Shift Lead Resume
4.00/5 (Submit Your Rating)
SUMMARY:
- Well - rounded cyber security professional pursuing new opportunities conducting technically focused computer network operations in support of global military and intelligence community objectives.
PROFESSIONAL EXPERIENCE:
Shift Lead
Confidential
- Monitor the SIEM (ArcSight ESM/Splunk ES) for malicious intrusions and anomalous activity impacting the U.S. Courts networks
- Perform quality assurance review of subordinate intrusion analysis
- Initiate incident response actions
- Submit security stack content development recommendations (Splunk, FireEye, Cisco ESA, Sourcefire IDS, McAfee ePO)
Sr. Security Engineer/Incident Responder/ Threat Analyst Pentagon
Confidential
- Monitor the enterprise network for malicious intrusions, network misconfigurations, and unauthorized activity
- Perform incident response actions per CJCSM 6510.01B
- Performed triage digital forensics on computers and smartphones
- Developing security stack (Splunk, FireEye, Cisco ESA/WSA, Sourcefire IDS, BlueCoat Security Analytics, Bro IDS, McAfee ePO, )
- Creating and maintaining standard operating procedures
- Creating custom signatures that detecting, prevent, and enable organization to respond to cyber exploitation and attack efforts against the organization's systems, networks, and users
- Ensuring compliance with and meeting all of the requirements set forth by DoD 8530.01 and 8530.02, any updates to these policies, and any future CND policies or regulations produced by the United States Government (USG).
- Develop custom Splunk Dashboards
- Recommend Security Engineering Solutions
- Provide software/security risk assessments
- Cyber Threat Analysis and implementing mitigation strategies.
- Drafting Security Policies
- Providing Security Threat Briefings to Senior Leadership
Sr. Computer Net Defense Analyst/Technical Lead
Confidential, Belvoir, VA
- ArcSight ESM (Creating Channels, Reports, Dashboards, Query Viewers, Active Lists, Filters, correlating events and basic installation of connectors)
- Splunk (customized searches, reports, dashboards)
- Sourcefire Confidential System (Create and tune signatures, review IDS alerts for nefarious activity)
- Barracuda Spam Filter and Firewall
- Wire Shark (analyze raw packets, extract objects)
- Solera DeepSee network traffic analyzer (now owned by BlueCoat)
- ArcSight Logger
- FTK
- McAfee ePO
- Argus
- Centaur
- Operating Systems:
- Windows 2012 R2
- Linux (Red Hat, Fedora)
Lead Cyber Analyst FT
Confidential
- ArcSight Logger
- Wire Shark
- Centaur
Lead All-Source Cyber Intelligence Analyst FT
Confidential
- TAC
- Anchory
- M3
- Analyst Notebook
- HOTR
- Intelink