NOLI G. BOADO
****.*****@*****.***
PROFESSIONAL HIGHLIGHTS
CITC Engineer. Supported the Navy’s Counter Insider Threat Capability project.
Cyber Threat Analyst/Hunter. Experienced in Defensive Cyber Operations (DCO), Cyber Threat Emulation and Host/Network Forensics.
Enterprise Systems Administrator/Systems Engineer/Information Security Specialist with 15+ years of on-the-job experience and current DoD 8570 certification (CompTIA Security+ CE and Certified Ethical Hacker). Well-versed in network-related security issues, and in various methods of security remediation.
Advanced scripting and task-automation skills. Experienced with BladeLogic, PowerShell, Python, DOS batch files, HTML/XML, and UNIX/Linux shell Bash, Perl scripting.
Experienced Systems Administrator. Skilled in provisioning, managing and administering various operating systems in both virtual and physical and hybrid environments to include Windows 2016/2012, 2008, RedHat 6/7, IBM AIX, Oracle/Solaris, HP-UX servers, OpenVMS, Grafana, Jenkins, Apache Nifi, Elastic/Kibana/logbeats/filebeats, AWS console, IAM, CloudWatch
Network Security Administrator. Experience in operating and administering Intrusion Detection Systems (IBM ISS/Proventia), McAfee Host Based Security System (HBSS), pfsense firewall
Vulnerability Assessment. Nessus, Retina, OpenVAS, Nikto/Wikto, Nmap, Microsoft Baseline Security Analyzer, OWASP ZAP, ACAS, DISA STIG
Application Support/Administrator. Subject Matter Expert in installing, configuring and supporting various DOD such as Joint Global Command and Control System (GCCS-J), Joint Global Combat Support System, Deployable Joint Command and Control System (DJC2) as well as commercial products such as Oracle Application Server, IBM Websphere, Oracle Grid.
Test Director / Computer Scientist
Lead a broad range of test and evaluation for assigned material/weapon systems and associated software. Coordinates system evaluation with other evaluation offices. Assessing risk and progress toward meeting key performance parameters, key system attributes, operational utility, and effectiveness, suitability, survivability.
Military Experience. Over 20 years’ experience in Department of Defense Acquisition and Logistics, Cost Accounting, Financial Management, Project Management and Leadership
CLEARANCE: DoD Top Secret SCI
EDUCATION
Masters of Science in Information Systems – Hawaii Pacific University 2003
Bachelors of Science in Computer Science – Hawaii Pacific University 1997, Cum Laude
CERTIFICATIONS
GIAC GPEN, GCIH, GREM, ITIL v3, COMPTIA Security+, Certified Ethical Hacker V8,
Linux +, VMware Certified Associate (DCV), Oracle Solaris and IBM AIX Systems Administration
RECENT TRAINING
SANS FOR508 Advanced Digital Forensics, Incident Response, and Threat Hunting
SANS FOR526 Advanced Memory Forensics & Threat Detection
SANS FOR610 Reverse-Engineering Malware: Malware Analysis Tools and Techniques
SANS SEC504 Hacker Tools, Techniques, Exploits, and Incident Handling
SANS SEC560 Network Penetration Testing and Ethical Hacking
DC3 Cyber Training Academy – Cyber Threat Emulation, Cyber Protection Team
NSA Integrated Cyber Core Course
USAF Cyber Space Vulnerability/Hunter Training
PROFESSIONAL EXPERIENCE SUMMARY
ITS/UAM Engineer / Computer Scientist
NIWC Pacific, Vulnerability Assessment Division 01/2023 – Present
-Serve as CITC Engineer supporting UAM and ITS systems for the Navy’s counter insider threat
-Maintain and support ITS/UAM systems on AWS gov cloud infrastructure to include
-Conduct engineering activities to include migrations, updates, upgrades, configuration meetings, customer service
Test Director / Computer Scientist
U.S. Air Force, 346 Test Squadron 11/2019 – 11/2023
-Serve as the Test and Evaluation subject matter expert / Project Manager for operational testing of U.S. Air Force Cyber Vulnerability Assessment / Hunter (CVA/H) Weapon System.
-Coordinate all test and evaluation activities working with peers from various agencies
-Utilize and implement Waterfall and Agile/DevOps methodologies in testing.
