Quantcast

Cyber Security Customer Service Resume A...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Cyber Security Customer Service
Target Location US-VA-Annandale
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Cyber Security Customer Service Centreville, VA

Cyber Security Customer Service Waldorf, MD

Security Engineer Cyber Leesburg, VA

Cyber Security Risk Analyst Broad Run, VA

Cyber Security Information Systems Sterling, VA

Information Systems Cyber Security Baltimore, MD

Cyber Security Analyst Washington, DC

Click here or scroll down to respond to this candidate
Candidate's Name
Street Address
Phone PHONE NUMBER AVAILABLEE-mail: EMAIL AVAILABLEActive DoD Security Clearance-Top Secret w/CI PolyITIL V3- F, CEH & Sec+ CertifiedProfessional SummaryExpertise in managing, supervising, and training personnel in the planning, coordination and execution of IT Operations, Physical and Cyber Security tasks. Mentors and Coaches assigned personnel on customer service principles, Systems Development and Networking technologies in an Agile environment. Experience in Manual Vulnerability Validation, Physical Security Vulnerabilities, PII, SDLC, CMP, RMF, SCRM and SEIM.Professional ExperienceGlobal Edge Inc.Network Topography Engineer 04/2023-04/2024Set diagraming standards of Customer Network for CMDB, Optimized network topologies, Network Circuit Identifiers and site configurations for upcoming audit.Coordinated with Configuration Management, Change Management, Engineering, Hardening, Network Operations and Implementation teams to ensure device data requirements were captured correctly.Utilized MS Visio to correctly show device connections to enhance Risk Assessments and Troubleshooting issues.NucoreVision Inc.Senior IT Solutions Consultant 12/2022-04/2023Develops Corporate IT Process solutions to facilitate consistent and replicable responses for Proposal, which are adaptable for specific Agency/Organization needs.Provided advice and experienced input toward corporate security certifications.Peraton Corp 12/2022-3/2023Senior Cybersecurity Incident Response EngineerResponded to Cybersecurity Incidents providing analysis and risk response.Assisted in defining replicable response procedures and Forensics & Incident Response workflow.Koniag Government Services INC., Eagle Harbor Solutions 3/2022-11/2022Senior Information Assurance Engineer, WHCAAssigned to Engineering & Testing Division to evaluate new applications for security issues prior to Information Assurance testing. Created Security Implementation Plans for Operations team to follow.Wrote Security Policies for Agency Implementation to provide clarity & uniformity across systems & applications. Created and implemented simplified Security documentation to allow for swift and repeatable processes to obtain Authority to Operate (ATO)certifications.Missing Link Security 4/2019-2/2022Security Consultant, Senior, DoDAssigned as Surge support Cybersecurity Engineer to Department of Commerce Secure Network to configure, test and maintain Cybersecurity Analysis and Network Monitoring tools.Consulted on Policy standards and Remediation process management.Served as the security subject-matter expert for the system and support the incorporation of security into information systems throughout the entire SDLC process to the Office of the Comptroller of the Currency customer. Reviewed the systems within his/her portfolio to identify and eliminate unnecessary ports, protocols, or services.Supported the development of Poa&M, documenting corrective action plans for remediation of identified security control deficiencies. Reviews and validates the Security Authorization Package (SAP), which includes, the SSP, Risk Assessment Report (RAR), Security Assessment Report (SAR), Poa&M Status Report, Privacy Threshold Assessment (PTA), Privacy Impact Analysis (PIA), E-Authentication Threshold Analysis (ETA), E-Authentication Risk Assessment (ERA), Request for Authorization to Operate, and Authorization Decision Letter.Participated in information system authorization briefings and associated meetings to review the assessment results. Addresses questions from System Owners, Authorizing Officials, and other information system stakeholders about the SAP. Documents the selected security controls in the SSP, maintained in RSA Archer GRC tool.Performed analyses of systems, programs, or planning activities, including the development of technical documentation and analyses of policies, procedures, and IA- and Cyber-related programs and initiatives.Provided technical support to the Army in the incorporation of policy into appropriate regulations, pamphlets, and technical support to the government in drafting, reviewing, revising, and delivering Cybersecurity and IA policy documents to the Cybersecurity directorate and in responding to DA staff, Army