R I C O M. O L D E N, MBA
**** **** ****** *******, ** 38141 901-***-**** ********@*****.***
I N F O R M AT I O N T E C H N O L O G Y /C Y B E R S E C U R I T Y /S Y S T E M A D M I N I S T R AT I O N
Experienced Information Technology professional with over 8 years’ experience in cyber security, hardware, software and
networking technologies. Highly proficient in directing a broad range of corporate IT security initiatives which include planning,
examination, and implementation of solutions. Proven ability to provide comprehensive secured network design, systems analysis,
and full life cycle project management. Hands on experience leading all stages of system development efforts, including
requirements definition, design, architecture, testing, and support. Outstanding project and program leader; able to coordinate and
direct all phases of project based efforts.
Areas of Expertise
Cyber Security Network Intrusion Detection Systems Lost, Stolen, Asset Reporting
AD Group Policy Host Intrusion Detection Systems
Event Security Manager
Research & Development Data Integrity/Disaster Recovery
Contingency Planning
Regulatory Adherence Risk Assessment/Impact Analysis
Computer Forensics
Cost Benefits Analysis Technical Specifications Development
Technical Reporting
Professional Experience
GENERAL DYNAMICS INFORMATION TECHNOLOGY MEMPHIS, TN
Cyber Security Analyst (Internal Revenue Service), 2013 present
Conduct Security Incident Analysis, incident/intrusion source tracing, monitor and analyze network and host intrusion detection systems
to identify security threats for remediation within the IRS Computer Security Incident Response Center (CSIRC).
Monitor ArcSight event security manger to identify potential, successful, and unsuccessful intrusion attempts through incident detail and
summary information.
Utilize Symantec Enterprise Protection 11 (SEP11), Sourcefire, NetWitness and McAfee Web Gateway data sources to detect system
breaches and investigate malicious activity.
Employ RSA Archer eGRC (Enterprise, Governance, risk and compliance) to create, track and resolve security incidents for possible
compromises.
Perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent
access or destruction.
Initiate Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record
and report incidents.
Evaluate Content Filtering Recategorization Request to assess organizational risk.
Communicate alerts to agencies regarding compromises to their network infrastructure, applications and operating systems as well as
assist with implementation of counter measures or mitigating controls.
Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies,
through monitoring of vulnerability scanning devices.
Evaluate and deconstruct malware (obfuscated code) through open source and vendor tools, prepares briefing and reports of analysis and
results.
Generate end of shift reports for documentation and knowledge transfer to analyst on duty.
STATE OF TENNESSEE, DEPARTMENT OF HUMAN SERVICES MEMPHIS, TN
Information Resource Systems Specialist II, 2005 2013
Identified problems specific to an application, user, computer, or network and develop a plan to implement a solution, as well as t rained
and developed end users on the use of hardware, software, and peripherals.
Utilized Remedy Customer Relationship Management (CRM) to track and resolve incidents, inventory, and service level agreements.
Provided system administration support for LAN, WAN, VPN users; document the startup, back up, maintenance and daily operational
activities associated with software platforms.
Initiated availability reports using Crystal Reports; write technical documentation on the installation procedures for software or hardware
products such as Windows XP, Vista and Windows 7.
R I C O M. O L D E N, MBA
Phone: 901-***-**** Page 2
Lead specialists in the administration of systems security and assured that technological changes were integrated into the department’s
Active Directory environment, accounting for existing work functions and minimal system impact.
Added, deleted, and modified users’ rights in Active Directory, Citrix and Outlook.
Utilized Symantec Ghost as a disaster recovery plan when software failures occurred on the system; transferred data files, systems files,
and applications programs to transportable media.
Lead multiple team projects including the migration from Novell to Active Directory and from GroupWise to Outlook.
Delegated project work planning and work assignment to project team; estimated time required to complete projects and prepared
deadlines accordingly.
Anticipate and informed, or responded to management on scheduling and policy concerns that impacted development or implementation
of proposed systems; provided technical and logical support during the migration of a project.
Handled digital evidence from seized digital media including computers, PDA’s, flash or thumb drives, and other digital media to recover
deleted, erased, hidden, and encrypted data for investigation.
Conducted thorough and effective computer/digital investigations such as property theft, cyber security, malware removal techniques,
incident response, compliance auditing and responding to e Discovery requests using EnCase Forensics software.
Coordinated with internal investigations unit in the development of evidence collection methods and processes that supported the need to
detect and respond to unauthorized or unintentional activities.
Technical Proficiencies
Platforms: UNIX, Windows/XP/Vista/7, Linux, Mac OS, VMware Fusion, Novell
Networking: TCP/IP, Ethernet, VPN, LAN, RSA SecureID, SAS, SAN
Languages: UNIX Shell Scripting, SSH, JavaScript, Power Shell
Tools: LAN Manager, Symantec Ghost, McAfee Virus Protection Utilities, Enterprise Portals, Snort, Microsoft Office Suite (Word,
Excel, PowerPoint, Access, Project, Exchange, Outlook, FrontPage), SQL, Symantec Brightmail, Sourcefire, NetWitness, Citrix
Administration, Active Directory, Remedy Asset and Change Management, VoIP phone systems, Cisco
Jabber, local and remote video conferencing hardware and software solutions
Professional Development & Training
EnCase® v6 Computer Forensics I (Completed August 2007)
EnCase® v6 Computer Forensics II (Completed April 2008)
Computer and Enterprise Investigations (Completed May 2010)
CompTia Security + (In progress)
Education
Bethel university
Master of Business Administration, Management
University of tennessee
Bachelor of Science, Management Information Systems