Lawrence Abrams, Jr.
labrams132@gmail.com
(706) 836-3008
SUMMARY
I am a proficient technician that has supported US Army Information Technology
missions since 2010. I have supported the US Army Regional Computer Emergency
Response Team - South (RCERT-S), part of the 1st Information Operations Command
(now Army Cyber), where I was a core part of the Army’s Computer Network Defense
(CND) mission. I’ve been leading the pen test team of contractors since December 2012.
As the pen test Interactive On-Net Operator (ION) team lead, I provide the Tactics,
Techniques, Tools and Procedures to perform Computer Network Exploitation (CNE)
missions according to the Army as well as conducting penetration testing when needed.
Also I supervise maintaining operational, technical, and authoritative situational
awareness with the Pen test during missions and during exploitation. I provide network
administration, cyber architecture consulting to other joint base sites in and out of the
client's area of focus. I work with our clients to identify specific requirements to develop
and adjust plans and schedules of the Interactive On-Net Operators. We also have joint
customers in SOUTHCOM that we support as well. I’m able to make decisions based on
the interpretation of regulations and practices when presented with mission data. I have a
vast knowledge background and can apply my skill set to difficult and complex work
assignments. I attend Information Security meetings and working groups to further my
knowledge on cyber security. During my tenure here, the customer has recognized me
many times for outstanding achievements.
SPECIALIIES
Computer Network Exploitation
Computer Architecture Exploitation
TCP/IP
OSI Model
Network Protocols
Mapping Network Topology and Architecture
Able to communicate effectively, verbally and in writing
Research TTP’s, trends and patterns of targets
SECURITY CLEARANCE
Active TS/SCI
Level/ Type of Investigation/Date: Top Secret/SCI/ 22 July 2011
Date of SCI Adjudication: 22 July 2011
Polygraph Date and Type: NA
EDUCATION
Brenau University, Augusta, Georgia
Masters in Business Administration
Graduated: June 2007
GPA 3.6
Brenau University, Augusta, Georgia
Bachelors in Business Management
Graduated: August 2006
GPA 3.0
Dean’s List
Lawrence Abrams, Jr.
labrams132@gmail.com
(706) 836-3008
Augusta Technical College, Augusta, Georgia
Associates of Applied Technology in Computer Networking
Graduated: December 2003
GPA 3.26
PROFESSIONAL CERTIFICATIONS
CCNP (Cisco Certified Network Professional) October 2008
CCDP (Cisco Certified Design Professional) March 2014
CCNA (Cisco Certified Network Associate) December 2002
CCDA (Cisco Certified Design Associate) March 2014
CEH (Certified Ethical Hacker) March 2011
MCSE (Microsoft Certified System Engineer) August 2003
MCSA (Microsoft Certified System Administrator) April 2003
Comptia SECURITY + July 2009
Comptia NETWORK + June 2002
Comptia A+ January 2003
PROFESSIONAL TRAINING
SANS 560, Network Penetration Testing and Ethical Hacking, 9Oct11 – 14Oct11
Retina, REM, STIG, and Gold Disk Training, 19Dec11 – 21Dec11
Computer Defense Assistance Program (CDAP) and US Army Penetration Testing
Course, 20Feb12 – 2Mar12
SANS 573, Python programming concepts for Penetration Testers, 7Aug12 – 10Aug12
DISA, Assured Compliance Assessment Solution (ACAS) Training, 6Nov12 - 9Nov12
Palo Alto Firewall Training, 30June14 – 2July14
PROFESSIONAL EXPERIENCE
Northrop Grumman
Threat Analyst
September 2010 – Present
· Ensure the survivability of DoD networks against attacks aimed at disrupting
services, gaining unauthorized intrusion/extrusion, or violating the integrity of
data on information systems.
· Detect exploits against networks and hosts.
· Conduct in-depth trend analysis, log analysis, analyze malicious software,
network traffic, packet captures, IDS/IPS/HIPS logs, web service logs and
other system/service logs to discover hacking attempts and identify
compromised systems.
· Conduct open source data collection.
· Extrapolate data, to validate analytical conclusions.
· Provided, developed, and maintained tactics, techniques, and procedures
(TTPs) used to conduct penetration testing.
· Evaluate locally developed tools for operational use.
· Exploits computer components and architectures.
· Plans and carries out successive steps and handles problems and deviations in
the work assignments.
Lawrence Abrams, Jr.
labrams132@gmail.com
(706) 836-3008
· Proficient in Computer Network Defense applications and tools: eEye Retina
Scanner, QTip, Core Impact, Metasploit, nmap, Kali Linux, Metasploit,
Wireshark, tcpdump.
Booz Allen Hamilton
Information Security Engineer
July 2009 – September 2010
· Analyzing and recommend solutions, upgrades and services for streaming and
process improvements for DoD networks.
· Certifying and Accrediting various DoD IT Systems.
· Analyzed DoD network traffic for anomalies and protected against intrusion
· Ran Gold Disk and DISA STIGS to harden DoD servers
Morris Communications
Network Engineer
November 2006 – July 2009
·
Installed, supported and maintained new networking hardware infrastructure
on the corporate WAN (Routers, Switches, and Wireless).
· Monitored network usage on the wireless and network irregularities.
· Worked closely with other departments/organizations and collaborating with
other IT staff when it comes to their networking needs and access.
Advanced Technology Group
Systems Engineer
May 2004 – November 2006
· Provided technical installation, implementation, and support of Cisco, HP, and
3Com Network Infrastructure; Coordinated strategic network projects and
performed contractual commitments for a diversified customer base.
PROFESSIONAL AFFILIATIONS
· BSidesAugusta Information Security Conference co-founder and operations
manager.
· Arrange weekly tech lunches among the CSRA infosec elite.
· Active member of the Information Systems Security Association (ISSA)
Augusta, GA chapter.
· Community Emergency Response Team (Columbia County, GA & Charleston
County, SC)