From:                              route@monster.com

Sent:                               Monday, October 24, 2016 11:03 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: Network ADMIN ccna

 

This resume has been forwarded to you at the request of Monster User xapeix03

Stuart Makowski 

Last updated:  10/24/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Las Vegas, NV  89117
US

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Consultant 21.1

Resume Value: w3s6jrdjjtbgeaa2   

  

 

Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
Executive Summary
· Highly accomplished contract-for-hire global enterprise information security professional with over 20 years
of progressive experience.
· Architected, managed, and administered enterprise environment that had 2,600,000 global users.
· Managed budgets up to $87,000,000.
· Designed and wrote the strategic roadmap for clients whose annual sales were over $15,000,000,000.
· Architect, engineer, maintain, and administrator for intrusion detection/prevention systems
(IDS/IPS), security information event management solutions (SIEM), data loss prevention (DLP),
identity access management (IAM), malware analysis, wireless application firewall (WAF),
firewalls, enterprise resources planning (ERP), automated threat forensics, dynamic threat
protection, packet analysis tools, and operating system analysis
· Performed all levels of incident response and cyber intelligence.
· Subject matter expert cyber warfare
· Global leadership, engineering, and administration for Information Security
· Hands-on technical understanding of incident response, computer forensics, network and
application security
· Master at identifying and clarifying information security and technology risks and coordinating remediation efforts
· Documented ability to bring the benefits of Information Technology
· Established security policies, procedures, practice, and methodology.
· Client include, but not limited to: Defense Industry (government and civilian), Intelligence Agencies,
Banking, Finance, Retail, Communication, Mining, Energy (government and civilian), Medical, Hospitality,
Entertainment, Insurance, Government (Federal and State), Airline
· Extensive experience with ISO9000, ISO9001, ISO17799, ISO27001, ISO27002, ISO27002:2005, HIPAA,
HITECH, SOX, PCI-DSS, FISMA, FIPS, NIST,PKI, SSLDC, DIACAP, COSO, COBIT, RA,VA,
INFOSEC, OPSEC, C&A, FAM, FAH, DITSCAP, NIACAP, SAS70 ( I & II), SSAE16, DIACAP,
POA&M, ERP, DCID 6/3, NISPOM, OMB A-130, SST&E, SSA, SSP, ITIL, and DAA/IATO ATO.
· Advised executive management on Information Technology / Information Security related situations and
conditions.
Certifications
WEC-SG(PO)
ACSA
AEIA
CISM
CISSP
CISA
CCNA
MCSE 2000 and NT
MCP+I
CCA
CNA
MCP
Education
Doctor of Science in Information Security Management – Charter University June 2004
Master of Science in Computer Information Systems Management – Buxton University May 1998
Bachelor of Science in Computer Information Systems Management – Buxton University December 1994
Security Clearances
Department of Defense -Top Secret Sensitive Compartmented Information
Page 1 of 16
I-Net+
Project+
Security+
Network+
Server+
HP Technician
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
Experience
Ten Zero Consulting
Chief Consultant
Some of the positions I have held:
ArcSight Global Capability Leader; Hewlett Packard Enterprise
Executive Security Consultant; Children’s Hospital Los Angeles
ArcSight Architect; Defense Information Security Agency
Security Architect; United States Courts
Director Cyber Warfare; United States Cyber Command
Global Information Security Director; MGM Resorts
Senior Cyber Security Engineer; Department of Energy
· Full responsibility for return on investment (ROI) and managing multi-million dollar budgets.
· Inspiring leader and articulate communicator.
· Supervised up to 174 personnel worldwide.
· Continuous learner with a passion for innovation in security risk management to drive bottom-line business
contributions (optimize security investments, avoid losses from security incidents, improve customer
retention, enhance business decision-making, and reduce corporate liability).
