SlideShare une entreprise Scribd logo
1  sur  4
Michael Moore
Information Security Analyst, Network Analyst
25734 Burbage Cir. Cary NC 27519 ● Mobile: (215) 432-9664
Email: mikeet207@gmail.com LinkedIn: Profile
Technical Experience
IT Skills
 MicrosoftActive Directory and Group Policy Management,
LANdesk remote assetmanagement software, Netscan, Cisco
IOS, Linux, WinTeamDatabase management software
 Intrusion Detection and Prevention Systems: Sourcefire,
Cisco, Fortinet,
 Firewalls: Cisco IOS, Watch-guard SSL and Firewall
 NMAP, Nessus Threat scanners, Wireshark
 Arbor Peakflow DDOS mitigation software, PravailNSI
Private IntranetProtectheuristic analysis, RADAR(SEIM),
Intelitactics (SEIM) Carbon Black (endpoint analysis),
 Citrix Receiver, UICOpen VPN Manager, management
 ProtocolKnowledge: TCP/IP, Public Key Infrastructure, OSI
 MicrosoftOutlook and Exchange admin
 HardwareTroubleshooting: Servers, Routers, Switches
Engagements have included:
AT&T, Senior Security Analyst “Contractor”7/2015 toCurrent
 Configured, maintained, and operated over 800 intrusion prevention
systems, for over 300 globalclients.
 Analyzed 100’s of events each day, reducing the customer’s need to
performinternal investigations by a ratio of 1000:1
 Operated Arbor Peakflow Distributed Denial of Service detection and
prevention tools. Analyzed alerts 100% accurately, effectively determining
the need to redirect customer traffic to the AT&T scrubbing facilities,
ensuring customer uptime meeting 15 min SLA agreement constraints on a
consistentbasis.
 Performed 100’s of troubleshooting and maintenance evolutions to ensure
the uptime of the equipment. Coordinated effectively with on site
technicians to meet the time constraints required to complete all repair
activities, ensuring positive equipment uptime.
Customer’s Bank, Security Analyst“Contractor” 2/2015 to5/2015
 Security Event Analysis: Analyzed security events via Radar SEIM
(Snort) and Carbon Black (process analysis); determined threatlevel
and impact. Conducted remediation efforts.
 ProjectPlanning: Organized projects for new security softwareand security
analysis tools. Coordinated with various business units to meet company
objectives to mitigate risk.
 ProductResearch: Investigated possible security solutions to correct
security deficiencies and new security risks.
 Firewall Change Management: Made recommendations to firewall ACL’s,
preventing futurebreaches.
 Application Security Testing: Tested new applications for security risks and
worked with vendors to apply security changes.
 End Point Protection: Managed Anti-Virus tools to analyze and correct
security event issues.
 Nessus Administration: Developed scan plug-ins to accurately determine
security flaws, application functionality. Wrotecustom scripts to address
domain specific security risks.
AlliedBartonSecurity Services, Network Support Engineer 2/2014 to2/2015
 Configured and implemented IT systems for over 65,000 employees,
using Microsoft Active Directory, Kaspersky Anti-Virus management;
“Watch-guard” multifunction IPS/Firewall.
 Ongoing application testing of the company's internal and external systems,
using the SDLC methodology, achieving the necessary business
requirements.
 Tested database software for efficiency and compatibility with
interfacing applications. Troubleshot software transfers of
interconnecting databases via end user tools as well as higher level
administration software.
UnitedStates Navy, Network andCommunications expert 10/2003to10/2008
 Computer systemship to shore communications: Configured IT
systems for external communication use, resulting in over 10,000
successful sessions with 99% data reliability.
 Enhanced network security, by configuring cryptographic systems,
anti-virus software, intrusion detection devices.
 Updated databases by developing a comprehensive maintenance
routine, by planning incremental checks for system integrity.
 Performed routine security audits.
 Held a Top Secret Clearance.
Professional Summary
- Extensive Technical Skillsincluding: Networking, Routers: Cisco ASA series,
Watchguard, Switches (Cisco), IncidentResponse, FirewallConfiguration.
- Ten Years of LeadershipExperience: United States Navy Division Lead, Territory
Leader at Videojet Field Training Services.
- Excellent Communications Skills: Presentation of Information to non-technical
background personnel; Technical Trainer; Morale Building.
Previous Experience
Ran my own painting company
Associate in Sales and Retail, Sam Ash Music Company.
Accounts recoverable and distribution specialist, Office Max
Education
B.S. – Bachelors of Science, Drexel University.
Graduate of Naval Submarine School; Information Dominance School; Navel Leadership for Leading Petty Officers

