We provide IT Staff Augmentation Services!

Security Engineer Resume Profile

4.00/5 (Submit Your Rating)

Summary

Over thirty years experience in the IT industry with recent 25 years experience with US Army, DOD and DOJ projects. Well versed in vulnerability assessments and penetration testing for Certification and Accreditation C A of networks and systems. Very familiar with the C A process, particularly the DOD Information Assurance Certification and Accreditation Process DIACAP . Highly skilled and experienced at designing and developing network security solutions and processes tailored to specific situations. Experienced in installing, integrating and managing firewalls, intrusion detection systems, reverse proxy technologies and many other network security devices. In depth knowledge of operating systems such as Microsoft Windows 2008/7-8.1 and many flavors of Unix and Linux on Sun, HP, and PC hardware. Excellent exposure to CISCO technologies. Have worked with PKI on the job and attended DOD conferences on the subject. Extensive work with IDS systems and signature development.

Confidential

Network Security Engineer

Worked for Confidential on computer security programs for the Department of Justice National Drug Intelligence Center NDIC in Confidential. Responsible for monitoring, maintaining, and improving the Network Intrusion Detection Systems NIDS and the Host-based Intrusion Detection Systems HIDS for the NDIC. Tasked to perform network Penetration Testing of the NDIC Justice Network System JNS as part of the C A process. Provided technical expertise in the procurement and design of enhancements to the current Network Security Architecture

Confidential

Security Architect

Worked for Engineering Services Group ESG out of Parsippany, NJ under contract to Boeing in St. Confidential on classified security programs for DOD and other agencies. Prepared System Security Plans SSP in accordance with the NISPOM and JAFAN. Conducted computer security audits for compliance to government guidelines/procedures. Consulted on computer security issues and research computer security technology.

Confidential

Senior Network Security Engineer

Worked with the Confidential Army Information Systems Engineering Command USAISEC on the Installation Information Infrastructure Modernization Program I3MP . Primarily assisted U.S. Army installations in the design, procurement, installation, configuration and maintenance of LAN, WAN, and POP equipment to provide their users with connectivity to the Army networks and beyond. Prepared all necessary documentation leading to DITSCAP certification. This consisted of Systems Security Authorization Agreement SSAA , the Requirements Traceability Matrix RTM , the System Test Evaluation ST E and other C A documentation as part of DITSCAP.

Confidential

Computer Scientist/Associate Manager

Served as Senior Technical Advisor to the Chief of the Confidential Army Regional Computer Emergency Response Team, CONUS RCERT-C and managed small team of security professionals that were members of the RCERT-C. Field tested the concept of using proxy engines to defeat a huge multi-user/multi-homed denial-of-service attack against a DOD target as part of the Security-In-Depth working group at the Office of the Army CIO. Using this success designed, developed, installed, and maintained the Army's Reverse Proxy Server capability to protect Army web sites from disruption, manipulation of data, or destruction. Installed this solution at 35 locations within CONUS and 2 locations overseas. This effort required analysis of common attack signatures and the development of countermeasures that were installed on the proxy engines.

Confidential

Principle Network Security Analyst

Worked with the Intelligence Branch of the Confidential Army 5th Signal Command to develop the European Theater's information security program and create a network security center of excellence that became the RCERT - Europe, the Army's first RCERT. During this period, grew from a staff of 2 to over 35 employees. Principal designer and developer of the first theater-wide intrusion detection system IDS deployed anywhere in the Army. Installed, integrated and maintained the IDS capability using TCP Wrappers to report to an HP Openview console via SNMP.

Confidential

Computer Programmer/Analyst

Developed communications management modules for European Telephone Systems ETS Support. Lead designer of the Switched Systems Management Support System SSMSS and the Network Configuration Management System NCMS . These two systems were designed to support better management of the over 100 ETS telephone switches currently in place. Programmed in a combination of C programs and routines written in Perl to provide near-real-time capture and processing of traffic management and configuration information. Captured data was inserted into an Informix database for queries and reporting.

Confidential

Programmer Analyst

Brought over to Germany by ITT Federal Systems to serve as the programmer/analyst for the Area Maintenance Supply Facility AMSF in Mannheim, Germany. Working with a van mounted Honeywell mini-computer known as a DAS-3 developed supply and logistics software which replicated the standard Army DS4 supply system, but did so more rapidly and on a more frequent schedule. Monthly routines needed to be run on a weekly basis and so on. Software was developed in COBOL with extensive JCL.

We'd love your feedback!