· ArcSight Global Capability Leader for Hewlett Packard Enterprise and the development of versions 6.9.1
and 7.0.0 of ArcSight
· Recruited, developed, motivated, and retained diverse staff structuring them into teams that delivered results
and savings.
· Lead a global team of highly skilled and experienced Architects, Engineers, Content Developers, and
Analyst
· Responsible for developing and maintaining the overall service delivered by a Managed Security Service
Provider
· Worked with regional capability leads to ensure consistency of the overall global offering of a managed
security service
· Responsible for maintaining and ensuring standard solutions are implemented and delivered according to
Global Portfolio direction.
· Proven record of department profitability and cost savings realized within various business enterprise
settings.
· International enterprise expertise in auditing, information security, and business continuity & disaster
recovery management and planning.
· Provided strategic direction to board of trustees, board of directors, and executive management
· Performed economic analysis, planned, programmed, and budgeted for information systems resource
requirements (equipment, people, and facilities).
· Developed strategic plans, policies and operating procedures.
· Assured that operations were maintained at targeted service levels
· Defined and implemented standard recruiting strategies and a career management program
· Streamlined departmental operations on a continual basis to improve business processes and reduce
redundant personnel
· Performed for database tuning, configuration changes, sizing, and troubleshooting.
· Developed integration capabilities with 3rd party systems including network management and
trouble ticketing applications.
Page 2 of 16
Aug 95 – Present
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
· Oversaw incident response planning as well as the investigation of security breaches, and assist with
disciplinary and legal matters associated with such breaches as necessary.
· Provide technical leadership to the enterprise for the information security program.
· Mentor and train others in information security in addition to training for other technical groups.
· Install and maintain security infrastructure, including IPS, IDS, log management, and security assessment
systems.
· Designing and Setting-Up the Splunk Architecture in the organization
· Configuring Indexers,Forwarders ( Universal and Heavy ),Search Heads,Deployment/Management Servers
· Creating Dashboards according to the business needs using Advance XML
· Various source of data log analyst
· Writing Splunk Queries
· Creating Applications on Splunk to analyze the Big Data
· Development of SPLUNK Queries to generate the Report
· Dashboard Creation in SPLUNK, running SPL Queries
· Various Metrics Creation in SPLUNK
· Automation/Simplification of Digital Guarding Process through SPLUNK
· Importing the data in Splunk through inputs.conf, props.conf and transforms.conf
· Automation/Simplification of Digital Guarding Process through SPLUNK
· Creating DLP(Data Leakage Prevention) Reports through SPLUNK
· Developing SPLUNK Application
· Assess threats, risks, and vulnerabilities from emerging security issues.
· Publish Security Updates newsletter for technical groups.
· Draft enterprise security standards and guidelines for system configuration.
· Managed process and acted in the lead role for computer security incident response team.
· Perform and create procedures for system security audits, penetration-tests, and vulnerability assessments.
· Develop scripts to maintain and backup key security systems
· Configure solutions to match up with compliance.
· Ability to translate business requirements into solutions delivered by development teams.
· Worked closely with Certification & Accreditation, Counter Intelligence, and Information
Assurance Team.
· Coordinated and conducted security event collection, using a log management tool, initiated event
management, enhanced compliance automation, and leveraged identity monitoring activities using the
ArcSight platform.
· Subject matter expert on ArcSight.
· Used ArcSight ESM in daily operational work and managed the workflow of events to the appropriate
