From:                              route@monster.com

Sent:                               Thursday, October 27, 2016 4:32 PM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: ACAS

 

This resume has been forwarded to you at the request of Monster User xapeix03

Paul Kratz 

Last updated:  02/23/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Chula Vista, CA  91910
US

Mobile: 619-947-3645   
Home:
619-422-2734
kratzp321@yahoo.com

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Network Vulnerability Technician - Information Assurance Specialist

Resume Value: vgshjqp2wkfsbk2b   

  

 

PAUL C. KRATZ                                                                                         260 Bonita Glen Dr. Apt. X17                                                                                              Chula Vista, CA 91910                                                                                                   Cell:  (619)947-3645                                                                                                         E-mail:  kratzp321@yahoo.com

OBJECTIVE:  Position as an Information Assurance Specialist with emphasis in Accreditation / Certification and Network Security Vulnerability Analysis / Assessment.  Currently hold an active secret security clearance.

SKILLS SUMMARY:

Certification and Accreditation experience in DoD, DITSCAP, DISA Stigs, and DISA Security Checklist experience.  Complete Security Policy Knowledge and Development, IAVA – Information Assurance Vulnerability Alert / VRAM – Vulnerability Remediation Assessment Management, EMASS – Enterprise Mission Assurance Support Center, DON Application Database Management System (DADMS), DoD IT Portfolio Repository – DON (DITPR-DON), Security Readiness Review, DoD 8500, and DoD 8570.01  Scanning tools and methods used include Assured Compliance Assessment Solution (ACAS) which replaced eEye Retina, SCAP Compliance Checker SCC Tool which replaced the DISA Gold Disk, and DISA’s Vulnerator Program.

Information Assurance Specialist – SERCO NA San Diego, Ca. from 11 April 2016 – February 29, 2016

·   Responsible for all aspects of IA on the Training and Operational Readiness Information Services (TORIS) Enterprise program.  Managed the Information Assurance Vulnerability Alert (IAVA) process by updating the U.S. Navy’s OCR Website acknowledging and updating the required IAVA/IAVB/IAVT after the identified vulnerability had been corrected.  Transitioned to the Vulnerability Remediation Asset Manager for the TORIS Enterprise consisting of 6 Virtual Servers in the Navy Enterprise Data Center (NEDC) and the PACFLT-ATGPAC DEVLAN (Developer) Intranet Network consisting of 2 Physical Servers, 5  Developer workstations (Windows 2012 R2), 11 User Workstations (Windows 7), 13 Virtual Servers (Windows 2012 R2), 1 System Administrator Workstation, 2 Database Manager workstations (Microsoft 10), and 1 Assured Compliance Assessment Solution (ACAS) Laptop (Linux 6). 

·   Coordinated with Navy Enterprise Data Center (NEDC) with the transfer of the TORIS Program from the Regional Information Technology Service Center to the (NEDC) SSSCPAC CLIN27 Hosting Enclave (SCHE) consisting of two web virtual servers and four virtual database servers as mandated by the United States Navy.  Worked with NEDC Personnel to provide the necessary information for the Engineering Analysis and Accreditation / Certification documentation (Certification / Accreditation Plan, and Contingency Plan, Retina Scans, and SCAP Scans) to receive the ATO MOD from the Designated Approving Authority.

·   Setup the DITSCAP Accreditation / Certification process (Retina Scans, SCAP Scans, Security Controls in EMASS  Certification / Accreditation Plan, Contingency Plan / Disaster Recover Plan, Incident Response Plan, Test Plan, Risk Assessment Report (RAR), STIG Checklists for the move from the NEDC SCHE to the NEDC Extension demilitarized zone  (EDMZ) (Purgatory) Zone to receive the IATO, and at the same time setup the new TORIS Production Servers (3) and TORIS QA Servers (3) in the NEDC Test & Evaluation zone receiving the Authority to Operate (ATO).

