Resume of William Parker
**** ********* *****, *** *****, NV 89120-1303
702-***-**** (c), email: *******@*****.***
To enhance and further career goals in Information Technology with a company that will utilize my skills in System Administration, Network Design, and Information Security.
SUMMARY OF QUALIFICATIONS
I possess a professional background in Systems/Network/Security Administration (skilled/subject matter expert), along with finding vulnerabilities in system and application software.
Proficient in many phases of Information Technology and Security
Computer Installation Network Administration and Design
System Administration Computer/Network/Information Security
Research and Analysis User Training/Consulting
I have excellent Communication, Organizational, and Analytical skills with the ability to complete assigned projects in a timely and effective manner.
EDUCATIONAL BACKGROUND
Graduate – College of Southern Nevada (August 2008)
Awarded – Associate of Applied Science in Computing and Information Technology with High Honors (GPA – 3.73)
Graduate - Community College of Southern Nevada (December 2002)
Awarded - Associate of Applied Science in Internetwork Technology
with High Honors (GPA – 3.88)
Graduate - Cisco Network Academy (CCNA 1-4, CCNP 1-4, Fundamentals of
Network Security I/II, Fundamentals of Wireless Networks)
Community College of Southern Nevada (Spring 2001 – Spring 2005)
(41 Credit Hours completed)
INDUSTRY CERTIFICATIONS
University of Michigan – Programming for Everybody –
(Getting Started with Python) – April 2022 (Modules 1 and 2)
Cisco Certified Network Associate (CCNA)
Former Cisco Certified Academy Instructor (CCAI)
Comp TIA Linux+/Network+/A+/Security+
Certified Novell Administrator – Netware 5 (CNA)
Certified Fiber Optic Installer (NACC)
OHSA 10 Certified
EDUCATIONAL BACKGROUND (cont).
TEACHING/PRESENTATIONS
Guest Presentation – West Career Technical Academy
CyberSecurity II (Rebecca Thomas) – January 2020
Topic – Cyber Security and Interviewing
Guest Presentation – UNLV School of Informatics
INF100 – Introduction to Informatics (Dr. Fatma Nasoz) – September 2009
Topic – Business Networking and Interview Tips
Guest Presentation – College of Southern Nevada
Cicso Network Academy CCNA 3 (Mr. Michael Connelly) – October 2008
Topic – I.T. Job Outlook in Las Vegas and Interviewing Techniques
Guest Presentation – UNLV School of Computer Science
CS446 – Computer Security (Dr. Yoohwan Kim) – April 2008
Topic – Working in Information Security
College of Southern Nevada – Adjunct Instructor
Fundamentals of Network Security I/II – Spring Semester 2007
Guest Presentation - UNLV School of Computer Science
CS345 – Information Security (Dr. John Harrison) – Spring 2005
Topic – Internet Forensics and Network Security
AREAS OF EXPERTISE
Hardware (Mainframe/Microcomputers/Microcontrollers)
Control Data Cyber 172, 730, 830, Digital Equipment PDP 11/34 and
11/44, VAX 750 and 8650, Sun Microsystems 3/280, Harris Corporation
H-800. All makes of PC compatible computer systems, Arduino Uno R3/R4, Arduino Mega 2560, Raspberry PI 3B, LibreComputer
Hardware (Networking and Routers, Data Communications)
Cisco 1601/1720/2501/2600/3640/45xx/47xx routers. 1924/2950/3550/4xxx/
92xx/93xx/95xx series switches, ISA2000/3000, Cisco PIX-501/515E/55xx Firewalls, ASR 1xxx VPN routers, AP11xx/12xx/27xx/37xx/38xx/9120/9130 Wireless access points, 9800 Wireless Controllers, Juniper EX2300 PoE switches, Juniper SRX4100 edge firewall device, data cabling (CAT-5/6, Fiber), Kentrox CSU/DSU’s, Digiboard PC/Xem communication controllers, ISDN, T-1 & T-3’s, network/routing protocols for above platforms include IPX/SPX, TCP, UDP, RIPv1/v2, EIGRP, OSPFv2/v3, MPLS and SNMP v1/3, in addition to IPSec based VPN’s
AREAS OF EXPERTISE (con’t)
Operating Systems/Virtual Environments
Microsoft – DOS 3.3 to 6.22, Windows 3.x/9x/ME/XP/Vista/
Windows 7/8.x/10/NT 3.x/4.x/2000/2003/SBS 2008
Unix – BSD 2.9/4.3, FreeBSD 4.x-10.x, OpenBSD 5.x, NetBSD 5.x-7.x
Linux – Red Hat/Fedora, OpenSuSE, CentOS, Debian, Xen, Ubuntu
Oracle – VirtualBox 4.x/5.x/6.x
Docker Containers
Raspberry Pi (Model 3) w/NOOBS Raspbian
Arduino Uno R3/Mega 2560 (w/Version 1.8.x of IDE)
VMWare Player 6.x/7, Workstation
Puppet – Open Source 4.x
Novell Netware – Versions 3.x, 5.x
IBM – OS/2 Warp 3 and 4, OS/400
Programming Languages
Basic, Fortran (66/77), Cobol, Pascal, Assembly, C, Java, Modula-2, ADA, Unix /Linux Shells (CSH/BASH/SH), Python, Perl, grep/awk/sed, IBM CICS, IBM JCL.