Contenu connexe

Tendances

Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)cyberlocke
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...Risk Analysis Consultants, s.r.o.
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?Mir Mustafa Ali
 
Trisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersTrisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersDragos, Inc.
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityDragos, Inc.
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
TRISIS in Perspective
TRISIS in PerspectiveTRISIS in Perspective
TRISIS in PerspectiveDragos, Inc.
 
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks  Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks Dragos, Inc.
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
 
Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos, Inc.
 
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Lancope, Inc.
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustryDragos, Inc.
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionConor Ryan
 
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionIndustrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionDragos, Inc.
 

Tendances (20)

Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Trisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS DefendersTrisis in Perspective: Implications for ICS Defenders
Trisis in Perspective: Implications for ICS Defenders
 
Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
TRISIS in Perspective
TRISIS in PerspectiveTRISIS in Perspective
TRISIS in Perspective
 
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks  Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos year in review (yir) 2018
Dragos year in review (yir) 2018
 
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
 
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionIndustrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology Selection
 

En vedette

Les grandes étapes du règlement d'une succession
Les grandes étapes du règlement d'une successionLes grandes étapes du règlement d'une succession
Les grandes étapes du règlement d'une successionGroupe Althémis
 
Ciencia de la investigacion
Ciencia de la investigacionCiencia de la investigacion
Ciencia de la investigacionalexavane98
 
Tribus urbanas
Tribus urbanasTribus urbanas
Tribus urbanasMarianSixx
 
Trabajo de informatica 1 e
Trabajo de informatica 1 eTrabajo de informatica 1 e
Trabajo de informatica 1 eelvistaco
 
Gutell 116.rpass.bibm11.pp618-622.2011
Gutell 116.rpass.bibm11.pp618-622.2011Gutell 116.rpass.bibm11.pp618-622.2011
Gutell 116.rpass.bibm11.pp618-622.2011Robin Gutell
 
Progrmas para solucionar algoritmos
Progrmas para solucionar algoritmosProgrmas para solucionar algoritmos
Progrmas para solucionar algoritmosAlejo Padilla
 
MJ_Tucker resume 05.22.16
MJ_Tucker resume 05.22.16MJ_Tucker resume 05.22.16
MJ_Tucker resume 05.22.16Mike Tucker
 
Pharma Analytppt
Pharma AnalytpptPharma Analytppt
Pharma Analytpptrmaclennan
 
从运维系统的开发谈安全架构设计
从运维系统的开发谈安全架构设计从运维系统的开发谈安全架构设计
从运维系统的开发谈安全架构设计mysqlops
 
Bolsa de valores.
Bolsa de valores.Bolsa de valores.
Bolsa de valores.ByronMat
 
Facultad de filosofia letras y ciencias de la
Facultad de filosofia letras y ciencias de laFacultad de filosofia letras y ciencias de la
Facultad de filosofia letras y ciencias de laPaty_1989
 
reciclaje tic 2
reciclaje tic 2reciclaje tic 2
reciclaje tic 2isaquiitho
 
Eixos estruturantes currículos pedaços
Eixos estruturantes currículos pedaçosEixos estruturantes currículos pedaços
Eixos estruturantes currículos pedaçosbbetocosta77
 
怎样成为优秀软件模型设计者
怎样成为优秀软件模型设计者怎样成为优秀软件模型设计者
怎样成为优秀软件模型设计者mysqlops
 
What's New in Grizzly & Deploying OpenStack with Puppet
What's New in Grizzly & Deploying OpenStack with PuppetWhat's New in Grizzly & Deploying OpenStack with Puppet
What's New in Grizzly & Deploying OpenStack with PuppetMark Voelker
 

