Resume

Sign in

Manager Security

Location:
Upper Marlboro, Maryland, 20772, United States
Posted:
October 28, 2016

Contact this candidate

KEITH B. PERRY

***** ********* *****, ***** ********, MD 20774

Cell (202) ***-****

acw90t@r.postjobfree.com

Certified Information Security Manager (CISM) # 1218849

Certified Ethical Hacker (CEHv8)

Computer Hacking Forensic Investigator (CHFI v8)

ITIL® Foundation v3

OBJECTIVE

Serve in a leadership, managerial, and/or advisory role to direct the operations of a public sector telecommunication program. Participate with senior leadership in the design, direction and management of a telecommunications and intelligence programs to move the agency towards technological advancement and organizational excellence.

DEPARTMENT OF STATE October 2014 - Present

Smart Administrator Provide tier I/II support for State Department’s State Message Archiving and Retrieval Toolset (SMART). Use various tools to monitor health of SMART Network (NetIQ, BizTalk, Active Directory, and BMC Network Tools) Troubleshoot and resolve message transmission failures. Works with outside agencies to troubleshoot and resolve network outages during afterhours support. Monitor security logs for suspicious activity. Generate daily reports of work performed and resolve issues encountered for customer. Evaluate security exposures and threats to determine the level of security necessary to protect the information systems. Implement security measures such as firewalls, intrusion detection systems and other security software or devices. Oversee all phases of project from conception to completion. Develop project tracking and variance reports. Use NIST 800-53 for security controls and guidelines.

DEPARTMENT OF HOMELAND SECURITY July 2005 – October 2014

Sr. System Analyst Support the Homeland Secure Data Network (HSDN) National Capital Area (NCA). Support operations duties for the Department of Homeland Security (DHS) NCA. I resolve technical problems, and answers queries by telephone in support of internal and/or outside customer’s computer hardware, software, network, and telecommunications systems. Provided guidance and work leadership to a team of consultants, programmers, and analysts. Assisted with configuring, optimizing, testing and virtualization of the server’s on DHS’s classified networks. Performed system administration functions to ensure vital applications are up and operational. Monitor and analyze network IPS, detailed firewall, and proxy logs for patterns of compromise. Review CIRT IDS and IPS events for malicious activity. Review other cyber-security event data managed by other teams (e.g. firewall, DNS, DHCP, web proxy, email gateway logs) Recommend appropriate remediation steps for cybersecurity events and incidents .Helped tune and develop IDS and IPS signatures. Help create findings report of vector and attack analysis. Support / Mentor analysts on new techniques and information sources .Support ongoing incidents from non-CIRT organizations related to computer security when requested. Constantly review periodic signature updates from manufacturers to identify which signatures should be enabled. Review Open Source publications for additional signatures and/or indicators of compromise. Applied NIST 800-115 assessments and standards for reporting and recommendation.

DRUG ENFORCEMENT ADMINISTRATION September 1997 – July 2005

Information Technology Specialist Serve as a Project Manager for various Information Technology (IT) projects within the Infrastructure Management Unit, Operation and Support Section, Office of Information Systems (SI), Operational Support Division, Drug Enforcement Administration (DEA). Technical and analytical experience in the field of Information Assurance (IA) and Information Security (INFOSEC). Responsible for overseeing and managing SI ‘s information technology projects. Coordinates project phases from development to installation. Acts as liaison between clients, vendors, and consultants.

Responsible for evaluating service request from user elements by researching and analyzing work requests, and providing the appropriate hardware when necessary to include: procuring and configuring laptops and providing network connectivity both internally and externally. Responsible for the development of IRM (Information Resource Management) tactical, acquisition and project plans for DEA projects, which evaluate system life span, future requirements and enhancements to continue efficient and effective production. Successfully manage all of the activities and tasks associated with the SBU Secure Laptop Initiative program within the DEA Drug Enforcement Administration (DEA) as mandated by the Department of Justice (DOJ). The deployment of encryption software to approximately 10,500 DEA issued laptops worldwide.