Computer Applications
Foxpro 2.5, UWRIM/RTIRIM/MS-SQL (SQL based Databases), Microsoft Office, Wordperfect (all variants), Qmail 1.03 (replacement for Sendmail), MRTG 2.8.x/2.9.x (traffic graphing utility), Samba 2.x, 3.x, 4.x (Windows to Linux file sharing), Codebase 5.x/6.x (C/C++ database API engine), Snort 2.4.x/2.6.x/2.8.x/2.9.x Intrusion Detection System, Tripwire, Nikto, Nessus, Nmap, tcpdump/windump, Ethereal/Wireshark, AlienVault OSSIM 4.x, NetForensics version 3 & 4 SIEM, gdb, Immunity Debugger, Remedy Ticketing System, ArcSight SIEM.
Unpublished Internet Articles
I have written several articles for the website:
http://www.linux-sxs.org/
Dial in PPP Server for Linux
Basic Security Pointers for Linux Servers/Workstations
Compiling Apache 1.3.2x for Caldera OpenLinux 2.x
Reducing Output from Cron Scheduler/Changing Logging on PortSentry
Compiling TFTP for Caldera OpenLinux 2.x/3.x
Upgrading LILO (Linux Loader) for Caldera OpenLinux 2.x/3.x
Compiling Samba-2.2.2 for Caldera OpenLinux 2.x
Getting McAfee Anti-Virus to work in Caldera OpenLinux 2.x/3.x
Attaching a Linux Server to Netware 5.x in Caldera OpenLinux 2.x
AREAS OF EXPERTISE (con’t)
Open Source Project Contributions:
2010-2025
I have produced more than 250 source code patches to the Snort
Intrusion Detection system and ClamAV open source anti-virus system, and have provided source code (pending review/accepted) to enhance the Snort Sensitive Data Preprocessor and ClamAV Sensitive Data Format/Data Loss Prevention processor to detect additional credit and debit card information, along with bank routing information being sent over data networks (including the internet) in an unencrypted manner.
Additional work is in progress for detecting medical diagnosis codes from ICD-9 and ICD-10 coding formats for detecting HIPPA and PII being sent in cleartext form over networks and/or the internet without encryption for both Snort and ClamAV.
Additionally, I am listed in the authors/major contributors/contributors
sections (via README/About/Changelog) for the following software applications:
Libpcap (Network Packet Capture Library)
TCPDump (Network CLI Packet Analyzer)
WireShark (Network GUI Based Packet Analyzer)
NMAP (Security Scanner for Port Exploitation)
ClamAV (Open Source Anti-Virus Scanner)
Snort (Open Source Intrusion Detection/Prevention System)
ISC DHCP (DHCP Server/Client)
ISC BIND (Domain Name System Server/Client)
ISC INN (Network News Server/Client System)
Bro 2.x (The Network Security Monitor)
In the 4th quarter of 2012, Sourcefire (now Cisco Systems) (developers of the Snort IDS and ClamAV) made me a member of the Snort team (under the major contributor section) for my code and documentation contributions to the Snort Open Source Intrusion Detection System.
As of the 4th quarter of 2015, I am now listed as a contributor for the ClamAV open source Anti-Virus system at www.clamav.net under the About link.
Additionally, I have written a guest diary for the SANS institute as part of their incidents website at http://isc.incidents.org entitled:
'Are you losing system logging information (and don't know it)?'
AREAS OF EXPERTISE (con’t)
Open Source Project Contributions:
I have also authored Snort IDS/IPS installation guides for the following
computer operating systems (which are located at www.snort.org/documents):
OpenSuSE 12.x/13.x, Fedora (RedHat) 17/18/19/22, FreeBSD 8.x/9.x/10.x, OpenBSD 5.x, NetBSD 5.x/6.x/7.x, and CentOS 6.x/7.x.
