Marquis Lindsey
Arlington, Virginia ***** • Cell: 256-***-****
Email: adhp1l@r.postjobfree.com
SUMMARY of QUALIFICATIONS
Driven IT professional looking to secure a posiMon in the InformaMon Technology industry, apply excepMonal leader- ship skills and abiliMes, and support the organizaMon’s mission and goals while making a posiMve difference. Active Secret Clearance, Sec+ CE, MCSA Server 2016, Azure Administrator Associate, Azure Developer As- sociate, and HBSS. Actively Pursuing CISSP & CEH certification. Operation Inherent Resolve Cam- paign Medal recipient
Areas of expertise include:
IndraSo(, Inc. (July 2020 - Present)
• Install, configure, administer, and support improvements of the NGIC development environment.
• Integrate and upgrade the development environment toolset.
• Configure and administer developer tools and applicaMons, the automated build environment, and conMnuous integraMon environment.
• Document the development environment and complete requirements to iniMally accredit and maintain its accred- itaMon.
• UMlize Defense Intelligence InformaMon Enterprise (DI2E) for collaboraMon, storage and Mcket creaMon, updates, and closure.
• Create SOP’s for using different tools within the AWS environment.
• System AdministraMon • Wireshark • Security
• Microso^ Office • InformaMon Assurance • Windows PowerShell
• Risk Management Framework
• DOD Policies
• Splunk
• HIPPA Compliance
• Windows/Unix Forensics
• eMASS
• TroubleshooMng
• AcMve Directory
• Windows Server
• InformaMon Security
• Medical So^ware
• PentesMng
• STIG Viewer
• SCAP Compliance Checker
• LGPO
• CloudWatch
• Cyber Defense
• IAVA Compliance
• Palo Alto Firewalls
• VTC OperaMons
• VMWare WorkstaMon
• Defense Security Service
Assessment and Autho-
rizaMon Process manual
(DAAPM)
PROFESSIONAL EXPERIENCE
• Proficient using Atlassian tools such as Jira, Confluence, Bitbucket, etc.
• Work with developers to implement best pracMces for AWS/ AC2SP cloud environment.
• Create dashboards to monitor logs, metrics, rules, and events. Information System Security Manager (ISSM) Graham Corporation (April 2020-October 2020)
• Create, edit, and manage confidenMal informaMon to cd/DVD and create auto genereate password keys to unlock cd/dvd.
• Developing, maintaining, and overseeing the system security program and policies for my assigned area of responsibility.
• Ensuring compliance with current cyber security policies, concepts, and measures when designing, procuring, adopMng, and developing a new system.
• Ensuring the fulfillment of IO data requirements (e.g., storage, processing, Assured File Transfer (AFT), incident response, collecMon, disseminaMon, and disposal).
• Developing and implemenMng an effecMve system security educaMon, training, and awareness program.
• Maintain a working knowledge of system funcMons, security policies, technical securi- ty safeguards, and operaMonal security measures.
• Monitoring all available resources that provide warnings of system vulnerabiliMes or on- going ahacks and reporMng.
• Obtaining and maintaining NISP Enterprise Mission Assurance Support Service (eMASS) ac- cess in order to effecMvely manage all security authorizaMons for systems under me
• ImplemenMng security controls to protect the system.
• Ensure all system security documentaMon is current and accessible to proper authoized individuals.
• Submiing the security plan and supporMng arMfacts to the ISSP for AO review and consideraMon.
• CerMfying to the AO, in wriMng, that the requirements and implementaMon procedures listed within the security plan are in accordance with the NISPOM, NIST SP 800-53, and DAAPM.
• Managing, maintaining, and execuMng the conMnuous monitoring strategy.
• Performing risk assessments and documenMng results in a RAR and keeping the risk assessment current th- roughout the acquisiMon/development porMon of the system life cycle.
• Monitor VPN and Cortex XDR Palo Alto logs once a month.
• Monitor and review weekly Sophos logs.
• Update systems to newest version.
