SlideShare une entreprise Scribd logo
1  sur  2
CHRISTOPHER J. DABO II
4932 Brightleaf Court ۰ Woodbridge, VA 22193 ۰ 703-989-0776
Christopher.Dabo.II@gmail.com
Profile
A specialist who values the importance of effective team communication. Ability to work under high-pressure situations.
Ability to prioritize tasks at-hand. Served two tours in Iraq and Afghanistan. Honorably discharged from the Marine Corps.
Experienced in collaborating with multiple organizations. Highly analytical and detail-oriented Cyber Security specialist.
Intuitive | Meticulous | Inquisitive | Technological | Resourceful | Diligent | Respectful | Articulate | Honest
Summary Education and Work Experience
George Washington University - B.S. Cyber Security Commencing Fall 2016
Northern Virginia Community College (NOVA – Woodbridge VA) Associate Degree in Cyber Security May 2016
 Competed in the National Cyber League (NCL) and Collegiate Cyber Defense Competition (CCDC).
 Co-author of the inNOVAtion Hackathon Programming Event, which was held at the NOVA Woodbridge Campus.
National Cyber League (NCL)
The NCL provides college students with a virtual environment to validate their cybersecurity skills through solving scenario based
problems. The NCL incorporates the learning objectives of the CompTIA Security+ and CEH for measurable results.As a competit or
one must demonstrate in-depth knowledge of network traffic analysis, log analysis, scanning and reconnaissance,and exploitation and
enumeration techniques.
During the competition I analyzed multiple network traffic logs via Wireshark to find the details related to an incident. Through the
analysis I was able to identify the source IP address of the attack, the protocol that was used during the breach, the user account that
was exploited for access,and the infected file that was transferred onto the system.
Collegiate Cyber Defense Competition (CCDC) hosted by Raytheon
The CCDC provides students with a virtual venue where they must apply the theories and skills learned about cyber security.
Competitors are asked to protect a simulated commercial network that consisted of7 to 10 servers.They must maintain business
functionality by overcoming real-time external threats.
During the competition, served as the server administrator on an eight-member security team. The team is responsible for defending a
Windows 2012 Server which is hosting SQL and IIS. Performed initial hardening of the systemby configuring AV, systemlogs;
tuning off listening ports and disabling of guest account and set the administrator password that complies with best practices.
Monitoring the systemand checking for anomaly.
In a simulated scenario. Upon the detection of suspicious traffic. The team decided to run a full systemvirus scan. A “backdoor” virus
was detected.It was quarantined and removed from the system. The event logs were analyzed. An unknown user account along with a
foreign IP address were found. A firewall rule was created to blacklist the IP address and the rogue account was deleted.
NOVA “inNOVAtion Hackathon” (Co-Authored – April 2016)
The “inNOVAtion Hackathon” was created to give college students the opportunity to showcase their programming skills in a
36-hour competition. We wanted to provide students with the ability to network with possible employers, and through
collaboration with many companies. We have successfully raised enough money to fund the event. It was my way of “giving
back to NOVA”. I wanted to create opportunities for future students to both networking and developing marketable skill in the
Cyber Security field. The school has promised to make this an annual event.
AVA Tech Security Company, Data Technician April 2013 – November 2013
Lorton, VA
Analyzed building schematics to efficiently install security equipment. Ran wires for all security devices. Performed the
installation of IP Cameras, key fobs, electromagnetic door locks, proximity readers, controlpanels, server racks, fire alarm
systems and other various security equipment. Maintained equipment integrity through service calls.
 Served as a technician on the St. Thomas Catholic Schoolproject. It was a four-month project to install and configure
security equipment that meets state security standards for schoolemergency readiness. Finished the project one week
ahead of schedule.
 Provided technical support to remote clients for hardware, software, and networking problems by identifying system
discrepancies. Performed weekly analysis of client’s IT environment to maintain system functionality. Coordinated and
installed replacement equipment for faulty equipment.
DBAN Masonry, Laborer June 2012 – March 2013
CHRISTOPHER J. DABO II
4932 Brightleaf Court ۰ Woodbridge, VA 22193 ۰ 703-989-0776
Christopher.Dabo.II@gmail.com
United States Marine Corps, Force Deployment Planning and Execution Specialist December 2007 – June 2012
Cherry Point, NC
Analyzed deployment requirements to create strategic plans. Created reports for the approval of deployment plans. Briefed
executives on strategic options for deployment.
 Collaborated with multiple units to gather deployment data. Analyzed data to create Excel reports and PowerPoint
Presentation. Provide weekly briefings to the Officers of the HQ group.
 Designed logistical movement plans and assisted in the coordination of troop deployment. Successfully moved over
2500 troops in support of Iraq, Afghanistan, and training exercises in the U.S.
 Secured the integrity of over 150 classified materials and equipment contained in the Classified Materials Control
Center Vault, resulting in zero incidents over 23 consecutive months.
 Served as the SharePoint Site Administrator.
 Awarded the Navy Achievement Medal during deployment to Afghanistan in 2012, for expediently creating
redeployment strategy to meet the drawdown requirements ordered by President Obama.
Certifications
CompTIA Security+ February 2016
TS/SCI Clearance expires August 2017

