Post Job Free

Resume

Sign in

Cyber Security System Management

Location:
Powder Springs, GA
Salary:
30
Posted:
December 25, 2023

Contact this candidate

Resume:

JOSHUA MERRITT

Powder Springs, GA ***** 817-***-**** ad17kh@r.postjobfree.com

Network Engineer / Cyber-Security Analyst

Highly skilled cybersecurity professional with extensive experience in various fields. My expertise includes open-source intelligence, system management and deployment, vulnerability detection, and preventative action. I work closely with colleagues worldwide to deliver exceptional quality control evaluations to meet our client's diverse information requests. I have also developed and implemented system management strategies for various legal entities. My focus on intelligence gathering has provided crucial case-supporting evidence. I work with new and ongoing clients, ensuring their specific demands are met through system management and monitoring. I am proficient in VMWare and have successfully deployed usage for thin client networks, virtual machines, and virtualized networks. Additionally, I have designed information security management frameworks in compliance with ISO 27001 and NIST standards.

AREAS OF EXPERTISE

• Project Management

• Telecommunications

• Solution Innovation

• Regulatory Compliance

• Time Management

• Red Team Operations

• Network & Design

• Analytical Thinking

• Client Relations

PROFESSIONAL EXPERIENCE

Cyber Security Researcher / Programmer 05/2022 – Present Faegin & Associates

• Analyzed security requirements specifications against implementation, ensuring accurate and timely responses to client requests.

• Executed penetration testing and reverse engineering using tools such as IDA Pro and Ghidra.

• Communicated complex technical findings and provided remediation guidance and recommendations to clients.

• Developed skills by researching new attack vectors, vulnerabilities, and exploits.

• Managed Linux and other embedded operating systems, ensuring system security.

• Collaborate with external auditors, NIST representatives, and regulatory bodies to maintain and enhance the company's compliance status.

• Conduct internal audits and collaborate with NIST to enhance processes, fostering a culture of continuous improvement.

Programmer

PC Tweaks 05/2020 – 05/2022

• Created caching mechanisms to improve application performance and fixed performance defects, resulting in a 10+ times increase in performance in most cases.

• Design and develop an API for pricing and Method's Marketplace, a new permissions system

• Creation of web applications using Java and Javascript, as well as UI/UX using Python and Delphi

• Implement Sass to CSS compilation on the build server

• Develop a new build system using Team City, Web Deploy, and MSBuild which automated code deployment and improved the quality of the build being deployed to production.

• Introduced unit testing into the company using the NUnit framework and Moq.

• Implement and maintain NIST and ISO compliance frameworks for software development processes, ensuring adherence to Cybersecurity and quality management standards

Programming skills: Assembler, Embedded C, Pascal - Delphi, C, VB.Net, Interbase, Firebird, Coracle, Foxpro/Visual Foxpro, Base III-IV, Paradox, MS-SQL server, MS-SQL, ODBC, XML, Encrypted Hex Data Files, C#, Web API, MVC, ADO.NET, LINQ, Dapper, Python, C++, JAVA, JAVASCRIPT

President

Cyberoptyx 01/2018 – 05/2020

I have worked with international cybersecurity experts to conduct quality control assessments and utilize open-source intelligence to fulfill client information requests. Using various tools, such as VMWare, Defender, Sentinel ONE, and N-Able, to ensure comprehensive system security, including deploying and managing O365 systems, maintaining internal network integrity, managing servers for government systems, and innovating cable management solutions 3D-printed designs.

• Collaborated with various global cybersecurity professionals, completing quality control evaluations to ensure accurate and timely responses to client requests for information.

• Use of open-source intelligence and various software to fulfill customers’ requests.

• Devised and executed system management for various legal entities to assist in intelligence gathering designed to provide critical case-supporting evidence.

• Work with new and consistent clients on a wide range of issues, from system management and monitoring ensuring client requests and demands are fulfilled to their requirements.