business unit or corporate group.
· Identification of cyber threats associated with systems and technology vulnerabilities and risks via
analysis of the information and data.
· Extensive experience in:
o
Responding to targeted threat events
o Writing custom parsers for NetWitness or other network forensic tools
o
o
o
Performing open source research to identify emerging threats
Page 3 of 16
Information security, incident response, investigation, and penetration testing
Computer forensics (host and network-based)
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
· Advised executive and senior leadership on monitoring and reporting best practices and then developed use
cases on how to use ArcSight to achieve end state requirements.
· Provided technical architectural services for ArcSight ESM, Logger, and Connectors.
· Provided custom development of Connectors (Agents) using the ArcSight FlexConnector.
· Customized security content including filter/rule/report creation, signature categorization, and vulnerability
mapping.
· Architected a distributed Multi-Manager architecture and deployment.
· Collaborated with IT resources on troubleshooting and configuring networking devices, various platforms,
and databases (Oracle).
· Responsible for upgrades & patches for all components of information security systems.
· Ability to translate business requirements into solutions delivered by development teams.
· Developed content for a complex and growing ArcSight infrastructure, including use cases for Dashboards,
Active Channels, Reports, Rules, Filters, Trends, and Active Lists.
· Applied Configuration Management disciplines to maintain hardware/software revisions, content, security
patches, hardening, and documentation.
· Worked closely with Certification & Accreditation, Counter Intelligence, and Information Assurance Team
to maintain security requirements for operation of security systems.
· Architected the establishment, enhancement, and continual improvement of an integrated set of correlation
rules, alerts, searches, reports, and responses.
· Coordinated and conducted event collection, log management, event management, compliance automation,
and identity monitoring activities.
· Responded to day-to-day security requests relating to security operations.
· Tuned ArcSight performance and event data quality to maximize ArcSight system efficiency.
· Detected and analyzed cyber threat activity for the identification of advanced persistent threats and malware
in real-time.
· Proactively researched emerging cyber threats. Applied expert understanding of hacker methodologies and
tactics, system vulnerabilities and key indicators of attacks and exploits.
· Directly communicated to team members and executive leadership both quantifiable and qualifable cyber
risk to the enterprise and vendor partners though operational briefings and threat intelligence reports.
· Investigated and analyzed events related to cyber incidents.
· Planned, directed and facilitated response and recovery activities, based on a mature understanding of data
sources, in response to a cyber-threat incident.
· Provided optimization of data flow using aggregation, filters, etc. Develop custom Flex Connector as
required to meet use case objectives.
· Architected the operation of ArcSight Security Information and Event Management systems to include
ArcSight ESM, Oracle, Connector Appliances, SmartConnectors, Logger appliances, Windows and Linux
servers, network devices and backups.
· Life-cycle management of the ArcSight platforms to including coordination and planning of upgrades, new
deployments, and maintaining current operational data flows
· Applied Configuration Management disciplines to maintain hardware/software revisions, ArcSight content,
security patches, hardening, and documentation.
· Provided guidance to security analyst and network engineering staff.
· Managed the establishment, enhancement, and continual improvement of an integrated set of correlation
rules, alerts, searches, reports, and responses.
Page 4 of 16
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
· Performed systems hardening to meet Department of Defense, Department of Energy, and National Institute
of Standards.
