Post Job Free
Sign in

Air Force Information Security

Location:
Colorado Springs, CO
Salary:
170000
Posted:
September 28, 2020

Contact this candidate

Resume:

Jrlambertiii

@CylentK

CylentKnight

Jack R. Lambert

Cyber Security SME

***** ******* ***** **

Peyton, CO 80831

*********@****.***

307-***-****

Lambert - GEN2020-7

About Me

Over the past 17 years I’ve aimed to develop my experience in virtually every domain of Information Technology with the goal of putting it all together as an information security subject matter expert. With the range of knowledge I’ve been able to build over the years, I’m able to effectively secure IT devices by developing technical, managerial and administrative mitigations in virtually all types of enterprise environments. I strive to constantly challenge myself to not only become a better operator but also a better mentor to young aspiring security professionals. Education and Certifications

B.S. – Information Assurance and Security

Capella University

A.S – Computer Science

Community College of the Air Force

CompTIA Advanced Security Practitioner CE (CASP)

Valid Through September 2021

EC Council Certified Ethical Hacker (CEH)

Valid Through November 2020

CompTIA Cyber Security Analysis Plus (CySA+)

Valid Through December 2022

CompTIA Security Plus CE (Sec+)

Valid Through December 2022

CompTIA Network Plus CE (Net+)

Valid Through December 2022

CompTIA A plus CE (A+)

Valid Through December 2022

Skills & Qualifications

• 17 years combined IT experience spanning several career domains

• Active TS/SCI Clearance adjudicated in 2018 and 8570 compliant: IAT 3, IAM 2, IASAE 2, CSSP

• Competent with both Windows and Linux enterprise environments

• Experience with scripting and programming languages such as PowerShell, Python, bash, C, and C++

• Capable of leading teams of highly skilled individuals to accomplish department objectives

• Experienced in developing high level policy and procedures to improve operational security

• Able to deliver quantifiable results using a product based approach to operations

• Experience with SP 800-53, CJCSM 6510, ESM 9 and 10 operations and compliance requirements

• Experienced with binary analysis and exploitation using tools such as GDB, Ghidra and IDAPro

• Skilled at web enumeration and exploitation using methods such as code or SQL injection

• Capable of automating exploits using open source tools such as Python Pwntools

• Adept with other common tools such as Burp Suite, GoBuster, Nmap, Metasploit

• Able to perform physical security avoidance such as lockpicking, lock bypassing and RFID cloning

• Adept at crafting training scenarios which emulate the tactics of real world threat actors

• Experience creating Insider Threat, Virus, Worm and Ransomware simulations for training purposes

• Able to evaluate exercise results to improve operator training as well as identify new technical needs

• Experienced in the Protect, Detect and Respond facets of Defensive Cyber Operations (DCO)

• Competent with DCO frameworks such as the Cyber Kill Chain and Mitre ATT&CK

• Skilled with tools such as Snort, Wireshark, TCPDump, Zeek (Bro), SolarWinds, and HBSS

• Direct experience with SIEM’s such as ArcSight, LogRhythm and ELK stack platforms (Security Onion) Jack Raymond Lambert III

Peyton, CO • *********@****.*** • 307-***-****

Work History

Lead Cyber Protect/Detect Operator – 50th Space Communications Squadron Cyber Defense Technologies

Schriever AFB, CO

February 2018 - Present

Responsibilities

Provide proactive protection of 14th Air Force space mission assets by conducting vulnerability assessments and developing new tools, signatures and procedures to mitigate risk. This included analyzing purpose built software, conducting asset baselines and enumerating patching levels in order to develop IDS and HIPS signatures or recommend other mitigation actions. In addition, it was my responsibility to develop purple team exercises employing custom built malware simulation tools to assess defensive response capabilities. Achievements

• Developed several custom tools to include a case management system and pcap collection tool

• Promoted from defense analyst to protect operator and again to lead protect operator

• Created two procedures for interdepartmental communication, improving incident response capabilities

• Awarded the first ever “Analyst of the Month” award recognizing activities that went “above and beyond”

• Hand selected to consult on the Operating Instruction and derive processes for the new CDCC-S department

• Developed several SOP’s to guide young analysts key active hunt techniques such as pcap analysis Cyber Security Engineer II – JRDC Missile Defense Agency CTL Resources

Schriever AFB, CO

May 2017 – February 2018

Responsibilities

Performed Tier II Defensive Cyber Operations (DCO) for the Missile Defense Agency Cyber Security Service Provider

(CSSP). Continuously Monitored all network events into and out of the network to detect and respond to any situation which may threaten network security. This function encompassed full security stack devices to include Firewall operations, IDS, Content filters, Email Monitoring, and host based security products such as HIPS, anti-malware software and OS logs. Also, responsible for directing response actions to TIER III per Incident Response Plan. Achievements

• Automated 3 work center processes in 3 months, saving an estimated $75,000 in man hours per year.

