We provide IT Staff Augmentation Services!

System Administration Resume Profile

2.00/5 (Submit Your Rating)

Meade, MD

QUALIFICATIONS SUMMARY

Security Professional with exceptional organization skills and a diverse background in:

  • Counter-Terrorism Analysis
  • Penetration Testing
  • Cyber Security
  • Network Technician
  • Data Mining, Target Discovery and Development
  • Signals Intelligence SIGINT Analysis
  • Information Assurance
  • Serialized Reporting
  • Certification and Accreditation
  • Security Engineering

SECURITY CLEARANCE

Current Top Secret/SCI and Full Scope Polygraph

IT CERTIFICATIONS

Network

Code: WYT7BGRC4DV11EQT and TPVXXNM27HV1Y9S6

Security

Code: XS6XBCFC7GBESEJM

CISSP

ID: 410952

TECHNICAL SKILLS

System Administration

  • 6 years experience developing and maintaining Secure Research Environment SRE network
  • 6 years experience serving as an administrator on various platforms to include: UNIX, Linux, Kali, Windows XP/7/Server 2003/Server 2008/Server 2012, ESX/ESXi, OS X.
  • 6 years experience configuring and deploying servers
  • 6 years experience building windows forest/domains within Active Directory to include building policies for OU's, users and groups
  • 6 years experience using Centrify within Active Directory
  • 6 years experience using vCenter and vSphere to administer VMWare Virtual Machines
  • 6 years experience configuring virtual switches and port groups within VMWare architecture
  • 6 years experience applying patches to Windows and Linux servers
  • 6 years experience auditing Active Directory
  • 6 years experience with remote administration using tools such as Remote Desktop RDP and SSH tools such as Putty
  • 6 years experience transferring files across networks using FTP, SFTP and SCP
  • 6 years experience writing simple scripts in Perl, Python, VBScript and Winbatch

Information Security Toolset:

  • 8 years experience using IDS/IPS SourceFire/Snort, Splunk, Metasploit, Sysinternals, Wireshark, TCPdump, Nessus, OSSEC HIDS, CISCO Mars SIEM, ArcSight SIEM, NMap, CWSandBox, RAT, Nipper, MD5 Deep, MBSA,
  • 15 years experience data mining using various tools and databases
  • 8 years experience auditing, creating and deleting firewall rules
  • 5 years experience conducting network security assessments and penetration testing

Network Status Toolset:

  • 5 years experience using HP Openview, and Nagios

Reporting Toolset:

  • 15 years experience creating reports and presentations using Microsoft Office, Analyst Notebook, Google Earth, and ArcGIS

PROFESSIONAL SUMMARY

Over 15 years experience in operational Intelligence Analysis, IT Networking, Cyber Security, and Information Assurance-related projects as well as Counter-Terrorism. Tasks ranged from monitoring, analyzing, and evaluating highly specialized communications, exploiting, manipulating, and populating SIGINT databases, to tracking, identifying, and managing identity information. Strong understanding of the OSI model, TCP/IP, and how information/communication systems work

PROFESSIONAL EXPERIENCE

Information Systems Security Engineer

Confidential

  • Conducts verification and validation for security compliance of all information systems, products, and components.
  • Analyzes design specifications, design documentation, configuration practices and procedures, and operational practices and procedures.
  • Provides identification of non-compliance of security requirements and possible mitigation's to requirements that are not in compliance.
  • Hardening Windows Operating Systems to include Server 2003, Server 2008, Server 2012, Windows 7 and Windows XP
  • Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves with differing data protection/classification requirements.
  • Evaluates and assesses compliance with established IA policies and regulations, and advises management on IA trends and solutions.
  • Validates and verifies system security requirements definitions and analysis and establishes system security designs.

Information Systems Security Engineer

  • applications vulnerability assessments and compliance monitoring
  • Performs incident response services up to Tier level V
  • Prepares incident reports of analysis methodology and results.
  • Performed black box penetration testing on hardened Cisco devices
  • Monitor and analyze Intrusion Detection Systems IDS to identify security issues for remediation.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analysis of relevant event detail and summary information.
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Evaluates and assesses compliance with established IA policies and regulations, and advises management on IA trends and solutions.
  • Validates and verifies system security requirements definitions and analysis and establishes system security designs.
  • Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves with differing data protection/classification requirements.
  • Designed and implemented a Secure Research Environment SRE that includes system engineering all components within the enclave to include ESX servers, Windows and Linux based systems.
  • Administered a Windows domain to include setting up the domain, organization units, group policy, maintaining Windows Server Update Service WSUS , maintaining user groups and users as well as permissions.
  • Performed vulnerability management assessments with commercial/government C A tools to system security hardening and performed additional C A activities in support of customer CND Security Operations to ensure customer environment met all security standards levels.
  • Hardening Windows Operating Systems to include Server 2003, Server 2008, Server 2012, Windows 7 and Windows XP
  • Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions.
  • Contributes to the security planning, assessment, risk analysis, and risk management for system and networking operations.