· Provided optimization of data flow using aggregation, filters, etc.
· Developed custom Flex Connector as required to meet use case objectives.
· Managed and lead in the operation of ArcSight Security Information and Event Management systems to
include ArcSight ESM, Oracle, Connector Appliances, SmartConnectors, Logger appliances, Windows and
Linux servers, network devices and backups.
· Life-cycle management of the ArcSight platforms to including coordination and planning of upgrades, new
deployments, and maintaining current operational data flows
· Applied Configuration Management disciplines to maintain hardware/software revisions, ArcSight content,
security patches, hardening, and documentation.
· Worked closely with C&A Team to maintain Security requirements for Operation of ArcSight systems.
· Architected all aspects of Security Information and Event Management initiative.
· Engineered the establishment, enhancement, and continual improvement of an integrated set of correlation
rules, alerts, searches, reports, and responses.
· Coordinating and conducting event collection, log management, event management, compliance
automation, and identity monitoring activities.
· Responded to day-to-day security requests relating to ArcSight operations.
· Tuned ArcSight performance and event data quality to maximized ArcSight system efficiency.
· Lead analyst using ArcSight and other tools to detect and respond to IT security incidents
· Installed, upgraded, and backed-up Connector Appliances, Logger Appliances, and Smart Connectors
· Developed filters, rules and customized reports for ArcSight Loggers
· Architected, implemented, engineered, and administered full Identity and Access Management
products
· Architected, implemented, engineered, and administered Log Management, Event Management and
Security monitoring
· Information Assurance (IA) Engineering and Architecture, Security Testing, and Certification &
Accreditation (C&A) for an unaccredited enclave environment to go live with Authority to Operate (ATO)
accreditation. Provided architecture and all levels of support during all phases of systems engineering, software
development, testing, deployment, and maintenance. This support included IA requirements definition/analysis,
security engineering, security architecture development, security design, integration support, DIACAP
documentation development, security testing, data base management systems, security infrastructure
applications/tools/services, Multi-Level Security (MLS) systems, Cross Domain Solutions (CDS), Service
Oriented Architecture (SOA) security, Intelligence Community security configuration guides (e.g., DISA
STIGs/checklists, CIS benchmarks, etc.), automated security testing utilities/tools (e.g., DISA GoldDisk and
SRR scripts, NESSUS, Retina etc.), DoDI 8500.2 IA controls, NIST Special Publications (800- series), and
network devices. Responsible for areas such as identifying INFOSEC requirements, defining security aspects of
system architectures, determining testing requirements and methodologies, and conducting analytical risk
management activities related to the development of information systems. Performed engineering services that
included but were not limited to the following: engineering studies and analyses; technology planning; systems
architecture development; requirements development; concept development; systems design; system
development and integration; test and evaluation; systems operation; control of systems and components;
integrated logistics support; modeling and simulation; configuration management; Demilitarized Zones (DMZs);
operating systems (Microsoft, Linux, Unix);security test and evaluation; security certification testing;
independent verification and validation; penetration testing; auditing; ethical hacking; information assurance
control testing and validation; information system security policy; information protection needs elicitation;
technologies and applications relating to web services, service oriented architecture, intrusion
Page 5 of 16
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
detection/prevention, anti-virus, and firewalls; and systems acquisition and life-cycle management in