Other documents which I have authored which are related to the above
installation guides are:
Rate limiting issues with Snort 2.9.x and rsyslog
Mirroring network traffic with consumer grade routers to Snort 2.9.x
Integrating Snort with AlienVault 4.x/5.x OSSIM SIEM
Possible Packet Loss during Reassembly for Snort IDS/IPS sensors
Additional Open Source Projects that I have contributed source code and/or patch files (approximately 1100+ submissions) include the following (November 2010 through December 2019):
AFTR 1.x (Address Family Transition Router) (under review)
Apache 2.4.x (Open Source Web Server) (code accepted)
Barnyard2 (SQL Database API for Snort IDS alerts) (code accepted)
Bash 3.4.x (Unix/Linux Shell Interpreter) (under review)
Bind 9.1x.x (ISC Domain Name System Software) (code accepted)
Bro-2.x (Network Security Monitor) (code accepted)
Catch (A modern, C++ native header-only framework for unit testing) (code accepted)
DAQ-1.1.x/2.0.x (Data Acquisition Library Processor) (code accepted)
DHCP 4.4.x (ISC Dynamic Host Configuration Protocol) (code accepted)
Ettercap 0.8.x (Man In The Middle Attack Tool) (code accepted)
Exim 4.8x (Exim Mail Transfer Agent) (under review)
Glibc 2.2x (The GNU C Libraray) (code accepted)
ISC INN 2.6.x (Network News Server/Client) (code accepted)
Libcap-ng-0.7.x (Next Generation capture library (code accepted)
LibHijack 0.6.x (Runtime Process Infection Tool) (bugs confirmed)
Liblinear 1.9.x (Large Linear Classification Library) (under review)
Libpcap-1.3.x-1.7.x (Packet Capture Library) (code accepted)
LibreSSL-2.2.x (portable) (Libre Secure Sockets Library) (code accepted)
Libxml2 2.6.x (XML C Parser and Toolkit for GNOME) (code accepted)
LinuxPTP 1.5 (Precision Time Protocol for Linux) (under review)
MariaDB 10.0.2x (Relational Database) (code accepted)
Modsecurity 2.9 (Web Application Firewall Engine) (code accepted)
MySQL 5.6.x (Relational Database) (code accepted)
Nagios 3.4.x/3.5 (Data Network Monitoring Software) (assigned to staff)
NMAP 6.x/7.x (Security Scanner for Port Exploration) (code accepted)
NTP 4.2.x (Network Time Protocol Project) (code accepted)
Open Source Projects (con’t)
Ossec-HIDS 2.8.x (Host Based IDS) (code accepted)
OpenSSH 7.x (Open Source Secure Shell Server/Client) (code accepted)
OpenSSL 0.9.x-1.1.x (Open Source Secure Sockets Library) (code accepted)
OpenVPN 2.3.x (Secure Tunneling Daemon) (code accepted)
PostgreSQL 9.4.x (Relational Database) (code accepted)
Python 3.4.x-3.7.x (Programming Language) (code accepted)
Quagga 0.99.x (Open Source Routing Software Suite) (under review)
R-3.1.x (Math and Statistics Programming Language) (code accepted)
Samba 4.0.x (Windows/Unix/Linux File Sharing) (code accepted)
Sendmail 8.14.x (Open Source Mail Transfer Agent) (code accepted)
Sqlite 3.8.x (Lightweight SQL Database Engine) (under review)
Squid-3.5.x (Caching Proxy for Web Services) (code accepted)
Suricata-2.x-6.x (Suricata Intrusion Detection System) (code accepted)
TCPDump 4.3.x-4.7x (CLI Network Packet Analyzer (code accepted)
TCPReplay 4.x (Network Packet Replay Tool) (code accepted)
TCPSlice 1.x (Packet Trace File Extraction Tool) (under review)
TCPTrace 6.x (TCP connection analysis tool) (under review)
VLC-2.x (VLC Media Player) (under review)
Wireshark 1.8.x-1.12.x, 2.x (A Network Traffic Analyzer) (code accepted)
Wolfssl 3.8.x (Embedded SSL Library) (code accepted)
Zlib-1.2.x (General Purpose Data Compression Library) (code accepted)
2004-2009
I have contributed source code to the Snort Intrusion Detection System for versions 2.4.x, 2.6.x, and 2.8.x; in which I implemented the configuration option known as –enable-timestats so that network/system/security administrators could get an idea of how much traffic snort is processing on an hourly basis, without having to stop and start snort, or by using SIGHUP to force dumping of data to /var/log/messages in a Unix or Linux environment. This was phased out in Snort version 2.9 alpha when SourceFire developed the performance monitor module, which gathers many more statistics than my original module.