09/2017 – 11/2019

Cyber Operations, VP

Allied Security Operations Group, Dallas, TX

Our start-up private intelligence company excels in developing and enhancing an information security management framework aligned with ISO 27001 and NIST standards, ensuring seamless integration of evolving legal requirements. We provide strategic enterprise risk management reporting to enterprise risk teams, senior business leaders, and the board of directors, while also offering OSINT data collection, analysis, and evidence for litigation, pattern of life analysis, and competitive business intelligence.

• Developed and enhanced information security management framework based on International Organization for Standardization (ISO) 27001 and National Institute of Standards and Technology (NIST) standards to integrate and normalize various and ever-changing requirements resulting from laws, bars, and regulations.

• Developed metrics and reporting framework to provide the status of the information security program to enterprise risk teams, senior business leaders, and the board of directors as part of a strategic enterprise risk management program.

• Oversaw collection and disbursement of relevant OSINT data pertinent to client needs, highlighting evidence for litigation, pattern of life analysis, and competitive business intelligence.

• Researched SCADA security in areas ranging from Side Channel access to vulnerability testing within known systems, built Faraday cages, and created new machine languages to obfuscate communications.

• Cataloged APT teams ranging from Cyber Berkut to APT 32, 33, and 34 that target SCADA systems and discovered their means and attack methods. Intern 09/2013 – 08/2017

Cyber Defense Labs

During my internship at Cyber Defense Labs, I collaborated closely with CEO Mike Saylor and Computer Scientist Kevin Henson, honing my expertise in the realms of cyber security and electronics design. This experience encompassed mastering the art of identifying threats, mitigating risks, and establishing Standard Operating Procedures, while also instructing on topics like Open-Source Intelligence collection, Pattern of Life analysis, programming in diverse languages, and guiding students in the Cyber Patriot Program within the DFW area to enhance their cyber skills for future roles in intelligence agencies and the US Military, with hands-on training in tools such as PF Sense, Splunk, Maltego, Kali Linux, and other cutting-edge systems.

• Working with CEO Mike Saylor and Computer Scientist Kevin Henson, I worked to hone the trades of the craft. Learning how to Organize and turn into Standard operating procedures I was taught how to identify threats, fuzz software, mitigate risks and teach others.

• While at CDL, I had the opportunity to teach classes at colleges in areas from Open-Source Intelligence collection, Pattern of life analysis, known methods be foreign intel services and hacker groups as well as programming in various languages.

• Taught students in the Cyber Patriot Program in the DFW area, a summer program helping talented high school students become better cyber operators before they went on to their careers in various intelligence agencies and the US Military.

• Learned and taught students how to use programs like PF Sense, Splunk, Maltego, Kali Linux, and other systems.

Wheeled Vehicle Mechanic 11/2003 – 08/2013

U.S. Army, Various Worldwide Locations

Maintained and ensured the 100% operational capability of a $250 million specialized vehicle fleet, overseeing multiple Joint operations, diplomatic activities, and fostering civilian-military partnerships. In combat deployments to Iraq and Afghanistan, they were involved in convoy security, route clearance, explosive ordnance disposal, foreign relations, and ensuring the safety of their fellow soldiers, all while mentoring and training soldiers in preventative maintenance and combat tasks.

• Responsible for maintaining a fleet of vehicles, ensuring 100% mission capability which were accountable to the Post Commander.

• Deployed multiple times in Joint operations groups performing mission-critical taskings to ensure operational capabilities. Assisted in local Diplomatic activities to work with Local Nationals to train and maintain military and civilian partnerships.

• Mentored and trained Soldiers in preventative maintenance and assisted in Training Soldier’s tasks in combat environments.

• Combat Deployments to Iraq and Afghanistan involved in Convoy security, Route Clearance, Explosive Ordnance Disposal, Foreign relations as well as safety of fellow soldiers.

EDUCATION

• Information Technology Security & Administration 07/2022 MyComputerCareer, Arlington, TX

• AS – Network and Systems Administration 09/2016

ITT Technical Institute, Arlington, TX

CompTIA A+ Certification Lic. # COMP001021157922



Contact this candidate