Summary
Overview
Work History
Education
Skills
Training
Years Of Experience
Timeline
be

Chad Kibler

Edinburg,VA

Summary

With over 24 years of experience in IT and cybersecurity, expertise in network design, security administration, and incident response. Strong background in consulting, system analysis, and designing secure network infrastructures while ensuring compliance with industry best practices. Proficient in LAN/WAN protocols, advanced routing, and perimeter security. Excels in threat detection, intrusion investigations, and mitigating cyber risks across enterprise environments. Specialized skills include firewall management, intrusion detection, log analysis, and defense-in-depth strategies.

Overview

24
24
years of professional experience

Work History

Network/Security Engineer

Regulus Group, LLC
10.2008 - Current
  • Designed and Secured Enterprise WAN Infrastructure Architected and implemented an MPLS WAN infrastructure across regional offices, integrating redundancy, scalability, alternate power backup, and out-of-band access for enhanced network resilience and security
  • Configured routers, switches, and firewalls in alignment with disaster recovery policies
  • Implemented Secure Remote Access and VPN Solutions Deployed and managed Site-to-Site VPNs for secure data and VoIP communication across remote offices
  • Configured a Virtual Private Network (VPN) to enable encrypted remote access for authorized users while ensuring compliance with security best practices
  • Hardened Wireless and Endpoint Security Designed and deployed a Cisco Wireless LAN infrastructure with segmented guest and employee networks, enforcing RADIUS authentication via Windows Server 2008 R2
  • Implemented Symantec Endpoint Protection across servers, laptops, and desktops to enhance threat detection and mitigation
  • Virtualized and Secured Critical IT Infrastructure Configured and implemented a VMware ESXi environment hosting multiple operating systems, including a SQL Server database for SolarWinds monitoring
  • Deployed Cisco Firepower Management Center with Firepower Services on Cisco 5508 appliances to strengthen network security and intrusion prevention
  • Enhanced Network Monitoring and Threat Intelligence Developed a virtual syslog server to aggregate and monitor network activity, bandwidth usage, and security events
  • Conducted continuous security research, monitoring for DDoS attacks, malware, and network anomalies while advising on proactive mitigation strategies
  • Optimized Network Performance and Disaster Recovery Redesigned regional office networks by segmenting data and voice traffic to reduce congestion and improve bandwidth efficiency
  • Configured DFS replication across Windows Server 2008 R2 domains for redundancy and ensured daily incremental and full backups of critical IT and business data
  • Established Comprehensive Network Documentation and Compliance Created detailed Visio network design diagrams, licensing records, equipment inventories, and security documentation
  • Maintained IT disaster recovery plans, accounting system configurations, and security update schedules to support compliance, business continuity, and incident response

Specialist Engineer

Verizon Business
12.2007 - 10.2008
  • Threat Monitoring and Incident Response Enhanced cybersecurity resilience for government and commercial networks in a 24/7 environment by proactively monitoring, detecting, and reporting intrusion events within an ArcSight-based Security Information and Event Management (SIEM) architecture
  • Conducted in-depth analysis and response to security incidents, minimizing the risk of unauthorized access and potential breaches
  • Firewall and Security Device Administration Managed and implemented firewall change requests across multiple platforms, including Cisco PIX, Check Point, and Juniper, ensuring adherence to security policies and compliance standards
  • Monitored, investigated, and remediated security issues affecting critical infrastructure, including Host and Network Intrusion Detection Systems (HIDS/NIDS), firewalls, and Virtual Private Networks (VPNs), strengthening overall threat defense

Security Analyst

Unisys
03.2007 - 12.2007
  • Cyber Threat Monitoring and Incident Detection Strengthened the security posture of TSA, HHS, and Census government networks by continuously monitoring and analyzing intrusion events within an ArcSight-based Security Information and Event Management (SIEM) environment
  • Provided real-time threat detection and reporting to mitigate risks in a 24/7 security operations setting
  • Incident Analysis and Threat Intelligence Support Conducted in-depth security analysis and compiled critical intelligence to support incident response teams in identifying, investigating, and mitigating cybersecurity threats
  • Provided actionable insights to enhance incident resolution and improve the overall cybersecurity resilience of federal networks

Security Analyst

SE Solutions
03.2007 - 12.2007
  • Real-Time Threat Monitoring and Intrusion Detection Safeguarded the TSA government network by continuously monitoring and analyzing intrusion events within an ArcSight-based Security Information and Event Management (SIEM) environment
  • Provided timely threat detection and reporting in a 24/7 operational setting to minimize security risks and protect sensitive data
  • Incident Analysis and Cyber Threat Intelligence Support Conducted in-depth security analysis and compiled critical intelligence to assist the incident response team in identifying, investigating, and mitigating cyber threats
  • Provided actionable insights to enhance incident resolution and strengthen the overall security posture of the TSA network

