Technical Director/nsa Red Team Lead Resume
2.00/5 (Submit Your Rating)
Chevy Chase, MD
SUMMARY:
- Background in Information Technology and Information Security.
- Possess extensive experience in planning, developing, and implementing security programs, and advanced technical information security solutions.
- Develop strategic plans for agency - wide implementation to address the operations of client services, product support, quality assurance, and information security training.
- Technical experience in System and Network Analysis, Intrusion Detection, Malware Analysis, WebSense Web Security & Data Lost Protection (DLP), Barracuda Web Application Firewall (WAF), Netwitness, Silo Breaker, ThreatStream, ProofPoint, zScaler, Akaimai WAF, Forensics, Administration & Maintenance, SIGINT, and consulting in the Government and Commercial sectors.
TECHNICAL SKILLS:
- Proficient in FIPS-140/199/200;NIST 800-50 /53/115 ; OWASP; Offensive Security, BlackHat, SANS Cutting-Edge Hacking Techniques, SANS Defeating Rogue Access Points, Core Impact Training, SANS System and Network Security Auditor, SANS Web App and Ethical Hacking, Hacker Academy, Network Security & Firewalls, and IT Project Management; Burp Suite, Rational AppScan, NTOSpider, Hailstorm, TripWire (formerly nCircle), WebInspect, Acunetix, ArcSight, AppDetective/DBProtect, Nikto, NetStumbler, Kismet, Samurai, Paros, w3af, Burp Suite, Webscarab, Oracle Audit Tools; Core Impact, Nessus, Qualys, Internet Security Scanner, NMAP, Superscan, TeleSweep, L0phtCrack, Cain, John the Ripper, Sam Spade, Fiddler, BRO, Snort, Splunk, PWDump3, BackTrack5, Kali, Wireshark, Windump, Maltego Carbon and Metasploit; C, .NET, Java, Perl, and UNIX Shell Script.
EXPERIENCE:
Technical Director/NSA Red Team Lead
Confidential, Chevy Chase, MD
Responsibilities:
- Overall Technical Oversight and advisor to Leadership Team
- Share technical knowledge and mission experience with others. Provide informal and formal mentoring.
- Recruit, develop, train, and help retain a diverse, high quality work force. Provide technical leadership that helps create an inclusive workplace.
- Perform vulnerability assessment and Penetration Testing on Networks and Applications.
- Manage, lead and perform penetration testing across for Government, Financial Banks and Critical Infrastructure.
- Expert level understanding of OWASP and other software security best practices.
- Advance level experience with MetaSploit.
- Led team of cyber analysts to characterize and attribute advanced persistent threats (APT); De-conflicted resources, coordinated partner support, and prioritized customer requirements
- Evaluate target opportunities and strategize activities against particular networks. Use all source data to understand and map target networks.
- Experience with application layer assessment tools, such as local proxies and fuzzers.
- Understanding of SDLC consultancy related to web application vulnerabilities.
- Producing intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of customer, community, and open source reporting.
- Malware forensics team lead; Led high-visibility projects to perform static and dynamic malware analysis and develop signatures for in-house Intrusion Detection System (IDS)
- Malware forensics team lead; Led high-visibility projects to perform static and dynamic malware analysis and develop signatures for in-house Intrusion Detection System (IDS).
- Performed basic Windows kernel debugging to discover and analyze rootkits on infected systems
- Translated CNO results into actionable intelligence reporting.
- Applied forensic and network protocol analysis to discover and track active intrusions in secured networks.
- Uncovered vulnerabilities to enable and conduct network exploitation operations.
Senior IT Security Engineer/Team Lead
Confidential, Lanham, MD
Responsibilities:
- Supported IRS systems and applications to include: Operations, Disaster Recovery and Business
- Conducted operating system, application, and database vulnerability assessments (to include system configuration checks) on various Information Systems.
- Briefed management on current vulnerabilities and provide countermeasure recommendations.
- Conducted security testing, analyze test results, document risk, and recommend countermeasures.
