Post Job Free

Resume

Sign in

Digital Marketer Project Management

Location:
Dundalk, MD
Posted:
December 29, 2023

Contact this candidate

Resume:

Leo A. Dregier III

**** ****** **. ***** ****,, MD 21128 Primary 443-***-****

ad2a62@r.postjobfree.com

CAREER SUMARY

I have worked with 1000’s of companies over my career, always finding a way to make them more profitable by finding a reduction of expenses or an increase in Cash Flow Income. Since 1995, I’ve specialized in Consulting Services, Engineering, Information Technology Security, Health Care, and Web Based environments. Strong verbal and written skills with experience addressing the following internal Management: CEO, CFO, CSO, and CTO. I am experienced in Networking/Engineering, Project Management, Cisco IOS, Security, and Software / Hardware support. There is really, no project that I can’t handle. I’m a detailed problem solver and I use information and analytics to build my case.

EDUCATION

Certification Expertise

ISC2 CAP 2017

FITSI FITSM 2016

Analytics & Data Mastery – Digital Marketer 2016

Email Marketing Mastery – Digital Marketer 2016

Search Marketing Mastery – Digital Marketer 2016

Social & Community Mastery – Digital Marketer 2016

Optimization & Testing Mastery – Digital Marketer 2016

Content Marketing Mastery - Digital Marketer 2016

Conversion Funnel Mastery – Digital Marketer 2016

Paid Traffic Mastery - Digital Marketer 2016

ISSAP 2013

CRISC 2012

Penetration Testing with Backtrack 2012

Metasploit 2012

Wireless Hacking 2012

Linux+ / LPIC1 June 2012

E Chief Information Security Officer 2011

CISA December 2011

E Cyber Marketing April 2011

E Project Management for IT Security 2011

E DRP (Disaster Recovery) April 2011

E CIH (Incident Handling) March 2011

E CSA\LPT March 2011

E CHFI (Forensic Investigator) June 2010

CISM December 2010

Certified Ethical Hacker (v3-v9) September 2010

GAWN (SANS Wireless) October 2008

GCIH (SANS) September 2007

LM21 (Six Sigma) Green Belt Training 2006

Sourcefire 3D Solutions 4.0 November 2005

Snort Rules 2.4 November 2005

MCSA April 2002

(ISC2) CISSP July 2002

GIAC (GGSC-0100) September 2002

SCP-Tactical Perimeter March 2002

SCP-Strategic Infrastructure March 2002

MCSE 2000 March 2001

CCDA August 2001

CCNP December 2001

MCSE 4.0, MCP+I March 2000

MCT March 2000

Network+ May 2000

CCNA July 2000

MCP December 1999

National Defense University CISO Program 2008-2009

Capella University Computer Science Degree Program 2003-2009

Johns Hopkins University, Baltimore MD Engineering Science Program 1997-2003

Essex Community College, Baltimore MD Associate of Science Degree 1995-1998

EXPERIENCE

Office of the Comptroller of the Currency Washington DC

Security Operations Center Architect June 2018- June 2019

Conduct baseline analysis of current SOC processes and practices for the purposes of gap analysis. Measure KPI, KRI, and KGI of existing practices and plot a road map to a future desired state based on the business need. Managed and Trained existing staff to optimize SOC processes and procedures. Optimized an operating budget for approximately 25 million / 5 year period. Performed ROI analysis for business processes and increased the ROI for the prime contractor. Increased the CPAR rating from a 1/5 to a 4.5/5 within 1 year. Completed onboarding for 9 new analysts / engineers.

UltimateTrainerAcademy.com Baltimore, MD

Business Developer January 2010- Present

Developed Social Networking learning portal which is the prerequisite for the delivery of boot camp style workshops.

The Code Of Learning Baltimore, MD

Business Developer January 2005- Present

Developed over 20 online courses, classroom content, test questions and serve as a subject matter expert for any computer certification related to computer security. Please visit www.TheCodeOfLearning.com for more.

