Technical Skills:
Cisco **** series to include base models, G series, E series and X series
**** ****** ** ******* ****, 6509 and 6513
Cisco 3750 series to include base models, G series, E series and X series
Nexus series to include 5k and 2k models
2900 series to include 2912 LRE, 2950s, 2960s and 2970s in base and G series models
ASA series to include 5520 and 5540 models
IE3000 series models
Cisco ACS
Professional Experience:
Moser Consulting, Inc. - Baltimore, MD
Jan 2016 – Present
Senior Consultant
Senior Consultant for Moser Consulting responsible for the Wellpoint Military Care contract.
Responsible for assisting WMC Data Center lead as the Data Center Security Architect with creating policies and procedures in accordance with NIST and DISA SRGs and STIGS for secure network architecture in support of healthcare functions and applications.
Responsible for multi-site/multi-state security infrastructure. Performing work that involves the planning, analysis, design, development, testing, quality assurance, configuration, installation, implementation, integration, of security management for networked and data center systems.
Experience with NIST 800 series framework and risk management.
Experience with the Tenable Security Center suite of products to include Nessus and LCE.
Experience with Audits and Auditing procedures for NIST, DIACAP, FISMA and DISA.
Experience with Security tools such as Wireshark, Burp Suite, Snort, Kali Linux.
Experience with the Telos Xacta AE Risk Management Software.
Functions commonly performed include: analyzing and defining network and data center security requirements; defining and maintaining network security architecture and infrastructure; ensuring the rigorous application of information security/information assurance policies, principles, and practices in the delivery of network and data center services.
Moser Consulting, Inc. - Baltimore, MD
Jan 2014 – Jan 2016
Senior Consultant
Senior Network Engineer for Moser Consulting responsible for the HighPoint Global, LLC contract
Responsible for multi-site/multi-state infrastructure
Performing work that involves the planning, analysis, design, development, testing, quality assurance, configuration, installation, implementation, integration, maintenance, and management of networked systems used for the transmission of information in voice, data, and video formats
Functions commonly performed include: analyzing and defining network requirements; defining and maintaining network architecture and infrastructure; configuring and optimizing firewalls, routers, wireless controllers and switches; analyzing network workload; monitoring network capacity and performance; diagnosing and resolving network problems; developing network backup and recovery procedures; installing, testing, maintaining, and upgrading network operating systems software; and/or ensuring the rigorous application of information security/information assurance policies, principles, and practices in the delivery of network services
HighPoint Global, LLC - Baltimore, MD
Oct 2013 – Jan 2014
Network Architect
Served as the Senior Network Engineer for HighPoint Global, LLC
Responsible for multi-site/multi-state infrastructure
Performing work that involves the planning, analysis, design, development, testing, quality assurance, configuration, installation, implementation, integration, maintenance, and management of networked systems used for the transmission of information in voice, data, and video formats
Functions commonly performed include: analyzing and defining network requirements; defining and maintaining network architecture and infrastructure; configuring and optimizing firewalls, routers, wireless controllers and switches; analyzing network workload; monitoring network capacity and performance; diagnosing and resolving network problems; developing network backup and recovery procedures; installing, testing, maintaining, and upgrading network operating systems software; and/or ensuring the rigorous application of information security/information assurance policies, principles, and practices in the delivery of network services
US Army Civilian Yuma Proving Ground - Yuma, AZ
2011- Present
U.S. Army Civilian GS-11 Step 2
Serves as an IT Specialist performing work independently, or as a member of a team, in the administration, development, delivery, and support of information technology (IT) systems and services
Duties may include, but are not limited to, providing advice and guidance on a wide range and variety of complex IT issues; interpreting IT policies, standards, and guidelines; conducting analyses and recommending resolution of complex issues affecting the specialty area(s); evaluating and recommending adoption of new or enhanced approaches to delivering IT services; testing and optimizing the functionality of systems, networks, and data; identifying and defining business or technical requirements applied to the design, development, implementation, management and support of systems and networks; ensuring optimal use of commercially available products; evaluating proposals for the acquisition of IT products or services; preparing and presenting reports; representing the organization in interactions with other organizations; and/or providing technical leadership on group projects
Within the area of Security, plans and carries out the following assignments: Performs work that involves ensuring the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools
Functions commonly performed may include: developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data; conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs; promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations' visions and goals; conducting systems security evaluations, audits, and reviews; developing systems security contingency plans and disaster recovery procedures; developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures; participating in network and systems design to ensure implementation of appropriate systems security policies; facilitating the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes; assessing security events to determine impact and implementing corrective actions; and/or ensuring the rigorous application of information security/information assurance policies, principles, and practices in the delivery of all IT services.
