From:                              route@monster.com

Sent:                               Tuesday, October 25, 2016 11:15 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: Windows Active Directory Domain Administrator

 

This resume has been forwarded to you at the request of Monster User xapeix03

Rick Kozak 

Last updated:  10/11/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Winchester, CA  92596
US

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Rick Kozak

Resume Value: cb3w7jxhwrv49fwy   

  

 

Rick J Kozak

 

34875 Kooden Road

Winchester, CA 92596

(760) 450-3456

Rick.kozak1@gmail.com

Overview:Seasoned Information Security Professional with over 13 years’ experience seeking a position that showcases my current skills and allows me to improve my abilities through training and experience. I have 13+ years’ experience in the IT field, 8 years management experience, 8 years DoD, CISSP certified. Lead Architect/ Engineer- 3 years, 3 years Data network specialist, 13 years security systems analyst. TS security clearance and 2 years security systems administrator. I am very passionate about security and have a strong work ethic that would benefit any company I work for.

Experience:Cubic Transportation Systems, Inc.May 2013 – Present

Lead Security Engineer/Architect, Level II Security Analyst

·               Designed system security architecture and developed detailed security designs for the implementation of security tools such as Tripwire, McAfee ePO, Carbon Black, Shavlik Protect, Q1 Radar and Nessus across North America and Australia.

·               Utilized Tripwire Enterprise for file integrity monitoring by creating custom rules, alerts and reports that could be reviewed daily and in real-time to identify any changes authorized or unauthorized.

·               Monitored audit logs for anomalies, inconsistent patterns, and abnormal activity by creating custom rules, alerts and reports within Q1 Radar

·               Maintained and monitored McAfee ePO to ensure policies were set properly and being applied throughout the environments.

·               Created multiple policies across multiple sites in Carbon Black to help maintain a secure posture to out-of-date systems no longer supported.

·               Utilize Service-Now to create and track authorized changes to files, databases, systems and network devices.

·               Created Service-Now tickets to track and record incidents from malware, unauthorized changes, viruses, network intrusions and data exfiltration.

·               Trained System Administrators on how to use Tripwire, Carbon Black, McAfee ePO, Shavlik Protect, Q1 Radar, and Nessus by developing training documentation and providing class instruction on how to properly and effectively use the those tools.

·               Implemented PCI (Payment Card Industry) compliancy standards to meet or exceed the requirements for PCI Certification

·               Participated in SSAE16, PCI/DSS and ISO 27000 audits.

·               Reviewed and helped write the Incident Response Plan.

·               Participated in weekly change control meetings.

·               Provided input and ideas to co-works regarding security related matters.

·               Took on the extra responsibilities of System Administrator to provide support to an over extended workload on top of my normal duties.

·               Worked in a 24x7 Security Operations Center environment

 

United States Marine Corps    May 2005 – May 2013

Cyber Security Professional

·               Setup and maintained boundary security devices in the form of network intrusion/detection prevention systems, firewalls, access control lists and vulnerability assessment tools.

·               Created and implemented white lists and black lists for applications, IPs and ports and protocols on network firewalls to limit the security risk to a network.

·               Monitored network firewall logs to identify suspicious activity and reported or mitigated any findings in accordance to local security policy.

·               Installed and managed McAfee Host Based Security System (HBSS) for small and large scale tactical and garrison networks.

·               Configured and modified host-based firewalls by creating new policies and updating existing policies to identify suspicious activity created by viruses, malware and host-based intrusions.

·               Audited large scale networks and advised management on corrective measures.

·               Assessed network and client assets for vulnerabilities utilizing Retina Vulnerability Scanner, GFI Languard and Security Content Automation Protocol (SCAP) Compliance Checker.

·               Performed system audits and created System Readiness Reports showing asset compliance and deficiencies with current security policies.

·               Proficient in policy management and application of security policies on local and remote systems.

·               Created and taught multiple cyber security classes in regards to security policies and cyber security initiatives.

·               Investigated security violations in accordance with Marine Corps and DoD policy. Violations investigated dealt with unauthorized software, personally identifiable information, classification spillages, spam and inappropriate use by end-users.

·               Experienced as a Cyber Security Technician in troubleshooting, assessment, auditing and implementing information systems.  Emphasis on Security Technical Implementation Guide (STIG) application, FortiGate Firewall administration, Host Based Security System and group policy management.

·               Assigned as the Cyber Security subject matter expert for tactical deployments with 1st Marine Logistics Group.

·               Implemented security policies for 1st Marine Logistics Group and Headquarters and Support Battalion Marine Corps Base Camp Pendleton in accordance with DoD, NSA, FIPS and NIST guidelines.

