We provide IT Staff Augmentation Services!

Technical Director/nsa Red Team Lead Resume

2.00/5 (Submit Your Rating)

Chevy Chase, MD

SUMMARY:

  • Background in Information Technology and Information Security.
  • Possess extensive experience in planning, developing, and implementing security programs, and advanced technical information security solutions.
  • Develop strategic plans for agency - wide implementation to address the operations of client services, product support, quality assurance, and information security training.
  • Technical experience in System and Network Analysis, Intrusion Detection, Malware Analysis, WebSense Web Security & Data Lost Protection (DLP), Barracuda Web Application Firewall (WAF), Netwitness, Silo Breaker, ThreatStream, ProofPoint, zScaler, Akaimai WAF, Forensics, Administration & Maintenance, SIGINT, and consulting in the Government and Commercial sectors.

TECHNICAL SKILLS:

  • Proficient in FIPS-140/199/200;NIST 800-50 /53/115 ; OWASP; Offensive Security, BlackHat, SANS Cutting-Edge Hacking Techniques, SANS Defeating Rogue Access Points, Core Impact Training, SANS System and Network Security Auditor, SANS Web App and Ethical Hacking, Hacker Academy, Network Security & Firewalls, and IT Project Management; Burp Suite, Rational AppScan, NTOSpider, Hailstorm, TripWire (formerly nCircle), WebInspect, Acunetix, ArcSight, AppDetective/DBProtect, Nikto, NetStumbler, Kismet, Samurai, Paros, w3af, Burp Suite, Webscarab, Oracle Audit Tools; Core Impact, Nessus, Qualys, Internet Security Scanner, NMAP, Superscan, TeleSweep, L0phtCrack, Cain, John the Ripper, Sam Spade, Fiddler, BRO, Snort, Splunk, PWDump3, BackTrack5, Kali, Wireshark, Windump, Maltego Carbon and Metasploit; C, .NET, Java, Perl, and UNIX Shell Script.

EXPERIENCE:

Technical Director/NSA Red Team Lead

Confidential, Chevy Chase, MD

Responsibilities:

  • Overall Technical Oversight and advisor to Leadership Team
  • Share technical knowledge and mission experience with others. Provide informal and formal mentoring.
  • Recruit, develop, train, and help retain a diverse, high quality work force. Provide technical leadership that helps create an inclusive workplace.
  • Perform vulnerability assessment and Penetration Testing on Networks and Applications.
  • Manage, lead and perform penetration testing across for Government, Financial Banks and Critical Infrastructure.
  • Expert level understanding of OWASP and other software security best practices.
  • Advance level experience with MetaSploit.
  • Led team of cyber analysts to characterize and attribute advanced persistent threats (APT); De-conflicted resources, coordinated partner support, and prioritized customer requirements
  • Evaluate target opportunities and strategize activities against particular networks. Use all source data to understand and map target networks.
  • Experience with application layer assessment tools, such as local proxies and fuzzers.
  • Understanding of SDLC consultancy related to web application vulnerabilities.
  • Producing intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of customer, community, and open source reporting.
  • Malware forensics team lead; Led high-visibility projects to perform static and dynamic malware analysis and develop signatures for in-house Intrusion Detection System (IDS)
  • Malware forensics team lead; Led high-visibility projects to perform static and dynamic malware analysis and develop signatures for in-house Intrusion Detection System (IDS).
  • Performed basic Windows kernel debugging to discover and analyze rootkits on infected systems
  • Translated CNO results into actionable intelligence reporting.
  • Applied forensic and network protocol analysis to discover and track active intrusions in secured networks.
  • Uncovered vulnerabilities to enable and conduct network exploitation operations.

Senior IT Security Engineer/Team Lead

Confidential, Lanham, MD

Responsibilities:

  • Supported IRS systems and applications to include: Operations, Disaster Recovery and Business
  • Conducted operating system, application, and database vulnerability assessments (to include system configuration checks) on various Information Systems.
  • Briefed management on current vulnerabilities and provide countermeasure recommendations.
  • Conducted security testing, analyze test results, document risk, and recommend countermeasures.
  • Authored information security notifications based on vulnerabilities applicable to the environment and track compliance for notifications requiring corrective action.
  • Performs the planning, design, management, execution and reporting of penetration tests, using appropriate testing tools and techniques and conforming to agreed process standards and industry specific regulations.
  • Uses and maintains testware (test cases, test scripts, test reports, test plans, etc.) to measure and improve the security of the software being tested.

