We provide IT Staff Augmentation Services!

Security Analyst Resume Profile

4.00/5 (Submit Your Rating)

SUMMARY

  • Seeking a Cyber Security Analyst position, which would require me to continue to utilize and build my skills in vulnerability assessment, security investigation and analysis, and risk and incident management, to achieve total customer satisfaction. A talented, ambitious, and knowledgeable individual with more than seven years experience with the United States Air Force as a Cyber Transport Specialist, as well as seven years between the private and DoD IT sectors, currently as a Systems Administrator/Information Assurance Analyst. Adept at analyzing issues at hand, and developing and instituting the needed procedures and responses to resolve those issues. Outstanding record of achievement coupled with a consistent high level of performance working with people and services, requiring solid organizational and time management, and consultative and negotiating abilities.
  • Current TS/SCI with a CI Polygraph PR Date: November 2012

TECHNICAL SKILLS AND CORE STRENGTHS

  • System Center Configuration Manager SCCM
  • Windows Server Update Services WSUS
  • Retina Network Security Scanner
  • Assured Compliance Assured Compliance Assessment ACAS
  • BMC Remedy IT Service Management Suite
  • Technical writing experience TTPs, SOPs, etc.
  • Basic knowledge and administration with Splunk and Xacta
  • DOD Information Assurance Vulnerability Management IAVM
  • McAfee Host Based Security System HBSS
  • Department of Defense Information Assurance Certification and Accreditation Process DIACAP
  • Microsoft Windows operating system tools and components MMC, Registry Editor, AD, GP, etc.
  • Technical guidance knowledge NIST, FIPS, STIGs

WORK EXPERIENCE

Confidential

Systems Administrator/Information Assurance

Provides security information and event management SIEM through the Host Based Security System HBSS /McAfee ePolicy Orchestrator ePO on multiple networks for the 513th MI BDE. Monitors HBSS ePO for incident and data alerts, and assesses and/or modifies the HBSS operational parameters filters, signatures, client tasks, policies as needed or when requested, to maintain the highest standard of security while also ensuring continued productivity. Performs system administration on HBSS by providing technical support in the resolution of HBSS technical issues, or integrating HBSS data requirements for policies or tasks into new or existing security processes and procedures. Performs periodic and on-demand system audits and vulnerability assessments using eEye Retina, DISA Gold Disk Scanner SCAP , Windows Automated Security Scanning Program WASSP , and/or Tenable Nessus Vulnerability Scanner NVS for all managed subnets/devices. Provides patch management and troubleshooting measures for scan result issues, as needed. Compiles vulnerability metrics for tracking purposes, and provides and briefs on vulnerability metrics and reports to IT senior leadership and IT staff at least monthly. Supports the DoD Information Assurance Certification and Accreditation Process DIACAP for all DoD Information Systems IS , enclaves, and application systems on multiple networks in order to achieve or continue Approval to Operate ATO status in support of the Department of Defense Instructions DoDI 8510.01. Provides Windows Server Active Directory AD support with experience and knowledge of OU structures, AD security principles, and scripting with Windows PowerShell.

Systems Integration Analyst/IANO

Confidential

Gauged the effectiveness and efficiency of existing systems, and assisted in developing and implementing strategies for improving or further leveraging of these systems. Worked diligently to enhance or improve business processes via integration of new or upgraded software, and administrative/technical documentation SOPs, TTPs, equipment manuals, network diagrams, etc. Provided technical administration for the operation and maintenance of the G2 organization's IT systems and resident applications. Resolved problem tickets and help desk calls from end users on application and software issues on mission critical systems. Compiled and maintained inventory of organizational software and system assets. Provided information assurance knowledge for the conduct of Information Assurance IA duties including Certification and Accreditation C A and Information Vulnerability Management activities. Responsible for the implementation and maintenance of NIST and FISMA compliance for the information systems, operational security measures, validation of security controls, creating/maintaining security processes procedures, and maintaining continued security compliance for customers. Performed vulnerability and compliance scans and reviews on Joint Worldwide Intelligence Communications System JWICS , as well as analyzed eEye Retina scans for the G2 organization, produced by South West Asia Cyber Center SWACC , on NIPR and SIPR for mitigation of vulnerabilities.

