Jane nurse



Yüklə 30,89 Kb.
tarix08.10.2017
ölçüsü30,89 Kb.
#4011

DAN DIGITAL

206-123-4567 § someone4987@gmail.com § Linkedin Address


Targeted Job: Digital Forensics / NETWORK SECURITY Analyst

Summary of Qualifications


  • Experienced IT professional: 10 year’s experience leading teams and successful projects.

  • Strong abilities Cyber Security/Technology: Recent degrees in Digital Forensics, Network Admin, and Programming.

  • Value: Proven ability to analyze, diagnose and provide security solutions to support business environments.


Technical Skills

Operating Systems

Windows Client OS, Windows Server, Linux (Red Hat, Samba, Cent OS, Mint, UBuntu), Cisco IOS??

Forensic Software

FTK (Dongles, Access Data, Mobile Phone Examiner) EnCase, Imager, Reg Viewer, PRTK, WinHex (Dongles), Norton Disk, Tableau Forensic USB Bridge, WiebeTech (Writeblockers and Forensix RTX) Paraben Device Seizure Toolbox, Hashkeeper, NRSL, Windows Event Log Explorer, TMG Client Security

Data Recovery Tools

Atola DiskSense USB, DeepSpar, PC-3000, YEC Ninja (Hard Disk Cloner), Password Recovery Toolkit,

Hardware

Advanced Data Recover, PC/Server Hardware, Routing/Switches, SAN, NAS, Fiber Optic/UPT Cabling

Networking

TCP/IP, UDP, IP Addressing & Subnetting, IPv4, ITv6, LAN/WAN, VLAN Admin.

Relevant Strengths

  • Change Management

  • Network Analysis

  • Six Sigma

  • Project Management

  • Team Leadership & Training

  • Policy, Standards, Monitoring & Compliance

  • Encryption Security

  • Information Security

  • Digital Forensics


Education / Certifications
Associate Technical Arts (ATA), Edmonds Community College, Lynnwood, WA

ATA Program, Information Security & Digital Forensics. GPA 3.9.Expected Graduation: June, 2013.

ATA, Network Administration. Graduated in 2000, with honors.

ATA, Visual Basic Programming, Graduated in 2000, with honors.

ATA, Business Applications Specialist. Graduated in 2000, with honors.


Digital Forensic Case Work:

Case 1: Assisted Steve Hailey in (describe case/ type of problem posed, and the work you did to assist)

Case 2: Assisted Steve Hailey in (describe case/ type of problem posed, and the work you did to assist)
Digital Forensic Coursework:

  • Digital Forensics & the Law

  • Security Implementation I & II

  • Digital Forensics I (job overview, ethics, process, tools)

  • Designing Network Security

  • Digital Forensics II (Hands-on Case Studies/Analysis)

  • Cellphone & PDA Forensics

  • Host System Security (security policy, security team)

  • Advanced Data Recovery

  • Intro to Network Security (included: cryptographic functions; authentication/confidentiality/integrity, security technologies, protocols, public key technology)

  • Digital Forensics III (VM Ware, Expert Testimony, Hash Sets, Professionalism, Undocumented Rootkits, Kernal Level Compromises, Privacy, Ethics)



Bachelor of Science (BS), Computer Science, Texas A&M, Austin, Texas, 1997 (Note: Date is optional)

Industry Certifications:

  • Six Sigma Black Belt, Green Belt, Lean + Expert. 2012.

