Resume Writing ?
The Following Text Is An Unformatted Professional Resume Sample
From The Writers At The Resume Writing Group, Inc.
This Resume Has Not Been Formatted
ORDER YOUR OWN LETTER-PERFECT, JOB-WINNING RESUME AND IT WILL BE COMPLETED AS SOON AS YOU NEED!
Click HERE!
Yyyyyy x. yyyyyy
0000 xxxxxx xxxx , xxxx , xxxxx 00000 xxx-xxx-xxxx ~ abc@xyz.com
Experienced Cybersecurity professional with wide-ranging expertise and in-depth IT support and involvement, seeking a challenging Information Technology assignment
Core Competencies
Privacy Compliance ~ Technical Analysis ~ Cybersecurity Vulnerability Management ~ IT Auditing ~ Analysis ~ Staff Training/Supervision ~ Security Policy/Procedure Development ~ Technical Risk/Compliance Management ~ IT Infrastructure Design ~ System Testing ~ Website Administration ~ Network Threat Analysis
Technology:
SIPR/NIPR ~ Windows Server ~ AIX ~ Linux + ~ Backtrack/Kali ~ Microsoft Baseline Security Analyzer (MBSA) ~ DumpSEC/Hyena ~ Retina ~ Metasploit ~ NESSUS ~ Acunetix Web Analyzer ~ Security + ~ MS Office ~ Red Hat ~ Knoppix ~ Symantic Veritas 9, 10, 11, 12.5 ~ Forensic Tool Kit ~ EnCase ~ Helix ~ Nuix ~ MS Money ~ Quicken
Profile of Qualifications
Long-term career built in performing broad array of Information Technology design and operational assignments; oversee business processes, deliver support technologies, provide technical support, perform data analysis, author user policies, configure computer hardware and utilize MS Cloud services
Exceptionally knowledgeable in all aspects of providing technical advisement for security systems, new-build as well as established, and in technology pilot program design and development; continually contribute outstanding support and service toward optimizing client IT infrastructure
Highly skilled in assessing client vulnerabilities/risks and providing crucial advisement toward mitigating/remediating issues and problems; problem resolution actions often result in recouping high dollar amounts
Acknowledgement of subject matter expertise resulted in selection to provide operational Information Assurance (IA) and Computer Network Defense (CND) training for law enforcement; also serve as forensic authority providing best practices/guidance regarding digital forensics and computer crime investigations across multiple operating systems
Notable capacity for monitoring auditing/logging procedures, network enumeration and information environment mapping; skilled in analyzing active directory, routing protocols, vulnerability scanners and networks
Top Secret Clearance / Public Moderate Trust Clearance
Professional Synopsis
Utility Team Member, United States Navy, Judge Advocate General Office (OJAG) 2015 Present
Effectively developed international business process to gain NIPR/SIPR access utilizing Public Key Infrastructure (PKI) protocol; created Trusted Agents Positions for SIPR Token issue, business process for Data Transfer Agents (DTA) SIPR classified system, and international business process for IT Assets Inventory process/tracking system that increased accountability enterprise-wide.
Identify customer challenges/requirements and recommend/deliver/support aligned services/technologies; also continually support engineering environment, leverage data analysis to develop responses to complex technological issues, and design/implement international business process stand-alone computer software patching programs.
Expertly authored international cybersecurity JAG and Naval Legal Service Commands (NLSC) Users Policy; serve as Associate Member Inspector General Article 6 Inspector JAG and NLSC Worldwide.
Successfully configured hardware requirements for prosecution of national security case at Naval Station Norfolk, Virginia; was responsible for developing/implementing courtroom enhanced technology pilot project that utilized Surface Hubs, Surface Pro and Books using W-10 Secure Host Base (SHB) operating systems.
Designed Naval Justice School initial pilot project utilizing MS 365 Cloud service s Bring Your Own Device (BYOD) program; also served as technical advisor for new courtroom construction and security systems in Bahrain, Norfolk, Virginia, Pensacola, Florida, and Sasebo, Japan.
