From:                              route@monster.com

Sent:                               Friday, November 4, 2016 8:48 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: PaloAlto

 

This resume has been forwarded to you at the request of Monster User xapeix03

Estrella Torres 

Last updated:  11/24/13

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


US  09366
US

Home: (804) 657-7827   
startorresel@gmail.com
kw.linkedin.com/pub/estrella-star-torres/70/149/a6/
Contact Preference:  Email

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: SCCM Resume

Resume Value: aiyg838wsgks7g4x   

  

 


·          SCCM 2007 and SCOM 2007

·          Design & Implementation of Security Policies, Procedures & Controls

·          Cisco MARS (Security Monitoring, IDS/Firewall, ASA, FWSM, ADSM, CSM (Cisco Security manager), Symantec Endpoint Protection Manager, Symantec Critical System Protection

·          Experienced using vulnerability scanning tools such as Retina vulnerability scanners, Retina Enterprise Management systems (REM) as well as Nessus amd Security Center, STIG Viewer and VMS


·          Risk Assessment, Vulnerability Analysis and Testing

·          SQL Server 2000, SQL 2005, SQL 2008R2

·          DoD DIACAP and FISMA Policy Standards and Enforcement

·          Security Vulnerability/Patch Advisory Management (STIGS, IAVA’s, ISVMs and OPDR and DIACAP Compliance)

·          Change Management using RFC’s and Remedy Service Management Tool

·          Intrusion Detection and Prevention along with Regulatory Compliance


Estrella Torres, Page 2

 

 





Professional Experience:

SCCM Administrator

KDHQ CJ6                                                                        Kandahar, Afghanistan                                                Aug 2013-Present

 

·          Responsible for the SCCM administration and operational support for the Regional Command South and West (RC-S / RC-W ) to maintain IAVA compliance on 3 enclaves with over 9,000 workstations and over 200 servers per enclave

·          Created a SharePoint 2010 SCCM site on all 3 enclaves to inform Administrators on SCCM client health and troubleshooting steps, to provide a central repository for Information assurance teams to upload scan data, to provide up to date information regarding the latest updates that were tested and deployed and to provide useful links for SCCM , DISA and Microsoft reporting and an alternative pilot ticketing system.

·          Integrate with Information Assurance teams for each site within RC-S/RC-W for SCCM client health troubleshooting and IAVA compliance.

·          Create task sequences on all 3 enclaves for 3rd Party updates ; as well as performing daily tasks

 

System Engineer Tech Lead

SWA Cyber Center                                                      Camp Arifjan, Kuwait                                                    Jan 2012-Aug 2013

 

·          Subject Matter Expert for group policy generation and administration affecting CENTCOM Theater.

·          Managed GPO architecture throughout the production environment to improve performance and eliminate shortcomings.

·          Spearheaded change management controls for GPO modifications and versioning using the GPO Admin tool, configured change auditor alerts for any GPO changes and performed daily auditing on all domains.

·          Mentored team members commercial technologies, best practices, security and DoD security hardening techniques.  Including, but not limited to, Active Directory, DNS, DISA STIG, SCAP, and commercial tools such as eEye Retina.

·          Mentored team members on the current PKI infrastructure across 5 countries using Microsoft and middleware software for smartcard authentication using OCSP Responders Domain Controller integration for client authentication. Stood up multiple CRL Servers and solved complex issues by adding or modifying the OCSP Responders in DNS and modifying current records.

·          Authored guidance and policy integrating DOD Vulnerability Management into daily practice.  Set milestones for information assurance teams to meet and weekly goals to maintain standards. Directed the use of resources such as the DoD Vulnerability Management System (VMS).

·          Established the weekly operational standards for the information assurance teams to upload scan data using a custom database integrated with a SharePoint site in order for system administrators to use for effective patch management, server reboot maintenance windows, SCCM reporting and vulnerability scanning.

·          Integrated Microsoft and 3rd Party updates throughout Kuwait on three security enclaves. Created packages and task sequences for windows 7 images and for 3rd party updates. Created customized collections in SCCM to query the SQL Database for report collections.

