SlideShare une entreprise Scribd logo
1  sur  7
Lifelong Career of Technology Learning & Commitment to Excellence!
Arkansas Department Human Services
Office of Systems & Technology
Head of Forensics Department
Member of Incident Response Team Forensics Division
2015
Sr. Information Cyber Security Operations Engineer
Head of Forensics Department
DONAGHEY PLAZA NORTH, SLOT N101
P.O. BOX 1437 LITTLE ROCK – 72203-1437
TELEPHONE 501-320-3913 FAX 501-682-1376
Information Cyber Security Professional
Kevin E. Moore Sr.
Arkansas Department of Human Services
OFFICE OF SYSTEMS AND TECHNOLOGY
DONAGHEY PLAZA NORTH, SLOT N101
P.O. BOX 1437 LITTLE ROCK – 72203-1437
TELEPHONE 501-320-3913 FAX 501-682-1376
To teach means to shape the future!
Kevin E. Moore Sr.
Sr.
Information
Cyber
Security
Operations
Engineer
2904 Lehigh
Dr.
Little Rock, AR
72204
May 1, 2015
To whom it may concern
Dear hiring department:
Higher Education is the foundation of our country and the post-secondary landscape is extremely competitive.
With this being said, exemplary leadership is a needed factor for today’s college and university instructors. As
much, I believe that I am an exemplary leader believing and promoting academic excellence and have enclosed
my materials for the position. If hired, I can offer:
 Energetic and dynamic attitude toward teaching technology
 Adept at classroom management and academic excellence
 Knowledgeable of motivational techniques and engaging hearts and minds in education
 Avid scholar with exceptional facilitation skills in arithmetic, reasoning, writing and science
 Committed to teaching and inspiring students to pursue and complete their educational goals
 Over 20 years of experience in the field of technology and its challenging ever changing environment
 Several industry standard certifications that enhance the understanding of the profession
 Instrumental in creating the forensics program’s techniques, standards, and procedures for the
government while adhering to laws such as Sarbanes Oxley and HIPPA
Moreover, I hold an Associate’s in Computer and Electrical Engineering, a Bachelor’s in Information Cyber
Security and Forensics, and also a Master’s in Information Cyber Security and Assurance, while currently
pursuing a Doctorate in Information Technology. I have garnered over 200 hours in student instruction at
Arkansas Office of Systems & Technology in Little Rock, AR where I also serve as Sr. Information Cyber
Security Operations Engineer so I not only talk about the importance of education and its concepts I practice it.
If your organization could benefit from my on the job in the field experience and personal attributes, please
contact me at (870)413- 6250 or kevin.moore@dhs.arkansas.gov to arrange an interview and discuss further
how my qualifications can meet your needs. I have inserted a link to my profile on LinkedIn
(https://www.linkedin.com/pub/kevin-moore-msit/38/99b/b48) and a link to my personal website (https://www.linkedin.com/pub/kevin-
moore-msit/38/99b/b48) to display some of my writing skills and attention to detail.
Sincerely,
Kevin E. Moore Sr.
Kevin Moore
2904 Lehigh Dr. netsecurityprof@gmail.com
Little Rock, Ar 72204 870-413-6250
INFORMATION TECHNOLOGY SECURITY PROFESSIONAL
Confident SENOR IT SECUIRTY PROFESSIONAL with strong commitment to managing large IT systems
while keeping systems security and confidentiality as a top priority. Employing strategies to utilize tools and
techniques to thwart network breaches perform forensic investigations as employing IT security best practices.
EXPERIENCE
Kaplan University
Cyber Security Columnist for Graduates of Information Technology (GITA)
(Computer Forensics/ Cyber Security/ Malware Analysis/ Penetration Testing/ EnCase Administrator)
Davenport, IA 52803 Mar/2012-Present
ADHS Office of Systems & Technology
Sr. State Information Cyber Security Operations Engineer
(Computer Forensics/ Cyber Security/Malware Analysis/IT Security Operations/EnCase Administrator)
Little Rock, Ar 72203
