Leo A. Dregier III
**** ****** **. ***** ****,, MD 21128 Primary 443-***-****
****@*****************.***
CAREER SUMARY
I have worked with 1000’s of companies over my career, always finding a way to make them more profitable by finding a reduction of expenses or an increase in Cash Flow Income. Since 1995, I’ve specialized in Consulting Services, Engineering, Information Technology Security, Health Care, and Web Based environments. Strong verbal and written skills with experience addressing the following internal Management: CEO, CFO, CSO, and CTO. I am experienced in Networking/Engineering, Project Management, Cisco IOS, Security, and Software / Hardware support. There is really, no project that I can’t handle. I’m a detailed problem solver and I use information and analytics to build my case.
EDUCATION
Certification Expertise
ISC2 CAP 2017
FITSI FITSM 2016
Analytics & Data Mastery – Digital Marketer 2016
Email Marketing Mastery – Digital Marketer 2016
Search Marketing Mastery – Digital Marketer 2016
Social & Community Mastery – Digital Marketer 2016
Optimization & Testing Mastery – Digital Marketer 2016
Content Marketing Mastery - Digital Marketer 2016
Conversion Funnel Mastery – Digital Marketer 2016
Paid Traffic Mastery - Digital Marketer 2016
ISSAP 2013
CRISC 2012
Penetration Testing with Backtrack 2012
Metasploit 2012
Wireless Hacking 2012
Linux+ / LPIC1 June 2012
E Chief Information Security Officer 2011
CISA December 2011
E Cyber Marketing April 2011
E Project Management for IT Security 2011
E DRP (Disaster Recovery) April 2011
E CIH (Incident Handling) March 2011
E CSA\LPT March 2011
E CHFI (Forensic Investigator) June 2010
CISM December 2010
Certified Ethical Hacker (v3-v9) September 2010
GAWN (SANS Wireless) October 2008
GCIH (SANS) September 2007
LM21 (Six Sigma) Green Belt Training 2006
Sourcefire 3D Solutions 4.0 November 2005
Snort Rules 2.4 November 2005
MCSA April 2002
(ISC2) CISSP July 2002
GIAC (GGSC-0100) September 2002
SCP-Tactical Perimeter March 2002
SCP-Strategic Infrastructure March 2002
MCSE 2000 March 2001
CCDA August 2001
CCNP December 2001
MCSE 4.0, MCP+I March 2000
MCT March 2000
Network+ May 2000
CCNA July 2000
MCP December 1999
National Defense University CISO Program 2008-2009
Capella University Computer Science Degree Program 2003-2009
Johns Hopkins University, Baltimore MD Engineering Science Program 1997-2003
Essex Community College, Baltimore MD Associate of Science Degree 1995-1998
EXPERIENCE
Office of the Comptroller of the Currency Washington DC
Security Operations Center Architect June 2018- June 2019
Conduct baseline analysis of current SOC processes and practices for the purposes of gap analysis. Measure KPI, KRI, and KGI of existing practices and plot a road map to a future desired state based on the business need. Managed and Trained existing staff to optimize SOC processes and procedures. Optimized an operating budget for approximately 25 million / 5 year period. Performed ROI analysis for business processes and increased the ROI for the prime contractor. Increased the CPAR rating from a 1/5 to a 4.5/5 within 1 year. Completed onboarding for 9 new analysts / engineers.
UltimateTrainerAcademy.com Baltimore, MD
Business Developer January 2010- Present
Developed Social Networking learning portal which is the prerequisite for the delivery of boot camp style workshops.
The Code Of Learning Baltimore, MD
Business Developer January 2005- Present
Developed over 20 online courses, classroom content, test questions and serve as a subject matter expert for any computer certification related to computer security. Please visit www.TheCodeOfLearning.com for more.
