From:                              route@monster.com

Sent:                               Monday, October 24, 2016 11:02 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: Network ADMIN ccna

 

This resume has been forwarded to you at the request of Monster User xapeix03

Jesse Swaringen 

Last updated:  10/17/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Chesapeake, VA  23320
US

Mobile: 757-575-8102   
jbswaringen@gmail.com
Contact Preference:  Mobile Phone

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Jesse Swaringen - Information Systems Security Analyst

Resume Value: 5qvnrgbk8ja64irz   

  

 

Jesse B. Swaringen
Chesapeake, VA 23320
—— Mobile: 757-575-8102 —— Work: 757-417-7896 —— E-Mail: jbswaringen@gmail.com
Objective: To obtain a professional information systems security analyst position supporting enterprise-level
LAN/WAN architectures, organizational policies, information assurance and cyber security.
Education and Certifications
o BS Business Management Information Systems: Information Assurance, Liberty University (Projected:
Spring 2018). GPA: 3.47
o Industry Certifications: CompTIA Security+, CompTIA Linux+, DoD 8570 IAT II, CCNA Routing and
Switching, CCNA Security, CCNP ROUTE, Wireshark Certified Network Analyst (WCNA, Projected: 1115-16)
Government
Security Clearance
Active TS/SCI (Renewed 08/29/2015)
Professional Work Experience
Cyber Security Analyst
(TS/SCI)
NIOC, Navy Blue Team
(Norfolk, VA)
Aug 2014 to Present
o Security Analyst: Responsible for conducting vulnerability analysis on Naval networks to include
classified/unclassified assets, unauthorized applications/malware, open ports, internal and external
connections, unauthorized USB devices, network administration behavior.
o Network Vulnerability Auditor: Performed network vulnerability scans for Information Assurance (IA)
vulnerability management compliance in accordance with Naval Network Warfare Command’s
(NETWARCOM) Cyber Security Inspection Certification Program (CSICP). Audit items: network
infrastructure, DNS, wireless security, enclave review, Host Based Security System (HBSS) review,
traditional/physical security, access management and Security Technical Implementation Guide (STIG)
review.
o IT Instructor: Provided classroom computer network defense and IT training to Navy network/system
administrators and Navy Blue Team members and instructed CNTT (Computer Network Team Trainer).
Course topics included: malicious/unauthorized connections, network security requirements, ACL’s, logs,
Microsoft ISA/Firewall, COMPOSE tools, eEye Retina/VRAM/ACAS and router configurations.
o Hardware/Software Supported: VMware VSphere Server 5.5, MySQL Workbench 6.2, Red Hat Enterprise
Linux (RHEL), Bluescope 2.2 (NSA) and Windows Server 2K/2K3/2K8/2K12R2.
o Knowledge Management Team Member: Responsible for providing process improvement of critical
command functions and ensuring decision makers possessed access to necessary knowledge. Team lead for
the command check-in project: dedicated over 840 hours to research, analysis, and implementation of a newarrival
process to ensure all members (MIL/CIV/CTR) successfully and accurately complete check-in.
o SharePoint Site Administrator: Directly responsible for user account management for over one-thousand
personnel in four Navy commands. Created new permissions groups and new sub-sites. Conducted periodic
reviews of designated sites to ensure appropriate use and to ensure user content meets standards.
Navy Information Systems
Administrator School- 2791
(Unclassified)
Virginia Beach, VA
Mar 2014 to Aug 2014
o Network Operations: Administration, maintenance, network analysis/design, testing and evaluate network
systems. Research and recommend network and data communications hardware and software solutions.
Perform network enterprise architecture requirements and cyber security. Defend Navy networks from cyber
threats utilizing Defense in depth methodology.
o Administrative Functions: Provide technical assistance concerning the use of computer hardware and
software, including printing, installation, Microsoft Office products, electronic mail, and operating systems.
They conduct help desk functions and repair fiber optics and a variety of cables. Conduct day-to-day
operations such as system backups and restores, and add, modify, or delete user accounts. They install
operating systems, applications and peripherals, troubleshoot user problems, debug command language
scripts, and assist the Information Systems Security Officer (ISSO) in access control security (i.e., passwords,
access control lists).
Network Administrator (TS/SCI) USS ELROD FFG55
(Norfolk, VA)
Aug 2009 to Jan 2014
o Shipboard IT21/COMPOSE Networks: Administration included classified and unclassified LANs.
Specifically, performed vulnerability/configuration management and troubleshooting of Windows
2K/W2K3/W2K8 Domain controllers, Active Directory, Exchange Servers (2000), Domain Name Service
and Proxy Servers (Internet Security Acceleration). Conducted LAN maintenance including system log
analysis on Windows/Linux systems, routine backups (full/incremental/differential), Active Directory
management and server maintenance.
o Computer Network Defense (CND) 2.1: Performed detailed HBSS 4.0/4.5 Policy Layout Guide and
utilized eEye Retina network vulnerability scanner to ensure compliance with DoD instructions and
directives on all network enclaves. Configured and operated Host/Network Intrusion Prevent System
(HIPS/NIPS)/Application Blocking/Firewall, ePO, McAfee Agent, Data Loss Prevention, Asset Baseline
Monitor, Policy Auditor and Rogue System Detection.
o Information Assurance Technician-II: Directly responsible for mitigating and remediating vulnerabilities
to bring networks into compliance according to DoD instructions and requirements: installed
IAVA’s/IAVB’s/IAVM’s and performed STIG’s.
o Communications Technician: Operated baseband components and communications equipment to
include: Automated Digital Networking System Increment II, land line CSU/DSU, DAMA, WSC-3 (LOS
and SATCOM), URT-23/R-2368 and SHF Commercial Broadband Satellite Programming (CBSP).
o EKMS User: Performed Tier 3 EKMS functions including inventory/destruction/receipt/transfer of
Secret/TS keying material. Configured multiple network encryption devices (KY-58/KG-175/KG194/KIV-7M,
KWR-46).



Experience

BACK TO TOP

 

Job Title

Company

Experience

Information Systems Security Analyst

US Navy- Navy Information Operations Command

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Date of Availability:

From 1 to 3 months

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

None

US Military Service:

Citizenship:

None

 

 

Target Job:

Target Job Title:

Information Systems Security Analyst

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Computer/Network Security

 

Target Locations:

Selected Locations:

US-VA-Norfolk/Hampton Roads

Relocate:

No