Within the area of Network, plans and carries out the following assignments: Performs work that involves the planning, analysis, design, development, testing, quality assurance, configuration, installation, implementation, integration, maintenance, and/or management of networked systems used for the transmission of information in voice, data, and/or video formats
Functions commonly performed may include: analyzing and defining network requirements; defining and maintaining network architecture and infrastructure; configuring and optimizing network servers, hubs, routers, and switches; analyzing network workload; monitoring network capacity and performance; diagnosing and resolving network problems; developing network backup and recovery procedures; installing, testing, maintaining, and upgrading network operating systems software; and/or ensuring the rigorous application of information security/information assurance policies, principles, and practices in the delivery of network services
Performs other duties as assigned
Northrop Grumman Technical Services, Yuma Proving Ground - Yuma, AZ
2006-2011
Electronics Technician II
Serves as an IT Specialist performing work independently, or as a member of a team, in the administration, development, delivery, and support of information technology (IT) systems and services
Duties may include, but are not limited to, providing advice and guidance on a wide range and variety of complex IT issues; interpreting IT policies, standards, and guidelines; conducting analyses and recommending resolution of complex issues affecting the specialty area(s); evaluating and recommending adoption of new or enhanced approaches to delivering IT services; testing and optimizing the functionality of systems, networks, and data; identifying and defining business or technical requirements applied to the design, development, implementation, management and support of systems and networks; ensuring optimal use of commercially available products; evaluating proposals for the acquisition of IT products or services; preparing and presenting reports; representing the organization in interactions with other organizations; and/or providing technical leadership on group projects
Within the area of Security, plans and carries out the following assignments Performs work that involves ensuring the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools
Functions commonly performed may include: developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data; conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs; promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations' visions and goals; conducting systems security evaluations, audits, and reviews; developing systems security contingency plans and disaster recovery procedures; developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures; participating in network and systems design to ensure implementation of appropriate systems security policies; facilitating the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes; assessing security events to determine impact and implementing corrective actions; and/or ensuring the rigorous application of information security/information assurance policies, principles, and practices in the delivery of all IT services
Functions commonly performed may include: Performs work that involves the planning, analysis, design, development, testing, quality assurance, configuration, installation, implementation, integration, maintenance, and/or management of networked systems used for the transmission of information in voice, data, and/or video formats
Functions commonly performed may include: analyzing and defining network requirements; defining and maintaining network architecture and infrastructure; configuring and optimizing network servers, hubs, routers, and switches; analyzing network workload; monitoring network capacity and performance; diagnosing and resolving network problems; developing network backup and recovery procedures; installing, testing, maintaining, and upgrading network operating systems software; and/or ensuring the rigorous application of information security/information assurance policies, principles, and practices in the delivery of network services
Performs other duties as assigned
United States Marine Corp – Yuma, AZ
Mar 2002 – Apr 2006
Corporal (E4)/Data Network Specialist/Defense Message System Technician – Grade Level: E4 over 3 Years
Education:
Inter Lakes High School. Meredith, New Hampshire US. High School or equivalent - 6/2000. GPA: 3.8 out of 4.0
Certifications:
US Army Civilian Education System: CES Civilian Foundation Course 1-250-C59 (DL), Yuma, AZ US, Certification – 2011
US Army Civilian Education System, CES Civilian Basic Course 1-250-C60 (DL) 1, Yuma, AZ US, Certification – 2012
US Army Civilian Education System, CES Civilian Intermediate Course 1-250-C61 (DL) 1, Yuma, AZ US, Certification - 2013
*2011 DTS BASIC - DTS Travel Documents (DTS 101)
*2011 Programs & Policies - Travel Policies
*2011 SHARP Team Bound Video
*2011 Travel Card Program (Travel Card 101)
*2012 Army Suicide Prevention Stand Down Program
*2012 Combating Trafficking in Persons
*YPG - 2011 Ethics Training
*YPG - 2012 Annual Security Training
*YPG - 2012 Annual SHARP Face-to-Face Training Sess
*YPG - 2012 Combating Trafficking in Persons (CTIP)
*YPG - 2012 DTS (BASIC) - DTS Travel Documents (DT
*YPG - 2012 Ethics Training
*YPG - 2012 Information Assurance Training
*YPG - 2012 Mandatory Antiterrorism Training
*YPG - 2012 Programs & Policies - Travel Policies
*YPG - 2012 SHARP Team Bound Video
*YPG - 2012 Threat Awareness and Reporting Program
*YPG - 2012 Travel Card Program (Travel Card 101)
*YPG - 2013 Annual Security Training
*YPG - 2013 Annual SHARP Face-to-Face Training Sess
*YPG - 2013 Anti Terrorism Level 1 Training.