compliance with current industry and government practices.
· Analytical support included research and development of defensive information warfare concepts and
strategies, particularly within the national security framework. Coordinate related intelligence community and
DOD DISA Federal Department and Agency IA planning activities and identification of policy, technical, and
programmatic issues crossing organizational, functional, and program boundaries. Manage and participate in
software, systems, and security engineering activities, such as: small and large scale systems and security
engineering and development efforts; technology lab development for system and security application
prototyping; architecture and infrastructure analysis; INFOSEC requirements definitions; technology evaluation
and assessment; e-commerce, public key infrastructure (PKI) design and deployment; multi-level security
technologies; intrusion detection and analysis; simulation and modeling; development of IA concepts and
strategic implementation planning for Intel community CIO Office and DOD DISA organizations; web site and
content design and development and integration of DIAP IA policy and guidance system to serve as centralized
and authoritative source of IA policy, legislation, directive; perform and conduct system-level designs, reviews,
and risk management assessments; develop certification and test and evaluation, technical reports, and project
plans; perform systems integration and monitoring of the implementation of processes, hardware and software
solutions, and technical writing.
· Ensured credit card systems were built and operated in compliance with Information Security Policies and
Payment Card Industry (PCI) regulations.
· Outlined the information security controls, testing, and evaluation requirements for the Systems Security
Development Life Cycle. (SSLDC)
· Provided Information Assurance activities in accordance with current DOD policies, National Institute of
Standards and Technology (NIST), industry best practices and Defense Information Systems Agency (DISA)
guidance.
· Ensure all pertinent information is obtained to allow the identification, categorization, incident
handling and triage actions to occur in a time sensitive environment
· Analyze network traffic and various log data and open source information to determine the threat
against the network, recommend appropriate countermeasures, and assess damage
· Act as the point of contact for accepting, collecting, sorting, ordering, and passing on incoming
information for the reported cyber events
· Facilitate and expedite the tracking, handling, and reporting of all security events and computer
incidents in accordance with organizational procedures
· Evaluate threats, vulnerabilities and risk while supporting real-time security monitoring operations
· Build, implement and deploy data security solutions including IDS/IPS sensors and management
consoles
· Strong experience configuring and deploying Web Application Firewalls (Imperva)
· Prepare DR mechanisms and conduct failover testing
· Install, configure, maintain, audit, upgrade, update security products (non inclusive): proxy servers
(BluecoatSG 300-9000), Infoblox, Vulnerability scanners, Application Scanners
· Architecture, Design and Deployment of Symantec DLP infrastructure including building and
configuring servers as needed and supporting local administrator resources.
· Operational support and maintenance of Symantec DLP infrastructure, including deployment,
analysis, tuning, configuration, security administration and upgrading.
· DLP policy development, authoring, maintenance, and refinement.
· Creation and modification of DLP detection policies and policy elements (response rules, directory
groups, etc.)
Page 6 of 16
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
· Testing and evaluation
· Rollout and Deployment
· DLP Access control administration.
· Monitor DLP infrastructure for health checks, connectivity and availability.
· System administration of multiple DLP environments as assigned (test, pilot, production)
· Auditing/assurance, including development, implementation, and maintenance of plan to regularly
