Post Job Free

Resume

Sign in

Cyber Security Vulnerability Management

Location:
Washington, DC
Posted:
August 18, 2023

Contact this candidate

Resume:

Daniel Ngungoh

Rosaryville RD 301-***-****

Upper Marlboro, MD 20772 ady1aw@r.postjobfree.com

OBJECTIVE

Seeking positions that will utilize my knowledge and skills in computer networking, network security and engineering to enhance my professional growth.

EDUCATION

Doctorate in Cyber Security 04/22/2020

Capitol Technology University Laurel, Maryland

Specialty: Vulnerability Management and Insider Threat Analysis and Investigation.

Master of Science in Information Technology Management: 01/2010–05/2012 Cyber Security and Homeland Security Management Adelphi, Maryland

University of Maryland University College

Bachelor of Science in Computer Networking and Information Systems:

Strayer University 09/2002 – 06/2008

Rockville MD

LAN/WAN Engineer Program Training and Certificates 06/2008 – 12/2008

Tech Pros Group, Inc. Irvine, California

Database Administration Program 5/1/2013

Oracle University Greenbelt, MD

PROFESSIONAL CERTIFICATIONS

Qualified Penetration Tester License (Q/PTL). 05/28 /2016

Hendon VA

Qualified Ethical Hacker (CEH) 03/20/2016

Herndon VA

Qualified Wireless Professional (Q/WP) 04/5/2016

Herndon VA

CompTIA Security + Certification 02/2016

Downers Grove, IL

Cisco Certified Network Professional/Associate (CCNP/CCNA) 12/2010

Cisco Systems, Inc. San Jose, California

Microsoft Certified Systems Engineer Security (MCSE Security) 09/2010

Microsoft Corporation Redmond, Washington

Dell Certified System Engineer (DCSE) 07/2010

Dell Round Rock, Texas

Oracle Certified Associate (OCA) 15/2015

Oracle Greenbelt, MD

Community Emergency Response Team (CERT) 03/2010 – 06/2015 Montgomery County CERT Montgomery County, MD

TECHNICAL SKILLS

Connectivity & Hardware: Cisco 2500, 2600, 3500, Catalyst 1900, 2900, 4500, R/S 6000, Firewalls, Routers, Switches, Wireless, T1, Ethernet, Fast Ethernet, Gigabit Ethernet, FDDI, Cable/DSL Modem, Analog Dialup, and installing network cabling.

Protocols: TCP, IP, ICMP, IGMP, NetBEUI, PPP, NFS, NetBIOS, VLAN, WLAN, 802.11x, 802.1x, NAT, VPN, FTP, BGP, RIPV2, OSPF, ARP.

Operating Systems and Enterprise Applications: Windows Server, Exchange, Trend Micro Antivirus, ISA firewall, Cisco ASA, Proxy Server, UNIX, Linux (Red hat and Ubuntu servers), Mac, VM Ware, Terminal Server.

Technologies and Tools: RAID, UPS, Active Directory, DNS, DHCP, RIS,

Remote Desktop, IIS, VPN, L2TP,

Scanning/Vulnerability/Penetration Testing Tools: Nessus, Retina, OpenVAS, Wireshark, Tenable SC, Cain and Abel, Kali Linux, Nmap, Burp suite, etc.

Programming and Database Desktop Technologies: Shell scripting, PowerShell scripting, PL/SQL, C/C++, Java, Visual Basic .NET, HTML/XHTML, Python and ASP.

Desktop Technologies: Window 10, MS Word, Excel, Access, Visio, Power Point, Front Page, Internet Explorer, Mozilla Firefox, and Microsoft project.

SIEM Products: Splunk, Solar winds Event Manager, and McAfee Enterprise Security Manager.

Information Security standards: FISMA implementation of the Risk Management Framework (RMF), NIST 800 Series, DFARS (Defense Federal Acquisition Regulation Supplement), Health Insurance Portability and Accountability Act (HIPAA), ISO 27701 the requirements for a PIMS (privacy information management system), ISO 27032 the international standard offering guidance on cybersecurity management, and NISP (NISPOM).

