This Resume Has Not Been Formatted
CMR 0000 xxxxxx xxxx , xxxx , xxxxx 00000 xxx-xxx-xxxx ● email@example.com
Vulnerability Management & Analysis ~ Incident Response
Network Engineering ~ Cisco Technologies ~ Linux Administration
- Possess numerous industry credentials, and substantial experience in network security including threat and vulnerability analysis, intrusion detection and prevention, IT infrastructure controls, and risk management.
- Proficiency in meticulously monitoring logs for suspicious activity across servers, workstations, firewalls, intrusion detection systems, and anti-virus/malware programs.
- Highly skilled in applying disaster recovery strategies and contingency plans to defend and preserve business-critical and extremely sensitive information.
Consummate strengths in devising efforts to bridge the gap between control requirements, technical issues, and business or operational risks.
Adept at handling all aspects of system and network administration including installation and maintenance of security software, instructing users, and diligently ensuring networks remain free of breaches.
Excellent knowledge in leveraging cutting-edge cybersecurity tools to maximize discovery, remediation, and alerting of network and device vulnerabilities to fortify security posture.
Cybersecurity, EUCOM (contracted by CSRA), Stuttgart, Germany, 2012 to Present
Senior Cybersecurity Analyst
Independently serve as subject matter expert (SME) for vulnerability assessment to EUCOM command and for McAfee ePolicy Orchestrator/HBSS on four separate networks.
Methodically replaced eEye Retina for vulnerability scanning with new DISA-mandated Assured Compliance Assessment Solution (ACAS) to enhance detection and mitigation of network threats.
Assessed and expertly configured ACAS to perform automated STIG (Security Technical Implementation Guide) checks across multiple operating systems and applications.
As HBSS (Host Based Security System)/McAfee ePolicy Orchestrator administrator & analyst, strategically ensured stringent ACAS and HBSS compliance within Amazon Web Service (AWS).
Established six ACAS Tenable Nessus SecurityCenters and associated scanners following completion of 40 hours of training in Tenable Nessus SecurityCenter,
Generated custom ACAS dashboards and reports to illustrate and present real-time network security posture to senior management team.
Security Operations Center, EUCOM (contracted by SRA), Stuttgart, Germany, 2009 to 2012
Senior Cybersecurity Analyst
Appointed as McAfee ePolicy Orchestrator administrator following 140+ hours of specialized training.
Proficiently managed 9,000+ McAfee agents on classified and unclassified networks for both EUCOM and AFRICOM commands.
Decisively deployed components of HBSS such as HIPS, PA, RSD, AV, DCM, DLP, and host-based firewall.
Participated in Austere Challenge 2010 and 2011, a large-scale defense exercise requiring first-rate expertise in network analysis and HBSS signature support.
Contributed extensively to vulnerability assessments and inspections required by DISA for network accreditations.
Yyyyyy x. yyyyyy Page 2 of 2
IDEA Facility, Lackland AFB (contracted by CSC), San Antonio, TX, 2006 to 2009
As senior member of Intrusion Detection Exploration & Analysis (IDEA) Facility for Air Force Information Warfare Center, performed comprehensive testing of multiple network and host-based security products.
Prepared detailed white paper reports on network threats to plan, determine, and directly influence Air Force network security configurations.
Independently researched and designed network monitoring and management system of multi-platform network devices using Zenoss.
Wrote custom Perl scripts to automate assessments of network devices and to eliminate human error in common administrative tasks.
Constructed Linux distribution software repository to maintain up-to-date systems in lab.
Implemented VMware ESXi Hypervisor and network exfiltration systems such as Fidelis XPS and Vontu.
Championed planning, assessment, and reporting on Air Force s Standard Desktop Configuration.
AFCERT, Lackland AFB (contracted by CSC), San Antonio, TX, 2003 to 2006
Governed classified & unclassified network infrastructure security devices for US Military on a global scale.
Configured network security architecture remotely via Cisco Secure Intrusion Detection System (CSIDS).
Expedited and streamlined repetitive administrative UNIX server tasks by developing scripts in Perl.
Partnered with security analysts to maintain VPN Management Security Solution Director and closely monitored remote IDS sensors for reliable reporting of network intrusion attempts.
Resourcefully devised programs for real-time monitoring of router and sensor network availability.
Administered Cisco routers on classified and unclassified U.S. Central Command networks worldwide.
Enforced rigorous compliance with network security policies mandated by U.S. Central Command via Cisco router ACLs (access control lists).
AFCERT, Lackland AFB, (contracted by Adtech Systems Inc.), San Antonio, TX, 2002
Systematically defended Air Force networks against threats in real-time by leveraging exceptional talents in batch analysis, trend analysis, threat verification, reporting, and operation of automated sensor equipment.
Rackspace, San Antonio, TX, 2000 to 2002
Provided 24/7 technical support for over 3,500 Linux, FreeBSD, Solaris, and Windows NT servers.
System Administrator, United States Air Force Reserve, Lackland AFB, TX, 2000 to 2002
Desktop Support Specialist, United States Air Force, Brooks AFB, TX, 1996 to 2000
MS in Cybersecurity, University of Maryland University College
BS in Computer Science, Park University, Parkville, Missouri - graduated cum laude
Certified Information Systems Security Professional (CISSP)
Certified Ethical Hacker (CEH)
Microsoft Certified Professional (MCP)
Tripwire Certified Professional
Remember: Hire Us To Write YOUR New Resume
And We GUARANTEE That If You’re Not Working In 60 Days Or Less,
We’ll Revise Your Resume, Refund Your Money,
AND Give You $50 EXTRA!