Dec/2013-Present
• Head of Computer Forensics Dept. encompassing all things e-discovery, forensics, and cyber investigations
• Instrumental in implementation of protocols adhering IT Security policies for AR DHS.
• Helped design and implement State of Arkansas DHS Computer Forensics program.
• Help implement and classify security policies.
• Designed hardware computer security configurations for the state of AR DHS security dept.
• Created BIOS Standardization Policy for State AR DHS computer hardening infrastructure.
• Created BIOS Standardization Policy for State AR DHS server hardening infrastructure.
• Monitored and maintained state network as incident response team member for the State of AR DHS OST
• Conducted e-discovery cases and email evidence files searching and exporting and production
• Investigates breaches and reverse engineers the threats to analyze intent, scope, and origin of threat.
• Documents computer security and emergency measures policies, procedures, and tests.
• Trains users and promotes security awareness to ensure system security and to improve network efficiency.
• Investigates all computer related policy infringements and or crimes via EnCase Enterprise software
• Integral member of Incident Response Team focus on forensics
Army National Guard/DoD-Camp Robinson
Systems Administrator/IT Specialist
North Little Rock, Ar 72199
Oct/2012-Dec/2012
• Prepare workflow charts and diagrams to specify in detail operations to be perform by users
• Maintain Network Security and User/Client Security in a MOSS (SharePoint) environment
• Consult with dept. managers to develop system solutions consistent with organizational objectives
• Responsible for user account maintenance and active directory through VMware clients
• Installed, configured and distributed server-based hardware
• Managed routine backup and restore servers and desktops in a ESX Enterprise environment
• Responsible for OS and desktop software installation and maintenance and network troubleshooting
• Support over 7,400 users in an enterprise environment.
Unisys
Computer Desktop Support/Network Analyst
Little Rock, Ar 72204 Jan/2009 – Oct/2012
• Travel to consumer businesses and government bases to provide direct technical support to end users.
• Install new computers, hardware, software, and peripherals managing through.Net Administration
• Communicate with other departments to report and resolve software, hardware, and operations issues
• Plan and prepare technical reports, memoranda, and instructional manuals.
• Reconfigure existing systems to accommodate additional components of VSphere
• Troubleshoot all areas of computer functioning: break fix, repair or upgrade as needed.
Millennium Systems & Electronics
IT Security Manager
Jacksonville, Ar 72076
Jan/2003–Jan/2009
• Maintain knowledge of hardware, software and network security technology performed efficiently
• Worked efficiently with other people of the team and also have the ability to work independently
• Able to put a keen eye on each detail and work efficiently to meet deadlines
• Self-motivated and organized, possess excellent communication both oral and written
• Ability and willingness to work for long working hours
• Sound knowledge of Computer Science, Math and Science
• Work with configuration management, network performance management
• Monitor network traffic to identify problems and make recommendations with NMS monitoring tools
Millennium Systems & Electronics
Network Security Engineer
Jacksonville, Ar 72076 Apr/1999–Jan/2003
• Ability to architect LAN/WAN design for appropriate communications and security
• Switch, Router, and firewall installation, setup, and configuration.
• Firewall rule definition, configuration, and troubleshooting
• Responsible for network management including network performance tuning security.
• Planned and designed organization LAN network expansion
• Upgraded and configured Microsoft Windows Server and installed network routers and firewalls
