Paul Litecky
***** ******* *** *, ****** Lake, MN 55025
Cell: 605-***-**** ********@**********.***
Professional Summary
I have always been a self-motivated worker who expects nothing, but the best from myself. Learning new and complex concepts that challenge me is what attracted my interest in cyber security and computer science. My main interests are in data analytics, networking, and automation of security operation tools. Education
● 05/14/22 CompTIA Security+, Code: 2MCXNB4YLJ44159C
● 08/19-06/21, B.S. Cybersecurity, St. Cloud State University, 3.38 GPA
● 01/17-06/19, A.A.S. Network Admin & Cybersecurity, Lake Superior College, 3.54 GPA
● 08/15-12/18, A.A, Lake Superior College, 3.7 GPA Work Experience
Computer Support Specialist Tech II, Unified Judicial System of SD, Rapid City SD, from 06/21 – 07/24 (3 years) It was a small team of eight that supported the infrastructure of South Dakota’s judicial branch. I would resolve user tickets and networking issues efficiently for a third of the state of South Dakota within the 4th and 7th circuits. Collaborated with vendors and other IT personnel to install new services and components. Configured new systems from basic host, IoT devices, servers, and mobile devices. Utilized Active Directory to manage Office 365 groups and user accounts. Created different automation tools and scripts mostly utilizing PowerShell and pushed into production using PDQ. Updated system images, documentation, and network maps. Along with making security configurations to different IoT devices and public access points. Cybersecurity Student Internship, Federal Trade Commission, Washington, DC, from 07/20 – 10/20 (3 months) It was with the Continuous and Assurance team for the security department of the Federal Trade Commission. I updated documentation for some of their policies, roles, and procedures to be FISMA compliant. I created a program that extracted the current vulnerabilities for every device from their Tenable.sc API and made a conclusive report for different asset clusters that identified which systems have a vulnerability, along with identifying devices without any vulnerabilities. Did a bit of automation for extracting information from their SIEM system that the DOJ created. Cybersecurity Workforce Grant Contractor, Lake Superior College, Duluth, MN, from 02/18 – 06/18 (4 months) This was a side project that I was paid to do while advancing my education. Essentially, we created network that would replicated rudimentary networks of different companies. The parts of the network I implemented was clustering an HP SAN unit that was configured as storage for VMware vSphere. Followed by installing ESXI 6.5 servers, and configuring some Cisco switches and firewalls with some basic Cisco commands. Then created documentation and prepared classroom labs for a business simulation environment. CIS Technical Support Student Worker, Lake Superior College, Duluth, MN, 01/18 – 02/18 (1 month) I worked around fifteen hours a week by assisting students and instructors with technical issues with lab resources. We also had access to some endpoint security tools such as Deep Freeze, Snort, and Suricata. Our logs were forwarded with Splunk to a Security Onion instance as our intrusion detection system. However, shortly afterwards I became ineligible for the position because I had too many credit according school policy. Planogram, Target, Duluth, MN, 10/14 – 07/17 (3 years) I worked about forty hours a week at night setting up displays and shelving. By inherently being overnight work it wasn’t easy, but it did pay for a significant portion of my college education. What I learned most about from working here was timeliness and making deadlines.
Dairy Employee, Autumnwood Farm, Forest Lake, MN, 06/11 – 08/15 (4 years) My first job I ever had was working for a local dairy farm. At first, I was responsible for making my own hours depending on how much work needed to be done with washing bottles. Eventually, I worked my way up to the production line and cleaning the dairy after stocking. I did a number of other odd jobs around the dairy whenever a position needed to be filled. I learned a lot about being self-motivated in the work that you do. Technical Skills
Radio Waves & Side Channel Attacks
I lived in a mountainous region and enjoyed learning about directional antennas. Walking around peaks, valleys, and cliff faces with an ADSB receiver analyzing the radio waves for aerial navigation. The longest 1090 MHZ signal I managed to capture was about 286 nm away or 329 miles, which is technically not possible under normal circumstances. I’ve also messed with bluejacking, RFID replication, and capturing EMR from one of my systems while engaging in the hard drive decryption process. Networking
I have my own VCenter lab with a hot backup server using ESXI 6.5 snapshots for VCenter and Vsphere. Initially I used this cluster to host a number of vulnerable boxes you can get from Vulnhub and other places to learn more about penetration testing and system hardening. I’ve set up a number of services using both Unix and Windows, from DHCP, DNS, Active Directory, LDAP, SFTP, etc. On my network I manage websites, DNS, a Pi-Hole, an Urbit and a ADSB receiver. All of my traffic is tunneled through a Pfsense firewall using OpenVPN. I also used to have a reverse proxy setup in Vultr to have public access to my network, but decided I no longer needed access to my network remotely. Programming
I’ve created website scrappers and loggers, a hash generator and checker for Unix based systems with its own encryption system, and a CSV manager for normalizing and calculating CSV files. I also made a tool that interacts with nmap to organize scans for further enumeration and quick exploit identification. I generally write my tools with Python, but I am also familiar with Bash, PowerShell, C++, and have a bit of experience with Java, php, and Hoon. However, once you learn one programming language it’s more about learning the syntax of a new language for your code to execute properly. Cyber Security
In college I participated in the Collegiate Cyber Defense Competition. In this tournament we acted as a blue team who hardened our network and preformed task for the purple team. Out of my three years of participating my team won state twice while my task was managing Fedora 21 mail server. The main hardening was reconfiguring all of the user accounts to lock them down from making changes on the box. During my education there were a number of security standards and frameworks that I had to understand. Some examples are NIST, MITRE ATT&CK, HIPPA, GDPR, and FISMA, which I utilized at the Federal Trade Commission.
I configured a Cuckoo box for a malware analysis environment. Cuckoo is an opensource software that utilizes virtual box and vmcloak for injecting malicious software or analyzing malicious links. I learned about Yara rules, got a bit more in depth experience with Suricata rules, and learned about inetsim for service spoofing. Personal Achievements
I decided to get an education in Network administration after I heard about a scholarship opportunity. I didn’t know much about computer science at that point, achieved what was necessary to become a recipient, and was gifted the Scholarship For Service grant through their Cybercorps program. I also played a leadership role in my User Support class’s mock user support business exercise. I also got my Security+ certification from CompTIA on May 14th, 2022.