En vedette (20)

Les grandes étapes du règlement d'une succession
Les grandes étapes du règlement d'une successionLes grandes étapes du règlement d'une succession
Les grandes étapes du règlement d'une succession
 
Ciencia de la investigacion
Ciencia de la investigacionCiencia de la investigacion
Ciencia de la investigacion
 
Tribus urbanas
Tribus urbanasTribus urbanas
Tribus urbanas
 
Trabajo de informatica 1 e
Trabajo de informatica 1 eTrabajo de informatica 1 e
Trabajo de informatica 1 e
 
Journal 5
Journal 5Journal 5
Journal 5
 
Gutell 116.rpass.bibm11.pp618-622.2011
Gutell 116.rpass.bibm11.pp618-622.2011Gutell 116.rpass.bibm11.pp618-622.2011
Gutell 116.rpass.bibm11.pp618-622.2011
 
Progrmas para solucionar algoritmos
Progrmas para solucionar algoritmosProgrmas para solucionar algoritmos
Progrmas para solucionar algoritmos
 
MJ_Tucker resume 05.22.16
MJ_Tucker resume 05.22.16MJ_Tucker resume 05.22.16
MJ_Tucker resume 05.22.16
 
Pharma Analytppt
Pharma AnalytpptPharma Analytppt
Pharma Analytppt
 
从运维系统的开发谈安全架构设计
从运维系统的开发谈安全架构设计从运维系统的开发谈安全架构设计
从运维系统的开发谈安全架构设计
 
Curso de historia de méxico
Curso de historia de méxicoCurso de historia de méxico
Curso de historia de méxico
 
Presentación virus
Presentación virusPresentación virus
Presentación virus
 
TIPOS DE APRENDIZAJE
TIPOS DE APRENDIZAJE TIPOS DE APRENDIZAJE
TIPOS DE APRENDIZAJE
 
Bolsa de valores.
Bolsa de valores.Bolsa de valores.
Bolsa de valores.
 
Facultad de filosofia letras y ciencias de la
Facultad de filosofia letras y ciencias de laFacultad de filosofia letras y ciencias de la
Facultad de filosofia letras y ciencias de la
 
reciclaje tic 2
reciclaje tic 2reciclaje tic 2
reciclaje tic 2
 
Eixos estruturantes currículos pedaços
Eixos estruturantes currículos pedaçosEixos estruturantes currículos pedaços
Eixos estruturantes currículos pedaços
 
怎样成为优秀软件模型设计者
怎样成为优秀软件模型设计者怎样成为优秀软件模型设计者
怎样成为优秀软件模型设计者
 
Cbo100053
Cbo100053Cbo100053
Cbo100053
 
What's New in Grizzly & Deploying OpenStack with Puppet
What's New in Grizzly & Deploying OpenStack with PuppetWhat's New in Grizzly & Deploying OpenStack with Puppet
What's New in Grizzly & Deploying OpenStack with Puppet
 

Similaire à resume IT security

David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505Will Grayson
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
Brian_Starr_Resume
Brian_Starr_ResumeBrian_Starr_Resume
Brian_Starr_ResumeBrian Starr
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Russia
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updatedSantos Kumaar.S
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochureGeorge Wainblat
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingAnita D'Amico
 
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachCisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachNetworkCollaborators
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Willard_Grayson_2015
Willard_Grayson_2015Willard_Grayson_2015
Willard_Grayson_2015Will Grayson
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav
 

Similaire à resume IT security (20)

