SlideShare une entreprise Scribd logo
1  sur  3
Rey A. Ferdin
1339 Dezarae • San Antonio, TX 78253 • 210-316-5601 • ferdinbjr@yahoo.com
OBJECTIVE
Seeking a challenging position which will use my skills and 15 years of military experience in the
United States Marine Corps.
SUMMARY OF QUALIFICATIONS
 Top Secret - Secret Compartmented Information (TS//SCI) Security Clearance since 2000.
 Qualified in Signals Intelligence and Communication Security collection and exploitation.
 Comprehensive knowledge of operational software: Intelink, Anchory, XKeyscore and others.
 Current Counterintelligence (CI) polygraph.
PROFESSIONAL EXPERIENCE
Target Digital Network Analyst • Signals Intelligence Analyst January 2013 – Present
 Conducted analysis of intelligence products to exploit adversary weaknesses and counter
adversary strengths.
 Applied conventional analytical principles, concepts and methods to produce analysis of
information attained from multiple sources,to include database manipulation.
 Conducted target development using data from networks of all forms.
Cryptologic Services Group Watch Officer January 2011 - December 2012
 Provided specialized intelligence support to the Coalition and United States Forces while serving
overseas.
 Provided interpretation, advice, analysis, and assistance responsive to specific intelligence needs
and requirements.
 Communicated succinctly and effectively, both orally and in writing, with a wide variety of
individuals IOT produce professional quality reports, prepare and present briefings, and
participate in meetings, working groups, and conferences.
2
Electronic Key Management System Manager • Dept. Manager July 2008 - December 2010
 Assisted the Battalion EKMS Manager in all duties pertaining to EKMS, assumed the duties of
the EKMS manager during their absence.
 Department Manager responsible for day-to-day administrative support to 105 Marines.
 Supervised professional and personal counseling, computer related training, and general military
instruction.
Signals Intelligence Analyst • Reporter • Supervisor December 2003 - June 2008
 Deployed ISO Operation Iraqi Freedom; Supervised personnel in the Operation Command
Element.
 Analyzed data to derive facts,inferences and projections concerning capabilities, intention, attack
approaches,and likelihood of various adversarial threat activities.
 Produced finished intelligence reports and other products which are responsive to the specific
needs of threat assessment tasking to include formulating and conducting original research,
collating, organizing, and analyzing information, resolving conflicts, and presenting clear and
concise findings in support of CENTCOM tasking.
Communication Security Operator • Signals Intelligence Analyst March 2000 - November 2003
 Collected, analyzed, and reported on exploitable signals in support of Joint COMSEC Monitoring
Activity tasking.
 Led a team of analysts against daily tasking and multiple high priority and major Pacific Theater
Command exercises using all source research tools and COMSEC monitoring.
 Interpreted, evaluated, and integrated intelligence information from collected sources.
EDUCATION
Military Education
 Joint Cyber Analysis Course • 2013 Pensacola,FL
 SNCO Career Course • 2010 Camp Pendleton, CA
 Electronic Key Management System • 2009 Camp Pendleton, CA
 Analysis and Reporting School • 2003 Goodfellow AFB, TX
 Cryptologic Signals Collection and Processing School • 2000 Pensacola,FL
 Morse Interceptor Intelligence School • 1999 Fort Huachuca,AZ
3
Civilian Education
 American Military University • 25 Credit Hours • Information Systems Sec. Charles Town, WV
AWARDS/ACCOMPLISHMENTS
 Joint Service Commendation Medal
 Navy and Marine Corps Achievement Medal
 Korean Defense Service Medal
 National Defense Service Medal
 Unit Military Performer of the Quarter,first quarter 2012
 Unit Military Performer of the Quarter,third quarter 2012
 Manager's Team Award,June 2012
 Branch Analyst of the Month, October 2014

Contenu connexe

Tendances

Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-wantSecurity Bootcamp
 
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakoutSplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakoutSplunk
 
Application of threat intelligence in security operation 2017-06-03
Application of threat intelligence in security operation 2017-06-03Application of threat intelligence in security operation 2017-06-03
Application of threat intelligence in security operation 2017-06-03Jun LI
 
SOC Duties and Training Needs
SOC Duties and Training NeedsSOC Duties and Training Needs
SOC Duties and Training NeedsAmin Asia
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingAgung Suwandaru
 
Design and Analyze Secure Networked Systems - 1
Design and Analyze Secure Networked Systems - 1Design and Analyze Secure Networked Systems - 1
Design and Analyze Secure Networked Systems - 1Don Kim
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
 