The Security Matrix, LLC Baltimore, MD

Independent Contractor January 1995- Present

I use computer security models, principles, methodologies, references to build a financial case for why companies need to focus on Contingency Planning and Continuity of Operations

A Security Solutions Consultant, Develop policies and procedures related to data protection mechanisms. Plan, organize and orchestrate risk management and customer supporting non-repudiation services. Determine security vulnerabilities from a variety of modern exploit tools. IT Consultant focusing on fixing hardware related problems, software upgrades and rollouts, network repair, upgrades and purchasing, wiring documentation and design. Configuration and support for Intrusion Detection Systems, ISA server, Firewalls, and Network Security. Securing ISA bastion hosts. Implement VPN solutions for clients. Proxy server tasks include customizing ISA LAT table, Web publishing lockdown, SSL pass-through, Static routing, VPN pass-through, System Hardening, Controlling of bandwidth and access rules, Troubleshooting Packet and User rules in addition to setting up alert and monitoring. Network Monitoring was used to do protocol analysis.

Centers for Medicaid and Medicare Woodlawn, MD

Computer Security Incident Response Manager December 2005- October 2008

Serve as the CSIRC Team Lead responsible for the development of the incident response (IR) phases and establishing an IR capability. Reactive Services include alerts and warnings, forensic evidence collection, packet analysis, incident analysis, evidence tracking in addition to incident response coordination, support, vulnerability handling and artifact analysis. Proactive services include announcements, System Hardening of Windows and Open Source platforms, technology watch, security information dissemination, audits, infrastructure review, and implementation of best practices, scanning, development of security tools, management of IDS, all reporting and policy and procedure development.

Department of Treasury New Carrolton, MD

Independent Contractor / Senior Analyst February 2005- December 2005

Manage 150 Network Intrusion Detection Sensors (NIDS) and several hundred Host Intrusion Detection Sensors (HIDS) through ArcSight Manager and Internet Security Systems Scanners data mining tools for graphical analysis. Perform Snort IDS rule sets along with firewall analysis and log management. Perform cyber incident management through triage. Cyber incident consists of malicious code, probe scans, phishing scams, spam filtering (WebSense), and NetCache analysis. Daily responsibilities consist of management of computer security incident response center directly related to NIST 800-3. Participated in information sharing with several agencies based on any number of well known computer security information sources to include NSA, Department of Treasury, Tax Inspector General for Tax Administration (TIGTA), NetSec and many others. Extensive hands on implementation of Firewalls, IDS’s, Proxy Servers, Routing Access Control Lists and perimeter defense technologies.

U.S. Department of Labor Washington, DC

Operational Security Officer July 2003- April 2004

Primary responsibility included the implementation, management and effectiveness of Polices, Procedures, and Guidelines for all Operational and Research & Development strategies. This included server hardening, firewall ACL review, Vulnerability Scanning & Penetration testing with Retina and ISS. Group Policy Review, Intrusion Detection Management, Password effectiveness, Backup Strategy, Virus Mitigation management, Incident Response Help Desk Center and Certification and Accreditation of systems to federal regulations and legislations. Coordinated with Senior Management and Contracting Managers.

U.S. Department of State Washington, DC

Network Security Analyst 1 July 2002- July 2003

Daily responsibilities include software and hot fix upgrades, monitoring with analysis to baseline performance measures via NetIQ for a 77,000-user network. Resolve trouble tickets. Address security needs for Intranet and Extranet. Assist with the migration from a hybrid Exchange 5.5 and FADS (Foreign Affairs Directory Service) to a native mode Active Directory and Exchange 2000 infrastructure. Provide recommendations based on the NIST and DS standards. Present MCSE level material. Documentation of change requests, network & security policy changes; in addition to presenting areas of concern to upper management.

ISEEMAN Computers Baltimore, MD

IT Course Trainer / Network Engineer August 2000-May 2002

Directly responsible for the Post-Sales Information Technology Training of which accrued to Million dollars annually. Microsoft and Cisco course designer responsible for the research of the most current technology and development of the course plan; Microsoft course program include Windows 2000 MCSE focusing on implementing and designing of Microsoft Active Directory DNS with a Cisco Networking infrastructure; Cisco design includes building access and distribution layer infrastructure to support a variety of routing protocols for both Distance Vector and Link State Protocols for TCP/IP Networks; Provide analysis through Virtual Route software to track network trends and patterns to better suit traffic flow; Virtual Machine Development supports a complete Virtual Network Solution for an enterprise isolated research environment; Identify networking problems and risk areas and mitigate their impact. Implement Manage, and Configure ISA and Proxy servers for production Networks.