Contenu connexe

Tendances

The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsPECB
 
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting ProgramIDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting ProgramDigit Oktavianto
 
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S ShaktawatCyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S ShaktawatG.S Shaktawat
 
Cert Overview
Cert OverviewCert Overview
Cert Overviewmattnik
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesAbhinav Biswas
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Intelligent cyber security solutions
Intelligent cyber security solutionsIntelligent cyber security solutions
Intelligent cyber security solutionsSwapnil Deshmukh
 
Ian Powers Resume
Ian Powers ResumeIan Powers Resume
Ian Powers ResumeIan Powers
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Fego Ogwara
 
Chapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareChapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareAdi Saputra
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Kimberley Dray
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionAbhinav Biswas
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsVenkata Sreeram
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityInfosec
 

Tendances (20)

The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting ProgramIDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
 
Sanjoy debnath resume
Sanjoy debnath resumeSanjoy debnath resume
Sanjoy debnath resume
 
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S ShaktawatCyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
 
Cert Overview
Cert OverviewCert Overview
Cert Overview
 
Sanjoy_Debnath_Resume
Sanjoy_Debnath_ResumeSanjoy_Debnath_Resume
Sanjoy_Debnath_Resume
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Intelligent cyber security solutions
Intelligent cyber security solutionsIntelligent cyber security solutions
Intelligent cyber security solutions
 
Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015
 
Ian Powers Resume
Ian Powers ResumeIan Powers Resume
Ian Powers Resume
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...
 
Chapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs RansomwareChapter 3, Data Protection vs Ransomware
Chapter 3, Data Protection vs Ransomware
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat Protection
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
 

En vedette

Veekracht Movir Cover en artikel
Veekracht Movir Cover en artikelVeekracht Movir Cover en artikel
Veekracht Movir Cover en artikelGerard Sas
 
Unisa Bcom Management Degree
Unisa Bcom Management DegreeUnisa Bcom Management Degree
Unisa Bcom Management DegreeRonelle Naude
 
La newsletter de mgrh 43 (2)
La newsletter de mgrh 43 (2)La newsletter de mgrh 43 (2)
La newsletter de mgrh 43 (2)CABINET MGRH
 
Welcome speech at youth internatnional economic forum in st. petersburg
Welcome speech at youth internatnional economic forum in st. petersburgWelcome speech at youth internatnional economic forum in st. petersburg
Welcome speech at youth internatnional economic forum in st. petersburgAlexey Ermolin
 
Wembely tickets
Wembely ticketsWembely tickets
Wembely ticketsK8TI
 
15 características del docente del siglo 21
15 características del docente del siglo 2115 características del docente del siglo 21
15 características del docente del siglo 21William Henry Vegazo Muro
 
Como pesquisar no catálogo da rede de bibliotecas de melgaço
Como pesquisar no catálogo da rede de bibliotecas de melgaçoComo pesquisar no catálogo da rede de bibliotecas de melgaço
Como pesquisar no catálogo da rede de bibliotecas de melgaçosandra soares
 
Berikut ini adalah kisah 25 nabi dan mukjizatnya dengan lengkap
Berikut ini adalah kisah 25 nabi dan mukjizatnya dengan lengkapBerikut ini adalah kisah 25 nabi dan mukjizatnya dengan lengkap
Berikut ini adalah kisah 25 nabi dan mukjizatnya dengan lengkapmuji jj
 

En vedette (11)

Cartaz
CartazCartaz
Cartaz
 
Veekracht Movir Cover en artikel
Veekracht Movir Cover en artikelVeekracht Movir Cover en artikel
Veekracht Movir Cover en artikel
 