Senior IT Security Engineer/Team Lead

Confidential, Washington, DC

Responsibilities:

  • Member of the Information Security Services (ISS) Team leading and providing Information Security and IT Audit support to the Federal Government and Commercial entities throughout the United States.
  • Traveled to over 20 sites and audited over 20,000 information systems, conducting security control assessments, and exploiting over 400 of those systems.
  • Led and performed Infrastructure and Application Vulnerability Assessments, Penetration Testing, C&A, Policy Review, DR/BCP, Risk Assessments, Ethical Penetration Testing, Wireless Reviews, IT General Controls, Applications and Security Controls testing in support of FISMA and FISCAM audits.

IT Security Engineer/Application Development Support

Confidential, Washington, DC

Responsibilities:

  • Developed, and executed application security.
  • Oversaw of Configuration Management and Change Control functions pertaining to software development projects.
  • Performed gap analysis, collect, create, and maintain system security documentation.
  • Related and incorporated Federal and USAC related regulations and guidance into all layers of USAC infrastructure.
  • Researched and recommended appropriate application security technology and/or processes.
  • Performed Forensics investigation as needed using various Freeware and commercial tools.

Data Security / Data Administrator

Confidential, Dearborn, MI

Responsibilities:

  • Built applications for claim submissions and implemented security controls to detect fraudulent claims.
  • Investigate suspicious events by looking at the payloads, web site source code, http and email headers.
  • Set up dual stack IPv4/IPv6 lab to test new IDS/IPS systems for IPv6 compatibilities and new signatures.
  • Reviewed database logs to detect internal or external security breaches from unauthorized users.
  • Recommended countermeasures and remediation techniques to eliminate vulnerabilities.

Security Analyst

Confidential

Responsibilities:

  • Responsible for onsite security assessments and final security certifications of an application or infrastructure project.
  • Performed Risk assessment, Vulnerability assessments and Penetration testing on financial applications and servers using various security tools on both Linux and Windows platform
  • Recommended countermeasures and remediation techniques to eliminate vulnerabilities

Project Manager/LINUX/UNIX Administrator/Security Analyst

Confidential

Responsibilities:

  • Supervised a LINUX/ UNIX helpdesk technical team of 25 (5-7 per rotational week) and ensured trouble tickets are handled in accordance to Service Level Agreement (SLA).
  • Monitored system security logs to detect unauthorized activities.
  • Scanned systems on a weekly basis for possible security weaknesses using Nessus, NMAP and ISS
  • Performed manual audits on system using an Audit Program Guide created from NSA Unix/Linux secure baseline.
  • Recommended countermeasures and remediation techniques to eliminate vulnerabilities.
  • Executed Six Sigma processes to identify the top ten incidents by analyzing and binning over 4,000 incident tickets. The results of this project reduced trouble tickets by 45%.
  • Resolved over 10,000 file system problems in the UNIX server environment as identified by SCT for Sarbanes-Oxley 404 related servers.
  • Developed Perl Applications (tools) and assisted in a documentation standardization effort.
  • Supported LINUX/Unix OS and the various tasks and services related to server infrastructure support.
  • Provided third level contact support for server infrastructure support services which requires vendor interaction and research.
  • Researched and provided operational solutions and direction for projects using a variety of technologies and methodologies.

Network Security Engineer /Systems Analyst

Confidential

Responsibilities:

  • Performed proactive and reactive (1st and 2nd level) LAN problem analysis and troubleshooting.
  • Reviewed Routers configurations files both manually and automated using a tool called Router Audit Tool.
  • Recommended countermeasures and remediation techniques to eliminate vulnerabilities
  • Assisted Networking Support partner (as 2nd /3rd level support) with WAN problem analysis and trouble-shooting.

We'd love your feedback!