Certified Ethical Hacker (CEH), George Mason University, Fairfax, VA (October 2013)
IT Foundation: A+, Network+, MCTS, CCNA and Security+, George Mason University, Fairfax, VA (September 2013)
Unix Systems/C/C++/Java Programming, Pace University, New York, NY (October 2000)
Bachelor of Science in Computer Science, Pace University, New York, NY (June 1996) Major GPA: 3.33
CompTIA Security+, January 2014
Microsoft Certified Technology Specialist (MCTS) Windows 7, Configuring, November 2013
Cisco Certified Network Associate Routing and Switching (CCNA), September 2013
CompTIA Network+, July 2013
CompTIA A+, June 2013
Top Secret / Sensitive Compartmented Information with Polygraph (TS/SCI)
Cloud Computing Engineer April 2015 - Present Amazon Web Services, Herndon, VA
Manage cases through to resolution or escalation using existing documentation, procedures and tools.
Provide detailed data and communication within cases.
Work on support projects that require a limited scope or are well documented.
Interface with other teams to resolve cases and complete projects.
Interpret service metrics using scripts and or documentation.
Utilize monitoring dashboards and applications to determine service issues.
Cyber Security Analyst January 2014 – April 2015 Kingfisher Systems, Inc., Falls Church, VA
Real-time monitoring, analysis, and resolution of suspected cyber signature events/cyber security incidents.
Performing daily operations utilizing Security Information and Event Management (SIEM) tools and monitoring events from multiple sources including but not limited to firewall logs, system logs (Unix and Windows), network and host based intrusion detection systems, applications, databases and other security information monitoring tools.
Communicating and escalating issues and incidents as required by process or management.
Participating in containment recommendation of cyber signature events/cyber security incidents.
Documenting all incidents and tickets in the appropriate systems and performing documentation review and improvement.
Participating in knowledge sharing with other analysts and writing technical articles for Internal Knowledge Bases.
Supporting a 24/7/365 rotating shift Security Operations Center (SOC).
Detecting, monitoring, analysis, resolution of cyber signature events/cyber security incidents.
Coordinating cyber signature events/cyber security incidents escalations to internal and external resources.
Performing network, system, application and log intrusion detection analysis.
Ensuring Service Level Agreements (SLAs) are met.
Maintaining Standard Operating Procedures (SOPs), processes, checklists and guidelines.
Analyzing network traffic and alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms.
Performing triage to all cyber signature events/cyber security incidents; and provide first line investigation.
Student April 2013 – October 2013 George Mason University, Volgenau School of Engineering, Fairfax, VA
Information Technology Foundation Series: A+, Network+, MCTS, CCNA and Security+ courses
Topics covered include: Personal Computer Components, Network Operating Systems, Network Connectivity, Advanced Network Theory, Common Network Protocols, TCP/IP Services, Network LAN/WAN Infrastructure, Network Security, Windows 7 Configuration, Internetworking, Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP, Cisco’s Internetworking Operating System (IOS) and Security Device Manager (SDM), Managing a Cisco Internetwork, Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF), IP Routing, Layer 2 Switching and Spanning Tree Protocol (STP), Virtual LANs (VLANs), Access Control, Authentication, Malicious Code, Social Engineering, Intrusion Detection, Physical Security, Disaster Recovery, Business Continuity and Forensics.
Certified Ethical Hacker (CEH) course
Topics covered include: Ethics and Legality, Footprinting, Scanning, Enumeration, System Hacking, Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking, Hacking Web Servers, Web Application Vulnerabilities, Web Based Password Cracking Techniques, SQL Injection, Hacking Wireless Networks, Virus and Worms, Physical Security, Linux Hacking, Evading Firewalls, IDS and Honeypots, Buffer Overflows, Cryptography and Penetration Testing.
Patent Examiner September 2012 – June 2013 United States Patent and Trademark Office, Alexandria, VA
Examined patent applications to determine whether the claimed invention should be granted a patent.
Investigated patent and scientific literature databases for prior art, and examined patent applications substantively by analyzing whether the claimed invention met patentability requirements such as novelty, "inventive step" or "non-obviousness", "industrial application" (or "utility") and sufficiency of disclosure.
Corresponded with applicants and/or applicant's representatives via detailed written and oral communications.
Programmer Analyst January 2008 – September 2012 CACI International, Inc., Fairfax, VA
Developed metrics charts using Active Server Pages and maintained database tables and views using Microsoft SQL Server.
Tested, troubleshot, provided configuration control management, user education and customer support for over 300 active users.
Technical Support Representative April 2007 – November 2007 Connextions, Inc., Orlando, FL
Communicated with customers over the telephone and interpreted problems, provided technical support, kept track of issues and resolutions, used automated diagnostic programs and resolved recurrent problems.
Provided effective and consistent technical support. Researched technical solutions to respond quickly, competently and patiently to customer requests.
Presented complex technical information to non-technical audiences.
Trained customers to use software and computing devices over the telephone.