scott.manka@resume:~$
adjdml@r.postjobfree.com 808-***-****
Objective
●Find a position that develops my technical and leadership skills to support sales and business development efforts
Skills & Abilities
●Energetic and passionate IT professional with extensive background in computer network operations
●Started thriving and enjoying the Sales field in 2017 as a Sales Engineer
●Active Top Secret/SCI clearance with Agency Special Background Investigation and polygraph {since 2009}
●Prior Computer Network Operator/Signals Intelligence Analyst with over 8 years of experience in the Intelligence Community providing in-depth computer network operations expertise and malware/network traffic analysis
●In-depth CNE/CNA/CND experience
●Daily use of various OS platforms and their network communications methods {UNIX, Windows 98-XP/Vista/7/8, Linux, Solaris, HPUX}
●Intimately familiar with analyzing packet captures, and experienced with creating SNORT/IDS signatures for identifying known malicious traffic
●Comfortable using various system software for reporting, analyzing and/or conducting operations {Wireshark, MS Office applications, OllyDbg, CaptureBAT, netcat, etc.}
●Knowledgeable of un/common intrusion methods, attack vectors, and tactics/techniques used against popular operating systems and networks
Experience
Federal Sales Engineer ForAllSecure - Pasadena, MD
{2019-Present}
●Sales engineer covering the Intel Community, DoD, Systems Integrators territories nation-wide
●Handled numerous start-up focused responsibilities including developing training for on-boarding, creating new presentations/demonstrations for customer-facing content, and creating templates for help speeding up the sales process (ex. POV/POC’s, whitepapers, etc.)
●Assisted in post-sales actions to ensure customer correspondence and deliverables were handled both timely and correctly
Federal Sales Engineer / Solutions Architect Tenable - columbia, md
{2017-2019}
●Sales engineer covering the Intel Community, DoD, and North East SLG territories
●Key contributor in renewal of DoD-wide software suite contract
●Assisted in development of training material, developing new presentations/demonstration slide decks and material, and mentorship of new hires
●Frequently collaborated with other Territory Managers when needed to ensure customers always had access to a technical resource
●Developed a strong relationship with Customer Success Managers and Sales Development Representatives ensuring a smooth transition through each step of the sales cycle and beyond
Network intrusion analyst root9b - colorado springs
{2015-2017}
●Solely responsible for monitoring 54 Class-C networks
●Conducts network scans and in-depth target analysis daily
●Monitors for un/common process, files, and behaviors of customer/consumer computers searching for evidence of compromise
●In charge of on-the-fly behavioral analysis of suspicious binaries/files found
●Uses CLI to remotely log into, traverse filesystems, search, and retrieve suspicious binaries and files for analysis
●Comfortable writing scripts to help automate menial daily tasks
●Comfortable managing daily requirements on top of last-minute customer requirements to meet deadlines and mission objectives
●Shares technical insight and in-depth explanations to reporting teams and customer liaisons for help with disseminating urgent reports and dossiers
Interactive operator National Security Agency - hawaii
{2012-2016}
●Completed a pre-requisite four month Masters-level cyber operations course
●Conducts CNE operations against numerous targets
●Determines software/hardware restrictions to understand how to exploit the network
●Maintains operational, technical, and authoritative situational awareness during operations
●Tests remote access tools and techniques in controlled environments
●Experienced with implementing, configuring, and sustaining computer/network security solutions (e.g., encryption, firewalls, anti-virus rule sets and intrusion detection/prevention systems)
●Understands principles, methods, tools, and procedures for auditing and logging computer and telecommunications network devices and applications
●Intimately familiar with methods and tools used for exploitation and analysis of computer system and network vulnerabilities
●Aware of principles and methods of exploiting global communications, communications systems, electronic signals or equipment
●Deep understanding of the concepts, principles, theories, and methods for network connectivity (e.g., routing, switching and IP addressing)
Tactical Data triage analyst national security agency
{2011-2012}
●Supports a near real-time operations floor by analyzing and reverse—engineering unknown binaries
●Provides guidance and technical expertise to analysts in order to provide well-documented, accurate reports
●Provides on the job training for new analysts
●Assists fellow analysts by creating templates in order to provide standardized analysis, therefore creating more streamlined, consistent products and reduce report assembly time
●Exploit digital data and/or investigate computer security incidents in order to derive useful intelligence and/or IDS signatures
●Collect and inspect forensically sound data to discern possible mitigation/remediation on DoD networks
●Create and maintain documentation on technical information, computer applications and/or programs
●Document research processes, analyses and results
cyber security intelligence analyst national security agency
{2009-2011}
●Monitored high-priority network intrusion detection signatures
●Briefed management daily with technical overviews
●Conducted analysis of metadata
●Monitored open and classified sources for useful information.
●Use knowledge of customer requirements to analyze and process intelligence information
●Monitor and protect information systems and infrastructures, and the information contained in or transmitted by these systems; this encompasses threat reduction, vulnerability reduction, information assurance, and computer network operations, to include anomalies, discovering means of penetration, and exploiting information system infrastructures
cryptologic technician, networks united states navy
{2009-2016}
●Provides computer (network and infrastructure) analysis and technical solutions to produce Computer Network Operations (CNO) effects in support of National Intelligence Requirements. Duties include, but are not limited to: Computer Network Defense Analysis, Digital Forensics Analysis, Digital Network Exploitation Analysis, Interactive Operations and Cyber Planning in support of Computer Network Operations.
navy interactive on-net operator (ctn, nec-9308) united states navy
{2013-2016}
●Navy Interactive ON-NET (ION) Operators use advanced software applications for network navigation and tactical forensic analysis
ASSISTANT LEADING PETTY OFFICER (ALPO) united states navy
{2015-2016}
●Responsible for completing the duties and responsibilities assigned to an LPO to manage and assist 8 subordinates for daily administrative requirements
Education
PROFESSIONAL AND MILITARY:
●53 credits toward a Bachelor’s degree in Computer Science, University of Maryland University College, 2009-Present
●Cryptologic Technician Networks Class “A” School, 2009
●Basic Digital Network Analysis, top of class, 2009
●Remote Interactive Operations Training – ROC Foundations Course, 2013
●Remote Interactive Operations Training – ROC Operations Course, 2013
●Advanced Windows Operations Course - KEYW
●Various National Cryptologic School Courses related to SIGINT reporting, SIGINT analysis, as well as Information Technology and network communications.
●Designation as an Apprentice Network Collection Operator, 2014
●Designation as an Apprentice Exploitation Operator, 2015
Certificates
●Certified Ethical Hacker (CEH), 2009
●Computer Hacking Forensic Investigator (CHFI), 2009
training
●Introduction to Python Programming (COMP3321)
●Cyber Incident Analysis and Reporting (RPTG2500)
●Certified Cisco Network Administration Bootcamp Course (COMP00060)
●SANS503: Intrusion Detection In-Depth (NETW00002)
●UNIX Fundamentals: Overview (LU_UNIX_A01_IT_ENU)
●The Fundamentals of Networking (218678_ENG)
●Networking Protocols (218709_ENG)
awards
●NSA/CSS Threat Operations Center (NTOC) Military Performer of the Quarter, Q1 2011
●Admiral LOA (C10F) 2011
References
●References available upon request.
CASE NUMBER: (DJ2-2015-02693)