  • Certified Data Recovery Expert (CDRE) ID: ECC900000

  • Access Data Certified Examiner (ACE)

  • Level 1 Clean Room Certificate, CyberSecurity Institute

  • Certified Ethical Hacker (C/EH), ID: ECC922222

  • Security +

  • Computer Hacker Forensic Investigator (C/HFI)

  • CCNA, A+

Experience
Edmonds Community College, Lynnwood, WA 2011 – Present

Digital Forensics Lab Manager – CISCO Networking Class (2007 – 2012)

Other: CIS Tech Lab – Assistant Lab Manager / Lap Top Repair Assistant (2007 – 2012)

Technical Assistant – CISCO Networking Class (2007 – 2012)

DAN DIGITAL Page 2 of 2

EXPERIENCE – Page 2 of 3
Cyber Forensics, Everett WA Feb. 2012 - Present

Chief Information Security Officer

Customer: Air Force / AT&T. Project: Wing Level Information Assurance Project

Served as Information Assurance (IA) Lead, reporting to AT&T Program Manager for a large Air Force contract. Key support person for the management and execution of Wing level Information Assurance and Information Security programs and activities. Tasks:




  • Change Management: Led a successful change management process, improving security by (how is this measured??)

  • Network Analysis: Oversaw the analysis of system and network wide security requirements within policy, regulatory, and resource demands across networks, common systems and specialty systems.

  • Six Sigma: Led development, coordination, and staffing of projects, utilizing Six Sigma Project Management methodologies.

  • Security Monitoring & Compliance: Analyzed technical solutions for information assurance monitoring and compliance

  • Training: Administered IA associated training to on a quarterly basis,

  • Team Leadership: Coordinated project teams responsible for the deployment, retirement, and change of systems, solutions, and networks under the review of our customer.



NORDSTROM, Seattle, WA 2010 - 2012

Information Security Analyst

Lead for Digital Forensic activities, working with an 8-person security team on incidents affecting (how large a system?). Worked with business units to advise on information security needs and in creating project designs. Tasks:




  • Encryption Security: Member, backup encryption security team.

  • Information Security: Conducted routine information security activities: project management, monitoring, incident response, on-call responsibilities.

  • Digital Forensics: Performed Digital Forensic Analysis on devices and report findings.

  • Policy and Standards: Participated in developing and maintaining security policies, standards, procedures and guidelines.

  • System Reporting: Monitored and ensure compliance, provide assessment and prepare system monitoring reports.

  • Tools used: (Expert level) Guidance Software, Encase, Vantos, Cisco Wireless Control System. Exposure to ________, __________. _______________. _______________.



SEATTLE GENETICS, Bothell, WA 2005-2009

System Administrator

Worked with internal application experts and members of the Information Technology department (IT) to establish software standards, automate the installation of software packages and manage client computer security. Tasks:




  • Managed Computer Security. Reviewed and maintained security policies, client software requirements/standards.

  • Design: Participated in design oversight of corporate computer images for deployment.

  • User Support: Provided tier 2/3 level user support as required.

  • Deployments: Created and deployed software packages via Symantec Altiris management system and/or MS Group Policy.

  • Installs: Coordinated software installation and upgrade projects with members of IT and application sponsors

  • Documentation: Wrote user guides and installed SOP documentation as required.

  • Training: Coordinated software training for new installations and upgrades.

  • Inventory Management: Assisted with computer inventory maintenance and management. Maintained inventory of software and related license agreements.



COMSYS (contacted to Verizon), Bellevue, WA 2003-2005

Network Administration

  • Windows: Provided technical information technology support involving Microsoft Windows Operating Systems (Windows 9X, Windows NT, Windows 2000) server environments, and network services.

GENIE INDUSTRIES, Redmond, WA 1997 - 2003

Mechanic


  • Six Sigma Trained to use Six Sigma and to aid streamlining production of the company’s industrial lift products.

  • Teamwork: Demonstrated an ability to supervise own workload while supporting the needs of other team members


Affiliations

HTCIA Washington Chapter (High Technology Crime Investigation for Washington State

Cloud Security Alliance, Great Area Chapter

IACIS (International Association of Computer Investigative Specialists)

IEEE & Computer Society Member

Consortium of Digital Forensic Specialists





Yüklə 30,89 Kb.

Dostları ilə paylaş:




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə