Post Job Free

Resume

Sign in

Security Project

Location:
Memphis, TN
Posted:
November 15, 2013

Contact this candidate

Resume:

R I C O M. O L D E N, MBA

**** **** ****** *******, ** 38141 901-***-**** aca0cq@r.postjobfree.com

I N F O R M AT I O N T E C H N O L O G Y /C Y B E R S E C U R I T Y /S Y S T E M A D M I N I S T R AT I O N

Experienced Information Technology professional with over 8 years’ experience in cyber security, hardware, software and

networking technologies. Highly proficient in directing a broad range of corporate IT security initiatives which include planning,

examination, and implementation of solutions. Proven ability to provide comprehensive secured network design, systems analysis,

and full life cycle project management. Hands on experience leading all stages of system development efforts, including

requirements definition, design, architecture, testing, and support. Outstanding project and program leader; able to coordinate and

direct all phases of project based efforts.

Areas of Expertise

Cyber Security Network Intrusion Detection Systems Lost, Stolen, Asset Reporting

AD Group Policy Host Intrusion Detection Systems

Event Security Manager

Research & Development Data Integrity/Disaster Recovery

Contingency Planning

Regulatory Adherence Risk Assessment/Impact Analysis

Computer Forensics

Cost Benefits Analysis Technical Specifications Development

Technical Reporting

Professional Experience

GENERAL DYNAMICS INFORMATION TECHNOLOGY MEMPHIS, TN

Cyber Security Analyst (Internal Revenue Service), 2013 present

Conduct Security Incident Analysis, incident/intrusion source tracing, monitor and analyze network and host intrusion detection systems

to identify security threats for remediation within the IRS Computer Security Incident Response Center (CSIRC).

Monitor ArcSight event security manger to identify potential, successful, and unsuccessful intrusion attempts through incident detail and

summary information.

Utilize Symantec Enterprise Protection 11 (SEP11), Sourcefire, NetWitness and McAfee Web Gateway data sources to detect system

breaches and investigate malicious activity.

Employ RSA Archer eGRC (Enterprise, Governance, risk and compliance) to create, track and resolve security incidents for possible

compromises.

Perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent

access or destruction.

Initiate Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record

and report incidents.

Evaluate Content Filtering Recategorization Request to assess organizational risk.

Communicate alerts to agencies regarding compromises to their network infrastructure, applications and operating systems as well as

assist with implementation of counter measures or mitigating controls.

Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies,

through monitoring of vulnerability scanning devices.

Evaluate and deconstruct malware (obfuscated code) through open source and vendor tools, prepares briefing and reports of analysis and

results.

Generate end of shift reports for documentation and knowledge transfer to analyst on duty.

STATE OF TENNESSEE, DEPARTMENT OF HUMAN SERVICES MEMPHIS, TN

Information Resource Systems Specialist II, 2005 2013

Identified problems specific to an application, user, computer, or network and develop a plan to implement a solution, as well as t rained

and developed end users on the use of hardware, software, and peripherals.

Utilized Remedy Customer Relationship Management (CRM) to track and resolve incidents, inventory, and service level agreements.

Provided system administration support for LAN, WAN, VPN users; document the startup, back up, maintenance and daily operational

activities associated with software platforms.

Initiated availability reports using Crystal Reports; write technical documentation on the installation procedures for software or hardware

products such as Windows XP, Vista and Windows 7.

R I C O M. O L D E N, MBA

Phone: 901-***-**** Page 2

Lead specialists in the administration of systems security and assured that technological changes were integrated into the department’s

Active Directory environment, accounting for existing work functions and minimal system impact.

Added, deleted, and modified users’ rights in Active Directory, Citrix and Outlook.

Utilized Symantec Ghost as a disaster recovery plan when software failures occurred on the system; transferred data files, systems files,

and applications programs to transportable media.

Lead multiple team projects including the migration from Novell to Active Directory and from GroupWise to Outlook.

Delegated project work planning and work assignment to project team; estimated time required to complete projects and prepared

deadlines accordingly.

Anticipate and informed, or responded to management on scheduling and policy concerns that impacted development or implementation

of proposed systems; provided technical and logical support during the migration of a project.

Handled digital evidence from seized digital media including computers, PDA’s, flash or thumb drives, and other digital media to recover

deleted, erased, hidden, and encrypted data for investigation.

Conducted thorough and effective computer/digital investigations such as property theft, cyber security, malware removal techniques,

incident response, compliance auditing and responding to e Discovery requests using EnCase Forensics software.

Coordinated with internal investigations unit in the development of evidence collection methods and processes that supported the need to

detect and respond to unauthorized or unintentional activities.

Technical Proficiencies

Platforms: UNIX, Windows/XP/Vista/7, Linux, Mac OS, VMware Fusion, Novell

Networking: TCP/IP, Ethernet, VPN, LAN, RSA SecureID, SAS, SAN

Languages: UNIX Shell Scripting, SSH, JavaScript, Power Shell

Tools: LAN Manager, Symantec Ghost, McAfee Virus Protection Utilities, Enterprise Portals, Snort, Microsoft Office Suite (Word,

Excel, PowerPoint, Access, Project, Exchange, Outlook, FrontPage), SQL, Symantec Brightmail, Sourcefire, NetWitness, Citrix

Administration, Active Directory, Remedy Asset and Change Management, VoIP phone systems, Cisco

Jabber, local and remote video conferencing hardware and software solutions

Professional Development & Training

EnCase® v6 Computer Forensics I (Completed August 2007)

EnCase® v6 Computer Forensics II (Completed April 2008)

Computer and Enterprise Investigations (Completed May 2010)

CompTia Security + (In progress)

Education

Bethel university

Master of Business Administration, Management

University of tennessee

Bachelor of Science, Management Information Systems



Contact this candidate