The Security Matrix, LLC Baltimore, MD
Independent Contractor January 1995- Present
I use computer security models, principles, methodologies, references to build a financial case for why companies need to focus on Contingency Planning and Continuity of Operations
A Security Solutions Consultant, Develop policies and procedures related to data protection mechanisms. Plan, organize and orchestrate risk management and customer supporting non-repudiation services. Determine security vulnerabilities from a variety of modern exploit tools. IT Consultant focusing on fixing hardware related problems, software upgrades and rollouts, network repair, upgrades and purchasing, wiring documentation and design. Configuration and support for Intrusion Detection Systems, ISA server, Firewalls, and Network Security. Securing ISA bastion hosts. Implement VPN solutions for clients. Proxy server tasks include customizing ISA LAT table, Web publishing lockdown, SSL pass-through, Static routing, VPN pass-through, System Hardening, Controlling of bandwidth and access rules, Troubleshooting Packet and User rules in addition to setting up alert and monitoring. Network Monitoring was used to do protocol analysis.
Centers for Medicaid and Medicare Woodlawn, MD
Computer Security Incident Response Manager December 2005- October 2008
Serve as the CSIRC Team Lead responsible for the development of the incident response (IR) phases and establishing an IR capability. Reactive Services include alerts and warnings, forensic evidence collection, packet analysis, incident analysis, evidence tracking in addition to incident response coordination, support, vulnerability handling and artifact analysis. Proactive services include announcements, System Hardening of Windows and Open Source platforms, technology watch, security information dissemination, audits, infrastructure review, and implementation of best practices, scanning, development of security tools, management of IDS, all reporting and policy and procedure development.
Department of Treasury New Carrolton, MD
Independent Contractor / Senior Analyst February 2005- December 2005
Manage 150 Network Intrusion Detection Sensors (NIDS) and several hundred Host Intrusion Detection Sensors (HIDS) through ArcSight Manager and Internet Security Systems Scanners data mining tools for graphical analysis. Perform Snort IDS rule sets along with firewall analysis and log management. Perform cyber incident management through triage. Cyber incident consists of malicious code, probe scans, phishing scams, spam filtering (WebSense), and NetCache analysis. Daily responsibilities consist of management of computer security incident response center directly related to NIST 800-3. Participated in information sharing with several agencies based on any number of well known computer security information sources to include NSA, Department of Treasury, Tax Inspector General for Tax Administration (TIGTA), NetSec and many others. Extensive hands on implementation of Firewalls, IDS’s, Proxy Servers, Routing Access Control Lists and perimeter defense technologies.
U.S. Department of Labor Washington, DC
Operational Security Officer July 2003- April 2004
Primary responsibility included the implementation, management and effectiveness of Polices, Procedures, and Guidelines for all Operational and Research & Development strategies. This included server hardening, firewall ACL review, Vulnerability Scanning & Penetration testing with Retina and ISS. Group Policy Review, Intrusion Detection Management, Password effectiveness, Backup Strategy, Virus Mitigation management, Incident Response Help Desk Center and Certification and Accreditation of systems to federal regulations and legislations. Coordinated with Senior Management and Contracting Managers.
U.S. Department of State Washington, DC
Network Security Analyst 1 July 2002- July 2003
Daily responsibilities include software and hot fix upgrades, monitoring with analysis to baseline performance measures via NetIQ for a 77,000-user network. Resolve trouble tickets. Address security needs for Intranet and Extranet. Assist with the migration from a hybrid Exchange 5.5 and FADS (Foreign Affairs Directory Service) to a native mode Active Directory and Exchange 2000 infrastructure. Provide recommendations based on the NIST and DS standards. Present MCSE level material. Documentation of change requests, network & security policy changes; in addition to presenting areas of concern to upper management.
ISEEMAN Computers Baltimore, MD
IT Course Trainer / Network Engineer August 2000-May 2002
Directly responsible for the Post-Sales Information Technology Training of which accrued to Million dollars annually. Microsoft and Cisco course designer responsible for the research of the most current technology and development of the course plan; Microsoft course program include Windows 2000 MCSE focusing on implementing and designing of Microsoft Active Directory DNS with a Cisco Networking infrastructure; Cisco design includes building access and distribution layer infrastructure to support a variety of routing protocols for both Distance Vector and Link State Protocols for TCP/IP Networks; Provide analysis through Virtual Route software to track network trends and patterns to better suit traffic flow; Virtual Machine Development supports a complete Virtual Network Solution for an enterprise isolated research environment; Identify networking problems and risk areas and mitigate their impact. Implement Manage, and Configure ISA and Proxy servers for production Networks.
