Resume

Sign in

Engineer Security

Location:
Havre de Grace, MD
Salary:
65000
Posted:
May 16, 2020

Contact this candidate

Resume:

Michael J. Terry

**** ***** **** ***** ** Grace, MD 21078

443-***-****

adc9a6@r.postjobfree.com

CLEARANCE – Background Investigation (SECRET) is in the final stage (adjudication) of the clearance process according to current FSO. It started this phase 1/29/2020.

Highlights

•3 years working for a large DOD agency managing thousands of servers across multiple networks. Duties included supporting a 24x7 Linux environment and ensuring service, scalability and reliability of such systems to support the warfighter.

•Productized an IDS toolkit using Puppet for rapid deployment across DOD networks.

•Configuring Apache servers to serve out web pages to detect malicious activity on networks (i.e. Cross Domain Violations).

•Created a open source, automated assessment toolkit to scan Health IT Information systems for HIPAA compliance. The toolkit checked for compliance in a Health IT organization’s database, networks, web applications, and infrastructure.

Linux Administration Skills

•Build, configure, and boot Linux hosts. Usually working with Red Hat, CENTOS, and Ubuntu distributions.

•Experienced with Linux KVM virtualization.

•Compiling Java, Bash, and PHP code from Command Line & Eclipse

•Proficient at creating, fixing, maintaining and troubleshooting bash/shell scripts for operational needs such as monitoring disk usage and checking for files with 777 permissions.

•Using cron jobs to automate task.

• Managing log rotating. I would basically rotate the log file when file size reaches a specific size.

•Configuration Management of NFS and Samba servers.

•Administered installation of software, hardware, file system management, backups, process control, user administration, and device management.

•Responsible for resolving a wide variety of complex system failures, troubleshooting software, hardware, and network problems.

Cybersecurity Skills

•Ensured system configuration compliance with established guidelines as defined in NIST Special Publication 800-53.

•Make sure systems are patched.

•Following the organization lead to what to monitor in the logs. As part of the security team, we monitored security logs, audit logs, and intrusion detection system logs for system and network anomalies. We would look for anomaly’s such as privileged user activities, creation or deletion of sensitive files (like registry information).

•Conducted security scans to identify, evaluate, and mitigate security risk threats, and vulnerabilities.

•Stayed abreast of new cyber threats and new system vulnerabilities.

•Used nmap to determine port settings whether they were open, closed, or listening.

•Used tcpdump to see if data is encrypted while in transit.

•Monitor backups to make sure they were backed up correctly.

•Created an open source automated assessment toolkit to scan Health IT information systems for HIPAA compliance within a HIMMS 6 organization.

Technical Summary:

Operating Systems: Red Hat Enterprise Linux 5, 6 & 7 ; CENTOS 6 & 7 ; Ubuntu, Mac OS X, BackTrack, Linux

Databases: MYSQL

Languages Bash, Python

Security Tools/Software: tcpdump, nmap, wireshark, Fast-Track, OpenVAS, Snort, Splunk, VMWare, VirtualBox MS Project, Visio 2007, Eclipse

Hardware: Various IBM workstations, tape backup units

Model/Design:

•Object Oriented Design and Modeling: Designed and implemented various applications of a library using Object Oriented Design and Modeling approach.

•Experience using UML, ER Diagram, EER Diagram, Use Case Diagram, Sequence Diagram, Database Schema, and Data Flow Diagrams

Unrelated Work Experience

Switchboard Operator

University of Maryland Upper Chesapeake Medical Center

December 2018 - Present

Directs phone calls to physician’s office’s in the hospital.

Queries patient information within the QHIM database to give out patient information.

Professional Experience

Cyber Security Analyst (SOC)

Computer Sciences Corporation, Newark, DE

March 2016 - August 2016

•Eyes on glass monitoring and resolution of security incidents within established customer Service Level Agreements.

•Perform daily operational 'eyes on glass' real-time monitoring and analysis of security events from multiple sources including but not limited to events from Security Information Monitoring tools, network and host based intrusion detection systems, firewall logs, system logs (Unix & Windows), mainframes, midrange, applications and databases.

•Monitors and analyses attempted efforts to compromise security protocols. Identifies and investigates activities and conducts and provides analyses regarding results. Escalates issues to higher level associates.

•Reviews computer logs and messages to identify and report possible violations of security. Coordinates, documents, and reports on internal investigations of security violations.

•Interacts with customers to understand their security needs; assists in the development and implementation of procedures to accommodate them. Writes security status reports to provide system status, report potential and actual security violations and provide procedural recommendations.

Linux Systems Administrator / Systems Engineer

HRL Labs, Malibu, CA

March 2014 - July 2014

•Vulnerability scanning using approved software tools.

•Performing validation of IA compliant system image and configuration baselines.

•If required assist in IT security incident response and documentation.

•Maintains Linux Systems comprised of servers and workstations

•Administer installation of software, hardware, file system management, backups, process control, user administration, and device management.

•Responsible for resolving a wide variety of complex system failures, troubleshooting software, hardware, and network problems.

•Configure Windows desktop and server OS, Configure RHEL OS. Provide DNS, Active Directory and LDAP configuration. Configure hardware and software for servers, RAIDs, storage arrays.

•Provide operations and maintenance functions such as hard drive removal, print server configuration, performance optimization, and research and installation of current patches, where applicable install and support printers and storage peripherals.

•Manage group shares and home directories.

•Conduct system backups and restores.

•Provide impact assessment for system-level changes on existing infrastructure.

•Ensure compliance with computer security policy

•Monitor system usage and perform system tuning

•Design and Implement Rock Clusters.

