We provide IT Staff Augmentation Services!

Information Security Analyst/lead Resume

3.00/5 (Submit Your Rating)

SUMMARY:

  • Results - oriented information and cyber security professional responsible for developing global cyber security-related policies spanning the public and private sectors with experience protecting domestic and international cyber-based information systems.
  • Teamed with the Intelligence and Counterintelligence community members to develop strategic policies to support Confidential .
  • Recognized expert in the cyber community and perform a wide range of functions Confidential the highest level of difficulty and complexity.
  • Expertise in planning and managing projects requiring collaboration with internal and external components, including contractors, representatives of other Government agencies, industry, and academia.
  • Authored Communications Tasking Order (CTO) 10-133 Protection of Classified Information on Confidential ( Confidential ) Secret Internet Protocol Router Network ( Confidential ) (Change 1, 2), covering the prohibition of all write access on Confidential to prevent unauthorized data transfers from Confidential to Confidential .
  • Authored CTO 10-004/10-084, covering Joint Task Force - Global Network Operations/ Confidential Command ( Confidential / Confidential ), which lifted the ban on USB thumb drive/flash media use within the Confidential .
  • Led a consecutive Operational Planning Team ( Confidential ) to develop Confidential -Tailored Readiness Options (TROs), which provided cyber defense responses used by CDR, Confidential and other Commanders to measure cyber readiness or mitigate cyber intrusions in support of Confidential change criteria.
  • Led the Confidential (JOC) Confidential consisting of CI, Intel and other experts to respond to CC/S/A/FA questions comments and concerns related to CTO 10-133
  • Exposed cloned web servers using the same trusted host as a potential security vulnerability, and mitigated future issues by having the Confidential and Defense Knowledge Online (DKO) SSO technical questionnaire modified to explicitly prohibit web server cloning.

PROFESSIONAL EXPERIENCE:

Confidential

Information Security Analyst/Lead

Responsibilities:

  • Advise on a broad range of cyber inquiries such as scope of issues to be investigated, factors and resources involved, technology available, and required liaison on joint projects with other organizations.
  • Conduct threat and vulnerability assessments to analyze risks to Information Systems and networks.
  • Conduct formal briefings and presentations internally and externally to the organization. Regularly communicate to all levels inside and outside of the organization on complex cyber and CI information.
  • Make recommendations on complex IT cyber and information security issues. Persuade and negotiate with peers and external stakeholders to promote concepts for improving cyber and information security. Collaborate with peers, senior managers, and customers to accomplish goals for cyber and CI activities.
  • Represent the organization Confidential community working groups, IA conferences, and professional board meetings in order to establish and maintain effective relationships with persons Confidential senior levels, both inside and outside the Confidential .
  • Speaker Confidential the 2011 Confidential ’s ( Confidential ) and Information Assurance Directorate (IAD) information symposium.
  • Serve as a lead subject matter expert on information technology projects for cyber and CI related activities and provide advice and guidance in implementing IT security policies and procedures.
  • Co-Authored a draft Confidential cyber conditions ( Confidential ) plan to strategically direct all subordinate elements under Confidential to protect critical/essential information during heightened alerts.
  • Provide strategic guidance and tactical support to Confidential senior leadership and serve as the primary point of contact for the Confidential on various topics related to cyber security, information assurance (IA), Network Operations (NetOps) and Computer Network Defense (CND) policy and issues.
  • Perform independent research to assist with the development of orders, appendixes and other official documents related to cyber security for the organization in defense of the Confidential
  • Write and contribute to the development of comprehensive agency and cross-agency strategic policies and procedures for reporting, analyzing, and responding to computer security incidents.
  • Work collaboratively with members of the information assurance community to define, document, and review network defense requirements. Develop strategic policies and objectives; coordinate strategic plans.

Lead Engineer

Confidential

Responsibilities:

  • Led a consecutive Operational Planning Team ( Confidential ) to develop Confidential -Tailored Readiness Options (TROs), which provided cyber defense responses used by CDR, Confidential and other Commanders to measure cyber readiness or mitigate cyber intrusions in support of Confidential change criteria.
  • Analyzed Confidential network defense programs and national and global events. Made assessments on impacts on the Confidential Global Information Grid ( Confidential ). Provided recommended actions to significantly improve the defensive posture of Confidential networks and to mitigate Denial of Service and Distributed Denial of Service (DOS/DDOS) attacks.
  • Advised customers on strategies to protect and secure sensitive information and systems. Selected and applied computer-based analytical tools to address complex NetOps policy and issues.
  • Provided technical advice and consultation to J35 and the supported CC/S/As on matters relating to malicious computer activity, NetOps and critical nuclear data, including potential applications of emerging trends and technologies.
  • Performed critical assessments of unique Commercial Off-the-Shelf (COTS) hardware and software products and their potential operational utility and feasibility, and the technical complexity and costs of integrating them into the existing tool set and the current Global Information Grid ( Confidential ) security infrastructure.

