We provide IT Staff Augmentation Services!

Senior Systems Security Engineer Resume

2.00/5 (Submit Your Rating)

WashingtoN

SUMMARY

  • Overhauled the existing IA and cyber security practices to reduce the occurrence of IA incidents by 75% and incident response time by 50%
  • Streamlined IA workflow procedures to reduce two month incident resolution time by 50%
  • Resolved 100% of all IA incidents before General Officer (O - 7) and above involvement
  • Hardened numerous tactical and real-world networks, nodes, endpoints and systems from intrusion, breach, compromise and unauthorized access
  • Successfully directed over 12 high-profile information assurance (IA) and cyber security (CS) projects for the only forward Theater Sustainment Command in Afghanistan
  • Enacted Two-Person Integrity (TPI) mandate when using digital sender technologies to reduce confirmed negligent discharges of classified information (NDCI) to zero (0)
  • Ensured the continued confidentiality of SIPR (classified) data by overseeing the destruction of SIPR HDD as part of the command’s Information Technology/Systems lifecycle program
  • Maintained brigade-level cyber security posture by scheduling, participating and evaluating subordinate units in 3 Initial Command Inspection (ICI) and 5 Command Cyber Readiness Inspections (CCRI)
  • Reduced the number of security related incidents by developing IA Awareness programs to educate over 500 end-users in cyber security best practices and computer usage fundamentals in an easy to understand manner
  • Built and administered a communications platform that serviced the Army in Support of Operation: Enduring Freedom (OEF)
  • Responsible for the positive command and control (C2) of over $1,200,000 in IT assets
  • Created and enforced the cyber education program that enabled the S6 section to become 100% 8570 compliant

TECHNICAL SKILLS

  • Unix/Linux Architecture, Red Hat, Fedora, Suse, Windows Server/Desktop Architecture
  • Perimeter Defense Techniques, Operating System Hardening, Network Vulnerability Assessment, Business Continuity Plan (BCP), Disaster Recovery (DR) operations, Continuity of Operations (COOP), Interconnection Systems Continuity Plan (ISCP), Access Management Controls
  • Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), Host-Based Security System, McAfee ePO (HBSS), SIEM systems, ACAS, PVS, MSE, Nessus, FireEye, Lancope StealthWatch, Barracuda, RSA Identity, Manage Engine Applications Manager (App Man), Manage Engine AD Audit+, Tripwire, Splunk, Security Onion, Cisco switches & routers, Microsoft SharePoint, Microsoft MySQL

PROFESSIONAL EXPERIENCE

Senior Systems Security Engineer

Confidential, Washington

Responsibilities:

  • Authored 90% of the Border Protection Business Continuity Plan (BCP) and 85% of the Disaster Recovery Plan (DRP) that together made up over 75% of the 1st ever Interconnection Systems Continuity Plan (ISCP) that served as a complete continuity of operations (COOP) strategy for the Confidential
  • Increased output of the Security Engineers group by 300% by developing them from a group that could only handle 12 tasks, into a group that could simultaneously process 35 different projects
  • Co-led the initiative that reduced the Confidential technological footprint by 33% by consolidating 3 datacenters into 2 geographically disparate datacenters
  • Configured SNMP, ping, website and service monitoring on all U.S. House of Representative assets in order to create the very 1st definitive 100% asset item inventory in Confidential history
  • Increased work efficiency by 25% for the Security Engineers group by automating routine critical systems checks and publishing them Confidential regular intervals
  • Created FISMA-compliant cyber security solutions that bolstered security by eliminating obsolete and sub par IT/IA/CS equipment from the Confidential infrastructure
  • Worked interdepartmentally in order to increase the continuous monitoring capability of the Confidential ’ SOC by expanding the current capabilities of existing tools such as AD Audit+, Splunk and Manage Engine Applications Manager (AppMan)

Subject Matter Expert

Confidential, Norfolk, VA

Responsibilities:

  • Stood up the Navy’s (CNIC) very 1st Cyber Security “hunt teams” called the Confidential and Incident Responders teams
  • Created the work flow process that reduced the time necessary to produce critical Watch Turnover reports that went to the Admiral by over 66%.
  • Created a knowledge base repository to documented the daily routines and common knowledge in a working Please save paper by printing on both sides SOP that is followed by the Confidential and Incident Responders teams
  • Streamlined the process for corresponding with personnel in newly-added remote sites. Documented the process in a working SOP that is followed by the Confidential and Incident Responders teams
  • Trained 4 of the existing 6 team members of the Cyber Security Watstanders (CS Watch) and Incident Response (IR) teams to a standard that enabled the ".mil" teams to serve as a blueprint for the future ".com" teams
  • Authored several Standard Operating Procedure (SOP) documents that are followed by the Confidential and Incident Responders teams

Information Assurance Applications Team Member

Confidential, Norfolk, VA

Responsibilities:

  • Ensured all critical Norfolk servers received top marking in the Fall 2016 CCRI inspection by manually applying over 800 STIGs
  • Used scripting and automation expertise to streamline software pushes for over 200 ACAS, PVS and Nessus servers in use by the U.S. Navy
  • Manually applied over 800 STIGs and ensured compliance with ACAS scans for all critical Norfolk servers in most Fall 2016 CCRI inspection
  • Directly responsible for applying security patches for major exploits like Heart Bleed and Shellshock to prevent future cyber security incidents for over 36 Video On Demand providers Confidential &T, Bharti, etc.) around the world
  • Selected over senior engineers to be the Project Lead for the Orange, France client whose account is worth over $1.7M in revenue
  • Directed task force responsible for streamlining/developing case handling procedure that reduced average incident life by 45%
  • Managed and troubleshot the existing network infrastructure for several high-profile clients such as Comcast, Charter, Verizon FiOS, and Orange, France
  • Employed advanced Unix/Linux networking and administration techniques to troubleshoot critical and routine issues in the OnDemand field

Premise Technician

Confidential, Atlanta, GA

Responsibilities:

  • Was the 1 of the team to routinely secure customers’ installed internet by changing default SSID and implementing a password for all customers
  • Educated over 100 customers on basic cyber security practices that reduced the likelihood of their home network and sensitive information being compromised
  • Installed Confidential &T U-verse TV, internet and VOIP services and integrated with existing equipment such as monitored intrusion alarms
  • Repaired substandard Confidential &T U-verse service and verified all services were operational and compliant in a timed operational environment
  • Installed, configured and maintained the customer’s inside wire to include Cat5, Coax and Quad Wire
  • Resolved nonstandard issues for customers in a timely and professional manner

Counter Intelligence Agent

Confidential

Responsibilities:

  • Routinely was the first to manually neutralize, remove, and secure Information Systems against Viruses/Malware
  • Saved Best Buy money in damages by keeping 100% accountability of customers’ personal computer equipment and peripherals valued Confidential over $15,000 daily
  • Worked with S.T.A.R. and other proprietary databases to outsell other Agents and deliver more total solutions

We'd love your feedback!