Responsible for the strategy surrounding policy analysis and recommendations of current Security Operational Plans, which consist of the evaluation and analysis of security and ADP support program information following the review on the effectiveness of programs and practices. Supports incident escalation and assesses probable damages, identifies damage control and remediation, and assists in developing courses of action. Regularly interfaces with other units, and internal customers regarding all phases of the SBU (Secure Laptop Initiative). Facilitate project communication efforts with frequent team meetings providing status reports with key metrics to stakeholders. Reviews security safeguards to determine that security concerns identified in approved policies, plans, and doctrine have been fully addressed. Provides status reports to the Deputy Assistant Administrator and Section Chiefs assign the Office of Information Systems regarding the utilization of computer software and automation.

Serves as a Contract Officer Technical Representative (COTR), entails reviewing deadlines for key deliverables and modification to the processes throughout the project life cycle. Responsible for the strategy surrounding policy analysis and recommendations of current Security Operational Plans, which consist of the evaluation and analysis of security and ADP support program information following the review on the effectiveness of programs and practices. Prepares project recommendations from a technical standpoint; based on the analysis of available technologies and system resources, while managing those management improvement efforts implemented to various task. Recommends, schedules, and performs IA system repairs, systems administration, and maintenance carefully ensures that all internal controls are established effectively utilize the office’s resources and assets.

OFFICE OF NAVAL INTELLIGENCE July 1998 – March 2009

Lead Petty Officer (Reserve) for the Counter Drug Division, I have supervised the division imagery analysis. Following the departure of the divisions' sole civilian imagery analyst, I assumed full responsibilities for the supervision of three petty officers. My duties involve conducting imagery and analysis and research within assigned geographic areas. I interpret, evaluate and integrate multi-sensor imagery and all sources intelligence. I am an authority in recognizing intelligence gaps, generating imagery collection requirements, and updating the systems that provide imagery. I prepare new or make revisions to imagery analyses, assessments or other products. In addition to the duties listed above, I prepare and produce reports, studies and briefings for a variety of audiences and continue to demonstrate effective written and oral communication skills.

SETA CORPORATION September 1997 – September 1999

Network Engineer. Responsibilities included monitoring more than 150 network devices such as Cisco and 3Com NetBuilder routers and Cisco CAT5500 switches using HP OpenView to troubleshoot multiple networks. Duties also included resolving remote network connections that involved T-1s, FNS and dial-in lines. Installed CPE devices generally such as telephones, routers, switches, residential gateways (RG), set-top boxes, fixed mobile convergence products internet access gateways that enable consumers to access Communications Service Providers' services and distribute them around their house via a LAN. . Experience with configuring, optimizing, and testing network devices

Provided second tier network support to users within the Pentagon and surrounding areas who were utilizing the Single Agency Manager (SAM) and Office of the Secretary of Defense (OSD) legacy networks. Previous duties included monitoring the Army broadband, performing network security duties, and installing and administering NetWare and Windows NT servers.

LITTON/PRC, INC. (DEA) July 1996 – September 1997

System Administrator. Windows NT 3.51 and Windows95 network administration for US Drug Enforcement Administration. Network and application support for 2,000 users. Supported 10 servers with RAID storage and FDDI connectivity. Administration of TCP/IP through DHCP and WINS. Novell GroupWise electronic mail administration. Installation, configuration and support of PC computer systems. Focal point for 20 DEA district office for network and application support in the WAN environment.

I-NET, INC. (DEA) October 1995 – July 1996

INTEGRATED MICROCOMPUTER SYSTEMS, INC. (DEA) October 1994 – September 1995

Senior Field Information Resource Specialist. Responsibilities included analyzing and troubleshooting with DEA's worldwide computer network. In doing so, I became very familiar with UNISYS Master and Cluster Workstations and CTOPEN Software for communicating. I have extensive experience with solving problems for DEA users on office automation hardware.

CRITICAL COMMUNICATION April 1994 – September 1994

Senior Field Engineer. Responsibilities included installing, troubleshooting and maintaining video and teleconferencing systems. Coordinated and implemented site survey and site preparations for Critical Communication customers. Produced an effective on-the-job training course for training the customers in the operation of Compression Labs Inc., VSI and British Telecom Systems.