• Worked with management to develop security policies and conduct network system security auditing
• Ran Checkpoint Firewalls
• Bluecoat Proxy Server Administration
• IPS/IDS technologies as overall security regimen.
KM Enterprises
Owner/Operator
Little Rock, Ar 72204 Jan/1990-Apr/1999
• Maintain knowledge of hardware, software installation, and network security technology efficiently
• Worked efficiently while managing employees of the team possess the ability to multitask
• Installed statewide high-speed internet services and worked efficiently to meet installation deadlines
• Self-motivated possess excellent organizational skills while managing several executive level contracts
• Managed several contracts while holding position of CIO as owner/operator
EDUCATION
Doctor of Information Technology AUG 2017
Specialization: Strategic IT Leadership and Applied Research
Walden University
GPA 3.5/4.0
Dean’s List
Master of Science in Information Technology OCT 2014
Specialization: Security and Assurance
Kaplan University
GPA 3.9/4.0
President’s List all semesters
Bachelor of Science in Information Technology MAR 2012
Specialization: Security and Forensics
Kaplan University
GPA 3.5/4.0 Cum Laude
Dean’s List all semesters
Associates of Applied Science Computer Engineering JUN 1995
Specialization: Computer Technology
Arkansas College of Technology
GPA 3.4/4.0
Dean’s List 3 of 4 semesters
Computer IT Specialist Certificate JUN 1987
Computer Repair, Help Desk, Break/Fix
Metropolitan Vo-tech (Obtained while attending High School)
GPA 4.0/4.0
TEXAS A&M ENGINEERING - FEMA
National Emergency Response & Rescue Training Center
In cooperation with the
Department of Homeland Security
Federal Emergency Management Agency
The TEEX/NERRTC Cyber security courses are designed to ensure that the privacy, reliability, and integrity of the information systems that power
our global economy remain intact and secure. These Government DHS/FEMA-certified courses are offered through discipline-specific tracks
targeting general, non-technical computer users, technical IT professionals, and business managers and professionals.
2015
Digital Forensics Cyber Law & White Collar Crime
Network Assurance Business Information Continuity
Cyber Incident Analysis and Response Cyber Ethics
Secure Software Information Security Basics
Information Risk Management Information Security for Everyone
TECHNICAL SKILLS
Operating Systems:
• Windows XP
• Linux/Unix
• Windows Server 2003
• Windows 7
• Ghost Server
• Penetration Testing
• Incident Response
• Microsoft Office
• Project Management 2010
Applications:
• EnCase Computer Forensics
• FTK
• Forefront Identity Mgmt.
• Metasploit
• Java
• Nexpose
• HTML
• Intrusion Detection
• SQL
• Project Professional
• Symantec E-Discovery
• Ethereal Packet Analyzer
Security Applications:
• SPLAT
• IPSO
• Crossbeam
• Juniper
• Wireshark
• McAfee
• SNORT
• Cisco
HONORS/CERTIFICATIONS
Date of Expiration
DoD Cisco Certified Entry-Level Technician (CCENT) SEP 2016 EXP
DoD Comptia Security+ NOV 2015 EXP
Information Security Post Baccalaureate Certificate (GPA 4.0) MAY 2011 NO EXP
Computer Forensics Post Baccalaureate Certificate (GPA 3.5) JAN 2011 NO EXP
Graduate Certificate Information Security (GPA 4.0) AUG 2014 NO EXP
HIPPA Privacy Certification SEP 2013 NO EXP
Dell Certified Systems Expert - certified on over 30 systems JAN 2011 NO EXP
DoD ARMY TRAINING
DoD PREP 640-822 ICND1 (CCENT) Certificate of Training JUL 2013 NO EXP
National Guard PEC Certificate of Training DoD Security+ NOV 2012 NO EXP
DoD CISSP Certificate of Training JAN 2012 NO EXP
PROFESSIONAL AFFILIATIONS
Member – Information Systems Audit and Control Association (ISACA)
Member – Information Systems Security Association (ISSA)
Member – American Institute of Information Technology Professionals (AIITP)
Member & Columnist for Kaplan – Graduate’s Information Technology Association (GITA)
Member – Iota Sigma Tau Honor Society (IST)
Member – National Society of Collegiate Scholars (NSCS)
Member – Alpha Beta Kappa Society (ABKS)

