Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Timeline
Generic

Christopher Williams

Atlanta,GA

Summary

Detail-oriented team player with strong organizational skills offering comprehensive, hands-on experience identifying, investigating and responding to information security alerts. Expertise in searching through data-sets to detect threats and anomalies and administering metrics to maintain security processes and controls. Focused on helping businesses safeguard sensitive data from hackers and cyber-criminals. Ability to handle multiple projects simultaneously with a high degree of accuracy.

Overview

11
11
years of professional experience
1
1
Certification

Work History

Deputy SOC Task Lead

Gunnison
11.2020 - Current
  • Monitor network infrastructure for vulnerabilities and attacks for agencies under the Federal Department of Health and Human Services (HHS).
  • Assist in remediation of attacks and alert parties of everything from phishing attacks to brute force level security incidents to zero-day vulnerabilities.
  • Facilitate and lead reconciliation/incident management meetings with OpDiv organizations as needed.
  • Lead a team to compose, manage, and conduct regular tabletop exercises with OpDiv organizations.
  • Manage a SOC of multiple analysts with varying skillsets overseeing the management, documentation, and tracking of over 100,000 cyber security incidents from varying governments organizations.
  • Complete reports compiling notable events for daily briefs to multiple government agencies.
  • Review and forward pertinent documentation on the latest malware and exploitation techniques used by threat actors.
  • Document, forward, and alert other agencies of cyber security-related incidents and possible vulnerabilities within HHS.
  • Tasked as main POC for high level after action reporting, tabletop exercises, and executive reports.
  • Acted as head planner for Cyberstorm two years in a row. Cyberstorm is the largest government-run livefire cybersecurity exercise comprising of federal and private entities.
  • Handled all major communications coming out of and going to HHS CSIRC. This required a high-level of attentiveness to convey proper communication between government agencies, as well as third-party contract partners.
  • Collect and analyst incident data from all partner OpDivs. Ensure this data meets reporting requirements for CISA and FISMA.
  • Provide monthly, quarterly, and yearly FISMA reporting for reconciliation, and tracking.
  • Conduct audit/reconciliation meetings with member OpDivs to match incident data with CISA/FISMA reports.

SOC Analyst

Xator
05.2019 - 11.2020
  • Investigated and resolved incidents of unauthorized access to sensitive information.
  • Worked with other teams to enforce security of applications and systems.
  • Monitored use of data files and regulated access to protect secure information.
  • Implemented security measures to reduce threats and damage related to cyber attacks.
  • Actively use SIEM and Endpoint Detection tools such as WireShark, FireEye, RSA Netwitness, Crowdstrike, SolarWinds, and Splunk to monitor network security on SCADA systems.
  • Drafted security reports and metrics to track security performance and strategize improvements.
  • Educated and trained users on information security policies and procedures.
  • Analyzed network traffic and system logs to detect malicious activities.
  • Train new analysts on internal tools, reporting requirements, standard procedures, and investigation methods.
  • Compose and finalize daily reporting debriefs for department chiefs, shift handoffs, and high level executive summaries.
  • Recommend improvements in security systems and procedures.

Tier 3 SQL Application Engineer

Varec
03.2015 - 04.2019
  • Troubleshoot database and application issues centered around SQL including scripting, corruption resolution, log review, and change requests for the DoD.
  • Conduct first-person, and guided, database management for on-site hardware. This included both digital guidance for software needs and hardware guidance for workstations as well as servers.
  • Provide support and resolution through Event Viewer investigations for root cause analysis of issues.
  • Create and process open incidents and work orders for equipment malfunctions within a specific timeframe.
  • Investigate and solve cases based on network issues and connectivity for transactions Investigate and remediate security vulnerabilities on servers via patch disks and configurations to be in line with STIG requirements set by the DOD.
  • Troubleshoot network connectivity problems such as IP conflicts, workgroup settings, and DNS resolve issues on varying branches of military networks.
  • Maintain up-to-date cyber security training and train DoD personnel on best practices.
  • Work under varying caseloads with strict SLA requirements and severities for cases.
  • Provide hardware support for site machines and equipment in the form of function testing and configuration before delivery to clients.

Senior Technical Advisor

Apple
06.2014 - 03.2015
  • Troubleshoot iOS and Mac device issues as well as device integration with Windows.
  • Investigate and solve cases targeting network issues/connectivity with applications and hardware.
  • Interact and change communication technique based on customer's communication style and skill level using proprietary company methods and standards.
  • Maintain metrics and top customer service levels with all calls while keeping a consistently low handle time.
  • Consistently top metrics with a 100% customer satisfaction and issue resolution rate.
  • Maintained an extremely low escalation rate to higher tiers.
  • Contributed to knowledge-based and customer resolution guides for product enrichment.
  • Reviewed technical guidelines to verify compliance with information security standards and best practices.
  • Served as primary point of contact for triaging technical issues.

Operations Manager

SQ/FT
11.2012 - 06.2014
  • Opening and closing store duties when needed.
  • Carried out primary operation and training of POS system and maintenance of inventory logs.
  • Installed and troubleshot inventory database for multiple stores with some use of Active Directory and Dropbox.
  • Troubleshoot network issues in all store locations.
  • Implement new network, application, hardware, and software solutions for varying business needs.
  • Build, image, and maintain workstations for company on a small scale.

Education

Bachelor's - Finance

Georgia State University
Atlanta, GA

Skills

  • Risk Mitigation
  • Risk Assessment
  • Procedure Documentation
  • Security Assurance
  • Information Governance
  • Information Protection
  • Security Metrics
  • Information Auditing
  • Critical Thinking Skills
  • Developing Security Plans
  • Supervision and Leadership
  • Confident Presenter

Accomplishments

  • Led, documented, and resolved incident reconciliation with team which led to partner OpDiv reconciliation of over 8,000 incidents in one quarter.
  • Achieved better analyst efficiency and streamlined processes by introducing dashboard solutions for daily tasks.
  • Used Microsoft Excel to develop monthly/quarterly/yearly FISMA tracking datasheets for audits.
  • Lead planing team two years in a row for Cyberstorm. CISA's largest livefire tabletop cyber security exercise.

Certification

  • CompTia Security+
  • RSA Archer
  • Splunk Analytics and Data Science
  • Splunk Advanced Dashboards and Visualizations
  • Splunk Developing Phantom 4.8 Playbooks
  • CISSP (Tentative - End of 2023)

Timeline

Deputy SOC Task Lead

Gunnison
11.2020 - Current

SOC Analyst

Xator
05.2019 - 11.2020

Tier 3 SQL Application Engineer

Varec
03.2015 - 04.2019

Senior Technical Advisor

Apple
06.2014 - 03.2015

Operations Manager

SQ/FT
11.2012 - 06.2014

Bachelor's - Finance

Georgia State University
Christopher Williams