Summary
Overview
Work History
Education
Skills
Certification
SIEM Configuration Hands on Lab
Vulnerability Assessment Hands on Lab
Timeline
Generic

Jared Lewis

Windsor Mill,MD

Summary

Results-driven IT Specialist with a proven track record at Senior Aerospace SSP, excelling in vulnerability management and email security. Skilled in Active Directory and VPN administration, I enhance system integrity while delivering exceptional technical support. My proactive approach and strong time management skills ensure optimal performance and security across all IT operations.

Overview

3
3
years of professional experience
1
1
Certification

Work History

IT Specialist

Senior Aerospace SSP
Burbank, CA
06.2024 - Current
  • Vulnerability and Patch Management: Monitor CVE monthly thresholds and address critical vulnerabilities.
  • Implement and maintain security patches for all endpoints, reducing system risks and enhancing security posture.
  • Determine which patches are security-related and which are optional or feature updates. Align patch priority with vulnerability findings.
  • VPN Administration: Administer and monitor VPN solutions, ensuring secure remote access to internal resources.
  • Monitor user authentication and VPN logs for abnormal behavior or suspicious locations.
  • Solve common user problems like connection drops, authentication errors, slow speeds, or client software issues.
  • Regularly review logs for failed login attempts, suspicious activities, or brute-force attempts.
  • Email Security Management: Manage email security policies, implement anti-phishing and anti-spam filters, and investigate email threats using DMARC and SPF protocols to protect the organization from malicious email attacks.
  • Manage block/safe sender lists and investigate quarantined emails. Review and release (or block) legitimate emails caught in quarantine.
  • Trace source IPs, sender domains, and examine email headers.
  • Share tips to users on recognizing phishing, BEC (Business Email Compromise), and social engineering attacks.
  • Endpoint Security: Perform malware scans on flagged endpoints.
  • Administer application deployment to endpoints. Whitelisting Critical Applications as needed. Make sure all endpoints are online, protected, and reporting in. Identify offline or non-compliant devices quickly.
  • Network Administration: Configure and manage routers and switches through Cisco. Monitor and manage network access and performance.
  • Windows Active Directory and MFA Administration: Manage user accounts and privileges within Windows AD. Administer DUO MFA for secure authentication. Help users with wired and wireless connectivity issues.
  • Hardware and Software Support: Troubleshoot and resolve hardware issues (Break/Fix).
  • Provide Tier 1 and Tier 2 Resolution,Install and configure hardware, software, and peripherals according to organizational standards.
  • (MDM) Mobile Device Management: Configure and administer mobile devices on Meraki MDM to ensure security and compliance. Ensure corporate apps are updated and functional.
  • Remotely lock, wipe, or selectively wipe devices. Adjust or revoke access for terminated employees or lost devices. Handle problems like failed policy applications, app installation errors, or authentication issues. Modify settings based on evolving company needs (e.g., disabling camera use, enforcing Wi-Fi settings).
  • File and Data Management: Perform file recovery and restoration. Manage drive access and permissions.
  • Compliance and Framework Knowledge: Familiarity with NIST Cybersecurity Framework (CSF). Assist in the development and application of organizational IT standards.
  • User Support and Training: Provide technical training to end users. Develop insights from field analysis to improve efficiency and security.