Command (AC), ASCC, DRU, PEO, and field units' queries regarding Cybersecurity and IA policy.Provided analysis of Supply Chain Risk Management issues, Regulation and Policy at the DoD level and in coordination with supporting Agencies and Service Branches. Building relationships and coordinating policy and issue responses.Government Secure Solutions/CGI Federal 11/2018-4/2019Cyber Security Consultant, Senior, DoDSupporting with Risk Management Framework (RMF) and DoD Information Assurance Certification and Accreditation Process (DIACAP) policy guidance.Advises in the planning, coordinating, scheduling, resourcing, tracking, documenting, executing, and analyzing Cyber Security Service Provider ProgramsAssesses vulnerabilities/weaknesses across complex IT environments with ability to understand applicability of security standards across technologies.Knowledge of Department of Defense (DoD) 8500 series guidelines and National Institute of Standards and Technology (NIST) SP 800 series standardsDemonstrate a strong knowledge in Networking Engineering and configuring Cisco and Juniper equipment.Knowledge of many aspects of information security with in-depth understanding and hands on experience of many of the following areas: Firewalls, IDS/IPS, VPN, Web Application Firewalls, Authentication technologies, Web Filtering, Proxy Firewalls, network taps and tap aggregators.ManTech MCIS 11/2017-9/2018Cyber Security Engineer, National Geospatial Intelligence AgencyApplies Cyber Security Engineering and Network Security Engineering expertise to optimize enterprise protection posture.Recommends and participates in activities that prevent repeated vulnerability assessments and resolve issues as they arise, leveraging tool vendor SME dialog to gain insight into tool capabilities and interaction.Managing events with ArcSight, Carbon Black, MS ATA, Fire Eye, RSA, Splunk, ACAS, HBSS and recommended changes to rule sets and whitelist configurations.Investigated Threat Intelligence for Network Security Applications toward emerging threat profiles and trends Leveraging Inter-Agency Cyberthreat experiences, conducting malware analysis, initiating treat response procedures, and conducting initial threat investigation.Business Integra 8/2017-11/2017Operations Manager/ System Development, State Department/Bureau of Diplomatic SecurityInitiated & maintained team ethics within IT staff/user, gov't officials, key stakeholders & IT vendors, to understand research, escalate, resolve & provide feedback on system & application issues & inquiries.Managed the Operation team. Responsible for all actions associated with the implementation, integration, help desk support and coordination for deployment of all programs related systems and/or software for the Integrated Security and Suitability System (IS3) project.Lead the Operations Team, train and manage Tier 1&2 support, as well as acting as Team Lead for various teams & projects/products, within a cross-functional IT operational environment.Developed, implemented & maintained system operational procedures, & policy/procedure documentation (SOP).Developed and managed deployment standards (i.e., knowledge-based, implementation roll-out, templates, and best practice) for the deployment and operational support teams.Participated in the security Assessment and Authorization (A&A) for IS3.Facilitated project communication efforts with frequent team meetings providing status reports with key metrics to stakeholders. Reviews security safeguards to determine that security concerns identified in approved policies, plans, and doctrine have been fully addressed.Maximus Federal 8/2015-7/2017Technical Consultant/ Systems Development, Securities and Exchange CommissionDesigned and Implemented Security Management and Operations Support systems. y LemonEvaluated and recommended potential Acquisition of Commercial off the Shelf (COTS) solutions to support project management, portfolio management and other management functions during the project life cycle.Configured, customized, and implemented COTS solutions to meet the government specific needs and workflows.Familiarity with ITIL standards and providing expertise in government best practices for management information system such as SDLC, SEIM, ITSM, PMIS, PPM, Workflow, RMF and Configuration Management Processes.Lead a team of IT specialists in the service management and delivery of software development methodologies, including security system testing of the SEC infrastructure.General Dynamics Information Technology 2/2014-7/2015Program Manager/Pentagon Technical Control Facilities Lead, ITA, Pentagon, VAManaged a team of Experienced Professional Cryptologic and Network Telecommunication Transport and Circuit Actions Engineers, Supporting continuous Operations and Emergency Maintenance along ITSM and DESMF standards.Responsible