review policies and verify on-going DLP coverage at all monitoring points; preparing relevant
coverage info for internal customers and external clients
· Architected, installed, configured, and maintained, the following McAfee products: Enterprise
Policy Orchestrator (EPO), Virus Scan Enterprise, Data Loss Prevention (DLP), McAfee Agent, and
Host Intrusion Protection (HIPS).
· Administer system policies, repairs, and deployments and maintain agents on EPO to support
applications/tools not limited:
· EPO 4.6, 5.X
· Host Data Loss Prevention (HDLP 9.1, 9.3)
· Virus Scan Enterprise (8.8)
· McAfee Agent (4.8)
· Host Intrusion Protection (HIPS)
· Product(s) updates and upgrades
· Daily Ticket Queue Monitoring and Incident Resolution
· Work with customers and vendor McAfee on the key initiatives
· Change Management
· Problem Management
· Developed solutions for desktop support, server support teams, and supported business groups in
the installation and maintenance of applications and servers with regards to ePO
· Use troubleshooting skills to resolve installation and maintenance issues on operating systems and
other related areas.
· Architected, installed, engineered, tuned, maintained Identity and Access Management products:
· Directory and Data
· Provisioning/De-provisioning
· Self Service Access Request
· Password Management
· Privileged Access Management,
· Elevated Permission Account Access Management
· RBAC, ABAC and PBAC,
· Expansion of user administration, and access management (Cloud and/or Single Sign-On),
· Automated workflow, and automated provisioning tied with comprehensive User Self
Service capabilities.
· Provided optimization of data flow using aggregation, filters, etc.
· Developed custom Flex Connector as required to meet use case objectives.
· Managed and lead in the operation of ArcSight Security Information and Event Management systems to
include ArcSight ESM, Oracle, Connector Appliances, SmartConnectors, Logger appliances, Windows and
Linux servers, network devices and backups.
Page 7 of 16
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
· Life-cycle management of the ArcSight platforms to including coordination and planning of upgrades, new
deployments, and maintaining current operational data flows
· Applied Configuration Management disciplines to maintain hardware/software revisions, ArcSight content,
security patches, hardening, and documentation.
· Engineered the establishment, enhancement, and continual improvement of an integrated set of correlation
rules, alerts, searches, reports, and responses.
· Architecture, design, install, configure VMware ESX, ESXi, within VI3, vSphere 4 and vSphere 5
environments with VirtualCenter management, LabManager, vCloud Director, Consolidated Backup,
DRS, HA, DPM, vMotion, VMware Data Recovery, VMware Site Recovery Manager (SRM), vCenter
Operations Manager, Horizon Workspace, Horizon Mirage, ThinApp and VMware View desktop
virtualization infrastructure (VDI).
· Build, configure and deploy VMs and templates. Completed Physical-to-Virtual (P2V), Virtual-toVirtual
(V2V) and Virtual-to-Physical (V2P) migration of Windows NT, 2000, 2003, 2008, and 2012
as well as Linux servers from VMware, Hyper-V, Xen and legacy hardware.
· Recommended preventive, mitigating, and compensating controls to ensure the appropriate level of
protection and adherence to the goals of the overall information security strategy. Assisted in the development
of access-controls, separation of duties, and roles. Conducted technical risk evaluation of hardware, software,
and installed systems and networks. Assisted with testing of installed systems to ensure protection strategies are
properly implemented and working as intended. Assisted in incident response and recommend corrective
actions. Communicated with personnel about potential threats to the work environment. Participated in forensic
recovery and analysis. Participated in development and maintenance of global information security policy.
· Maintained security of voice and data networks and equipment. Monitored and maintained physical and
logical security and access to systems. Responsible for support of existing security policies and procedures, as