Advanced Computer Technology Training Baltimore, MD

Network Engineer / Microsoft, CompTIA and Cisco Instructor November 1999-August 2000

Tested hardware and software for an enterprise networking infrastructure; Used automated methods of install to include Norton Ghost, unattended and imaging IntelliMirror technology; Built servers and clients; Installed and upgraded applications which included but were not limited to Office, Adobe Photoshop Suite, and Visio; Installed and Configured VPN polices with Routing and Remote Access Service (RAS & RRAS) for 9.x & NT clients; RIP, IGRP, OSPF, Static, Dynamic and Default routes on several Cisco Platforms.

Johns Hopkins School of Medicine Baltimore, MD

Immunogenetic Technologist December 1996- May 1999

Created and modified Excel and Access databases to systematically engineer work flow and analysis while coordinating with programmers to write programs for more efficient analysis of environmental data. I also assisted with the training of new immunogenetic technologists.

PROFILE

Clearance: Previously held secret and OMB Level 6-12/2005

Background investigation- 7/2003 (Secret)

Relocate: No, Travel assignments accepted.

Preferred Location: Baltimore-Washing Metro Area

Availability: 24Hr Incident Response Hotline Available

Travel: Minimal

Education: Certificate Programs / Degree Programs

Years of Computer Experience: 22 (1995-2017)

Work Authorization: U.S Citizen

Preferred Employment Type: All, Corp-to-Corp, 1099

Minimum Salary Requirement: Customer Specific, It depends…

Disciplines: Consulting Services, Engineering, Information Technology Security, Health Care, and Web Based Penetration Testing

Corporate Skills: A strong verbal and written skill, which fluently addresses the following roles: CEO, CFO, CSO, And CTO.

ACCREDIDATIONS & More

Technical Editor Packt.com Books 2020

Technical editor of the Infosec Strategies and Best Practices Book

2017 Cybersecurity Excellence Awards 1st Place Tie

Recognized for Professional Distinction www.cybersecurity-excellence-awards.com

EC-Council Instructor of the Year – Runner Up 2014

Recognized for Professional Distinction

Princeton Global Network International 100 Magazine Honors Edition 2014

Recognized for Professional Distinction

Federal IT Security Institute

Curriculum Developer

McGraw Hill

Technical Editor for various books

CNN

Appeared on CNN discussing Operation Shady Rat

University of California – Irvine

Board of Directors

Certification Magazine

Article Published on the 4 major areas of certification, which consist of Studying, Reading, Class time and Hands-On-Experience.

Microsoft Certified Systems Engineer Achiever

Early Achiever: Proved advanced skill in development of system design and management for the Microsoft Windows 2000 Premier MCSE certification.

Free Online Dictionary of Computing

Guest editor: Updating computer terms and definitions for the Imperial College of Science, Technology and Medicine.

Martial Arts

2nd Degree Black Belt Instructor currently presenting seminars, speeches and live demonstrations, as well as

Teaching; Involved in Martial Arts since 1987; currently a member of the “North American Black Belt Hall of

Fame.”

2003 Computer Security Institute Member

COMPUTER PROFICIENCY:

HAREWARE:

Layer 3 Devices: Cisco Access Servers (AS5x00), 2600 Cisco Routers 800, 1600, 2500, 2600, 3600, 4000, 7000, 7513, 8510, and 12000.

Layer 2 Devices: ISDN Routers/TA's, Bridges, Switches, Cisco Series Switches: 1900, 2900, 3900, 5000, and 6000.

