Cyber Attack Engineer Resume
Tucson, AZ
SUMMARY:
- Skilled at applying a broad background of technical expertise to create effective solutions and meet company and customer requirements on time and with quality results. Accustomed to performing with little to no supervision and possess the motivation, dedication, and knowledge to get the job done right the first time.
TECHNICAL SKILLS:
Security Tools: WebInspect, HailStorm, nCircle, Nessus, Nmap, W3af, Burp, Paros, CoreImpact, Metasploit, Canvas, TCPdump, Nikto, Kismet, Aircrack, John the Ripper, Cain and Abel, Kismet, Nikto, Wireshark, Netcat, hping, FTK, Helix Live CD, AirMagnet, IDA Pro, ollydbg.
Languages: UNIX Shell Scripting, C++, Perl, Python, Pascal, Visual Basic, XML
Networking: LANs, WANs, VPNs, Routers, Firewalls, TCP/IP
Software: MS Office (Word, Excel, Outlook, Access, PowerPoint, Project, Visio), Linux, Windows (XP, 7, 2003), HPUX, Solaris, GCCS, JDISS, CENTRIXS, LOCE, Analyst Notebook
PROFESSIONAL EXPERIENCE:
Confidential, Tucson, AZ
Cyber Attack Engineer
Responsibilities:
- Recognized as a Cyber Attack Expert specializing in web application security, penetration testing, social engineering, and network security. Lead multidiscipline team of engineers to develop atypical attack methodology resulting in multidimensional effects. Support and accreditation activities, conduct IT security assessments, perform forensic drive imaging, and lead projects to improve information security. Responded to suspected computer security incidents as a member the incident response team .
Confidential, Tucson, AZ
IT Security Manager
Responsibilities:
- Managed a team of IT Security professionals responsible for performing IT security assessments and audits on a variety of. Led the team as a hands - on manager and completed penetration testing, social engineering, vulnerability scanning, and compliance audits. Utilized a variety of tools like CoreImpact, Nessus, Metasploit, Canvas, and many others while also leveraging effective verbal and non-verbal communication skills throughout the consulting engagement.
Confidential, Lexington Park, MD
Systems Security Engineer
Responsibilities:
- Responsible for providing Anti-Tamper (AT) and Information Assurance (IA) expertise to a major acquisition programs that required a comprehensive understanding of current regulations along with all DoD policy documents regarding both IA and AT implementation. Risk assessment and mitigation strategies were developed along with system engineering level reviews of architecture designs with a focus on security throughout the life of the system.
Confidential, Lexington Park, MD
Systems Security Engineer
Responsibilities:
- Identified Critical Program Information (CPI), performed vulnerability assessments, and ensured system security engineering requirements were addressed. Spearheaded coordination efforts between the program office, contractors, government/industry experts, and the Anti-Tamper Technical Authorities in determining and implementing security requirements. As the Anti-Tamper lead for a major ACAT 1D program responsible for providing guidance on the creation of Program Protection Plans, Anti-Tamper Plans, and Verification Documents.
Confidential, Washington, DC
IT Project Manager
Responsibilities:
- Provided technical management to a team of computer professionals who provided technical support to a major intelligence information sharing network. Performed interviews, approved expenses, ensured the timely and accurate completion of contract deliverables, and established daily work priorities.
Confidential, Arlington, VA
Knowledge Manager
Responsibilities:
- Recognized as the Subject Matter Expert on knowledge sharing within the J2 shop and given the freedom to establish intelligence requirements for knowledge management, complete trade studies, develop prototype solutions, and supervise implementation. Developed an in-depth understanding of computer threats to DoD networks, common vulnerabilities, potential countermeasures, and the role of the intelligence community within the Cyber arena.
Confidential, Suitland, MD
Responsibilities:
- Led Systems Engineering activities on GCCS-I3 software integration and installation for use in the Intelligence and International Community. Represented the Joint Deployable Intelligence Support System (JDISS) Joint Program Office (JPO) at high level meetings to advise on Linked Ops-Intel Centers Europe (LOCE) and JDISS International Research and Development efforts.
- Created a customized GCCS-I3 suite for use in the coalition environment that included: requirements development, system integration, security lock down, testing, and installation of forward operating bases.
Confidential, Suitland, MD
Senior Systems Engineer
Responsibilities:
- Interfaced with NATO customers to identify the JDISS software requirements for systems design, development, testing, implementation, and . Reviewed network designs for NATO countries that used the JDISS systems within their Intelligence Agencies. Provided technical guidance on interoperability concerns between JDISS and LOCE systems.
Confidential, Suitland, MD
Senior Systems Engineer
Responsibilities:
- Performed software integration, software testing, and established routine software maintenance procedures for the Coast Guard Intelligence Support System (CGISS) software. Advised Coast Guard personnel on software security issues, existing hardware and software capabilities, and recommended new software and hardware for purchase. Designed a new customized desktop interface for potential application with CGISS laptops that relied on C2 security and industry best practices to ensure security.
Confidential, Suitland, MD
Systems Engineer
Responsibilities:
- Provided integration, installation, testing,, and technical support on the JDISS and GCCS systems aboard U.S. Naval Ships and at land sites. As the lead Independent Verification and Validation engineer for JDISS became very knowledgeable in configuring both hardware and software used for HP, SUN, Windows, and DEC computer systems.