From: route@monster.com
Sent: Thursday, November 10, 2016 3:23 PM
To: hg@apeironinc.com
Subject: Please review this candidate for: Network Engineer TS SCI
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
Quincey, L, Shepherdquinceyshepherd1981@gmail.com 210.763.1637 H117 Buckskin Way 210.763.1639 CCibolo, TX 78108 Citizenship: USVeterans Preference: 5
points
Objective: Interactive Operator position Work
Experience Job Title:
Interactive Onet OperatorJAN/ 14- Present United States
Navy/NSA 7700 Portranco Rd.
San Antonio, TX
78251 - Worked for National Security Agency’s Tailored
Access Operations in the Remote Operations Center - Conducted
extensive hours of specialized real-time Computer Network Operations in
support of theater and national level tasking using custom made scripts made
to run on red hat linux and windows operating system. - Established and
documented safe, effective methods for Computer Network Exploitation,
focusing on tradecraft security for operations. - Prepared courses
of action while managing risk with operational situational awareness. - Trained
certified operators to conduct exploitation operations & exploitation
trainer responsibilities. - Provided
technical guidance and education to fellow sailors on basic networking
scenarios, exploitation methodology and troubleshooting techniques. - Ensured
strategic level national security goals were reached through the use of
tactical precision during each mission. - Provided risk
mitigation and technical recommendations to senior leadership for live
operations. - Worked closely
with National Security Agency analysts to plan operations against adversarial
networks to further the mission and signals intelligence requirements of the
U.S. Government. - Conducted
security product testing against various Computer Network Exploitation tools.
- Analyzed source
code for Computer Network Exploitation and non-Computer Network Exploitation
tools for troubleshooting and other purposes. -Editing python
scripts for use on covert network. Job Title:
Interactive Onet OperatorJAN/09 – JAN/14 United States
Navy/NSA Fort Gordon Georgia
Augusta, GA Zip
30905 - Worked for National Security Agency’s Tailored
Access Operations in the Remote Operations Center - Conducted
extensive hours of specialized real-time Computer Network Operations in
support of theater and national level tasking using custom made scripts made
to run on red hat linux and windows operating system. - Established and
documented safe, effective methods for Computer Network Exploitation,
focusing on tradecraft security for operations. - Prepared courses
of action while managing risk with operational situational awareness. - Trained
certified operators to conduct exploitation operations & exploitation
trainer responsibilities. - Provided
technical guidance and education to fellow sailors on basic networking
scenarios, exploitation methodology and troubleshooting techniques. - Ensured
strategic level national security goals were reached through the use of
tactical precision during each mission. - Provided risk
mitigation and technical recommendations to senior leadership for live
operations. - Worked closely
with National Security Agency analysts to plan operations against adversarial
networks to further the mission and signals intelligence requirements of the
U.S. Government. - Conducted
security product testing against various Computer Network Exploitation tools.
- Analyzed source
code for Computer Network Exploitation and non-Computer Network Exploitation
tools for troubleshooting and other purposes. Job Title:
Network Penetration LeadNOV/05 – JAN/09 United States Navy 1247 W. C Street
Norfolk, VA 23511 -As team lead of the Navy’s Red
Team I ran operations on multiple military installation around the world that
simulated adversarial cyber threats successfully demonstrating the
enemies tactics and security risks s threatening the DOD Global Information
Grid, resulting in the training of over 6,000 users on Operational
Security and computer security awareness. -I was
instrumental in improving the network security posture and incident handling
processes of Navy units by implementation of new security procedures and
training multiple Navy units, which deterred possible adversarial penetration
of over 8 naval unit networks. -I have experience
in social engineering, wireless penetration operations, and vulnerability
testing. As team lead I conducted over 90 hours of open source research to
develop a plan to infiltrate one of the military networks at multiple Navy
commands. By using my skills of network exploitation and social engineering
skills I help crack Common Access Card security, and increased security
awareness within Navy computer network Domain. Job Title:
Cryptologic Technician Maintenance/NetworksNOV/01 – NOV/05 United States Navy 640 Roberts Ave.
Pensacola, FL 32511
-As a
Cryptologic Technician Maintenance I Conducted detailed analysis of 4
communications network in support of 3 national information needs requests.
During analysis I produced 10 component network security maps which allowed
multiple government entities to make major cyber security decisions on the
defense of DOD networks, which also led to the capture of high interest
targets to the United States.
-As an subject matter expert (SME) I trained multiple subordinates in
cyber-attack and cyber defense methodology to included network vulnerability
testing and computer forensic by using tools such as windows sys internal
commands, metasploit, and wireshark; which led to 90% of them
qualifying to do analytical work on DOD networks.
As team lead for 12 months a position usually held by higher ranking
personnel I led my team in researching and analyzing high-priority cyber
threats that directly contributed to National Security Agency on-going
operations for DOD entities around the world. As the team
lead for my installation team I contributed to installing and managing
multiple DOD networks to include network printers, network servers, host
clients, firewalls, and running fiber cables which saved the command over
70000 dollars in contractor expenses. Education 05/00
Diploma Phillips High
School, Birmingham, AL 35203 Job Related
Training 04/15 Cisco
Certified Network Professional (CCNP), Global Knowledge 01/15 Cisco
Certified Network Associate (CCNA), Global Knowledge 01/15 Cisco
Certified Entry Networking Technician, Global Knowledge 09/06 Certified
Ethical Hacker, E-Council 04/06 Security+, Comptia 03/06 Network+,
Comptia 03/06 A+, Comptia Honors,
Awards 11/05 Navy
Achievement Medal 01/08 Navy
Achievement Medal Other
Information Active TS/SCI Clearance (JAN
2013) w/CI Poly (APR2015) Over 5 years of Penetration
Testing related experience Over 10 years of computer and
networking experience Journeyman Network Operator Skills Some C+
programming
malware analysis Some
python
windows OS Nmap
Red Hat Linux Metaspolit
Core Impact framework Wireshark Tcpdump |
|
|
|||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||
|
|