus, Ohio, United States
August 16, 2018

Contact this candidate



**** ********** ** **** **** Grove City, OH 43123 614-***-**** (cell) Objective

To obtain a position as an Information Security professional/manager utilizing diverse background and skills in managing, planning, implementing, and monitoring information systems, infrastructure networks and help desk environments and their security measures. Professional Summary:

15 years’ experience in Information Technology.

6 years’ experience in Information Security

3 years’ experience Incident Response

Built Information Security paradigm BEFORE certifications

Certified Master Instructor (MS Office)

Project Management And Budgeting

Infrastructure Support / IT Support / Help Desk

Information Security Best Practices

Computer Networking, System Security

Vulnerability Analysis, Assessment And Identification

Project, Human, and Resource Management

Vendor Relationship Management / Communication Skills

Backup / Disaster Recovery Best Practices

Network And Systems Administration / Security Management

Group Policy Management / Automated Application Deployment

Network Access, Resource And Permissions Management

Active Directory Management

Information Security Training Sessions For Users

Identify Vulnerabilities And Potential Indicators Of Attack

Threat Mitigation / Defense Strategies And Techniques

Antivirus & Antimalware Architecture

OS Hardening / Firewall Hardening / Desktop Hardening / Web

PowerBroker Desktops / MSBSA

Intrusion Detection Monitoring And Alerting / Spiceworks / Nmap

Firewall And Network Traffic Log Monitoring And Management

IT Security Policies And Procedures – Development And Implementation

Retina CS Vulnerability Scanner / Qualys (via Web) / Tripwire Certifications:

CompTia CSA+ (Cyber Security) Certified Ethical Hacker v9 (C EHv9) Certified Hacker Forensics Investigator (CHFI) Education:

Western Governors University, Salt Lake, UT M.S. -Information Security Completed : 05/2017

South University, Savannah, GA (3.97) B.S. - Information Technology Security Completed : 12/2013 TOOLS Snapshot

Google Apps / Postini / Proofpoint (Email, TAP)

Cybereason / ServiceNow

Group Policy / PowerBroker / NetGear / Dell SomicWALL / Cisco ASA

FireEye – WebMPS 7000, MAS 4310, HX 4000, MIR

Nitro / McAfee Enterprise Security, ePO / MalwareBytes (MB) / Comodo Security / JRT / Rkill / SuperAntiSpyware (SAS) / AdwCleaner

Splunk / Carbon Black / Spiceworks / ThreatGrid / PEAR

VirusTotal, Robtex, Malwr, TcpIpUtils, Securi, Comodo Link Inspector, Dr Web, Payload Security, KrebsOnSecurity, Herd Protect

Defense In Depth Paradigm (Web Proxy -> Firewall -> Network IDS/IPS -> Group Policy Mgmt -> Servers -> Host -> OS Hardening )

Frameworks : NIST 800-53r4, 800-61r2, 800-68r1, 800-122, 800-18r1, HIPAA, HITECH, PCI-DSS, FFIEC OWASP Professional Experience:

NTT Data, Inc. Rockland, MA Apr 2018 – August 2018 IT Security Engineer - CONSULTANT Client : HealthEdge Location : Powell, OH

Project Management – Execute Successful Deployment Of Sophos AV Across Heterogeneous Environments (Windows Server, Linux Server)


Assemble Project Team – Information Security Peers, Network Infrastructure, Expert Sophos AV Representative

Develop A Plan Of Action For Successful Deployment

Leverage Talents Of Pertinent Internal Resources

Maintain Constant Progressive Communication And Reporting With Expert Sophos AV Representative (Peter S.)

Coordinate And Guide The Project From Ohio While Peter S. Does The Same From Massachusetts

Implement Mitigation Efforts To Prevent Resource Utilization Spikes Discovered On Previous Deployments

Implement Strategy Along With Peter S. To Assure Smooth Successful Deployment Without ANY Adverse Impact

Build SVMs (Protect WIN Servers – 2000+), Build Cache Servers (Protect Linux Severs – 2000+)

Sophos Anti-Virus, Salesforce, OKTA (SSO – POC)

Implement and supports information risk management initiatives throughout company

Works with vendors, outside partners, customers and other third parties to address information risk and security-related issues. Battelle Columbus, OH June 2015 – Nov 2017

IT Security Analyst II Location : Columbus, OH

Incident Response / Incident Response Plans and Revisions / Governance & Compliance / Remediation / Threat IOC Research

Identify Indicators of Compromise (IOCs) and integrate those into sensors and SIEMs (Splunk, FireEye, Carbon Black, Palo Alto, ThreatGrid)

Conduct investigations of reported information security events and incidents (Splunk, FireEye, Carbon Black, Palo Alto, ThreatGrid)

Conduct data captures from suspect systems within the corporate network (FireEye, Palo Alto, Snipping Tool)

Analyze data provided from other departments in order to determine the severity of the event and make a determination if an incident has occurred (PEAR, CB, UrlQuery, Robtex, VirusTotal, ThreatGrid, FireEye, SAS, AdwCleaner)

Coordinate investigations among the information security, information technology, and other support and research organizations.