Contenu connexe

Tendances

Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
R_Yanus
 
AlexHagenResume2016
AlexHagenResume2016AlexHagenResume2016
AlexHagenResume2016
Alex Hagen
 
Uzair Ahmed
Uzair Ahmed Uzair Ahmed
Uzair Ahmed
Anas Ali
 
Resume 7-2016
Resume 7-2016Resume 7-2016
Resume 7-2016
Bob Greer
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
Atlantic Training, LLC.
 
Terence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupportTerence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupport
Terence Mcleod
 

Tendances (12)

CompTIA Network+ Certification Course in Trinidad
CompTIA Network+ Certification Course in TrinidadCompTIA Network+ Certification Course in Trinidad
CompTIA Network+ Certification Course in Trinidad
 
Professional and Ethical Responsibilities as IT Professionals to be aware of ...
Professional and Ethical Responsibilities as IT Professionals to be aware of ...Professional and Ethical Responsibilities as IT Professionals to be aware of ...
Professional and Ethical Responsibilities as IT Professionals to be aware of ...
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
 
AlexHagenResume2016
AlexHagenResume2016AlexHagenResume2016
AlexHagenResume2016
 
Uzair Ahmed
Uzair Ahmed Uzair Ahmed
Uzair Ahmed
 
Resume 7-2016
Resume 7-2016Resume 7-2016
Resume 7-2016
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
ITFocused
ITFocusedITFocused
ITFocused
 
Mohammed cv
Mohammed cvMohammed cv
Mohammed cv
 
MOSES_NTCV
MOSES_NTCVMOSES_NTCV
MOSES_NTCV
 
Terence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupportTerence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupport
 
Cameron Resume- IT
Cameron Resume- ITCameron Resume- IT
Cameron Resume- IT
 

En vedette (13)

Luma dum
Luma dumLuma dum
Luma dum
 
Pidrox Presentasi
Pidrox PresentasiPidrox Presentasi
Pidrox Presentasi
 
manba enerzhi masrafi dar gavhaye shiri
manba enerzhi masrafi dar gavhaye shirimanba enerzhi masrafi dar gavhaye shiri
manba enerzhi masrafi dar gavhaye shiri
 
Adlover sunum-v1.1
Adlover sunum-v1.1Adlover sunum-v1.1
Adlover sunum-v1.1
 
Osio community slides
Osio community slidesOsio community slides
Osio community slides
 
tolid3
tolid3tolid3
tolid3
 
Futr composing a message
Futr   composing a messageFutr   composing a message
Futr composing a message
 
Edu555 week 1
Edu555 week 1Edu555 week 1
Edu555 week 1
 
Rich Tasks UAS
Rich Tasks UASRich Tasks UAS
Rich Tasks UAS
 
Chatarra digital
Chatarra digitalChatarra digital
Chatarra digital
 
Ansolo
AnsoloAnsolo
Ansolo
 
SP'13 POST EUROPE PRESENTATION
SP'13 POST EUROPE PRESENTATIONSP'13 POST EUROPE PRESENTATION
SP'13 POST EUROPE PRESENTATION
 
Ccr of-final-project1
Ccr of-final-project1Ccr of-final-project1
Ccr of-final-project1
 

Similaire à NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated (20)

Jason Rauch Resume
Jason Rauch ResumeJason Rauch Resume
Jason Rauch Resume
 
Resume
ResumeResume
Resume
 
Anthonys resume.docx
Anthonys resume.docxAnthonys resume.docx
Anthonys resume.docx
 
GraceCV
GraceCVGraceCV
GraceCV
 
Caleb Resume 2015
Caleb Resume 2015Caleb Resume 2015
Caleb Resume 2015
 
Grace cv2
Grace cv2Grace cv2
Grace cv2
 
GraceCV2
GraceCV2GraceCV2
GraceCV2
 
September11Flatirons
September11FlatironsSeptember11Flatirons
September11Flatirons
 
IT Resume 2016
IT Resume 2016IT Resume 2016
IT Resume 2016
 
Peter Sproull Resume July 2016
Peter Sproull Resume July 2016 Peter Sproull Resume July 2016
Peter Sproull Resume July 2016
 
Presnell David_2017 - Resume
Presnell David_2017 - ResumePresnell David_2017 - Resume
Presnell David_2017 - Resume
 