·               Enforced security compliance for 65 servers, 6,000 workstations and over 10,000 users within 3 domains.

·               Familiarity with penetration testing tools: Nessus, NMAP, John the Ripper and Wireshark.

Helpdesk Supervisor

·               Managed a team of eight individuals for troubleshooting and technical support for over 300 users for twenty-four hours a day for thirty consecutive days.

·               Maintained a Service Desk Trouble Ticket System for tactical and garrison networks.

·               Ensured quality of service and professionalism was provided to all customers.

 

Network Administrator

·               Designed and implemented a network infrastructure to support over 1000 network devices and over 2000 users.

·               Installed and managed multiple instances of domain infrastructure utilizing Microsoft Windows server.

·               Trained employees on how to properly configure and implement Cisco switches and routers, Windows Active Directory and Exchange

·               Ensured confidentiality, integrity and availability were maintained for multiple security classification networks.

·               Trained numerous support personnel in proper network implementation for deployed tactical networks.

·               Proficiency built in Active Directory Architecture, server and client administration, and asset management.

Education:

SANS 511: Continuous Monitoring and Security Operations          Sept 2015

Course provides students with the skills to analyze security architecture for deficiencies apply the principals to design defensible security architecture, understand the importance of a detection-dominant security architecture and Security Operations Center (SOC) and identify the key components of Network Security Monitoring (NSM)/Continuous Diagnostics and Mitigation (CDM)/Continuous Monitoring (CM).

 

SANS 440: Critical Security Controls: Planning, Implementing and Auditing          Sept 2015

This course enables students to see how to implement and audit the Critical Security Controls and how to put the controls in place in an existing network through effective and widespread use of cost-effective automation.

 

SANS 408: Windows Forensic Analysis          July 2014

This course enables students to conduct-in-depth forensic analysis of Windows operating systems and media exploitation, identify artifact and evidence locations to answer critical questions, including application execution, file access, data theft, external device usage, cloud services, geo-location, file download, anti-forensics and detailed system usage.

 

Tripwire Operator/Professional Course         June 2013

This course provides students with the understanding and practice of threat intelligence and how Tripwire Enterprise helps, creating security workflows, examining and evaluating security-focused changes and creating security-focused reports and alerts.

 

Web Application Penetration Testing Course          Sept 2012

Course provided students with the skill sets in Cross Site Scripting, SQL injection, and Java Script injection. The focus was on both military and civilian application vulnerabilities and how to mitigate those vulnerabilities.

 

Marine Corps IA Blue Team Methodology         May 2012

This course provided students with the knowledge and skills to properly use and configure vulnerability tools used on the Marine Corps network.  This course covers server, workstations, routers, switches and wireless vulnerability assessment.  The students are required to provide analysis of their findings and provide a detailed report on how to mitigate vulnerabilities found during their assessment.

 

Information Assurance Technicians Course          Dec 2008

Marine Corps school for the 0689 Military Occupational Specialty. Marines within this field are charged with performing computer network defense of the Marine Corps Enterprise Network to ensure information availability, integrity, authentication, confidentiality, and non-repudiation. Duties include assisting in the development and execution of security policies, plans and procedures; design and implement data security measures, network intrusion detection/prevention and forensics; incident handling and response; vulnerability assessments and management; firewall management and certification and accreditation of Marine Corps systems and networks.

 

Data Supervisor Course           Jun 2007

An advanced level school for network administrators to enhance their skills on Cisco routing, switching, Active Directory, Microsoft Exchange, server administration and LAN/WAN concepts and implementation. This course focused on the installation and maintenance of small and large scale networks with emphasis scalability.

 

Data Network Specialist          Nov 2005

Entry level network administrator course specializing in basic network fundamentals, Operating Systems concepts, hardware familiarization, security fundamentals, Active Directory, server administration, Microsoft Exchange administration, Cisco routing and switching, and basic troubleshooting.

 

Continuing Education:

University of Phoenix           Jun 2015-Present

Currently working towards my Bachelor of Science degree in Information Technology, Advanced Information Systems Security Certificate 

 

 Certifications:

Tripwire Operator CertificateMay 2014

Certified Information Systems Security ProfessionalJan 2014

Marine Corps IA Blue Team MethodologyMay 2012

Top Secret Security ClearanceMar 2012

CompTIA Security + (Sec +)May 2009

 



Additional Info

BACK TO TOP

 

Current Career Level:

Manager (Manager/Supervisor of Staff)

Work Status:

US - I am authorized to work in this country for any employer.

 

 

Target Job:

Target Job Title:

Information Security Analyst

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Computer/Network Security

 

Target Locations:

Selected Locations:

US-CA-Riverside County

Relocate:

No