Cyber Security Expert
Results oriented information security professional with over 20 years of combined IT and IS experience seeking an exciting and challenging position with growth opportunities in the cyber defense field. The ideal position would be performing malware analysis and cyber intrusion investigations in addition to investigating emerging threats and implementing mitigation and detection techniques.
Technologies
Security: McAfee ePolicy Orchestrator (HBSS/Endpoint Security), eEye Retina, HP OpenView, SolarWinds Orion Network Performance Monitor
Systems: Windows (all), Linux, VMware
Networking: LANs, WANs, Routers, Switches, Firewalls, Proxy Servers, Fiber Channel
Software: VirusScan Enterprise, Host Intrusion Prevention, Policy Auditor, Rogue System Detection, Asset Baseline Monitor, Asset Configuration Compliance Module, Data Loss Prevention, BMC Remedy (ITSM), Wireshark, MS SQL Server
Languages: VB Scripting, VBA, VB.net, Java
Hardware: HP c7000, HP DL series servers, Dell PowerEdge servers, SAN
Credentials
Education
CISSP
University of Maryland University College
ISC2
MS in Digital Forensics and Cyber Investigations
ITIL v3 Foundation
Master of Business Administration
APM Group
(Beginning 2016)
Security+
University of Phoenix
Computer Technology Industry Association
BS in IT
A+
(2012 – 2015)
Computer Technology Industry Association
Capella University
(2008-2010)
Professional Experience
General Dynamics Information Technology, Sierra Vista, AZ October 2014 – Present
Subject Matter Expert (HBSS/Endpoint Security)
General Dynamics Information Technology, Sierra Vista, AZ May 2013 – September 2014
TEKsystems, Sierra Vista, AZ October 2012 – May 2013
Senior Systems Engineer / Subject Matter Expert (HBSS/Endpoint Security)
Troubleshoot enterprise-wide deployment issues related to McAfee Agent (MA), Policy Auditor (PA), Rogue System Detection (RSD), Device Control Module (DCM) / Data Loss Prevention (DLP), Host Intrusion Prevention System (HIPS), VirusScan Enterprise (VSE), Policy Auditor (PA), and DoD custom applications Asset Baseline Monitor (ABM), Asset Configuration Compliance Module (ACCM), Asset Publishing Service (APS) and all other Host Based Security System (HBSS)/Endpoint Security related components
Responsible for the engineering support, installation, configuration, and client migration effort in support of the Army HBSS program
Provide engineering requirements identification, system architecture definitions, hardware and software designs, implementation assistance, testing, and deployment support to implementation team members
Supporting the HBSS/Endpoint Security architect in developing an appropriate HBSS architecture and engineering design
Provide the customer recommendations on the engineering of solutions to include all required communication paths, data storage, and reporting
Address technical problems associated with McAfee software and provide proactive support
Provide HBSS product implementation and sustainment support as required for the unsecure and secure networks
Create and update system design documentation, engineering installation packages, site installation plans, trip reports, and daily situation reports
Identify and implement improvements in existing methodology, processes, and procedures with regard to current and future Army HBSS/Endpoint Security implementation
Enterprise level ePO administration of approximately 1 million total assets distributed world-wide across six theaters
Provide right-seat training to team leads and HBSS/Endpoint Security implementation and sustainment team members in new techniques, tools, and other HBSS-related skills
BAE Systems, Sierra Vista, AZ October 2011 – Aug 2012
Lead Cyber Engineer
Assisted with development of a custom HBSS Administrator training program (Enhanced 401 Army Training)
Authored custom scripts used to test DISA Security Technical Implementation Guide (STIG) compliance and automatically remediate is necessary
Contributed to the development of Government contract proposals
Authored and updated various Contract Data Requirements List (CDRL) deliverable documents as necessary
Responsible for installation and maintenance of the Host Based Security System (HBSS) components on the McAfee ePolicy Orchestrator (ePO) Server, the managed servers including the Super Agent Distributed Repositories (SADR), and workstations through-out the Enterprise
Performed daily maintenance and management of MS SQL 2008 databases
Troubleshot deployment issues related to Policy Auditor (PA), Rogue System Detection (RSD), Device Control Module (DCM) / Data Loss Prevention (DLP), and Asset Baseline modules (ABM) and other HBSS related components as they were deployed throughout the Enterprise network
Performed daily analysis of alerts, client data, connectivity, deployed modules, and functionality
Ensured policies and system patches were up-to-date
Established and/or produced reports, queries, dashboards, and other information as required by management
General Dynamics Information Technology, Colorado Springs, CO November 2010 – October 2011
Senior Network Administrator (HBSS/Endpoint Security)
Responsible for installation and maintenance of the Host Based Security System (HBSS/Endpoint Security) components on the McAfee ePolicy Orchestrator (ePO) Server, the managed servers including the Super Agent Distributed Repositories (SADR), and workstations through-out the Enterprise
Authored various MS Access database applications to assist with providing near real-time reports about product deployment status and network coverage utilized by management
Performed daily maintenance and management of MS SQL 2005 databases
Provided input on Host Intrusion Prevention System (HIPS) tuning efforts through use of HIPS alerts
