From:                              route@monster.com

Sent:                               Thursday, November 10, 2016 3:23 PM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: Network Engineer TS SCI

 

This resume has been forwarded to you at the request of Monster User xapeix03

Quincey Shepherd 

Last updated:  07/21/15

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Cibolo, TX  78108
US

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Quincey Shepherd

Resume Value: hpmrhyjpmdvekvsc   

  

 

Quincey, L, Shepherdquinceyshepherd1981@gmail.com

210.763.1637 H117 Buckskin Way

210.763.1639 CCibolo, TX 78108

Citizenship: USVeterans Preference: 5 points                                                                                                 

 

 

Objective: Interactive Operator position

 

Work Experience

Job Title:  Interactive Onet OperatorJAN/ 14- Present

United States Navy/NSA 

7700 Portranco Rd.  

San Antonio, TX 78251

- Worked for National Security Agency’s Tailored Access Operations in the Remote Operations Center

 

- Conducted extensive hours of specialized real-time Computer Network Operations in support of theater and national level tasking using custom made scripts made to run on red hat linux and windows operating system.

 

- Established and documented safe, effective methods for Computer Network Exploitation, focusing on tradecraft security for operations.

 

- Prepared courses of action while managing risk with operational situational awareness.

 

- Trained certified operators to conduct exploitation operations & exploitation trainer responsibilities.

 

- Provided technical guidance and education to fellow sailors on basic networking scenarios, exploitation methodology and troubleshooting techniques.

 

- Ensured strategic level national security goals were reached through the use of tactical precision during each mission.

 

- Provided risk mitigation and technical recommendations to senior leadership for live operations.

 

- Worked closely with National Security Agency analysts to plan operations against adversarial networks to further the mission and signals intelligence requirements of the U.S. Government.

 

- Conducted security product testing against various Computer Network Exploitation tools.

 

- Analyzed source code for Computer Network Exploitation and non-Computer Network Exploitation tools for troubleshooting and other purposes.

 

-Editing python scripts for use on covert  network.

 

Job Title:  Interactive Onet OperatorJAN/09 – JAN/14

United States Navy/NSA

Fort Gordon Georgia  

Augusta, GA Zip 30905

- Worked for National Security Agency’s Tailored Access Operations in the Remote Operations Center

 

- Conducted extensive hours of specialized real-time Computer Network Operations in support of theater and national level tasking using custom made scripts made to run on red hat linux and windows operating system.

 

- Established and documented safe, effective methods for Computer Network Exploitation, focusing on tradecraft security for operations.

 

- Prepared courses of action while managing risk with operational situational awareness.

 

- Trained certified operators to conduct exploitation operations & exploitation trainer responsibilities.

 

- Provided technical guidance and education to fellow sailors on basic networking scenarios, exploitation methodology and troubleshooting techniques.

 

- Ensured strategic level national security goals were reached through the use of tactical precision during each mission.

 

- Provided risk mitigation and technical recommendations to senior leadership for live operations.

 

- Worked closely with National Security Agency analysts to plan operations against adversarial networks to further the mission and signals intelligence requirements of the U.S. Government.

 

- Conducted security product testing against various Computer Network Exploitation tools.

 

- Analyzed source code for Computer Network Exploitation and non-Computer Network Exploitation tools for troubleshooting and other purposes.

 

 

Job Title:  Network Penetration LeadNOV/05 – JAN/09

United States Navy

1247 W. C Street   

Norfolk, VA 23511

   -As team lead of the Navy’s Red Team I ran operations on multiple military installation around the world that simulated adversarial cyber threats successfully  demonstrating the enemies tactics and security risks s threatening the DOD  Global Information Grid, resulting in the training of over 6,000  users on Operational Security and computer security awareness.

 

  -I was instrumental in improving the network security posture and incident handling processes of Navy units by implementation of new security procedures and training multiple Navy units, which deterred possible adversarial penetration of over 8 naval unit networks.

 

-I have experience in social engineering, wireless penetration operations, and vulnerability testing. As team lead I conducted over 90 hours of open source research to develop a plan to infiltrate one of the military networks at multiple Navy commands. By using my skills of network exploitation and social engineering skills I help crack Common Access Card security, and increased security awareness within Navy computer network Domain.

 

 

Job Title: Cryptologic Technician Maintenance/NetworksNOV/01 – NOV/05

United States Navy

640 Roberts Ave.   

Pensacola, FL 32511             

  -As a Cryptologic Technician Maintenance I Conducted detailed analysis of 4 communications network in support of 3 national information needs requests. During analysis I produced 10 component network security maps which allowed multiple government entities to make major cyber security decisions on the defense of DOD networks, which also led to the capture of high interest targets to the United States.

 

    -As an subject matter expert (SME) I trained multiple subordinates in cyber-attack and cyber defense methodology to included network vulnerability testing and computer forensic by using tools such as windows sys internal commands, metasploit, and wireshark; which led to 90% of them qualifying  to do analytical work on DOD networks.

 

    As team lead for 12 months a position usually held by higher ranking personnel I led my team in researching and analyzing high-priority cyber threats that directly contributed to National Security Agency on-going operations for DOD entities around the world.

 

  As the team lead for my installation team I contributed to installing and managing multiple DOD networks to include network printers, network servers, host clients, firewalls, and running fiber cables which saved the command over 70000 dollars in contractor expenses.

 

Education

05/00 Diploma          Phillips High School, Birmingham, AL 35203

 

Job Related Training

04/15 Cisco Certified Network Professional (CCNP), Global Knowledge

01/15 Cisco Certified Network Associate (CCNA), Global Knowledge

01/15 Cisco Certified Entry Networking Technician, Global Knowledge

09/06 Certified Ethical Hacker, E-Council

04/06 Security+, Comptia

03/06 Network+, Comptia

03/06 A+, Comptia

 

 

Honors, Awards

11/05 Navy Achievement Medal

01/08 Navy Achievement Medal

 

Other Information

Active TS/SCI Clearance (JAN 2013) w/CI Poly (APR2015)

Over 5 years of Penetration Testing related experience

Over 10 years of computer and networking experience

Journeyman Network Operator

 

Skills

Some C+ programming            malware analysis

Some python                            windows OS

Nmap                                       Red Hat Linux

Metaspolit                                Core Impact framework

Wireshark

Tcpdump

 



Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Work Status:

US - I am authorized to work in this country for any employer.

 

 

Target Company:

Company Size:

 

Target Locations:

Selected Locations:

US-TX-San Antonio