Summary
Overview
Work History
Certification
References
Timeline
Generic

Cherena C. Covington

Woodbridge,VA

Summary

Highly skilled Cybersecurity Engineer with comprehensive understanding of network architectures, security protocols, and risk assessment methodologies. Proven strengths include vulnerability analysis, threat mitigation and cyber incident response. Demonstrated impact in previous roles includes successful implementation of sophisticated security solutions to safeguard company data and infrastructure. Skilled in safeguarding information systems and networks from potential threats. Have experience implementing security measures, conducting vulnerability assessments, and managing incident response activities. Strengths include analytical problem-solving, teamwork, and effective communication skills. Contributed to enhancing system security posture and reducing incidents of data breaches in previous roles.

Overview

15
15
years of professional experience
1
1
Certification

Work History

NETOPS SOLUTIONS INC/ Cybersecurity Operation Solutions LLC, Mark
Alexandria, VA
06.2020 - Current
  • JWICS SME (HBSS, ACAS and MDE) Endpoint Security
  • Support the Enterprise Cyber Security Team on quarantine systems in various states of the lifecycle (needing patches, updates, NIC Cards, KMV etc.)
  • Document tools, techniques, and procedures (TTP) for all levels of IT support personnel
  • Aid included pushing updates, removing files, and making sure systems are in the correct OU in active directory
  • Ensured the VIP and JSP user are receiving the proper patching updates and resolving issues impacting the different agencies
  • Implement changes to code, scripts, and configurations for new developments, bug fixes, enhancements and installations using best practices
  • Monitor system performance, event logs and security logs for workstations and peripherals
  • Provide support with Cyber Security Splunk ATO dashes boards
  • Perform client-level support on enterprise systems using centralized systems such as Active Directory with a solid foundation in applying group policies
  • Responsible for opening, tracking, and closing incent response ticket
  • Ensure problem ownership working with Cyber Security Team
  • Monitor the Voicemail box and create a ticket or update a current ticket with the information from the voicemail that is received
  • Utilize data at hand to make expert decisions and recommendations on how to resolve, improve, or prevent network problems/issues
  • Contribute to crisis management situations (outages, virus outbreaks, and in high-pressure environments) with creative solutions, techniques, and best practices.

Senior Security Specialist/Document Control Specialist

Booz Allen Hamilton
05.2009 - Current

Operator

Raytheon/IG, NGA
Springfield, VA
12.2021 - 05.2022
  • Support a prototype email system plus a critical operational system
  • Monitoring several systems and mail inboxes and perform secure data transfers between them.

Senior Cybersecurity

GDIT, 4800 Mark Center
Alexandria, VA
08.2019 - 06.2020
  • (HBSS)
  • Support the Enterprise Cyber Security Team on quarantine systems in various states of the lifecycle (needing patches, updates, NIC Cards, KMV etc.)
  • Document tools, techniques, and procedures (TTP) for all levels of IT support personnel
  • Aid included pushing updates, removing files, and making sure systems are in the correct OU in active directory
  • Ensured the VIP and JSP user are receiving the proper patching updates and resolving issues impacting the different agencies
  • Implement changes to code, scripts, and configurations for new developments, bug fixes, enhancements and installations using best practices
  • Monitor system performance, event logs and security logs for workstations and peripherals
  • Provide support with Cyber Security Splunk ATO dashes boards
  • Perform client-level support on enterprise systems using centralized systems such as Active Directory with a solid foundation in applying group policies
  • Responsible for opening, tracking, and closing incent response ticket
  • Ensure problem ownership working with Cyber Security Team
  • Monitor the Voicemail box and create a ticket or update a current ticket with the information from the voicemail that is received
  • Utilize data at hand to make expert decisions and recommendations on how to resolve, improve, or prevent network problems/issues
  • Contribute to crisis management situations (outages, virus outbreaks, and in high-pressure environments) with creative solutions, techniques, and best practices.

System Administrator ( SOC Analyst) Parttime

Lynxnet, 8825 Beulah St
Fort Belvoir, VA
05.2016 - 06.2019
  • Support day-to-day cybersecurity threat detection and incident response operations through indicator pivoting, campaign analysis, and tactical intelligence
  • Identify and enhance processes where automation has the potential to improve efficiencies, provide actionable data, and facilitate collaboration across INSCOM
  • Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows
  • Deconstruct multi-source reporting into actionable intelligence including Tactics, Techniques, and Procedures TTPs data objects, campaign analysis, and threat patterns
  • Regularly analyze malware reports to track adversary behaviors and support the construction of a TTP repository
  • Conduct time-sensitive analysis during cyber investigations, including active threat hunting, malware analysis, and campaign enrichment
  • Routinely identify gaps in detection and collaborate with teams across the Cyber organization to mitigate risk, including blocking of malicious indicators, tuning vendor signatures, and instrumenting custom detection rules
  • Respond and resolve cyber security incidents and proactively prevent reoccurrence of these incidents
  • Apply leading-edge principles, theories, and concepts
  • Contribute to the development of new principles and concepts
  • Work on unusually complex problems and provide highly innovative solutions
  • Operate with substantial latitude for unreviewed action or decision
  • Mentor or supervise employees in both firm and technical competencies.

