From:                              route@monster.com

Sent:                               Friday, November 4, 2016 8:52 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: PaloAlto

 

This resume has been forwarded to you at the request of Monster User xapeix03

Thomas Mitchell 

Last updated:  03/02/14

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Prattville, AL  36066
US

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: TMitchell Information Assurance

Resume Value: euxbyc3b5qb4kdjw   

  

 


ArcSight 4.5


McAfee ePO 4.5

McAfee Agent (MA),

McAfee Asset Baseline Monitor (ABM),

McAfee Policy Auditor (PA),

McAfee Host Intrusion Prevention System (HIPS),

McAfee Virus Scan Enterprise (VSE),

McAfee Data Leak Protection (DLP),

McAfee Device Control Module (DCM),

McAfee Rogue System Detection (RSD),

McAfee Firewall Enterprise (Sidewinder),

EnCase 6.15,

Security Architect

Cisco Security

HBSS versions 3.0 – 5.0

 

Professional Experience

 

Information System Security Officer (ISSO) DHS USCIS Operations Center

 

Solutions By Design (SBD II, LLC)

December 2013 – Present (2 months) Stennis Space Center, Mississippi

 

Coordinate IA program activities within DHS/USCIS Operation Center and recommend strategies while assisting in the development of all information assurance policies and guidelines.


Provide consultation related to developing processes to solve information assurance issues. ISSO implements a regular schedule for vulnerability testing of system components, to ensure security patches are current on all devices, and that intrusion detection sensors (IDS) or system audit logs are properly configured and events are monitored.


Responsible for assessing the security impact of configuration changes to the system, evaluating cost-effective security alternatives, and approving security-related solutions

 

Key Achievement:

Design and developed an Insider Threat Program and methodology.

 

 

Information Systems Security Officer (ISSO)

 

State of Alabama Medicaid    (April 2013 to December 2013)

 

The ISSO coordinates IA program activities within State of Alabama Medicaid, and other State components.
Recommended strategies; assists in the development of information assurance policies and guidelines. Provided consultation related to developing processes to solve information assurance issues.

 

Executed day-to-day security operations ensuring the authorized policies, procedures, and configurations approved by the Authorizing Official were implemented.

 

Responsible for execution and testing of plans to ensure system integrity and availability and for overseeing staff of system administrators and engineers that maintain Infrastructure hardware and system software, install application software, and monitor system performance and security events.

 

Elevated performance anomalies to the System Owner and security anomalies to the bureau or office Chief Information Security Officer (BCISO) and the incident response capability for assistance in resolutions.

 

Implemented a regular schedule for vulnerability testing of system components, to ensure security patches are current on all devices, and that intrusion detection sensors (IDS) or system audit logs are properly configured and events are monitored.

 

Assessed the security impact of configuration changes to the system, evaluating cost-effective security alternatives, and approving security-related solutions

 

Key Achievement:

Designed and developed Critical Incident Response Team (CIRT) and methodology.

 

HBSS (McAfee ePO) Cyber Security Subject Matter Expert /Threat Analyst

 

NSOC SPAWAR Atlantic Medical Systems Charleston SC  (Jan 2013 - March 2013)

The position was within the SPAWAR Atlantic Medical Systems. The position was to ensure HIPAA and PHI compliance for all subscribers utilizing NIST HIPAA Security toolkit.

This subscription based Secured Cloud offering included perimeter security data along with host based security data. This unique correlation and presentation is a game changer in the Medical security field.

Threat Analyst utilizing data feeds and logs from host based and network based applications and devices to ensure HIPAA compliance with using NIST HIPAA security toolkit. This is to detect and stop threat actors. The utilization of Wireshark, Splunk, and PaloAlto along with open source tools is some of the tools that are used to help defend the DOD GIG.
 

Key Achievements:

Designed and developed a Managed Services offering featuring:
Forensics featuring Encase, Database Security Analysis for Regulatory Compliance.
This Secured Managed Cloud features: McAfee ePO, McAfee Agent (MA), McAfee Asset Baseline Monitor (ABM), McAfee Policy Auditor (PA), McAfee Host Intrusion Prevention System (HIPS), McAfee Virus Scan Enterprise (VSE), McAfee Data Leak Protection (DLP), McAfee Device Control Module (DCM), and McAfee Rogue System Detection (RSD).

