Summary
Overview
Work History
Education
Skills
Certification
Additional Information
References
Timeline
Generic

Mark Somerscales

National City,CA

Summary

Trusted Network Security Engineer with 22 years of progressively responsible IA experience, including 16 years of experience with Endpoint Security software configuration, management and administration, module deployment, policy development, tuning, troubleshooting and client task configuration for the purpose of protecting the US Navy against bad actors from disrupting operations. Serves as primary safeguard against external threats. Educates colleagues and customers on best practices and network safety protocols. Protects networked assets through both preventive and reactionary measures.

Overview

28
28
years of professional experience
1
1
Certification

Work History

Senior Information Security Engineer

Booz Allen Hamilton
08.2016 - Current
  • Worked as team leader of Cybersecurity Design and Development (CDD) Project. Configured, managed, and administered Endpoint Security Solutions (ESS)/Host-Based Security System(HBSS) and Assured Compliance Assessment Solution (ACAS) software in the Development Integration Certification Environment (DICE) lab with the purpose of creating security policies and procedures to protect the US Navy fleet.
  • Deployed and configured ESS modules including the following: McAfee Agent (MA), Policy Auditor (PA), Data Loss Prevention (DLP), Host Intrusion Prevention (HIPS), Asset Compliance Configuration Module (ACCM), Rogue System Detection (RSD), McAfee Application Control (MAC), Virus Scan Enterprise (VSE) and Endpoint Security (ENS)
  • Maintained Operating System (OS) compatibility and module interoperability when deploying HBSS modules to Application Providers (AP). Worked interactively with 150+ APs on to develop and tune various firewall, intrusion prevention system, anti-virus and whitelisting policies for Application Integration test events on both Consolidated Afloat Networks & Enterprise Services (CANES) and Integrated Shipboard Network Systems (ISNS) networks, using best security practices to develop company-wide information assurance, security standards and procedures.
  • Maintained 4 ePolicy Orchestrator (ePO) servers within DICE lab, including executing of necessary tasks to implement HIPS content and DAT updates, maintain proper system tree assignment, module compliance, rogue sensor compliance and client tasks
  • Installed, configured, maintained, and troubleshot virtual environments including VMware Elastic Sky X (ESX), Microsoft Hyper-V and Agile Core Services (ACS)
  • Maintained and administered to 4 Tenable Security Centers and 14+ Nessus Scanners, to include: weekly plugin updates, functionality checks, account administration and software updates in support of the DICE lab
  • Performed multiple ACAS upgrades and submitted ACAS specific entries for the Computer Network Defense Operating System Environment (CND-OSE) 2.0 Troubleshooting Guide for submission on SPAWAR Acquisition Integrated Logistics Online Repository (SAILOR)
  • Executed ACAS scans as part of Application Integration (AI) Block System Integration Test (SIT) events, and troubleshot HBSS and ACAS integration issues
  • Performed troubleshooting of various Windows and Linux platforms in the DICE lab environment as necessary
  • Prepared for, conducted, and closed-out 150+ application integration test events for the CDD Project including TMIP-M, NITES-NEXT MV, JMPS, NAVY CASH and GBS, providing configuration reports for each. This process required configuration of modules, troubleshooting of applications, determining best security practices, network troubleshooting, customer interaction, policy exemptions and effective time management
  • Defined test scheduling methodology, and developed and maintained master test schedules
  • Regularly attended AI Integrated Product Team (IPT) and AI System Engineering (SE) IPT meetings, to act as CDD representative, as well as deliver technical briefs
  • Developed deliverables for the CDD Project, including daily status e-mails, weekly status rollup e-mails, test summaries, AP preliminary AI test schedules, CND-OSE baseline test plan results, trouble reports, AP Close-out Packages, AI CND & Cybersecurity Test Checklists, and other CDD documentation updates
  • Performed coordination, scheduling and advertisement of CDD Support Services Environment (SSE) to multiple AP providers
  • Crafted several individual test plans, as well as develop recurring event teaching documents for SSE events to include: Firewall teaching curriculums, IPS teaching curriculums and troubleshooting questionnaires. Completed hundreds of SSE events to provide a multitude of benefits through the service. The efforts surrounding the Support Services effort has impacted the Navy tremendously, garnering high praise from several teams
  • Provided engineering and technical support for several HBSS module updates, ePO upgrades and ACAS software updates, while submitting detailed testing procedures and results to government representation
  • Performed technical analysis on new technology, including Tanium, Hyper Converged Infrastructure (HCI), McAfee Management for Optimized Environments (MOVE) and Virtual Desktop Infrastructure (VDI)
  • Maintained ePO and ACAS server checks, including database backup checks, daily and weekly maintenance tasks.

