Summary
Overview
Work History
Education
Skills
Certification
Timeline
SeniorSoftwareEngineer
Kenneth Bailey

Kenneth Bailey

Grovetown,Ga

Summary

Reliable professional versed in overseeing and performing network penetration tests to evaluate and mitigate risk. Reviews current protocols and suggests actionable improvements to bolster security and support corrective action planning. Valued leader and team member displayed exemplary conduct under pressure while providing guidance and direction to team. Demonstrated excellent organizational skills and ability to think strategically. Trained and mentored new personnel and developed effective working relationships with other service branches.

Overview

18
18
years of professional experience
3
3

Certifications

Work History

CyberSecurity Analyst

United States AirForce
07.2005 - Current
  • Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations
  • Perform data backups and disaster recovery operations
  • Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary
  • Plan, coordinate, and implement network security measures to protect data, software, and hardware
  • Configure, monitor, and maintain email applications or virus protection software
  • Operate master consoles to monitor the performance of computer systems and networks, and to coordinate computer network access and use
  • Load computer tapes and disks, and install software and printer paper or forms
  • Design, configure, and test computer hardware, networking software and operating system software
  • Monitor network performance to determine whether adjustments need to be made, and to determine where changes will need to be made in the future
  • Confer with network users about how to solve existing system problems
  • Research new technologies by attending seminars, reading trade articles, or taking classes, and implement or recommend the implementation of new technologies
  • Analyze equipment performance records to determine the need for repair or replacement
  • Implement and provide technical support for voice services and equipment, such as private branch exchange, voice mail system, and telecom system
  • Maintain an inventory of parts for emergency repairs
  • Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes
  • Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements
  • Train people in computer system use
  • Coordinate with vendors and with company personnel to facilitate purchases
  • Perform routine network startup and shutdown procedures, and maintain control records
  • Maintain logs related to network functions, as well as maintenance and repair records
  • Back up or modify applications and related data to provide for disaster recovery
  • Determine sources of web page or server problems, and take action to correct such problems
  • Review or update web page content or links in a timely manner, using appropriate tools
  • Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel
  • Oversee the daily performance of computer systems
  • Answer user inquiries regarding computer software or hardware operation to resolve problems
  • Enter commands and observe system functioning to verify correct operations and detect errors.

Vulnerability Assessment and Penetration Tester

USAF
07.2005 - Current
  • Designed tests and tools to break into security-protected applications and networks to probe for vulnerabilities.
  • Developed risk assessment reports to identify threats and vulnerabilities.
  • Collaborated with external vendors to perform penetration tests on network devices, operating systems and databases.
  • Conducted and participated in annual disaster recovery exercises.
  • Conducted risk analysis, system certifications, auditing, security documentation and security testing.
  • Analyzed security policies for usefulness and value to suggest security policy improvements.
  • Assessed threats, risks and vulnerabilities from emerging security issues to advise pertinent stakeholders on appropriate measures.
  • Conducted IT audit assessments for systems or applications to recommend solutions to mitigate risks.
  • Recommended IT security improvements to achieve system confidentiality, integrity and availability.
  • Developed solutions to security issues such as temperature, humidity, vandalism and natural disasters.
  • Skilled at working independently and collaboratively in a team environment.
  • Self-motivated, with a strong sense of personal responsibility.
  • Proven ability to learn quickly and adapt to new situations.
  • Managed time efficiently in order to complete all tasks within deadlines.

Project Manager

USAF
05.2016 - 01.2022
  • Planned, designed, and scheduled phases for large projects.
  • Monitored project performance to identify areas of improvement and make adjustments.
  • Coordinated with cross-functional teams to resolve project issues and mitigate risks.
  • Achieved project deadlines by coordinating with contractors to manage performance.
  • Led and managed staff of 10 team members engaged in administering complex IT infrastructure.
  • Outlined work plans, determined resources, wrote timelines, and generated initial budgets as part of project scope determination.
  • Proposed and implemented system enhancements to improve performance and reliability of storage environment.
  • Designed, documented and executed system upgrades and patch management using update manager.
  • Managed projects from procurement to commission.
  • Drafted project reports to identify successful outcomes, insights and future recommendations.

Education

Associate - Information Technology

Community College of The Air Force
02.2019

A.S - Cyber Security

Skills

  • Source Code Review
  • Intrusion Detection System (IDS)
  • Test Results Evaluation
  • Cloud Security Application
  • Threat Assessment
  • Test Automation Software
  • VMware Virtualization
  • Bug Fixes
  • Design Modification
  • Work Orders
  • Identifying Risks
  • Requirements Traceability Matrix (RTM)

Certification

Comptia Security+ Comptia A+ Comptia Network+ EC-Council Certified Ethical Hacker

Timeline

Project Manager

USAF
05.2016 - 01.2022

Vulnerability Assessment and Penetration Tester

USAF
07.2005 - Current

CyberSecurity Analyst

United States AirForce
07.2005 - Current

Associate - Information Technology

Community College of The Air Force

A.S - Cyber Security

Kenneth Bailey