PROFESSIONAL WORK EXPERIENCE
11/2017 to
Current Amazon
North Las Vegas, Nevada
Systems Support Engineer I
Environment: Cisco Networking Routers/Switches/Firewalls/Access Points
37xx/38xx/91xx Access Points, 37xx/39xx/45xx/9200/9300/9500 catalyst switches, Cisco 85xx/98xx Wireless Controllers, PIX ASA 55xx firewalls, Cisco ISA2000/3000 Industrial Control Switches, Cisco AnyConnect VPN, Cisco SASD/VSOM software, EdgeCore 4xxx/5xxx managed L2/L3 switches (linux based CLI), Juniper EX2300 PoE switches, Juniper SRX4100 Edge Firewalls Bosch IP 4000/5000/6000/7000 series Cameras, APC SmartUPS 1xxx/3xxx/5xxx/6xxx/Symmerta, CAT-5/6 Ethernet, Single/Multi-Mode Fiber, Windows 10/11 Pro, Red Hat/Ubuntu/Debian Linux, HP Prodesk, HP/Dell Wired/Wireless Thin Clients, Remedy 7.x Ticketing System, Service Now, Slack,
Duties include supervising and mentoring IT technicians, drafting/submission of change management requests for addition/modification/deletion of network infrastructure, configuration and deployment of embedded devices such as IR and Barcode Scanners (Zebra 32N0/TC-55/56/57), Printers (ZTxxx/GTxxx/QLn4xx), IP PoE based cameras (BOSCH IP 4000/5000/6000/7000 series), site server configurations including standalone and virtualized environments (Xen/VMware/HyperV), support of WAN and LAN networks, system backups,
E-mail systems (Exchange, Cloud and Others) Disaster Recovery, Business Continuity Planning, Desktop Configuration, VoIP Phone System provisioning and installation/support.
Major Accomplishments:
Build and Support Engineer for VGT1 (Robotics Facility), VGT2 (Cross dock Facility), VGT5 (Sort Center w/Amazon Robotics), LAS8/LAS9 (Make/Merch on Demand), LAS7 (Robotics Facility), LAS1 (Cross dock), DLV2 (Amazon Delivery Station), Primary Build Engineer for IVSE/IVSF (Small and Lite) centers and HLS1 (Heavy Bulky Station) in addition to handling Backup Engineering support for Amazon Facilities including LAS6 (Fulfillment Center), LAS5 (Sort Center), LAS2/HCA6 (Returns Center), and Support Engineer for UNV2/3 (Amazon Fresh sites), DLV2/4/7 (Amazon Delivery Stations), SNV1 (Same Day Delivery) and assigned to special project support at LAS2 (under NDA).
Responsible for updating and/or resolution of more than 4000 support tickets for local/global support tickets for amazon facilities customers since November 1, 2017.
Responsible for successful drafting and execution of more than .900 change management (CM) requests for change and/or upgrades of network equipment at facilities in the Southern Nevada Area including installation and configuration of IDF’s, replacement/installation of equipment in MDF’s, DNS, Single Mode Fiber (SC), Ethernet, VOIP (Polycom) and local servers at these sites as well.
PROFESSIONAL WORK EXPERIENCE (con’t for Amazon)
Member of Level 1 Change Management (CM) approval team which reviews change management requests submitted by Amazon IT technicians and engineers based in North America to provide additional checks to requests which could have site and/or network wide implications when executed (7000 plus requests approved and/or reviewed)
Supervision, mentoring, and assisting technicians, equipment coordinators, and IT Super Users at Amazon facilities in the areas of growth and development of skills which will allow them to successfully interview and be promoted to IT Technician and/or IT Engineer at Amazon.