·   Upload monthly PACFLT-ATGPAC DEVLAN (Developer) Intranet Network ACAS Scan data into the Vulnerability Remediation Asset Management System monthly.

·   Q/A monthly Microsoft Security Patching performed by Navy Enterprise Data Center (NEDC) personnel on the TORIS Production Servers and TORIS QA Servers twice a month (after Microsoft Tuesday) by following a precise test plan to ensure the suite of TORIS Applications (EOM repository, TORIS Supply, AEPP 2, work correctly. 

·   Continued to execute and test the SOP for all 5 members of the Development team to run the Radia program allowing them to download and execute the required Microsoft Security patches on S&T NMCI workstations on a weekly basis.

·   ATGPAC Central point of contact to submit trouble tickets to the NEDC Helpdesk tracking them to closure such as:  Data Center Hosting – Outages, Microsoft Security Patching, VMware Security Vulnerabilities, Citrix Account Creation, ACAS Scan Analysis, SCAP Program.

·   Initiated and monitored the Annual Cyber Security Training to be completed for all TORIS team personnel as mandated by the Department of Defense on an annual basis.

·   Streamlined the Account process for TORIS team personnel to receive accounts on the TORIS Servers in the Navy Enterprise Data Center by initiating the SAAR-N request to be completed by the person, sending them to the  Government Representative for signature, SERCO Security Manager for verification, and finally submitted to the Navy Enterprise Data Center (NEDC).

·   DON Application Database Management System (DADMS) and DoD IT Portfolio Repository – DON (DITPR-DON) Subject Matter Expert for TORIS .  These 2 records are updated on a continual basis to ensure accuracy of the record for the Annual Security Review conducted by DoD Echelon I and COMPACFLT ECH II ensuring FISMA Compliance.

·   Currently working on the Accreditation / Certification of the PACFLT-ATGPAC DEVLAN (Developer) Intranet Network consisting of 2 Physical Servers, 16 Virtual Servers, 5 Developer Workstation (Windows 2012 R2), 11 User Workstations (Windows 7), 1 System Administrator workstation (Windows 2012 R2), 2 Database Administrator Workstations (Microsoft 10) and 1 ACAS Laptop (Linux 6).  Completed Security Controls in EMASS, uploaded the following artifacts – Certification/Accreditation Plan, Contingency Plan, Incident Recovery Plan, Test Plan, Risk Assessment Report, ACAS Scans, Security Content Automation Protocol (SCAP), and Security Technical Implementation Guides (STIGs) checklists – 85% complete.   Utilized the DISA Vulnerator program to input the ACAS Scan results, SCAP Scan results, and STIG Checklists to produce excel mitigation spreadsheets for analysis and provide corrective action for vulnerabilities identified.

Information Assurance Manager/Vulnerability Assessment Specialist – Global System Technologies San Diego, Ca from May 12, 2007 – January 22, 2010

·   Downloaded, installed, and managed Symantec Endpoint Antivirus Software and managed the signature file update process providing maximum protection against virus attacks and malicious code for 2 NMCI clin27 Windows 2000/2003 servers.

 

·   Managed the Information Assurance Vulnerability Alert (IAVA) process by supervising and monitoring the DoD JTF (Joint Task Force) and U.S. Navy OCR’s website updating required IAVA/IAVB/IAVT after the identified vulnerability had been corrected.

 

·   Executed and analyzed Eeye Retina Network Security Scans on 2 clin27 Windows 2000/2003 servers and 3 Solaris servers identifying security vulnerabilities and how to fix (via patch, registry key modification, local security policy  modification, or system services modifications) providing weekly statistical data to superiors.

 

·   Utilized DISA STIGS, and DISA Security Checklists to identify security holes, category, and how to fix to further eliminate security vulnerabilities to maintain accreditation requirements.

 

·   Initiated Annual DoD Information Assurance Training for 13 personnel providing the required NMCI Navy User Acknowledgement form outlining the terms, conditions and proper use for operating, managing, and accessing NMCI IT resources.