well as creation and implementation of new security procedures. Risk assessment of partners. Presented options
to management for the enhancement of DNS, firewall, modernization of firewalls, and inbound e-mail security
and robustness. Assisted with the upkeep of network infrastructure including switches and load balancers.
Assisted in migration of VPN concentrators to new project. Achievements include completing TruSecure
enterprise certification, and development of incident handling procedures.
· Global PKI Implementation, rolled out 10,000+ client certificates and 2000+ server certificates. Owned
Secure Email project, enhanced PKI vendor responsiveness, brought about radical improvements in Key
Management (KMS) reliability, set up operations support group, metrics, and implementation plans. Wrote
Infrastructure Control Review, and closed it with General Auditor's Office. Responsible for product
management, consultation, strategy, and standards. Established Certificate Practice Statement and Certificate
Policy. Owned SSL Server OnSite certificate strategy and contract renewal.
Worked with Office of the
General Counsel to develop and publish corporate encryption policies. Integration Test Lab product owner for
encrypted/signed email, Adobe digital signatures, etc. PKI product owner through four annual audits with no
comments. Led team which delivered technical solution and documentation secure email for a high visibility
project with severe time constraints. Managed vendor relationships with VeriSign and RSA.
· Expert in the system and application Certification & Accreditation (C&A) process including development of
the System Testing and Evaluation (ST&E) plan, System Security Plan (SSP), Configuration management
(CM), System Security Authorization Agreement (SSAA), Disaster Recovery Plan (DRP), Business Continuity
Plan (BCP). This includes all aspects of the Risk Assessment (RA), from identification of the Major Application
Metric under the General support systems, and the mitigation procedures using the Plans of Action and
Milestones (POA&M). Expert knowledge in NIST, FISMA, FIPS, FAM, FAH, DITSCAP, NIACAP, DIACAP,
DCID 6/3, NISPOM, OMB A-130, PCI-DSS, SOX.
Page 8 of 16
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
Hartsville/Lamar Police Department
Sergeant
United States Navy
Master at Arms - Petty Officer 3rd class
Jul 94 – Jan 00
Feb 88 – Aug 91
Page 9 of 16
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
Client list (non-inclusive):
Page 10 of 16
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
Page 11 of 16
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
Page 12 of 16
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
Page 13 of 16
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
Information Technology Technical Skills
(Not all inclusive)
3Com/TippingPoint IPS
Active Directory
Acunentix WVS
AdAware
Aelita
AirCrack
AirDefense Enterprise
AirKismet
AirSnort
AIX
Alien Vault
Angry IP Scanner
Apache
Apithief
AppDetectivePro
AppScan
ArcSight
ArcSight ESM
ArcSight Logger
ArcSight Network
Configuration Manager
(NCM)
Argus
ARPWatch
Arudius
AS/400
Audit
BAAN
Backtrack
Barracuda
BASE
BCP
BeEF
BIG-IP
Breaking Point
BrightMail
Brutus
BSD
Budgeting
Burpsuite
Business Continuity
C&A
Cain and Able
Canvas
Cat 6/5/4/3
CentOS
Certificates
Check point
Check Point Software
Technologies UTM-1
Check Point UTM-1
Cheops
Cheops-ng
Cisco
Cisco ASA
Cisco NAC Appliance
Cisco Systems VPN
Cisco Wireless Security
Suite
Cisco Works
Citrix
Citrix Access Gateway
Citrix Password Manager
Client Server
Clusters
COBIT
COGNOS
CORE Impact
COSO
Crackert 11g
Crystal Reports
CyberArk
Dameware
Data Loss Prevention
DB2
Dcfldd
DCID 6/3
Debian
De-Ice
DHCP
DIACAP
Digital Forensics Tool
Testing
Disaster Recovery
DITSCAP
DLP
DNS
DR
DSniff
Dumb terminals
Dynamix AX
Dynamix GP
EDI
E-Discovery
Entrust
ePO
ESX
Page 14 of 16
Etherape
Ettercap
Exchange
F5
FAH
FAM
FDDI
Fedora
Fiber Optic
Fierce Domain Scanner
Findevil
FIPS
FireEye
Firewalk
Firewall
FireWall-1
FISMA
Foundstone
Fping
Fport
Fragroute
Gauntlet
GFI LanGuard
GIS
GLBA
GroupWise
GuardianEdge Data
Protection Platform
Hadoop
Helix
HIDS
HIPAA
HIPS
HITECH
HP Openview
Hping2
HP-UX
Identity Protection
Authentication Service
IdentityGuard
IDS
IIS
IKE
IKE-Scam
