Post Job Free
Sign in

Cyber Security Engineer

Location:
Sierra Vista, AZ
Posted:
March 23, 2016

Contact this candidate

Resume:

Cyber Security Expert

Results oriented information security professional with over 20 years of combined IT and IS experience seeking an exciting and challenging position with growth opportunities in the cyber defense field. The ideal position would be performing malware analysis and cyber intrusion investigations in addition to investigating emerging threats and implementing mitigation and detection techniques.

Technologies

Security: McAfee ePolicy Orchestrator (HBSS/Endpoint Security), eEye Retina, HP OpenView, SolarWinds Orion Network Performance Monitor

Systems: Windows (all), Linux, VMware

Networking: LANs, WANs, Routers, Switches, Firewalls, Proxy Servers, Fiber Channel

Software: VirusScan Enterprise, Host Intrusion Prevention, Policy Auditor, Rogue System Detection, Asset Baseline Monitor, Asset Configuration Compliance Module, Data Loss Prevention, BMC Remedy (ITSM), Wireshark, MS SQL Server

Languages: VB Scripting, VBA, VB.net, Java

Hardware: HP c7000, HP DL series servers, Dell PowerEdge servers, SAN

Credentials

Education

CISSP

University of Maryland University College

ISC2

MS in Digital Forensics and Cyber Investigations

ITIL v3 Foundation

Master of Business Administration

APM Group

(Beginning 2016)

Security+

University of Phoenix

Computer Technology Industry Association

BS in IT

A+

(2012 – 2015)

Computer Technology Industry Association

Capella University

(2008-2010)

Professional Experience

General Dynamics Information Technology, Sierra Vista, AZ October 2014 – Present

Subject Matter Expert (HBSS/Endpoint Security)

General Dynamics Information Technology, Sierra Vista, AZ May 2013 – September 2014

TEKsystems, Sierra Vista, AZ October 2012 – May 2013

Senior Systems Engineer / Subject Matter Expert (HBSS/Endpoint Security)

Troubleshoot enterprise-wide deployment issues related to McAfee Agent (MA), Policy Auditor (PA), Rogue System Detection (RSD), Device Control Module (DCM) / Data Loss Prevention (DLP), Host Intrusion Prevention System (HIPS), VirusScan Enterprise (VSE), Policy Auditor (PA), and DoD custom applications Asset Baseline Monitor (ABM), Asset Configuration Compliance Module (ACCM), Asset Publishing Service (APS) and all other Host Based Security System (HBSS)/Endpoint Security related components

Responsible for the engineering support, installation, configuration, and client migration effort in support of the Army HBSS program

Provide engineering requirements identification, system architecture definitions, hardware and software designs, implementation assistance, testing, and deployment support to implementation team members

Supporting the HBSS/Endpoint Security architect in developing an appropriate HBSS architecture and engineering design

Provide the customer recommendations on the engineering of solutions to include all required communication paths, data storage, and reporting

Address technical problems associated with McAfee software and provide proactive support

Provide HBSS product implementation and sustainment support as required for the unsecure and secure networks

Create and update system design documentation, engineering installation packages, site installation plans, trip reports, and daily situation reports

Identify and implement improvements in existing methodology, processes, and procedures with regard to current and future Army HBSS/Endpoint Security implementation

Enterprise level ePO administration of approximately 1 million total assets distributed world-wide across six theaters

Provide right-seat training to team leads and HBSS/Endpoint Security implementation and sustainment team members in new techniques, tools, and other HBSS-related skills

BAE Systems, Sierra Vista, AZ October 2011 – Aug 2012

Lead Cyber Engineer

Assisted with development of a custom HBSS Administrator training program (Enhanced 401 Army Training)

Authored custom scripts used to test DISA Security Technical Implementation Guide (STIG) compliance and automatically remediate is necessary

Contributed to the development of Government contract proposals

Authored and updated various Contract Data Requirements List (CDRL) deliverable documents as necessary

Responsible for installation and maintenance of the Host Based Security System (HBSS) components on the McAfee ePolicy Orchestrator (ePO) Server, the managed servers including the Super Agent Distributed Repositories (SADR), and workstations through-out the Enterprise

Performed daily maintenance and management of MS SQL 2008 databases

Troubleshot deployment issues related to Policy Auditor (PA), Rogue System Detection (RSD), Device Control Module (DCM) / Data Loss Prevention (DLP), and Asset Baseline modules (ABM) and other HBSS related components as they were deployed throughout the Enterprise network

Performed daily analysis of alerts, client data, connectivity, deployed modules, and functionality

Ensured policies and system patches were up-to-date

Established and/or produced reports, queries, dashboards, and other information as required by management

General Dynamics Information Technology, Colorado Springs, CO November 2010 – October 2011

Senior Network Administrator (HBSS/Endpoint Security)

Responsible for installation and maintenance of the Host Based Security System (HBSS/Endpoint Security) components on the McAfee ePolicy Orchestrator (ePO) Server, the managed servers including the Super Agent Distributed Repositories (SADR), and workstations through-out the Enterprise