Cyber Security Specialist

Lynxnet, 8825
Fort Belvoir, VA
05.2016 - 06.2019
  • RMF (Risk Management Frame package)
  • Apply the NIST Special Publication 800-37 Rev 2 Risk Management Framework (RMF) process to information systems and applications currently being assessed or developed by our company for use in the U.S
  • Federal government, especially the Department of Defense (DoD)
  • Lead information assurance audits to examine potential security violations and determine if any employee has been violated, breached, or circumvented the installation campus area network (I-CAN)
  • Recommend policy changes with industry best practices and provide report to the ISSM
  • Develop RMF documentation as required to prepare products and systems for submission to an ATO authority
  • Provide recommendation on how RMF products can be used to prepare for other processes
  • Formulate plans and schedules to conduct either portions or all the RMF process on selected products
  • Conduct and guide the analysis needed to gather information needed to produce RMF artifacts
  • Formulate plans and schedules to conduct either portions or all the RMF process on selected products.

Cyber Compliance Manager (HBSS Administrator) and (ACAS Administrator)

Lynxnet, 8825
Fort Belvoir, VA
05.2016 - 06.2019
  • Overseer
  • Provide integration and operational support for vulnerability remediation of distributed systems using tools such as
  • McAfee’s Host Based Security System (HBSS) and Microsoft System Center Configuration Manager (SCCM), including scripting support
  • Perform client-level support on enterprise systems using centralized systems such as Active Directory with a solid foundation in applying group policies
  • Recommend and implement security mitigation technologies and strategies using automated and semi-automated systems on MS Windows based platforms
  • Support daily activities related to operations, security, and performance of information systems, including (but not limited to) communication systems, databases, software firewalls, and other technologies that require ongoing management of workstations
  • Test and apply security and update patches and other preventive maintenance activities in a robust environment within expected timelines
  • Verify that desktop products and common workgroup devices follow applicable IT security policies, procedures, and guidelines
  • Monitor system performance, event logs and security logs for workstations and peripherals
  • Implement changes to code, scripts, and configurations for new developments, bug fixes, enhancements and installations using best practices
  • Utilize data at hand to make expert decisions and recommendations on how to resolve, improve, or prevent network problems/issues
  • Contribute to crisis management situations (outages, virus outbreaks, and in high-pressure environments) with creative solutions, techniques, and best practices
  • Be prepared to respond to crisis situations outside of normal duty hours
  • Document tools, techniques, and procedures (TTP) for all levels of IT support personnel
  • Produce formal documentation products such as project plans, release documents and test plans, IT systems concept of operations, technical assessments, implementation plans, patching solutions, and similar sets of documentation.

CACI
Stafford, VA
06.2015 - 05.2016
  • Change, Asset, Configuration Management
  • Provide Configuration Management (CM) support for the Department of Defense (DoD), DSS, Information
  • Co-manage projects as assigned by the Change, Configuration & Asset Management Lead to ensure contract
  • Determine configuration requirements and develop system configuration procedures
  • Process and update Change Requests (CRQs), Information Assurance Vulnerability Management (IAVM)
  • Requirements, Configuration Items (CIs), and the Approved Product Lists (APL) to ensure software and hardware compliance
  • Develop process improvements to enhance configuration efficiency
  • Develop and maintain CM tools and supporting configuration identification, control, reporting, release and delivery of products and systems
  • Developing procedures for establishing configuration baselines as reference points for rebuilds and provide ability to revert to stable configuration states
  • Standardizing/Improvising ITIL processes and functions’ implementations in large complex IT environment
  • Establishing and executing strategic and tactical plans for a full-scale implementation of the ITIL/ITSM framework using industry standard ITSM tools.