KTetreault IT
KTetreault ITKTetreault IT
KTetreault IT
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Hdeere6.19 r
Hdeere6.19 rHdeere6.19 r
Hdeere6.19 r
 
2017 skills resume
2017 skills resume2017 skills resume
2017 skills resume
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume today
 
seonkimresume-v3.1
seonkimresume-v3.1seonkimresume-v3.1
seonkimresume-v3.1
 
Resume - Todd Portz
Resume - Todd PortzResume - Todd Portz
Resume - Todd Portz
 
Current Cover Letter & Resume
Current Cover Letter & ResumeCurrent Cover Letter & Resume
Current Cover Letter & Resume
 
DeJesusSres274
DeJesusSres274DeJesusSres274
DeJesusSres274
 

NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated

  • 1. Lifelong Career of Technology Learning & Commitment to Excellence! Arkansas Department Human Services Office of Systems & Technology Head of Forensics Department Member of Incident Response Team Forensics Division 2015 Sr. Information Cyber Security Operations Engineer Head of Forensics Department DONAGHEY PLAZA NORTH, SLOT N101 P.O. BOX 1437 LITTLE ROCK – 72203-1437 TELEPHONE 501-320-3913 FAX 501-682-1376 Information Cyber Security Professional Kevin E. Moore Sr.
  • 2. Arkansas Department of Human Services OFFICE OF SYSTEMS AND TECHNOLOGY DONAGHEY PLAZA NORTH, SLOT N101 P.O. BOX 1437 LITTLE ROCK – 72203-1437 TELEPHONE 501-320-3913 FAX 501-682-1376 To teach means to shape the future! Kevin E. Moore Sr. Sr. Information Cyber Security Operations Engineer 2904 Lehigh Dr. Little Rock, AR 72204 May 1, 2015 To whom it may concern Dear hiring department: Higher Education is the foundation of our country and the post-secondary landscape is extremely competitive. With this being said, exemplary leadership is a needed factor for today’s college and university instructors. As much, I believe that I am an exemplary leader believing and promoting academic excellence and have enclosed my materials for the position. If hired, I can offer:  Energetic and dynamic attitude toward teaching technology  Adept at classroom management and academic excellence  Knowledgeable of motivational techniques and engaging hearts and minds in education  Avid scholar with exceptional facilitation skills in arithmetic, reasoning, writing and science  Committed to teaching and inspiring students to pursue and complete their educational goals  Over 20 years of experience in the field of technology and its challenging ever changing environment  Several industry standard certifications that enhance the understanding of the profession  Instrumental in creating the forensics program’s techniques, standards, and procedures for the government while adhering to laws such as Sarbanes Oxley and HIPPA Moreover, I hold an Associate’s in Computer and Electrical Engineering, a Bachelor’s in Information Cyber Security and Forensics, and also a Master’s in Information Cyber Security and Assurance, while currently pursuing a Doctorate in Information Technology. I have garnered over 200 hours in student instruction at Arkansas Office of Systems & Technology in Little Rock, AR where I also serve as Sr. Information Cyber Security Operations Engineer so I not only talk about the importance of education and its concepts I practice it. If your organization could benefit from my on the job in the field experience and personal attributes, please contact me at (870)413- 6250 or kevin.moore@dhs.arkansas.gov to arrange an interview and discuss further
  • 3. how my qualifications can meet your needs. I have inserted a link to my profile on LinkedIn (https://www.linkedin.com/pub/kevin-moore-msit/38/99b/b48) and a link to my personal website (https://www.linkedin.com/pub/kevin- moore-msit/38/99b/b48) to display some of my writing skills and attention to detail. Sincerely, Kevin E. Moore Sr. Kevin Moore 2904 Lehigh Dr. netsecurityprof@gmail.com Little Rock, Ar 72204 870-413-6250 INFORMATION TECHNOLOGY SECURITY PROFESSIONAL Confident SENOR IT SECUIRTY PROFESSIONAL with strong commitment to managing large IT systems while keeping systems security and confidentiality as a top priority. Employing strategies to utilize tools and techniques to thwart network breaches perform forensic investigations as employing IT security best practices. EXPERIENCE