Summary
Overview
Work History
Education
Skills
Accomplishments
Timeline
Generic

Donovan McMullin

Smithsburg,MD

Summary

I am an InfoSec Specialist with over 25 years’ experience in Information Security including Unix system administration, system design and implementation, disaster recovery planning and implementation, ecommerce security, data assurance, InfoSec policy design and management, extensive experience with Local Area Networks, Hardware, Unix, Linux, Windows, Risk Models and many Applications.

Shrewd Security Specialist possessing 15 years acumen directly handling risk-related aspects of technology and data management. Maintains exceptional systematic compliance with policy and guidelines to assess vulnerability and protect crucial information. Thorough consultation throughout technology roadmap, design, and launch. Factors latest protocols governing vulnerability assessment to determine internal security policy.

Offering solid grasp of cybersecurity principles and strong desire to develop within this field. Conducts thorough research and stays updated on emerging threats and security technologies. Ready to use and develop skills in threat analysis and risk management in supervisory role. Information security professional with strong expertise in risk management, network security, and threat mitigation. Skilled in vulnerability assessment, incident response, and data protection, with reliable focus on team collaboration and delivering results. Adaptable to evolving security challenges, ensuring robust defenses and compliance with industry standards. Known for integrity, reliability, and effective communication within cross-functional teams. Experienced with identifying and addressing security vulnerabilities. Utilizes expertise in threat detection and incident response to protect critical data. Strong understanding of risk management and compliance, ensuring robust and secure information systems. Developed skills in high-stakes cybersecurity environment, with focus on safeguarding data and preventing security breaches. Demonstrates proficiency in identifying vulnerabilities and implementing effective security solutions. Seeking to transition into new field where analytical and problem-solving skills can be leveraged to drive success. Information security professional known for maintaining high standards and achieving impactful results. Extensive experience in designing and enforcing security measures to protect organizational data. Highly collaborative team player known for adapting to dynamic environments and delivering reliable solutions. Skilled in threat analysis, risk management, and regulatory compliance, valued for integrity and problem-solving abilities.

Overview

26
26
years of professional experience

Work History

Information Security Specialist

Social Security Administration
01.2013 - Current
  • Scope of operating systems include all major UNIX/Linux kernel releases
  • Research and analyze UNIX Security Compliance Data based on the SSA RISK Model and Practical InfoSec Policies
  • Create Reports for the UNIX/Linux functional groups and SSA Management using Splunk Enterprise based on InfoSec Policies and Supported functional groups with extensive knowledge needed to correct Unix/Linux system security holes and configuration errors which could lead to unauthorized system access or a breach in data
  • Develop Splunk Dashboards used to alert end users of security findings and provide information to facilitate corrective actions
  • Assess agency exposure to CISA/KEV findings
  • Produce and publish vulnerability metrics for management using Splunk
  • Create comprehensive reports to assist in remediation of KEV findings
  • System hardware sizing, configuration and design based on application need
  • Wireless device tracking and remediation
  • Rouge device tracking using Mac address and Switch location
  • Support functional groups with knowledge of UNIX/Linux security when needed to correct security and configuration errors
  • Maintain updated knowledge of Federal security requirements
  • Oracle database security admin
  • Oracle database security compliance using dbProtect
  • Unix System Security Administration
  • Unix operating system security compliance (Current Federal Standards) using MacAfee ePO
  • IT Forensic processes
  • McAfee ePolicy Orchestrator
  • WarDialer processing and remediation
  • Encase Enterprise for Data Requests
  • Training contact for new Contractors and Federal Employees to the group
  • Splunk Enterprise
  • MS Excel used for reports and management graphics to represent data
  • MS SharePoint to collaborate with the functional groups

SSA UNIX Security Team

OBX TEK
01.2010 - 01.2013
  • Scope of operating systems included HP, AIX, Solaris 8, 9, 10
  • Research and analyze UNIX Security Compliance Data based on the SSA RISK Model and Practical InfoSec Policies
  • Create Reports for the UNIX functional groups and SSA Management that reflect compliance status for the agency based on InfoSec Policies and Supported functional groups with extensive knowledge needed to correct Unix system security holes and configuration errors which could lead to unauthorized system access or a breach in data
  • System hardware sizing, configuration and design based on application need
  • Wireless device tracking and remediation
  • Rouge device tracking using Mac address and Switch location
  • Support functional groups with knowledge of UNIX security when needed to correct security and configuration errors
  • Maintain updated knowledge of DISA security requirements
  • Security investigation using system memory data
  • Internet misuse evidence gathering using system images and memory captures
  • Oracle database security admin
  • Oracle database security compliance using dbProtect
  • Unix System Security Administration
  • Unix operating system security compliance (NIST/CIS Standards) using MacAfee ePO
  • Backtrack Admin
  • CA Etrust Policy Compliance
  • Nmap
  • HBgary
  • IT Forensic processes
  • McAfee ePolicy Orchestrator
  • WarDialer processing and remediation
  • MS Excel used for reports and management graphics to represent data
  • MS SharePoint to collaborate with the functional groups

