L. MONIQUE HAIGLER
443-***-**** • adz3g7@r.postjobfree.com
Professional Summary
A military veteran, Cyber Security Professional/System Engineer performing information security, disaster and data recovery, incident analysis, and intelligence report writing. Over 15 years of leadership experience with exemplary personnel management with proven ability to create and deliver solutions to meet and/or exceed service level agreements. Apply analytical processes for implementation of new and improved information systems to meet business requirements.
Education & Certification
Technology Sales Certificate
UMBC Training Center, Virtanza 2022
Graduate Certificate in Cybersecurity Operations
Master’s Cybersecurity
University of Maryland Baltimore College 2019
Graduate Certificate in Cybersecurity Strategy and Policy
University of Maryland Baltimore College 2018
Undergraduate Certificate in Security Administration
Strayer University 2019
Strayer University 2011
BA Management
Strayer University 2010
BS Information Systems
American Inter-continental University 2007
Certificates: Technology Sales, CompTIA CASP, iTil V3 Foundations, CompTIA Linux+, EC Council Certified Network Defense Architecture (CNDA), EC Council Certified Ethical Hacker (CEH), CompTIA Security+
Professional Experience
Amazon, Remote Sept 2022 - Present
Cloud Support Engineer
Responsible for day-to-day customer care and administration of cloud services
Respond to escalated customer service issues using email, phone, and web conference technology
Work within a global support team covering 24x7x365 cloud operations
Able to write effective handoff from shift-to-shift for cloud support issues
Perform deep dive analysis on Enterprise customer accounts
Process accounts related to customer cases through case management tools and email
Make high judgement decisions providing high quality level of support
Work email deliverability, spam email case types to ensure enforcement issues, actions, and appeals are handled according to SOP and policies
WheelsUP Nov 2022 – Mar 2023
ADISYS, Remote April 2022 – Nov 2022
Cyber Threat Security Analyst
Execute, draft, edit, and maintain standard operating procedure (SOP) and policy documentation
Continuing content development of threat detection and prevention systems
Perform and provide threat research and analysis for cyber-attacks impacting client business functions
Liaise, update and present daily review of cyber threat warnings, bulletins, alerts, and incident reporting documentation and databases
Review IA certification and accreditation documentation, programmatic, and technical documentation for each system
Identify threats, vulnerabilities, or change to the level of risk associated with continued operations
Develop cyber scenarios for risk register through threat analysis, e. g. the MITRE ATT&CK Framework, Diamond Model, Cyber Kill Chain
Tracks Key Risk Indicators (KRIs) for Enterprise Risk Management program
JACOBS (VDTG), Columbia, MD. August 2015 - October 2021
Cyber Threat Intel Analyst/ ISSM/ TTO Lead
Develop and deploy methodologies for testing network performance and providing network performance statistics and reports
Evaluated and identified cross-domain violations and submits findings and mitigation techniques to the triage team
Establish, certify, harden, and mange classified information systems and networks in accordance with NIST standards
Managed a team of 6 employees, over 100 SSPs providing guidance to Information System Owners and sub teams
Tested and troubleshoot software in testing phase to ensure functionality and flow aligned with the needs of the end user
Created documents like System Security Plans (SSP), Incident Response plan, hardware/software list, topology and data flow diagrams and PIA
Agency Consulting Group, Columbia, MD. April 2014 - February 2015
System Engineer (Operations Manager)
Performed system availability to include correlating system up and down time to recent patches/upgrades to determine mission impact of over 750 critical systems
Maintained stable mechanisms, regularly updates to guarantee sustainment is ready to deploy, current patches, spin rollouts, and service packs and baseline upgrades
Planned for and monitor associated risks to identify mitigations against equipment failure to provide strategic guidance in re-prioritizing/redirecting resources
Booz Allen Hamilton, Annapolis Junction, MD. September 2012 – April 2014
Requirements Manager
Conducted initial intelligence research and analysis for access and collection discovery to develop techniques to define target-able intelligence
Identify collection gaps, prioritize collection, and strategically align its collection posture with mission requirements
Evaluated and assessed entire product line regarding collection, access and target discovery and provided recommendations for improvements in tools, procedures, and other vital resources
Authored, amended, assessed, and revalidated Collection Requirements to ensure current resources are efficiently utilized
Computer Science Corporation, Hanover, MD. April 2010 – September 2012
Lead Citrix VMware Administrator/ Intrusion Detection Analyst
Performed administration, management, and maintenance via Active Directory for user accounts through RDP, or VNC
Managed servers, including file, print, Citrix provisioning, backup servers and their associated operating systems and software
● Conducted network security and vulnerability assessment of networks, operating systems, perform deep packet analysis and applications by monitoring, verify intrusion, and initiate validation process using the selected IDS/IPS systems and activities related to CND mission execution
Applied Signal Technology, Annapolis Junction, MD. February 2011 – January 2012
CND Analyst
● Characterized and analyzed network traffic to identify anomalous activity and potential threats to network resources
● Analyzed network traffic and IDS alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms
● Configured and monitored multiple security tools (Solarwinds, Splunk) to ensure system integrity suggesting filters to mitigate false positives within the enclave
BAE Systems, McLean, VA. December 2006 – December 2010
System Support Engineer
Responsible for planning, development, implementation, and technical support of multi-platform, multi-system networks to encompass diagnosing network performance shortcomings, designing, and implementing performance improvements.
Led a team of 5 employees to author and update documentation of processes and procedures
● Identified security measures within the architecture and deployed measures by assisting the network security team through the Certification and Accreditation (C&A) of the McAfee e-Policy Orchestrator Enterprise Software
SSI Services, Inc., Falls Church, VA. October 2005 – December 2006
Network Security Technician
Administered Windows 2000 in a multi-server environment, of over 100 workstations and 250 end-users to maintain user accounts, and accesses
● Involved in the installation, configuration, and examination of HBSS (Host Based System Security) on our legacy network. Using HBSS EPO Orchestrator deployed agents to test and evaluate the network and configuration of the Host IPS portion of product to detect for rogue machines
● Conducted CT&E, IV&V and ST&E testing of networks, systems, applications, and architectures then analyze data and report all findings with a plan to mitigate the risk
Early Morning Software, Baltimore, MD. November 2003 – Apr 2005
System Engineer
Coordinated with 2 IT technicians to perform cable management operations to improve lab layout, increase server room cooling
Enhanced a strategy for process automation for configuration management and monitoring functions of the back-up infrastructure
Installed, configured, performed upgrades and repairs on server and storage systems.
Authored, collated, revised, and edited many company policies, manuals, and procedures for mass production
● Dynamically integrated requirements and design decisions into documentation to propose a layout compatible with compliance standards
Windermere, Annapolis, MD. August 2002 – Nov 2003
Network Engineer
● Oversaw security and vulnerability assessments on various information systems, servers, and associated networks
● Conducted research and make recommendations on network products, protocols, and standards in support of network procurement
Detected, identified, and remedied system fixes for software, system & hardware problems posing threats to system integrity
United States Army, various locations April 1997 – September 2002
Signals Analyst
Collected, tasked, processed, forwarded analysis, and reported findings in order assess risk to maintain system integrity
Transmitted, received, and processed all forms of telecommunications using fiber optics, digital microwave, and tactical and commercial satellites
● Tested and scanned systems using multiplexers, spectrum analyzers, and demodulators to perform and supervise collection, identification, exploitation, and analysis of data of interests