* ********* **** **** • CROMWELL, CT *****
PHONE +1-443-***-**** • E MAIL *******@*****.***
DEREK M. DICKINSON
OBJECTIVE
Security engineer and former military professional seeking to continue a rewarding and challenging career in
information security
SUMMARY OF QUALIFICATIONS
• Over eight years of diversified professional experience in the realm of military and national
security
• Direct, first hand experience with Computer Network Operations (CNO) and Information
Assurance (IA)
• Compliant with Department of Defense (DoD) directive 8570.1 Information Assurance Technical
(IAT) Level II/III, Computing Environment (CE) Level II, and Computer Network Defense (CND)
requirements
• Well versed in TCP/IP, routing/switching protocols, firewall/IDS implementations, and network
security tools
• Maintains proficient operating knowledge of Linux, Cisco IOS, and Metasploit command line
interfaces (CLI)
• Possesses strong leadership and technical skills, is able to communicate effectively to technical,
non technical and senior management; and is able to lead and work collaboratively with diverse
groups of people
• Familiar with regulatory compliance and industry standards such as SOX, HIPAA, PCI, and NIST
• Presently in possession of a current TS//SCI clearance with Counter Intelligence (CI) polygraph
PROFESSIONAL EXPERIENCE
April 2011 – November 2012
•
A T Solutions (Fort Meade, Maryland)
o Geo Spatial Security Analyst and Team Lead
Provided analytic expertise in support of force protection measures for U.S. personnel
and critical infrastructure in overseas locations through geo spatial and metadata
analysis
Briefed threat environment and status of high value targets to operations and
intelligence planners
Utilized ArcGIS and Analyst Notebook to abstract, develop, data mine, and manage
intelligence products for the creation of a more enhanced link analysis
Examined the behavior of nefarious actors to identify tactics, techniques and
procedures (TTPs) for network exploitation and predictive analysis
Managed multiple security projects and established metrics to effectively track
performance
Enforced compliance of customer work standards, as well as company policy and
procedures
Mentored and trained new members of the team to meet and exceed client standards
Audited timesheets, approved leave requests, and coordinated travel itineraries of
personnel
Created weekly activity report (WAR) to monitor and highlight team performance
June 2009 – April 2011
•
Booz Allen Hamilton (Elkridge, Maryland)
o Cyber Threat Analyst
Identified motivation of threat agents and adversary capabilities targeting U.S.
information systems, Supervisory Control and Data Acquisition (SCADA) systems,
and critical infrastructure
Addressed risk reduction strategies, industry best practices, and recommended
course of action to enhance to security posture of information systems consistent with
NIST 800 30, 800 37, and 800 53
Effectively communicated technical concepts through high level reporting to
non technical audience
Authored comprehensive product reports for DoD policy makers based on
analytic assessments
Conducted policy audits to ensure continued relevance and accuracy of CNO
content
Interfaced with external entities, including intelligence community
organizations and other government agencies such as Defense Information Systems
Agency (DISA).
Attended workshops, technical forum groups, and conferences to expand
technical knowledge base and network with other industry professionals for potential
cross agency analytical collaboration opportunities
March 2003 – June 2008
•
U.S. Marine Corps (Kunia, Hawaii)
o Global Network Analyst/Cyber Intrusion Analyst
Performed triage analysis of compromised systems for prioritization of further in
depth analysis
Reviewed IDS log files to determine successful and unsuccessful intrusion attempts
Identified the presences of malicious code, rootkits, and system configuration
anomalies
Alerted relevant agencies of intrusion, network compromise, and data exfiltration
incidents
Generated linux/unix shell scripts and Perl to automate batch processes and
generalization
Exploited router and switch configuration files to reverse engineer network
architectures
Utilized NetViz and Visio to re construct network diagrams at the core, distribution,
and access level
Collaborated with various organizations and served as a liaison between multiple
departments
Maintained comprehensive awareness of existing and emerging threats through
workshops, US CERT database, and RSS feeds
EDUCATION
January 2006 – June 2008
•
Hawaii Pacific University (Honolulu, Hawaii)
Bachelor of Arts in International Relations
Graduated in summer of 2008 (3.2/4.0 GPA)
PROFESSIONAL ISC2 Associate (CISSP designation pending), CCNA, CEH, and ITIL v3 Foundations
CERTIFICATIONS
TECHNICAL Operation Systems Networks Platforms
SKILLS Microsoft Windows JWICS NSAnet/DoDIIS DCGS
Unix/Linux (BackTrack 5r3)SIPRnet/NIPRnet Palantir
Cisco IOS BICES/CENTRIX
Junos (Juniper OS)
TOOLS Microsoft Office Suite NetViz Wireshark Nikto
Analyst Notebook Citrix Metaspoit Nessus
A Space TAC
gns3
dnmap
Citrix
TREASURE MAP Paramiko
Jigsaw
NetViz Intelink TCPDUMP BBQSQL
ArcGIS SIGNAV Socat Cain & Abel
Renoir Cineplex Kismet Acunetix
Pathfinder nmap Scapy Ettercap
CLEARANCE TS//SCI (CI Poly)