Perform specialized analysis to support routine business functions and project/task activities (PEAR, CB, UrlQuery, Robtex, VirusTotal)

Perform security monitoring, testing and oversight activities (PEAR, Splunk, Palo Alto, McAfee ePO)

First line of defense in the detection and remediation of security violations and cyber threats (Splunk, CB, JRT, Rkill, RogueKiller, SAS, Securi, MB)

Collaborate with security and technical teams to implement, maintain, and communicate security policies and controls.

Triage alerts to identify malicious actors on customer networks / Prioritize assigned tasks and projects based upon directives.

Monitor and assess security industry trends and assist various IT and cyber security teams to identify emerging threats and technologies. Randstad Technologies Columbus, OH Mar 2015 – June 2015 IT Security Analyst – CONSULTANT Client : Battelle Location : Columbus, OH

Conduct investigations of reported information security events and incidents.

Conduct data captures from suspect systems within the corporate network.

Analyze data provided from other departments in order to determine the severity of the event and make a determination if an incident has occurred.

Coordinate investigations among the information security, information technology, and other support and research organizations.

Perform specialized analysis to support routine business functions and project/task activities.

Multi-Task / Task Prioritization

Quick Utilization Of Multiple Systems

Proactive Incident Triage & Response

FireEye – WebMPS 7000, MAS 4310, HX 4000, MIR

Nitro / McAfee Enterprise Security, ePO


Delaware County Health District Delaware, OH Apr 2006 – Mar 2015 IT Specialist II

NEW Migration of local host email to Google Apps Enterprise - Complete with Postini (Email Spam Filter) and Web Office Apps (i.e. MS Office)

NEW Help Desk Software (Spiceworks), Wireless Internet Access And Vulnerability Scanning Projects - Developed, Managed, Implemented

Developed Information Security Paradigm From The Ground Up (Network Assessment / Checklists / Info Sec Policies, Procedures, Training)

NEW (PBX To) VOIP Phones Project (Shoretel) AND MalwareBytes Console Project - Developed, Managed, Implemented, Maintained

Vendor Relationship Management

Use of Group Policy to strengthen security of Domain and Domain Workstations (Group Policy Management)

Project, Human and Resource Management, Coordination, Implementation, and After Action Analysis

Develop and execute schedules for testing & agency wide installation of software

Review and evaluate systems and systems documentation, test results and security impact on network infrastructure

Work with agency managers & supervisors to provide hardware, software & other needed technical resources

Security advisor to managers on all workplace matters of software, hardware and network

Develop hardware & software requests & project proposals

Research, evaluate, document, recommend software, applications, utilities, hardware, peripherals, tablets, mobile devices for possible implementation within current infrastructure

Develop agency wide information security policies and network user policies (adopted and implemented)

Develop agency wide information security awareness training (annual presentation) complete with QUIZ

Engage weekly vulnerability assessment scans, reporting and remediation

Engage weekly intrusion detection scans, reporting and remediation

Engage daily network inventory, health, and bandwidth scans, reporting and remediation

Engage daily aggregation of Security Information Event Management software for prioritized reporting and remediation

Contemplate potential threats, known and unknown, and strategize threat defense paradigms

Project management – manage multiple projects simultaneously and manage multiple vendors simultaneously

Develop disaster recovery policies, procedures and standards.

Develop and execute disaster recovery exercises, analyze results and improve relevant policies, standards and procedures

Develop and execute vulnerability and hacking exercises, analyze results and improve relevant policies, standards and procedures

Develop and execute exercises of intrusions and security compromises caused by users, analyze results and improve procedures

Research, document, execute and revise best practices of intrusion detection, network administration, active directory management

Assist in providing technical security advice in decision making processes

Secure network infrastructure from advanced persistent threats (APT), most notably CryptoLocker and its variants, as well as potential zero-day threats.

Consult with fiscal director on special projects (VPN, Security Enhancements, Document Digitization, etc.)

Submission of Security Bulletins / Emails / HealthENews Articles educating users on security and proactive workplace computer protection.

Majority Contributor to HealthENews MIS Articles. Serve as Information Security Specialist / Information Security Advisor

Implement wireless internet backup failover protection should primary internet access fail.