Published   Whitepaper “Wireless Networks and HIPAA compliance,” 

 

McAfee Subject Matter Expert (SME) for Host Based Security System (HBSS)

 

Northrop Grumman Information Systems 2012 – 2013   Montgomery Al Maxwell-Gunter

Public Company; 10,001+ employees; NOC; Defense & Space industry

 

Responsible for designing, installing, managing, maintaining and configuring the McAfee ePO, McAfee Agent (MA), McAfee Asset Baseline Monitor(ABM), McAfee Policy Auditor(PA), McAfee Host Intrusion Prevention System(HIPS), McAfee Virus Scan Enterprise(VSE), McAfee Data Leak Protection(DLP), McAfee Device Control Module(DCM), McAfee Rogue System Detection(RSD), McAfee Firewall Enterprise (Sidewinder).

Conducted analysis of malicious events and known exploits/vulnerabilities for the creation of custom signature rule sets for the accompanying modules, as necessary.  I provided detailed and customized reports on system status, module deployments and event trends.

Performed troubleshooting of local and remote installation of McAfee ePO, McAfee Agent (MA), McAfee Asset Baseline Monitor(ABM), McAfee Policy Auditor(PA), McAfee Host Intrusion Prevention System(HIPS), McAfee Virus Scan Enterprise(VSE), McAfee Data Leak Protection(DLP), McAfee Device Control Module(DCM), McAfee Rogue System Detection(RSD), McAfee Firewall Enterprise (Sidewinder) these components and deployment of modules and policies.

Tracked and reported on enterprise deployment of McAfee ePO, McAfee Agent (MA), McAfee Asset Baseline Monitor(ABM), McAfee Policy Auditor(PA), McAfee Host Intrusion Prevention System(HIPS), McAfee Virus Scan Enterprise(VSE), McAfee Data Leak Protection(DLP), McAfee Device Control Module(DCM), McAfee Rogue System Detection(RSD), McAfee Firewall Enterprise (Sidewinder).
 

Key Achievements:

Provide guidance on current network threats and trends not only occurring within the DOD.

Developed curriculum for the McAfee 501 Analyst course for DISA
 

Information Assurance Manager (IAM)          Global Force Modernization Program

 

The Centech Group Inc.                                      Gunter Annex, Montgomery, Alabama     8/11- 12/12

 

As Information Assurance Manager (IAM) was primary responsible for maintaining situational awareness and initiating actions to improve or restore IA posture as well as conducting annual security reviews of all IA controls and a test of selected IA controls of project under purview.

 

Coordinated and assisted with writing computer security plans that meet Air Force and DOD requirements.

 

Maintained and implemented Information Assurance policies, procedures, Certifications and Accreditations (C&A) in accordance with applicable DOD regulations and best business practices. C&A Processes included DIACAP, DoDI8500.2, eMASS.

 

 

McAfee USAF Subject Matter Expert for General Dynamics Information Technology

 

GDIT              (General Dynamics Information Technology)              Montgomery, Alabama                            8/10-8/11

 

Process the handling of support issues for the USAF deployment, operation, and maintenance of McAfee ePO, McAfee Agent (MA), McAfee Asset Baseline Monitor(ABM), McAfee Policy Auditor(PA), McAfee Host Intrusion Prevention System(HIPS), McAfee Virus Scan Enterprise(VSE), McAfee Data Leak Protection(DLP), McAfee Device Control Module(DCM), McAfee Rogue System Detection(RSD), McAfee Firewall Enterprise (Sidewinder).

 

Having deployed and assisted in the configuration of the following McAfee security products e-Policy Orchestrator 4.0, 4.5, Host Intrusion Prevention System (HIPS), Policy Auditor (PA), Rogue System Detection (RSD), and Virus Scan Enterprise (VSE). There is also additional support of VLMS along with Data Leak Protection (DLP), Device Control Module (DCM).