SUMMARY WORK EXPERIENCE

Network administration and vulnerability management experience. The ability to pen test all computer networks and systems. Ability to scan, monitor, assess, and defend enterprise information systems and networks (web sites, applications, databases, data centers and servers, networks, desktops, and other endpoints) in a SOC environment. Ability to detect, validate, contain, remediate, and communicate computer-based security events and incidents such as malware infections, potential compromise, Distributed Denial of Service (DDoS), etc.

Experience with different API tools supporting either REST, SOAP or both architectures such as Ready API. Good understanding and knowledge with SOAP, REST, and their structure request. Good understating of services and web services.

Ability to respond to incidents, investigate violations, and recommend enhancements to potential security gaps. Stay one step ahead of hackers and constantly research data, learning about new technologies and gathering information on the latest risks. Analyze data to spot trends. Create tools to support research efforts. Mitigate threats by gathering information and developing plans. Monitor networks for security breaches. Train users on security protocols. Develop best practices and security standards, create and test disaster recovery procedures to keep IT running in the event of a security breach or disaster.

The ability to prevent all types of phishing attacks including Spear phishing by conducting, continuously refreshing, and performing security awareness among employees.

Experience using DLP tools, Antivirus, and endpoint security tools to intercept and block malicious processes as they are executed on a user’s device. The ability to use penetration testing tools to compromise vulnerable systems and help discover employees or systems susceptible to exploits. Familiar with Forescout ICS Patrol and Forecourt eye Inspect. Used burp suite for dynamic application security testing, web application scanning and to intercept traffic. Used burp suite to pen test web application. Brute force form fields and input fields to test for vulnerabilities.

Experience with SIEM and UEBA tools to ensure the organization has the means to rapidly collect data about security incidents, identify what is going on and notify security staff. Ability to configure, monitor, audit, and troubleshoot applications, networks, and systems in all environments. Experience writing technical and system design specs and documentations for SMEs and developers. Experience writing reports such as SAR, SOPs, checklist, security policies and the Business Impact Analysis (BIA)

Experience managing Insider Threat Program and execution. Experience applying IT infrastructure and applications policies to ensure efficiency, reliability, confidentiality, and integrity. Apply IT systems engineering principles to reduce errors and improve performance of the IT systems.

Experience with Infrastructure Security to enterprise IT environments, protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.

Experience in project management and an excellent team motivator. Good verbal and listening skills, good customer service provider, fast learning, and the ability to brainstorm. Good products development experience to support information technology governance, control, and assurance, risk, and cyber security. Experience researching on information system controls and the critical role they play in organizations.

Experience working with NIST 800 Series, FISMA implementation of the Risk Management Framework (RMF), ISO 27001/27032, SANS top 20, NISPOM, FedRAMP, HIPPA, and PCI CSS to pass and maintain compliance.

CFTC/GDIT CONTRACT (1155 21st street. NW DC) 01/2016 – Present

Position: Senior Cyber Security Analyst (Team Lead)

Responsibilities: Develop Information Security Plans and Policies. Lead vulnerability management operations. Scan and assess network for vulnerabilities. Research, review and interpret vulnerability scanning and penetration test results to reduce technical risks. Analyze and assess cyber threats, vulnerabilities, and patch management strategies based on the FISMA Risk Management Framework (RMF).

Perform basic risk discovery, assessment, remediation, and handling of common and complex issue types, and reporting suspicious activities. Perform threat and risk assessment to protect possible insider threat in the organization. Identify policy violations, among a variety of other duties related to insider threat. Experience writing, testing, and deploying UAM signatures and identifying trends and patterns in the data. Familiarity with risk scoring and threat analysis tools Experience with User and Entity Behavior Analytics and Data Loss Prevention (DLP) security controls.

