From:                              route@monster.com

Sent:                               Monday, October 24, 2016 10:31 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: DNS Secret

 

This resume has been forwarded to you at the request of Monster User xapeix03

Bill Phekoo 

Last updated:  08/29/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Herndon, VA  20170
US

Mobile: 703-509-9075   
bill_phekoo@yahoo.com
Contact Preference:  Email

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Bill Phekoo - Pen Tester/Cyber Security Engineer/Security Oversight GRC

Resume Value: q7fqas4n9p42ftst   

  

 

Resume of Bill Phekoo

(703) 509-9075

Bill_Phekoo@yahoo.com

 

                                             

QUALIFICATIONS PROFILE

 

Technical expert with over 16 years of IT experience, with a comprehensive knowledge of computer Information Systems Security, System Administration and Network Operations.  Extensive knowledge in the areas of system security, vulnerability scanning, penetration testing, risk assessment and cyber security analysis.  Experience in project coordination and system implementation of government systems, banking, brokerage, telecommunication, ISP and other large computer networks.  Highly organized team player with the ability to effectively manage project milestones, and project delivery.                            

 

CERTIFICATIONS

 

·               GWAPT - GIAC Web Application Penetration Tester

·               OSCP - Offensive Security Certified Professional

·               CISSP – Certified Information System Security Professional

·               Security+ - CompTIA Security Certification

·               CEH – Certified Ethical Hacker

·               CPT – Certified Penetration Tester

·               CCNA – Cisco Certified Network Associate

 

 

PROFESSIONAL EXPERIENCE

 

October 2015 – Present                                         Le, Arnold & Associates Pentagon City, VA                                                 Senior IT Security Engineer

 

·               Conduct IT Security oversight activities for Transportation Security Administration (TSA) Office of Information Technology.

·               Conduct IV&V Security Assessments on Cisco Routers, Cisco ASA Firewalls, Switches, Juniper Firewalls, F5 BIG-IP, Palo Alto and IBM ISS NIDS.

·               Verify security baseline configuration on Windows 7, 2003/2008/2012, Linux, UNIX operating systems and VMware servers.

·               Review Nessus scan results to identify relevant security vulnerabilities in the infrastructure.

·               Analyze security device configurations to verify that previously identified flaws have been corrected, and document all new security Findings

·               Conduct security assessment based on the Agency's policies, procedures, privileged user access, role-based access control, account management, multi-factor authentication and best security practices.

·               Perform ongoing risk determination to validate security controls and assess the system security posture.

·               Conduct research on vulnerabilities and exploits using publicly available as well as trusted resources.

·               Develop detailed remediation reports and recommendations for compliance and security improvements.

·               Provide oversight on configuring, deploying, and managing mission critical network appliances such as routers, firewalls, IDS/IPS, web proxies, etc.

·               Strong analytical and problem solving, oral and written communication skills.

·               Demonstrates strong organizational and time-management skills: multitasking, working individually and with a team, having a positive attitude, being self-motivated and reliable.

·               Works with minimal supervision, set priorities, and give attention to detail and quality.

·               Ensure full implementation of NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations, and all OMB cybersecurity requirements.

 

 

January 2014 – October 2015                       SE Solutions (Sub to SRA International)                          Herndon, VA    Cyber Security Engineer

·               Currently hold active Security clearance with the Transportation Security Administration (TSA).

·               Conduct IV&V Security Assessments on Cisco Routers, Cisco ASA Firewalls, and Switches, Juniper Firewalls, F5 BIG-IP, Palo Alto and IBM ISS NIDS for the TSA SOC.

·               Verify security baseline configuration on Windows 7, 2003/2008/2012, Linux, UNIX operating systems and VMware servers.

·               Test Xceedium privilege identity management tool.

·               Investigate new and emerging security threats against the Network infrastructure and interconnected systems.

·               Review Nessus scans results, ArcSight, Solarwinds, SiteProtector for potential threats.

·               Review IDS alerts and new signature validations.

·               Troubleshoot connectivity issues, analyze, debug and diagnose packets and logs.

·               Participate as an individual contributor and as part of a larger team in various projects.

