From: route@monster.com
Sent: Friday,
November 4, 2016 8:52 AM
To: hg@apeironinc.com
Subject: Please
review this candidate for: PaloAlto
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
Matthew Steven Demaske 174 Larissa Drive, Charleston, SC 29414 / (843) 847-1806 / matthewdemaske@gmail.com
Enterprise Cyber Incident Response Analyst at Secure Mission Solutions Solutions-oriented systems security specialist with notable
success directing a broad range of Department of Defense Information
Technology initiatives while participating in planning and implementation of
information-security solutions. Proficiencies include: ●
Security+, Network+, MCP, MCTS, and MCSA
certifications ●
Active Department of Defense Secret Security
Clearance ●
Enterprise Cyber Incident Response ●
Microsoft Windows Enterprise administration
and security configuration ●
McAfee ePolicy Orchestrator ●
Cisco IronPort and PaloAlto Networks web
proxies ●
Gold Disk,eEye Retina, and Nessus scanning
tools ●
SIEM correlation platforms ●
IDS/IPS administration and configuration ●
Network forensics and malware analysis Professional Experience SECURE
MISSION SOLUTIONS: Charleston,
SC
2011 - Present Incident
Response Analyst ● Conducts cyber incident investigations to ensure network
availability, information confidentiality, and data integrity in support of the
Department of the Navy’s mission objectives. ● Correlates output from SIEMs, ePolicy Orchestrator, web
proxies, firewalls, DNS logs, IPS/IDS systems, and vulnerability scanning
tools to determine true threats, false positives, network-based anomalies,
and system based anomalies. ● Provides reports detailing current enterprise cyber threats
and mitigation plans to Navy Medicine senior leadership. ● Assists in researching, developing, and deploying
countermeasures to ensure organizational networked assets are compliant with
all Department of Defense/Department of the Navy cyber security regulations. ● Conducts operations as the technical lead and subject
matter expert for the Navy Medicine SIEM system which correlates over five billion
security events per month. TEK SYSTEMS: Charleston,
SC
2010 - 2011 Security
Analyst ● Assisted Enterprise Incident Response team in detecting and
responding to site incidents within the Navy Medicine Enterprise. ● Performed host-based information security and event
analysis using McAfee ePO. ● Crafted host-based IPS, Application Blocking, and firewall
exceptions on behalf of site Host Based Security System teams as requested
and as needed. ● Provided reports detailing detected events to Navy Medicine
Senior Management and Hospital Information Awareness Managers. UNITED STATES MARINE CORPS: Cherry Point,
NC
2004 - 2009 Network Specialist ● Administered multiple Windows Enterprise domain
environments which supported medium-large domains exceeding 1,000 or more
users. ●
Provided customer service and help desk
support for end users. ●
Configured firewalls and IDS/IPS systems to
detect and prevent network intrusions. ●
Administered WSUS, eEye Retina, Symantec AV
Server, and other tools to ensure systems were properly patched. ●
Tasked with managing small-medium sized
groups of personnel to ensure mission objectives were accomplished. Education ECPI
University, North Charleston, SC B.S., Computer
and Information Science Cum Laude |
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|