Unisa Bcom Management Degree
Unisa Bcom Management DegreeUnisa Bcom Management Degree
Unisa Bcom Management Degree
 
La newsletter de mgrh 43 (2)
La newsletter de mgrh 43 (2)La newsletter de mgrh 43 (2)
La newsletter de mgrh 43 (2)
 
Welcome speech at youth internatnional economic forum in st. petersburg
Welcome speech at youth internatnional economic forum in st. petersburgWelcome speech at youth internatnional economic forum in st. petersburg
Welcome speech at youth internatnional economic forum in st. petersburg
 
Wembely tickets
Wembely ticketsWembely tickets
Wembely tickets
 
15 características del docente del siglo 21
15 características del docente del siglo 2115 características del docente del siglo 21
15 características del docente del siglo 21
 
MSc Embryo implantation lecture
MSc Embryo implantation lectureMSc Embryo implantation lecture
MSc Embryo implantation lecture
 
DIÁRIO OFICIAL DO MUNICÍPIO
DIÁRIO OFICIAL DO MUNICÍPIO DIÁRIO OFICIAL DO MUNICÍPIO
DIÁRIO OFICIAL DO MUNICÍPIO
 
Como pesquisar no catálogo da rede de bibliotecas de melgaço
Como pesquisar no catálogo da rede de bibliotecas de melgaçoComo pesquisar no catálogo da rede de bibliotecas de melgaço
Como pesquisar no catálogo da rede de bibliotecas de melgaço
 
Berikut ini adalah kisah 25 nabi dan mukjizatnya dengan lengkap
Berikut ini adalah kisah 25 nabi dan mukjizatnya dengan lengkapBerikut ini adalah kisah 25 nabi dan mukjizatnya dengan lengkap
Berikut ini adalah kisah 25 nabi dan mukjizatnya dengan lengkap
 

Similaire à Chris Dabo Resume 20160915 (20)

Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016
 
Secure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate CollegeSecure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate College
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
Swapnil Goud Tadkal
Swapnil Goud TadkalSwapnil Goud Tadkal
Swapnil Goud Tadkal
 
Gregory C. Witcher Full CV
Gregory C. Witcher Full CV Gregory C. Witcher Full CV
Gregory C. Witcher Full CV
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Aiman Alhajjah-Resume-07-29-16
Aiman Alhajjah-Resume-07-29-16Aiman Alhajjah-Resume-07-29-16
Aiman Alhajjah-Resume-07-29-16
 
resume-prashipa-jul18
resume-prashipa-jul18resume-prashipa-jul18
resume-prashipa-jul18
 
ConklinResume2
ConklinResume2ConklinResume2
ConklinResume2
 
Res
ResRes
Res
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
My Resume 2015
My Resume 2015My Resume 2015
My Resume 2015
 
Resume-Daniel Lozen-Kowalski1
Resume-Daniel Lozen-Kowalski1Resume-Daniel Lozen-Kowalski1
Resume-Daniel Lozen-Kowalski1
 
ITFocused
ITFocusedITFocused
ITFocused
 
Rachel Resume
Rachel ResumeRachel Resume
Rachel Resume
 
Mohammed Abdulelah Saleh
Mohammed Abdulelah SalehMohammed Abdulelah Saleh
Mohammed Abdulelah Saleh
 
Cybersecurity Careers - Step Up Skill Feb2023 (1).pdf
Cybersecurity Careers - Step Up Skill Feb2023 (1).pdfCybersecurity Careers - Step Up Skill Feb2023 (1).pdf
Cybersecurity Careers - Step Up Skill Feb2023 (1).pdf
 
Recentresume_Dec2016
Recentresume_Dec2016Recentresume_Dec2016
Recentresume_Dec2016
 