Security Analyst

  • applications vulnerability assessments and compliance monitoring
  • Performs incident response services up to Tier level V
  • Prepares incident reports of analysis methodology and results.
  • Monitor and analyze Intrusion Detection Systems IDS to identify security issues for remediation.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analysis of relevant event detail and summary information.
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Evaluates and assesses compliance with established IA policies and regulations, and advises management on IA trends and solutions.
  • Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of agency security policy and enterprise solutions.

Intelligence Analyst

  • Analysis and reporting necessary to meet customer requirements and training.
  • Scenario development of smuggling activities to support rapid knowledge discovery software, using semantic graphs. These graphs allow an analyst to scale, view and sort large volumes of data, from disparate sources, creating graphical representations that enables target discovery.
  • Researched and analyzed open source and reported data in support to Cyber Security. Helped Create an analytic framework and organizational workflow to support the testing of ICASA's Java Net Discovery which is being incrementally developed to enhance predictive analysis.
  • Responsible for data research, database development, development of various target sets, and coordination with NMT computer scientists conducting the modeling/simulation portion of the project
  • All-Source research, including open-source, for people, places, etc involved in activities related to the project scope
  • Prepared Monthly Status Reports which were delivered to the COR/COTR, that summarized activities and progress for that calendar month
  • Prepared an annual report, which was delivered to the COTR that summarizes activity and progress for that calendar year as well as write ups describing the exercises which were conducted for the model during the year as well as the intelligence value.

Senior SIGINT Multi-Source Support Specialist

  • Perform research using various open source resources, collateral information, databases and specialized tools and other automation tools, independently or in response to specific analyst request.
  • Prepare and perform preliminary edits of assessments to meet both short term and long-term intelligence needs in accordance with existing customer guidance, procedures, formats, and protocols, as established in the customer office, for review and release by customer personnel.
  • Conduct reviews of reporting including quality of reports make recommendations for creative ways to improve training, production, and editorial processes.
  • Prepare and present select briefings on results of research and analysis to customers.
  • Perform long-term analysis of data to resolve Order of Battle information contradictions residing in various community databases
  • Perform content management functions associated with data basing all disseminated product and/or collateral information sources to ensure accountability, retrieve ability and defensibility.
  • Select, review, modify, re-format and re-write assessments to meet suitability needs of specific customer sets in accordance with customer established guidelines.

Information Systems Security Engineer

  • Prepared daily Status Reports which were delivered to POTUS
  • Provide incident detection, analysis, coordination and response auditing systems, database, and applications vulnerability assessments and compliance monitoring
  • Performs incident response services up to Tier level V
  • Prepares incident reports of analysis methodology and results.
  • Performed black box penetration testing on hardened Cisco devices
  • Monitor and analyze Intrusion Detection Systems IDS to identify security issues for remediation.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analysis of relevant event detail and summary information.
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Evaluates and assesses compliance with established IA policies and regulations, and advises management on IA trends and solutions.
  • Validates and verifies system security requirements definitions and analysis and establishes system security designs.
  • Administered a Windows domain to include setting up the domain, organization units, group policy, maintaining Windows Server Update Service WSUS , maintaining user groups and users as well as permissions.
  • Performed vulnerability management assessments with commercial/government C A tools to system security hardening and performed additional C A activities in support of customer CND Security Operations to ensure customer environment met all security standards levels.
  • Hardening Windows Operating Systems to include Server 2003, Server 2008, Server 2012, Windows 7 and Windows XP
  • Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions.
  • Contributes to the security planning, assessment, risk analysis, and risk management for system and networking operations.

