KENNETH D. KERLEY
PSC 45 P.O. BOX 434
APO AE, 09468
Home: +44 7549891068
Email: kerley_7@yahoo.co.uk
OBJECTIVE:
Currently seeking a challenging Computer related position within a
comprehensive operations environment. Active TS/SCI - W/ CI-SCOPE
POLYGRAPH clearance level in the Computer/Electronic Operations,
Intelligence and Security Field.
*** 5-Point Veteran Preference, based on 5 U.S.C. 2108 and
3309, as modified by length of service requirement in 38
U.S.C. 5303A(d)
DODI 8570.1-M Compliance at Information Assurance
Technician (IAT) Certification Level I & Level II (Security+) CE
DODI 8570.1-M Compliance at Information Assurance
Technician (IAT) ‘CISCO’ Certification Level I & Level II
(CCNA)
DODI 8570.1-M Compliance at Information Assurance
Management (IAM) Certification Level I (Security+) CE
WORK EXPERIENCE:
Computer Hardware / Network Engineer / Information Security
Engineer
Hewlett Packard
R.A.F. Menwith Hill Station, Harrogate, United Kingdom
Apr 05 – Apr 2013
Performed Computer Hardware, Security and Network Systems
Administration / Engineering duties on various HP, CISCO, SGI,
CYBERGUARD, NETWORK APPLIANCE (NETAPPS), FOUNDRY (BROCADE),
IBM and JUNIPER vendor specific equipment platforms.
These duties included: Operating System / Firmware / Configuration
Updates / Upgrades; System Patch Implementation; Break-Fix (systems lifecycle
maintenance) Operations for Mission-Critical HP Servers, Workstations
and Printers; Break-Fix Operations, and Network Configurations for various
Mission-Critical CISCO Switches, Routers and Firewalls.
Established site Security-Specific Sanitization Procedures for all CISCO
products; SLA (Service Level Agreement) adherence; SLM (Service Level
Management) adherence via ITIL V3 support and management.
EXTENSIVE TIME spent utilizing and manipulating various Server-based
Microsoft Administrator Products that were used in maintaining system
performance and documentation, setting up user accounts, and software
installation and customizations to DOD IAVA standards, in various Network /
Control Operations Centers that were tasked with performing duties for US
Government Customers.
Performed End-to-End Maintenance for Mission Related Hardware /
Software / Network Infrastructure Platform and Baseline.
Acquired technical experience in the design and implementation of
communications systems and Hardware to include: Familiarity with
encryption, storage area networks (SAN), network management, analog /
video, video networking over IP, multicast routing and server functions,
Data, voice, network management and RF base band functions.
Experience Installing, testing, troubleshooting, and maintaining technologies
such as: NIPRNET, SIPRNET, IP Networking, LAN / WAN, RAID Storage
Arrays and SAN Storage Techniques.
Possess relevant understanding of various industry-wide Virtual Local Area
Networks (VLANs) Technologies.
Achieved school-based training and experience with WI-FI, WI-MAX, 3G and
WAN / LAN network architecture on various Wireless Platforms.
Familiar with DNS, DHCP, DMZ Network Service Applications, as well as
critical aspects of applied IDS/IPS determinations, regarding customermandated
hardening of High-Level, Network Security postures.
