We provide IT Staff Augmentation Services!

Information Security Specialist Resume Profile

5.00/5 (Submit Your Rating)

MD

Work Experience

Program Management Contract Security Management Lead Security Engineering

Executive leader in Information and Cyber Security Management in the identification and tracking of various cyber threats. Expertise in various system initiatives such as the creation of comprehensive system processes and the development of systematic approach that offers process improvements, and program implementation. Career attributes also include: relationship management, development and management of workflow tools to manage end-to-end workflows for operations, performance measurement, coordination management, and identification of optimizations and risks. Innate ability to create, develop, and implement projects and programs to create a seamless structure upon execution has led to a continuation of strength in cyber threat assessments and analysis, understanding of cyber threat entities and environments. Dynamic in building rapport with clients and colleagues, communicate effectively with all levels of professionals and management, adapt to ensure a seamless transition during change, and succeed in high-pressure, challenging, and deadline-driven environments.

  • Information Security Expert
  • Law Enforcement
  • Strategic Planning/Analysis
  • Best Practices Implementation
  • Collaborate Efforts
  • Confidential Information
  • Reports Briefings
  • Risk Operations Management
  • Security Protocols
  • Network Compliance
  • Net Work Analysis
  • Solid Communication

Professional Highlights

Strength in the execution of law enforcement de-confliction and information sharing efforts, to maintain situational awareness on multi-service and multi-agency intrusion incidents and physical threats to the GIG

  • Official praise from the government client pertaining to efforts in the smooth coordination of Requests for Information RFIs from the cyber lab examiner along with responses from the submitting partner ensuring rapid responses leading to a final examination time
  • Accolades received from two former management professionals regarding the high level of effort and number of online courses taken to improve level of cyber education' over 100 in a 7-month period
  • Professors notable praise for unique and innovative view taken regarding cyber security issues
  • Exceptional performance pertaining to out-of-the-box and analytical approach to cyber solutions

Professional Experience

Information Security Specialist

Confidential

  • Analyzes network traffic, exploitation software, and provide security thought leadership enterprise wide
  • Performs multi-source research and analysis of possible malicious events using tools such VirusTotal, CentralOps, McAfee, Webroot, Domain Tools, IP Tracker, etc.
  • Execute cyber threat assessments based on entity threat analysis and facilitate understanding of cyber threat entities and environments
  • Conducts network analysis, functions and capabilities within IT architectures
  • Coordinate submitted malware and media for analysis by the Defense Computer Forensics Lab and then sends the completed reports to the submitting parties
  • Collaborate with DCFL and malware and media parties to assist in clarifying issues during the analysis process

Senior Consultant

Confidential

  • Monitored situational awareness of all CID cyber related operations affecting the Department of Defense
  • Ensured CID Investigations and Operations are de-conflicted amongst/between LE/CI Center organizations and Department of Defense network defense entities
  • Provide day-to-day operational support to US Cyber Command Joint Operations Center monitoring and reporting health and status of networks, vulnerabilities and detected adversary activity

Senior Consultant

Confidential

  • Key player in the delivery of Information Operations policy, doctrine and career force development support to the office of the Deputy Director for Global Operations Joint Staff J-39, Pentagon
  • Primary focus has been on supporting the rewrite of Joint Publication, Information Operations
  • Supported the efforts of the IO Education Forum during the Force Development Summit

Functional Manager

Confidential

  • Managed initial and other job assignments for over 360 analysts in the 35N SIGINT Analyst MOS within NSA and the 704th Military Intelligence Brigade
  • Ensured the proper utilization of personnel and authorizations of specialties based on the unit's Table of Distribution and Allowances TDA and mission requirements.

Information Operations Planner

Confidential

  • Synchronized, de-conflict, and coordinate with the elements of information operations Public Affairs, Civil Affairs, Psychological Operations, Counter-Intelligence, Intelligence, etc. to achieve the SOTF Commander's IO mission
  • Coordinated with NATO and Coalition partners in the RC-South area of operations to de-conflict and coordinate a unified information operations effort

Police Officer First Class

Confidential

  • Enforced state and local laws and regulations
  • Interfaced with the local community and businesses to solve crime problems and enhance community relations
  • Testifies in court in the prosecution of criminal and traffic cases to include multiple narcotics violations
  • State certified Intoximeter operator

Assistant Operations Manager

Confidential

  • Assisted in the planning, tracking, and deployment of Field Support Teams
  • NCOIC for a Reserve Field Support Team of the 1st Information Operations Command

Supervisor NCOIC

Confidential

  • Provided administrative and logistical support to four Information Operations teams preparing to deploy overseas in support of the Global War on Terrorism
  • Assisted the Detachment Chief in revising policies and Standard Operating Procedures SOPs
  • Coordinated the reception and in processing of new personnel

OPSEC Program Manager

Confidential

  • Assigned as the Operations Security Program Manager for the Iraqi theater of operations responsible for creating OPSEC policy and advising the command of OPSEC violations
  • Performed duties as the section Information Management Officer ensuring the proper operation of the section's automation equipment and coordination of repairs with the next higher echelon

