Skills
Summary
Work History
Education
Certification
Overview
Hands On Experience
GeneralManager
Chris Sansbury Debardelaben

Chris Sansbury Debardelaben

Cyber Security
Long Beach,CA

Skills

    Wireshark software

undefined

Summary

Ambitious, career-focused job seeker with a security clearance, anxious to obtain a Cybersecurity Analyst position to help launch career while achieving company goals. Excited to further current knowledge by continuing education, and expand on the topics within Comptia's CySA + curriculum

Work History

Electronics Technician

Army CSMS 3
Long Beach, CA
08.2019 - Current


  • Performed Account Management by setting up admin and user accounts
  • Performed Configuration Management by loading OS baselines onto Military Laptops
  • Migrating US Army VSAT to a new network
  • Update VSAT antivirus & firewall in accordance with US Army SOP
  • Unlock MODEMS via specified ports
  • Installed VSAT configuration files for encrypted connection capabilities
  • Conducted semi-annual services involving NVG's and TWS's(PAS-13 series); using equipment & special tools in order to conduct the service. Equipment such as N2-GEN-4 Nitrogen Generator, Fire Control Purging kit, & Purge Device
  • Extensive experience using the GRM-122 to test, troubleshoot & repair all series of radios from each family such as SINCGARS systems, Harris systems, & etc. (Radios:SINCGARS model's RT1523(A)(B)(C)(D)(E)(F), Harris models 1796 & 1694, Raytheon PSC-5 Spitfire)
  • Abides by safety standards by wearing appropriate PPE
  • Perform tasks while complying with security clearance expectations


Education

Certificate of Completion - Comptia Security +

ARCENT Signal University
Camp Buehring
06.2021 - 06.2021

Bachelor of Science - Engineering Physics

Delaware State University
Dover, DE
08.2011 - 05.2015

Certification

CompTIA CySA+ ce

Overview

3
3
years of professional experience
4
4
years of post-secondary education
2
2
Certificates

Hands On Experience

  • Analyzing Output from Network Security Monitoring Tools: Wireshark
  • Analyzing Output from Security Appliance Logs: SecurityOnion / Zeek (Bro)
  • Analyzing Output from Endpoint Security Monitoring Tools: Windows Sysinternals
  • Analyzing Email Headers: SMTP session log
  • Configuring SIEM Agents and Collectors: Security Onion / pfsense
  • Analyzing, Filtering, and Searching Event Log and syslog Output: Security Onion
  • Collecting and Validating Digital Evidence: Autopsy
  • Analyzing Network-related loCs: dnscat2 / DNS Tunneling exercise
  • Analyzing Host and Application loCs: Sysmon / Windows Data Collector
  • Observing loCs during a Security Incident: Incident response scenario/ R Team: Nmap, Metasploit , & ettercap / B Team: Wirehark & Sysmon
  • Analyzing Output from Topology and Host Enumeration Tools: Nmap
  • Testing Credential Security: JohntheRipper / Responder
  • Configuring Vulnerability Scanning and Analyzing Outputs: Greenbone Security Manager (GSM) (OpenVas) implementation
  • Assessing Vulnerability Scan Outputs: Nmap/ Greenbone Source Edition / Metasploit
  • Performing Account and Permissions Audits: Windows 2016 Server Manager
  • Configuring Network Segmentation and Security: pfSense / Metasploit
  • Configuring and Analyzing Share Permissions: Windows 2016 Server Manager
  • Assessing the Impact of Web Application Vulnerabilities: phpMyAdmin/ Metasploit
  • Analyzing Output from Web Application Assessment Tools: Nikto / Burp Suite / Damn Vulnerable Web Application
  • Analyzing Output from Cloud Infrastructure Assessment Tools: ScoutSuite with AWS


Chris Sansbury DebardelabenCyber Security