Professional Synopsis Continued on Page Two
Yyyyyy x. yyyyyy Page Two
Information Security Consultant/Instructor, The Office of Anti-Terrorism Assistance Program Cyber Training, Department of State, Washington, D.C. 2014 - 2015
Directed Network Solutions/Vulnerability Training for Nassau Police Department and designed proposed Statements of Work (SOWs) for clients concerning developing Information Security/IT Auditing professional services; also assisted Principal Consultant in developing Information Security risk assessments and vulnerability testing deliverables.
Reported directly to unit CIO regarding consulting on and improving information security/privacy risk/compliance management for Police Department IT Operations; provided training to ensure compliance and reduce security risks, which included training on Information Assurance (IA) and Computer Network Defense (CND) for organizations within Police Department.
Additionally, conducted technical risk assessments/network vulnerability identification in support of an integrated government/contractor security engineering team that included intranet/perimeter security systems; was coordinator of various aspects of server operating system builds/upgrades/software configurations, including security, for major imagery applications.
Information Security Associate Consultant, Ken Cutler & Associates, LLC (KCA) 2013 - 2015
Knowledgeably designed proposed Information Security and IT auditing Statements of Work (SOWs) for client base; skillfully assisted in cybersecurity risk assessments/network discovery/vulnerability testing, provided on-site intranet/remote Internet testing utilizing multiple vulnerability testing tools including Nmap, NESSUS, AirMagnet Laptop Analyzer, Aircrack-ng, Metasploit, Nikto, WPScan, OWASP ZAP and HP WebInspect and Acunetix Web Security Scanner; also used Metasploit and multiple hacker scripts to conduct follow-up penetration exercises.
Collaborated with organizational management to analyze testing results and develop report for clients.
Cyber Intelligence Analyst, Charles County Sheriff s Office, La Plata, MD 2013 - 2015
Provided exceptional in-depth support for Internet/network technologies/designs, protocols and computer audit tools/techniques utilized by organization; was considered forensic authority providing guidance on digital forensic and computer crime investigations, with responsibilities for monitoring auditing/logging procedures, network enumeration and information environment mapping, and analyzing active directory, routing protocols, vulnerability scanners and network communication protocols.
Held multiple responsibilities for other relevant services including Information Security (INFOSEC), Project Management, Performing Complex Analytical Investigative Support, Strategic Communications, Conducting/Coordinating Criminal, Civil and Administrative Investigations, Identifying Intelligence Resource Gaps, Providing Expert High Level of Technical and Analytical Expertise, Maintaining In-Depth Knowledge of Criminal Groups, Creating/Designing Databases, Interpreting Policy and Regulations, and Building/Maintaining Collaborative Working Relationships as well as demonstrating highest levels of professionalism, organizational abilities and diplomacy.
From 1988-2011, served as a Police Officer for the Metropolitan Police Department Washington, Bolling AFB, DC; in this assignments successfully served as an Investigator, conducted research, compiled information, served as a First Responder, advised organizational leadership on multiple issues, provided technical expertise and knowledge of legal matters, continually employed multiple software packages/databases, skillfully interfaced with multiple entities under an array of circumstances and develop/maintained strong, supportive working relationships
Training / Certifications
ISO / ISMS Lead
ISO 2701 Information Security Management Systems (ISMS)
Federal Law Enforcement Training Center (FLETC) and FBI Academy Training:
Seized Computer Evidence Recovery Specialist (SCERS)
Forensic Toolkit (FTK)
Password Recovery Toolkit (PRTK)
EnCase, Helix
Digital Evidence Acquisition Training
Implementer 27001-5 Certified
Qualified Wireless Professional
Security Analyst Penetration Tester Qualified
Digital Evidence Acquisition Certified
Qualified Ethical Hacker Certification (QEH)
Network Defender Qualified
<< Previous Back to Sitemap Next >>
Remember: Hire Us To Write YOUR New Resume
And We GUARANTEE That If You’re Not Working In 60 Days Or Less,
We’ll Revise Your Resume, Refund Your Money,
AND Give You $50 EXTRA!