Advanced Computer Technology Training Baltimore, MD
Network Engineer / Microsoft, CompTIA and Cisco Instructor November 1999-August 2000
Tested hardware and software for an enterprise networking infrastructure; Used automated methods of install to include Norton Ghost, unattended and imaging IntelliMirror technology; Built servers and clients; Installed and upgraded applications which included but were not limited to Office, Adobe Photoshop Suite, and Visio; Installed and Configured VPN polices with Routing and Remote Access Service (RAS & RRAS) for 9.x & NT clients; RIP, IGRP, OSPF, Static, Dynamic and Default routes on several Cisco Platforms.
Johns Hopkins School of Medicine Baltimore, MD
Immunogenetic Technologist December 1996- May 1999
Created and modified Excel and Access databases to systematically engineer work flow and analysis while coordinating with programmers to write programs for more efficient analysis of environmental data. I also assisted with the training of new immunogenetic technologists.
PROFILE
Clearance: Previously held secret and OMB Level 6-12/2005
Background investigation- 7/2003 (Secret)
Relocate: No, Travel assignments accepted.
Preferred Location: Baltimore-Washing Metro Area
Availability: 24Hr Incident Response Hotline Available
Travel: Minimal
Education: Certificate Programs / Degree Programs
Years of Computer Experience: 22 (1995-2017)
Work Authorization: U.S Citizen
Preferred Employment Type: All, Corp-to-Corp, 1099
Minimum Salary Requirement: Customer Specific, It depends…
Disciplines: Consulting Services, Engineering, Information Technology Security, Health Care, and Web Based Penetration Testing
Corporate Skills: A strong verbal and written skill, which fluently addresses the following roles: CEO, CFO, CSO, And CTO.
ACCREDIDATIONS & More
Technical Editor Packt.com Books 2020
Technical editor of the Infosec Strategies and Best Practices Book
2017 Cybersecurity Excellence Awards 1st Place Tie
Recognized for Professional Distinction www.cybersecurity-excellence-awards.com
EC-Council Instructor of the Year – Runner Up 2014
Recognized for Professional Distinction
Princeton Global Network International 100 Magazine Honors Edition 2014
Recognized for Professional Distinction
Federal IT Security Institute
Curriculum Developer
McGraw Hill
Technical Editor for various books
CNN
Appeared on CNN discussing Operation Shady Rat
University of California – Irvine
Board of Directors
Certification Magazine
Article Published on the 4 major areas of certification, which consist of Studying, Reading, Class time and Hands-On-Experience.
Microsoft Certified Systems Engineer Achiever
Early Achiever: Proved advanced skill in development of system design and management for the Microsoft Windows 2000 Premier MCSE certification.
Free Online Dictionary of Computing
Guest editor: Updating computer terms and definitions for the Imperial College of Science, Technology and Medicine.
Martial Arts
2nd Degree Black Belt Instructor currently presenting seminars, speeches and live demonstrations, as well as
Teaching; Involved in Martial Arts since 1987; currently a member of the “North American Black Belt Hall of
Fame.”
2003 Computer Security Institute Member
COMPUTER PROFICIENCY:
HAREWARE:
Layer 3 Devices: Cisco Access Servers (AS5x00), 2600 Cisco Routers 800, 1600, 2500, 2600, 3600, 4000, 7000, 7513, 8510, and 12000.
Layer 2 Devices: ISDN Routers/TA's, Bridges, Switches, Cisco Series Switches: 1900, 2900, 3900, 5000, and 6000.