Imperva
Infrared scanners
Intermec printers
Internet Key Exchange
IPS
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
IronMail
ISACA
ISECOM
iSeries
ISS
ITGA
JD Edwards
John the Ripper
Juniper Networks IDP
Juniper Unified Access
Control
Kali Linux
Kismet
Knoppix
L0PhtCrack
Lieberman
Linux
Linux Disk Editor
MAC OS X
Maltego
Management
McAfee
McAfee Endpoint
Encryption
McAfee Enterprise
Firewall
McAfee Total Protection
for Data
McAfee Vulnerability
Manager
McAfee Web Gateway
MetaSploit
Microsoft Base Analyzer
Mu-4000 Security
Analyzer
Multiplexers
MySQL
NAS
NBTScan
NBX
NDS
Nemises
Nessus
NetCat
NetScaler
NetStumbler
Netwib
Network Assessment
Network Security
Toolkit
NetIQ
Netwox
Ngrep
NIACAP
Nikto
Nipper
NISPOM
NIST
Nokia
Novell
NST
N-Stealth
Nstrings
NTOP
ODBC
Office
Oinkmaster
OMB A-130
OpenBSD
Oracle
OS/2 Warp
OSSTMM
P0f
Paros Proxy
PBX
PCI
PCI-DSS
PEcarve
Penetration test
Penguin Sleuth Kit
PE-scrambler
Pestat
PGP
PIX
PKI
Public Key
Infrastructure
PMI
POA&M
PointSec Mobile, Media
Encyrption, Full Disk
Encryption
PPTP
Project
Proventia Network
Multi-Function Security
(MFS)
Publisher
Pwdump
Qradar
QualysGuard
QualysGuard
Vulnerability
Management
RA
RACF
Radio Frequency
scanners
RainbowCrack
Raptor
Page 15 of 16
Ratinal AppScan
Red Hat
RedSeal
Remedy
Retina
RFID
RKHunter
RootKit Hunter
Router
RSA
RSA Access Manager
RSA envision
SA Series SSL VPN
Appliances
SAINT
SamuraiWTF
SAN
Sanctuary
SAP
SARA
SAS70
Scanrand
Scapy
SCCM
SCE
SCO
SCOM
Security assessment
Security Information &
Event Management
Servers
Sguil
Shavlik NetChk
Compliance
Short haul modems
Sidewinder
SIEM
Slackpack
Slickpack
Smart terminals
Smoothwall
SMS
Snort
Snow Leopard
Socat
Solaris
SolarWinds
SonicWALL Distributed
Wireless Solution
Sophos Email Security
and Data Protection
Sophos Endpoint
Security and Control
SourceFire
Sourcefire IPS
Stuart Makowski
mrtenzero@tzc.me
c:323.696.0818
SOX
SPIKE Proxy
Splunk
Splunk Enterprise
SQL
SSAA
SSL VPN
SSP
ST&E
Sun Microsystems
Identity Manager
SuperScan
Switches
Switches
Symantec
Symantec Control
Compliance Suite
Symantec Data Loss
Prevention (Vontu)
Symantec Mobile
Security Suite for
Windows Mobile
Symantec Network Access
Control
Symantec Security
Information Manager
Sysinternals
TAM
TCPDump
TCPtrsceroute
Tcpxtract
THC-Amap
THC-CUPASS
THC-Dialup login hacker
THC-Flood Connect
THC-Fuzzy Finger
Printer
THC-getVIP
THC-grenzgaenger
THC-HappyBrowser
THC-Hydra
THC-IPF
THC-IPv6 Attack Toolkit
THC-Keyfinder
THC-Leapcracker
THC-LoginHacker
THC-ManipulateData
THC-Orakel
THC-Orakel
THC-Parasite
THC-PBXHacker
THC-pptp-bruter
THC-PrintDates
THC-Probe
THC-rut
THC-RWWWShell
THC-Scan
THC-Shagg
THC-Snooze
THC-UnixHacking Tools
THC-vlogger
THC-Vmap
THC-WarDrive
The Coroner’s Toolkit
(TCT)
Thin Clients
TIM
Tivoli Access manager
Tivoli Identity manager
Top Secret
Tor
Trend Micro InterScan
Web Security Appliance
Trinux
Tripwire Enterprise
Ubuntu
Unicornscanner
Unix
UPXfail
Verisign
Virtual Network
Security Analyzer
(VNSA) 1.0
Visio
Vista
Vontu
VLAN
VMware
VPN
WAF
Wavemon
Web Application
Firewall
WebInspect
WebScarab
Websense Data Security
Suite
Websense Email Security
Websense Web Security
Whisker
WikID
Wikto
Windows 7
Windows 8
Windows 8.1
Windows 10
Windows 2000
Windows 2003
Windows 2008
Windows 2012
Page 16 of 16
Windows NT
Windows XP
WinHEX
Wireless
WireShark
Workstations
WSUS
Xprobe2
X-scan
Yersinia
z/OS
Zenmap



Experience

BACK TO TOP

 

Job Title

Company

Experience

Arcsight Global Capability Leader

Hewlett Packard

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Executive (SVP, VP, Department Head, etc)

Years of relevant work experience:

10+ to 15 Years

Date of Availability:

Immediately

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Top Secret/SCI

US Military Service:

Yes

Citizenship:

US citizen

 

 

Target Job:

Target Job Title:

Consultant

Desired Job Type:

Temporary/Contract/Project

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Computer/Network Security

·         Database Development/Administration

·         Network and Server Administration

 

Target Locations:

Selected Locations:

US-NV-Las Vegas

Relocate:

Yes

Willingness to travel:

Up to 100%

 

Languages:

Languages

Proficiency Level

English

Fluent