Access control attacks
Access control attacksAccess control attacks
Access control attacksYaakub Idris
 
Cyber forensic investigation & Analysis
Cyber forensic investigation & AnalysisCyber forensic investigation & Analysis
Cyber forensic investigation & AnalysisAnshul Tayal
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.Rishabh Gupta
 
It security forensic
It security forensicIt security forensic
It security forensicRupesh Verma
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques begmohsin
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 

Tendances (20)

Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
 
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakoutSplunkLive! London - Scoping Infections and Disrupting Breaches breakout
SplunkLive! London - Scoping Infections and Disrupting Breaches breakout
 
Application of threat intelligence in security operation 2017-06-03
Application of threat intelligence in security operation 2017-06-03Application of threat intelligence in security operation 2017-06-03
Application of threat intelligence in security operation 2017-06-03
 
New definition for APT
New definition for APTNew definition for APT
New definition for APT
 
SOC Duties and Training Needs
SOC Duties and Training NeedsSOC Duties and Training Needs
SOC Duties and Training Needs
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Design and Analyze Secure Networked Systems - 1
Design and Analyze Secure Networked Systems - 1Design and Analyze Secure Networked Systems - 1
Design and Analyze Secure Networked Systems - 1
 
Resume harris 19
Resume harris 19Resume harris 19
Resume harris 19
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Resume NEW
Resume NEWResume NEW
Resume NEW
 
Access control attacks
Access control attacksAccess control attacks
Access control attacks
 
Cyber forensic investigation & Analysis
Cyber forensic investigation & AnalysisCyber forensic investigation & Analysis
Cyber forensic investigation & Analysis
 
Torres,M Jennifer
Torres,M  JenniferTorres,M  Jennifer
Torres,M Jennifer
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
 
It security forensic
It security forensicIt security forensic
It security forensic
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 

Similaire à Rey Ferdin's Resume

Mitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingMitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingNicole Mitchell
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1jjdoylecomcast
 
Michael DeMark Corporate Resume
Michael DeMark Corporate ResumeMichael DeMark Corporate Resume
Michael DeMark Corporate ResumeMichael DeMark
 
IT Help Desk General_Resume1
IT Help Desk General_Resume1IT Help Desk General_Resume1
IT Help Desk General_Resume1Ray Shatto
 
Boyd Bryant Resume July2012
Boyd Bryant  Resume July2012Boyd Bryant  Resume July2012
Boyd Bryant Resume July2012BoydBryant
 
Michael DeMark Federal Resume
Michael DeMark Federal ResumeMichael DeMark Federal Resume
Michael DeMark Federal ResumeMichael DeMark
 
Resume20Jul2016_Short
Resume20Jul2016_ShortResume20Jul2016_Short
Resume20Jul2016_ShortMark Borzain
 
VATC Louis Ippolito Resume
VATC Louis Ippolito ResumeVATC Louis Ippolito Resume
VATC Louis Ippolito ResumeLouis Ippolito
 
HaleResume28June2016
HaleResume28June2016HaleResume28June2016
HaleResume28June2016David Hale
 

Similaire à Rey Ferdin's Resume (20)

Mitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume TargetingMitchell, Nicole N Resume Targeting
Mitchell, Nicole N Resume Targeting
 
Siek 2016v3 (003)
Siek 2016v3 (003)Siek 2016v3 (003)
Siek 2016v3 (003)
 
Holtzlander Resume1-23-16
Holtzlander Resume1-23-16Holtzlander Resume1-23-16
Holtzlander Resume1-23-16
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
 
Zandra Sterling, BCJ
Zandra Sterling, BCJZandra Sterling, BCJ
Zandra Sterling, BCJ
 
Michael DeMark Corporate Resume
Michael DeMark Corporate ResumeMichael DeMark Corporate Resume
Michael DeMark Corporate Resume
 
IT Help Desk General_Resume1
IT Help Desk General_Resume1IT Help Desk General_Resume1
IT Help Desk General_Resume1
 
Boyd Bryant Resume July2012
Boyd Bryant  Resume July2012Boyd Bryant  Resume July2012
Boyd Bryant Resume July2012
 
Resume 10-7-16
Resume 10-7-16Resume 10-7-16
Resume 10-7-16
 
JP RESUME
JP RESUMEJP RESUME
JP RESUME
 
Gregory C. Witcher Full CV
Gregory C. Witcher Full CV Gregory C. Witcher Full CV
Gregory C. Witcher Full CV
 
Michael DeMark Federal Resume
Michael DeMark Federal ResumeMichael DeMark Federal Resume
Michael DeMark Federal Resume
 