 

Technical and hands on team lead for CCRI assessments, security risk analysis and risk mitigation reporting, vulnerability analysis, assessment briefings to senior government personnel. 

 

Devised and develop a preemptive strike methodology for CCRI assessments. The lead member of the tiger team that accomplished the integration of SEIM solutions Arcsight 4.5 along with McAfee EPO 4.0 for reporting for over 32,000 nodes worldwide.

 

Key Achievement:

             

Whitepaper on the deployment of a Government Private Cloud Security

 

 

Lead Analyst McAfee Subject Matter Expert

 

Ciphent                                                                       Montgomery, Alabama                            8/09-8/10

 

Lead Analyst McAfee Cyber Command Center McAfee ePO, McAfee Agent (MA), McAfee Asset Baseline Monitor (ABM), McAfee Policy Auditor (PA), McAfee Host Intrusion Prevention System (HIPS), McAfee Virus Scan Enterprise (VSE), McAfee Data Leak Protection (DLP), McAfee Device Control Module (DCM), McAfee Rogue System Detection (RSD), McAfee Firewall Enterprise (Sidewinder) support for the USAF deployment, operation, and maintenance of McAfee's host-based solution. There is additional support of VLMS along with DLP.

 

Mentored and provided ongoing technical and soft skills training for staff.

 

Key Achievements:

 

Whitepaper on the deployment of McAfee ePO, McAfee Agent (MA), McAfee Asset Baseline Monitor(ABM), McAfee Policy Auditor(PA), McAfee Host Intrusion Prevention System(HIPS), McAfee Virus Scan Enterprise(VSE), McAfee Data Leak Protection(DLP), McAfee Device Control Module(DCM), McAfee Rogue System Detection(RSD) Cloud Security.

 

 

IA/CND Afloat Trainer

 

ManTech Systems Engineering Corp.               San Diego, California                                          1/09-8/09

 

Developed the curriculum and trained personnel in the operation of the following security Suite of McAfee Products McAfee ePO, McAfee Agent (MA), McAfee Asset Baseline Monitor (ABM), McAfee Policy Auditor (PA), McAfee Host Intrusion Prevention System (HIPS), McAfee Virus Scan Enterprise (VSE), McAfee Data Leak Protection (DLP), McAfee Device Control Module (DCM), and McAfee Rogue System Detection (RSD).

 

Entercept Host Intrusion Prevention System 5.x. Secure Configuration Compliance Validation Initiative (SCCVI) that consists of eEYE Digital Security Retina Scanner.

 

Secure Configuration Remediation Initiative (SCRI), which consists of McAfee Hercules Vulnerability and Remediation Manager.

 

Key Achievements:

 

Designed and developed user-friendly tab based curriculum. This is for end user friendly navigation and use of paper based curriculum for US Naval personnel.

 

 

Security Services Sales Engineer, Operational Management

 

Mainline Information Systems                             Dana Point, California                                          7/08-12/08

 

Developed and implemented all IT policies and procedures, including those for Architecture security, disaster recovery, standards, purchasing, and service provision.

 

Oversee negotiation and administration of vendor, outsourcer, and consultant contracts and service agreements.

Managed IT staffing including recruitment, supervision, scheduling, development, evaluation, and disciplinary actions.

 

Established and maintained regular written and in-person communications with the organization’s executives, department heads, and end users regarding pertinent IT activities.

 

Where necessary, re-engineered applications support to ensure alignment with business processes, tactical planning, and strategic vision.

 

Defined and communicated project milestones, service level agreements, and resource allocation to executive team, department leads, support staff, and end users.

 

Developed and reviewed budgets for and from IT department divisions and ensure they comply with stated goals, guidelines, and objectives.

 

Reviewed performance of IT systems to determine operating costs, productivity levels, and upgrade requirements. Benchmark, analyze report on, and made recommendations for the improvement of the IT infrastructure and IT systems.

