SUMMARY
20yrs Configuring Routers, Switches, Firewalls, MS/Linux admin, software development, software security, static/dynamic code analysis, web site and perimeter penetration testing, network security upgrades for the White House, designed and wrote defensive and offensive cyber security tools (.NET|C#, Java, Python, PowerShell), Data Engineering, published security pocket guide author.
Leidos C2 Cyber Security/Cyber Resiliency
Cyber Security Engineer
- Web Developer with 10 years of experience in cybersecurity, network security architecture, and penetration testing. Proficient in OOP, .NET|C#, MVC, Java, Python, JavaScript, PowerShell, HTML, CSS, Razor Syntax, Azure Monitoring, SOAP, REST API, WordPress. Seeking to leverage extensive background in web development, system architecture, and security to excel in a Web Developer role.
- Developed and implemented cybersecurity applications with a focus on forensic scanning, authentication bypass, DDoS attacks utilizing multiple languages on Eclipse and Visual Studio, OOP, .NET|C#, MVC, Java, Python, JavaScript, PowerShell, HTML, CSS, Razor Syntax, Agile
- Taught in-house and DoD customers Cisco Admin courses and Penetration Testing fundamentals
- Presenter at NAVY annual cyber symposium at SPAWAR
- Author of “Network Field Survival Guide” sold 10,000 copies
- BLUE and RED team enterprise level vuln security assessments, security policy recommendations
- Email Forensics, SMTP tracking, attacker identification, obfuscation techniques, IDS/IPS artifact signatures, running in debugger/BURP to observe and document malware methods
- Designed digital handwriting analysis tool using psychology, linguistics and human mechanics
- Designed MS SQL database schema validation tool for USAF written in .NET|C#
- Designed a parser syntax language tool for SQL/Command injection testing using Python
- Designed a scanning log audit report tool including state code analysis using Python
- Designed an End Point Forensic Syslog SIEM with PowerShell, concentrating on anomalous memory and privilege use, applying forensic precedent/antecedent behaviors
- Splunk Administration, forwarder, indexer architecture, dashboard studio, event genome survey, CheckMk syslog integration, malicious behavior dashboards for comprehensive system monitoring in SOC
- Conducted VPN scanning and penetration testing using MITM techniques and false certification generation to evaluate and bolster security robustness, validate security policy, implement security controls
- Contributed to Cyber warfare planning, phase0a Infocon, 0b SIGINT/HUMINT/OSINT, 0c Calibrate. USC Title 10 Armed forces, Title 50 War and National Defense
- USAF TSAT satellite network management, control, data plane survivability
Leidos Security Risk Management Practice San Diego, CA
Principal Security Engineer Jan 2010 - Mar 2018
- Performed extensive penetration testing on various network infrastructures and web applications using both black and white box methodologies, successfully identifying and rectifying multiple potential vulnerabilities
- Directed comprehensive information assurance initiatives across the full lifecycle of hardware and software, including the detection and mitigation of supply chain malware, hardware security, end point security
- Managed 37 commercial and Department of Defense penetration engagements both remotely and on-site, with responsibility for compiling, presenting, and defending the final report
- Designed a robust network security architecture for a significant expansion project, with a focus on resilience to cyber attacks and proactive mitigation strategies for deficiencies in Control, Management, and Forwarding Plane protocols
SAIC NGIN PMO San Diego, CA
Solution Architect Aug 2000 - Jan 2010
- Oversaw the conceptualization and execution of the initial VoIP system for the President of the United States
- Involved in writing statements of work (SOW), request for proposal (RFP), request for information (RFI), basis of estimate (BOE) for VoIP contracts
- Incident response, Incident handling for a national stock trading firm, IAEA, DOD classified projects
- Conducted hardware hacking against Cisco Routers using EJTAG
- Team lead for the 'Proposition M' network modernization initiative for a large educational institution, involving infrastructure assessment, recommendation provision, and hardware installation
- Managed the setup of switches and routers and performed conclusive acceptance testing, securing robust network performance and dependability
- Played a significant role in the 'last mile' data solution, executed a thorough analysis of FDD/TDD antenna duplexing solutions, and determined appropriate modems, radios, and antennas for P2MP & P2P backbone
SKILLS
Java • .Net • C# • ASP • MVC • Linq • Python • OOP • PowerShell • HTML • CSS • JavaScript • ORM • MS-SQL • MySQL • Postgres • Oracle • MongoDB • XML • HTTP • API • RPC • LAMP • JSON • REST • SOAP • BASH • Eclipse • Visual Studio • TFS • WordPress • Agile • Git • Splunk • SOC • Snort • SSH • PuTTY • Nikto • Nessus • ACAS • HBSS • Kali Linux • DAST • CI\CD • Nmap • HP Fortify • BURP Suite • FTK (Forensic Tool Kit) • OllyDbg • IDA • GDB • Cisco • NX-OS • Juniper • JUNOS • Palo Alto • PANOS • RHEL • FreeBSD • vSphere • vCenter • ESXI • IAM • SSO • OAuth • SAML • CorelDraw • TcpDump • Wireshark • SDN • SCADA • IoT • WAF • NIST RMF • DISA • OWASP • STIG • OSINT • BURP Suite • Metasploit • Malware Reversal • EJTAG • Azure Monitoring • TCP/IP • UDP • DNS • DHCP • SNMP • AAA • LDAP • RADIUS • TACACS+ • SIEM • DLP • SMTP • BGP • OSPF • EIGRP • NAT • IPSec • VLAN • VPN • TLS • PKI • X.509 • NAC • 802.1x