Layer 1 Devices: cable connectors, cable testers, repeaters, hardware assembly, Active/Passive Hubs, electrical and optical readers, Time Domain Reflectometers

Security Devices: PIX 501, PIX 515, and PIX 525, Linksys routers and firewalls

Desktop and Laptops: Compaq, Dell, Sony, and Custom Builds, Firmware

SOFTWARE:

Networking Cisco IOS, Cisco Works, NetRanger, Web based management tools, Windows 2000/NT, Sniffers, Protocol Analyzers, Performance Management tools, Load Balancers, and Failover

Routing Protocols Knowledge RIP, IGRP, EIGRP, OSPF, BGP, IS/IS-ES

Other routed / Bridge protocols TCP/IP, IPX/SPX, and AppleTalk

Telco: Technologies Asynchronous, Synchronous, ISDN, PRI, E1, T1/T3, X.25, Frame Relay.

VPN tunneling L2F, L2TP, PPTP

Dial / Authentication RADIUS, TACACS+, AAA, and Kerberos

Network Analysis NG Sniffer, Wan Sniffer, DNS, DHCP, and BootP

Operation System Windows 95/98, Windows NT Server 4.0, 2000 Server, Windows 2000 Advanced Server, 2000 Professional, Windows XP home, Windows XP Professional.

Wan technologies DDR, ATM LANE, Token-Ring, FDDI, PPP, ISDN, X.25, FRAME-RELAY, HDLC, SMDS, ASYNC, SYNC, and LAPB

Applications Office 97, Office 2000 including, Excel, Access, Word, PowerPoint, Outlook 2000, AutoCAD 12-13, Visio Enterprise, Illustrator, and Adobe Photo Software, Flash 5, VM Ware and a variety of others for baseline and analysis, In addition, I have tested several applications and tools to meet purchasing requirements.

SECURITY:

Hacking Software / Tools I am fluent with over 1700 penetration tools that cover nearly all aspects of computer Hacking and Penetration Testing.

Security Windows NT security, Certificate Authority, PKI, IKE, SSL, IPSec, Physical Security, Intrusion Detection, Firewalls Virus Detection, Auditing and Accounting

Security Practices Privacy, integrity, and non-repudiation, Information Assurance, Vulnerability Assessment, Authentication systems

Security Concepts and Techniques Social Engineering, Reconnaissance, Network Penetration, Avoiding Detection, NT Architecture

Security Tools NT Resource Kit, Footprinting techniques, DNS interrogation, Port scanners, Ping sweeps, NMAP, strobe, UDP_scan, netcat, NetScan Tools, SuperScan, Winscan, cheops, Security Registry settings, dumpsid, user2sid/sid2user, enum, Policy editors/group policy, & 1,700 More! etc…

Network Scanning Tools SuperScan, Nmap, NmapFE, NmapNT, Pinger, Strobe, Nessus, UDPFlood.ese, NetScan Tools Pro, NetCat,

Network Sniffer and Routing Tools Network Monitor, Ethereal, TCPdump, Windump, WinPcap 2.3, Visual Route, NeoTrace

Password Tools L0pht Crack 2.5, L0pht Crack LC4, Crack 5.0, John the Ripper, Snadboy's Revelation

Trojan Horses and Exploit Tools Netbus, Netbus Pro, SubSeven, GetAdmin, Forensics and Keyboard Logging Tools, NTFSDOS, KeyLoggger, Security Keyboard, Keystroke Logger, Klogger

Intrusion Detection Tools ISS Internet Scanner 6, ISS System Scanner 6, SNORT. IDS Center

Firewalls Checkpoint NG, ISA Server 2000, Router Firewalls,

Security Administration Tools IPv6 Technology, Webmin, Tripwire, Bastille, pwlib-1.3.3-5.i386.rpm, perl-Tk-800.023-9mdk.i586.rpm, Windows 2000 Gold Standard, PuTTY.exe, HiSecWeb security template, IIS lockdown tool, HFNetChk tool

GOVERNMENT STANDARD and LEGISLATION

NIST Special Publications, 800-x (to many to list)

Other NIST special publications referenced

OMB (Office of Management and Budget) Circular A-130, III, 8B3

FISCAM (Federal Information System Control Audit Manual)

SP-2.1, AC-2, 2.2,3.23.4, CC 2.1, SP 5-1, SS 1.2, SP-1, SD-2.1

FIPS (Federal Information Processing Standard

IRMRA (Information Technology Management Reform Act )