FAMILIARITY / EXPERIENCE UTILIZING THE FOLLOWING INDUSTRY
STANDARD, COMPUTER SOFTWARE-SPECIFIC TOOLS AND
APPLICATIONS:
ACTIVE DIRECTORY – Setting up Administrator / User Accounts;
Authentication and Authorization of Users on Domain
WINDOWS NT – Responsible for Functionality and Management of Windows
Server 2000, Windows XP, Windows Vista, Windows Home Server, Windows
Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows
Server 2012 and Windows 7 Utilization
HP OPENVMS – HP specific Alpha and Itanium-based computer systems; HP
Platform-Specific Usage
HP OPENVIEW – Network Node Management / Performance Agent
Utilization; HP Platform-Specific Usage
HP INSIGHT MANAGER v7.2 – Online Help System – Monitoring Systems,
Events, and Clusters; HP Platform-Specific Usage
REDHAT ENTERPRISE LINUX (RHEL) / FEDORA - Server Versions for x86,
x86-64, Itanium And Desktop Versions for x86, x86-64; In-House Training
and Utilization
HPUX 11i – Hewlett Packard Unix - Integrated Mission-Critical Virtualization -
Observed Performance, High Availability and Manageability; HP In-House
Training and Usage
UNIX – Classroom-Specific Training
VMWARE – Classroom / Site In-House Training
SECURITY + COURSE OF INSTRUCTION
Firebrand Training, Wyboston Lakes, United Kingdom
April, 2009
During this extensive training course of dedicated Computer Security
Techniques and Applications, real-world (lab) experience was gained in the
following Computer Security Disciplines:
- Securing Network Servers by implementing various techniques, such
as System Hardening, System Auditing, Manipulation of Built-In
Firewall, Patch/System/Configuration Updates, and Ongoing
Maintenance of Server
- Performing essential tasks utilizing the following applications:
Backtrack, Etherflood, and Loftcrack.
- Utilizing File Hashing Algorithm’s MD5 (128) and SHA (160) to analyze
various forms of data with variable input to fixed output
- Networking / Security Tools & Auditing Tools specifically for
NT/Windows XP Real-World Exercises, which included the use of
auditing and event log monitoring tool – SNARE; Port Scanner/OS
detection tool – NMAP and Vulnerability Scanner – NESSUS
- Intrusion Detection Software Tools, such as open source Network
Intrusion Detection System (NIDS) and Network Intrusion Prevention
System (NIPS) tool – SNORT, and System Base Code/OS Analyzer
Tool - TRIPWIRE
- Penetration Testing Tools, such as Network Exploit and Vulnerability
Assessment Tool – SAINT, and Security Vulnerability Exploit Tool –
METASPLOIT
- Performed intrusion detection and prevention (passive and active) on
systems that were signature and anomaly based. Utilized network
tools Ping, Netstat, and Traceroute to monitor data tracking.
- Packet Sniffer Tools, such as WIRESHARK and CAIN AND ABEL
National Security Agency (NSA) and the Committee on National
Security Systems (CNSS); Information Assurance Courseware
Evaluation (IACE) Committee Endorsed Certification:
CNSS 411: Committee on National Security Systems (CNSS) Certification of
National Security Telecommunications and Information Systems Security No.
4011 - (National Training Standard for Information Systems Security
(INFOSEC) Professionals). - 09 December, 2010 (Lifetime Certification).
**This Advanced National Training Standard is intended and developed for
Information Security Professionals, Senior System Managers, Risk
Assessment Analysts, System Administrators, and System Certifiers
responsible for the security oversight or management of critical Government
and Commercial Computer Networks.
** www.securityuniversity.net
CISCO CERTIFIED NETWORK ASSOCIATE (CCNA) COURSE OF
INSTRUCTION
Firebrand Training, Wyboston Lakes, United Kingdom
November, 2010
During this extensive CCNA training course of dedicated Computer
Networking and Security Techniques, real-world Networking (lab) experience
was gained in the following Computer Network and Security Disciplines:
- Fundamentals of the TCP/IP stack protocols and associated 7-Layer
OSI Network Model, and how a network works.
- Configuration, verification, and troubleshooting a switch with VLANs.
- Implementation of an IP addressing scheme and IP services to meet
network requirements in a medium-size Enterprise branch office
network.
- Extensive use of the following Routing Protocols:
· Routing Information Protocol (RIP) & (RIPV2)
· Enhanced Interior Gateway Routing Protocol (EIGRP)
· Open Shortest Path First (OSPF)
· Boarder Gate Protocol (BGP)
- Configuration, verification, and troubleshooting basic router operation
and routing on Cisco devices.
- Implementation and verification of links for a LAN/WAN.
- Identification of network security threats and general methods to
mitigate those threats.
- Implementation, verification, and troubleshooting NAT and ACLs in a
medium-size Enterprise branch office network.
- Identification of techniques associated with VPN applications.
