Bradley “Brad” E Roberson
**********@*****.***
linkedin.com/in/bradley-roberson-88b29aba
PROFESSIONAL SUMMARY
Experienced Network Security Analyst with 14+ year background in network security. Adept at utilizing network monitoring tools such as SNORT, Various SIEM appliances, Imperva Web Application Firewall, and TrendMicro Intrusion Prevention System in order to isolate network security deficiencies and creating comprehensive reports of network issues. Experienced in leading a team of cyber security engineers in monitoring live traffic, identifying malicious activity, and implementing countermeasures. Strong knowledge of incident response, documenting, and change management. Proficient in SNORT rule writing/implementing and implementing other countermeasures as needed. Experienced using Wireshark for deep packet analysis and network troubleshooting. Some experience with malware analysis in a sandbox environment.
SKILLS
Public Trust Clearance
Deep packet analysis
Basic malware analysis
Network configuration
Troubleshooting / Problem solving
Routers / Firewalls
Snort rule writing and implementation
Active Directory
Countermeasure implementation
Analyze C++, Perl
Unix, Linux
Trend Micro
Virtual Private Network
Intrusion detection & prevention systems (IDS/IPS)
McAfee ESM, ATD, Web Gateway, ePO
Avecto
Proofpoint Enterprise
Sourcefire
Arcsight
Imperva
Extreme Networks
Nmap
Incident response skills
Analytical skills
Information security
Computer forensics
VMWare
Information assurance
Enterprise security tools
Windows NT
Windows 10
Microsoft Office 2010
EDUCATION
Stephen F. Austin State University – August 2004 to December 2006
Cisco Certified Enterprise Network Technician, June 2014 (CISCO-ID: CSCO12638668)
Cisco Certified Network Associate, June 2014 (CISCO-ID: CSCO12638668)
Cisco Certified Network Professional, April 2015 (CISCO-ID: CSCO12638668)
U.S Navy Joint Cyber Analysis Course Graduate, June 2011.
NSA/CSS Certified Global Network Analyst, July 2011.
NSA/CSS Certified Cyber Security Intelligence Analyst, Jan 2012.
NSA/CSS Certified Tactical Data Triage Analyst, Jan 2012.
NSA/CSS Certified Senior Collections Officer, Oct 2013.
NSA/CSS Certified Cyber Security Tasking Officer, March 2013.
U.S Navy Qualified Enlisted Information Dominance Warfare Specialist, Sept 2013.
NSA/CSS Certified Senior Cyber mission Manager, Feb 2014.
OSINT Experience
EXPERIENCE
Schwab/TD Ameritrade – Contractor 12/05/2023 to 08/05/2024
SOC Analyst/Security Engineer
Monitor and diagnose network device issues, providing detailed error reports.
Oversee scheduled data transfer jobs, promptly addressing any failures or interruptions.
Manage change notifications, ensuring accurate reporting and alignment with the change management process.
Collaborate with a weekend team of five to maintain seamless data center operations.
Wipro Limited 08/04/2021 to 06/07/2023
Senior Security Engineer
Monitored, defended, and maintained customer networks by deploying SIEM tools, network security platforms (Palo Alto Panorama, IBM QRadar SIEM, CrowdStrike), and managing incidents through Demisto and ServiceNow.
Collaborated with a team of analysts to protect systems from emerging threats, ensuring off-hours security coverage and compliance with security SLAs to meet client expectations.
Configured and implemented advanced network technologies, including VLANs, LAN switching (STP, MSTP, RSTP, EtherChannel), and routing protocols (BGP, EIGRP, OSPF, MPLS), enhancing network efficiency and reliability.
Deployed and managed Palo Alto firewalls in complex, multi-vendor environments.
Conducted regular firewall audits to identify and remediate misconfigurations and policy gaps.
Configured and managed enterprise-grade firewalls, including traffic filtering, NAT rules, and advanced security policies.
Engineered robust security solutions for VPNs, firewalls, enterprise routers, and IDS, while optimizing WAN protocols (ATM, ISDN, PPP) and multicast protocols (PIM, MSDP) to strengthen overall network infrastructure.
Zensar Technologies, Inc
City of San Diego (Remote) - SOC Analyst 06/19/2019 to 08/04/2021
Monitored, defended, and maintained the City network using a range of network tools, including Palo Alto Panorama, Sumon Logic, JASK, CrowdStrike EDR, and Netskope DLP.
Detected and analyzed network traffic for DLP incidents, reporting and responding based on incident severity while utilizing Demisto for efficient ticket management.
Leveraged Palo Alto’s App-ID technology to enforce granular application control policies.
Performed vulnerability assessments and applied firmware upgrades to ensure firewall security.
Collaborated with a team of 4 analysts to protect City and subsidiary systems from emerging threats outside of normal working hours, ensuring compliance with security SLAs.
Utilized Palo Alto's Threat Prevention features to block malware, exploits, and command-and-control traffic.
Provided comprehensive analysis, documentation, and guidance to city users, while leveraging open-source intelligence (OSINT) tools to assess and validate threats.
Cloudious
Contactor at AmerisourceBergen - L3 Intrusion Response Analyst 10/23/2018 to 12/28/2018
Monitored, defended, and maintained the corporate network using the SNYPR SIEM tool, ensuring comprehensive network security.
Detected and assessed DLP incidents in network traffic, reporting and responding based on incident severity to mitigate potential risks.
Collaborated with a team of three L3 senior analysts to protect company and subsidiary systems from both known and emerging threats.
Provided analysis, documentation, and guidance to bank users, while overseeing and directing analyst activities to meet security SLAs and ensure client satisfaction.
Lewis & James Professionals- Texas Capital bank
Security Analyst 6/20/2018 to 10/05/2018
Monitored, defended, and maintained the corporate network using McAfee security tools to ensure robust protection.
Integrated firewalls with SIEM solutions for real-time monitoring and automated threat detection.
Collaborated with a team of three to safeguard bank systems from known and emerging threats, while conducting ongoing research to stay updated on new threats.
Oversaw and guided analysts, coordinating with multiple delivery teams to enforce security policies and enable uninterrupted user operations.
Reviewed and addressed suspected phishing and spam emails, educated users on best practices, and provided analysis, documentation, and guidance on corporate security policies.
CGI Federal Inc. 10/26/15 to 5/15/2018
Security Operations Center (SOC)
Established and currently support 24/7 security monitoring capabilities, working night shifts to ensure continuous SOC operations.
Collaborate with a small team to protect customer systems from both known and emerging threats.
Provide oversight, guidance, and expertise to analysts, working with multiple entities to meet security SLAs and ensure client satisfaction.
Deliver analysis, documentation, and guidance to customers, utilizing well-known network security tools and HP ArcSight SIEM for investigating potential attacks and malicious intrusions.
US Navy - National Security Agency 11/19/09 to 11/04/2015
National Threat Operations Center (NTOC)
Led and managed cyber operations as a Senior Cyber Manager (Mission Manager and SCM), overseeing Operations Center activities, directing multi-service personnel, and making strategic decisions to address current cyber events and maximize resources.
Conducted in-depth security analysis as a Cyber Security Information Analyst and Cyber Security Intelligence Analyst, providing expert analysis on adversary intrusions, network traffic, and developing strategies to support global Computer Network Defense.
Directed and executed malware analysis as a Tactical Data Triage Analyst, leading a team in identifying and countering malicious threats, and delivering detailed reports and countermeasure recommendations.
Coordinated threat detection efforts as a Cyber Security Tasking Officer, leading a team in monitoring and tasking threat detection signatures, and implementing focused real-time monitoring to enhance defense system operations