Post Job Free

Resume

Sign in

Sales Engineer / Information Technology / IT Networking

Location:
Denver, CO
Posted:
January 12, 2021

Contact this candidate

Resume:

scott.manka@resume:~$

adjdml@r.postjobfree.com 808-***-****

Objective

●Find a position that develops my technical and leadership skills to support sales and business development efforts

Skills & Abilities

●Energetic and passionate IT professional with extensive background in computer network operations

●Started thriving and enjoying the Sales field in 2017 as a Sales Engineer

●Active Top Secret/SCI clearance with Agency Special Background Investigation and polygraph {since 2009}

●Prior Computer Network Operator/Signals Intelligence Analyst with over 8 years of experience in the Intelligence Community providing in-depth computer network operations expertise and malware/network traffic analysis

●In-depth CNE/CNA/CND experience

●Daily use of various OS platforms and their network communications methods {UNIX, Windows 98-XP/Vista/7/8, Linux, Solaris, HPUX}

●Intimately familiar with analyzing packet captures, and experienced with creating SNORT/IDS signatures for identifying known malicious traffic

●Comfortable using various system software for reporting, analyzing and/or conducting operations {Wireshark, MS Office applications, OllyDbg, CaptureBAT, netcat, etc.}

●Knowledgeable of un/common intrusion methods, attack vectors, and tactics/techniques used against popular operating systems and networks

Experience

Federal Sales Engineer ForAllSecure - Pasadena, MD

{2019-Present}

●Sales engineer covering the Intel Community, DoD, Systems Integrators territories nation-wide

●Handled numerous start-up focused responsibilities including developing training for on-boarding, creating new presentations/demonstrations for customer-facing content, and creating templates for help speeding up the sales process (ex. POV/POC’s, whitepapers, etc.)

●Assisted in post-sales actions to ensure customer correspondence and deliverables were handled both timely and correctly

Federal Sales Engineer / Solutions Architect Tenable - columbia, md

{2017-2019}

●Sales engineer covering the Intel Community, DoD, and North East SLG territories

●Key contributor in renewal of DoD-wide software suite contract

●Assisted in development of training material, developing new presentations/demonstration slide decks and material, and mentorship of new hires

●Frequently collaborated with other Territory Managers when needed to ensure customers always had access to a technical resource

●Developed a strong relationship with Customer Success Managers and Sales Development Representatives ensuring a smooth transition through each step of the sales cycle and beyond

Network intrusion analyst root9b - colorado springs

{2015-2017}

●Solely responsible for monitoring 54 Class-C networks

●Conducts network scans and in-depth target analysis daily

●Monitors for un/common process, files, and behaviors of customer/consumer computers searching for evidence of compromise

●In charge of on-the-fly behavioral analysis of suspicious binaries/files found

●Uses CLI to remotely log into, traverse filesystems, search, and retrieve suspicious binaries and files for analysis

●Comfortable writing scripts to help automate menial daily tasks

●Comfortable managing daily requirements on top of last-minute customer requirements to meet deadlines and mission objectives

●Shares technical insight and in-depth explanations to reporting teams and customer liaisons for help with disseminating urgent reports and dossiers

Interactive operator National Security Agency - hawaii

{2012-2016}

●Completed a pre-requisite four month Masters-level cyber operations course

●Conducts CNE operations against numerous targets

●Determines software/hardware restrictions to understand how to exploit the network

●Maintains operational, technical, and authoritative situational awareness during operations

●Tests remote access tools and techniques in controlled environments

●Experienced with implementing, configuring, and sustaining computer/network security solutions (e.g., encryption, firewalls, anti-virus rule sets and intrusion detection/prevention systems)

●Understands principles, methods, tools, and procedures for auditing and logging computer and telecommunications network devices and applications

●Intimately familiar with methods and tools used for exploitation and analysis of computer system and network vulnerabilities

●Aware of principles and methods of exploiting global communications, communications systems, electronic signals or equipment

●Deep understanding of the concepts, principles, theories, and methods for network connectivity (e.g., routing, switching and IP addressing)

Tactical Data triage analyst national security agency

{2011-2012}

●Supports a near real-time operations floor by analyzing and reverse—engineering unknown binaries

●Provides guidance and technical expertise to analysts in order to provide well-documented, accurate reports

●Provides on the job training for new analysts

●Assists fellow analysts by creating templates in order to provide standardized analysis, therefore creating more streamlined, consistent products and reduce report assembly time

●Exploit digital data and/or investigate computer security incidents in order to derive useful intelligence and/or IDS signatures

●Collect and inspect forensically sound data to discern possible mitigation/remediation on DoD networks

●Create and maintain documentation on technical information, computer applications and/or programs

●Document research processes, analyses and results

cyber security intelligence analyst national security agency

{2009-2011}

●Monitored high-priority network intrusion detection signatures

●Briefed management daily with technical overviews

●Conducted analysis of metadata

●Monitored open and classified sources for useful information.

●Use knowledge of customer requirements to analyze and process intelligence information

●Monitor and protect information systems and infrastructures, and the information contained in or transmitted by these systems; this encompasses threat reduction, vulnerability reduction, information assurance, and computer network operations, to include anomalies, discovering means of penetration, and exploiting information system infrastructures

cryptologic technician, networks united states navy

{2009-2016}

●Provides computer (network and infrastructure) analysis and technical solutions to produce Computer Network Operations (CNO) effects in support of National Intelligence Requirements. Duties include, but are not limited to: Computer Network Defense Analysis, Digital Forensics Analysis, Digital Network Exploitation Analysis, Interactive Operations and Cyber Planning in support of Computer Network Operations.

navy interactive on-net operator (ctn, nec-9308) united states navy

{2013-2016}

●Navy Interactive ON-NET (ION) Operators use advanced software applications for network navigation and tactical forensic analysis

ASSISTANT LEADING PETTY OFFICER (ALPO) united states navy

{2015-2016}

●Responsible for completing the duties and responsibilities assigned to an LPO to manage and assist 8 subordinates for daily administrative requirements

Education

PROFESSIONAL AND MILITARY:

●53 credits toward a Bachelor’s degree in Computer Science, University of Maryland University College, 2009-Present

●Cryptologic Technician Networks Class “A” School, 2009

●Basic Digital Network Analysis, top of class, 2009

●Remote Interactive Operations Training – ROC Foundations Course, 2013

●Remote Interactive Operations Training – ROC Operations Course, 2013

●Advanced Windows Operations Course - KEYW

●Various National Cryptologic School Courses related to SIGINT reporting, SIGINT analysis, as well as Information Technology and network communications.

●Designation as an Apprentice Network Collection Operator, 2014

●Designation as an Apprentice Exploitation Operator, 2015

Certificates

●Certified Ethical Hacker (CEH), 2009

●Computer Hacking Forensic Investigator (CHFI), 2009

training

●Introduction to Python Programming (COMP3321)

●Cyber Incident Analysis and Reporting (RPTG2500)

●Certified Cisco Network Administration Bootcamp Course (COMP00060)

●SANS503: Intrusion Detection In-Depth (NETW00002)

●UNIX Fundamentals: Overview (LU_UNIX_A01_IT_ENU)

●The Fundamentals of Networking (218678_ENG)

●Networking Protocols (218709_ENG)

awards

●NSA/CSS Threat Operations Center (NTOC) Military Performer of the Quarter, Q1 2011

●Admiral LOA (C10F) 2011

References

●References available upon request.

CASE NUMBER: (DJ2-2015-02693)



Contact this candidate