Troubleshot deployment issues related to Policy Auditor (PA), Rogue System Detection (RSD), Device Control Module (DCM) / Data Loss Prevention (DLP), and Asset Baseline modules (ABM) and other HBSS/Endpoint Security related components as they are deployed throughout the Enterprise network
Performed daily analysis of alerts, client data, connectivity, deployed modules, and functionality
Ensured policies and system patches are up-to-date
Established and/or produced reports, queries, dashboards, and other information as required by management
Provided detailed reports on security intrusions and violations
McNeil Technologies, Colorado Springs, CO April 2010 – November 2010
Computer Sciences Corporation, Colorado Springs, CO September 2007 – March 2010
Enterprise Controller/Network Defender
Responsible for monitoring the Air Force Enterprise Network for malicious activity as part of a Network Operations Support Center crew operations in a 24/7 environment
Maintained a vigilant watch over 60+ Air Force Base’s external and internal data traffic utilizing tools such as CIDDS, Symantec Critical System Protection, NetIQ Security Manager, HBSS, log analysis, and reports from various outside reporting and monitoring agencies
Researched and recommended actions to mitigate external threats, status of boundary protection configurations, tools, and procedures in order to maintain information security, integrity, and availability
Responsible for ensuring the availability of critical services over multiple enterprise environments including; NIPRnet, SIPRnet, and RELCAN networks
Utilized HP OpenView, SMARTs, Air Force Network Operations Center NIPRNet and SIPRnet Dashboards to maintain situational awareness of critical circuit and core server availability
Monitored the status of the Air Force Enterprise Network to assess operational impact, communicate and coordinate mitigation efforts with the Defense Information Systems Agency, AFNOC, and unit commands
Utilized Remedy to track outage and degradation events based upon defined event thresholds
Worked closely with military crew to ensure senior military leadership was aware of ongoing or potential issues effecting mission requirements
Authored VB scripts used to test policy compliance for items such as black hole list implementation and website categorization for proxy servers
ITT Corporation, Colorado Springs, CO April 2004 – June 2007
System Implementation Specialist 1 / Project Lead / System Implementation Specialist 2
Authored project proposals, white papers, transition plans, and several installation and test procedures used in the successful fielding of a new network infrastructure and workstations for Army Space Command’s Wideband Satellite Communications Operations Centers
Designed and recommended a subsystem upgrade that resulted in award of a multi-million dollar contract
Responsible for supervising activities of a project team tasked with system implementation functions including planning, integration, installation, and testing
Worked on problems exercising judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criteria for obtaining results
Coordinated with the Program Manager to ensure successful completion of all project related objectives within cost and schedule constraints
Primary engineer for the Symantec Gateway Security firewall providing network perimeter security for a mission critical control network
Authored a work instruction used by field engineers to assist in investigating and characterizing incidents on the Symantec Network Security IDS
Have written several Visual Basic scripts and batch files utilized during system fielding and daily operations of an enterprise-wide workgroup to domain migration
Experience with Active Directory and domain design in a Windows 2003 environment
Experienced at designing rule sets for Symantec Gateway Security firewalls
Familiar with routing and switching in Cisco and Nortel environments
Designed systems to be STIG compliant and implemented IAVAs and IAVBs
Conducted site surveys to gather information on items such as current floor layout, desired equipment locations, data and power cable locations and types, power panel locations and circuit breaker availability, and site readiness at the time of the survey
Authored site survey reports utilizing data gathered during site surveys to document site conditions and obtain site manager concurrence with the findings before the installation began
US Army April 1998 – April 2004
Satellite Network Coordinator
Trained in multiple Frequency Spectrum Access concepts to include: FDMA, CDMA, SSMA, TDMA
Designed and responsible for the implementation, maintenance, and complex re-engineering of satellite communications networks spanning five Defense Satellite Communications System DSCS III satellites valued at over $350 million each
Supported over 200 fixed and mobile satellite communications facilities
Performed on-orbit satellite operations and link engineering of new and existing communications links
Performed duties utilizing satellite monitoring configuration and control equipment such as spectrum monitoring subsystems, tracking, telemetry and command (TT&C) systems, and communications order-wires
Sustained satellite welfare through effective anomaly detection and resolution using satellite telemetry monitoring and spacecraft commanding
Coordinated complex troubleshooting of circuit outages down to the circuit level
Complicated repairs (demand and emergency maintenance) and re-engineering design changes required for adapting systems for new uses or to accommodate changes in the military command and control mission
Performed repair work following appropriate technical manuals and directions utilizing Spectrum Analyzers, Frequency counters, Power Meters, Signal Generators, Synthesized Sweepers, Oscilloscopes, Multi-meters, and Fireberds
Accountable for over $5 million of control and monitoring equipment
Training and certifying over 40 operators as Satellite Network Controllers as needed