Cyber Security Vulnerability Management Lead Resume
0/5 (Submit Your Rating)
Washington, DC
SUMMARY
- Technically proficient in cyber security vulnerability analysis and mitigation.
- Enhanced network security and efficiency of vulnerability remediation.
- Scanned, analyzed and remediated vulnerabilities across multiple networks and applications.
- Build, Manage and use Tenable Security Center, and Nessus Scanner.
- Remediate 300,000+ vulnerabilities on network of 3000 assets located in the Confidential .
TECHNICAL SKILLS
- SCCM
- BigFix (Tivoli/IBM End Point Manager)
- WSUS Admin
- Tenable Security Center and Nessus Scanner
- McAfee Suite Admin
- Script and patch management Systems Administrator vmWare Administrator
- Technical Support
- Onsite Support
- Red Hat Enterprise Linux
- On Call Support
- Active Directory and GPO Admin
- Windows Admin
- Former Sergeant (U.S. Marine Corps); 4 years of experience
- Trained and mentored other team members
PROFESSIONAL EXPERIENCE
Confidential, Washington, DC
Cyber Security Vulnerability Management Lead
Responsibilities:
- Implemented the vulnerability management concept as an enterprise solution to mitigating vulnerabilities effectively
- Supervised a Vulnerability Management Team
- Created and modified scripts/ batch files in order to push patches or perform installation on multiple computers
- Trusted Agent for Smart Card and CA Token Deployment
- Assisted with implementation of software patches and remediated for all classified and unclassified computers, switches/routers, printers, video teleconference units (desktop and suite)
- Resolved electronic spillages (classified to unclassified)
- Investigated and resolved information assurance incidents.
- Decreased security vulnerabilities for the command by 158,000 over multiple networks
- Increased compliance on all networks to meet DoD Authority to Connect standards
- Built and implemented Tenable Security Center and Tenable Nessus Scanner five separate networks
- Built and implemented BigFix (Tivoli/IBM End Point Manager) solution on five separate networks
- Responsible for troubleshooting and managing McAfee Suite (Marine Corps Anti - virus solution)
- Performed account auditing for Active Directory to ensure least privileged
- Scanned network for vulnerabilities and remediated accordingly
- Assured compliance for all vulnerabilities
- Helped create a secure Windows 8.1 ISO for future Marine Corps Enterprise Deployment by configuring security settings to best industry practices
Confidential
Server Admin
Responsibilities:
- Monitored network to ensure that all services were available
- Responsible troubleshooting major issues on multiple application servers
- Built and managed servers in VSphere 4.1
- Created Group Policies and implemented least privileged
- Reported server resources and specifications using PowerShell script
- Managed 225 virtual servers across multiple networks using VMware 4.1
- Performed the duties of a Network Operations Officer
- Responsible for troubleshooting application communication and reported findings to application owners
Confidential
Desktop Support Technician/ Supervisor
Responsibilities:
- Provided desk side support for all Marine detachments and commands throughout the national capital region
- Supervised a team of six Helpdesk Technicians, provided leadership, assign and delegate task to each technician
- Coordinated troubleshooting, upgrading, and administration of workstations, printers, servers, and software
- Managed accounts, rights, and access using Active Directory
- Managed trouble tickets via SharePoint, phone calls, and Remedy trouble ticket system
- Implemented a new plan and new policy to push baseline images for every type of computer of the Classified Network to expedite customer service
- Provided priority support to 60 General Officers and SES (Senior Executive Service) level Civilians throughout the National Capital Region
- Lead the implementation of Windows 7 (3,000+ total workstations)
- Rebuilt (change or repaired motherboards, power supplies, computer processing units, graphic cards, network interface cards, random access memory) 750 computers
- Hand configured security compliant baselines
- Trained new team members
- Executed the implementation of CLO (Certificate Log On) SmartCards