From:                              route@monster.com

Sent:                               Monday, October 24, 2016 11:02 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: Network ADMIN ccna

 

This resume has been forwarded to you at the request of Monster User xapeix03

Jon Miller 

Last updated:  10/17/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Norfolk, VA  23509
US

imjonmiller@hotmail.com
Contact Preference:  Telephone

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Manager, Computer Network Defense (CND)

Resume Value: yici2z9gd6czsizd   

  

 

Jon K. Miller
Top Secret Security Clearance with SSBI
__________________________________________________________________________
528 Kenosha Avenue ● Norfolk, Virginia 23509 ● (757) 831-9188 ● email: imjonmiller@hotmail.com
EXPERIENCE
Falconwood INC, Norfolk Virginia
April 2016 – Present
Senior Information Assurance Analyst
Performing as a leading subject matter expert on the IT Security architecture and infrastructure of the Navy and
Marine Corps Intranet (NMCI) in order to support the government in responding to major cyber security incidents,
performing independent validation and verification compliance audits and engineering & problem management
support.
General Dynamics, Suffolk Virginia
C&A – Sr. Cyber Security Analyst
June 2013 – March 2016
September 2014 – March 2016
General Dynamics – JTEN J7 – Joint Training Enterprise Network
As ISSO - Provide Information Assurance (IA) support for the JLLIS and JTIMS programs to include:
¨ Review and prepare C&A packages within DIACAP process.
¨ Update JTIMS/JLLIS C&A package, artifacts, and documentation to support transition to the RMF
¨ Support Security Issue Management.
¨ Ensure the integrity and protection of networks, systems, and applications by technical enforcement of
organizational security policies, through monitoring of vulnerability scanning devices.
¨ Schedule and perform periodic and on-demand system audits and vulnerability assessments to determine
compliance.
Lockheed Martin, Suffolk, Virginia
(General Dynamics took over contract in June 2013)
Manager, Computer Network Defense (CND)
September 2009 – June 2013
June 2012 – September 2014
Lockheed Martin – JTEN J7 – Joint Training Enterprise Network
Monitor the security health of three JTEN Department of Defense computer networks: NIPR, SIPR, ISP
¨ Coordinate the efforts of a five person Network Operations and Security Center (NOSC) Information
Assurance (IA) Watch Team.
¨ Evaluate real-time and historical security alerts and logs for relevance to our network environment.
¨ Respond to all credible threats in a timely manner.
¨ Research and develop Standard Operating Procedures for tools and processes in use by the NOSC IA team.
¨ Develop and maintain a monthly schedule for Vulnerability Scanning to comply with DoD standards for
Information Assurance Vulnerability Management while ensuring that scanning activity does not impact
ongoing exercises on the network.
¨ Train all NOSC IA team members on the various IA tools and procedures to ensure that they can operate with
little supervision and maintain the security posture of the networks.
¨ Established a virtual training environment through the use of VMWare to assist in teaching the required skills
and techniques.
¨ Administer a SharePoint site, create and update custom InfoPath forms for workflow processes.
¨ Develop Standard Operating Procedures for Tier-3 Computer Network Defense Cell.
¨ Develop Tools and Techniques for Incident First Responders.
Lockheed Martin, Norfolk, Virginia
September 2009 – June 2012
Manager, Computer Network Defense (CND)
Lockheed Martin – USJFCOM J6 – US Joint Forces Command transitioned to JSSE - U.S. Joint Chiefs of Staff (August
2011)
Lead host and network forensic analyst - Responsible for reviewing reports and briefing products to present the
results of analysis.
¨ Perform in-depth forensic analysis of compromised systems to include identification of malicious code.
¨ Conduct reverse engineering of new vulnerabilities of malicious code to build counter attack signatures
against threats.
¨ Research various open source hacker techniques and vulnerability exploit forums.
¨ Responsible for engineering and implementing new security tools to assist in the analysis of malicious
software and intrusions.
¨ Correlate technical and trend analysis for distribution to CND community.
¨ Responsible for security incident handling and response.
¨ Responsible for engineering new types of Intrusion Detection Systems to protect DoD networks from
intrusions.
Capstone Corporation, Hampton, Virginia
November 2008 – September 2009
Senior IA Systems Engineer
Capstone - 93rd Signal Brigade – Ft. Monroe/Ft. Eustis
Project Manager in charge of the rollout of HBSS to all NETCOM DOIMs located within the 93d Signal Brigade