 

 

 

 

 

 

.

Systems Administrator / Helpdesk Coordinator – Global Systems Technologies San Diego, Ca from May 12, 2007 – January 22, 2010

·   Downloaded and installed DADMS Approved SQL Server 2005 software and loaded SQL Server 2005 Native client software on NMCI Workstations ensuring connectivity For MOCC Norfolk/MOCC San Diego/and worldwide supported Navy and Marine Corp. unites in preparation for MEASURE operations to transition to Oracle Database.

 

·   Setup and loaded 3 offline computer workstations as servers with Microsoft 2000 Server software to serve as Offline Backup storage for 7 MOCC San Diego Windows 2000 network drives (5 application drives, 1 user data storage drive and 1 Admin drive).  XCOPY was performed daily from the online servers to a 120GB Seagate External Hard drive then XCOPIED to offline servers on a daily basis.

 

·   Procured and installed 1 HP DAT 160 GB tape drive with HP Data Protector software to perform System Drive backups and Network backup saves daily, weekly, and monthly incremental daily full weekly and full monthly backups for 2 Windows 2000/2003 Servers on the NMCI Network.  More data was saved at less cost per tape.

 

·   Researched, procured, setup, and installed 2 Windows 2003 Dell R710 servers estimated cost of over $14000 as replacement servers of 2 Windows 2000 servers on the NMCI Network period running and eliminating high category security vulnerabilities prior to connecting to the NMCI Network Domain.

·   Executed Microsoft Defragmentation utility on 2 Windows 2000/2003 servers systems drives and network drives twice weekly to improve servers performance for increased daily workloads.

 

·   Initiated and administered 2 NMCI Clin27 Security Groups populating the groups with authorized users to access data  and preventing un-authorized users to access the systems possibly causing security threats.

 

·   Created Microsoft Access program to be used to document NMCI Computer problems to NMCI Helpdesk identifying the problem, corrective action taken, and time/date when completed.

 

·   Created, tested, and trained MOCC Supply personnel to use the Microsoft Access program to track inventories, determine when to order supplies and provide superiors with reports when necessary.

 

·   Setup SOP’s for ADP Personnel to run Retina Scan Reports and execute Symantec Antivirus Network Scans.

Access Database Administrator – MANCON (Management Consultants, Inc. San Diego, CA. from October 23, 2006- May 12, 2007

·   Created, tested, and administered 3 Microsoft Access Databases utilizing queries to produce reports to track personnel man hours, Lead Contracting Executives Initiatives, and dollars appropriated/used for all COMFISCS/FISCS Contracts.

Education: 

Bachelor of Science with Major in Computer Science.  Southeast Missouri State University Cape Girardeau, Missouri – Graduation December 1980

·   DoD Cyber Awareness Challenge V2

·   Introduction to DIACAP

Active Duty Military from August 1982 – August 2006.  Retired Honorably 2006.

 



Experience

BACK TO TOP

 

Job Title

Company

Experience

Information Assurance Specialist

SERCO

- Present

 

Additional Info

BACK TO TOP

 

Desired Salary/Wage:

50,000.00 - 60,000.00 USD yr

Current Career Level:

Manager (Manager/Supervisor of Staff)

Years of relevant work experience:

10+ to 15 Years

Date of Availability:

Immediately

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Secret

US Military Service:

Yes

Citizenship:

US citizen

 

 

Target Job:

Target Job Title:

Information Assurance Specialist

Desired Job Type:

Employee

Desired Status:

Full-Time

 

Target Company:

Company Size:

Industry:

Computer/IT Services

Occupation:

IT/Software Development

·         Computer/Network Security

·         Database Development/Administration

·         Desktop Service and Support

·         Network and Server Administration

·         Software/System Architecture

 

Target Locations:

Selected Locations:

US-CA-San Diego

Relocate:

Yes

Willingness to travel:

Up to 50% travel

 

Languages:

Languages

Proficiency Level

Spanish

Beginner