Authored various MS Access database applications to assist with providing near real-time reports about product deployment status and network coverage utilized by management

Performed daily maintenance and management of MS SQL 2005 databases

Provided input on Host Intrusion Prevention System (HIPS) tuning efforts through use of HIPS alerts

Troubleshot deployment issues related to Policy Auditor (PA), Rogue System Detection (RSD), Device Control Module (DCM) / Data Loss Prevention (DLP), and Asset Baseline modules (ABM) and other HBSS/Endpoint Security related components as they are deployed throughout the Enterprise network

Performed daily analysis of alerts, client data, connectivity, deployed modules, and functionality

Ensured policies and system patches are up-to-date

Established and/or produced reports, queries, dashboards, and other information as required by management

Provided detailed reports on security intrusions and violations

McNeil Technologies, Colorado Springs, CO April 2010 – November 2010

Computer Sciences Corporation, Colorado Springs, CO September 2007 – March 2010

Enterprise Controller/Network Defender

Responsible for monitoring the Air Force Enterprise Network for malicious activity as part of a Network Operations Support Center crew operations in a 24/7 environment

Maintained a vigilant watch over 60+ Air Force Base’s external and internal data traffic utilizing tools such as CIDDS, Symantec Critical System Protection, NetIQ Security Manager, HBSS, log analysis, and reports from various outside reporting and monitoring agencies

Researched and recommended actions to mitigate external threats, status of boundary protection configurations, tools, and procedures in order to maintain information security, integrity, and availability

Responsible for ensuring the availability of critical services over multiple enterprise environments including; NIPRnet, SIPRnet, and RELCAN networks

Utilized HP OpenView, SMARTs, Air Force Network Operations Center NIPRNet and SIPRnet Dashboards to maintain situational awareness of critical circuit and core server availability

Monitored the status of the Air Force Enterprise Network to assess operational impact, communicate and coordinate mitigation efforts with the Defense Information Systems Agency, AFNOC, and unit commands

Utilized Remedy to track outage and degradation events based upon defined event thresholds

Worked closely with military crew to ensure senior military leadership was aware of ongoing or potential issues effecting mission requirements

Authored VB scripts used to test policy compliance for items such as black hole list implementation and website categorization for proxy servers

ITT Corporation, Colorado Springs, CO April 2004 – June 2007

System Implementation Specialist 1 / Project Lead / System Implementation Specialist 2

Authored project proposals, white papers, transition plans, and several installation and test procedures used in the successful fielding of a new network infrastructure and workstations for Army Space Command’s Wideband Satellite Communications Operations Centers

Designed and recommended a subsystem upgrade that resulted in award of a multi-million dollar contract

Responsible for supervising activities of a project team tasked with system implementation functions including planning, integration, installation, and testing

Worked on problems exercising judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criteria for obtaining results

Coordinated with the Program Manager to ensure successful completion of all project related objectives within cost and schedule constraints

Primary engineer for the Symantec Gateway Security firewall providing network perimeter security for a mission critical control network

Authored a work instruction used by field engineers to assist in investigating and characterizing incidents on the Symantec Network Security IDS

Have written several Visual Basic scripts and batch files utilized during system fielding and daily operations of an enterprise-wide workgroup to domain migration

Experience with Active Directory and domain design in a Windows 2003 environment

Experienced at designing rule sets for Symantec Gateway Security firewalls

Familiar with routing and switching in Cisco and Nortel environments

Designed systems to be STIG compliant and implemented IAVAs and IAVBs

Conducted site surveys to gather information on items such as current floor layout, desired equipment locations, data and power cable locations and types, power panel locations and circuit breaker availability, and site readiness at the time of the survey

Authored site survey reports utilizing data gathered during site surveys to document site conditions and obtain site manager concurrence with the findings before the installation began

US Army April 1998 – April 2004

Satellite Network Coordinator

Trained in multiple Frequency Spectrum Access concepts to include: FDMA, CDMA, SSMA, TDMA

Designed and responsible for the implementation, maintenance, and complex re-engineering of satellite communications networks spanning five Defense Satellite Communications System DSCS III satellites valued at over $350 million each

Supported over 200 fixed and mobile satellite communications facilities

Performed on-orbit satellite operations and link engineering of new and existing communications links

Performed duties utilizing satellite monitoring configuration and control equipment such as spectrum monitoring subsystems, tracking, telemetry and command (TT&C) systems, and communications order-wires

Sustained satellite welfare through effective anomaly detection and resolution using satellite telemetry monitoring and spacecraft commanding

Coordinated complex troubleshooting of circuit outages down to the circuit level

Complicated repairs (demand and emergency maintenance) and re-engineering design changes required for adapting systems for new uses or to accommodate changes in the military command and control mission

Performed repair work following appropriate technical manuals and directions utilizing Spectrum Analyzers, Frequency counters, Power Meters, Signal Generators, Synthesized Sweepers, Oscilloscopes, Multi-meters, and Fireberds

Accountable for over $5 million of control and monitoring equipment

Training and certifying over 40 operators as Satellite Network Controllers as needed



Contact this candidate