Assistant Operations Manager NCOIC

Confidential

Assisted in the planning, tracking, and deployment of Field Support Teams

Police Officer

Confidential

  • Interfaced with local community and business to solve crime problems and enhance community relations
  • Testified in court, prosecution of criminal and traffic cases to include multiple narcotics violations
  • State certified Intoximeter operator, certified radar operator, and department certified Spanish translator

Senior Technical Intelligence Analyst

Confidential

  • Provided supervisory analysis of technical collection and oversees intelligence report production
  • Served as Acting First Sergeant, responsible for the readiness of 114 soldiers
  • Graduated from the very challenging US Army Reserve Strategic De-briefer's Course

Barracks Supervisor NCOIC

Confidential

  • Responsible for the maintenance and management of a 179 room barracks facility, including 40 offices for the entire chain of command.
  • Issued room assignments to incoming personnel and maintained hand receipts for barracks furniture.
  • Wrote and edited billets Standard Operating Procedure SOP .

Team Supervisor NCOIC /Senior Analyst

Confidential

  • Supported and assisted in the development, validation, and implementation of tactics, techniques, and procedures for supporting Information Operations IO in validation of National and Army requirements.
  • Assisted technical engineers and developers in the development, testing, and acceptance of IO capabilities.
  • Conducted research and training on information technology-based subjects.

Supervisor Platoon Sergeant

Confidential

  • Selected over more senior Sergeants to supervise a 40-man platoon within the Army's first Information Operations Company.
  • Instrumental in creating the first formal NCO Mentor program within the 704th MI Brigade, ensuring new Sergeants received effective mentoring.
  • Assisted in the development of a unit information flow process that reduced processing time by 30 and doubled effectiveness.
  • Improved subordinate's technical skills by redirecting 120 man-hours into the operational objectives.

Team Supervisor NCOIC /Senior Analyst

Confidential

  • Supported and assisted in the development, validation, and implementation of tactics, techniques, and procedures for supporting Information Operations IO in validation of National and Army requirements.
  • Assisted technical engineers and developers in the development, testing, and acceptance of IO capabilities.
  • Conducted research and training on information technology-based subjects.

Communications Intelligence Supervisor NCOIC

Confidential

  • Selected to be the Communications Intelligence Supervisor NCOIC for the U.S. Southern Command, a position normally held by personnel two pay grades higher.
  • Individually performed all planning, scheduling, and tasking of counter-narcotics airborne assets.
  • Facilitated an inter-agency working group in response to changing operational requirements.
  • Developed and implemented a desktop-Standard Operating Procedure SOP that significantly reduced training time for new personnel.

Analyst/Linguist/Operations Supervisor NCOIC

Confidential

  • Maintained an office budget of 118,000 in an extremely proficient manner, quickly learning accounting databases.
  • Selected to be an Analyst/Operations Supervisor, a position normally held by personnel one pay grade higher, of a four-man team.
  • Provided support to the Ambassador's Country Team in efforts in the drug war.
  • Implemented and streamlined operating procedures increasing productivity by 30 .
  • Trained five newly arrived personnel with respect to their mission.

Senior Analyst/Linguist

Confidential

  • Conducted long-term analysis of low-intensity targets in the target language.
  • Supervisor of a six-person squad, overseeing all personnel-related issues and training ensuring that training was relevant, met Army standards, and all necessary training aids were available and ready for training classes.
  • Orchestrated, trained, and led the first dedicated organizational ceremonial honor guard.
  • Instrumental in coordinating, consolidating, and compiling information into four databases for newly acquired projects.
  • Attended the Army's Unit level Armorer's course at Ft. Riley, KS.

Senior Analyst/Mission Supervisor

Confidential

  • Selected to be a Mission Supervisor over more senior personnel.
  • Authored over 150 time sensitive reports in support of national level consumers.
  • Trained six analysts in a new job certification program thereby reducing training time and enhancing job performance by 35 .
  • Accountable for a 20,000 arms room, which received a 97 rating on inspection although never formally trained as a unit armorer. Received official recognition for outstanding performance.

Infantry Team Leader

Confidential

  • Supervised and was responsible for the training, health, welfare, and moral of a five man infantry team.
  • Participated in over 1,000 military funerals, ceremonies, and details throughout the Military District of Washington.
  • Assisted in the training of over 15 new soldiers both in infantry skills and ceremonial precision.