Signals Intelligence (SIGINT) Analyst / Computer Hardware Equipment
Management / Ground Station Terminal Mission Assessment Analyst
(SIGINT-COMINT) / Mission Resource Controller (SIGINT-COMINTELINT-FISINT-MASINT)
Lockheed
Martin Technical Operations
R.A.F. Menwith Hill Station, Harrogate, United Kingdom
Apr 99 - Apr 05
Performed extensive Signal Intelligence duties which included: analysis and
reporting of foreign communications and non-communications proliferation,
which included all components of SIGINT, COMINT, ELINT, FISINT and
MASINT disciplines, and relayed that information by producing combat,
strategic and tactical intelligence reports to higher echelon National-Level
decision makers, and critical thinkers. These specialized duties also included:
Gathering, sorting, and scanning intercepted messages to isolate valid intelligence.
Performed initial analysis to establish target identification and operational patterns;
identified, reported, and maintained Signal Order of Battle (SIGOB) and Electronic
Order of Battle (EOB) information; used technical references to analyze
communications and signals information. Operated automated data processing
(ADP) equipment for SIGINT collection, processing and reporting. Maintained
analytical working aids to support target collection, identification, and location;
Performed intermediate analysis of intercepted communications, Prepared
technical and tactical intelligence reports. Assisted in the collection
management process.
Maintained Hardware and Network Equipment for large Lockheed Martin
contract for overseas base of operations.
Familiar with ViaSat LinkWay MRT/AMRT Terminals for Military use with full
mesh IP Satcom TDMA Modem.
Instrumental in development of System Baseline Tool for tracking site-wide
Mission Metrics and Daily Tasking Efforts. Tool was designed, developed and
built on site, using the Microsoft Access Application utilizing SQL (Sequel)
Computer Coding Scheme / Technique.
Provided extensive 'off-line' analysis of Mission Assessment Statistics, and
forwarded Mission Critical Statistical data to various external decision
makers. Prepared and forwarded computer-formatted technical reports, to
document success against ongoing missions for National-level consumers.
Payload Controller (SIGINT-COMINT-ELINT) / MEO Analyst (SIGINTCOMINT)
Lockheed
Martin Technical Operations
May 97 - Apr 99
Responsible for the technical direction / coordination of several automated
systems, including operational tasking, collection, processing and reporting
of time-sensitive technical data.
Extensive time spent writing MEO technical reports, and performing analysis
of daily operations activities. Conducted numerous activities utilizing UNIX
and C++ based systems of instruction. Performed time-critical tasks utilizing
PASCAL Programming Language.
UNITED STATES AIR FORCE – AIR FORCE SPECIALTY CODE 1N271
SPECIFIC DUTIES PERFORMED:
Mission Control Analyst (SIGINT-COMINT-ELINT-FISINT-MASINT)
Electronic Signals Analyst (SIGINT-COMINT-ELINT)
United States Air Force
Mar 94 - Nov 96
R.A.F. Menwith Hill Station, Harrogate, United Kingdom
Sensitive Information / Signals Intelligence Officer (SIGINT-COMINT)
United States Air Force
Oct 87 - Jul 93
R.A.F. Chicksands, Shefford, United Kingdom
1N271 AIR FIRCE SPECIALTY CODE SUMMARY OF DUTIES AND
RESPONSIBILTIES PERFORMED:
Acquired, processed, identified, analyzed, and reported on electromagnetic
emissions.
Operated complex equipment and systems to exploit signals intelligence
production efforts.
Performed communication signals intelligence analysis, to include acquiring
signals through optimum antenna manipulation and receiver tuning.
Utilized a wide range of complex analysis hardware and software to process
signals, including receivers, demodulators, printers, spectrum analyzers, and
other associated computer equipment.
Used advanced computer software programs to manipulate and extract
intelligence data from electromagnetic emissions.
Operated computer terminals for data entry, query, data restructuring, and
signals development.
Studied, analyzed, and identified electromagnetic emissions.
Used graphic reproductions to determine internal characteristics of signals
and to discern communications structures and usage.
Processed signals, and extracted electromagnetic emissions from real-time
and recorded media, and performed technical and data analysis.
Prepared and forwarded tapes of selected transmissions to national-level
consumers.
Interpreted and rendered preliminary analysis.
Used analytical aids and related reference material to help identify signals
and detect abnormalities.
Maintained databases of various signal types and activities using computer
and hard copy products.