Senior Intelligence Analyst

  • Perform research using various open source resources, collateral information, databases and specialized tools and other automation tools, independently or in response to specific analyst request.
  • Prepare and perform preliminary edits of reports to meet both short term and long-term intelligence needs in accordance with existing customer guidance, procedures, formats, and protocols, as established in the customer office, for review and release by customer personnel.
  • Conduct reviews of reporting including quality of reports make recommendations for creative ways to improve training, production, and editorial processes.
  • Prepare and present select briefings on results of research and analysis to SIGINT customers.
  • Perform long-term analysis of data to resolve Order of Battle information contradictions residing in various community databases
  • Perform content management functions associated with data basing all disseminated product and/or collateral information sources to ensure accountability, retrieve ability and defensibility.
  • Select, review, modify, re-format and re-write reports to meet suitability needs of specific customer sets in accordance with customer established guidelines.

Senior SIGINT Analyst

  • Subject matter expert
  • Perform functional area of information research, target development, communication externals and Geographic Information Systems GIS analysis.
  • Created, quality controlled, and disseminated time sensitive Requests for Information RFI's to fulfill deployed forces Priority Intelligence Requirements PIRs in locating, detecting, and/or monitoring enemy Track, identify, and manage identity information on known or suspected targets.
  • Perform in-depth and cross data source analysis on identity targets with the intent to find new identity intelligence.
  • Served as a regional team senior lead analyst with an emphasis on analyzing target specific technology combined Geographic Information System ArcGIS application analysis with SIGINT externals analysis Analyst Notebook to discover and track target communications.
  • Prepare daily briefings.

Senior SIGINT Analyst

  • Subject matter expert
  • Perform functional area of information research, target development, communication externals and Geographic Information Systems GIS analysis.
  • Created, quality controlled, and disseminated time sensitive Requests for Information RFI's to fulfill deployed forces Priority Intelligence Requirements PIRs in locating, detecting, and/or monitoring enemy Track, identify, and manage identity information on known or suspected targets.
  • Perform in-depth and cross data source analysis on identity targets with the intent to find new identity intelligence.
  • Installed terminated multimode and single mode within or exceeding mean parametric data requirements, test and documented results of new fiber optic cabling.
  • Performed network move ads or changes of fiber-optic cables that required plenum and PVC rated to support customer communication needs on classified and unclassified LANS.
  • Prepare daily briefings.
  • Served as a regional team senior lead analyst with an emphasis on analyzing target specific technology combined Geographic Information System ArcGIS application analysis with SIGINT externals analysis Analyst Notebook to discover and track target communications.
  • Performed installation and maintenance of all cable supporting data, phone, and video conferencing equipment for identified customer locations.
  • Terminated cooper cables, coaxial to include single pair, fat wire, CAT5e, CAT6e, RJ11, ST connectors, SC connectors and RG59's to service inside plant audio/video requirements.
  • Coordinated directed and provided full operational support for the installation of equipment cabinets, ductwork, shelving units to accommodate customer security requirements.
  • Provided splicing operations in connections with installation, rearrangement and repair of outside plant facilities that include cable, wire, terminals, loop carrier electronics and light guide facilities which may be underground or buried.
  • Proficient with Optical Time Domain Reflect-o-meter OTDR and FLUKE which are used for testing and troubleshooting data loss in fiber optic cables. Investigate, analyze and apply the best solution possible independently to minimize the customer's interruption of service.
  • Personal contact was primarily with local and wide area networks engineers.
  • Worked with computer operating systems MS Windows to install shared routers, printers and file systems.
  • Read and interpret customer service orders, repair tickets, technical i.e., mechanical, electrical, digital drawings, maps, blueprints, diagrams, etc. and performs specified work including jack installation and wiring
  • Complete designated amount of work in a specified timeframe with a high degree of quality, adjusting work assignments or schedules to meet changing work-related priorities or demands
  • Preformed analysis and troubleshooting technical problems within the network to include switches, routers, servers, and clients.

SIGINT Intelligence Analyst

Lackland AFB

  • Processed, wrote, and disseminated more than 4,000 time-sensitive technical reports
  • Perform functional area of information research, target development, communication externals and Geographic Information Systems GIS analysis.
  • Created, quality controlled, and disseminated time sensitive Requests for Information RFI's to fulfill deployed forces Priority Intelligence Requirements PIRs in locating, detecting, and/or monitoring enemy Track, identify, and manage identity information on known or suspected targets.
  • Perform in-depth and cross data source analysis on identity targets with the intent to find new identity intelligence.
  • Served as a regional team senior lead analyst with an emphasis on analyzing target specific technology combined Geographic Information System ArcGIS application analysis with SIGINT externals analysis Analyst Notebook to discover and track target communications.
  • Prepare daily briefings.

We'd love your feedback!