EDUCATION

Certified Ethical Hacker (CEH), George Mason University, Fairfax, VA (October 2013)

IT Foundation: A+, Network+, MCTS, CCNA and Security+, George Mason University, Fairfax, VA (September 2013)

Unix Systems/C/C++/Java Programming, Pace University, New York, NY (October 2000)

Bachelor of Science in Computer Science, Pace University, New York, NY (June 1996)       Major GPA: 3.33

 

CERTIFICATIONS

CompTIA Security+, January 2014

Microsoft Certified Technology Specialist (MCTS) Windows 7, Configuring, November 2013

Cisco Certified Network Associate Routing and Switching (CCNA), September 2013

CompTIA Network+, July 2013

CompTIA A+, June 2013

 

SECURITY CLEARANCE

Top Secret / Sensitive Compartmented Information with Polygraph (TS/SCI)

 

EMPLOYMENT HISTORY

Cloud Computing Engineer     April 2015 - Present
Amazon Web Services, Herndon, VA

  • Manage cases through to resolution or escalation using existing documentation, procedures and tools.

  • Provide detailed data and communication within cases.

  • Work on support projects that require a limited scope or are well documented.

  • Interface with other teams to resolve cases and complete projects.

  • Interpret service metrics using scripts and or documentation.

  • Utilize monitoring dashboards and applications to determine service issues.

Cyber Security Analyst     January 2014 – April 2015
Kingfisher Systems, Inc., Falls Church, VA

  • Real-time monitoring, analysis, and resolution of suspected cyber signature events/cyber security incidents.

  • Performing daily operations utilizing Security Information and Event Management (SIEM) tools and monitoring events from multiple sources including but not limited to firewall logs, system logs (Unix and Windows), network and host based intrusion detection systems, applications, databases and other security information monitoring tools.

  • Communicating and escalating issues and incidents as required by process or management.

  • Participating in containment recommendation of cyber signature events/cyber security incidents.

  • Documenting all incidents and tickets in the appropriate systems and performing documentation review and improvement.

  • Participating in knowledge sharing with other analysts and writing technical articles for Internal Knowledge Bases.

  • Supporting a 24/7/365 rotating shift Security Operations Center (SOC).

  • Detecting, monitoring, analysis, resolution of cyber signature events/cyber security incidents.

  • Coordinating cyber signature events/cyber security incidents escalations to internal and external resources.

  • Performing network, system, application and log intrusion detection analysis.

  • Ensuring Service Level Agreements (SLAs) are met.

  • Maintaining Standard Operating Procedures (SOPs), processes, checklists and guidelines.

  • Analyzing network traffic and alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms.

  • Performing triage to all cyber signature events/cyber security incidents; and provide first line investigation.


 

Student     April 2013 – October 2013
George Mason University, Volgenau School of Engineering, Fairfax, VA 

Information Technology Foundation Series: A+, Network+, MCTS, CCNA and Security+ courses 

Topics covered include: Personal Computer Components, Network Operating Systems, Network Connectivity, Advanced Network Theory, Common Network Protocols, TCP/IP Services, Network LAN/WAN Infrastructure, Network Security, Windows 7 Configuration, Internetworking, Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP, Cisco’s Internetworking Operating System (IOS) and Security Device Manager (SDM), Managing a Cisco Internetwork, Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF), IP Routing, Layer 2 Switching and Spanning Tree Protocol (STP), Virtual LANs (VLANs), Access Control, Authentication, Malicious Code, Social Engineering, Intrusion Detection, Physical Security, Disaster Recovery, Business Continuity and Forensics.
 
Certified Ethical Hacker (CEH) course 

Topics covered include: Ethics and Legality, Footprinting, Scanning, Enumeration, System Hacking, Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking, Hacking Web Servers, Web Application Vulnerabilities, Web Based Password Cracking Techniques, SQL Injection, Hacking Wireless Networks, Virus and Worms, Physical Security, Linux Hacking, Evading Firewalls, IDS and Honeypots, Buffer Overflows, Cryptography and Penetration Testing.

 

Patent Examiner     September 2012 – June 2013
United States Patent and Trademark Office, Alexandria, VA 

  • Examined patent applications to determine whether the claimed invention should be granted a patent.

  • Investigated patent and scientific literature databases for prior art, and examined patent applications substantively by analyzing whether the claimed invention met patentability requirements such as novelty, "inventive step" or "non-obviousness", "industrial application" (or "utility") and sufficiency of disclosure.

  • Corresponded with applicants and/or applicant's representatives via detailed written and oral communications.


 

Programmer Analyst     January 2008 – September 2012
CACI International, Inc., Fairfax, VA 

  • Programmed data entry and reporting pages using Cold Fusion, JavaScript and HTML for a web based application.

  • Developed metrics charts using Active Server Pages and maintained database tables and views using Microsoft SQL Server.

  • Tested, troubleshot, provided configuration control management, user education and customer support for over 300 active users.


 

Technical Support Representative     April 2007 – November 2007
Connextions, Inc., Orlando, FL 

  • Communicated with customers over the telephone and interpreted problems, provided technical support, kept track of issues and resolutions, used automated diagnostic programs and resolved recurrent problems.

  • Provided effective and consistent technical support. Researched technical solutions to respond quickly, competently and patiently to customer requests.

  • Presented complex technical information to non-technical audiences.

  • Trained customers to use software and computing devices over the telephone.


 

PROFESSIONAL MEMBERSHIPS

InfraGard, March 2012​











Colin Baird

Cloud Computing Engineer

​Security+, CCNA, Network+, MCTS, A+