Cyber Threat Analyst/Hunter
U.S. Air Force, 836th Cyber Operations Squadron 1/2017 – 11/2019
- Conduct Defensive Cyber Operations on customer critical terrain as directed by USCYBERCOM
- Detect, track and characterizes Advanced Persistent Threats in assigned mission areas; Analyze malicious traffic and IOCs hits for attributing to threat actors, recommends mitigation strategies,
- Assist and provide all active defense actions in triage, identification, and analysis of threat events for escalation to potential security incidents, escalating security incidents and providing Security Response support as needed
- Provides cyber mission infrastructure defense; develops Course of Action recommendations and executes approved responses
- Evaluates information assurance readiness of networks and devices associated with AF equipment & key weapon systems
-Perform Defensive Cyber Operation, Defensive Cyber Infiltration and Threat Simulation in support of US Cyber Command, DOD and US Air Force. Conduct Threat Hunting, host and network forensics in response to incidences.
- Conduct host/network forensics using various open source threat hunting tools such as Volatility, Autopsy, IDA Pro, Cuckoo Sandbox, Yara, ELK, Moloch, Suricata, Zeek, Sleuth Kit, Bulk Extractor and commercial products such as Endgame, Tanium and Splunk.
Adjunct Instructor of Computer Science 5/2003-Present
Hawaii Pacific University
Honolulu, HI
Provided in-class and online instruction for various courses such as Foundations of Programming, Networking, Digital Literacy Global Society, Data Communications, Database Technology
Senior Systems Administrator
Defense Information Systems Agency/Defense Enterprise Computing Center 5/2013 – 1/2017
San Antonio, TX
Provide senior-level enterprise systems administration for hundreds of DoD IBM AIX, Linux, Oracle Solaris Unix database, application, and Web servers in a fully-virtualized environment as well as Windows application servers. In addition, provide advanced-level systems administration for several mission-critical DoD systems to include RCVS/OCSP and Tier 1 EKMS.
Naval Computer and Telecommunications Area Master Station
Pearl Harbor, HI 05/2012 – 5/2013
Senior Systems Administrator
Provided direct customer service and systems support to U.S. Pacific Command, U.S. Pacific Fleet, U.S. Coast Guard, Joint Task Forces as well as other Naval Operations Centers in Hawaii. Supported all Global Command and Control Joint (GCCS-J/M) Family of Systems that included common operating picture (COP) situational awareness, theater missile defense, intelligence (imagery) and database.
Defense Information Systems Agency
Pearl Harbor, HI 11/2007 – 05/2012
Network/Security Administrator
Provided and outstanding customer service while working as a network/systems administrator. Maintained a heterogeneous environment consisting of over 300+ node physical and virtual desktops and a data infrastructure consisting of MS Windows, Unix Solaris and HP-UX servers, network devices, SideWinder firewalls and intrusion detection systems supporting a centralized Network Operations Center and various remote branches throughout the Pacific.
Northrop Grumman Information Technology
Honolulu, HI 11/2005 – 05/2007
Senior Systems Administrator 3
Provided and outstanding customer service and support to various projects for Defense Logistics Agency and Naval Computer and Telecommunication Area Master Station Pacific (NCTAMS PAC) in Hawaii. Projects included the built out of DLA’s data and communication infrastructure that included Active Directory DNS, DHCP, DFS, Deployment, SharePoint/Web, Symantec Backup/End Point Security servers. Supported GCCS-J server built out and deployments NCTAMS PAC,, while working as a network/systems administrator. Maintained a heterogeneous environment consisting of over 300+ node physical and virtual desktops and a data infrastructure consisting of MS Windows, Unix servers, network devices, SideWinder firewalls and intrusion detection systems supporting a centralized Network Operations Center and various remote branches throughout the Pacific.
Computer Sciences Corporation
Honolulu, HI 11/2005 – 05/2007
Senior C4I Systems Administrator
Provided and outstanding customer service and IT support to U.S. Pacific Command (USPACOM) Deployable Joint C4I System (DJC2) and PACOM Contingency C4I Package (CCP) projects. Provided engineering technical support for various command and control, computers and intelligence (C4I) systems. In addition, provided project management support in implementing the Navy Marine Corps Intranet (NMCI) in Camp Smith as well as Pearl Harbor, Hawaii.