George F. Arechiga
Email: ad3766@r.postjobfree.com
Phone: 210-***-****
Location: San Antonio, Texas
SUMMARY OF QUALIFICATIONS
• 8 years cybersecurity experience
• Former US Army Major
• Active TS/SCI
• Robust abilities in planning, organizing workloads, managing time, initiating change, implementing improvements, conflict resolution, and overcoming obstacles, leading to higher levels of productivity
• Seasoned leader with a successful track record of working both independently as well as on teams comprised of professionals with diverse skill sets and backgrounds
• Solutions-oriented information technology professional with demonstrated expertise in cyber defense/ cybersecurity methodologies
• Extensive experience briefing General Officers and senior executive leaders
• Strong technical skills performing on a broad range of assignments entailing unique problems, creativity, advanced approaches, new technologies, and innovation PROFESSIONAL EXPERIENCE
Cyber Systems Field Engineer –US Air Force (Contractor), San Antonio, TX, Nov 2023- Present Maintain service-oriented architecture to provide capabilities to cyber operational environment
• Configure, develop, deploy and maintain Red Hat Linux and Apache virtual servers using the command line in a highly-secure environment
• Build and configure kickstart files and Ansible playbooks for rapid virtual machine deployments
• Create, modify, and configure Python and bash scripts
• Troubleshoot virtual network issues, including firewall configuration, and resolve issues accordingly
• Support cross-domain solution
• Use Agile framework to effectively communicate project progress with all stakeholders Cybersecurity Validator –US Army (Contractor), San Antonio, TX, Nov 2022- Oct 2023 Assess DoD Information Systems against the RMF security controls IAW DoDI 8500, DoDI 8510 and NIST SP 800-53
• Created PowerShell script that evaluated windows configuration files saving hundreds of man hours over existing manual method
• Interviewed technical Subject Matter Experts (SMEs) as well as non-technical leaders to ascertain the security posture of information technology networks
• Evaluated a wide array of IT devices for Security Technical Implementation Guide (STIG) compliance using ACAS/ Nessus, SCAP Compliance Checker, and manual checklist reviews.
• Expert in eMASS and a strong understanding of the CNSS 1253 CCIs
• Developed and reviewed RMF documentation and artifacts such as Configuration Management Plans, Network Infrastructure Plans, Business Continuity and Disaster Recovery Plans, Plan of Action and Milestones (POA&Ms), topology diagrams and all supporting policies in support of RMF A&A activities Cybersecurity Threat Hunter –US Air Force (Contractor), San Antonio, TX, Jul 2019- Oct 2022 Hunt threats on specialized networks in various global locations searching for advanced persistent threats
• Identified, researched, and searched for threat actor activity with little to no specific threat intelligence
• Used MITRE ATT&CK matrix to guide hypothesis-driven hunts and create repeatable processes
• Created behavior-based signatures in response to newly-identified malicious activity
• Investigated anomalous activity to determine root cause of activity, scope indicators of compromise and attacks
• Cleared threats upon detection from host
IDS Signature Management Team –US Air Force (Civilian), San Antonio, TX, Jul 2018 - Jun 2019 Led team responsible for managing all signatures residing on Air Force intrusion detection and prevention systems monitoring $14.2 billion Air Force domain with 900K users and 670K end points
• Created a standardized signature management work flow process in order to reduce false positive alerts by 65K per month over a 3-month period, allowing analysts to focus on true positive alerts; created reporting metric to demonstrate positive impact to Air Force network defense; lauded by leadership
• Oversaw creation of 125 analyst and signature use cases for 5 intrusion detection and prevention systems
• Identified shortfalls and established a signature writer training program; created previously non-existent certification standard, including formally defining novice, experienced, and expert level positions
• Developed streamlined process for writing efficient detection signatures in order to reduce intrusion prevention system process overhead, resulting in noticeable network performance improvement for 900K users
Network Security Analyst – US Air Force (Contractor) San Antonio, TX, Dec 2016- Jun 2018 Analyzed Air Force enterprise network traffic in order to detect and identify malicious and anomalous activity
• Improved analyst productivity and effectiveness by developing dashboards which saved 142 analysts 10% of time needed to investigate and analyze alerts
• Created structured event research process plan for team during unique investigation for special purpose incident response team
• Modified existing new analyst training plan to include joint regional security stack in addition to Air Force-specific network architecture
• Selected above peers become enterprise signature management writer Senior IT Specialist, US Army Reserve (Civilian), San Antonio, TX, Jan 2013 – Nov 2016 Direct advisor to Commanding General and senior executive on information technology functions
• Maintained over 99% availability rate in unit consisting of 6,500 customers in 65 sites across a 4-states
• Oversaw multi-million dollar IT budget while providing good stewardship over tax payer dollars
• Served as primary NSA encryption key program manager (COMSEC) responsible for physical security and control of highly sensitive material, resulting in zero incidents
• Inspected subordinate units; corrected deficiencies to dramatically improved network security posture EDUCATION
M.S. IT University of Maryland, University College B.A. History University of Oregon
CERTIFICATIONS
CISSP, CEH, Linux+
SKILLS & TECHNOLOGIES
Elas c Stack, Python, Red Hat Linux (Command Line), Windows, WMWare ArcSight, Arkime (Moloch), WireShark, tcpdump, Nikto, Burp Suite