Kaplan University Cyber Security Columnist for Graduates of Information Technology (GITA) (Computer Forensics/ Cyber Security/ Malware Analysis/ Penetration Testing/ EnCase Administrator) Davenport, IA 52803 Mar/2012-Present ADHS Office of Systems & Technology Sr. State Information Cyber Security Operations Engineer (Computer Forensics/ Cyber Security/Malware Analysis/IT Security Operations/EnCase Administrator) Little Rock, Ar 72203 Dec/2013-Present • Head of Computer Forensics Dept. encompassing all things e-discovery, forensics, and cyber investigations • Instrumental in implementation of protocols adhering IT Security policies for AR DHS. • Helped design and implement State of Arkansas DHS Computer Forensics program. • Help implement and classify security policies. • Designed hardware computer security configurations for the state of AR DHS security dept. • Created BIOS Standardization Policy for State AR DHS computer hardening infrastructure. • Created BIOS Standardization Policy for State AR DHS server hardening infrastructure. • Monitored and maintained state network as incident response team member for the State of AR DHS OST • Conducted e-discovery cases and email evidence files searching and exporting and production • Investigates breaches and reverse engineers the threats to analyze intent, scope, and origin of threat. • Documents computer security and emergency measures policies, procedures, and tests. • Trains users and promotes security awareness to ensure system security and to improve network efficiency. • Investigates all computer related policy infringements and or crimes via EnCase Enterprise software • Integral member of Incident Response Team focus on forensics Army National Guard/DoD-Camp Robinson Systems Administrator/IT Specialist
  • 4. North Little Rock, Ar 72199 Oct/2012-Dec/2012 • Prepare workflow charts and diagrams to specify in detail operations to be perform by users • Maintain Network Security and User/Client Security in a MOSS (SharePoint) environment • Consult with dept. managers to develop system solutions consistent with organizational objectives • Responsible for user account maintenance and active directory through VMware clients • Installed, configured and distributed server-based hardware • Managed routine backup and restore servers and desktops in a ESX Enterprise environment • Responsible for OS and desktop software installation and maintenance and network troubleshooting • Support over 7,400 users in an enterprise environment. Unisys Computer Desktop Support/Network Analyst Little Rock, Ar 72204 Jan/2009 – Oct/2012 • Travel to consumer businesses and government bases to provide direct technical support to end users. • Install new computers, hardware, software, and peripherals managing through.Net Administration • Communicate with other departments to report and resolve software, hardware, and operations issues • Plan and prepare technical reports, memoranda, and instructional manuals. • Reconfigure existing systems to accommodate additional components of VSphere • Troubleshoot all areas of computer functioning: break fix, repair or upgrade as needed. Millennium Systems & Electronics IT Security Manager Jacksonville, Ar 72076 Jan/2003–Jan/2009 • Maintain knowledge of hardware, software and network security technology performed efficiently • Worked efficiently with other people of the team and also have the ability to work independently • Able to put a keen eye on each detail and work efficiently to meet deadlines • Self-motivated and organized, possess excellent communication both oral and written • Ability and willingness to work for long working hours • Sound knowledge of Computer Science, Math and Science • Work with configuration management, network performance management • Monitor network traffic to identify problems and make recommendations with NMS monitoring tools Millennium Systems & Electronics Network Security Engineer Jacksonville, Ar 72076 Apr/1999–Jan/2003 • Ability to architect LAN/WAN design for appropriate communications and security • Switch, Router, and firewall installation, setup, and configuration. • Firewall rule definition, configuration, and troubleshooting • Responsible for network management including network performance tuning security. • Planned and designed organization LAN network expansion