for Site COMSEC, Network Security monitoring and Physical Site Security Management, KEYMAT and STE accounts.Planned, Activated, Monitored, Documented Activity, Created and Deactivated On-site and Point to Point Telecommunication Circuits.Managed Pentagon Technical Control Facilities, 32 Contractor Operations Personnel, Equipment procurement, STIG testing, certification, operation, and decommissioning in accordance with the QASP.Troubleshooting of deployed IT systems, including databases, storage arrays, network devices and servers.Acquired, Configured, Updated and Patched Monitoring tools including Carbon Black, RSA & WhatsUp Gold.Leidos 4/2013-1/2014Systems Integrator/Site Lead, USARMY HQDA G-2 (Army Military Intelligence) for, Pentagon, VAManaged and Technically Lead a Staff of 18 IT Specialists supporting Operational aspects of Tier 1, 2 & 3 Helpdesk, network monitoring and desktop support functions.Planned, Acquired and Implemented Network Enhancement, Sustainment and Recovery Projects within ITSM and DESMF standards.Coordinated and Prioritized Requirements according to the QASPAdvised and Assisted in Policy Making Decisions affecting all G-2(Army Intelligence) Units and Sites on IT matters.Managed Network utilizing SCCM and VMware, implementing Windows OS Upgrade, Data Migration, and upgrade project from NAS to SAN Configuration utilizing EMC systems, preformed major Cisco Network Security Hardware and Software Upgrades as well as Patches of existing SolarWinds, ACAS & ArcSight systems.General Dynamics Information Technology 02/2012-2/2013Duty Manager-Enterprise Service, National Geospatial Intelligence Agency -, Springfield, VAKnowledgably supported a large Virtual Device Infrastructure Enterprise Networking Environment (VMware servers and desktops). Providing Expertise assisting Customers with Virtual Device Issues.Supervised and Coordinated 36 employees engaged in monitoring of Virtual Network and Sever Status, providing information system solutions and technical support to multiple functional areas including personal computer/client server support, systems programming, applications design and development, database administration, design and administration, information security, telecommunications, and network support.Managed the functionality and efficiency of Enterprise systems running on multiple secure networks.Recruited, Managed and Supervised the Managers and Staff to effectively operate in a 24x7 environment and respond in real-time to support customer requirements directly supporting over 15000 onsite and 25000 offsite customers.Team Lead-Desktop Support, National Geospatial Intelligence Agency -, Springfield, VA 12/2010-02/2012Supported yearlong Customer Transition to a Virtual Device Infrastructure during a Multi-site Consolidation Relocation move, coordinating resolution of all customer issues brought up during transition averaging 750 new customers weekly.Managed and trained 36 extremely qualified personnel in quality documentation and professional customer service with immediate response to customer needs supporting over 15000 customers onsite with a 1200 daily assigned tickets workload.Coached new technicians in proper trouble shooting techniques as well as asset tracking.Coordinated major issue resolution with other support groups.Military ExperienceChief of Plans, Programs & Training/Chief of Cryptologic & Computer Maintenance (Activated 12/2005-11/2009) 9/1996-1/2010927th ARW, Selfridge ANGB, MIUnited States Air Force 6/19859/1996Tactical Air Command and Control Specialist/ Security SpecialistEducationAssociate degree in military studies, completed 1995, Community College of the Air Force-Gunter AFB, ALBachelor of Science in Sociology, Completed 1996, Excelsior College-Albany, NYAssociate degree in electrical engineering, completed 1999, Lansing Community College-Lansing, MITelecommunications Apprenticeship, 1996-1999, International Brotherhood of Electrical Workers (IBEW), Local 556- Lansing, MI; includes both on the job training as well as Community College courses in Telecommunications, HVAC, Alarm, Video, and other Surveillance systems as well as Electrical Engineering.Systems ExperienceMicrosoft Windows Operating Systems, MS Office Products, MS Visio, MS Exchange, Active Directory, SCCM, DNS, DHCP. HP OpenView, Tenable, Talos, Symantec, SolarWinds & BMC Enterprise monitoring applications, Cisco Routers, Switches, and Management devices, HF/VHF/UHF Radios, Satcom equipment, Encryption devices, TCP/IP networking and core Internet protocols such as UDP, ICMP, DNS, FTP, SMTP, HTTP, SNMP, Telephony, CRM, Seibel & Remedy Ticket Record keeping and tracking systems. ArcSight, Carbon Black, MS ATA, Fire Eye, RSA, Splunk, ACAS, HBSS, eMASS, CAMS, Archer, Hermes, and other Network Security Applications.

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise