Highly-motivated employee with desire to take on new challenges. Strong work ethic, adaptability, and exceptional interpersonal skills. Adept at working effectively unsupervised and quickly mastering new skills.
Manage a team of four to support all aspects of Cyber/SM (Signature Management) involving the planning and execution of sensitive operations, assisting in the coordination of multiple projects
Drafts and maintains SM and CYBER policy; reviewing SM program documents, reviewing Standard Operation Procedures (SOP) and other required regulatory documents to ensure compliance with U.S law and Department of Defense (DoD) policies and regulations
Conducts technical supportability reviews for submitted CYBER SM plans, requirements, and amending/supporting documents
Advises the leadership on emerging technologies, vulnerabilities, and regulatory changes that may impact CYBER SM programs and propose solutions to solve emerging issues observing trends in data security and implementing changes that would benefit the customer.
Endpoint Forensics Analyst
Navy Cyber Defense Operations Command
Suffolk, Virginia
08.2019 - 06.2021
Made use of Splunk to query through millions of antivirus alerts that occurred throughout the Navy to identify malicious activity occurring on Navy hosts
Research alarming events by way of open source intelligence and reporting of system owners to identify the cause, severity, and way forward to resolve the incident.
Intrusion Detection Analyst
Navy Cyber Defense Operations Command
Suffolk, Virginia
08.2019 - 11.2019
Monitored the health of vital US navy sensors to ensure that we had access to all the network traffic occurring on several vital enclaves
Reviewed packet capture data for evidence of malicious activity or vulnerabilities.
Inside Threat Analyst
Cyber Warfare Activity 67
Fort Meade, MD
04.2017 - 07.2019
Utilized various methods to detect suspicious events and determine their intent and effect
Sorted through a vast amount of ingested data to create data sets that would display suspicious or anomalous activity to be investigated
Made use of Encase to search machines and hard drives for artifacts that would suggest malicious activity on a system.
Security Health Officer
Cyber Warfare Activity 67
Fort Meade, MD
05.2016 - 04.2017
Coordinated the resolution of a varying array of incident tickets, including malware, misconfiguration, improper use of information systems, etc
Reviewed and directed the analysis of government contractors before reporting their findings to system owners and other responsible parties
Charged with maintaining the integrity of hard drives and computers being investigated, ranging from unclassified to top secret SCI
Responsible to determine the severity and action taken on all detected and reported cyber security incidents.