Certified Information Systems Security Professional (CISSP) with six years of experience and expertise in designing, implementing, and troubleshooting network infrastructure and security. Proven record of evaluating system vulnerability in order to recommend security improvements as well as improve efficiency while aligning business processes with network design and infrastructure. Superior capacity to solve complex problems involving a wide variety of information systems, work independently on large-scale projects, and thrive under pressure in fast-pace environments while directing multiple projects from concept to implementation.
Core Competencies include:
- System Architecture Design
- Configuration Management
- Linux Administration
- Information Assurance
- Hardware Installation
- Project Management
- Vulnerability Evaluation
- System Troubleshooting
- Technical Writing
CLEARANCE AND CERTIFICATIONS:
CURRENT TS/SCI CLEARANCE (Prior Full-Scope Polygraph) PR Date: Dec 2009
Certified Information Systems Security Professional (CISSP)
CompTIA Security + Certification
Microsoft Certified Systems Engineer (MCSE)
Microsoft Certified Professional + Internet (MCP + Internet)
PROFESSIONAL EXPERIENCE:
2010 – Present
IT Security Specialist:
- Manage system information security architecture, design, installation, operational planning, and risk remediation
activities on more than 15 servers/systems worldwide for various government clients, ensuring all systems
installed according to schedule.
- Conduct risk assessments and collaborate with clients to provide recommendations regarding critical
infrastructure and network security operations enhancements.
- Develop Continuity of Operations (COOP) and Disaster Recovery (DR) operations and conduct evaluation of
COOP and DR during annual incident response training.
- Provide up to ten on-site server maintenance visits on a monthly basis, troubleshooting various technical
problems and performing operating system administration with Linux-based computer systems.
- Ensure information assurance by transmitting secure data between classified systems; perform ethical hacking,
malware reverse engineering, penetration testing, and Certification and Accreditation (C&A) within Security
Operations Center (SOC) environment.
- Draft technical manuals, installation manuals, installation progress updates, and incident response plans in order to enhance system security documentation; create required system compliance reports and information requests.