William L. Rockwell Seattle, WA ***** M 206-***-**** I E *********@*****.***
Resourceful Navy Veteran with 17 years' experience in CyberSec, System Admin, and Project Management.
Professional Experience
Fox13 KCPQ 1813 Westlake Ave N.
Information Systems Technician Seattle, WA I Oct 2022 – Current
Spearheads the technical support of desktop computers, 50+ servers, 3 networks, and applications at FOX Technology. Responsibilities include the installation, configuration, and repair of systems within FOX standards, as well as supporting approximately 175 users. Performs hardware/ software upgrades to ensure security, performance, and longevity for technologies and a fully virtual environment.
Amazon Web Services (AWS) 1918 8th Ave
Support Engineer 2 (C2S/ C2E program) Seattle, WA I Jan 2021 – Nov 2021
●Part of a newly established team within AWS for both commercial and secure federal products while also assisting in cyber security related issues such as EC2 host patching and code pipeline remediation for 300+ hosts.
●Lead resolution engineer of 120 AWS vulnerability issues, and critical team player for high-side issue reporting.
●Head triage engineer for both internal and external teams via Windows and Linux virtual administration.
●Created, uploaded, and configured applications developed through IntelliJ Python scripting up to AWS Cloudformation CI/CD pipelines to ensure proper usage and seamless automation with special regard to ISO 27001 standards.
Promoted to SCRUM Master and the trusted individual for all high-side issues that required low-side commercial engineer interaction and remediation.
General Dynamics Information Technology (GDIT) System Engineer 2 (JEDI/ JWCC program)
15571 NE 31st St
Redmond, WA I Mar 2020 - Dec 2020
●In a partnership with Microsoft in support of Microsoft's Secure Operations Center (SOC) that provides operational support for the Azure core and Office365 platform, supporting all TS/SCI US government environments.
●Created and presented plan of action and milestones (POA&Ms) for govt entities, stakeholders, and management.
●Coordinated creation and monitoring of SFTP/FTP over Windows and Linux environments for federal entities.
●Managed 350+ Azure AD accounts from creation on through Azure devops application deployment.
●Facilitated coordination on maintaining integrity and proper access via LDAP/ AD authentication with physical PKI cards.
●Spearheaded Confluence/ Atlassian/ Jira documentation for both reoccurring and new issues for future usage.
●Created and managed an Azure analysis board for internal and external stakeholders connected to Azure AD for forward progression and planning within newly established federal projects utilizing data analysis and visualization to drive decisions and streamline workflows, assisting in establishing ISO 27001 RMF framework.
Utilized Azure Sentinel and Microsoft Defender (CyberX) to remedy network infractions and maintain network health.
Parametric
Senior Solutions Analyst
800 5th suite 2800
Seattle, WA I Dec 2017- Mar 2020
●Managed the network based on VMWare/ Vsphere/ VDI/ NSX utilities, through VMware admin/ CITRIX access.
●Hastily promoted under a year after displaying leadership and self-management abilities, completing 7,032 trouble tickets supporting 637 local and remote employees on a 24/7 on-call rotation.
●Project manager for 7 projects implementing new policies like company-wide encrypted web-based password protection vaults, new inventory listing and inventory procedure, an active directory update for 4,000 service and user accounts, and new hire account templates for 56 departments to avoid over-privilege upon hire.
●Created and operated Powershell scripts in conjunction with AD to reduce time consumed on operational objectives.
●Facilitated a $22 million office move, relocating 500+ employees over a 2 week period along with 2 server and database farms composed of 4 Juniper switches, 2 domain controllers, 12 Dell blade servers, 4 APC UPS units, and running over 20,000 feet of CAT-5e cabling.
●Managed the BYOD plan via MaaS360, Office365, and inventory for deployed cellphones, tablets, and laptops.
●Implemented SPLUNK and NESSUS for compliance and regulatory investigations and incident management.
●Program lead for new hires: Led and instructed on first account sign-on, cyber security, and network operation to all new hires for minimization of network infractions and incidents.
●Lead for team administration and direction: implemented and maintained SCRUM Agile methodologies for product and project management through streamlined user stories, SCRUM planning/ retros, and reports to stakeholders.
USN Military Experience
United States Navy
Information Assurance Officer (ISSO) / Information Systems Manager (IAM) Multiple locations I Aug 2009 - Jun 2019
●Managed a team of 6 cyber forensic specialists in the expedited remedy of 76 internal threats and vulnerabilities which could have caused catastrophic damage to naval networks.
●Lead investigator of 22 threat vectors to include network spillages, compromised network security, OPSEC leaks, terroristic behavior, drug trafficking, and others in accordance with NIST SP 800-61.
●Ability to communicate and document infractions for judicial, attorneys, and law enforcement personnel review.
●Traveled up to 100% to teach students on the safe practices and operation of Network and Cyber security. It is a course developed by SPAWAR (NAVWAR) to enable students to obtain the CompTIA Security+ certification.
●Acting evaluator for FISMA reporting standards and 3 CCRI events covering both local and remote commands.
●Project Manager: designed, constructed, and maintained a 24-hour helpdesk of 16 personnel supporting pilots in-flight and 5,000 support staff.
●EKMS Manager: rigorously adhered to FIPS 140-2 while performing duties maintaining, distributing, and destroying cryptographic keying material, COMSEC devices, and publications within the vault utilizing KMI increment 2 technology.
●Local Registering Authority: established, implemented, and managed an 8 person team dealing with a public key infrastructure (PKI) of 800 secret access keys across 8 headquarters in the Pacific Ocean area of responsibility greatly increasing network security for DoD task force units with strict adherence to CTO 10-25.
●Supervised 35 personnel in the maintenance, defense, and upgrade of 25 mission critical U.S. Navy systems.
●Lead Cyber Security Trainer, leading 60 cyber vulnerability awareness classes, increasing knowledge base of over 3000 personnel, lowering network information infractions by 98%.
●Information Assurance Manager for 33 employees, planning and directing all remediation for 4 networks and counter-action for network infractions, resulting in 100% compliance for 15 essential network programs.
●Implemented and supervised 1,662 Field Change Bulletins (FCB's), CTO's, and IAVA's for the U.S. Navy.
●Hastened and led the creation of a new Search and Rescue (SAR)/ rehabilitation watchfloor consisting of 28 sailors over 4 weeks after being displaced during "Operation Tomodachi" due to the Japanese tsunami of 2011.
●Facilitated 253 audits and tracked 52 submarines to ensure 100% DoD security compliances utilizing VRAM/ eMASS.
●Diligently corrected 138 information vulnerabilities utilizing EyeRetina scanner and IR, resulting in 100% compliance and approval to operate on 5 top secret classified systems critical to submarine support and readiness.
●Performed 1,849 security scans, uploaded results, and remediated 3 networks consisting of 7 servers, 4 router configurations, and 721 end users in-line with NIST SP 800-137.
Dedicated 150 hours as the technical refresh manager during a 2-week period, expediting the replacement of 2 AD Domain Controllers, 2 blade storage devices, and 442 desktops ensuring 100% reliability with zero data loss to the end user utilizing RMF framework and safe DRMO practices in accordance with NIST SP 800-37 rev 2.
Special Qualifications
●Top Secret/ Sensitive Compartmented Information (TS/SCI) Security Clearance
●Comptia Security+ Obtained December 2017
Currently studying to obtain CISSP and PMP certifications
Systems Operated and Managed
-Microsoft office Suite 10/13/16/19/21
-Microsoft Power Bi
-Microsoft System Center Configuration Manager (SCCM)
-Azure Intrusion Detection (IDS/ IPS)
-Azure Sentinel
-Microsoft Defender for Cloud
-Microsoft Defender Azure AD logs
-Microsoft Blob storage/ fileshare
-Microsoft Exchange Server
-VMware Vsphere/ Horizon VDI
-VMware Carbon Black
-NSX Distributed firewall
-Universal Audit Logs
-AWS Cloudformation
-AWS CloudWatch
-AWS CloudTrail
-AWS Barracuda Security Solution
-AWS EC2 Instance Vulnerability Manager (IDS/IPS)
-AWS Codepipeline Manager
-AWS S3
-AWS DynamoDB
-Comodo Forensic analysis
-Tanium Comply
-Logpoint monitoring and IR
-Graylog log management
-ManageEngine Log360
-McAfee Enterprise Security Manager
-IBM Security Verify Admin Console
-CITRIX workspace SaaS
-McAfee ePolicy Administrator
-JIRA/ Atlassian/ Confluence
-Splunk Security Monitor
-Treesize
-WireShark Protocol Analyzer
-SQL/ SQL database manager
-VoIP (SIP/H323 protocol)
-LINUX/ UNIX administration
-Global Command and Communications System (GCCS)
-Vulnerability Remediation Asset Manager (VRAM)
-Assured Compliance Assessment Solution (ACAS)
-Enterprise Mission Assurance Support Service (eMASS)
-SIPRnet Administration
-JWICS Administration
-Maas360/ DUO authentication
-lOZig Remote Management
-Outlook Web Access (OWA)
-Verizon Account Manager
-OKTA authentication
-Active Directory
-WinSCP/ Filezilla
-Cisco Anyconnect VPN
-Logikcull forensic software
-Lighthouse Spectra
-GIT workflows
-Docker deployment
-Java administration
-SSL, SSO, and LDAP
-MacOS
-Encase
-Host Based Security System (HBSS)
-SolarWinds Security event Manager
-Snort IPS
-Nessus Pentest Utility
-Rapid7 Incident Response
-NMAP/ DIG Mapping Utility
-Burp Suite Pentest Utility
-IntelliJ Code Manager
-Powershell
-Zendesk Cloud Ticketing System
-EyeRetina Vulnerability Scanner
-Sharepoint Administration
-Iron Mountain Backup repository
-RDBMS management
-Salesforce
-SAP resource planning
-Symantec endpoint security