GISRA(Government Information Security Reform Act)

Public Law 93-579 Privacy Act of 1974, December 1974

Public Law 90-23 Freedom of Information Act, 1980

Health Insurance Portability and Accountability Act of 1996

Public Law 100-235 The Computer-Security Act of 1987, January 1988

Paperwork Reduction Act of 1980, as amended in 1995

OMB Circular 123, June 1995

OMB Circular A-130,“Management of Federal Information Resources,” Appendix III,“ Security of Federal Automated Information Resources” February1996

Information Technology Management Reform Act (ITMRA) (Clinger Cohen Act) of 1996 (Section 5123)

Presidential Decision Directive 63, “Protecting America’s Critical Infrastructure” May 1998

Public Law 99-474

LOCAL AREA NETWORK EXPERIENCE

Active Directory Design and implementation.

Bridging and Switching Technology, Spanning Tree Protocol, VLAN technology.

Proficient with installations and various configurations of most Microsoft O.S. platforms (DOS 6.22, Win 95/98, NT 4.0 Workstation & Server, 2000 Professional & Advanced Server, Site Server 2.0, Exchange 5.5 & 2000, Proxy Server 2.0, ISA, XP Professional).

Configured NT Servers for AD, RRAS, IIS, DHCP, Certificate Authority, Network Monitor, DNS and WINS services.

Imaging software included Norton Ghost, Remote Installation Services (RIS) and Unattended Installs for the role out of client computers.

WIDE AREA NETWORK EXPERIENCE

Installed and Configured VPN polices with Routing and Remote Access Service (RAS & RRAS) for 9.x & NT clients.

Implemented Access Lists and Firewalls on Routers and Access Servers.

Configuring and troubleshooting RIP, IGRP, OSPF, Static, Dynamic and Default routes on several Cisco Platforms.

Aid in design of X.25, Frame Relay, xDSL, and ISDN networks.

Cabling and assembly of Cisco products.

TECHNICAL COURSES AUTHORED:

Other Courseware Developed

Penetration testing with Backtrack

Wireless Penetration Testing

Cisco Related

Introduction to Cisco Networking Devices

Introduction to Cisco Router Configuration

Building Scalable Cisco Networks

Building Cisco Multilayer Switched Networks

Building Cisco Remote Access Networks

Cisco Internetworking Troubleshooting

Cisco Internetworking Design

Cisco Certified Internetworking Expert Written

Managing Cisco Network Security

ISC2

CISSP

CAP

ISEEP

ISSMP

ISSAP

EC-Council

CEHv5-v8

Incident Handling

CHFI

CCISO

ECSA

Microsoft Related

70-210 Professional

70-215 Server

70-216 Infrastructure

70-217 Active Directory

70-219 Designing Active Directory

70-220 Designing Security

70-221 Designing Infrastructure

70-218 MCSA Network Administration

70-224 Exchange 2000

CompTIA

Network+

I-Net+

Security+

A+

ISACA

CISM

CISA

CRISC

CGEIT

NETWORKING:

Familiar with the following network technologies:

1.General Knowledge

Data encapsulation, layering, and most protocol implementation; LAN/WAN media to include Virtual circuit services, Windowing, Routing algorithms, Switching algorithms, Network security and Management.

2.Corporate Technologies

Desktop includes: Ethernet II, 802.3 and 802.5, 802.2 LLC1/LLC2 Layer, SNAP, NetBIOS/NetBEUI, IPX, and AppleTalk.

Internet includes TCP/IP, APPN, SDLC, RSRB, TN3270, Identify and Implement routing and bridging implications of each fluently such as TCP/IP routing protocol RIP v1, RIP v2, OSPF, IS-IS, EGP, BGP, Cisco's IGRP, EIGRP.

Security: IPSec, ISAKMP Auditing, Dial up Security, Service Accounts, Password Encryption.

WAN: ISDN, Frame Relay, ATM, X.25, HDLC, and PPP.

3.Other Skills

Networks design, project management, provisioning, installation, troubleshooting, training, network management, market analysis, technical writing & documentation

REFERENCES/Testimonials: Over 10,000 available upon request.



Contact this candidate