Spiceworks - Help Desk / Hardware Inventory / Software Inventory / Network Scanning / Intrusion Detection

Membership in various SpiceCorps Groups (OH, IN, TX) and related forums (Networking/Security / Best Practices / Remote Access / MS Windows/MS Office / Windows Server 2008, 2012 R2, Server 2010 / Spiceworks/MalwareBytes/VMware

Fiscal Budgeting Via AccuFund - Spreadsheets : Importing and Formula Validation, Generate Reports

Note – Much automation exists via my custom reports users can execute without assistance. Total Infrastructure Computer Replacement Project (NEW Policy Inspiration - Developed, Adopted, And Implemented) Manage the project from its inception, purchased the necessary hardware (computer workstation package including mouse, keyboard and speakers, and widescreen monitor), enlisted vendor services to assist with installing new computers throughout infrastructure, used a staggered method of transition, one unit at a time, providing advanced 3 day notice with instructions taped on the monitor on what the user can successfully complete prior to new workstation replacement. Developed (and proposed) NEW asset identification model. ALSO, skills to repair computers, laptops, printers, install/configure software, MS Office, Anti-virus, Anti-malware installs, maintain wireless network. The Architect

Adaptability Consulting Results Orientation Business Process Knowledge Analytical Thinking

Decisiveness Strategic Thinking Knowledge of Emerging Technology Building Relationships

Change Advocate Business Enterprise Knowledge Information Systems Knowledge Developing Others

Strategic Technology Planning Group Session Model Continue Until Successful Lead, Mentor, Guide Southwestern College of Business Dayton, OH Apr 2001 – July 2005 Instructor, Applied Business & Computer Applications

Develop new training and certification methodologies and new curriculum development.

Operate, update, maintain and manage computer labs.

Provide classroom instruction, grading, exams assessment, and motivation to 50 students (minimum) per quarter.

Analyzed, reviewed and implemented various textbooks for professional review and curriculum development. Education &Certification:

Western Governors Univ., Salt Lake City, UT Master, Information Security Completion Date : 05/2017

South University, Savannah, GA Major : Info. Technology (Security) Completion Date : 12/2013

Wilberforce University, Wilberforce, OH Major : Computer Science. Dates Attended : 08/1985 - 05/1989

Microsoft Office User Specialist (MOUS) - Access 2007 Expert

Microsoft Office User Specialist (MOUS) - Access 97, 2000 Expert

Microsoft Office User Specialist (MOUS) - Excel 97, 2000 Expert

Microsoft Office User Specialist (MOUS) - PowerPoint 97, 2000 Expert

Microsoft Office User Specialist (MOUS) - Word 97, 2000 Expert

Microsoft Office User Specialist (MOUS) - M A S T E R

Certified Master Instructor - MS Office 97, 2000 Honors / Associations / Organizations:

Certified Ethical Hacker v9 (C EHv9)

Certified Hacker Forensics Investigator (CHFI)

National Technical Honor Society

National Society of Collegiate Scholars

Association for Computing Machinery

Central Ohio VMUG

SpiceCorps Groups – OH, IN, TX

Spiceworks Forum Groups – Networking, Security, Best Practices, Remote Access, MS Windows, MalwareBytes TERRELL BOWDEN

2082 Stringtown Rd Unit #1406 Grove City, OH 43123 614-***-**** (cell) Why I Am Best Suited For This Position?

Actively Seeking Relocation, A Fresh Environment And A Progressively Challenging Career

Committed To Getting The Job Done Right, The First Time

Able To Work With Very Little Supervision

Goal-Oriented, Creativity-Driven, Success-Hungry, Teamship-Motivated, Legacy-Inspired

I am a friendly teamship, positive morale energy boosting, and awesome work culture type of contributing asset What About Me Separates Me From The Other Candidates ?

A Focus On Success

I Don’t Just Serve In A Particular Position, I OWN It

Desire For Complex Continuous Training, Development And Support

Commitment To Being The Best, The Guru, The Expert, The "Go To" Guy

An Avid Thinker, A Proactive Planner And Thinker, An Amazing Analytical Mind

Finish Every Day (Work Life / Home Duties) On A High Note ! (i.e. GPA - 3.97)

Cleveland Indians & Cleveland Browns Fan (yes, I hear the laughs) What Are The Core Values Of My Work Ethic?

Honor, Duty, Sacrifice, Faith, Courteous

Teamwork, Network Socially, Leadership, Responsive, Respect, Positive Progression

Commitment, Honesty, Efficiency, Success, FUN

Confidentiality, Integrity, Availability, Accountability, Authenticity What Could I Say About Me That Is Not On This Resume?

Proven success in user training and support, technical maintenance, and troubleshooting.

Strong practical and theoretical foundation in improving customer service.

Profound motivational and communication skills, written and verbal.

Excellent management, interpersonal, problem-solving and analytical skills and experience.

Dynamic familiarity with relating to and servicing a variety of clientele. My Work Authorization Status?

U. S. Citizen

My Desired Salary?

$65,500 - $95,500 per annum

Where Do I See Myself Five Years From The Hire Date

Supervisory Position, Preferably As Lead Senior Security Specialist Of A Team Or First / Second Level Manager Of An IT Security Team / Help Desk Lead or Manager / IT Support Lead or Manager / Engineer

Achieve Graduate Level (Master’s) Management Degree / Preparing PhD Path Pursuit

Learning At Information Technology Conferences / Certifications - Project+, CASP, GCIH, GSEC, GMON, CISM

Watching Cleveland Browns AND Cleveland Indians Winning The Championship Plus Celebration Parade!

Contact this candidate