Technical Staff

Aureus Solutions
01.1999 - 01.2013
  • Contract Support for IBM products, Deployed and enforced security policy; prevented network intrusions through the use of practical InfoSec policies
  • Managed the server infrastructure that protected and provided for the availability of user data on a Unix/Linux/Windows Network
  • Maintained and protected LAN infrastructure in a manner that prevents unauthorized access and ensures confidentiality, integrity and availability of data
  • Designed and Implemented Data Assurance and Disaster Recovery infrastructure
  • Provided functional support in the secure and timely process of protecting system and user data against loss and corruption
  • IBM Content Manager Installation, Admin, and Support
  • IBM Lotus Notes Installation, Admin, and Support
  • Linux and AIX System Administration
  • Linux and AIX Security Administration
  • Tivoli Storage Manager used in design and implementation of Disaster Recover Plans
  • DB2 Security Administration, Configuration, Tuning and Hardware sizing
  • Managed all trouble tickets for IBM products and installations for current contracts

SSA Unix Security Support Technician

Aureus Solutions Inc.
01.2007 - 12.2009
  • Scope of operating systems included HP, AIX, Solaris 8, 9, 10, Windows
  • Assisted developers and end users in following InfoSec policy; worked as first-tier support for preventing configuration errors and security holes preventing malware and unauthorized system access
  • Etrust Directory Admin
  • Etrust Access Control Admin
  • On Unix/Linux OS
  • Experienced in setting and meeting deadlines, planning and developing methods for computerizing a range of business tasks relating to UNIX security
  • Providing support of IBM and CA security software on SSA network
  • Optimum trouble shooting and problem solving abilities developed
  • Managing the eTrust Policy Compliance system, ensuring the appropriate level of service as required by customer needs
  • Served as Customer Liaison between the Risk Model team, Security Compliance, and CA support and development
  • Lead on eTrust Access Control upgrades, testing and problem resolution

Education

IBM Tivoli Storage Manager Certified Admin -

IBM training center

IBM/Lotus Lotus Notes Email Certified Admin - Texas

IBM Training Center
01.2005

IBM/Redhat/AIX Certified Systems Admin. - Texas

IBM training center
01.2004

IBM/Redhat/AIX Certified Security Admin. - Texas

IBM training center
01.2004

IBM Content Manager Certified Admin - Texas

IBM training center
01.2004

IBM DB2 Certified Admin - Texas

IBM training center
01.2004

Associates Degree - Computer Science

Frederick Community College
01.1999

Certificate - Network Administration

Frederick Community College
01.1999

Certified Novell Admin. - NW4.0 and 5.0

Frederick Community College
01.1999

Certified Novell Engineer -

Frederick Community College
01.1999

Certificate - systems programming using C, C++, VB, Fortran

Frederick Community College
01.1999

Skills

  • Cybersecurity strategy
  • Vulnerability assessment
  • Threat intelligence
  • Security awareness training

Accomplishments

  • Supervised team of 4 staff members.
  • Documented and resolved [Issue] which led to [Results].

Timeline

Information Security Specialist

Social Security Administration
01.2013 - Current

SSA UNIX Security Team

OBX TEK
01.2010 - 01.2013

SSA Unix Security Support Technician

Aureus Solutions Inc.
01.2007 - 12.2009

Technical Staff

Aureus Solutions
01.1999 - 01.2013

IBM/Redhat/AIX Certified Systems Admin. - Texas

IBM training center

IBM/Redhat/AIX Certified Security Admin. - Texas

IBM training center

IBM Content Manager Certified Admin - Texas

IBM training center

IBM DB2 Certified Admin - Texas

IBM training center

Associates Degree - Computer Science

Frederick Community College

Certificate - Network Administration

Frederick Community College

Certified Novell Admin. - NW4.0 and 5.0

Frederick Community College

Certified Novell Engineer -

Frederick Community College

Certificate - systems programming using C, C++, VB, Fortran

Frederick Community College

IBM Tivoli Storage Manager Certified Admin -

IBM training center

IBM/Lotus Lotus Notes Email Certified Admin - Texas

IBM Training Center
Donovan McMullin