IT Support Technician

Commerce Casino
Los Angeles, CA
03.2023 - 06.2024
  • IT Support and Troubleshooting: Provide timely first- and second-level IT support to Commerce Casino staff. Diagnose and resolve system incidents, problems, and events through the IT Service Management (ITSM) system (e.g., ServiceNow). Proactively monitor and report on business system performance.
  • Account and System Administration: Manage user accounts and privileges in Active Directory.
  • Administer Microsoft 365 services, including SharePoint support, and shared drive access.
  • Oversee Intune management and deployment for mobile devices.
  • Administer WatchGuard Endpoint and LogMeIn access for secure remote connectivity.
  • Hardware and Software Management: Install, configure, and maintain hardware, software, and peripheral equipment in line with organizational standards. Provide support for Dell Latitude and OptiPlex PCs.
  • Manage VoIP phone setup, configuration, and maintenance.
  • Mobile Device Management (MDM): Monitor and maintain all devices through MDM solutions. Configure mobile devices for optimal functionality and compliance.
  • Network Administration: Troubleshoot network issues, and ensure connectivity across systems. Assist with VPN installations and configurations for secure remote access.
  • Asset and Inventory Management: Support IT asset management personnel with inventory tracking and asset control.
  • Collaboration Tools and Meeting Software: Manage and provide support for Microsoft Teams, and Zoom. Administer shared collaboration tools, and assist end users.
  • System Management and Monitoring: Administer SCCM for endpoint management and software deployment. Maintain system standards, track, and resolve issues as needed.
  • Training and User Support: Develop and deliver technical training to end users. Report actionable insights from field analysis to improve efficiency and customer experience.
  • Standards and Compliance: Assist with the development of IT standards, and ensure their application in day-to-day operations.

Customer Support and Application Management

Treat Wireless
Los Angeles, CA
01.2022 - 05.2022
  • Application Management: Manage and maintain customer online applications to ensure seamless functionality.
  • Assist customers throughout the application process, providing guidance, and resolving issues.
  • Customer Support: Respond to customer inquiries via phone, email, and chat support channels.
  • Address and resolve customer tickets using the designated ticket management system.
  • Troubleshooting and Technical Support: Diagnose and resolve issues with agents' tablets to ensure operational efficiency.
  • Reboot and reset customer login information as needed for account access.
  • Product Management: Oversee product supply to ensure availability and timely delivery to customers.

Education

Associate's degree - Cyber Security

Los Angeles City College
Los Angeles, CA
05.2025

High school diploma or GED -

Owings Mills High School

Skills

  • IOS Help Desk
  • Wireshark
  • Snort
  • Nessus
  • Active Directory
  • Technical support
  • TCP/IP
  • Time management
  • VPN
  • Computer networking
  • LAN
  • Mac OS
  • IT support
  • Information Security
  • Email security
  • LAN/WAN
  • Vulnerability management
  • TCP
  • Meraki
  • VMware
  • Microsoft Office
  • WAN
  • IT
  • Operating systems
  • Mobile device management
  • Windows
  • Jira
  • VoIP
  • Software Troubleshooting
  • SIEM tool proficiency

Certification

  • CompTIA Cysa+
  • CompTIA Security+
  • CompTIA A+

SIEM Configuration Hands on Lab

Elastic Stack SIEM Configuration And Management, Successfully implemented and configured Elastic SIEM in a home lab environment., Set up a Kali Linux virtual machine using VirtualBox, and installed an agent on the Linux machine to forward logs and telemetry to the Elastic SIEM., Created a custom alert query targeting all events with the action 'nmap_scan' designed to detect any variation of an Nmap scan performed on the endpoint., Configured alerts with a 'High Severity' classification, and set the alert action to automatically generate incident tickets in Jira.

Vulnerability Assessment Hands on Lab

Nessus Vulnerability Scan

Successfully set up and scanned my Windows 11 VM using Nessus. To ensure connectivity for

the scan, I initially disabled the firewall on the VM using the Windows Firewall Management

Console (wf.msc).

The primary goal was to perform a credentialed scan of the VM. To prepare for this, I enabled

the “Remote Registry”service, allowing the scanner to access the registry and identify potential

misconfigurations. Additionally, I turned on network discovery and enabled file and printer

sharing to facilitate seamless communication between Nessus and the target system.

In the Nessus configuration, I specified the target VMs IP address along with a valid

administrative username and password. Performing a credentialed scan provided deeper

access to the system, enabling the identification of vulnerabilities that could be exploited by

users with elevated privileges, such as insider threats.

Timeline

IT Specialist

Senior Aerospace SSP
06.2024 - Current

IT Support Technician

Commerce Casino
03.2023 - 06.2024

Customer Support and Application Management

Treat Wireless
01.2022 - 05.2022

Associate's degree - Cyber Security

Los Angeles City College

High school diploma or GED -

Owings Mills High School
Jared Lewis