Resume Writing ?

The Following Text Is An Unformatted Professional Resume Sample

From The Writers At The Resume Writing Group, Inc.

This Resume Has Not Been Formatted


ORDER YOUR OWN LETTER-PERFECT, JOB-WINNING RESUME AND IT WILL BE COMPLETED AS SOON AS YOU NEED!
Click HERE!



Yyyyyy x. yyyyyy

0000 xxxxxx xxxx , xxxx , xxxxx 00000 xxx-xxx-xxxx ~ abc@xyz.com

 

 

Experienced Cybersecurity professional with wide-ranging expertise and in-depth IT support and involvement, seeking a challenging Information Technology assignment

 

Core Competencies

 

 

Privacy Compliance ~ Technical Analysis ~ Cybersecurity Vulnerability Management ~ IT Auditing ~ Analysis ~ Staff Training/Supervision ~ Security Policy/Procedure Development ~ Technical Risk/Compliance Management ~ IT Infrastructure Design ~ System Testing ~ Website Administration ~ Network Threat Analysis

Technology:

SIPR/NIPR ~ Windows Server ~ AIX ~ Linux + ~ Backtrack/Kali ~ Microsoft Baseline Security Analyzer (MBSA) ~ DumpSEC/Hyena ~ Retina ~ Metasploit ~ NESSUS ~ Acunetix Web Analyzer ~ Security + ~ MS Office ~ Red Hat ~ Knoppix ~ Symantic Veritas 9, 10, 11, 12.5 ~ Forensic Tool Kit ~ EnCase ~ Helix ~ Nuix ~ MS Money ~ Quicken

 

 

Profile of Qualifications

 

  Long-term career built in performing broad array of Information Technology design and operational assignments; oversee business processes, deliver support technologies, provide technical support, perform data analysis, author user policies, configure computer hardware and utilize MS Cloud services

  Exceptionally knowledgeable in all aspects of providing technical advisement for security systems, new-build as well as established, and in technology pilot program design and development; continually contribute outstanding support and service toward optimizing client IT infrastructure

  Highly skilled in assessing client vulnerabilities/risks and providing crucial advisement toward mitigating/remediating issues and problems; problem resolution actions often result in recouping high dollar amounts

  Acknowledgement of subject matter expertise resulted in selection to provide operational Information Assurance (IA) and Computer Network Defense (CND) training for law enforcement; also serve as forensic authority providing best practices/guidance regarding digital forensics and computer crime investigations across multiple operating systems

  Notable capacity for monitoring auditing/logging procedures, network enumeration and information environment mapping; skilled in analyzing active directory, routing protocols, vulnerability scanners and networks

  Top Secret Clearance / Public Moderate Trust Clearance

Professional Synopsis

 

Utility Team Member, United States Navy, Judge Advocate General Office (OJAG) 2015 Present

         Effectively developed international business process to gain NIPR/SIPR access utilizing Public Key Infrastructure (PKI) protocol; created Trusted Agents Positions for SIPR Token issue, business process for Data Transfer Agents (DTA) SIPR classified system, and international business process for IT Assets Inventory process/tracking system that increased accountability enterprise-wide.

         Identify customer challenges/requirements and recommend/deliver/support aligned services/technologies; also continually support engineering environment, leverage data analysis to develop responses to complex technological issues, and design/implement international business process stand-alone computer software patching programs.

         Expertly authored international cybersecurity JAG and Naval Legal Service Commands (NLSC) Users Policy; serve as Associate Member Inspector General Article 6 Inspector JAG and NLSC Worldwide.

         Successfully configured hardware requirements for prosecution of national security case at Naval Station Norfolk, Virginia; was responsible for developing/implementing courtroom enhanced technology pilot project that utilized Surface Hubs, Surface Pro and Books using W-10 Secure Host Base (SHB) operating systems.

         Designed Naval Justice School initial pilot project utilizing MS 365 Cloud service s Bring Your Own Device (BYOD) program; also served as technical advisor for new courtroom construction and security systems in Bahrain, Norfolk, Virginia, Pensacola, Florida, and Sasebo, Japan.

Professional Synopsis Continued on Page Two


 

Yyyyyy x. yyyyyy Page Two

 

Information Security Consultant/Instructor, The Office of Anti-Terrorism Assistance Program Cyber Training, Department of State, Washington, D.C. 2014 - 2015

         Directed Network Solutions/Vulnerability Training for Nassau Police Department and designed proposed Statements of Work (SOWs) for clients concerning developing Information Security/IT Auditing professional services; also assisted Principal Consultant in developing Information Security risk assessments and vulnerability testing deliverables.

