Cynthia L. Harper
21356 Cameron Hunt Place • Ashburn, VA 20147 •
703-723-2387 • charper8@gmail.com
IT SECURITY PROFESSIONAL
Experienced IT Security and Network professional serving a
diverse client base in commercial and federal government agencies.
Project management qualifications combine with demonstrated ability to design
and implement technical solutions to meet critical business needs.
Outstanding leadership and interpersonal skills resulting in effective
working relationships and top performance among staff. An excellent
communicator between technical and business units who can translate complex
data into easily understood terms.
AREAS OF EXPERTISE
Security Operations • Network Operations • Security
Auditing • Security Architect Design
Disaster Recovery Planning • Technical Documentation
• Technical Support & Training
PROFESSIONAL EXPERIENCE
AKIMA,
LLC
05/2012 – Present
Network Security Operations Center
Manager
Support the Drug Enforcement Agency's
network program across the country.
Key Projects
·
Provide
expertise, direction, and recommendations for all operational aspects of the
Spider network, including LAN segments and all supporting hardware and
software
·
Represent the
operational perspective in network infrastructure design and planning
·
Documentation of
operational processes and procedures
·
Provide guidance and mentoring to NOC
engineering staff
·
Point of contact for governmental
representation
AKIMA,
LLC
10/2008 – 04/2012
TNET PMO - Security Manager
Support the Department of Treasury's
network (Tnet) contract, which will provide a single, converged backbone
network for over 1,000 department locations.
Key Projects
·
Provide quality control to systems
within security operations to ensure compliance with policies and procedures,
legislative and best practice requirements.
·
Create
automation scripts to parse statistical data collected from security devices.
·
Notify Treasury's CSIRC department of
security events and provide recommendations, as well as, conduct weekly
status meetings on outstanding issues.
·
Provide support for the configuration
and installation of security devices.
·
Interact with the Security Operations
Center (SOC) on security events and incidents.
UNISYS,
INC.
02/2006 – 09/2008
IDS Solution Lead
Manage team of 7 security engineers
providing device management of intrusion detection system solutions.
Support multiple federal customers including Transportation Security
Administration (TSA), Department of Homeland Security (DHS), Health and Human
Services (HHS), and Census. Lead the management of over 500 host-based
intrusion detection devices, and 60 network-based intrusion detection
devices.
Key Projects
·
Developed and implemented standard
operating procedures guide for consistent and standard solution delivery to
all customers.
·
Participated in the ongoing review of
customer IDS signature policies, to include analyzing rule false positive
hits, review of risk, coordination with system owners to obtain application
lists, and design policy changes to improve the security posture of the
customer network.
·
Led integration and deployment of
security solutions for the Census Department into the Operations Center, to
include firewall and IDS deployments.
·
Operations liaison to engineering
department. Assisted with the development of the implementation plan to
upgrade ISS SiteProtector version 2.0 (SP5.2) to version 2.0 (SP6.1).
·
Presented operational (ie. signature
upgrade) and engineering (ie. System version upgrade) changes to customer
change control review boards (CCRBs). For engineering changes, created
the system design document (SDD) to track system life cycle changes.
·
Led cross collaboration efforts between
network and security teams for routing issues and to pursue disabling of
ports of infected systems.
COUNTERPANE INTERNET SECURITY,
INC.
03/2000 – 01/2006
SOC Shift Lead
Managed a shift team of 2 security
analysts and provided managed security monitoring on security events
generated by proprietary enterprise security solutions. Coordinated
devices outages or malfunctions with the Engineering team, and acted as the
technical lead when handling customer security incidents.
Key Projects
·
Provided a daily end-of-shift
executive-level summary of events to management.
·
Managed firewall policy changes
scheduled to be implemented during maintenance windows.
·
Assisted with sensor installations to
the customer environment.
MITRE CORPORATION
10/1998 – 03/2000
Senior Systems Engineer
Performed engineering support of firewall
devices to include Cisco PIX and Raptor firewalls. Performed project
management of the transitLAN area to meet SECOM specifications.
Key Projects
·
Security administrator for the firewall
devices, routers, and switches located on the corporate transitLAN (DMZ)
area.
·
Implemented rule set additions and
modifications to the transitLAN firewalls.
·
Created perl and expect automation
scripts to gather and parse statistical data collected from the transitLAN
network.
·
Performed monthly presentations on the status
of the transitLAN network to MITRE’s SECOM department.
GLOBAL ONE,
INC
09/1996 – 10/1998
Systems Engineer
Performed engineering support of network
environment, to include generating statistical analysis of backbone and
customer throughput utilization.
Key Projects
·
Created perl and expect automation
scripts that determined the overall network throughput utilization based on
SNMP-gathered statistics. The scripts were designed to assemble and
distribute the reports daily, monthly, and yearly.
·
System administrator of the radius
proxy server software packages used on the Global Dial IP AAA server.
·
Created perl automation scripts to
gather the radius AAA server statistics.
·
System administrator for MRTG, which is
a SNMP-based monitoring tool that creates a HTML-based graph on a customer’s
router port usage.
·
Created and maintained a customer
portal web page, which was setup to allow a Global One customer to log in and
check their bandwidth utilizations.
EDUCATIONAL
BACKGROUND
Attended
University of Maryland (Major: Mathematics Minor: Computer Science)
Additional
Training
·
ArcSight Certified Security Analyst –
September, 2006
TECHNOLOGY
SUMMARY
OS
Platforms: Linux • Windows
Scripting
Languages: Expect • Perl
• Shell
Hardware:
CheckPoint Nokia firewall •
Cisco ASA Firewall • Cisco Routers • Cisco Firewall and IDS Service Modules
for the Cisco Catalyst Switches • Enterasys Dragon NID Device • ISS Proventia
G Series Network Sensor • McAfee Mail Gateway Appliance • Palo Alto Firewall
• Sidewinder Firewall • Sourcefire Intrusion Sensor
Software: Arcsight Manager Console • Checkpoint Security
Gateway, NGX • Cisco IPS Device Manager • Cisco Security Manager •
Enterprise Management System (Enterasys Dragon) • ISS SiteProtector
Management Console • Sourcefire Defense Center • Solarwinds • Splunk
CLEARANCE
SUMMARY
Department
of Defense, Secret Clearance, 02/2006 – 10/2008
Department
of Health and Human Services, 02/2006 – 10/2008
Department
of Commerce, 11/2006 – 10/2008
Drug
Enforcement Agency, 05/2012 – Present