COMPUTER SCIENCES CORPORATION November 1991 – April 1994

Technical Specialist. Extensive knowledge of X.25 Packet switching, Local/Wide Area Networks (LAN/WAN), analog and digital circuits switching, PCs and databases. Responsible for the installation of Consolidated Data Network (CDN) equipment comprised of BBN, Netrix, and AMNET concentrator Packet switching nodes. Coordinated and directed field technicians on the installation of CDN equipment at user locations. Coordinated hardware installation and networking of UNIX-based systems.

INFORMATION SYSTEMS COMMAND-PENTAGON (USAISC-P) May 1989 – November 1991

Shift Supervisor of Network Control Center (NCC). Possessed a strong technical background providing quality support to the U.S. Army's end user community, including TSO and CICs terminal and security support and PC hardware/software support. I improved the training documentation and course materials, which produced a quality-training product to be used for training. Trained 90% of subordinates on the daily operations of NCC. Supervised and trained personnel in the daily operations of the NCC.

HEADQUARTERS DETACHMENT, 52ND SIGNAL BATTALION May 1985 – May 1989

Station Technical Controller. Responsibilities included reporting to Defense Communication Agency Europe and 5th Signal Command for 17 Dial Central Offices, 10 Technical Control Facilities, 12 Telecommunication Centers, and 5 Satellite Terminals. Maintained all records and outages, updated the database as needed. Maintained and troubleshoot various CKT from 9.6K to 56K secure voice.

PROTOCOLS

ASYNC, BISNYC, SDLC/SNA, X.235, X.21, X.75, TCP/IP, DOCSIS 1.0

CRYPTO COMPONENTS

KG- 13, KG -84, KG-135, KYK-13s, KYK-15s, KOI-18s.

STU – III, STE equipment, Fastlanes, Taclanes, Key Generators, etc….

NETWORK MONITORING TOOL

HP Open View, LANDesk, Tivoli, Net IQ, Arcsight, Splunk, SourceFire, McAfee HIPS

SPECIAL TRAINING

Insyte (Secure Ninja), Alexandria, VA, -- Computer Hacking Forensic Investigator v8 ECC36136446056 (2016)

Global Knowledge, Arlington, VA – Certified Security Analyst (ECSA) EC - Council Course (2015)

Insyte (Secure Ninja), Columbia, MD -- Certified Ethical Hacker v8 ECC49383417094 (2015)

Insyte, Computer Training Center Washington DC -- ITIL® Foundation v3 (2012)

ISACA, Rolling Meadows, IL -- Certified Information Security Manager (CISM) (2012)

INFOSEC INSTITUE, Washington DC -- Certified Information Security Manager Course (CISM) (2010)

MANAGEMENT CONCEPTS, VA -- Master Project Management Certificate Program (2004)

VB UCM System Administrator (Wire Tapping) (2004)

Naval Instructor Training Course (2004)

UNITED STATES NAVY PETTY OFFICER LEADERSHIP COURSE, Washington, DC (2001)

TECH NOW, Landover, MD -- Introduction to UNIX and LINUX (2000)

TECH NOW, Landover, MD -- Introduction to Cisco Router Certification (2000)

USCONNECT, Columbia, MD -- Windows NT Workstation 3.51 course (August 1996)

USCONNECT, Columbia, MD -- Windows NT Server 3.51 course (December 1996)

UNISOFT TECHNOLOGIES, Silver Spring, MD -- Novell Certified NetWare Engineer (CNE) Course (May 1995 – July 1995)

STRAYER COLLEGE, Alexandria, VA -- Computer Information Diploma Course 62 Sem Hrs (1991)

UNITED STATES ARMY NON-COMMISSIONED OFFICERS ACADEMY, Fort Knox, Kentucky. Graduated 4 week leadership course in top 10% of class (1990)

US ARMY SIGNAL SCHOOL, Fort Gordon, GA -- Station Technical Controller Course (1984)

SECURITY CLEARANCE

Currently holding a Department of State Top Secret Clearance granted November 2014.

Currently holding a Drug Enforcement Administration Top Secret Clearance granted July 2013.

Currently holding a Department of Homeland Security Top Secret SCI granted July 2005.



Contact this candidate