Professional Training

Used the following tools:

JPHS S-Tools 4.0 TOR WinHEX WinMD5 7Zip KALI Linux Browser History Capturer Browser History Viewer FTK Imager Greenshot HexEdit Internet Evidence Finder Maltego Mandiant Redline Metasploit VirtualBox VMWare Workstation Volatility WinAmp Wireshark Windows File Analyzer WinPcap WinZip

Military/Police Training

Basic SIGINT Analysis Course Intermediate SIGINT Analysis Course Basic Spanish Spanish Refresher Spanish Immersion Howard County Police Academy Strategic De-briefer's Course Computer Crime Investigations Fraudulent Identification Electronic Warfare Operations Security Military Deception Operations Security Program Manager Introduction to Computer Security Intranet/Internet Security Implementing Web Security Implementing Windows NT Security Deploying Internet/Intranet Firewalls Windows NT Optimization Troubleshooting Introduction to UNIX Introduction to PC's and Application Software Networking Essentials, Part 1, 2, 3 Introduction to Cellular Communications Telecommunications Technologies Understanding the Public Telephone Network Telecommunications as a Target Satellite Comms for Non-technical Personnel Introduction to LAN/WAN Networks Wireless Networks Mobile Communications Introduction to Counter-Narcotics

Cyber Training

CompTIA Network

Network Components Network Fundamentals Network Devices Wireless Networks Wide Area Networks Network Protocols Routing Network Addressing Managing and Monitoring the Network Troubleshooting the Network Network Security

Certified Ethical Hacking CEH curriculum

Ethical Hacking and the Need for Penetration Testing System Hacking and Malicious Content Footprinting, Scanning, and Enumeration Deterring Electronic Intrusions Social Engineering and Sniffing Linux Hacking Denial of Service and Session Hacking Internet-based and Database-based Attacks Physical Security Cryptography

Computer Networking Security Concepts Curriculum

Introduction to Cisco Security Design Concepts Network Security Issues Networking Security Fundamentals Security and the Wireless Environment Access Control and Physical Security Access Controls Network Security Implementing IT Security and Workplace Safety Measures Communications Security Encryption Technologies Firewalls and VPNs

CompTIA A Essentials

Troubleshooting Computers and Printers Computer Hardware Components Security and Network Fundamentals Configuring Displays, Peripherals, Laptops, Printers Installing Windows Operating Systems Operational Procedures and Preventative Maintenance Using and Managing Windows Maintaining Networks Maintaining Operating Systems Security Troubleshooting Hardware Personal Computer Components

Cyber Application Security Curriculum

Application Security Cryptography and PKI Security Architecture and Applications Security

Systems Security Certified Practitioner SSCP Curriculum

  • Access Controls Administration Auditing and Monitoring Risk, Response, and Recovery
  • Cryptography Data Communications Malicious Code

CISSP Online Curriculum

  • Information Security and Risk Management Security Architecture and Design Access Control
  • Application Security Operations Security Cryptography Physical Environmental Security Telecommunications and Network Security Business Continuity and Disaster Recovery Planning CISSP Domain: Legal, Regulations, Compliance and Investigation

Miscellaneous Cyber Classes

Malicious code and information security TestPrep N10-004 Network Introduction to Information Security Network Security Issues Cryptography Network Security Introduction to Security in Networked Environments Intrusion Detection and Response in Networked Environments Information security and the Internet IT Challenges: Present and Future ECDL/ICDL 4 Module 1: Concepts of Info Technology - Computers IT ECDL/ICDL 4 Module 1: Concepts of Info Technology - IT in Daily Life Basic Networking Concepts Security Analysis and Auditing in Networked Environments Technical Management US Government Information Assurance Regulations Basic Cisco Campus Switching Design Considerations Basic Cisco WAN Design Considerations Network Fundamentals Cisco IP Addressing Design Concepts IPvs Protecting Information and Facilities Operating System and File Security Issues IP Management w/ Sub-netting Introduction to SS7 E-mail Analysis Google Hacking Introduction to Financial Intelligence Telecommunications Fundamentals IP Management with subnetting Infrastructure Security Cisco IINS 1.0: Network Security Principles I and II , Perimeter Security, IP Security Site-to-Site Virtual Private Networks Network Security Using Cisco IOS Firewalls Oracle Application Server 10g: DAS and SSO, Component Security with SSL Managing and Maintaining Database Security in SQL Server 2005 Maintaining and Securing Data in SharePoint 2003 Building a Wired Network Basic Troubleshooting Designing Security for a Database Server Infrastructure for SQL Server 2005 Data Communications Introduction to SNORT Wireless Attacks and Countermeasures Computer Hacking Forensic Investigator 40 hr class Securing WLANs General Security Concepts Implementing IT Security Operational Organizational Security Security Management Operations Security Practices Systems Security Engineering Managing IT Security Security, Safety, and Communications Securing Future Wireless Network

Cyber Training

Web Services Security Fundamentals of Information Protection Information Security Governance: Strategies and Goals Information Security Program Development: Resources Information Security Program Development: Metrics and Implementation Authentication, Biometrics, and Security Controls Securing Storage VoIP Quality and Security Physical Environmental Security Business Continuity, Disaster Recovery, Security Training, and Forensics A Essentials 2009: Security and Network Fundamentals IPv6 update Managing Troubleshooting Devices, Drivers, Local Security, User Logon Network and System Security Mechanisms Network Protocols, Attacks, and Defenses

CompTIA Security

Auditing, Security Policies, and Disaster Recovery Wi-Fi and Remote Access Authentication Methods Messaging, User, and Role Security Cryptography Risk Analysis, Vulnerability Testing, IDS, and Forensics

We'd love your feedback!