Information Assurance/Security Analyst

Confidential

Provided operational Information Assurance and Information Systems Security INFOSEC support as a member of an integrated government/contractor team, principally to the 513 MI BDE and all subordinate battalions, on four separate classification networks. Configured, integrated, and maintained the 513 MI BDE Host Based Security System HBSS and components McAfee Agent, Host Intrusion Prevention System, Policy Auditor, Asset Baseline Monitor, and VirusScan Enterprise on Windows operating systems. Monitored HBSS for alerts, and assessed and modified the HBSS operational parameters filters, signatures, rules, etc. as needed or when requested. Performed system administration on HBSS, and integrated HBSS data alerts, logs, data feeds, etc. into new or existing security processes and procedures intrusion detection analysis, auditing, etc. Ensured requirements for Security Technical Implementation Guides STIG compliance, security, and performance were implemented and maintained. Conducted and oversaw network security scans and scan processes eEye Retina, DISA Gold Disk Scanner SCAP , Windows Automated Security Scanning Program WASSP for all managed subnets. Updated, troubleshot and fixed scan issues, as needed. Compiled vulnerability metrics for tracking purposes, and provided and briefed on vulnerability metrics and reports to IT senior leadership and IT staff weekly. Gathered requirements from teams, customers, and management, and performed research and test configurations alongside system administrators to determine the best solution to meet customer goals and objectives. Researched, gathered and carefully interpreted current guidance and policies from a variety of Department of Defense DoD and federal investigative and enforcement agencies, to brief IT senior leadership on the potential positive or negative impact s they could have to IT security of the organization. Updated/created and maintained administrative documentation such as SOPs and TTPs for continuity and training purposes. Maintained situational awareness of IA posture including PO AM updates , conducted reviews at least annually, and initiated recertification, if required. Supported the DoD Information Assurance Certification and Accreditation Process DIACAP for all DoD Information Systems IS , enclaves, and application systems on multiple networks in order to achieve or continue Approval to Operate ATO status in support of the Department of Defense Instructions DoDI 8510.01.

Systems Administrator

Confidential

Provided effective provisioning, installation/configuration, upgrades, operation and maintenance of systems hardware and software, and related infrastructures to adhere to organizational values and needs. Responded to user requests for technical assistance and took appropriate action to troubleshoot and solve software problems. Performed authorized software changes, following established procedures for quality, configuration control, testing, documentation and security. Provided most up-to-date and secure baseline images with the use of the Norton Ghost software, to provide a quick and seamless recovery process in case of system failure. Utilized security policies and Certification and Accreditation C A processes to ensure systems and services were accessible to customers, the confidentiality of customer information was maintained, and the integrity of customer information was protected in accordance with applicable regulatory guidelines. Created SOPs/TTPs for new processes and procedures, as required. Provided application/Windows OS installation/configuration/patching as well as data reporting application install status, client health, etc. leveraging Windows Server Update Services WSUS and Microsoft System Center Configuration Manager SCCM . Troubleshot varying aspects within SCCM and WSUS as needed. Teamed with information assurance to remediate workstation security issues found during routine checks. Basic experience with the installation and management of VMware vSphere and client administration.

Confidential

LiveHelp Technician

Provided first and second level support and training via inbound telephone calls and emails to resolve user concerns and software problems relating to operating systems Windows NT/XP/Vista , Microsoft applications, internet browsers, web-based POS programs myfidelio.net, mymicros.net , network connectivity, TCP/IP and other protocol configurations, proprietary Micros software, user rights and permissions, disabling and enabling accounts, Seagate Crystal reports, basic programming, etc. Oversaw daily trends of customer computer systems, evaluated software programs with regard to their usefulness and performed scheduled and unscheduled software maintenance via Vigilex web-based program. Answered technical questions regarding software products or technical services provided, and the requirements needed within the related industries dealing with compliance PCI , auditing and record keeping. Performed and deployed new Micros releases, system upgrades, evaluated and installed patches and hot fixes, software and drivers, if necessary. Installed and troubleshot hardware peripherals such as cables, printers, modems, KVM switches, etc. Configured, troubleshot and ensured malware detection and elimination by providing optimal performance of the security templates on approximately 350 customer SonicWALL devices and antivirus programs McAfee/Norton/Symantec as per need per site. Audited, maintained and documented client system event logs to find any vulnerabilities, evidence of misuse or current malware attacks made to the system, and troubleshot as needed. Performed basic security analyses and risk/vulnerability assessments on client systems via the SonicWALL Unified Threat Management system, which provided intelligent, real-time network protection against both application-layer and content-based attacks. Assisted installers in the design, configuration and implementation/installation of small and medium sized Point-of-Sale computer systems. Provided documentation, on-site customer training, operations, maintenance, and support during go lives for new end-users.

Confidential

Cyber Transport Technician

Assists in the configuration, installation, and maintenance of deployable network systems to include the LAN/WAN using the Joint Incident Site Communications Capability JISCC , which is a communications bridge between first responders and other local, state, and federal agencies. Maintains an inventory of all network hardware and software used for JISCC. Installs, configures, and troubleshoots network and systems hardware, operating system and application software, and peripheral hardware per the required standards and procedures, and/or customer request. Ensures compliance with FOIA Freedom of Information Act and Privacy Act in accordance with DoD and AF directives. Reports security incidents and executes corrective security measures when needed. As an Information Assurance SME, assists the civilian team with IA inspections and vulnerability management, as requested. As a NCO, serve as mentor and instructor for young troops on information technology operations and military policies.

Confidential

Supported Operation Iraqi Freedom/Operation Enduring Freedom/Horn of Africa campaigns - aided operations by providing smooth transitions of Communications Focal Point CFP operations to the US Air Forces Central Command USAFCENT , the Air Force Communication Control Center ACCC and AUAB ECS leadership.

We'd love your feedback!