·          Participated in three DISA Cyber Command Readiness Inspections. Integral to the 2013 success of the inspection by identifying, and correcting, GPO issues and working with the systems team to standardize domain controller configurations to STIG compliance.

·          Effective and thorough understanding of Enterprise DNS architecture, AD, DoD and commercial reporting tools (SCOM, VMS), and advanced troubleshooting of enterprise architecture assets.

 

 

Information Assurance Vulnerability Manager

SWA TNOSC                                                                         Camp Arifjan, Kuwait                                                Oct 2010-Nov 2011

 

·          Liaised with 54th RNOSC managers/sites in Kuwait and 25th RNOSC sites/IAVM managers in Afghanistan regarding vulnerability and remediation issues

·          Engineered the Retina Enterprise Management (REM) architecture on 3 separate enclaves spanning across Kuwait and Afghanistan.

·          Configured over 120 Retina vulnerability scanners per enclave to report to each respective REM database server. Created custom SQL queries on the master database for efficient IAVA reporting and created database integrated excel workbooks.

·          Teamed with the SharePoint administrators to publish the database reports to eliminating manual interaction and conserving team resources.

·          Spearheaded and implemented the first Nessus and Security Center vulnerability scanning architecture in the Southwest Asia region for the Army.

·          Generated multiple Powershell scripts to aid the Information Assurance (IA) team in tracking group memberships, all subnets assigned to each site in AD Sites and Services, identifying special systems, and identify all unit assets which span across multiple organizational units, domains and countries for weekly vulnerability scanning purposes

·          Expedited the Site Assisted Visit (SAV) with DISA inspectors in preparation for the validation and accreditation inspections. Worked with auditors to identify system and network vulnerabilities, using VMS reporting of Cat I, II and III findings enterprise-wide.

 

 

 

 

 

 

 

Sr. Security Analyst

EDS Datacenter                                                               Clarksville, VA                                                      Feb 2009-May 2010

 

·          Correlated system compliance in comparison to security requirements, which included FISMA, NIST and FIPS requirements.

·          Analyzed performance against policy and security plans: reviewing adequacy of security controls; recommended improvements to security policy; analyzing security

·          Identified potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. Performed queries to monitor and troubleshoot firewall traffic and firewall rules

·          Performed network integrity and protection (Information Assurance), systems, and applications enforcement of organizational security policies by monitoring and running Nessus vulnerability scans.

·          Communicated alerts to agencies and upper management regarding actual intrusions and potential intrusions and compromises to their network infrastructure, applications and operating systems. Implemented counter-measures or mitigating controls.

 

Information Assurance Technician

HQ Marine Forces Reserve                                           New Orleans, LA                                               July 2005- May 2008

 

·          NCOIC of the Network Operations Center (NOC) to maintain operations for over 182 remote sites and maintaining 120 servers

·          Training coordinator for all Marine Reserve units to meet 8570 compliance to include Security +, Network + and CISSP Training. Contacted training suppliers and helped sign the contract with HQ Marine Corps. Created a SharePoint site for all outlying units to sign up for 8570 training.

·          Managed a budget of $250,000 and established training schedules for each month. Coordinated the training dates and made the necessary reservations as well as required paperwork and approval for each instructor.

·          Managed human assets and training schedules to ensure proper work assets remained available.

 

 

 





Certifications:

NETWORK +

SECURITY + CERTIFIED

MCITP

VMWARE CERTIFIED PROFESSIONAL

CISSP CERTIFIED

TOP SECRET CLEARANCE (TS/SSBI)

 

Estrella Torres, Page 2

 

 

Estrella L. Torres

RC(S) HQ/CJ6 JAMO 4ID APO AE 09355

Home: (804) 657-7827· StarTorresEL@gmail.com

 

Core Skill Areas:

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Date of Availability:

Immediately

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Top Secret

US Military Service:

Yes

Citizenship:

US citizen

 

 

Target Company:

Company Size:

 

Target Locations:

Selected Locations:

US-AE

Relocate:

Yes

Willingness to travel:

Up to 100%