DAN DIGITAL
206-123-4567 § someone4987@gmail.com § Linkedin Address
Targeted Job: Digital Forensics / NETWORK SECURITY Analyst
Summary of Qualifications -
Experienced IT professional: 10 year’s experience leading teams and successful projects.
-
Strong abilities Cyber Security/Technology: Recent degrees in Digital Forensics, Network Admin, and Programming.
-
Value: Proven ability to analyze, diagnose and provide security solutions to support business environments.
Technical Skills
Operating Systems
|
Windows Client OS, Windows Server, Linux (Red Hat, Samba, Cent OS, Mint, UBuntu), Cisco IOS??
|
Forensic Software
|
FTK (Dongles, Access Data, Mobile Phone Examiner) EnCase, Imager, Reg Viewer, PRTK, WinHex (Dongles), Norton Disk, Tableau Forensic USB Bridge, WiebeTech (Writeblockers and Forensix RTX) Paraben Device Seizure Toolbox, Hashkeeper, NRSL, Windows Event Log Explorer, TMG Client Security
|
Data Recovery Tools
|
Atola DiskSense USB, DeepSpar, PC-3000, YEC Ninja (Hard Disk Cloner), Password Recovery Toolkit,
|
Hardware
|
Advanced Data Recover, PC/Server Hardware, Routing/Switches, SAN, NAS, Fiber Optic/UPT Cabling
|
Networking
|
TCP/IP, UDP, IP Addressing & Subnetting, IPv4, ITv6, LAN/WAN, VLAN Admin.
|
Relevant Strengths
-
Change Management
-
Network Analysis
-
Six Sigma
| -
Project Management
-
Team Leadership & Training
-
Policy, Standards, Monitoring & Compliance
| -
Encryption Security
-
Information Security
-
Digital Forensics
|
Education / Certifications
Associate Technical Arts (ATA), Edmonds Community College, Lynnwood, WA
ATA Program, Information Security & Digital Forensics. GPA 3.9.Expected Graduation: June, 2013.
ATA, Network Administration. Graduated in 2000, with honors.
ATA, Visual Basic Programming, Graduated in 2000, with honors.
ATA, Business Applications Specialist. Graduated in 2000, with honors.
Digital Forensic Case Work:
Case 1: Assisted Steve Hailey in (describe case/ type of problem posed, and the work you did to assist)
Case 2: Assisted Steve Hailey in (describe case/ type of problem posed, and the work you did to assist)
Digital Forensic Coursework:
-
-
Digital Forensics & the Law
| -
Security Implementation I & II
| -
Digital Forensics I (job overview, ethics, process, tools)
| -
Designing Network Security
| -
Digital Forensics II (Hands-on Case Studies/Analysis)
| -
Cellphone & PDA Forensics
| -
Host System Security (security policy, security team)
| | -
Intro to Network Security (included: cryptographic functions; authentication/confidentiality/integrity, security technologies, protocols, public key technology)
| -
Digital Forensics III (VM Ware, Expert Testimony, Hash Sets, Professionalism, Undocumented Rootkits, Kernal Level Compromises, Privacy, Ethics)
|
Bachelor of Science (BS), Computer Science, Texas A&M, Austin, Texas, 1997 (Note: Date is optional)
Industry Certifications:
-
Six Sigma Black Belt, Green Belt, Lean + Expert. 2012.
| -
Certified Data Recovery Expert (CDRE) ID: ECC900000
| -
Access Data Certified Examiner (ACE)
| -
Level 1 Clean Room Certificate, CyberSecurity Institute
| -
Certified Ethical Hacker (C/EH), ID: ECC922222
| | -
Computer Hacker Forensic Investigator (C/HFI)
| |
Experience
Edmonds Community College, Lynnwood, WA 2011 – Present
Digital Forensics Lab Manager – CISCO Networking Class (2007 – 2012)
Other: CIS Tech Lab – Assistant Lab Manager / Lap Top Repair Assistant (2007 – 2012)
Technical Assistant – CISCO Networking Class (2007 – 2012)
DAN DIGITAL Page 2 of 2
EXPERIENCE – Page 2 of 3
Cyber Forensics, Everett WA Feb. 2012 - Present
Chief Information Security Officer Customer: Air Force / AT&T. Project: Wing Level Information Assurance Project
Served as Information Assurance (IA) Lead, reporting to AT&T Program Manager for a large Air Force contract. Key support person for the management and execution of Wing level Information Assurance and Information Security programs and activities. Tasks:
-
Change Management: Led a successful change management process, improving security by (how is this measured??)
-
Network Analysis: Oversaw the analysis of system and network wide security requirements within policy, regulatory, and resource demands across networks, common systems and specialty systems.
-
Six Sigma: Led development, coordination, and staffing of projects, utilizing Six Sigma Project Management methodologies.
-
Security Monitoring & Compliance: Analyzed technical solutions for information assurance monitoring and compliance
-
Training: Administered IA associated training to on a quarterly basis,
-
Team Leadership: Coordinated project teams responsible for the deployment, retirement, and change of systems, solutions, and networks under the review of our customer.
NORDSTROM, Seattle, WA 2010 - 2012
Lead for Digital Forensic activities, working with an 8-person security team on incidents affecting (how large a system?). Worked with business units to advise on information security needs and in creating project designs. Tasks:
-
Encryption Security: Member, backup encryption security team.
-
Information Security: Conducted routine information security activities: project management, monitoring, incident response, on-call responsibilities.
-
Digital Forensics: Performed Digital Forensic Analysis on devices and report findings.
-
Policy and Standards: Participated in developing and maintaining security policies, standards, procedures and guidelines.
-
System Reporting: Monitored and ensure compliance, provide assessment and prepare system monitoring reports.
-
Tools used: (Expert level) Guidance Software, Encase, Vantos, Cisco Wireless Control System. Exposure to ________, __________. _______________. _______________.
SEATTLE GENETICS, Bothell, WA 2005-2009
Worked with internal application experts and members of the Information Technology department (IT) to establish software standards, automate the installation of software packages and manage client computer security. Tasks:
-
Managed Computer Security. Reviewed and maintained security policies, client software requirements/standards.
-
Design: Participated in design oversight of corporate computer images for deployment.
-
User Support: Provided tier 2/3 level user support as required.
-
Deployments: Created and deployed software packages via Symantec Altiris management system and/or MS Group Policy.
-
Installs: Coordinated software installation and upgrade projects with members of IT and application sponsors
-
Documentation: Wrote user guides and installed SOP documentation as required.
-
Training: Coordinated software training for new installations and upgrades.
-
Inventory Management: Assisted with computer inventory maintenance and management. Maintained inventory of software and related license agreements.
COMSYS (contacted to Verizon), Bellevue, WA 2003-2005 Network Administration -
Windows: Provided technical information technology support involving Microsoft Windows Operating Systems (Windows 9X, Windows NT, Windows 2000) server environments, and network services.
GENIE INDUSTRIES, Redmond, WA 1997 - 2003
Mechanic -
Six Sigma Trained to use Six Sigma and to aid streamlining production of the company’s industrial lift products.
-
Teamwork: Demonstrated an ability to supervise own workload while supporting the needs of other team members
Affiliations
HTCIA Washington Chapter (High Technology Crime Investigation for Washington State
Cloud Security Alliance, Great Area Chapter
IACIS (International Association of Computer Investigative Specialists)
IEEE & Computer Society Member
Consortium of Digital Forensic Specialists
Dostları ilə paylaş: |