  • 5. • Upgraded and configured Microsoft Windows Server and installed network routers and firewalls • Worked with management to develop security policies and conduct network system security auditing • Ran Checkpoint Firewalls • Bluecoat Proxy Server Administration • IPS/IDS technologies as overall security regimen. KM Enterprises Owner/Operator Little Rock, Ar 72204 Jan/1990-Apr/1999 • Maintain knowledge of hardware, software installation, and network security technology efficiently • Worked efficiently while managing employees of the team possess the ability to multitask • Installed statewide high-speed internet services and worked efficiently to meet installation deadlines • Self-motivated possess excellent organizational skills while managing several executive level contracts • Managed several contracts while holding position of CIO as owner/operator EDUCATION Doctor of Information Technology AUG 2017 Specialization: Strategic IT Leadership and Applied Research Walden University GPA 3.5/4.0 Dean’s List Master of Science in Information Technology OCT 2014 Specialization: Security and Assurance Kaplan University GPA 3.9/4.0 President’s List all semesters Bachelor of Science in Information Technology MAR 2012 Specialization: Security and Forensics Kaplan University GPA 3.5/4.0 Cum Laude Dean’s List all semesters Associates of Applied Science Computer Engineering JUN 1995 Specialization: Computer Technology Arkansas College of Technology GPA 3.4/4.0 Dean’s List 3 of 4 semesters Computer IT Specialist Certificate JUN 1987 Computer Repair, Help Desk, Break/Fix Metropolitan Vo-tech (Obtained while attending High School) GPA 4.0/4.0 TEXAS A&M ENGINEERING - FEMA National Emergency Response & Rescue Training Center In cooperation with the
  • 6. Department of Homeland Security Federal Emergency Management Agency The TEEX/NERRTC Cyber security courses are designed to ensure that the privacy, reliability, and integrity of the information systems that power our global economy remain intact and secure. These Government DHS/FEMA-certified courses are offered through discipline-specific tracks targeting general, non-technical computer users, technical IT professionals, and business managers and professionals. 2015 Digital Forensics Cyber Law & White Collar Crime Network Assurance Business Information Continuity Cyber Incident Analysis and Response Cyber Ethics Secure Software Information Security Basics Information Risk Management Information Security for Everyone TECHNICAL SKILLS Operating Systems: • Windows XP • Linux/Unix • Windows Server 2003 • Windows 7 • Ghost Server • Penetration Testing • Incident Response • Microsoft Office • Project Management 2010 Applications: • EnCase Computer Forensics • FTK • Forefront Identity Mgmt. • Metasploit • Java • Nexpose • HTML • Intrusion Detection • SQL • Project Professional • Symantec E-Discovery • Ethereal Packet Analyzer Security Applications: • SPLAT • IPSO • Crossbeam • Juniper • Wireshark • McAfee • SNORT • Cisco HONORS/CERTIFICATIONS Date of Expiration DoD Cisco Certified Entry-Level Technician (CCENT) SEP 2016 EXP DoD Comptia Security+ NOV 2015 EXP
  • 7. Information Security Post Baccalaureate Certificate (GPA 4.0) MAY 2011 NO EXP Computer Forensics Post Baccalaureate Certificate (GPA 3.5) JAN 2011 NO EXP Graduate Certificate Information Security (GPA 4.0) AUG 2014 NO EXP HIPPA Privacy Certification SEP 2013 NO EXP Dell Certified Systems Expert - certified on over 30 systems JAN 2011 NO EXP DoD ARMY TRAINING DoD PREP 640-822 ICND1 (CCENT) Certificate of Training JUL 2013 NO EXP National Guard PEC Certificate of Training DoD Security+ NOV 2012 NO EXP DoD CISSP Certificate of Training JAN 2012 NO EXP PROFESSIONAL AFFILIATIONS Member – Information Systems Audit and Control Association (ISACA) Member – Information Systems Security Association (ISSA) Member – American Institute of Information Technology Professionals (AIITP) Member & Columnist for Kaplan – Graduate’s Information Technology Association (GITA) Member – Iota Sigma Tau Honor Society (IST) Member – National Society of Collegiate Scholars (NSCS) Member – Alpha Beta Kappa Society (ABKS)