Obtain a position as an Intel/Cyber Analyst and Cybersecurity/Information Assurance SME. Providing practical experience in intel, production, cyber security, and IT services to support my work experience and education.
Education / Skills
University of Maryland Global Campus April 2020-Present
M.S Cyber Security Management and Policy
University of Maryland Global Campus February 2017-September 2019
B.S. Computer Networks and Cyber Security
Information Warfare Training Center, Corry Station February 2017
Graduated Navy IT “A” School with honors and class leader
1st Qualified IT Fleet Intel Watch Officer in Navy History
CompTIA Security+ Certification
Certified Ethical Hacker (CEH)
Cisco CCNA Network Fundamental Training
Operating Systems: Microsoft Windows
Miscellaneous: Microsoft Office Suite
Fault Analysis server/application
Customer Service (ITIL)
DISA: ByLight Professional IT Services (Contractor) January 2021 - Present
Senior Data Migration Engineer: Serve as a Data Migration Engineer to design solutions that mesh with an enterprise environment, recommending best practices for the entire solution. Serve as the subject matter expert, leading initiatives around creation of a user interface approach to minimize business impact on migration readiness and planning. Work with customers from cradle to grave to ensure successful onboarding with a strong understanding of their requirements and how they will connect to the Cloud Based Internet Isolation (CBII) cloud.
United States Senate: Intrepid Solutions (Contractor) June 2020 – April 2021
Senior Cyber Threat Intelligence Analyst: Serve as an Asymmetric Cyber Security Analyst on the Cyber Threat Intelligence Cell supporting 100 Senators for the United States Senate Sergeant-at-Arms (SAA). Responsible for drafting daily intelligence assessments for current and emerging threats to the SAA’s cyber interests, participating in working groups, and leading discussions and briefings at directorate levels. Providing inputs on TTP’s, APT’s, IOCs, and other malicious threat actors focusing on Nation-state APTs and generalized cyber criminals. Utilizing Splunk, WireShark, ThreatStream HBSS, and ACAS, etc.
DISA: DDC-IT Services (Contractor) March 2020 –Present
Cyber Security Analyst/Information Assurance: Provides mission partners with information on Ecosystem Cyber requirements and services, assist with service requests, assist with issues and concerns, and provide communication between Cyber and mission partners during the entire lifecycle of the program. Performing fortified scans using eMass and ACAS. Working technical knowledge of network control protocols (QOS, PoE, NTP, DHCP), network management protocols (CDP, FTP, TFTP, SNMP) and security protocols (SSH, HTTPS, AAA, DLP, ATP, IPsec, STIG, packet analysis, Windows, Linux). Review alerts and packet-level data from sensors and document formal, technically-details incident reports for dissemination to customers. Research emerging threats and vulnerabilities to aid in the identification of network incidents.
NSA: Fleet Cyber Command / C10F (Navy) April 2018 –March 2020
Fleet Intelligence Watch Officer/Cyber Analyst: Responsible for operating and defending Navy Networks, communications, and space; providing tailored SIGINT; delivering Cyber, EW, and IO warfighting effects; and providing certified Cyber Missions Forces to U.S. Cyber Command. Provides all source intelligence analysis to Commander, FCC/C10F assigned forces and other Navy staffs to support the Navy’s execution of Cyber, EW, IO, SIGINT, and space missions across cyberspace and other warfare domains.
DISA HQ/JFHQ-DODIN (Navy) October 2017-April 2018
Intel/Cyber Analyst: Responsible for Collection Management on the Joint Operation Center (JOC) watch floor conducting 24/7 operations. Performed extensive briefing of flag level officials on cyber/intel activity around the world. Working hand to hand with DISA on cybersecurity threats to the DODIN. Managed and coordinated all information Technology (IT) support activities related to computer operations in a client / server environment, to restore service and/or identify and correct core problem(s).
IWTC Corry Station: Information System Technician (Navy) June 2016 - October 2017
Information Systems Technician: Performed computer forensics and virus removal on suspect computer systems. This included the evaluation virus protection software logs and data recovery. Trained as a computer repair technician with Windows 7/10 operating systems, and Dell and HP. Responsible for updating, building, and configuring new computer hardware and deploying software packages. Performed on component level diagnostics and repair on network communications equipment for both secure and non-secure computer equipment.
GT Brothers Inc. (Civilian) May 2014 - June 2016
Information Systems Technician / Network Security Professional: Works as an IT Technician, resolving trouble-tickets and setting up VTC’s. Dealing with customer support, and regularly trouble shooting basic hardware and/or software issues within the company. Acting as company’s sole IT Technician. Provided advice, support and guidance to site IT infrastructure as well as manage assets, backup/restore operations, preventive maintenance, security investigation, problem resolution, and classroom setup for infrastructure over 100 end users.
References upon request