Summary
Overview
Work History
Education
Skills
Timeline
Generic

William Holland

Haymarket,VA

Summary

Proactive Lead IT Specialist with years of experience overseeing accurate and efficient Unix/Linux Operating System performance. Responsible for providing installation, configuration, testing and maintenance of the Linux/Unix Operating Systems. Provided lead support for several mission critical applications. Supported in the migration of projects and applications newer equipment and Operating System versions. Installed various patches to fix security issues. Actively participated in the Information Technology Contingency Plan Exercises, Security Test and Evaluation. Assisted project teams with technical issues and supported the operations staff in executing, testing and providing technical solutions. Monitor and analyze audit and system logs for the O/S, firewall and web server access. Lead activities and participated in Disaster Recovery exercises for several applications, to ensure business continuity. Talented Technical Support Representative with gift for understanding needs of both business and home users. Versed in troubleshooting and desktop support on Windows, Linux and Mac systems. Proven skill in resolving problems quickly on first call.

Computer security professional with 20+ years of progressive experience in the IT Security industry. Demonstrated skill identifying business risks and compliance issues and designing proactive solutions. Background designing and implementing layered network security approaches. To seek and maintain full-time position that offers professional challenges utilizing interpersonal skills, excellent time management and problem-solving skills. Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.

Overview

24
24
years of professional experience

Work History

IT Security Specialist

Centers for Medicare & Medicaid Services
2003.04 - Current
  • Developed strong relationships with co-workers through regular communication about security solution progress and goals.
  • Participated in professional logic development workshops focused on innovative critical thinking strategies, continually refining my practice as a cyber warfare specialist.
  • Integrated technology tools into matrixed instruction, enhancing work engagement and facilitating interactive security experiences.
  • Guided critical thinking students in the development of solution skills, investigative strategies, and time management techniques, leading to increased security success.
  • Promoted critical thinking skills through inquiry-based lessons, challenging others to analyze complex problems from multiple perspectives.
  • Enhanced Cyber understanding by incorporating real-world applications and problem-solving techniques in regular meetings.
  • Collaborated with colleagues to develop interdisciplinary units, fostering connections between mathematical concepts and other subjects peculiar to ISSO and Cyber visibility.
  • Implemented engaging activities to reinforce mathematical skills, leading to increased mastery of content.
  • Utilized multimedia strategies and technology to convey information in fresh and interesting ways.
  • Improved analytical skills by introducing state-of-the-art computer program technologies.
  • Optimized firewall configurations, enhancing overall network security and threat prevention capabilities.
  • Ensured compliance with regulatory requirements such as GDPR, HIPAA, and PCI-DSS through diligent documentation and policy enforcement.
  • Conducted regular reviews and audits of third-party vendors to ensure their compliance with established security requirements and best practices.
  • Implemented data encryption at rest and in transit, safeguarding sensitive information from unauthorized access or exposure during transmission or storage.
  • Conducted thorough risk assessments for critical infrastructure, identifying key areas for improvement and mitigation strategies.
  • Developed comprehensive cybersecurity policies and procedures, resulting in a significant reduction in potential vulnerabilities.
  • Managed incident response efforts, efficiently resolving breaches and minimizing downtime for affected systems.
  • Streamlined patch management processes for software updates, reducing the risk of exploitation due to outdated applications or operating systems.
  • Coordinated disaster recovery planning efforts, developing comprehensive plans to ensure business continuity during unforeseen events or outages.
  • Enhanced IT security by implementing robust network monitoring and intrusion detection systems.
  • Designed secure network architecture that aligned with organizational goals while maintaining flexibility for future growth or changes in technology requirements.
  • Established strong relationships with industry peers and law enforcement agencies to facilitate cooperation during cyber incident investigations.
  • Fostered a strong security culture within the organization by promoting awareness campaigns, hosting educational events, and providing ongoing support for endusers.
  • Performed regular vulnerability scans and penetration tests to identify weaknesses in the IT infrastructure, addressing identified issues swiftly.
  • Evaluated emerging security technologies and trends, incorporating relevant solutions into the organization''s cybersecurity strategy.
  • Provided end-user training on best practices for data protection and secure system usage, leading to increased awareness and reduced incidents of human error.
  • Collaborated with cross-functional teams to ensure seamless integration of security measures across all business units.
  • Conducted security audits to identify vulnerabilities.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Recommend improvements in security systems and procedures.
  • Participated in creation of device hardening techniques and protocols.
  • Created cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.
  • Developed and maintained incident response protocols to mitigate damage and liability during security breaches.
  • Authored security incident reports, highlighting breaches, vulnerabilities and remedial measures.
  • Verified strength of network security measures such as Zero Trust and End Point Security through external intrusion testing services.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Monitored use of data files and regulated access to protect secure information.
  • Encrypted data and erected firewalls to protect confidential information.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Reviewed violations of computer security procedures and developed mitigation plans.
  • Researched and developed new computer forensic tools.

Lead Product Administrator GS-2210/13

Centers for Medicare and Medicaid
2000.08 - Current

Additionally, provide SME technical and administrative leadership support for several critical applications. Provide training, procedures, and guidance to less experienced team members.

Monitor the operation of FISMA systems, network and hardware in the Unix/Linux environments. Respond immediately to any system or OBM tickets generated to prevent any interruption in service. Support the installation, testing and maintenance of network and COTS software, such as

* JBoss

* Weblogic

* VMware

*NetBackup

*Veritas cluster

*Batcave

*Greenfield

QAS. Provide any needed support for debugging any issues with the software, installs and patching.

Responsible for critical applications such as, OL5081, Kisam, TAPS/SETR, IFS, EQRS

Routinely monitor and analyze system and audit logs to ensure the integrity of the operating system. Conducted routine maintenance on servers and systems, keeping networks fully operational during peak periods. Support Linux environments for on-site and virtual locations. Established as an expert system administrator for Unix/, policy REHL environment policy planning and implementation.

Lead Full Stack Developer

Social Security Administration Headquarters
2000.04 - 2002.06
  • Developed reusable UI components utilizing modern frontend libraries such as React or AngularJS for consistent design across multiple projects.
  • Contributed C++ driver technology to open-source projects and participated in industry conferences to stay current on emerging technologies and trends.
  • Enhanced team productivity by automating repetitive tasks and implementing custom tools/scripts tailored towards specific project needs. Developed the framework for the Cost Effective Measurement System (CEMS) which creates the national minimum wage calculation.
  • Ensured data integrity by designing robust database schemas that effectively support complex business logic requirements. Effectively joined ORACLE with problematic applications in a virtual server environment using the C language constructs.

Education

Bachelor of Science - Information Systems Management

University of Maryland
College Park, MD

Skills

  • Training and mentoring
  • Security Awareness Training
  • Problem-solving abilities
  • Team Collaboration
  • Team building
  • Security metrics

Timeline

IT Security Specialist

Centers for Medicare & Medicaid Services
2003.04 - Current

Lead Product Administrator GS-2210/13

Centers for Medicare and Medicaid
2000.08 - Current

Lead Full Stack Developer

Social Security Administration Headquarters
2000.04 - 2002.06

Bachelor of Science - Information Systems Management

University of Maryland
William Holland