 

 

Key Achievements:

 

Formulated and deployed long-term strategic plans for acquiring and enabling efficient and cost-effective information processing and communication technologies. Managed IT department operational and strategic planning, including business requirements, project planning, and organizing and negotiating the allocation of technical resources.

 


 

Principal

 

MitchConsulting Services                                           Fallbrook, California                                          1/08-7/08

 

Post sales delivery for CA’s eTrust and Unicenter product lines. Integration of network devices Log output into CA SIEM Security Command Center system.

 

Performed necessary customizations adhering to customer requirements.

 

Performed Security Architecture design and development.

 

Performed and delivered security assessments and roadmaps in accordance with ISO 17799 standards, utilizing appropriate security framework as needed by matching security requirements with the latest governmental regulations and compliance issues such as Sarbanes-Oxley, HIPAA, FISMA, FDA 21 CFR Parts 11, and GLBA. Having performed integration of network appliances in order to take the event log output and aggregate it to a collector.  When we would have to use a third party log aggregator to pass it to the device that I would install to be able to apply correlation with the SIM product. During the integration the Cisco, Checkpoint, 3-Com, Bluesocket, Highwall, Tipping point etc devices would be configured as an event source. These appliances would work with the many SIEM appliances that I installed at customer sites including the SEIM tool ArcSight, Q1 Labs. The vast majority of the SIEM systems being Linux based system.

 

Key Achievements:

 

Designed and deployed a secured endpoint network of 2228 nodes.

 

Installed Net Backup to a 200 node backup system.

 

 

Sr. Security Architect

 

Symantec                                                                       San Diego, California                                          8/06-1/08

 

Recorded progressive and sustainable results, ensuring all customer needs are identified and met to increase business growth and profitability. The Security area of threat being the specialist includes software and hardware appliance solutions.

 

Created area-marketing campaigns revolving around access to availability solution. In coordination with campaigns, doing POC and on occasion implementations of purchased software solutions’.  Delivered technical presentations and demonstrations to potential customers to gain market advantage.  Rendered a full range of post-sales support services; properly designing and implementing selected software packages.

 

Key Achievements:

 

Served as a liaison between technical and sales professionals, devising customized solutions-driven strategies.

 

Authored architecture documentation on customer infrastructure. Maximize solutions’ effectiveness and impact to customer operations, providing formal and informal training.

 

 

Principal

 

MitchConsulting Services                                           Winchester, California                            2/06-8/06

 

Post sales delivery for CA’s eTrust and Unicenter product lines. Integration of network devices Log output into CA SIM system. Performed customization as needed according to customer requirements and Security Architecture design and development.

 

Performed and delivered security assessments and roadmaps in accordance with ISO 17799 standards, utilizing appropriate security framework as needed by matching security requirements with the latest governmental regulations and compliance issues such as Sarbanes-Oxley, HIPAA, FISMA, FDA 21 CFR Parts 11, and GLBA. Having performed integration of network appliances in order to take the event log output and aggregate it to a collector. Then we would have to use a third party log aggregator to pass it to the device that I would install to be able to apply correlation with the SIM product. During the integration the Cisco, Checkpoint, 3-Com, Bluesocket, Highwall, Tipping point etc. devices would be configured as an event source. These appliances would work with the many SIM appliances that were installed at customer sites. The vast majority of the SIM systems being Linux based system.

 

Key Achievements:

 

Designed and deployed a secured wireless distance education network. Designed and developed new reports in Crystal reports 10. Previous reports were from legacy mainframe infoman reports. This improved reporting ability helped this global financial institution in meeting GLBA, and SOX compliance regulations.

 

 

Security Architect

 

Computer Associates International, Inc.                             San Diego, California                            12/00-2/06

 

Ensured customer needs were identified and met to increase business growth and profitability.

Delivered effective technical presentations and demonstrations to potential customers for sales teams.

Rendered a full range of post-sales support services; properly designing and implementing selected software packages.

 

Served as a liaison between technical and sales professionals, devising customized solutions-driven strategies for both commercial and DOD accounts. Authored architecture documentation on customer infrastructure for future reference. Maximized solutions’ effectiveness and impact to customer operations, providing ongoing formal and informal training.