Layer 1 Devices: cable connectors, cable testers, repeaters, hardware assembly, Active/Passive Hubs, electrical and optical readers, Time Domain Reflectometers
Security Devices: PIX 501, PIX 515, and PIX 525, Linksys routers and firewalls
Desktop and Laptops: Compaq, Dell, Sony, and Custom Builds, Firmware
SOFTWARE:
Networking Cisco IOS, Cisco Works, NetRanger, Web based management tools, Windows 2000/NT, Sniffers, Protocol Analyzers, Performance Management tools, Load Balancers, and Failover
Routing Protocols Knowledge RIP, IGRP, EIGRP, OSPF, BGP, IS/IS-ES
Other routed / Bridge protocols TCP/IP, IPX/SPX, and AppleTalk
Telco: Technologies Asynchronous, Synchronous, ISDN, PRI, E1, T1/T3, X.25, Frame Relay.
VPN tunneling L2F, L2TP, PPTP
Dial / Authentication RADIUS, TACACS+, AAA, and Kerberos
Network Analysis NG Sniffer, Wan Sniffer, DNS, DHCP, and BootP
Operation System Windows 95/98, Windows NT Server 4.0, 2000 Server, Windows 2000 Advanced Server, 2000 Professional, Windows XP home, Windows XP Professional.
Wan technologies DDR, ATM LANE, Token-Ring, FDDI, PPP, ISDN, X.25, FRAME-RELAY, HDLC, SMDS, ASYNC, SYNC, and LAPB
Applications Office 97, Office 2000 including, Excel, Access, Word, PowerPoint, Outlook 2000, AutoCAD 12-13, Visio Enterprise, Illustrator, and Adobe Photo Software, Flash 5, VM Ware and a variety of others for baseline and analysis, In addition, I have tested several applications and tools to meet purchasing requirements.
SECURITY:
Hacking Software / Tools I am fluent with over 1700 penetration tools that cover nearly all aspects of computer Hacking and Penetration Testing.
Security Windows NT security, Certificate Authority, PKI, IKE, SSL, IPSec, Physical Security, Intrusion Detection, Firewalls Virus Detection, Auditing and Accounting
Security Practices Privacy, integrity, and non-repudiation, Information Assurance, Vulnerability Assessment, Authentication systems
Security Concepts and Techniques Social Engineering, Reconnaissance, Network Penetration, Avoiding Detection, NT Architecture
Security Tools NT Resource Kit, Footprinting techniques, DNS interrogation, Port scanners, Ping sweeps, NMAP, strobe, UDP_scan, netcat, NetScan Tools, SuperScan, Winscan, cheops, Security Registry settings, dumpsid, user2sid/sid2user, enum, Policy editors/group policy, & 1,700 More! etc…
Network Scanning Tools SuperScan, Nmap, NmapFE, NmapNT, Pinger, Strobe, Nessus, UDPFlood.ese, NetScan Tools Pro, NetCat,
Network Sniffer and Routing Tools Network Monitor, Ethereal, TCPdump, Windump, WinPcap 2.3, Visual Route, NeoTrace
Password Tools L0pht Crack 2.5, L0pht Crack LC4, Crack 5.0, John the Ripper, Snadboy's Revelation
Trojan Horses and Exploit Tools Netbus, Netbus Pro, SubSeven, GetAdmin, Forensics and Keyboard Logging Tools, NTFSDOS, KeyLoggger, Security Keyboard, Keystroke Logger, Klogger
Intrusion Detection Tools ISS Internet Scanner 6, ISS System Scanner 6, SNORT. IDS Center
Firewalls Checkpoint NG, ISA Server 2000, Router Firewalls,
Security Administration Tools IPv6 Technology, Webmin, Tripwire, Bastille, pwlib-1.3.3-5.i386.rpm, perl-Tk-800.023-9mdk.i586.rpm, Windows 2000 Gold Standard, PuTTY.exe, HiSecWeb security template, IIS lockdown tool, HFNetChk tool
GOVERNMENT STANDARD and LEGISLATION
NIST Special Publications, 800-x (to many to list)
Other NIST special publications referenced
OMB (Office of Management and Budget) Circular A-130, III, 8B3
FISCAM (Federal Information System Control Audit Manual)
SP-2.1, AC-2, 2.2,3.23.4, CC 2.1, SP 5-1, SS 1.2, SP-1, SD-2.1
FIPS (Federal Information Processing Standard
IRMRA (Information Technology Management Reform Act )
GISRA(Government Information Security Reform Act)
Public Law 93-579 Privacy Act of 1974, December 1974
Public Law 90-23 Freedom of Information Act, 1980
Health Insurance Portability and Accountability Act of 1996
Public Law 100-235 The Computer-Security Act of 1987, January 1988
Paperwork Reduction Act of 1980, as amended in 1995
OMB Circular 123, June 1995
OMB Circular A-130,“Management of Federal Information Resources,” Appendix III,“ Security of Federal Automated Information Resources” February1996
Information Technology Management Reform Act (ITMRA) (Clinger Cohen Act) of 1996 (Section 5123)
Presidential Decision Directive 63, “Protecting America’s Critical Infrastructure” May 1998
Public Law 99-474
LOCAL AREA NETWORK EXPERIENCE
Active Directory Design and implementation.