·               Review network designs and evaluate compliance to applicable security standards.

·               Conduct security audits and provide recommendations to mitigate risks.

·               Ensure compliance to government security standards and policies (NIST, DHS, FISMA, TSA, etc.).

·               Review AppScan results, web logs for potential attacks.

·               Perform web application and infrastructure penetration tests (OWASP, PTES testing standards).

·               Write Security Assessments Reports for Findings uncovered during testing and evaluation.

·               Perform security reviews of application designs, source code covering all types of applications (web application, web services, and thick client applications).

·               Experience with various security tools and products (IBM AppScan, HP WebInspect, Metaspolit, Core Impact, Nmap, Nessus, NeXposed, Kali Linux, BurpSuite, OWASP ZAP, WireShark, Tcpdump, Snoop and Nikto)

 

July 2013 – December 2013     PhaseOne Consulting Group  Washington, DC

Security Consultant

·               Currently hold a US Government Secret clearance.

·               Responsible for providing technical security guidance for the U.S. Agency for International Development (USAID) security risks, cybersecurity, compliance and governance.

·               Identify Security requirements, feasibility of various Cloud based solution providers to meet FedRAMP/FISMA compliance for USAID.

·               Conduct Security assessment and customization for Cloud service Software-as-a-Service (SaaS) built on Amazon EC2 infrastructure.

·               Write Security test plans, and SA&A artifacts for cloud based solutions.

·               Perform product security design activities which required extensive research and analysis

·               Manually exploit and compromise operating systems, web application, and databases.​

·               Review web/​OS scans results and static source code analysis, find vulnerabilities, misconfiguration, and compliance issues, write final reports and defend all findings (their description, risk, and mitigation strategies)​

·               Report vulnerabilities identified during security assessments utilizing standard CVE, CVSS, ​SANS Top 25 and OWASP Top 10 classifications, as well as compliance standards: FISMA NIST SP 800-53. 

·               Support Xirrus wireless security implementation.

·               Worked with the Engineering Teams in the configuration and customization of MaaS360.com and other Mobil Device Management (MDM) applications.

·               Create network architectural Visio diagrams of the Enterprise infrastructure.

 

March 2013 – July 2013         TriTech Enterprises                  Washington, DC

Penetration Tester/Security Consultant

·               Responsible for performing technical security assessments, providing meaningful hardening and mitigation strategies.  Advising the client Department of Labor (DOL) about inherent security risks on their network.

·               Conduct network and web-based application penetration tests, physical security assessments, logical security audit, and hands-on technical security evaluations.

·               Conduct System Security Assessments using Cyber Security Assessment and Management (CSAM).

·               Conduct web application testing in search of security flaws such as XSS, CSRF, authentication bypass, parameter manipulation, application logic bypass, SQL injection, Cookie Manipulation, Buffer Overflow and DOS based attacks.

·               Monitor Akamai LUNA Control Center.

·               Knowledge of OWASP Top Ten security vulnerabilities.

·               Working knowledge of Unix (Solaris, Linux, BSD) and/or Windows (2003, 2008, 2012) and VMware.

·               Use tools such as Paros, Burp Suite, Backtrack, Nessus, nmap, MetaSploit, sqlmap, wireshark, AppScan,  Saint,  Nikto and Maltego

 

November 2011 – March 2013         Blue Canopy                        Arlington, VA

Red Team - Penetration Tester

·               Responsible for performing security assessments, informing the Federal Deposit Insurance Corporation (FDIC) about inherent security risks, and providing meaningful hardening and mitigation strategies.

·               Launch authorized, adversary-based assessment for defensive purposes commonly referred to as a “Red Team” activities focused on what one or more adversaries or APT threat actor would do if they were attacking a target.

·               Conduct network and web-based application penetration tests, physical security assessments, logical security audit, and hands-on technical security evaluations.

·               Serve as a subject matter expert in the topics of database security, wireless security, network security or application and development security.

·               Create and update security threat assessment reports and update network diagrams and attack plans.

·               Conduct in-depth security assessments on all relevant operating system security (Windows, Solaris, Linux, AIX, etc.) and proprietary OS.  Ensure that devices were current on OS security patches and virus signatures.