         Reported directly to unit CIO regarding consulting on and improving information security/privacy risk/compliance management for Police Department IT Operations; provided training to ensure compliance and reduce security risks, which included training on Information Assurance (IA) and Computer Network Defense (CND) for organizations within Police Department.

         Additionally, conducted technical risk assessments/network vulnerability identification in support of an integrated government/contractor security engineering team that included intranet/perimeter security systems; was coordinator of various aspects of server operating system builds/upgrades/software configurations, including security, for major imagery applications.

 

Information Security Associate Consultant, Ken Cutler & Associates, LLC (KCA) 2013 - 2015

         Knowledgeably designed proposed Information Security and IT auditing Statements of Work (SOWs) for client base; skillfully assisted in cybersecurity risk assessments/network discovery/vulnerability testing, provided on-site intranet/remote Internet testing utilizing multiple vulnerability testing tools including Nmap, NESSUS, AirMagnet Laptop Analyzer, Aircrack-ng, Metasploit, Nikto, WPScan, OWASP ZAP and HP WebInspect and Acunetix Web Security Scanner; also used Metasploit and multiple hacker scripts to conduct follow-up penetration exercises.

         Collaborated with organizational management to analyze testing results and develop report for clients.

 

Cyber Intelligence Analyst, Charles County Sheriff s Office, La Plata, MD 2013 - 2015

         Provided exceptional in-depth support for Internet/network technologies/designs, protocols and computer audit tools/techniques utilized by organization; was considered forensic authority providing guidance on digital forensic and computer crime investigations, with responsibilities for monitoring auditing/logging procedures, network enumeration and information environment mapping, and analyzing active directory, routing protocols, vulnerability scanners and network communication protocols.

         Held multiple responsibilities for other relevant services including Information Security (INFOSEC), Project Management, Performing Complex Analytical Investigative Support, Strategic Communications, Conducting/Coordinating Criminal, Civil and Administrative Investigations, Identifying Intelligence Resource Gaps, Providing Expert High Level of Technical and Analytical Expertise, Maintaining In-Depth Knowledge of Criminal Groups, Creating/Designing Databases, Interpreting Policy and Regulations, and Building/Maintaining Collaborative Working Relationships as well as demonstrating highest levels of professionalism, organizational abilities and diplomacy.

 

From 1988-2011, served as a Police Officer for the Metropolitan Police Department Washington, Bolling AFB, DC; in this assignments successfully served as an Investigator, conducted research, compiled information, served as a First Responder, advised organizational leadership on multiple issues, provided technical expertise and knowledge of legal matters, continually employed multiple software packages/databases, skillfully interfaced with multiple entities under an array of circumstances and develop/maintained strong, supportive working relationships

 

Training / Certifications

 

ISO / ISMS Lead

ISO 2701 Information Security Management Systems (ISMS)

 

Federal Law Enforcement Training Center (FLETC) and FBI Academy Training:

Seized Computer Evidence Recovery Specialist (SCERS)

Forensic Toolkit (FTK)

Password Recovery Toolkit (PRTK)

EnCase, Helix

Digital Evidence Acquisition Training

 

Implementer 27001-5 Certified

Qualified Wireless Professional

Security Analyst Penetration Tester Qualified

Digital Evidence Acquisition Certified

Qualified Ethical Hacker Certification (QEH)

Network Defender Qualified

<< Previous           Back to Sitemap           Next >>

Remember: Hire Us To Write YOUR New Resume
And We GUARANTEE That If You’re Not Working In 60 Days Or Less,
We’ll Revise Your Resume, Refund Your Money,
AND Give You $50 EXTRA!

Click HERE!

Members Of The Following Resume Writing Associations:


BBB Rating : A+


Proud Sponsors Of:
 

 


 

For General Customer Service, Call Us Toll Free At 1-800-466-3076 Or Email Our Writers By Clicking HERE

 Resume Writing Group © 2005-.   All graphics & text on ResumeWritingGroup.Com are either owned or licensed by our company and may
not be reproduced without expressed, written consent.  Terms of service and rules for guarantees may be reviewed here...
*our resume writing Guarantee requires clients to save receipts as proof that they've submitted COPIES OF their NEW resume to a minimum of 40 employers USING OUR ADVICE.   REFUNDS ARE LIMITED TO RESUMES AND DO NOT INCLUDE ADDITIONAL SERVICES SUCH AS COVER LETTERS.REFUNDS CAN BE CLAIMED UP TO 90 DAYS AFTER PURCHASE.