Kevin E. Martin
8865 Rollright Court, Unit A
Columbia, MD 21045
Cell: (443) 300-6037
Email: kevinemartin21@gmail.com
Education:Prince
George’s Community College
Major:
Information Technology
Cisco
Certified Security Professional (CCSP)
Cisco
Certified Network Associate Voice (CCNA Voice)
Integrating Cisco Unified Communications Applications (CCNP Voice)
Implementing Cisco Unified Communications Manager, Part 1 (CCNP
Voice)
Certified
Ethical Hacker
Microsoft
Certified Professional (MCP)
Security+
Security
Clearance Level: Top Secret
Summary of Experience:
My depth of experience has given me a
solid knowledge base of data methodology, software and system applications,
equipment configurations, procurement, safeguarding corporate data and
disaster recovery. My diverse experiences have, provided me with an
extensive knowledge of data processing, network processing, networking
policies, standards and guidelines utilized in the Federal Government and the
private sector.
I have over sixteen years of combined
expertise in computer support, installing and implementing networks, server
maintenance, upgrades, Cisco routers, Cisco switch configuration, and network
security.
Currently
I am responsible for managing and review documentations, evaluations, and
testing of information technology processes and information security controls
in the Walter Reed Army Institute of Research (WRAIR) enclave. Manage the
security aspects of the information system and day-to-day security operations
and prepare the Plan of Action and Milestones (POA&M) for the management.
Performs security audit support, change management, security configuration
management, incident handling in accordance with DoD requirements. Performs
security analysis as part of the system acquisition process in the according
to vulnerability, risk, security features, and technical areas. Performs
incident investigations, review system audit trails, and create executive
summary reports for the command and the regional cyber center, and coordinate
corrective actions as appropriate. Performs security analysis as part of the
system acquisition process in the according to vulnerability, risk, security
features, and technical areas. Performs incident investigations, review
system audit trails, and create executive summary reports for the command and
the regional cyber center, and coordinate corrective actions as appropriate.
Ensures compliance for DIACAP annual review and reaccreditation evaluation
and prepares the new accreditation package for the transition to Risk
Management Framework (RMF).
My
network experience includes working with Cisco and Brocade switches and
routers, and Lumeta’s IPSonar Network Discovery Tool. My server experience
includes Microsoft Servers and NetWare Servers installation, configuration,
support, and troubleshooting. My security experiences include Cisco
Secure PIX firewall, Cisco Adaptive Security Appliance (ASA), Cisco Security
Agent (CSA), Cisco Adaptive Security Device Manager (ASDM), Cisco Router and
Security Device Manager (SDM), Cisco Network Intrusion Detection Systems
(IDS), Cisco Network Intrusion Prevention Systems (IPS) and Host Intrusion
Prevention (HIP).
My
remote access experiences include the Installation and Configuration of PIX
firewall, Cisco ASA, and working knowledge of Remote and Site-to-Site VPN on
Cisco router. My routed and routing protocol experiences include IP, IP
Multicasting, IPX, RIP, IGRP, EIGRP, and OSPF. My encapsulation experiences
include Frame-relay, x25, HDLC, and PPP. I optimized WANs through Internet
with an access solution that reduce bandwidth and reduces WAN costs using
features such as Filtering with Access Lists, Policy-Base routing, NAT, and DDR.
Detailed Experience:
Naval Medical Research Center
Cyber
Security Specialist
Clearance
Level: Top Secret
October
2015 to Present
I
lead a team of four assigned to WRAIR / NMRC for the Pre-DIACAP assessment.
Corrected and documented progress and updates to the Plan of Actions &
Milestones (POA&M) associated to the Mitigation Project for pre-DIACAP
evaluation and post DIACAP assessment for WRAIR and NMRC. Assured that manual
and automated patch management are completed, using Microsoft Windows Server
Update Services (WSUS) and Microsoft System Center Configuration Manager
(SCCM) to ensure compliance of all endpoints.
Provided
comprehensive Bi-weekly progress reports detailing vulnerability status,
affected systems, category, and severity codes collected from ACAS
Vulnerability Scan results. Recommended proper mitigation plans of affected
assets in preparation for DIACAP assessment. Ensured all systems are
configured in accordance of DISA Security Technical Implementation Guide
(STIG) and performed local network security analysis within the NMRC
accreditation boundary. Create policy and procedures for the IT
department.
Army
Review Boards Agency
Information Security
Analysis/Information Assurance Specialist
Clearance Level: Top Secret
January 2013 to September 2015
ARBA Point of Contact for Single Agency
Manager (SAM), which provides Pentagon Information Technology Services for
National Defense community and manages, operates, and maintains IT services
for the Pentagon. Work with SAM if data is compromised and decide steps
to resolve the security issue.
Compile data for cyber forensics
following a breach. Implement procedures for monitoring the use of
ACTS-related data files and to regulate access, in order to safeguard
information in computer files.
