Resumes
Resumes
Network Security Engineer
View pageLocation:
11700 Old Columbia Pike, Silver Spring, MD 20904
Industry:
Computer & Network Security
Work:
SSA since Jan 2009
Network Security Engineer
University of Maryland 2007 - 2009
Network security specialist
Arch Training Center Jun 2004 - Jun 2008
System administrator
University of the District of Columbia Sep 2002 - Sep 2004
Computer Networking Teacher
Network Security Engineer
University of Maryland 2007 - 2009
Network security specialist
Arch Training Center Jun 2004 - Jun 2008
System administrator
University of the District of Columbia Sep 2002 - Sep 2004
Computer Networking Teacher
Education:
University of Maryland University College
Masters, Information Assurance
Masters, Information Assurance
Skills:
Capacity Planning
Patch Management
Ids
Network Monitoring Tools
Ceh
Adobe Acrobat
Windows
Vulnerability
Authentication
Students
Internet Technologies
Novell
Hubs
Adjustments
Incident Handling
Access Control
Proxy
San
Dns Server
Road
Hacking
Network Security
Healthcare Information Technology
Event Management
Windows Xp
Detection
Siem
Management
Cyber
Text Editing
Pc
Vulnerability Assessment
Computer Science
Science
Comptia
Security
Access Lists
Desktop Computers
Information Assurance
Routers
Checking
Data Backup
Lan Wan
Pki
Rules
Resolve
Netstat
Auditing
Group Policy
Chfi
Application Servers
Monitors
Alerts
Soccer
Gcih
Accounting
Avg
Linux
Cissp
Human Resources
Systems Engineering
6.X
Incident Response
Data Privacy
Messaging
Networking
System
Mcafee
Cell
Switches
Photography
Ipconfig
Windows 2000
Sage Act
Homeland Security
From Scratch
Tcp/Ip
Security Tools
Snort
Internet Protocols
Strategies
Microsoft Office
Ecsa
Encryption
Training
Forensic Analysis
Soc
Disaster Recovery
Printers
Status Reports
Virtual
Modifying
Confidentiality
Solaris
Intranet
Virus
Documentation
Vpn
Cisco Routers
Emerging Technologies
System Monitoring
Communication Training
Incident
Internet Security
Investigation
District of Columbia
Remote Desktop
Analysis
Hardware
Written
Kvm
Advertising Agency
Social Security
Concepts
.Net
Information Technology
Computer Forensics
Protecting
Information Security
Transmission
Web Servers
Viruses
Coordination
Symantec Antivirus
Configurations
Controllers
Fix Protocol
Evaluations
Operating Systems
The Environment
Applications
Network Design
Hipaa
Web Design
Sensors
Imaging Software
Communication
Home
File Servers
Ips
Browsers
System Administration
Communication Protocols
Active
Restoration
Suite
Security Training
Symantec
Network Administration
Ssa
Technical Support
Data Logging
Project
Sql
Print Servers
Sourcefire
Computer Networking
Aspx
Windows Security
Fisma
Unix
Oak
Servers
Dns
Dhcp
Computer Proficiency
Bluecoat
Internal Audit
Council
Firewalls
Regulations
Security Risk
Intelligence
Obtain
Cisco Technologies
Active Directory
Intrusion Detection
Cables
Switch
Irs
Software Installation
Exploit
Microsoft Exchange
Technical Leadership
Reviews
Electronics
Prevention
Arch
Computer Security
Connectivity
Ipsec
Windows Vista
Application Security
Visio
Software
Charter
Ping
Arcsight
Compliance
Outlook
Content Filtering
Network Communications
Spyware
Console
Cryptography
Scanners
Optimization
Problem Solving
Databases
Patch Management
Ids
Network Monitoring Tools
Ceh
Adobe Acrobat
Windows
Vulnerability
Authentication
Students
Internet Technologies
Novell
Hubs
Adjustments
Incident Handling
Access Control
Proxy
San
Dns Server
Road
Hacking
Network Security
Healthcare Information Technology
Event Management
Windows Xp
Detection
Siem
Management
Cyber
Text Editing
Pc
Vulnerability Assessment
Computer Science
Science
Comptia
Security
Access Lists
Desktop Computers
Information Assurance
Routers
Checking
Data Backup
Lan Wan
Pki
Rules
Resolve
Netstat
Auditing
Group Policy
Chfi
Application Servers
Monitors
Alerts
Soccer
Gcih
Accounting
Avg
Linux
Cissp
Human Resources
Systems Engineering
6.X
Incident Response
Data Privacy
Messaging
Networking
System
Mcafee
Cell
Switches
Photography
Ipconfig
Windows 2000
Sage Act
Homeland Security
From Scratch
Tcp/Ip
Security Tools
Snort
Internet Protocols
Strategies
Microsoft Office
Ecsa
Encryption
Training
Forensic Analysis
Soc
Disaster Recovery
Printers
Status Reports
Virtual
Modifying
Confidentiality
Solaris
Intranet
Virus
Documentation
Vpn
Cisco Routers
Emerging Technologies
System Monitoring
Communication Training
Incident
Internet Security
Investigation
District of Columbia
Remote Desktop
Analysis
Hardware
Written
Kvm
Advertising Agency
Social Security
Concepts
.Net
Information Technology
Computer Forensics
Protecting
Information Security
Transmission
Web Servers
Viruses
Coordination
Symantec Antivirus
Configurations
Controllers
Fix Protocol
Evaluations
Operating Systems
The Environment
Applications
Network Design
Hipaa
Web Design
Sensors
Imaging Software
Communication
Home
File Servers
Ips
Browsers
System Administration
Communication Protocols
Active
Restoration
Suite
Security Training
Symantec
Network Administration
Ssa
Technical Support
Data Logging
Project
Sql
Print Servers
Sourcefire
Computer Networking
Aspx
Windows Security
Fisma
Unix
Oak
Servers
Dns
Dhcp
Computer Proficiency
Bluecoat
Internal Audit
Council
Firewalls
Regulations
Security Risk
Intelligence
Obtain
Cisco Technologies
Active Directory
Intrusion Detection
Cables
Switch
Irs
Software Installation
Exploit
Microsoft Exchange
Technical Leadership
Reviews
Electronics
Prevention
Arch
Computer Security
Connectivity
Ipsec
Windows Vista
Application Security
Visio
Software
Charter
Ping
Arcsight
Compliance
Outlook
Content Filtering
Network Communications
Spyware
Console
Cryptography
Scanners
Optimization
Problem Solving
Databases
Interests:
Create Snort Rules and Test Them