Experience implementing FISMA Risk Management Framework (RMF), FedRAMP, HIPPA, and PCI CSS for vulnerability mitigation and remediation. Experience creating vulnerability policies, POAM documents, SAR, and Authorization to Operate (ATO) packages.

An in-depth knowledge and experience with vulnerability scanning tools (network and web application) and risk mediation activities such as Nessus, Retina, Wireshark, and OpenVAS.

Essential Duties and Responsibilities: Analyze vulnerability assessment and penetration test data to identify technical risks to the organization. Support the identification and impact classification for new vulnerabilities identified in the client's environment including insider threat.

Monitor, scan, and test computer networks to ensure safeguards are in place to protect sensitive information and proprietary data from cyber criminals and insiders. Monitors and manages network traffic with Security Information Event Management (SIEM) tools such as Splunk, snorts and Event log Analyzer.

Experience developing Splunk apps, customizing Splunk dashboards, creating Splunk searches, performing scans and analyzing scan reports, and implementing integration with external systems. Experience configuring Tenable SC and Nessus Scanners and performing scans, analyze scan reports, create dashboards, and generate reports.

Assist in identification and reduction of vulnerabilities at enterprise level. Support leadership to identify capability gaps in vulnerability management services. Conduct analysis and aggregation of vulnerability data from various sources. Maintain knowledge of current vulnerability security trends and clearly communicate them to the client. Research all vulnerabilities and provide remediation. Generate tracking reports to display vulnerability status. Respond to Cyber-attack excellently by proactive planning, assessment, and reporting.

Performs vulnerability assessments, penetration testing (Network, Web Application, and Server) and social engineering activities to protect network and defend attacks from all angles including insiders. Implement software such as firewalls, IDS and IPS to protect computer networks. Plan and carry out security measures to protect the organization's computer networks and systems. Stay ahead of hackers and the increasing cyber security threats.

Experience performing duties and special functions in planning and organizing hardware, software, and information management requirements to maintain pace with emergent technology and cyber requirements. Ability to deliver oral and written presentations, and proposals to senior management and procurement officials on project statuses, requirements, budgets, technical support, systems, application, and other related issues.

University of Maryland Global College (UMGC) 06/2016 to Present

Position: Adjunct Professor (Part time)

Teaching Experience:

Prepare students for security plus certification and other related certifications. Experience teaching cyber security courses and any computer related course at the private and government institutions including the following key subjects:

Vulnerability management/Analysis: Introduction to vulnerability management tools, vulnerability analysis, assessment and tracking, vulnerability research and remediation, and the effects of false positives and false negatives.

Operating Systems: introduction to all operating systems including LINUX, UNIX, and Windows. Use virtual environment to demonstrate functionality and to enhance hands-on learning.

Networking: Experience in all networking concepts, including attacks and defense, monitoring, troubleshooting, and connectivity. Good understanding of network layers and protocols.

System Administration: Knowledge of all important tools and programming used on the network. Good understanding of all web applications and servers including IDS/IPS and Firewalls.

RESCUE MISSION FOUNDATION 09/2013 – 01/2016

Position: Security Specialist Lead Gaithersburg, Maryland

Duties: Organize team and create schedules for the team members. Install, maintain, support, upgrade, trouble-shoot, and support network services, operating systems, and security systems. Install and manage security mechanisms to protect networks and information systems against hackers, breaches, viruses and spyware. Work extensively on all platforms including UNIX, Linux (Red hat, Solaris, and AIX), and Mac systems. Experience writing technical and system design specs and documentations for SMEs and developers.

Respond to incidents, investigate violations, and recommend enhancements to potential security gaps. Stay one step ahead of hackers and constantly research data, learning about new technologies and gathering information on the latest risks. Analyze data to spot trends. Create tools to support research efforts. Mitigate threats by gathering information and developing plans. Monitor networks for security breaches. Train users on security protocols. Develop best practices and security standards, create and test disaster recovery procedures to keep IT running in the event of a security breach or disaster.