·               Use tools such as Paros, Burp, Backtrack, Nessus, nmap, MetaSploit, tcpdump, wireshark, Nikto and Maltego.

·               Identify security issues such as Cross Site Scripting, SQL Injection, Cookie Manipulation, Buffer Overflow.

·               Network vulnerability assessments, analysis, monitoring and reporting, and audits of network infrastructure.

·               Familiarity with scripting in UNIX shell, PERL, or Python.

·               Ensure compliance with all NIST, FISMA, FIPS and OMB-A130 requirements

·               Database administration, device configuration hardening and compliance verification experience.

·               Knowledge of applied cryptographic protocols.

·               Deployed nCircle security compliance scanner across the agency.

 

May 2010 – November  2011 Tantus Technologies             Washington, DC

Senior Security Engineer

·               Provide system security engineering support for the design architecture and implementation of Symantec Vontu DLPS Data Loss Prevention system at the Federal Aviation Administration (FAA).

·               Work with Government Leads to Configure Symantec DLPS solution to detect PII information within the agency as well as leaving the network perimeter.

·               Conducting network based scanning across the FAA enterprise for PII information and also implemented data at rest, data in use, and data in motion solution.

·               Configure and install Vontu/Enforce Network Manager, Discover Servers and Network monitors across the agency.

·               Translate the FAA’s requirements into a technical solution to meet needs not covered by off-the-shelf deployments, and/or ability to work closely with vendors to get requirements into production-ready solutions.

·               Create reports, conduct IA analysis, Risk Assessments and Mitigation plans.

·               Ability to design systems with considerations for performance, operations, cost, and support and solve complex technical problems to meet the customer requirements for software and/or hardware issues.

 

May 2009 – May 2010  QinetiQ North America            Springfield, Virginia

Principal Network Security Engineer

·               Member of the of  Security Engineering Team involved with cyber security implementation, design, monitoring and troubleshooting activities for the DHS/FEMA network infrastructure

·               Utilize tools such as Sourcefire IDS, ArcSight Manager (SIEM), ArcSight Logger, EnCase, Wireshark, Tenable Security Center, Einstein, Foundstone, Syslog, Netwitness, Bluecoat Proxy, Symantec AV, Sourcefire Defense Center, Netscreen, internet gateway, firewall logs, Remedy and the DHS/EOC online security management system.

·               Responsible for detailed analysis and the creation of Security Event Notification (SEN) tickets and provide supporting documentation for security incidents.

·               Create Sourcefire IDS signatures for deployment to the production systems.

·               Coordinate DHS Nessus security scanning activities and conduct vulnerability analysis on output results.  Performs threat/vulnerability assessments and remedial actions, to ensure systems are protected against known/potential threats and free from known vulnerabilities.

·               Researches threats and vulnerabilities and takes action to mitigate threats and remediate vulnerabilities

·               Notify DHS components of vendor software security patch notifications.

·               Work with the Focused Operations data forensic and Media Analysis teams on e-mail phishing campaigns and other cyber related exploits to design and implement pro-active Sourcefire IDS signatures.

·               Work with US-CERT on coordinated responses to cyber threats from malicious domains.

 

2002 – March 2009  Computer Science Corporation  Tysons Corner, Virginia - Senior Security Engineer

·               Assigned to a Department of Homeland Security (CBP/DHS) modernization project; Automated Commercial Environment (ACE) Security Certification and Accreditation Team.

·               Perform and evaluate vulnerability scans using the NESSUS scanning tool within a multi-platform, large enterprise environment. Initiate corrective action regarding security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security.

·               Use TENABLE Security Center to schedule network vulnerability scans, generate reports and conduct vulnerability assessments. Participate in OIG security audits and coordinate scans with DHS SOC and CSIRC.

·               Experience working with Cisco firewall, Snort intrusion detection, ITIM, Radius, Tacacs authentication technologies, work with various network protocols, security scanners, network and host based IDS systems.

·               Work with internet, web applications security techniques, correlate system logs and network anomalies.

