1. Kenneth Howard Long
5509 9th Street NW Apt #100 Washington DC 20011 |Cell#: (301) 996 4518 |Email:Kenneth.long0714@gmail.com
Objective
To obtain an IT position that will strengthen skills and experience, so that one can achieve Sr. level.
IT Technologies/Tools Usedinthe past
Arcsight: Created and modified activelistand channels to parses out anomalies
Created activerules to detect malicioustraffic
Monitored over thousands (DNS, Proxy, WAF, Firewall,Antivirus, Email and IDS/IPS) logs daily to tune or get rid of false
or noisy rules.
Arcsight Logger: Generated logs from 24 to 48 hours to investigateinfection vectors, when possibleinfection was detected from
SEIM tool Arcsight.
Netwitness: Created custom drillsto generate full livepacket captures for rulecreation and investigation purposes
Sourecfire: Created custom rules for the followingdetection phases (C2, Scanning,Installation,redirection,and delivery)
Impervia web application firewall: Monitored and Created APT scanningrules to create ICF reports.
Mandiant Mir: Generated jobs to investigate successful or non-successful maliciousexecutables,froman end pointthreat detection
Perspective.
Archer: Created incidentreports daily to keep track and discover patterns, or trends, as well as possibleAPT activity.
Cisco IronPort: Used daily to determine if emails were categorize correctly as spam, and not APT.
Round Cube: Used as sandbox to determine if email document was weaponized or not.
Linux Ubuntu: Created virtual machineto examine maliciousredirects and possibly nonebad website.
Basic to intermittent level of navigatingvia Terminal
Create, delete, and move fileand directories via sudo/ sudo su
Utilized GREP commands to query particularinformation when need
System Center Operations Manager (SCOM): Monitored the followingtype of alerts for over fifty servers daily (failed connections,
failed services and volume spaceto notify server team, or perform standard operating
procedure according to situation.
Semantic NetBackup: Monitored over two hundred backups nightly to notify storage team of any issues,or perform standard
operating procedure accordingto situation.
Re-run/Restart backup jobs,and policies to perform tape ejects, standard operation procedures ,etc.
Viewed over two hundred backup jobs nightly to generate backup report.
Solarwinds: Monitored over 20 nodes to escalateor notify networking team of any issues accordingly.
Cleriion: Monitored, and Performed standard operating procedures for failed drives,so that all backup data in the environment was
never lostor corrupted
Bell Secure Works and Fire-eye: Viewed security alerts daily to determine if a ticket needed to be created for a wipe request, and
be pulled of the network.
Windows Server 2K3/r2,2K8/r2, 2K12/r2:Installed patches monthly to secure, and decrease issues.
Created, modified, and reset active directory accounts
Added or removed members from groups.
2. Performed weekly rebooting procedures
Created shared drives.
Added new printer to printserver with specific permissions.
Cisco Unified Admiration Phone System: Modified users extensions, and sidecards.
Discontinued users phone extensions
Configured new phone for users
Citrix : Installed clientsoftwarefor over 60 users.
Viewed, and restarted user sessions for troubleshootingpurposes via Citrix Director
Assyst: Created, Resolved, and assigned tickets daily
Ran trouble tooting procedures to ensure ticketing system was functioningcorrectly
Virtual Box: Created virtual machineusingLinux operatingsystems to examine maliciousredirects.
Vsphere: Monitored over 40 servers daily to complete daily task.
Microsoft Office suite: Install softwareclientvia Word,Outlook,Excel, and PowerPoint
Import / export email via outlook
Setup email rules via outlook
Created spread sheets via Excel
Created word documents with specified formatting via Word
Additional Knowledge
TCP/IP protocols and concepts: Basic to intermediate level of understandingof the followingDNS, DHCP, Telnet, SSH, LDAP, IP,
IMCP, ARP, TLS/SSL
Understandingof the three way handshakeand TCP vs UDP traffic via Wireshark
Understating of the OSI model layer seven to one
Cisco Switching and routing: Basic to intermediate understandingof configuration commands via putty as followbelow:
Create vlans,setstatic,dynamic,and defaultrouts, show IP route, show vlans,showrun,
Show ip protocol,do show run, configurerouter on a stick,configure telnet / SSH, Create passwords
and banners,change/ create host name.
Basic to intermediate understanding of programing concepts using the following languages via notepad ++
HTML/CSS, Python, Ruby, PHP, JavaScript: Create a basic webpage,
Basic understandingof for loops,if/ if else statements, creating values and strings,
Puts and prints,consolelog,Boolean logic,
EXPERIENCE
Robert Half Technology
Second to third level IT support technician/analyst Bethesda, MD May 2015 – Aug 2015
Assistwith IT supportfor over three hundred users daily which lead to higher user satisfaction.
Troubleshoot Citrix and printingissues daily which led to gaininga better understandingof issuetrends.
Execute system admin task to provide daily fixes to cut down issuetrends.
3. Imaged / installed laptops and desktops for new users which led to higher user satisfaction
InfluenceIT processes and procedure methods to implement a level of organization / structure which let to task getting
done more quickly and efficient.
Wilmerhale
Global Operations Center Operator/ Technician Washington, DC October 2014 – March 2015
Performed systemand environmental monitoring including reporting and analysis.
Performed backups of data throughout the enterprise; monitor backups, change backup tapes and maintains inventory of on
and offsite tape storage.
Performed physicalinstallation of servers and network equipment as needed.
Connected systems to the network devices
Monitored data replication functionality, resolves replication issues and reports errors appropriately.
Resolved the majority of Infrastructure issues using the IT Knowledgebase,and escalated more complex problems to
Infrastructure Engineers in a timely manner.
Assisted Infrastructure Engineers and otherData Center staff as needed.
Maintained inventory of all equipment in the production Data Center.
BAE Systems
Security Operations Center Analyst Herndon, VA February 2014-July 2014
Utilized Arcsight(Security Information Event Monitoring) tool to identify maliciousnetwork traffic daily
Request reimagingand wipingof hard drives,protect company’s data and assets
Performed triage level forensic of hostinvestigations to identify the root causeof infection,maliciousprocesses and
artifacts of compromise, add to teams awareness on identifyingmaliciousgroups and patterns
Wrote and tuned signatures based on different types of CND (Computer Network Defense) scenarios,Improved ESM tool to
detect unrecognizablemalicious activity
Utilized Archer to create detailed incidentreports that includeactivities leadingto compromise, remedial actions and
preventative control recommendations, keep the company up to date on targeted attacks
Performed ICF reports on recon / vulnerability scansdaily
Education History
Year Up/ Northern Virginia Community College Washington, DC September 2013 – July 2014
Major: Information Technology
Courses:
Introduction to Hardware MicrosoftOfficeApplications Introductions to Networks
Business Communication Writing Introduction to Professional Skills Personal Finance,Help Desk
University of the District of Columbia (UDC) Washington, DC January 2010 - July 2011
Major: Graphic Design
Courses:
Digital Applications Introduction to Drawing Art Foundations
InDesign Figure Drawing Digital Media