- Authored information security notifications based on vulnerabilities applicable to the environment and track compliance for notifications requiring corrective action.
- Performs the planning, design, management, execution and reporting of penetration tests, using appropriate testing tools and techniques and conforming to agreed process standards and industry specific regulations.
- Uses and maintains testware (test cases, test scripts, test reports, test plans, etc.) to measure and improve the security of the software being tested.
Senior IT Security Engineer/Team Lead
Confidential, Washington, DC
Responsibilities:
- Member of the Information Security Services (ISS) Team leading and providing Information Security and IT Audit support to the Federal Government and Commercial entities throughout the United States.
- Traveled to over 20 sites and audited over 20,000 information systems, conducting security control assessments, and exploiting over 400 of those systems.
- Led and performed Infrastructure and Application Vulnerability Assessments, Penetration Testing, C&A, Policy Review, DR/BCP, Risk Assessments, Ethical Penetration Testing, Wireless Reviews, IT General Controls, Applications and Security Controls testing in support of FISMA and FISCAM audits.
IT Security Engineer/Application Development Support
Confidential, Washington, DC
Responsibilities:
- Developed, and executed application security.
- Oversaw of Configuration Management and Change Control functions pertaining to software development projects.
- Performed gap analysis, collect, create, and maintain system security documentation.
- Related and incorporated Federal and USAC related regulations and guidance into all layers of USAC infrastructure.
- Researched and recommended appropriate application security technology and/or processes.
- Performed Forensics investigation as needed using various Freeware and commercial tools.
Data Security / Data Administrator
Confidential, Dearborn, MI
Responsibilities:
- Built applications for claim submissions and implemented security controls to detect fraudulent claims.
- Investigate suspicious events by looking at the payloads, web site source code, http and email headers.
- Set up dual stack IPv4/IPv6 lab to test new IDS/IPS systems for IPv6 compatibilities and new signatures.
- Reviewed database logs to detect internal or external security breaches from unauthorized users.
- Recommended countermeasures and remediation techniques to eliminate vulnerabilities.
Security Analyst
Confidential
Responsibilities:
- Responsible for onsite security assessments and final security certifications of an application or infrastructure project.
- Performed Risk assessment, Vulnerability assessments and Penetration testing on financial applications and servers using various security tools on both Linux and Windows platform
- Recommended countermeasures and remediation techniques to eliminate vulnerabilities
Project Manager/LINUX/UNIX Administrator/Security Analyst
Confidential
Responsibilities:
- Supervised a LINUX/ UNIX helpdesk technical team of 25 (5-7 per rotational week) and ensured trouble tickets are handled in accordance to Service Level Agreement (SLA).
- Monitored system security logs to detect unauthorized activities.
- Scanned systems on a weekly basis for possible security weaknesses using Nessus, NMAP and ISS
- Performed manual audits on system using an Audit Program Guide created from NSA Unix/Linux secure baseline.
- Recommended countermeasures and remediation techniques to eliminate vulnerabilities.
- Executed Six Sigma processes to identify the top ten incidents by analyzing and binning over 4,000 incident tickets. The results of this project reduced trouble tickets by 45%.
- Resolved over 10,000 file system problems in the UNIX server environment as identified by SCT for Sarbanes-Oxley 404 related servers.
- Developed Perl Applications (tools) and assisted in a documentation standardization effort.
- Supported LINUX/Unix OS and the various tasks and services related to server infrastructure support.
- Provided third level contact support for server infrastructure support services which requires vendor interaction and research.
- Researched and provided operational solutions and direction for projects using a variety of technologies and methodologies.
Network Security Engineer /Systems Analyst
Confidential
Responsibilities:
- Performed proactive and reactive (1st and 2nd level) LAN problem analysis and troubleshooting.
- Reviewed Routers configurations files both manually and automated using a tool called Router Audit Tool.
- Recommended countermeasures and remediation techniques to eliminate vulnerabilities
- Assisted Networking Support partner (as 2nd /3rd level support) with WAN problem analysis and trouble-shooting.