Verify information stored on (and/or
transmitted via) ARBA computers or networks is not disclosed to unwanted
parties or modified inadvertently. Responsible for completing
Certification and Accreditation for the agency. I use the Security Technical
Implementation Guide (STIG) to manually scan the network and use the SCAP
Tool electronically scan the network. I use this information to create a
report to give the Systems Engineers, Network Engineers, and Developers to
resolve non-compliant STIGs. I use ACAS Tenable for weekly vulnerability
scans. These vulnerability reports are used for the Systems Engineers to
verify previous findings have been resolved, software updates have been
properly applied, and to see new findings. Review and research IAVM(s) from
weekly ACAS Tenable Scans. Create Plan of Action and Milestones (POA&M).
Use ElasticSearch Logstash Kabana (ELK) to collect, centralize,
and review logs.
DISA
Systems Administrator
Clearance Level: Top Secret
October 2011 to November 2012
Maintain and support the IPsonar
environment by performing IPsonar deployments, installations, and upgrades on
customers’ network. Provide Tier III help desk and systems support of
IPsonar and FreeBSD systems integration with troubleshooting, problem resolution
and escalating to development team as needed per policies and procedures.
Interface with network support team to troubleshoot connectivity issues,
maintain network security, and improve connectivity. Monitor performance,
tune, and maintain historical performance data to make and implement
recommendations for improvement as necessary. Perform IPsonar scanning
and reporting in support of cyber security activities, document and report
system metrics and scan results. Have working knowledge of Vulnerability
Management System (VMS) updating IAVA’s per Retina scan results, mitigating
vulnerabilities on systems/software procedures.
Walter Reed Army Medical Center
Network Engineer
June 2008 to September 2011
Member of the Change Control Board that
determines which applications, hardware, and software will be allowed on the
network. Member of the Data Migration Team that determines which routers,
switches, circuits, servers, data, and applications will be relocated/disabled
to different Army Bases. Supervise a team of Network Engineers when traveling
to other Army Bases to inspect their network infrastructure. When doing
inspections I follow the guidelines of MEDCOM/OTSG Reg. 25-1 and Army
Regulation 25-2. While onsite I assist Network Engineers with making any
changes to the network if needed. Interview potential candidates for Network
Engineer positions. Use Retina Network Security Scanner to identify
vulnerabilities and scan operating systems. Use Wireshark to troubleshoot
sources of network issues and traffic. Use Cisco ASA Firewalls and PIX
Firewalls to monitor the network. Use Kiwi Syslog to monitor the network.
Installed and configured Cisco routers and Foundry switches. Assist in
the management of over 200 routers and switches. Maintain inventory for
all switches and routers for Walter Reed Army Medical Center.
Responsible for shipping and receiving IT hardware such as switches, routers,
network management cards, network modules, and GBICs.
District Government
Office of Chief Medical Examiner
Computer Specialist
September 2001 to April 2008
Installed and configured Cisco ASA and
Cisco Secure PIX Firewall, Cisco Network Intrusion Detection System (IDS),
and Cisco Security Agent (CSA). Installed and configured Windows 2003
Servers, VPN on Cisco router, and PIX firewall. Configured, monitored, and
maintain agency IDS to ensure that users are not infecting/attacking any
internal or external devices due to vulnerabilities/worms. Monitored
and maintained agency firewalls, ensuring that the software is up to date,
filters are operating properly and log messages do not indicate any issues
associated with the firewall or the policies applied to the firewall. I
installed Cisco Security Agent and configured groups, managed hosts, and
configured policies using Cisco Security Agent Management Center. In
addition, I evaluate hardware/software and take into account the operational
impact of the products to make sure it works effectively and
efficiently. I also requested quotes from vendors and did a cost
benefit analysis on the products. After, analyzing the products I use
Procurement Automated Support System (PASS) to order IT hardware, software,
and supplies.
Merck
Network Operator
August 99 to September 01
Installed, configured, maintained, and
troubleshoot Novell Servers, Microsoft Servers, Cisco routers and
switches. Troubleshoot and monitored TCP/IP problems. Installed and
implemented IP configuration in a WAN environment. Installed, configured,
and operated routed LAN, routed WAN, switched LAN networks, and DDR
connectivity. Optimized WANs through Internet with an access solution that
reduce bandwidth and reduces WAN costs using features such as Filtering with
Access Lists, Policy-Base routing, NAT, and DDR. Possess working
knowledge of routing protocols/policies including OSPF, HSRP, IP
Multicasting, VPN, and EIGRP. Monitored, configured, and troubleshoot
IP network via HP OpenView, CiscoWorks, Sniffer Pro, and Cisco IOS commands.
Installed and configured Windows 2000 Server Active Directory (AD).
This also included implementing and troubleshooting AD Group Policies.
I have also configured and supported multiple Windows NT Servers 4, Windows
2000 Servers, Novell Servers, and Windows 2000 Professional workstations for
LAN and WAN usage. Responsible for the purchasing of computer related
inventory for the company.