Bridging and Switching Technology, Spanning Tree Protocol, VLAN technology.
Proficient with installations and various configurations of most Microsoft O.S. platforms (DOS 6.22, Win 95/98, NT 4.0 Workstation & Server, 2000 Professional & Advanced Server, Site Server 2.0, Exchange 5.5 & 2000, Proxy Server 2.0, ISA, XP Professional).
Configured NT Servers for AD, RRAS, IIS, DHCP, Certificate Authority, Network Monitor, DNS and WINS services.
Imaging software included Norton Ghost, Remote Installation Services (RIS) and Unattended Installs for the role out of client computers.
WIDE AREA NETWORK EXPERIENCE
Installed and Configured VPN polices with Routing and Remote Access Service (RAS & RRAS) for 9.x & NT clients.
Implemented Access Lists and Firewalls on Routers and Access Servers.
Configuring and troubleshooting RIP, IGRP, OSPF, Static, Dynamic and Default routes on several Cisco Platforms.
Aid in design of X.25, Frame Relay, xDSL, and ISDN networks.
Cabling and assembly of Cisco products.
TECHNICAL COURSES AUTHORED:
Other Courseware Developed
Penetration testing with Backtrack
Wireless Penetration Testing
Cisco Related
Introduction to Cisco Networking Devices
Introduction to Cisco Router Configuration
Building Scalable Cisco Networks
Building Cisco Multilayer Switched Networks
Building Cisco Remote Access Networks
Cisco Internetworking Troubleshooting
Cisco Internetworking Design
Cisco Certified Internetworking Expert Written
Managing Cisco Network Security
ISC2
CISSP
CAP
ISEEP
ISSMP
ISSAP
EC-Council
CEHv5-v8
Incident Handling
CHFI
CCISO
ECSA
Microsoft Related
70-210 Professional
70-215 Server
70-216 Infrastructure
70-217 Active Directory
70-219 Designing Active Directory
70-220 Designing Security
70-221 Designing Infrastructure
70-218 MCSA Network Administration
70-224 Exchange 2000
CompTIA
Network+
I-Net+
Security+
A+
ISACA
CISM
CISA
CRISC
CGEIT
NETWORKING:
Familiar with the following network technologies:
1.General Knowledge
Data encapsulation, layering, and most protocol implementation; LAN/WAN media to include Virtual circuit services, Windowing, Routing algorithms, Switching algorithms, Network security and Management.
2.Corporate Technologies
Desktop includes: Ethernet II, 802.3 and 802.5, 802.2 LLC1/LLC2 Layer, SNAP, NetBIOS/NetBEUI, IPX, and AppleTalk.
Internet includes TCP/IP, APPN, SDLC, RSRB, TN3270, Identify and Implement routing and bridging implications of each fluently such as TCP/IP routing protocol RIP v1, RIP v2, OSPF, IS-IS, EGP, BGP, Cisco's IGRP, EIGRP.
Security: IPSec, ISAKMP Auditing, Dial up Security, Service Accounts, Password Encryption.
WAN: ISDN, Frame Relay, ATM, X.25, HDLC, and PPP.
3.Other Skills
Networks design, project management, provisioning, installation, troubleshooting, training, network management, market analysis, technical writing & documentation
REFERENCES/Testimonials: Over 10,000 available upon request.