Summary
Overview
Work History
Education
Skills
Certification
References
Timeline
Generic

Brook Dominique

Plymouth Meeting,Pennsylvania

Summary

Versatile Cyber Security Professional adept at performing cyber assessments and implementing security solutions across diverse platforms including Azure, AWS, and Red Hat Linux environments. Expertise in deploying SIEM systems, DLP strategies, and ensuring compliance with NIST frameworks. Demonstrates strong capabilities in system administration, cloud security, and stakeholder communication. Proven track record of enhancing organizational security postures through strategic cybersecurity standards and practices.

Overview

2025
2025
years of professional experience
1
1
Certification

Work History

Cyber Security Analyst

TownPark
Plymouth Meeting, Pennsylvania
09.2016 - Current
  • Leveraged SIEM systems for enhanced threat detection, incorporating NIST cybersecurity framework to streamline response protocols, resulting in improved security incident handling
  • Implemented DLP policies and practices, ensuring the protection of sensitive information in alignment with NIST guidelines
  • Orchestrated security initiatives for Azure and AWS cloud platforms, integrating NIST standards to achieve robust security and compliance
  • Utilized SAST, DAST, and IAST methodologies for vulnerability assessments, reinforcing application and network security per NIST recommendations
  • Conducted detailed assessments of network infrastructures, identifying vulnerabilities and formulating strategic remediation plans, leading to a 35% improvement in security posture within local government units
  • Designed and implemented cybersecurity policies and best practices, tailoring solutions to the specific needs of each unit, enhancing their resilience against cyber threats
  • Facilitated training sessions on cybersecurity principles and best practices, significantly improving the knowledge base and preparedness of organizational personnel
  • Compiled and presented comprehensive risk assessment reports to senior leadership, translating complex technical findings into actionable insights, driving strategic decision-making
  • Fostered strong collaborative relationships with state, federal, and local government partners, ensuring cohesive efforts in cybersecurity initiatives

IT Manager/SP

GMU
Fairfax, VA
01.2006 - 09.2016
  • Risk Management Framework Project: Led the implementation of the RMF process for a critical infrastructure upgrade project
  • This involved categorizing system information and processes, selecting appropriate security controls, implementing these controls, and assessing their effectiveness
  • Continuously monitored security controls and conducted comprehensive risk assessments to ensure compliance with federal standards and organizational policies
  • This approach significantly reduced potential security risks and enhanced the overall security posture of the organization
  • Configured and managed firewall and network TAP technologies
  • Involved in Information Assurance Vulnerability Alert processes
  • Facilitated training on SAST and DAST methodologies

Affiliated Computer Services ACS
Wasington
05.2003 - 01.2005
  • Install, configure, and maintain Red Hat Linux operating systems
  • Manage kernel and system software updates, patches, and upgrades
  • Monitor system performance and utilization, including CPU usage, memory consumption, and disk I/O
  • Tune systems to ensure optimum performance levels
  • Implement and manage security tools and policies to ensure system security
  • Handle user authentication, authorization, and encryption services
  • Regularly update systems to patch vulnerabilities
  • Configure and manage network services and protocols such as SSH, FTP, and NFS
  • Troubleshoot network issues
  • Manage file systems and disk space
  • Implement and routinely test backup and recovery plans
  • Ensure data integrity through effective disaster recovery strategies
  • Manage job scheduling for routine processes
  • Maintain comprehensive documentation of the system's configuration and architecture
  • Ensure compliance with internal policies and external regulations
  • Provide technical support to other IT staff and end-users
  • Train users on new systems or software applications
  • Interact with vendors for system support and troubleshooting

  • Worked on PCI DSS and HIPPA requirements
  • Vulnerability scanning and remediation using Insight VM, OpenVAS, and Nessus
  • Fixed and detected vulnerabilities to maintain a high-security standard and documented security breaches & assessed the damage
  • Managed OAuth and OpenID Connect (OIDC)
  • Extensive experience in Open Web Application Security Project OWASP
  • Worked on Security information and event management (SIEM)
  • Hardened Servers and Workstations using CIS benchmark
  • Updated Servers and Workstation using Kaseya Patch management module
  • Very good in Scriptwriting using PowerShell
  • Maintaining firewalls, IDS/IPS, Email Security Appliances, and Web Security Appliances
  • Remaining conversant with the industry's computer security technology and practices
  • Enhanced cyber security awareness through end-user training and ongoing communications
  • Developed reviews and updated cybersecurity plans and procedures
  • Performed vulnerability, risk, and threat analysis
  • Ensured all changes to systems are performed in accordance with configuration controls
  • Developed playbooks to improve processes ocesses and information sharing across teams
  • Designed and implemented advanced security solutions, including Zero Trust Architecture, significantly enhancing organizational security posture
  • Managed the integration and operation of security technologies such as MFA and EDR, aligning with enterprise security requirements and standards
  • Supported critical cybersecurity operations as a key escalation point, effectively resolving complex issues and incidents
  • Ensured compliance with NIST frameworks and FISMA regulations, conducting regular audits and adjustments to meet federal standards

Education

Master of Science in Information Systems - Computer Security Management

Strayer University
08.2015

Skills

  • Cyber Assessment & DLP: Advanced execution of cyber assessments and deployment of Data Loss Prevention strategies to protect sensitive data
  • Cloud and Linux Security (Azure, AWS, Red Hat): Secures cloud infrastructures and Red Hat Linux systems, applying best practices for security and compliance
  • SIEM & NIST Framework Compliance: Proficient in the deployment and management of SIEM tools with a strong focus on NIST cybersecurity frameworks
  • System Administration: Extensive experience in maintaining system and network performance and security across multiple platforms including Linux Red Hat
  • Application Security Testing: Expert in SAST, DAST, and IAST methodologies for comprehensive vulnerability assessments
  • Stakeholder Engagement: Effective at communicating complex cybersecurity issues to non-technical stakeholders to aid decision-making
  • Technical Skills: Skilled in Perl, Python, C, and various cybersecurity tools for problem-solving and automation
  • Incident Response & Regulatory Compliance: Leads incident response and maintains compliance with NIST and other regulatory standards
  • Zero Trust Architecture: Experienced in designing and implementing Zero Trust solutions to enhance security
  • Enterprise Cybersecurity Solutions: Deploys and manages technologies such as MFA and EDR within large organizations
  • NIST & FISMA Compliance: Deep understanding of compliance requirements and security best practices
  • Security Operations Support: Provides expert support during major incidents, effectively managing impacts and resolutions
  • Collaborative Leadership: Collaborates under the guidance of Cybersecurity Architects and CISOs, supporting strategic security initiatives

Certification

  • Security Plus
  • CySA
  • CASP

References

Available upon request

Timeline

Cyber Security Analyst

TownPark
09.2016 - Current

IT Manager/SP

GMU
01.2006 - 09.2016

Affiliated Computer Services ACS
05.2003 - 01.2005

Master of Science in Information Systems - Computer Security Management

Strayer University
Brook Dominique