Senior Systems Security Engineer Resume
2.00/5 (Submit Your Rating)
WashingtoN
SUMMARY
- Overhauled the existing IA and cyber security practices to reduce the occurrence of IA incidents by 75% and incident response time by 50%
- Streamlined IA workflow procedures to reduce two month incident resolution time by 50%
- Resolved 100% of all IA incidents before General Officer (O - 7) and above involvement
- Hardened numerous tactical and real-world networks, nodes, endpoints and systems from intrusion, breach, compromise and unauthorized access
- Successfully directed over 12 high-profile information assurance (IA) and cyber security (CS) projects for the only forward Theater Sustainment Command in Afghanistan
- Enacted Two-Person Integrity (TPI) mandate when using digital sender technologies to reduce confirmed negligent discharges of classified information (NDCI) to zero (0)
- Ensured the continued confidentiality of SIPR (classified) data by overseeing the destruction of SIPR HDD as part of the command’s Information Technology/Systems lifecycle program
- Maintained brigade-level cyber security posture by scheduling, participating and evaluating subordinate units in 3 Initial Command Inspection (ICI) and 5 Command Cyber Readiness Inspections (CCRI)
- Reduced the number of security related incidents by developing IA Awareness programs to educate over 500 end-users in cyber security best practices and computer usage fundamentals in an easy to understand manner
- Built and administered a communications platform that serviced the Army in Support of Operation: Enduring Freedom (OEF)
- Responsible for the positive command and control (C2) of over $1,200,000 in IT assets
- Created and enforced the cyber education program that enabled the S6 section to become 100% 8570 compliant
TECHNICAL SKILLS
- Unix/Linux Architecture, Red Hat, Fedora, Suse, Windows Server/Desktop Architecture
- Perimeter Defense Techniques, Operating System Hardening, Network Vulnerability Assessment, Business Continuity Plan (BCP), Disaster Recovery (DR) operations, Continuity of Operations (COOP), Interconnection Systems Continuity Plan (ISCP), Access Management Controls
- Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), Host-Based Security System, McAfee ePO (HBSS), SIEM systems, ACAS, PVS, MSE, Nessus, FireEye, Lancope StealthWatch, Barracuda, RSA Identity, Manage Engine Applications Manager (App Man), Manage Engine AD Audit+, Tripwire, Splunk, Security Onion, Cisco switches & routers, Microsoft SharePoint, Microsoft MySQL
PROFESSIONAL EXPERIENCE
Senior Systems Security Engineer
Confidential, Washington
Responsibilities:
- Authored 90% of the Border Protection Business Continuity Plan (BCP) and 85% of the Disaster Recovery Plan (DRP) that together made up over 75% of the 1st ever Interconnection Systems Continuity Plan (ISCP) that served as a complete continuity of operations (COOP) strategy for the Confidential
- Increased output of the Security Engineers group by 300% by developing them from a group that could only handle 12 tasks, into a group that could simultaneously process 35 different projects
- Co-led the initiative that reduced the Confidential technological footprint by 33% by consolidating 3 datacenters into 2 geographically disparate datacenters
- Configured SNMP, ping, website and service monitoring on all U.S. House of Representative assets in order to create the very 1st definitive 100% asset item inventory in Confidential history
- Increased work efficiency by 25% for the Security Engineers group by automating routine critical systems checks and publishing them Confidential regular intervals
- Created FISMA-compliant cyber security solutions that bolstered security by eliminating obsolete and sub par IT/IA/CS equipment from the Confidential infrastructure
- Worked interdepartmentally in order to increase the continuous monitoring capability of the Confidential ’ SOC by expanding the current capabilities of existing tools such as AD Audit+, Splunk and Manage Engine Applications Manager (AppMan)
Subject Matter Expert
Confidential, Norfolk, VA
Responsibilities:
- Stood up the Navy’s (CNIC) very 1st Cyber Security “hunt teams” called the Confidential and Incident Responders teams
- Created the work flow process that reduced the time necessary to produce critical Watch Turnover reports that went to the Admiral by over 66%.
- Created a knowledge base repository to documented the daily routines and common knowledge in a working Please save paper by printing on both sides SOP that is followed by the Confidential and Incident Responders teams
- Streamlined the process for corresponding with personnel in newly-added remote sites. Documented the process in a working SOP that is followed by the Confidential and Incident Responders teams
- Trained 4 of the existing 6 team members of the Cyber Security Watstanders (CS Watch) and Incident Response (IR) teams to a standard that enabled the ".mil" teams to serve as a blueprint for the future ".com" teams
- Authored several Standard Operating Procedure (SOP) documents that are followed by the Confidential and Incident Responders teams
Information Assurance Applications Team Member
Confidential, Norfolk, VA
Responsibilities:
- Ensured all critical Norfolk servers received top marking in the Fall 2016 CCRI inspection by manually applying over 800 STIGs
- Used scripting and automation expertise to streamline software pushes for over 200 ACAS, PVS and Nessus servers in use by the U.S. Navy
- Manually applied over 800 STIGs and ensured compliance with ACAS scans for all critical Norfolk servers in most Fall 2016 CCRI inspection
- Directly responsible for applying security patches for major exploits like Heart Bleed and Shellshock to prevent future cyber security incidents for over 36 Video On Demand providers Confidential &T, Bharti, etc.) around the world
- Selected over senior engineers to be the Project Lead for the Orange, France client whose account is worth over $1.7M in revenue
- Directed task force responsible for streamlining/developing case handling procedure that reduced average incident life by 45%
- Managed and troubleshot the existing network infrastructure for several high-profile clients such as Comcast, Charter, Verizon FiOS, and Orange, France
- Employed advanced Unix/Linux networking and administration techniques to troubleshoot critical and routine issues in the OnDemand field
Premise Technician
Confidential, Atlanta, GA
Responsibilities:
- Was the 1 of the team to routinely secure customers’ installed internet by changing default SSID and implementing a password for all customers
- Educated over 100 customers on basic cyber security practices that reduced the likelihood of their home network and sensitive information being compromised
- Installed Confidential &T U-verse TV, internet and VOIP services and integrated with existing equipment such as monitored intrusion alarms
- Repaired substandard Confidential &T U-verse service and verified all services were operational and compliant in a timed operational environment
- Installed, configured and maintained the customer’s inside wire to include Cat5, Coax and Quad Wire
- Resolved nonstandard issues for customers in a timely and professional manner
Counter Intelligence Agent
Confidential
Responsibilities:
- Routinely was the first to manually neutralize, remove, and secure Information Systems against Viruses/Malware
- Saved Best Buy money in damages by keeping 100% accountability of customers’ personal computer equipment and peripherals valued Confidential over $15,000 daily
- Worked with S.T.A.R. and other proprietary databases to outsell other Agents and deliver more total solutions