*YPG - 2013 Army Profession - Customs, Courtesies a
*YPG - 2013 Army Profession - Military Expertise
*YPG - 2013 Army Profession - Standards & Disciplin
*YPG - 2013 Combating Trafficking in Persons (CTIP)
*YPG - 2013 Cyber Awareness Challenge
*YPG - 2013 DTS (BASIC) - DTS Travel Docs (DTS 101)
*YPG - 2013 Face-to-Face Suicide Prevention
*YPG - 2013 Program & Policies - Travel Card Progra
*YPG - 2013 Programs & Policies - Travel Policies
*YPG - 2013 SHARP On-Line Training (Team Bound Vide
*YPG - 2013 Substance Abuse Training #1
*YPG - 2013 Substance Abuse Training #2
*YPG - 2013 Threat Awareness and Reporting Program
BCCPA (Blue Coat Certified Proxy Administrator), Yuma, AZ US, Certification – 6/2011
Comptia Security+, Career ID Number: COMP001007500408, Yuma, AZ US, Certification - 9/2008
Microsoft Windows Server 2003: Networking, Active Directory, and Security, Yuma, Arizona US
Enterprise Operating System Technologies
Information Assurance (IA) Awareness
Internet Security: Public Key Infrastructure
Internet Security: Secure Communications
Linux: Getting Started
Linux: Fundamentals
Linux: Configuring the System
Linux: Basic Networking
Microsoft Office 2000: Beginning Word
Microsoft Office 2000: Intermediate Word
Microsoft Office 2000: Advanced Word
Microsoft Office 2000: Word for Power Users
Microsoft Office 2000: Beginning Excel
Microsoft Office 2000: Intermediate Excel
Microsoft Office 2000: Advanced Excel
Microsoft Office 2000: Beginning Outlook
Microsoft Office 2000: Advanced Outlook
Microsoft Office 2000: Beginning PowerPoint
Microsoft Windows 2000 - Installation and Administration: Installation
Microsoft Windows 2000 - Installation and Administration: Administration
Microsoft Windows 2000 - Installation and Administration: Groups and Terminal Services
Microsoft Windows 2000 - Installation and Administration: Files and Folders
Microsoft Windows 2000 - Installation and Administration: Advanced File and Folder Management
Microsoft Windows 95 - Service and Support: Mobile Support
Technical Support: Safety and Preventative Maintenance
Technical Support: Interaction with Customers
Communications Security
Fundamentals of Marine Corps Leadership
Personal Finance
Terrorism Awareness
USMC DEFENSE MESSAGE SYSTEM
INFORMATION SYSTEMS SPECIALIST
ENTRY LEVEL SMALL COMPUTER SYSTEMS SPECIALIST
Army G3 Computer Security Training, Certificate #:G3CS-IAT-1CA2125
Army Incident Handling Virtual Training Course, Certificate #:IHIH-IAT-1CA2001
Army Specific DAA Course, Certificate #:DAAT-IAT-1CA2006
HQDA IAA Virtual Training Course, Certificate #:HQDA-IAT-1CA2013
Wireless Virtual Training Course, Certificate #:WIRE-IAT-1CA2006
Flying Squirrel Virtual Training Course, Certificate #:FLSQ-IAT-1CA2002
Thumb Drive Awareness Virtual Training Course, Certificate #:THUM-IAT-1CA2091
Army NetScreen Firewall Virtual Training Course, Certificate #:NSFW-IAT-1CA2001