• Provided outstanding technical contribution to the team which lead to several organizational awards

• Created a video training series on ArcSight SIEM operation to expedite new operator comprehension Network Engineer I – JRDC Missile Defense Agency

CTL Resources - TEKSystems

Schriever AFB, CO

December 2015 – May 2017

Responsibilities

Operation and maintenance of the MDA general service network infrastructure. Performed regular network and firewall monitoring and provided immediate response functions for outages, misconfigurations or cyber incidents. Implemented architecture and configuration changes to ensure STIG, IAVA and CSSP compliance. Regularly setup and troubleshot 802.1x port authentication as well as configured and troubleshot Access Control Lists (ACL). Achievements

• Redesigned the departments training documentation schema; vastly improving department work continuity

• Streamlined a weekly inter-department workflow process, which improved operational capacity

• Awarded an “Outstanding Achievement” medal for meeting organizational needs beyond the position’s scope Jack Raymond Lambert III

Peyton, CO • *********@****.*** • 307-***-****

Lead Systems Analyst – Global Broadcast Service Operations Center TEKSystems

Schriever AFB, CO

August 2015 – November 2015

Provide 24/7 end user support to Global Broadcast Service customers. More details about this position are available upon request

• Updated several work center procedures to reflect present day operational needs Systems Administrator – DoDMERB

22nd Century Technologies

USAFA, CO

May 2015 – August 2015

Monitored and maintained department physical IT resources to include Database, Active Directory, DNS, DHCP and Exchange servers. More details about this position are available upon request.

• Rapid response to an afterhours lightning strike prevented the loss of over $750k in equipment Systems Analyst – United States Air Force Academy Astronautics Department Apogee Engineering

USAFA, CO

October 2013 – April 2015

A multi-disciplinary role to include network operations, server administration, cyber security, satellite operations for the USAFA Astronautics department. More details about this position are available upon request.

• Detected and responded to over 400 malicious activity attempts which threatened a $34M R&D program Field Service Engineer – Afghanistan

Tachyon Networks

Bagram, Afghanistan

November 2010 – December 2012

A single deep position building and maintaining two satellite communications hubs supporting ISR missions over Afghanistan. More details on this position are available upon request.

• Worked with a team of engineers to design an application to provide real time system health information Associate Engineer

EchoStar Communications

Cheyenne, WY

November 2009 – November 2010

Primary duties included the maintenance and operation of 1500 pieces of communications equipment supporting over 3000 services from television broadcasts to satellite internet. Additional details available upon request.

• Created a task automation script which saved the organization over $40,000 annually Satellite Communications Technician – 2E151

United States Air Force

Shaw AFB, SC

November 2003 – November 2009

Responsible for ensuring unit readiness for Satellite Communications equipment. Honorable discharge. Additional details available upon request.

• Awarded Airman of the Quarter for outstanding work, team contribution and community involvement Jack Raymond Lambert III

Peyton, CO • *********@****.*** • 307-***-****

Volunteer Work

Founder

Hackers N’ Hops

International

May 2018 - Present

Hackers N’ Hops was founded to provide people with a passing interest in Information Security a space to experience and learn the tools and techniques of offensive security. The group quickly grew from the original 5 members to over 100 members spanning 6 countries today. We use public platforms such as Hack the Box, Try Hack Me and global Capture the Flag (CTF) competitions to keep our skills sharp and offer various rewards to our members for their learning efforts.

• Twitter @HackersNHops

• Web https://hackersnhops.com

References

Terence Brown

719-***-****

Wylie Bayes

719-***-****

Mike Bates

719-***-****

*Alternate contact information and personal references are available upon request.



Contact this candidate