Monitor computer networks for security threats, identify compromised machines and report on security measures taken to address the threats. Analyze security risks and develop response procedures. Developing and testing software deployment tools, firewalls, and intrusion detection systems. Performs penetration testing, evaluates, recommend, and implement other security devices. Install computer security software, conduct regular security audits, prepare security status reports, educate users on computer security, create security documentation for users, assist in disaster recovery and gather evidence regarding cyber security issues.

NASA /Capstone contract 08/2011 - 09/2013

Position: Team lead (Network admin) Greenbelt, Maryland

Duties: Provide IT support and general network administration services. Configure and install printers, PC’s, laptops, servers, phones, and general Windows and Mac related issues. Perform migration, backups, configurations, installations, and troubleshooting of hardware and software. Setup video and audio-conferences, active directory, network and application monitoring, and other network related issues. Configure windows server 2008 clusters for load balancing. Use SM7 application for ticketing.

Monitor computer networks for security threats or unauthorized users to identify compromised machines and report on security measures taken to address threats. Analyze security risks and develop response procedures. Developing and testing software deployment tools, firewalls, and intrusion detection systems. Performs penetration testing, evaluates, recommends, and implement other security devices. The ability to Install and configure computer security software, conducting regular security audits, preparing security status reports, educating users on computer security, creating security documentation for users, assisting in disaster recovery, and gathering evidence regarding cybercrimes.

Ability to provide technical support to users and systems upgrades on windows and Linux platforms. Maintain system security plans and perform system hardening as required.

Good understanding of security procedures and computer networking. Familiar with EMC Networker and a variety of third-party applications, including Putty, SharePoint, SSH, FTP, syslog, SNMP, VPN, trouble ticketing system/s, VNC, Client OpenView, Nagios, Solarwinds, and ZenOSS

ZDNC Network Consulting firm 07/2004 – 08/2011

Position: IT Manager/ Security Specialist. Gaithersburg, Maryland

Duties: General management and troubleshooting, computer and electronic repairs, built, supported, and managed networks, configured and supported wireless networks. Configured, installed, maintained, upgraded, and supported network services such as messaging and DNS, and protocols to include TCP/IP, DHCP, LDAP.

Monitor computer networks for security threats, identify compromised machines and report on security measures taken to address threats. Analyze security risks and develop response procedures. Develop and test software deployment tools, firewalls, and intrusion detection systems. Performs penetration testing, evaluates, recommend, and implement other security devices. Installing computer security software, conducting regular security audits, preparing security status reports, educating users on computer security, creating security documentation for users, assisting in disaster recovery, and gathering evidence regarding cyber crimes

LANGUAGES

Write and speak French and English fluently.

MEMBERSHIP AND ACTIVITIES

American Society for Industrial Security (ASIS)

Insider Threat Maturity Framework (ITMF)

Beta Gamma Sigma honor society - member (Capitol Technology University)

UMUC Alumina

Microsoft Professional Association

PROFESSIONAL REFERENCES

Sirak Mulatu

ady1aw@r.postjobfree.com

Cell 703-***-****

Rodney Scites (Supervisor) CFTC

Phone: 202-***-****

Fred Yeboh (Supervisor)

phone: 240-***-****

ady1aw@r.postjobfree.com

Iqbal Mohammad (supervisor)

571-***-****

ady1aw@r.postjobfree.com

Bonjawo Jacques (Manager) CFTC/GDIT

Phone 202-***-****

Bessaha Nabil (supervisor)

NASA /Capstone Inc

Team Lead

Telephone: 202-***-****

Douglas Kebengwa (supervisor)

ZDNC Consulting firm

Network administrator

Telephone: 301-***-****

John Lee

Rescue Mission Foundation Inc. (General Manager)

Telephone 301-***-****

Mr Chikuma

Lecturer Strayer University

Telephone: 703-***-****



Contact this candidate