Brema Tangara
Clinton, MD ****5
Cell: 202-***-****
Email: *********@*****.***
SUMMARY OF QUALIFICATIONS:
Strong analytical skills with a broad range of Cyber security Network Detect and response experience, Systems administration experience
Excellent problem-solver with strong analytical skills; able to quickly grasp complex systems.
Productive self-starter with a strong work ethic; consistently achieve goals
Proven experience in CSSP environment; familiarity with different SIEMS
Multi Operating systems: Windows server 2003,Servers 2008, Server 2012, windows 7, Windows 8.1, Linux CentOS; McAfee, familiar with Virus scan Entreprise, Nessus, Nmap
well-versed in security operations, cyber security tools, intrusion detection, and secured networks
Demonstrated experience in drafting reports, documenting case details, and able to summarize findings and recommendations based on system analysis.
Nessus, Vulnerability assessment and mitigation, Understanding of Information assurance
Familiar with CJCSM 6510, DoD 8570.1DoDI 8510.01 Risk management Framework for DoD
EDUCATION:
June, 1987 University of Mali,
BA of English Language and Literature
June, 2003 Phoenix University
Pursuit MBA with Technology management
CERTIFICATIONS:
MCSE Track (Microsoft Certified System Engineer)
MCP (Microsoft Certified Professional)
Security+, MCSA Window 7, MCSA (Windows Server 2008)
ITIL v3 Foundation
ACAS 5.4, HBSS, CEH
CLEARANCE:
TOP SECRET
WORK EXPERIENCE
AUG2020 TO NOV2021: CSIOSCORP (DEPT OF STATE)
CYBERSECURITY INFRASTRUCTURE ENGINEERING LEAD
-Performing daily continuous monitoring of all instances of Splunk on both ClassNet and OpenNet server environment
-Configure alerts on servers for any abnormally
-Monitor and report daily health status of all Cyber tools of the department
Check on iPost and reports.
-Research, test and assess all department cyber tools
-Talking to hardware and software vendors and industry leaders
-Analyzing and researching cyber vulnerabilities
-Participating in department cyber related activities as needed and interact with government team leads
-Maintain the health, performance, stabilization, tuning and ongoing planning of the SIEM platform
OCTOBER 2018 TO APRIL 2020: BOWHEAD GOVERNMENT SUPPORT SYSTEMS (HPCMP)
Cybersecurity Analyst
Analyzing all relevant cyber security event data and other data sources
Monitor intrusion detection and prevention systems
Correlate data from intrusion detection and prevention systems with data from other sources
Identify misuse, malware, unauthorized activity, target threats and malicious activities on monitored networks
targeted threats and malicious activity including but not limited to: CEDAR, Bro (Zeek), EPO HBSS, and other web based tools.
Determine if an event meets the criteria for additional cyber hunt investigation and/or constitutes a security incidents subject to investigation and notify team lead.
Providing threat intelligence collection and monitoring, analysis, and reporting
Write incident reports based on investigation, intelligence received from threat cell or other sources
Determine the nature of reports and classification
Suggest recommendations to CSSP customers for remediation and mitigation of system vulnerabilities discovered
Work closely with team members to follow up on all incident reports from creation to closure
DECEMBER 2015 TO SEPTEMBER 2018: PHACIL,INC (HPCMP)
Cybersecurity Analyst
Monitor Networks in a CSSP environment
Provide proactive monitoring, event management/configuration of the following security tools for targeted threats and malicious activity including but not limited to: CEDAR, Bro (Zeek), EPO HBSS, and other web based tools.
Determine if an event meets the criteria for additional cyber hunt investigation and/or constitutes a security incidents subject to investigation and notify team lead.
Providing threat intelligence collection and monitoring, analysis, and reporting
Write incident reports based on investigation, intelligence received from threat cell or other sources
Determine the nature of reports and classification
Suggest recommendations to CSSP customers for remediation and mitigation of system vulnerabilities discovered
Work closely with team members to follow up on all incident reports from creation to closure
Sept 2013 to December 2015: STG/Catapult Technology (US Army Research LAB)
Senior Network support Specialist.
● Installation, Configuration and deployment of Windows Server 2003, 2008 and 2012
● Configure and maintain workstations and laptops for Windows 7
● Provide technical and operational user support and training
● Maintain, manage, provision and administer classified accounts ( users, computers)
● Patching servers and workstations for different vulnerabilities
● Scanning Servers, workstations and other network equipment for vulnerabilities
● Server backup and workstation imaging
● Support SIPR network machines and network printers
● End user software and hardware troubleshooting
● Conducts vulnerability assessments and security scans of systems and
networks to identify and mitigate security vulnerabilities
● Maintains awareness of the latest security tools, including
vulnerability assessment, network discovery, penetration, and other tools
that could aid in providing better services
● Performs risk assessments, identifies potential of exploitation, and
assigns risk levels to systems.
● Troubleshoots, analyzes, resolves, tracks, escalates and accurately
documents various technical problems
● Performs IAVM activities in accordance with DoDI 8510.01, DoDD 8500.01 and
● Generates IA related reports and documentation, including Validation
Reports and Plans of Action and Milestones.
Jan 2011 to Sept 2013: General Dynamics Information Systems(Usace- Afghanistan)
Systems administration Specialist
Windows Server 2008 maintenance and application maintenance, user account maintenance
Install, troubleshoot, repair and perform preventive maintenance on all IT equipment on site
Support and maintain system applications of all assigned locations
Training users on different in house applications and operating systems
Followed up on migration issues
Processing trouble tickets, maintain user accounts, back up data systems and recovery
Travel to different AO for site stand up or maintenance (imaging PCs, installation of applications and set up of Server equipments and Printers)
Responsible for daily technical operations on assigned locations and address all issues
Provide technical support to users for computer software and hardware.
Receive, log and investigate customer service calls, document and solve client connectivity problems
Provide timely response to client and management requests.
Feb 2007 to Oct 2010: Lockheed Martin Corporation (US Dept of Homeland Security)
System administrator/ Assistant Site Lead
Provided technical support for all VIPs and executives, and communicated with excellent skills
Performed advance assistance to end users with all computer related technical issues.
Ensure that all workstations are current on drivers, patches and security updates.
Troubleshoot all PCs, laptops, network scanners, and all printers network connectivity issues
Set up of all new workstations, and printers and responds to complex technical hardware and software issues
Active Directory user account and BES server maintenance
Assisted site lead with various duties such as meeting attendance, reports and directing tasks to different technicians
Troubleshoot all hardware and software : Windows 2003, DNS, Active Directory, IE browser, MS Outlook, Visio, MS project, Win magic, Cisco VPN and other custom designed products
Trained users and other junior technicians to allow effective and efficient practice of their duties
Provides technical guidance for directing and monitoring information systems operations
Install and troubleshoot Blackberries and all wireless devices
Member of Emergency Response team for agency and participate in all COOP operations