Notified appropriate personnel and work centers of unusual activities or
critical situations.
Identified, analyzed, and implemented tasking, and generated reports,
incorporating analytical finds with intelligence information.
Annotated and forwarded operational characteristics of selected
transmissions or reportable information.
Evaluated records, operator logs, formats, technical reports, and data from
other activities.
Developed, managed, reviewed, and evaluated intelligence production
processes.
Ensured signal exploitation activities were conducted in support of
operational requirements and satisfy tasked objectives.
1N271 Air Force Specialty Code Qualifications:
Knowledge. Knowledge is mandatory of: role and purpose of cryptologic
support operations provided to commanders, service cryptologic elements,
and national agencies; joint service relationships and operational concepts;
tasking strategies; communications networks, radio wave propagation;
modulation theory and techniques; radio communications procedures; basic
signals analysis and identification; functions and operations of electronic
equipment; reporting formats and procedures; basic computer operations;
directives for handling, distributing, and protecting defense information;
cryptologic systems operations; Morse or non-Morse communications
equipment and techniques; mission management responsibilities; and
related cryptologic activities.
1N271 Air Force Specialty Code Official Classroom Training -
Advanced Non-Morse Signals Analysis (58-Course)
United States Air Force
Jul 93 / Feb 94
Corry Field Air Base, Pensacola, Florida
Performed complex, hands-on manipulation of state of the art Signals
Analysis Techniques and Procedures that led to the successful completion of
this sophisticated and highly regarded SIGINT community training course of
instruction.
1N271 Air Force Specialty Code Official Classroom Training -
Intermediate Non-Morse Signals Analysis (60-Course)
United States Air Force
Oct 87 / Aug 91
Corry Field Air Base, Pensacola, Florida
Performed complex, hands-on manipulation of state of the art Signals
Analysis Techniques and Procedures that led to the successful completion of
this sophisticated and highly regarded SIGINT community training course of
instruction.
1N271 Air Force Specialty Code Official Classroom Training - Basic
Non-Morse Signals Analysis (450-Course)
United States Air Force
Jan 87 / Sep 87
Corry Field Air Base, Pensacola, Florida
Performed complex, hands-on manipulation of state of the art Signals
Analysis Techniques and Procedures that led to the successful completion of
this sophisticated and highly regarded SIGINT community training course of
instruction.
EDUCATION:
Mar 1994
to
Present University Of Maryland
R.A.F. Menwith Hill Station, Harrogate, United Kingdom
Computer Science
Bachelor Of Science Degree (Candidate – Still Attending)
Expected completion date: March, 2014.
Oct 1987
to
Jul 1993 Community College of The Air Force
R.A.F. Chicksands, Shefford, United Kingdom
Computer Science
Sep 1984
to
Sept 1986 Jacksonville State University
Jacksonville, Al
Computer Science
Apr 1984 Collinsville High School
Collinsville, Al
High School Diploma
UNIQUE/SPECIALIZED ACCREDITATION:
Active Security Clearances:
Top Secret/SCI With CI-Scope Polygraph (VALID UNTIL: December 25,
2015)
Top Secret/SCI
Top Secret/SSBI
Security Clearance Sponsoring Agencies:
Intelligence Agency
Defense Agency
CERTIFICATIONS / SYSTEMS SKILLS:
CompTIA:
A+ - October, 2007 (Lifetime Certification)
N+ - April, 2008 (Lifetime Certification)
Server+ - March, 2009 (Lifetime Certification)
Security+ - April, 2009 (Lifetime Certification)
ITIL:
ITIL Foundation (V3.0) - May, 2008 (Lifetime Certification)
CISCO:
CISCO CERT
CCENT (ICND1)
CCNA (FULL)
CCNA Security
COMPLETED
29 July, 2010
VALID UNTIL
02 Nov, 2015
11 Nov, 2010 02 Nov, 2015
30 Sept, 2010
CCNA Voice (V6.0) 22 Dec, 2010
CCDA (V2.0)
25 May, 2011
02 Nov, 2015
02 Nov, 2015
02 Nov, 2015
CCNA Wireless (V2.0) 02 Nov, 2012
LANGUAGE SKILLS:
English
REFERENCES:
Available Upon Request.
02 Nov, 2015