 

Key Achievements:

Key player in development and design of CA’s and Identity Access Management Suite, and wireless offering with forensics.

Certified with eTrust IAM suite of Identity and Site Minder, AC, SCC, Silent Runner.

Achieved the highest customer satisfaction levels in the region. Successfully converted security line of software into wireless security software package. Authored and co-authored numerous white papers on future trends of Mobile.

Thomas M. Mitchel, Page 2

 

Thomas Michael Mitchell

1126 Mary Drive

Prattville, Alabama 36066

334-306-2774

tommitchell2014@gmail.com

http://www.linkedin.com/profile/view?id=1114980&trk=nav_responsive_tab_profile

 

 

Experience Summary

 

Ø      Highly competent Security Strategist with over 25 years’ experience in information technology and security enterprise environments, driving sales and solutions that map to critical business goals.

 

Ø      Experience in Wireless Security, Mentoring, Penetration Testing, Technical Training, Risk Management, Vulnerability Assessment, Network Security, Ethical Hacking and Mentoring, Firewall Administrator.

 

Ø      Hold CISSP, CEH, HBSS, LPT, ITIL, CNSA, CNDA, McAfee, Encase, Microsoft

 

Ø      Hold Secret Clearance (active), DHS EOD, DHS.  TS eligible; in progress

 

 

Recent Experience

 

Ø      Currently ISSO responsible for IA program activities within DHS/USCIS Operation Center.   As the ISSO one must elevate performance anomalies to the System Owner and security anomalies to the bureau or office Chief Information Security Officer (BCISO) and the responsible incident response capability for assistance in resolution.

 

Ø      In role of ISSO for State of Alabama Medicaid division, developed the Medicaid System Security Plan (MSSP) along with supporting policies and procedures in accordance with NIST 800 series. The following have been applied throughout the Medicaid infrastructure: The regulations of FISMA, NIST standards along with the Harmonized Security and Privacy Framework. The Harmonized framework is used is to communicate certain key federal guidance and requirements to enable effective security and privacy implementation and operation encompassing both HIPAA and IRS regulations.

 

 

Customers Supported

 

I have supported Federal DHS USCIS and DOD entities such as Navy, Air Force and DISA and more than 60 of the Fortune-100 companies during my professional career. 

 

 

 

 

Education

 

Ø      Capella University MS - Information Assurance & Security -2011

 

Ø      National University BS - Information Technology - 1997                                                                                                 

 

Certifications, Licenses

 

Encase 4.5

 

Python

 

Splunk

 

Palo Alto

 

ITIL V3 Foundation             

                                                                                                 

EC Council Certified Ethical Hacker CEH

 

EC Council Certified Network Systems Analyst CNSA

EC Council Certified Network Defense Architect CNDA

EC Council Certified Licensed Penetration Tester LPT                                                                                                 

Certified Computer Security Incident Handler (CSIH)                           

Certified Information Systems Security Professional (CISSP), 63456                           

MCDBA: Microsoft Certified Database Administrator  

MCSE: Microsoft Certified Systems Engineer

McAfee Certified EPO 4.6 

Symantec Certified Professional                                                                                   

Symantec Endpoint Protection 10, 11, 12                                                                                   


 

Publications

 

Authored “A Practical Guide to Securing and Managing the Wireless Network” (2003).

 

SECURING THE SMART GRID (Situational Awareness Project Series) [Kindle Edition] (2011)

 

Managed Security as a Service MSAAS- The McAfee ePO Project (Situational Awareness Project Series) [Kindle Edition] (2013)

 

Authored the following white papers:

Benefits of a Wireless Policy, How to choose an Event Log Tool, Cloud Computing Secured

 

 

Other Training

Splunk

PaloAlto



Additional Info

BACK TO TOP

 

Current Career Level:

Manager (Manager/Supervisor of Staff)

Work Status:

US - I am authorized to work in this country for any employer.

 

 

Target Company:

Company Size:

 

Target Locations:

Selected Locations:

US-AL-Montgomery