•Manage tools and equipment.

•Assist users with system problems.

•Schedule and conduct preventative maintenance on RHEL systems.

Linux Systems Administrator / Information Systems Security Engineer, Consultant

Parsons Corporation, Fort Meade, MD

June 2013 – December 2013

•Maintain, configure, and implement various engineering solutions for a Department of Defense contract.

•Provide investigation and analysis for reported problems from the client’s production operations group.

•Work collaboratively to understand issues, offer suggested workarounds, analyze and reproduce product failures, develop short-term and long-term resolution to problems insulating the product development team as much as possible.

•Configuring and managing of enterprise Operating Systems across a large Department of Defense agency.

•Troubleshooting core internet and networking protocols including, but not limited to TCP/IP, DNS, and HTTP.

•Execute various tasks on behalf of the customer to ensure 24/7 operations of multiple systems.

•Tasks included loading and configuring operating systems, updating documentation to ensure accuracy, configuring DNS for proper name resolution across the network, and ensure communications remain intact.

•Provide network support for many programs.

•Managing VMs in a large government data centers using KVM Virtualization.

•Implement and maintain various networks.

•Develop and Implement Puppet modules.

•Configuring LDAP TLS/SSL servers.

•Configuring open source and commercial virtualization solutions into an IDS and automating the process using Puppet.

•Creating/editing Bash scripts to automate tasks and solve complex troubleshooting problems.

•Maintained code in a SVN repository.

•Configuring, deploying, and supporting web server platforms including Apache servers that serve out PHP code.

Linux System Administrator

SAIC, Fort Meade, MD

March 2012 – June 2013

•Provided Tier 3 support for a Department of Defense contract; performed the following task in the Red Hat Enterprise Linux environment:

•Maintain, configure, and implement various engineering solutions for a Department of Defense contract.

•Provide investigation and analysis for reported problems from the client’s production operation group.

•Troubleshooting core internet and networking protocols including, but not limited to TCP/IP, DNS, and HTTP.

•Execute various tasks on behalf of the customer to ensure 24/7 operations of multiple systems.

•Some of the tasks include loading and configuring operating systems, updating documentation to ensure accuracy, configuring DNS for proper name resolution across the network, and ensure communications remain intact.

•Provide network support for many programs.

•Configuring and managing of enterprise Operating Systems across a large Department of Defense agency.

•Creating/editing Bash scripts to solve complex troubleshooting problems.

•Managing thousands of VMs/KVMs in large government data centers.

•Implement and maintain various networks.

•Configuring open source and commercial virtualization solutions or open source IDS.

•Creating/editing Bash scripts to automate tasks.

•Editing XML files.

•Modifying puppet modules and running to Puppet to apply updates.

•Used Puppet to automate configuration management for Linux Services and specific applications.

•Manage data flows that satisfy customer requirements.

Technical Support Engineer, Level II

Computer Sciences Corporation, Fort Meade, MD

September 2011 – March 2012

•Identified departmental needs and make suggestions regarding technical direction.

•Provided after hours support as a Unix Systems Administrator maintaining and supporting backend infrastructure of Intelink’s end user’s applications.

•Apply knowledge of computing systems and software structure with other TTO engineers.

•Analyzed users’ needs.

•Created flowcharts, diagrams, and other documentation.

•Performing antivirus scans and validating files as a Data Transfer Agent.

•Analysis of PKI certificates to ensure accuracy and validity.

•Troubleshoots network connectivity, and accessibility issues.

•Monitors varying networks to ensure they are constantly up.

•Performs daily, weekly, and monthly server backups, as well as software archives/data transfers from a range of Networks of varying security levels.

•Assist users in setting up blogs, remote access accounts, and accesses to several network applications.

•Creates electronic folders ensuring roles, and permissions are accurate.

•Provides senior management with any network irregularities.

•Responds to end user problems regarding account access and password resets.

Open Source Developer

Towson University, Towson, MD

May 2011 – May 2012

•Developed and implemented an open source, automated vulnerability assessment toolkit for the HIMMS 6 organization (Healthcare)

•The toolkit was essential in providing vulnerability assessment scans of the HIMMS 6 healthcare information system and providing mitigation strategies for vulnerabilities found.

•In addition, the toolkit was developed in the Backtrack OS environment.

Service Desk Technician / Help Desk Analyst

Log.Sec Corporation, Aberdeen Proving Ground, MD

May 2008 – August 2008

•Responded to a host of trouble tickets ranging from:

•Assisting customers with password resets, and system lockouts

•Installing and maintaining hardware/software

•Resetting CAC pins

•Troubleshooting network and printer connectivity problems

Education / Training

Towson University, Towson, MD

Master of Science, Computer Science

MS Thesis: A Comprehensive Security Assessment Toolkit for Healthcare Systems

Towson University, Towson, MD

Bachelor of Science, Computer Information Systems

Harford Community College, Bel Air, MD

Associate of Science, Information Systems Management

Certificates

Red Hat Certified System Administrator (RHCSA), Certification #120-165-006, 11/2012 – Present

Red Hat Certified Engineer (RHCE), Certification #120-165-006, 04/2013 – Present

Comptia Security+ Certified May 2014 - Present

Activities and Affiliations

Awards / Accomplishments:

Selected Publications

Acharya, Subrata Dr.; Terry, Michael; and Oigiagbe, Ogbeide Derrick "A Comprehensive Security Assessment Toolkit for HealthCare Systems," Colonial Academic Alliance Undergraduate Research Journal: Vol. 4, Article 6.

Available at: http://scholarworks.gsu.edu/caaurj/vol4/iss1/6



Contact this candidate