HBSS Administrator

HPE
11.2014 - 08.2016
  • Worked as HBSS engineer in Cybersecurity department at NEDC, specifically establishing and maintaining host-based security and reliability of communications within infrastructure and various clients that it supports
  • Involved with maintenance, configuration, and manipulation of Host-Based Security System for Management Network of NEDC, as well as the various policies for the following products: Policy Auditor, McAfee Agent, DLP, Host Intrusion Prevention, Rogue System Detection, ePolicy Orchestrator, Virus Scan Enterprise, Splunk
  • Supported fully integrated data center that provided VMWARE installed environment that compliments over 600 dedicated servers to over 50 separately hosted customers
  • Was heavily involved with the process of compliance with Navy STIG regulations and configuration of HBSS program to meet those requirements
  • Required to perform administrative duties on various Windows and Unix platforms
  • Responsible for implementing a COOP site for supporting HBSS duties in case of failure
  • Worked to prepare for, and successfully pass the center's first CSI inspection.

HBSS Administrator/Network Security Engineer/Security Analyst/Team Supervisor

HP/EDS/Raytheon
09.2002 - 11.2014
  • Worked as a supervisor in the Information Assurance department of the NMCI network, specifically establishing and maintaining end to end security and reliability of communications within the enterprise supporting over 350,000 users
  • Involved with the maintenance, configuration, and usage of the following security tools to include but not limited to: Raptor Firewalls, Cisco IDS, Netprowler IDS, Manhunt IDS, Symantec Anti-Virus, Symantec Mail Security, Symantec Network Security, Intruder Alert & Netscreen VPN
  • Managed a team that supervises the coordination of the McAfee HBSS product for all workstations and servers for three individual networks, totaling over 250,000 nodes
  • Successfully implemented STIG settings in preparation for the Certification & Accreditation process to pass 7 CCRIs (Command Cybersecurity Readiness Inspections)
  • Required to perform administrative duties on various Windows and Unix platforms
  • Operated as a Tier 3 Helpdesk to provide streamlined, concise support to both users and administrators.

Information Systems Technician

US Navy
01.1997 - 09.2002
  • USS BONHOMME RICHARD (LHD-6) SAN Diego, CA Advance Network Analyst/Network Security Tech JAN 1997-SEP 2002
  • Designed hardware and software to work in concert taking into consideration compatibility, environmental constraints, growth potential, life cycle management, cost/performance analysis, and user feedback
  • Performed management and maintenance functions including inventory control of computer assets, software and configuration management, and user training and help desk management
  • Used commercial off the shelf software and operating system specific tools to perform virus protection and detection, system back up and data recovery, and auditing functions
  • Developed and implemented solutions, with regards to protocol and proxy service vulnerabilities, guarding against hostile attempts of compromise or inadvertent disclosure of sensitive material
  • Responsible for backing-up and restoring data, assigning or changing user accounts and passwords
  • Recognized microcomputer operating system (Windows NT, UNIX, and Novell Netware) vulnerabilities and performs corrective actions to ensure maximum system availability
  • Designed one of the first Websense Web Filtering Servers on a forward deployed mobile vessel
  • Managed and installed 8 MS Windows NT 4.0 Servers, 20 Alcatel Switches, and 2 Cisco routers running on 1 unclassified and 1 classified network providing service to 1600 users.

Education

Bachelor of Science - Information Systems

University of Arkansas - Grantham
Kansas City, MO
05.2009

Advanced Network Analyst - undefined

San Diego
San Diego, CA
11.2001

Information Systems Technician - undefined

Great Lakes
Great Lakes, IL
06.1997

Skills

  • Windows
  • Linux Red Hat
  • ESS/HBSS
  • ePolicy Orchestrator
  • Network Security
  • Intrusion Detection
  • Endpoint Security

Certification

  • CISSP - Certified Information Systems Security Professional
  • CCNA - Cisco Certified Network Associate
  • Security+
  • IAT Level 2
  • HBSS 301 Advanced

Additional Information

Retain an active Top Secret Security clearance with the U.S. Department of Defense.

References

  • Binh Duong, Cypher Analytics, PMW-160 Cybersecurity Lead, (619) 609-7470, binh.duong@cypheranalytics.com
  • Billy Helton, HP, Supervisor – IA Applications, (619)522-5541, Billy.helton@nmci-isf.com, Professional

Timeline

Senior Information Security Engineer

Booz Allen Hamilton
08.2016 - Current

HBSS Administrator

HPE
11.2014 - 08.2016

HBSS Administrator/Network Security Engineer/Security Analyst/Team Supervisor

HP/EDS/Raytheon
09.2002 - 11.2014

Information Systems Technician

US Navy
01.1997 - 09.2002

Bachelor of Science - Information Systems

University of Arkansas - Grantham

Advanced Network Analyst - undefined

San Diego

Information Systems Technician - undefined

Great Lakes
Mark Somerscales