Cyber Incident Handler

Confidential

Responsibilities:

  • Received, analyzes, and distributes information in order to integrate and synchronize resources across the computer network operations community.
  • Provided technical and administrative support to the ACOIC staff during the identification, resolution, and tracking of computer intrusions and other computer security incidents/events.
  • Reviewed network traffic, intrusion detection system (IDS) logs, and other data to determine if Army systems have been compromised, and to assess resultant damage and operational impact.
  • Documented the results of after-action analysis in technical reports and executive briefings

SCIF Engineer and 3rd Shift lead

Confidential

Responsibilities:

  • Verified and solved serious problems related to the transmission of classified Cables across several servers for Diplomatic Security Agents and analyst worldwide.
  • Upgraded, implemented, and maintained requirements for servers and operating software to ensure compliance with vendor support and migration criteria.
  • Monitored system backups and ensured data replication was performed Confidential multiple disaster/recovery sites.
  • Collaborated with server engineers, users, and client managers to identify requirements and plan projects.
  • Verified specific DS Confidential files and connections for Diplomatic Security Intelligence, Threat Analysis and Counter Intelligence offices were current and operational.
  • Provided direct technical support to the DS Command center.

Lead Senior SSO Engineer

Confidential, Fort Belvoir, VA

Responsibilities:

  • Served as the technical point of contact for Single Sign-On issues, working with the Confidential action officer, security engineers, and military officers to resolve security issues and prevent misuse and violations of Army and Confidential regulations.
  • Handled access management; secured Internet, intranet, and extranet Web-based and enterprise applications using Single Sign-On (SSO), Lightweight Directory Access Protocol (LDAP), and Common Access Card (CAC) Cryptographic Logon (CCL) authentication for hundreds of Army applications supporting Army and Confidential initiatives.
  • Administered access approval of Single Sign-On applications; reviewed signed memorandums of agreement (MOAs) as verification of interim approval and approval to operate (IATO/ATO); and protected the sensitivity and criticality of Classified and Unclassified information systems.
  • Enforced information assurance (IA) on all Web applications using Single Sign-On by mandating authentication over a secure channel using Secure Socket Layer (SSL), in addition to working with Confidential to prohibit caching of SSL content.

Security Engineer, Associate

Confidential, Fairfax, VA

Responsibilities:

  • Analyzed external and internal sourced network-based attacks and traffic anomalies across Cisco IPS 4255 and 4240 sensors.
  • Provided daily technical reports pertaining to possible threats or attacks against the Confidential network. Regularly notified the Confidential Security team of security breaches, violations, and threats through incident reports.
  • Supported intrusion detection system (IDS) coverage for the Confidential ( Confidential ) network.

Systems Administrator

Confidential, Fort Belvoir, VA

Responsibilities:

  • Performed testing and troubleshooting of information systems over five networks ( Confidential, Confidential, Confidential, Confidential ( Confidential ) and Confidential ) in more than 20 locations in the Confidential and overseas.
  • Worked exclusively with the Confidential Network team to resolve network issues in support of current wartime missions while resetting network switches (Cisco 6500 Series) to prevent spikes during uninterruptible power supple (UPS) outage.
  • Provided network management; installed and upgraded information security controls on IT systems.
  • Created network and e-mail accounts for soldiers and civilians assigned to Confidential . Repaired damaged e-mail and user network accounts on the Microsoft Active Directory Server.

System Administrator

Confidential, Washington, DC

Responsibilities:

  • Troubleshot, diagnosed, and resolved escalated hardware and software network-related problems involving Confidential NetWare Windows 2000 and XP connectivity issues.
  • Provided customer support to 3,500 government officials including members of the Senior Executive Staff (SES) throughout the Confidential and overseas.
  • Re-imaged statistical workstations with SCSI drives for intense mathematic equations. Created and maintained user profiles on Confidential Console One.
  • Administered TFS SecureID accounts for security and IT management while testing laptop computers for newly hired government officials.

System Administrator/Test Lab Technician/PBX Admin

Confidential, Washington, DC and Vienna, VA

Responsibilities:

  • As a member of the support team, supported set-up of Army logistics, tested functionality, and upgraded software with service packs for final distribution.
  • Installed, configured, and performed administrative tasks on Windows NT/2000 workstations and associated hardware in an environment of 40 to 50 users.
  • Performed daily PBX system back-ups of the “Intuity” voice messaging system.
  • Performed installation and programmed phones.
  • Troubleshot software issues with Oracle 8i; installed applications 6i and Windows 2000 Server.

We'd love your feedback!