¨ Responsible for providing regional support of McAfee’s HBSS – Host Based System Security.
¨ Work closely with government staff and Military to facilitate the installation process of the HBSS Product.
¨ Windows Based Workstations and Servers, McAfee E-Policy/Orchestrator experience.
Electronic Data Systems (EDS), Norfolk, Virginia
Forensic Analyst, Computer Incident Response Team (CIRT)
May 2005 – October 2008
January 2008 – October 2008
Responsible for handling RFIs – Requests For Information from the GNOC
¨ RFIs consisted of Email, HDrive, and Computer Profiles.
¨ Proficient in using ProDiscover to pull an image across the Network.
¨ Proficient in using Encase to Data Carve the image.
¨ Coordinated with NCIS and NETWARCOM to assist with investigations.
Incident Handler, Computer Incident Response Team (CIRT)
April 2007 – January 2008
Responsible for identifying and documenting the nature of information systems security incidents.
¨ Provide instructions to end user(s) concerning continued use of the affected systems.
¨ Identify what systems have been compromised.
¨ Formulate a plan of action for containing, eradication and recovering systems and data.
¨ Implemented Securify for the Boundary 1 (NMCI Network Traffic Compliance Monitoring)
Firewall Engineer, Norfolk Information Assurance
Maintenance Coordinator, Norfolk Information Assurance
September 2006 – April 2007
September 2006 – April 2007
Responsible for maintaining system security from internal and external attacks, including Symantec Raptor
Firewall management.
¨ Administer Network Security for Raptor Firewalls.
¨ Monitor Raptor Firewall traffic daily; filter illegal traffic, create rules and proxies, allowing and denying access.
¨ Performed firewall conversion with team members, converted from Raptor Firewall to Sidewinder.
¨ Performed load balancer conversion with team members, converted from Foundry to Big IP
¨ Coordinated Maintenance for the Silos of Norfolk Information Assurance (Firewall, VPN, IDS, and PKI)
Information Security Analyst – Shift Lead Norfolk Noc
May 2005 – September 2006
Responsible for providing information security support to internal and external customers. Analyze basic
customer security requirements and make recommendations for improvement to information security data bases
and platforms.
¨ Monitoring firewall, anti-virus, intrusion detection sensors, VPNs and Enterprise Security Management
servers.
¨ Updating definitions and signatures on antivirus and intrusion detection systems.
¨ Participate in the investigation and mitigation of security events across the enterprise.
¨ Hands on team orientated work to resolve enterprise wide network security and connectivity issues.
EDUCATION
Old Dominion University - Norfolk, Virginia
Bachelor of Science Degree - May 1997
Completed a dual major in Psychology and Criminal Justice
Tidewater Communication College – Virginia Beach, Virginia
Health IT Engineering, Certificate Program - May 2012; GPA : 3.75
CERTIFICATION &
TRAINING
Electronic Systems
¨ Comptia: A+, Network +, Security +, Server +, Inet +, Linux +, Project +
¨ Microsoft: MCSE 2003, MCITP: Enterprise Administrator 2008, MCSE 2012
¨ Cisco: CCNA, CCSP, CCNP Security
¨ Technology Pathways: Certified ProDiscover Examiner
¨ ISC2: CISSP-ISSMP, CAP Certification
¨ SANS: GCIH – GIAC Certified Incident Handler, GREM – GIAC Reverse Engineering Malware Certification
¨ EC-Council – CEH – Certified Ethical Hacker, CNDA – Certified Network Defense Architect, ECSA – EC-Council
Certified Security Analyst, CHFI – Computer Hacking Forensic Investigator
¨ Guidance Software – EnCE - EnCase Certified Examiner
¨ STINGRAY ENTERPRISES – Virginia Beach, Virginia Private Investigator – July 2010
¨ Sourcefire – Snort Certified Professional (SnortCP) 2.9
¨ Lockheed Martin Cyber Defense ExCITE Course, 30 Jan – 3 Feb 2012 hosted at SIC Gaithersburg, MD 40 hours
¨ Wireshark Certified Network Analyst – WCNA
¨ ITIL Foundation V3 Certificate in IT Service Management & ITIL Intermediate Certificate in Service Strategy



Experience

BACK TO TOP

 

Job Title

Company

Experience

Senior IA Systems Engineer

Capstone Corporation

4/2007 - Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Years of relevant work experience:

5+ to 7 Years

Date of Availability:

Immediately

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Top Secret

US Military Service:

Citizenship:

None

 

 

Target Job:

Target Job Title:

Computer Incident Response

Desired Job Type:

Employee

Desired Status:

Full-Time

 

Target Company:

Company Size:

Industry:

Computer/IT Services

Occupation:

IT/Software Development

·         Computer/Network Security

 

Target Locations:

Selected Locations:

US-NC-Wilmington/Fayetteville
US-VA-Norfolk/Hampton Roads

Relocate:

Yes

Willingness to travel:

Up to 25% travel