From: route@monster.com
Sent: Friday,
November 4, 2016 8:48 AM
To: hg@apeironinc.com
Subject: Please
review this candidate for: PaloAlto
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
Michael Hicks II 410-746-3869 • mr.michael.hicks.2@gmail.com IT SECURITY PROFESSIONAL Experienced IT Security and Network professional serving a
diverse client base in federal government agencies. Security and
Networking qualifications combine with demonstrated ability to implement
technical solutions to meet critical business needs. Outstanding
leadership and interpersonal skills that has yielded an effective working
relationships and top performance among staff. An excellent
communicator between technical and business units who can translate complex
data into easily understood terms. AREAS OF EXPERTISE Security Operations • IT Operations • Security
Auditing • System Design • System Applications Disaster Recovery Planning • Technical Documentation
• Technical Support & Training • Cross-Domain Solutions PROFESSIONAL EXPERIENCE DRC
9/2013 –present Information Systems Security Engineer Worked with all aspects of Risk
Assessment, the Certification & Accreditation process, continuous
monitoring, patch management, system security configuration, and specializing
with NIST documentation and implementation of its principles and practices. Key Projects · Wrote the
SSP and accompanying documents for the Certification & Accreditation
process. · Interfaced
directly with government clients on multiple projects to deliver their
security requirements. · Filled in
on other projects that needed help along the Certification &
Accreditation process. · Dealt with
patch management based upon the IAVA database and multiple security
constraints. ·
Configured, created, and documented all changes made to
the network and our system based upon customer needs and requirements to
their satisfaction. HP
2/2013 – 9/2013 Consultant Provide customer support for numerous
customers in the Federal Professional Services. Key Projects · Attended
and completed various ArcSight specific trainings and boot camps. · Build
multiple ESM, logger, and connectors to fit the customer’s needs. · Created
content built around customer requirements and needs · Aided in
the creation and implementation of various security rules for multiple
systems ·
Hardened various boxes and systems for test and production
environments to meet DoD and customer requirements. Northrop
Grumman 3/2012 –
2/2013 ArcSight Security Engineer Oversaw the efforts of
security staff to design, develop, engineer and implement solutions to
security requirements. Provided a working knowledge of understanding business
security practices and procedures, current security tools, hardware/software
security implementation, different communication protocols, encryption
techniques/tools, cross-domain solutions, and familiarity with commercial
products. Key Projects · Gathered
and organized technical information about organization’s mission goals and
needs, existing security products, and ongoing programs. · Provided
support for facilitating and helping identify current security infrastructure
and define future program. ·
Relayed technical design and implementation of security
solutions to staff and management related to current and future IT
systems. James
Secure Solutions 8/2011
– 3/2012 Information Systems Security Engineer Worked with all aspects of Risk
Assessment, specializing with NIST 800-30 and implementation of its
principles and practices. Key Projects · Worked
with vulnerability scanning, penetration testing, system hardening, system
integration and packet sniffing. Applying and validating security
patches. · Developed,
tracked, created and managed POA&Ms · Contributed
to the accuracy and efficiency of analysis operations through technical
innovation, procedural refinement, training of analysts and analyst
oversight. ·
Designed processes and complex spreadsheets to support
Certification & Accreditation, patch management, personnel
clearances/training, password change management, vulnerability assessment
reporting, network inventory, expense reports, system hardening and
consolidation. International
Business Machine
3/2010 – 4/2011 IT Specialist (Security) Provided centralized oversight of network
security devices, audit and analysis, 24x7 security reporting and management
and disaster planning. Guided the Certification & Accreditation process,
continuous monitoring of systems, specializing and using NISCAP, DCID 6/3,
and NIST 800-53. Detect, defend and protect information assets from
cyber-attacks via monitoring, analysis, response and threat management. Key Projects · Performed
monitoring, problem resolution, change management, analysis and incident
response. · Ensured
that changes to the infrastructure do not intrude unnecessary interruptions
to the customers mission and maintain controlled conditions to minimize
outages. · Worked
collaboratively as a member of a team including other ISSES, ISSMs,
ISSOs, system owners, and system administrators to manage the security
posture of multiple systems. ·
Served as a member of the CCB and interfaced directly with
the CM team to ensure proper approval and consistency of the system
configuration within the enterprise. Axom
Technologies 4/2008 –
3/2010 Network Security Engineer Member of a seven member network security
team. Ensure network wide interoperability through the use of
cryptographically secured backbone trunks. Key Projects · Provided
operational support to military operations, deployed forces, centers located
in the CONUS and OCONUS and services to multiple networks. · Perform
trend analysis on WAN outages by the use of spreadsheets and graphs to aid in
the isolation and restoral of reoccurring outages. · Utilize
Master Station Log (MSL) and remedy to annotate essential events on shift and
update trouble ticket outages. Northrop
Grumman 3/2006–
4/2008 Security Operations Manager Worked
under the IT manager in assisting with small to large tasks, and everything
in between that was needed Key Projects · Assisted
in the building and implementation of a new server room. · Set up and
installed new workstations terminals and trouble shot tier 1 problems. EDUCATIONAL BACKGROUND · Morgan
State University 2006-2008; Information systems security · UMUC 2010
– present; Cyber Security Additional
Training · ISC2
Certified Information Systems Security Professional (CISSP) · Cisco
Certified Network Associate (CCNA) · Certified
Ethical Hacker (C|EH) · Network + TECHNOLOGY SUMMARY Platforms: Windows 2000; Windows 2003, Windows 2008, Windows XP, Windows 7,
RedHat Enterprise Linux 5.x, CentOS Hardware: Dell Servers;
Cisco Pix Firewall; Cisco ASA Firewall; Cisco IPS (module and IDSM-2);
Sourcefire Intrusion Sensor; Cisco Catalyst Switches; Cisco 2600, 3600 Series
Routers, Promina 400/800 multiplexers, BPX/IGX/MGX switches Software: Sourcefire
Defense Center; Cisco Security Manager; Cisco Access Control Server; ArcSight
3.5/4.0/4.5/5.x; ArcSight Logger; ArcSight Connector Appliance; Checkpoint
NGX, R55, R60, R65; Microsoft Project Server 2003, Tripwire, Gold Disk, eEye
Digital Retina, Wireshark, Nessus, Snort CLEARANCE SUMMARY Top
Secret, SCI Active, 6/2007, Re-investigation on 12/2012 Polygraph:
Full Scope (NSA) |
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|