Post Job Free

Resume

Sign in

Information Technology Air Force

Location:
San Antonio, TX
Salary:
170000
Posted:
March 09, 2024

Contact this candidate

Resume:

George F. Arechiga

Email: ad3766@r.postjobfree.com

Phone: 210-***-****

Location: San Antonio, Texas

SUMMARY OF QUALIFICATIONS

• 8 years cybersecurity experience

• Former US Army Major

• Active TS/SCI

• Robust abilities in planning, organizing workloads, managing time, initiating change, implementing improvements, conflict resolution, and overcoming obstacles, leading to higher levels of productivity

• Seasoned leader with a successful track record of working both independently as well as on teams comprised of professionals with diverse skill sets and backgrounds

• Solutions-oriented information technology professional with demonstrated expertise in cyber defense/ cybersecurity methodologies

• Extensive experience briefing General Officers and senior executive leaders

• Strong technical skills performing on a broad range of assignments entailing unique problems, creativity, advanced approaches, new technologies, and innovation PROFESSIONAL EXPERIENCE

Cyber Systems Field Engineer –US Air Force (Contractor), San Antonio, TX, Nov 2023- Present Maintain service-oriented architecture to provide capabilities to cyber operational environment

• Configure, develop, deploy and maintain Red Hat Linux and Apache virtual servers using the command line in a highly-secure environment

• Build and configure kickstart files and Ansible playbooks for rapid virtual machine deployments

• Create, modify, and configure Python and bash scripts

• Troubleshoot virtual network issues, including firewall configuration, and resolve issues accordingly

• Support cross-domain solution

• Use Agile framework to effectively communicate project progress with all stakeholders Cybersecurity Validator –US Army (Contractor), San Antonio, TX, Nov 2022- Oct 2023 Assess DoD Information Systems against the RMF security controls IAW DoDI 8500, DoDI 8510 and NIST SP 800-53

• Created PowerShell script that evaluated windows configuration files saving hundreds of man hours over existing manual method

• Interviewed technical Subject Matter Experts (SMEs) as well as non-technical leaders to ascertain the security posture of information technology networks

• Evaluated a wide array of IT devices for Security Technical Implementation Guide (STIG) compliance using ACAS/ Nessus, SCAP Compliance Checker, and manual checklist reviews.

• Expert in eMASS and a strong understanding of the CNSS 1253 CCIs

• Developed and reviewed RMF documentation and artifacts such as Configuration Management Plans, Network Infrastructure Plans, Business Continuity and Disaster Recovery Plans, Plan of Action and Milestones (POA&Ms), topology diagrams and all supporting policies in support of RMF A&A activities Cybersecurity Threat Hunter –US Air Force (Contractor), San Antonio, TX, Jul 2019- Oct 2022 Hunt threats on specialized networks in various global locations searching for advanced persistent threats

• Identified, researched, and searched for threat actor activity with little to no specific threat intelligence

• Used MITRE ATT&CK matrix to guide hypothesis-driven hunts and create repeatable processes

• Created behavior-based signatures in response to newly-identified malicious activity

• Investigated anomalous activity to determine root cause of activity, scope indicators of compromise and attacks

• Cleared threats upon detection from host

IDS Signature Management Team –US Air Force (Civilian), San Antonio, TX, Jul 2018 - Jun 2019 Led team responsible for managing all signatures residing on Air Force intrusion detection and prevention systems monitoring $14.2 billion Air Force domain with 900K users and 670K end points

• Created a standardized signature management work flow process in order to reduce false positive alerts by 65K per month over a 3-month period, allowing analysts to focus on true positive alerts; created reporting metric to demonstrate positive impact to Air Force network defense; lauded by leadership

• Oversaw creation of 125 analyst and signature use cases for 5 intrusion detection and prevention systems

• Identified shortfalls and established a signature writer training program; created previously non-existent certification standard, including formally defining novice, experienced, and expert level positions

• Developed streamlined process for writing efficient detection signatures in order to reduce intrusion prevention system process overhead, resulting in noticeable network performance improvement for 900K users

Network Security Analyst – US Air Force (Contractor) San Antonio, TX, Dec 2016- Jun 2018 Analyzed Air Force enterprise network traffic in order to detect and identify malicious and anomalous activity

• Improved analyst productivity and effectiveness by developing dashboards which saved 142 analysts 10% of time needed to investigate and analyze alerts

• Created structured event research process plan for team during unique investigation for special purpose incident response team

• Modified existing new analyst training plan to include joint regional security stack in addition to Air Force-specific network architecture

• Selected above peers become enterprise signature management writer Senior IT Specialist, US Army Reserve (Civilian), San Antonio, TX, Jan 2013 – Nov 2016 Direct advisor to Commanding General and senior executive on information technology functions

• Maintained over 99% availability rate in unit consisting of 6,500 customers in 65 sites across a 4-states

• Oversaw multi-million dollar IT budget while providing good stewardship over tax payer dollars

• Served as primary NSA encryption key program manager (COMSEC) responsible for physical security and control of highly sensitive material, resulting in zero incidents

• Inspected subordinate units; corrected deficiencies to dramatically improved network security posture EDUCATION

M.S. IT University of Maryland, University College B.A. History University of Oregon

CERTIFICATIONS

CISSP, CEH, Linux+

SKILLS & TECHNOLOGIES

Elas c Stack, Python, Red Hat Linux (Command Line), Windows, WMWare ArcSight, Arkime (Moloch), WireShark, tcpdump, Nikto, Burp Suite



Contact this candidate