Security Analyst

Mantech
09.2004 - 10.2006
  • Intrusion Detection and Threat Monitoring Strengthened the cybersecurity posture of ManTech IS&T government client networks, including the Senate and House of Representatives, by continuously monitoring and analyzing intrusion events using network-based IDS sensors
  • Provided real-time threat detection, incident reporting, and proactive response in a 24/7 security operations environment
  • Security Infrastructure Development and Vulnerability Management Designed, built, and configured IDS sensors for the Senate network using Snort and MySQL to enhance threat visibility
  • Conducted vulnerability assessments for government clients, identifying and mitigating security risks
  • Performed ongoing maintenance and monitoring of network-based intrusion detection systems to ensure operational integrity and compliance with cybersecurity best practices

Network Security Engineer/Internet Abuse Investigator

MCI WorldCom/UUNet
11.2000 - 09.2004
  • Enterprise Firewall Administration and Security Operations Managed and administered over 300 firewalls for more than 200 clients, including Fortune 50 corporations, utilizing Checkpoint (4.0, 4.1, NG) on Solaris, Windows NT/2000, Interlock, and NOKIA platforms
  • Provided technical support, security best practices guidance, and performed upgrades on RSA Two-Factor Authentication ACE Server to strengthen access control and identity verification
  • Threat Investigation, Incident Response, and Law Enforcement Coordination Investigated network intrusions, denial-of-service (DoS) attacks, and unsolicited email threats on UUNet/WorldCom’s global Internet backbone, which supported over 70% of the world’s internet traffic
  • Collaborated with Cisco and Juniper engineers to mitigate cyber threats, worked with federal agencies on criminal investigations, and helped develop policies and procedures to streamline security incident response and enforcement of acceptable use policies

Education

Bachelor of Science - Information Systems - Concentration in Computer Security

Strayer University
Chantilly, VA

Skills

  • ArcSight
  • Cisco Routers, Switches, and ASA appliances
  • VMWare ESXi Server
  • Cisco Firepower Management Center
  • Cisco IOS
  • Cisco IDS/IPS
  • SolarWinds Netflow Analyzer and Network Performance Monitor
  • Shoretel Voice System
  • VoIP
  • QoS
  • Netgear Switches
  • Linux
  • RSA Secure ID
  • Symantec Endpoint and Symantec Endpoint Manager
  • Wireshark
  • Shell Scripting
  • SNORT
  • Windows Server
  • Nmap
  • Tcpdump
  • Office 365 Administration
  • Remedy trouble ticket system on Solaris
  • My SQL
  • Checkpoint Firewalls
  • Network security
  • Intrusion detection
  • Data security
  • Firewall management
  • Intrusion detection systems
  • Network security management
  • Virtual private networks
  • Firewall installation
  • Firewall configuration
  • Network security analysis
  • Security monitoring
  • Security analysis
  • Network monitoring
  • Security information and event management

Training

  • Red Hat Certified Technician (RHCT) Course and certification
  • SANS Certificate of Completion Course Title: Security Essentials Field of Study: Specialized Knowledge and Applications
  • SANS Certificate of Completion Course Title: Audit and Security Controls Field of Study: Specialized Knowledge and Applications
  • Certificate of Completion for completion of RSA Server SecurID Installation and Configuration
  • Certificate of Completion for successful completion of RSA Server SecurID 5.0 Administration
  • Certificate of Completion for successful completion of Check Point 2000/NG CCSE & VPN-1
  • Training at UUNet/WorldCom in TCP/IP, UNIX, Subnetting, Networking Topology, DNS, BGP, Advanced Shell Scripting and several classes in Network Security

Years Of Experience

24

Timeline

Network/Security Engineer

Regulus Group, LLC
10.2008 - Current

Specialist Engineer

Verizon Business
12.2007 - 10.2008

Security Analyst

Unisys
03.2007 - 12.2007

Security Analyst

SE Solutions
03.2007 - 12.2007

Security Analyst

Mantech
09.2004 - 10.2006

Network Security Engineer/Internet Abuse Investigator

MCI WorldCom/UUNet
11.2000 - 09.2004

Bachelor of Science - Information Systems - Concentration in Computer Security

Strayer University
Chad Kibler