David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
Brian_Starr_Resume
Brian_Starr_ResumeBrian_Starr_Resume
Brian_Starr_Resume
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security Sensemaking
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachCisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Willard_Grayson_2015
Willard_Grayson_2015Willard_Grayson_2015
Willard_Grayson_2015
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
 

resume IT security

  • 1. Michael Moore Information Security Analyst, Network Analyst 25734 Burbage Cir. Cary NC 27519 ● Mobile: (215) 432-9664 Email: mikeet207@gmail.com LinkedIn: Profile Technical Experience IT Skills  MicrosoftActive Directory and Group Policy Management, LANdesk remote assetmanagement software, Netscan, Cisco IOS, Linux, WinTeamDatabase management software  Intrusion Detection and Prevention Systems: Sourcefire, Cisco, Fortinet,  Firewalls: Cisco IOS, Watch-guard SSL and Firewall  NMAP, Nessus Threat scanners, Wireshark  Arbor Peakflow DDOS mitigation software, PravailNSI Private IntranetProtectheuristic analysis, RADAR(SEIM), Intelitactics (SEIM) Carbon Black (endpoint analysis),  Citrix Receiver, UICOpen VPN Manager, management  ProtocolKnowledge: TCP/IP, Public Key Infrastructure, OSI  MicrosoftOutlook and Exchange admin  HardwareTroubleshooting: Servers, Routers, Switches Engagements have included: AT&T, Senior Security Analyst “Contractor”7/2015 toCurrent  Configured, maintained, and operated over 800 intrusion prevention systems, for over 300 globalclients.  Analyzed 100’s of events each day, reducing the customer’s need to performinternal investigations by a ratio of 1000:1
  • 2.  Operated Arbor Peakflow Distributed Denial of Service detection and prevention tools. Analyzed alerts 100% accurately, effectively determining the need to redirect customer traffic to the AT&T scrubbing facilities, ensuring customer uptime meeting 15 min SLA agreement constraints on a consistentbasis.  Performed 100’s of troubleshooting and maintenance evolutions to ensure the uptime of the equipment. Coordinated effectively with on site technicians to meet the time constraints required to complete all repair activities, ensuring positive equipment uptime. Customer’s Bank, Security Analyst“Contractor” 2/2015 to5/2015  Security Event Analysis: Analyzed security events via Radar SEIM (Snort) and Carbon Black (process analysis); determined threatlevel and impact. Conducted remediation efforts.  ProjectPlanning: Organized projects for new security softwareand security analysis tools. Coordinated with various business units to meet company objectives to mitigate risk.  ProductResearch: Investigated possible security solutions to correct security deficiencies and new security risks.  Firewall Change Management: Made recommendations to firewall ACL’s, preventing futurebreaches.  Application Security Testing: Tested new applications for security risks and worked with vendors to apply security changes.  End Point Protection: Managed Anti-Virus tools to analyze and correct security event issues.  Nessus Administration: Developed scan plug-ins to accurately determine security flaws, application functionality. Wrotecustom scripts to address domain specific security risks. AlliedBartonSecurity Services, Network Support Engineer 2/2014 to2/2015  Configured and implemented IT systems for over 65,000 employees, using Microsoft Active Directory, Kaspersky Anti-Virus management; “Watch-guard” multifunction IPS/Firewall.  Ongoing application testing of the company's internal and external systems, using the SDLC methodology, achieving the necessary business requirements.
  • 3.  Tested database software for efficiency and compatibility with interfacing applications. Troubleshot software transfers of interconnecting databases via end user tools as well as higher level administration software. UnitedStates Navy, Network andCommunications expert 10/2003to10/2008  Computer systemship to shore communications: Configured IT systems for external communication use, resulting in over 10,000 successful sessions with 99% data reliability.  Enhanced network security, by configuring cryptographic systems, anti-virus software, intrusion detection devices.  Updated databases by developing a comprehensive maintenance routine, by planning incremental checks for system integrity.  Performed routine security audits.  Held a Top Secret Clearance. Professional Summary - Extensive Technical Skillsincluding: Networking, Routers: Cisco ASA series, Watchguard, Switches (Cisco), IncidentResponse, FirewallConfiguration. - Ten Years of LeadershipExperience: United States Navy Division Lead, Territory Leader at Videojet Field Training Services. - Excellent Communications Skills: Presentation of Information to non-technical background personnel; Technical Trainer; Morale Building. Previous Experience Ran my own painting company Associate in Sales and Retail, Sam Ash Music Company. Accounts recoverable and distribution specialist, Office Max
  • 4. Education B.S. – Bachelors of Science, Drexel University. Graduate of Naval Submarine School; Information Dominance School; Navel Leadership for Leading Petty Officers