B Parker Resume rev 2
B Parker Resume rev 2B Parker Resume rev 2
B Parker Resume rev 2
 
RESUME 2016
RESUME 2016RESUME 2016
RESUME 2016
 
Resume20Jul2016_Short
Resume20Jul2016_ShortResume20Jul2016_Short
Resume20Jul2016_Short
 
FOWLER_2017_RESUME
FOWLER_2017_RESUMEFOWLER_2017_RESUME
FOWLER_2017_RESUME
 
Hunter Resume (OSINT)
Hunter Resume (OSINT)Hunter Resume (OSINT)
Hunter Resume (OSINT)
 
linkdin resume
linkdin resumelinkdin resume
linkdin resume
 
VATC Louis Ippolito Resume
VATC Louis Ippolito ResumeVATC Louis Ippolito Resume
VATC Louis Ippolito Resume
 
HaleResume28June2016
HaleResume28June2016HaleResume28June2016
HaleResume28June2016
 

Rey Ferdin's Resume

  • 1. Rey A. Ferdin 1339 Dezarae • San Antonio, TX 78253 • 210-316-5601 • ferdinbjr@yahoo.com OBJECTIVE Seeking a challenging position which will use my skills and 15 years of military experience in the United States Marine Corps. SUMMARY OF QUALIFICATIONS  Top Secret - Secret Compartmented Information (TS//SCI) Security Clearance since 2000.  Qualified in Signals Intelligence and Communication Security collection and exploitation.  Comprehensive knowledge of operational software: Intelink, Anchory, XKeyscore and others.  Current Counterintelligence (CI) polygraph. PROFESSIONAL EXPERIENCE Target Digital Network Analyst • Signals Intelligence Analyst January 2013 – Present  Conducted analysis of intelligence products to exploit adversary weaknesses and counter adversary strengths.  Applied conventional analytical principles, concepts and methods to produce analysis of information attained from multiple sources,to include database manipulation.  Conducted target development using data from networks of all forms. Cryptologic Services Group Watch Officer January 2011 - December 2012  Provided specialized intelligence support to the Coalition and United States Forces while serving overseas.  Provided interpretation, advice, analysis, and assistance responsive to specific intelligence needs and requirements.  Communicated succinctly and effectively, both orally and in writing, with a wide variety of individuals IOT produce professional quality reports, prepare and present briefings, and participate in meetings, working groups, and conferences.
  • 2. 2 Electronic Key Management System Manager • Dept. Manager July 2008 - December 2010  Assisted the Battalion EKMS Manager in all duties pertaining to EKMS, assumed the duties of the EKMS manager during their absence.  Department Manager responsible for day-to-day administrative support to 105 Marines.  Supervised professional and personal counseling, computer related training, and general military instruction. Signals Intelligence Analyst • Reporter • Supervisor December 2003 - June 2008  Deployed ISO Operation Iraqi Freedom; Supervised personnel in the Operation Command Element.  Analyzed data to derive facts,inferences and projections concerning capabilities, intention, attack approaches,and likelihood of various adversarial threat activities.  Produced finished intelligence reports and other products which are responsive to the specific needs of threat assessment tasking to include formulating and conducting original research, collating, organizing, and analyzing information, resolving conflicts, and presenting clear and concise findings in support of CENTCOM tasking. Communication Security Operator • Signals Intelligence Analyst March 2000 - November 2003  Collected, analyzed, and reported on exploitable signals in support of Joint COMSEC Monitoring Activity tasking.  Led a team of analysts against daily tasking and multiple high priority and major Pacific Theater Command exercises using all source research tools and COMSEC monitoring.  Interpreted, evaluated, and integrated intelligence information from collected sources. EDUCATION Military Education  Joint Cyber Analysis Course • 2013 Pensacola,FL  SNCO Career Course • 2010 Camp Pendleton, CA  Electronic Key Management System • 2009 Camp Pendleton, CA  Analysis and Reporting School • 2003 Goodfellow AFB, TX  Cryptologic Signals Collection and Processing School • 2000 Pensacola,FL  Morse Interceptor Intelligence School • 1999 Fort Huachuca,AZ
  • 3. 3 Civilian Education  American Military University • 25 Credit Hours • Information Systems Sec. Charles Town, WV AWARDS/ACCOMPLISHMENTS  Joint Service Commendation Medal  Navy and Marine Corps Achievement Medal  Korean Defense Service Medal  National Defense Service Medal  Unit Military Performer of the Quarter,first quarter 2012  Unit Military Performer of the Quarter,third quarter 2012  Manager's Team Award,June 2012  Branch Analyst of the Month, October 2014