Post Job Free
Sign in

Engineer Analyst

Location:
New York, NY
Posted:
December 09, 2013

Contact this candidate

Resume:

* ********* **** **** • CROMWELL, CT *****

PHONE +1-443-***-**** • E MAIL *******@*****.***

DEREK M. DICKINSON

OBJECTIVE

Security engineer and former military professional seeking to continue a rewarding and challenging career in

information security

SUMMARY OF QUALIFICATIONS

• Over eight years of diversified professional experience in the realm of military and national

security

• Direct, first hand experience with Computer Network Operations (CNO) and Information

Assurance (IA)

• Compliant with Department of Defense (DoD) directive 8570.1 Information Assurance Technical

(IAT) Level II/III, Computing Environment (CE) Level II, and Computer Network Defense (CND)

requirements

• Well versed in TCP/IP, routing/switching protocols, firewall/IDS implementations, and network

security tools

• Maintains proficient operating knowledge of Linux, Cisco IOS, and Metasploit command line

interfaces (CLI)

• Possesses strong leadership and technical skills, is able to communicate effectively to technical,

non technical and senior management; and is able to lead and work collaboratively with diverse

groups of people

• Familiar with regulatory compliance and industry standards such as SOX, HIPAA, PCI, and NIST

• Presently in possession of a current TS//SCI clearance with Counter Intelligence (CI) polygraph

PROFESSIONAL EXPERIENCE

April 2011 – November 2012

A T Solutions (Fort Meade, Maryland)

o Geo Spatial Security Analyst and Team Lead

Provided analytic expertise in support of force protection measures for U.S. personnel

and critical infrastructure in overseas locations through geo spatial and metadata

analysis

Briefed threat environment and status of high value targets to operations and

intelligence planners

Utilized ArcGIS and Analyst Notebook to abstract, develop, data mine, and manage

intelligence products for the creation of a more enhanced link analysis

Examined the behavior of nefarious actors to identify tactics, techniques and

procedures (TTPs) for network exploitation and predictive analysis

Managed multiple security projects and established metrics to effectively track

performance

Enforced compliance of customer work standards, as well as company policy and

procedures

Mentored and trained new members of the team to meet and exceed client standards

Audited timesheets, approved leave requests, and coordinated travel itineraries of

personnel

Created weekly activity report (WAR) to monitor and highlight team performance

June 2009 – April 2011

Booz Allen Hamilton (Elkridge, Maryland)

o Cyber Threat Analyst

Identified motivation of threat agents and adversary capabilities targeting U.S.

information systems, Supervisory Control and Data Acquisition (SCADA) systems,

and critical infrastructure

Addressed risk reduction strategies, industry best practices, and recommended

course of action to enhance to security posture of information systems consistent with

NIST 800 30, 800 37, and 800 53

Effectively communicated technical concepts through high level reporting to

non technical audience

Authored comprehensive product reports for DoD policy makers based on

analytic assessments

Conducted policy audits to ensure continued relevance and accuracy of CNO

content

Interfaced with external entities, including intelligence community

organizations and other government agencies such as Defense Information Systems

Agency (DISA).

Attended workshops, technical forum groups, and conferences to expand

technical knowledge base and network with other industry professionals for potential

cross agency analytical collaboration opportunities

March 2003 – June 2008

U.S. Marine Corps (Kunia, Hawaii)

o Global Network Analyst/Cyber Intrusion Analyst

Performed triage analysis of compromised systems for prioritization of further in

depth analysis

Reviewed IDS log files to determine successful and unsuccessful intrusion attempts

Identified the presences of malicious code, rootkits, and system configuration

anomalies

Alerted relevant agencies of intrusion, network compromise, and data exfiltration

incidents

Generated linux/unix shell scripts and Perl to automate batch processes and

generalization

Exploited router and switch configuration files to reverse engineer network

architectures

Utilized NetViz and Visio to re construct network diagrams at the core, distribution,

and access level

Collaborated with various organizations and served as a liaison between multiple

departments

Maintained comprehensive awareness of existing and emerging threats through

workshops, US CERT database, and RSS feeds

EDUCATION

January 2006 – June 2008

Hawaii Pacific University (Honolulu, Hawaii)

Bachelor of Arts in International Relations

Graduated in summer of 2008 (3.2/4.0 GPA)

PROFESSIONAL ISC2 Associate (CISSP designation pending), CCNA, CEH, and ITIL v3 Foundations

CERTIFICATIONS

TECHNICAL Operation Systems Networks Platforms

SKILLS Microsoft Windows JWICS NSAnet/DoDIIS DCGS

Unix/Linux (BackTrack 5r3)SIPRnet/NIPRnet Palantir

Cisco IOS BICES/CENTRIX

Junos (Juniper OS)

TOOLS Microsoft Office Suite NetViz Wireshark Nikto

Analyst Notebook Citrix Metaspoit Nessus

A Space TAC

gns3

dnmap

Citrix

TREASURE MAP Paramiko

Jigsaw

NetViz Intelink TCPDUMP BBQSQL

ArcGIS SIGNAV Socat Cain & Abel

Renoir Cineplex Kismet Acunetix

Pathfinder nmap Scapy Ettercap

CLEARANCE TS//SCI (CI Poly)



Contact this candidate