Continuous threat hunting in Azure, AWS and On Prem servers, for customers and Paradigm
Used monitoring tools such as Alert Logic, Sentinel 1, MS Sentinel, ESET and Tenable
Phishing analysis, defense and training through Mimecast
Provided input to Cybersecurity security policies and practices
Implemented, maintained and monitored Microsoft Defender (SIEM)
Enforced and monitored regulatory compliance controls
Participated and lead multiple investigations and responses to cybersecurity violations/incidents
Guided Cloud and IT Teams through proper firewall configuration and best practices
Maintained and defended DNS host names through CloudFlare (Tunnels, WAFs, etc)
Analyzed system logs to identify malicious behavior or attempts at unauthorized access.
Performed system maintenance by handling security verifications of systems and processes.
Network and Security Administrator
SOFware LLC
Remote
03.2022 - 07.2022
Maintained hardware purchased by customers and company
Used Ansible to create playbooks and deploy company app to clients
Configured firewalls and LTE networking on all company and client devices
Created policy and procedures to enhance security protocol and implemented chain of custody on hardware
Improved company security posture to fall in line with NIST standards
Actively defended the network against cyber threats
Managed the deployments and security of AWS and Azure Vms and networks.
Network and Security Administrator
Utah Imaging Associates
Farmington, Utah
09.2021 - 03.2022
SOFware
Rebuilt the company network from the ground up after a data breach and hardened security through policies, ACL’s, VLANS, upgraded firewalls, and other networking equipment with best practices
Conducted white box testing on new networks and security measures were implemented
Actively monitor network and endpoints using ZabbNetFlowNetFlow tools
Created policy and procedures to enhance security protocol and implemented chain of custody on hardware
Implemented SD WAN to help reduce outages and downtime
Ensured security with end point protection and network monitoring tools.
ISSO
309th /Software Engineering Group
Hill Air Force Base, Utah
04.2021 - 09.2021
Actively participated in network and systems design to ensure implementation of viable systems security policies and procedures
Conduct systems security evaluations, audits and reviews; and develop Automated Information Systems (AIS) security contingency plans and disaster recovery procedures
Monitor and track controlled Special Access Programs (SAP) to ensure implementation and viability of proper systems security policies, as well as the acquisition of IT security tools
Investigate local AIS programs to identify possible breach of security and/or other violations
Managed the security of 20 Azure Virtual Machines.
IT Lead
Providence Group
Farmington, Utah
01.2020 - 01.2021
Supervised four-person team of Help Desk Engineers
Developed and implemented effective training program for new IT professionals when company migrated to a local IT department from an outsourced environment
Updated and created group policies and security posture ideologies
Executed elevated infrastructure and network security to include: Firewalls, IDS/IPS, and backup systems
Mastery Knowledge of HIPPA laws and requirements for compliance
Administration of multiple Windows 2016 and 2019 servers On-Prem and within Azure.
IT /Cyber Security Administrator
GWI Steel
Ogden, Utah
01.2014 - 01.2020
Deployed and managed 15 Linux/Windows servers
Configured group policies and security posture for the company
Assemble hardware and imaged hundreds of devices to include: Apple Computers/iPad, Microsoft Laptops/Desktops, and Company cellular devices
Installed network switches, IDS/IPS and monitoring network logs
Managed the security and operation of devices though End Point Protection
Managed IT department budget of $50,000 for the fiscal year and purchased equipment for personnel
Configured DNS and web applications.
Audited company's legal documents to verify compliant policies and procedures.
Maintained up-to-date knowledge of cybersecurity trends, threats, and vulnerabilities.
Researched emerging threats using threat intelligence sources.