PROPRIETARY SYSTEM SPECIALIST/QUEUE MANGER

CACI, 475 Aquia Center
Stafford, VA
08.2014 - 06.2015
  • Monitor the IT services queue and assign tickets to the team or service Desk Management
  • Monitor the Mailbox and create a ticket or update a current ticket with the email that is received
  • Monitor the Voicemail box and create a ticket or update a current ticket with the information from the voicemail that is received
  • Image bench stock laptops and desktops
  • Maintain file servers, network access
  • Documents and analyzes system anomalies to ensure optimum equipment performance
  • Troubleshoot problems for customer specific information systems and application
  • Defines and classifies level, priority, and nature of problem; request and/ or issue
  • Responsible for opening, tracking and closing trouble tickets
  • Perform installing, configuration, and patching of end – user computers
  • Provide guidance and resolution to a broad range of over 2,000 customers
  • Assist with Army installation personnel in the implementation of the Enterprise Environmental Safety and
  • Occupational Health Management Information System (EESOH-MIS)
  • Responsible for opening, tracking and closing trouble tickets
  • Ensure problem ownership and promotes customer satisfaction
  • Led EESOH-MIS implementation teams and coordinated with Installations POC’s
  • Responsible for opening, tracking and closing incent response ticket
  • Ensure problem ownership working with CND team.

NCI Information
Stafford, VA
10.2013 - 08.2014
  • Change, Asset, Configuration Management
  • Provide Configuration Management (CM) support for the Department of Defense (DoD), DSS, Information
  • Co-manage projects as assigned by the Change, Configuration & Asset Management Lead to ensure contract
  • Determine configuration requirements and develop system configuration procedures
  • Process and update Change Requests (CRQs), Information Assurance Vulnerability Management (IAVM)
  • Requirements, Configuration Items (CIs), and the Approved Product Lists (APL) to ensure software and hardware compliance
  • Develop process improvements to enhance configuration efficiency
  • Develop and maintain CM tools and supporting configuration identification, control, reporting, release and delivery of products and systems
  • Developing procedures for establishing configuration baselines as reference points for rebuilds and provide ability to revert to stable configuration states
  • Standardizing/Improvising ITIL processes and functions’ implementations in large complex IT environment
  • Establishing and executing strategic and tactical plans for a full-scale implementation of the ITIL/ITSM framework using industry standard ITSM tools
  • Security Clearance:
  • Top Secret/SCI CI POLY

Certification

MDE ESS 201 and 301 MCSE AZURE CLOUD MCSA 2016 DLP Security+ (IAT Level 2 as defined by DoD 8570.01-M) CASP (IAT Level 3 as defined by DoD 8570.01-M) ITILv3 CEH v10 HBSS 201 Certified by DISA HBSS 301 Advance Certified by DISA HBSS Operational Training ACAS 4.6 Certified by DISA Splunk Infrastructure Overview 6.x Splunk 7.2 Fundamentals Part 2 Dedicated Virtual Facility Security Officer Management Program National Industrial Security Program Operating Manual (NISPOM) Chapter 8 Information System Security Basics ISSO Compliance Officer

References

REFERENCES Available Upon Request

Timeline

Operator

Raytheon/IG, NGA
12.2021 - 05.2022

NETOPS SOLUTIONS INC/ Cybersecurity Operation Solutions LLC, Mark
06.2020 - Current

Senior Cybersecurity

GDIT, 4800 Mark Center
08.2019 - 06.2020

System Administrator ( SOC Analyst) Parttime

Lynxnet, 8825 Beulah St
05.2016 - 06.2019

Cyber Security Specialist

Lynxnet, 8825
05.2016 - 06.2019

Cyber Compliance Manager (HBSS Administrator) and (ACAS Administrator)

Lynxnet, 8825
05.2016 - 06.2019

CACI
06.2015 - 05.2016

PROPRIETARY SYSTEM SPECIALIST/QUEUE MANGER

CACI, 475 Aquia Center
08.2014 - 06.2015

NCI Information
10.2013 - 08.2014

Senior Security Specialist/Document Control Specialist

Booz Allen Hamilton
05.2009 - Current
MDE ESS 201 and 301 MCSE AZURE CLOUD MCSA 2016 DLP Security+ (IAT Level 2 as defined by DoD 8570.01-M) CASP (IAT Level 3 as defined by DoD 8570.01-M) ITILv3 CEH v10 HBSS 201 Certified by DISA HBSS 301 Advance Certified by DISA HBSS Operational Training ACAS 4.6 Certified by DISA Splunk Infrastructure Overview 6.x Splunk 7.2 Fundamentals Part 2 Dedicated Virtual Facility Security Officer Management Program National Industrial Security Program Operating Manual (NISPOM) Chapter 8 Information System Security Basics ISSO Compliance Officer
Cherena C. Covington