Post Job Free
Sign in

Space Systems Critical Infrastructure

Location:
Baltimore, MD
Posted:
April 14, 2025

Contact this candidate

Resume:

Nicolas Byron Lee

Contact: 301-***-**** Email: ********@*****.*** / *******.***@****-***.***

PLEX Solutions, LLC. Clearance: TS/SCI Polygraph, Current as of June 2021

A highly motivated and respected professional who possesses the ability to think critically and remain flexible through intensive, fast-paced environments. Has an in-depth understanding and expertise of both weapon and space systems and cybersecurity to help facilitate the mitigating of vulnerabilities critical to the mission. Continuing to advance the implementation of cybersecurity, survivability, and resiliency across the community, collaborative interaction must correspond to create new techniques to stretch the spectrum and broaden horizons regarding the critical infrastructure of our most valuable systems, in support of U.S. Government efforts to counter threats to U.S. national security interests.

HIGHLIGHTS OF QUALIFICATIONS

Apply advanced skills in conducting testing and analysis to identify vulnerabilities and potential threat vectors into systems and networks, while developing exploits and engineer attack methodologies.

Background knowledge and experience with information systems security engineering and security officers, in terms of developing and implementing security designs while understanding the authority and duty to administer security requirements throughout an organization.

Strong analytical skills coupled with a problem-solving mindset, focused on the development of practices, policies, and procedures, to better implement cyber risk management to protect and defend critical weapons systems, command and control systems, and defense critical infrastructure.

Self-motivated individual who flourishes in challenging situations, and thrives in dynamic environments that requires collaboration with others and is under consistent review.

Exceptional ability to communicate orally and in writing with any level of personnel, including military and leadership.

Possess an in-depth understanding of how to quickly learn and asses emerging technologies as it regards to software and hardware systems.

Extremely proficient in Word, Excel, PowerPoint, and Microsoft Outlook.

Work Experience

June 2024 – Present PLEX Solution, LLC. Weapons Cybersecurity Division, NSA/CSS Ft. Meade, MD System Engineer

Working under the Space cybersecurity division that focuses on subject matter expertise to system owners and network defenders to enable interoperable, secure data and communication for the U.S. government, Department of Defense, and foreign partners over an evolving space infrastructure. Determined to reduce risk to space systems by mitigating the systems of highest importance, hardening system I development, contesting the adversary in cyberspace, and ensuring that the best cryptography and security is utilized to the best of its capabilities.

As a systems engineer, the role that has been tasked requires the development and oversight of all aspects of a complex system in order to mitigate a vulnerability. The development and use of defensive and zero-trust monitoring maturity model, coupled with operational technology/supervisory control and data acquisition (OT/SCADA), enables the engineer to conduct in-depth analysis on the system matter, and providing recommended plans of action through the monitoring of users, devices, data, automation, and applications, to provide analytical and gap analysis metrics to the customer to better secure our nation’s most important systems.

August 2021 – June 2024 Weapons Cybersecurity Division, NSA/CSS Ft. Meade, MD Grades: 9-11 System Vulnerability Analyst

Worked as a system vulnerability analyst (SVA) for the Weapons Cybersecurity Division of the Cybersecurity Directorate (CSD), focusing on identifying and analyzing vulnerabilities of and attacks to the design and operation of a system. Other related tasks required analysts to compare and contrast various attack paths and techniques, in order to develop operationally effective countermeasures for the customer. Concepts and principles of computer security such as, virus attacks, buffer overflow, hacking, network defense and encryption, are all formulated to technically present critical information for current and future iterations of systems deployed throughout our military services.

Being in an intelligence occupational group, my priorities of an SVA include the concepts and principles of computer security of vulnerabilities, threats, and countermeasures regarding hacking, encryption, and network defense, while also conducting technical writing and revision of complex documents regarding policy, proposals and design. When interacting with customers, there is an expectation to plan, organize, prioritize and schedule the necessary discussions, which correspond with the appropriate course of action to make decisions critical to the mission. The identification of relevant sources of data or information are used to establish methods during collection, while also identify the short-term and long-term implications of a proposed action or solution to the mission.

EDUCATION\CERTIFICATIONS

April 2024

CompTIA Security+ SY-601

August 2018 - December 2020

Cybersecurity Technology, Master of Science

University of Maryland University College, Adelphi, MD

Communicating, Problem Solving, and Leading in Cybersecurity

Cyberspace and Cybersecurity Foundations

Prevention of Cyber Attack Methodologies

Advanced Cyber Exploitation and Mitigation Methodologies

Digital Forensics Technology and Practices

August 2015 - May 2017

Homeland Security, Minor

University of Maryland University College, Adelphi

Introduction to Homeland Security

Legal and Political Issues of Homeland Security

Infrastructure to Homeland Security

Homeland Security and Intelligence

Homeland Security and International Relations

August 2014 - May 2018

Cybersecurity Technology, Bachelor of Science

University of Maryland University College, Adelphi, MD

Fundamentals to Networking

Introduction to Linux

Network Security

Ethical Hacking

Cloud Technologies

Switching, Routing and Wireless Essentials

Current Trends and Projects in Computer Networks and Cybersecurity

SKILLS & PROFICIENCIES

Incident Response Management

Security infrastructure architecture

Novice programming literacy in Java, Python, C and C++

Operational setup

Security vulnerability assessment

Critical Thinking

Excellent Communication

Decision-Making

Self-Motivated

Flexible and Adaptable

Training and Development

AWARDS

November 2022 - Recognized with a coin by Director of the Cybersecurity Directorate, Rob Joyce, for the work pertaining to Computer Network Operations Development Program (CNODP) efforts on an attack path exercise regarding the Navy.



Contact this candidate