System Administrator II TekSystems/Vista Technical (November 2019- April 2020)
• Install, configure, and maintain network applicaMons and applicaMon distribuMon systems
• Configure and install PCs, network prinMng devices, peripherals and so^ware, including physical ahachment of equipment to network
• Install and maintain peripheral equipment such as printers, modems, scanners, etc.
• Ensure system security in compliance with customer policy including virus protecMon
• UMlize tools sets such as Symantec Ghost, AcMve Directory, Remote Desktop, etc.
• Update systems with IAVA updates and anM-virus updates
• Implement projects such as migraMons, upgrades, and implementaMon of new technologies
• Proficient with Windows Server 2008 and 2012, SCCM, AcMve Directory, SAN (Net App Storage Area Network), IAVA, VMware vSphere 5.5, patching, CLI and scripMng.
• ExperMse in business applicaMons such as Microso^ Office and Adobe products and/or customer-defined/ Army applicaMon suites.
Cyber Network Defense Analyst at US Army (January 2019- Present)
• Maintain 24/7 constant monitoring of intrusion detecMon systems.
• Recommend modificaMons to security tools to detect, prevent, and miMgate intrusions.
• Perform system administraMon on specialized DCO applicaMons and systems (e.g., anM-virus, or Audit / Remedia- Mon) to include installaMon, configuraMon, maintenance, and backup/ restore.
• Create, edit, and manage changes to network access control lists on specialized DCO systems (e.g., firewalls and intrusion prevenMon systems).
• Implement CerMficaMon and AccreditaMon (C&A) requirements for specialized DCO systems within the Network En- vironment (NE) or enclave, and document and maintain records of them.
• Coordinate with the DCO-E Auditor (DCO-A) to manage and administer the updaMng of rules and signatures (e.g., Intrusion DetecMon Systems (IDS) / Intrusion PrevenMon Systems (IPS), anM-virus, and content blacklists) for special- ized DCO applicaMons.
• IdenMfy potenMal conflicts with the implementaMon of any DCO tools within the Computer Network Defense Ser- vice Provider (CND-SP) area of responsibility (e.g., tool I signature tesMng and opMmizaMon).
• Administer DCO test bed and test and evaluate new DCO applicaMons rules / signatures, access controls, and con- figuraMons of CND-SP managed plaoorms.
• Perform risk assessments in accordance with NIST SP 800-30 and apply them in accordance with NIST SP 800-37.
Information Systems NCO (25B) at US Army (Camp Arifjan at Kuwait/Erbil, Iraq/CONUS) March 2017- January 2019 (1 year 11 months)
• Provide computer system administraMon, local area network administraMon, and system/network security.
• Subnet IP addresses for computers on the local network, routers, and switches.
• Set up topology, cabling schemes, and passwords for the routers.
• Serve as assistant Video Teleconferencing (VTC) Technician/Operator
• Supervise the deployment, installaMon and unit level maintenance of medical computer (MC4) informaMon process- ing systems, as MC4 Manager, while also managing this separate network.
• Accounted for and coordinated the faciliMes expansion of MLOS radio data transmissions, ensuring 80% more net- work availability
System Admin (25B) at Army National Guard September 2012 – September 2015 (3 years)
• Manage/troubleshoot Windows 7, XP, Vista, 10, Windows Server 2003, 2008, 2012, Linux
• Run/Create Cat 5/5e/6 cable to setup client connects to LAN/WAN resources
• Monitor and manage email spam filters, firewalls, anM-virus systems and vulnerability scanners
• InvesMgate alerts created by intrusion detecMon systems for malicious file uploads, compromised servers, SQL injecMons and port scanning
• SQL Database backups and restores.
• Set and maintain database standards
• Diagnose and troubleshoot database errors
Network Admin (25B) at Army National Guard September 2015 – June 2017 (1 year 7 months)
• Manage the deployment and maintenance of server stacks
• Implement network security using SSL CerMficate configuraMon and management, Mail Server
• Troubleshoot network security hardware issues in a Mmely manner
• InvesMgate arising incidents caused by malicious acMviMes and idenMfied false posiMves EDUCATION
Jacksonville State University, Computer InformaMon Science, May 2021