10/2010 to Current
Consultant/Researcher
Environment: PC’s, Laptops, and Servers, Consumer Routers and Switches, Programming in C/C++, Shell Scripting, gdb, immunity debugger, Puppet, VMWare/VirtualBox/Xen (Virtualization Environments)
I provide advice to businesses and individuals on a wide variety of information technology topics, including obtaining hardware and/or software for use in homes or small/medium sized businesses. Additionally, wrote additional software and patches for many open source programming projects (see above section: Open Source Project Contributions), provided articles for the SANS information security website located at: http://isc.incidents.org
PROFESSIONAL WORK EXPERIENCE (con’t for OnPoint Corp)
2/2008 to
8/2010
Onpoint Corporation
North Las Vegas, Nevada
Sr. Intrusion Analyst
Environment: PC’s, Servers, Windows XP/TS Client, Red Hat Linux WS, Wireshark/TCPdump, NetForensics/Arcsight SIEM’s, Snort IDS (2.4.x, 2.8.x), Remedy 7.x Ticketing System, Foremost 1.5.x, shell scripting, Python, Perl, BASH/CSH/KSH, Awk/Sed/Grep, Acronis Backup, Bacula
Provide information security support to a U.S. Government Agency to support analysis of hacking/intrusion attempts against computer systems and networks in real-time/near real-time situations. Primary tasks includes daily report generation of attempted intrusions, port scanning, network and system reconnaissance, writing and/or research of tickets for other analysts and/or management, packet analysis using TCPDump and/or Wireshark. Utilized NetForensics 3.x/4.x SIEM to correlate data captured from sites which were being monitored for intrusions. Other duties include writing/modifying rules for SNORT 2.8.x, preparation of monthly site reports, data mining, decoding/reconstruction
of files which contained potential malware or rootkits for further analysis by forensic specialists, and other tasks assigned by management.
In addition, I was also responsible for training new intrusion analyst hires to get them up to speed on the environment they would be working in.
Note: From 2/2008 to 5/2010, the company which held the contract for the above position was NCI, Incorporated.
3/2006 to
2/2008 Consultant/Instructor
Las Vegas, Nevada
Environment: PC’s, Servers, Windows 2000/XP, Cisco 2621/3550, PIX 515-E, Security tools (snort, nessus, nikto, nmap, tripwire, NetStumbler, etc).
Provide support to businesses and clients in the area of network and system security (which includes hardening network equipment against unauthorized intrusion), making recommendations on equipment purchases, and designing networks to optimize security. In addition, I taught the Fundamentals of Network Security course (Cisco Network Academy) at College of Southern Nevada during the Spring 2007 semester.
8/1994 to
2/2006 Don Best Sports
Las Vegas, Nevada
Network/Systems Administrator
Environment: IBM PC’s, Novell Netware 3.12/5.x, Windows 9x/NT 4.0/2000/XP, OS/2 Warp 4, Linux, Cisco (1601/2501/2600/3640/4700 Routers, 2950/3550 Switches), Firewalls (PIX 515-E/ipchains/iptables), Cisco 3000 VPN Concentrator, Snort 2.4.x, 2.6.x Nmap, NetStumbler, Nikto, Rsync, Amanda Backup, Radware Load Balancers.
Maintain PC based servers that provide service to approximately 30 employees, and more than 2500 customers located throughout the United States and other countries. Primary job tasks are to maintain 30 Linux servers and 12 Windows NT/2000 servers that provide access for the premium/express system of sports information that we offer. Also responsible for upgrades of hardware and software needed by employees in office and maintaining Cisco 2621/3640/4700 routers, associated high speed data links, and system security for servers, workstations, and routers/switches (security includes use of Intrusion Detection/Prevention Systems (using Snort Open Source Software and Cisco IDS), centralized logging, bandwidth monitoring, ACL’s, null-routing, and rate-limiting).
PROFESSIONAL WORK EXPERIENCE (con’t for Don Best Sports)
Major accomplishments include:
Replaced Windows Proxy Server 2.0 with Linux to increase throughput for internet access in the office at lower cost and more stability, and implemented caching DNS and DHCPD for easier administrative handling of employee PC’s.
Implemented mail server based on Qmail 1.03, Vpopmail 4.x, QmailAdmin, and Sqwebmail to provide SMTP/POP3 access for employees and customers using the donbest.com and islandxpress.com domains (currently provides backup to Exchange Server system).
Implemented the use of MRTG to monitor network traffic usage by employees and customers accessing the domain donbest.com (uses SNMP v2/3 protocol) for cost analysis and breakdown (bandwidth utilization) of T-1’s and server CPU/Disk/bandwidth usage.
Replaced 16 Servers running Windows NT Server 4.0 and our premium Java Server application with Linux and Sun Java 1.4.2/1.5.x (no hardware upgrade needed) at a license cost reduction in excess of $15,000 dollars.
Implemented file and web servers based on Apache 1.3.2x/2.0.x and Samba 2.2.x/3.x to replace main content file server based on Windows 2000, and have successfully authenticated Samba 3.x against Windows 2000 Active Directory Service utilizing Kerberos and Windows Bindery (eliminates having usernames and passwords in Linux).
Implemented migration from Novell 3.12 to 5.x to provide updated capability for file serving and IPX plus TCP/IP support (replaced by Linux/Windows 2000 based systems).