Resume2016NE_Online
Resume2016NE_OnlineResume2016NE_Online
Resume2016NE_Online
 

Chris Dabo Resume 20160915

  • 1. CHRISTOPHER J. DABO II 4932 Brightleaf Court ۰ Woodbridge, VA 22193 ۰ 703-989-0776 Christopher.Dabo.II@gmail.com Profile A specialist who values the importance of effective team communication. Ability to work under high-pressure situations. Ability to prioritize tasks at-hand. Served two tours in Iraq and Afghanistan. Honorably discharged from the Marine Corps. Experienced in collaborating with multiple organizations. Highly analytical and detail-oriented Cyber Security specialist. Intuitive | Meticulous | Inquisitive | Technological | Resourceful | Diligent | Respectful | Articulate | Honest Summary Education and Work Experience George Washington University - B.S. Cyber Security Commencing Fall 2016 Northern Virginia Community College (NOVA – Woodbridge VA) Associate Degree in Cyber Security May 2016  Competed in the National Cyber League (NCL) and Collegiate Cyber Defense Competition (CCDC).  Co-author of the inNOVAtion Hackathon Programming Event, which was held at the NOVA Woodbridge Campus. National Cyber League (NCL) The NCL provides college students with a virtual environment to validate their cybersecurity skills through solving scenario based problems. The NCL incorporates the learning objectives of the CompTIA Security+ and CEH for measurable results.As a competit or one must demonstrate in-depth knowledge of network traffic analysis, log analysis, scanning and reconnaissance,and exploitation and enumeration techniques. During the competition I analyzed multiple network traffic logs via Wireshark to find the details related to an incident. Through the analysis I was able to identify the source IP address of the attack, the protocol that was used during the breach, the user account that was exploited for access,and the infected file that was transferred onto the system. Collegiate Cyber Defense Competition (CCDC) hosted by Raytheon The CCDC provides students with a virtual venue where they must apply the theories and skills learned about cyber security. Competitors are asked to protect a simulated commercial network that consisted of7 to 10 servers.They must maintain business functionality by overcoming real-time external threats. During the competition, served as the server administrator on an eight-member security team. The team is responsible for defending a Windows 2012 Server which is hosting SQL and IIS. Performed initial hardening of the systemby configuring AV, systemlogs; tuning off listening ports and disabling of guest account and set the administrator password that complies with best practices. Monitoring the systemand checking for anomaly. In a simulated scenario. Upon the detection of suspicious traffic. The team decided to run a full systemvirus scan. A “backdoor” virus was detected.It was quarantined and removed from the system. The event logs were analyzed. An unknown user account along with a foreign IP address were found. A firewall rule was created to blacklist the IP address and the rogue account was deleted. NOVA “inNOVAtion Hackathon” (Co-Authored – April 2016) The “inNOVAtion Hackathon” was created to give college students the opportunity to showcase their programming skills in a 36-hour competition. We wanted to provide students with the ability to network with possible employers, and through collaboration with many companies. We have successfully raised enough money to fund the event. It was my way of “giving back to NOVA”. I wanted to create opportunities for future students to both networking and developing marketable skill in the Cyber Security field. The school has promised to make this an annual event. AVA Tech Security Company, Data Technician April 2013 – November 2013 Lorton, VA Analyzed building schematics to efficiently install security equipment. Ran wires for all security devices. Performed the installation of IP Cameras, key fobs, electromagnetic door locks, proximity readers, controlpanels, server racks, fire alarm systems and other various security equipment. Maintained equipment integrity through service calls.  Served as a technician on the St. Thomas Catholic Schoolproject. It was a four-month project to install and configure security equipment that meets state security standards for schoolemergency readiness. Finished the project one week ahead of schedule.  Provided technical support to remote clients for hardware, software, and networking problems by identifying system discrepancies. Performed weekly analysis of client’s IT environment to maintain system functionality. Coordinated and installed replacement equipment for faulty equipment. DBAN Masonry, Laborer June 2012 – March 2013
  • 2. CHRISTOPHER J. DABO II 4932 Brightleaf Court ۰ Woodbridge, VA 22193 ۰ 703-989-0776 Christopher.Dabo.II@gmail.com United States Marine Corps, Force Deployment Planning and Execution Specialist December 2007 – June 2012 Cherry Point, NC Analyzed deployment requirements to create strategic plans. Created reports for the approval of deployment plans. Briefed executives on strategic options for deployment.  Collaborated with multiple units to gather deployment data. Analyzed data to create Excel reports and PowerPoint Presentation. Provide weekly briefings to the Officers of the HQ group.  Designed logistical movement plans and assisted in the coordination of troop deployment. Successfully moved over 2500 troops in support of Iraq, Afghanistan, and training exercises in the U.S.  Secured the integrity of over 150 classified materials and equipment contained in the Classified Materials Control Center Vault, resulting in zero incidents over 23 consecutive months.  Served as the SharePoint Site Administrator.  Awarded the Navy Achievement Medal during deployment to Afghanistan in 2012, for expediently creating redeployment strategy to meet the drawdown requirements ordered by President Obama. Certifications CompTIA Security+ February 2016 TS/SCI Clearance expires August 2017