·               Experience with regulations related to information security (NIST, FIPS 199, FISMA, DHS-4300A, etc.)

 

1998 – October 2002       3Com Corporation                          Vienna, Virginia

Senior System Engineer

·               Assist sales and pre-sales staff with presentations, demonstrations, training and installation of new products.

·               Developed and conducted training classes for AT&T, Sprint and Verizon.

·               Performed field engineer function, pre-sales activities, consulting services to other large customers.

·               Install and configure 3Com and Cisco routers and switches.

·               Configured Cisco 2500, 3600, 7200 routers and Cisco Catalyst 2900, 6500 switches.

·               Create UNIX shell scripts along with PERL and EXPECT scripts for network audits and inventory.

·               Install and configure UNIX SUN servers to support RADIUS and JAVA based NMS software.

·               Installed VOIP, SS7, VPN/L2TP/IPSEC, CDMA/3G wireless, SIP phones, ISDN and Softswitch.

·               Experience with UNIX OS, including SOLARIS, SCO, AIX, HPUX, LINUX, BSD and QNX.

·               Installed Cisco Pix and Symantec firewall.

 

OTHER WORK RELATED EXPERIENCE

·               Worked with the following software: Hummingbird Exceed, PVCS Dimensions, Hyperformix, Websphere Application Server (WAS), LDAP, Microsoft Project, Microsoft Office, AIX, Solaris, Win2K, Visio, Sniffer Pro, Mercury Loadrunner, Tivoli products, Cisco IOS, SSH, SSL, HTTPS, DNS, VLANS, NAT, RMS, MQSeries, IPS, IDS, Reverse Proxies and Bluecoat WAF.

·               Worked with the following hardware: Cisco 6513 and 3550 switches, Cisco 7206 routers, Cisco Pix Firewall, IBM P595 Servers, Brocade, Hitachi SAN, Symantec, and Agilent Technologies network analyzer.

·               Install Windows 7 Enterprise, Windows XP SP3, Windows Server 2008 R2, Windows Server 2003

·               Worked with ArcSight, Nitro, Foundstone, QualysGuard, GFI Landguard, IBM Appscan, Sourcefire,

·               Installed Cisco Pix, Checkpoint, Sidewinder, Gauntlet, Raptor, Tripwire, Remedy and Micromuse Netcool.

 

     WORK RELATED TRAINING

·               Symantec Data Loss Prevention System

·               2015 TSA Security Awareness Training

·               2014 TSA Security Awareness Training

·               2013 DOL Security Awareness Training

·               2012 FDIC Security Awareness Training

·               2011 FAA Security Awareness Training

·               2010 CBP IT Security Awareness and Rules of Behavior Training

·               2009 IT Security Incident Response Training

 

         EDUCATION & CREDENTIALS

Electrical Engineering           University of Toronto, Canada

Computer Science (Honors)                                      Sheridan College, Canada

Central Peel Secondary School                                 Brampton

Gordon Graydon Senior Public School                     Brampton

 

                                                 PROFESSIONAL ASSOCIATION

·               Member of IEEE (Institute of Electrical and Electronics Engineers)

·               Member of ISC2  International Information Systems Security Certification Consortium, Inc

·               Member of EC-Council

 

         HONORS and AWARDS

·               Leader of The Pack Award for outstanding service as part of the Sprint and Verizon account team presented annually to five people in the entire department at 3Com by the General Manager.

Page 1 of 5

 



Experience

BACK TO TOP

 

Job Title

Company

Experience

Penetration Tester/Cyber Security Engineer

Le Arnold and Associates

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Date of Availability:

Immediately

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Secret

US Military Service:

Citizenship:

US citizen

 

 

Target Job:

Target Job Title:

Penetration Tester/Cyber Security Engineer/Security Oversight

Desired Job Type:

Employee

Desired Status:

Full-Time

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Computer/Network Security

 

Target Locations:

Selected Locations:

US-FL-Miami
US-VA-Fairfax/Manassas/Reston

Relocate:

Yes

Willingness to travel:

Up to 25% travel

 

Languages:

Languages

Proficiency Level

English

Fluent