first commit
This commit is contained in:
615
resume.html
Normal file
615
resume.html
Normal file
@@ -0,0 +1,615 @@
|
||||
<!doctype html>
|
||||
<html lang="en" style="">
|
||||
<head>
|
||||
<meta charset="utf-8" />
|
||||
|
||||
<title>Phillip Tarrant</title>
|
||||
<meta name="description" content="Accomplished and analytical professional with 20+ years of experience in cybersecurity, server infrastructures, and data-center operations. Proven expertise in AI use in Cyber Operations, digital forensics, penetration testing, information system management, malware reversing, threat detection, and threat hunting. Proactive leader with a proven record of managing multiple large teams and leading the charge to complete project goals. Managed MSSP operations for 50+ large business clients encompassing over 150,000 assets and 1 million+ users." />
|
||||
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1" />
|
||||
<link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Lato:400,700&display=swap" />
|
||||
<style>
|
||||
:root{color-scheme:light dark;--color-background-light: #ffffff;--color-dimmed-light: #f3f4f5;--color-primary-light: #191e23;--color-secondary-light: #6c7781;--color-accent-light: #0073aa;--color-background-dark: #191e23;--color-dimmed-dark: #23282d;--color-primary-dark: #fbfbfc;--color-secondary-dark: #ccd0d4;--color-accent-dark: #00a0d2;--color-background: var(--color-background-light);--color-dimmed: var(--color-dimmed-light);--color-primary: var(--color-primary-light);--color-secondary: var(--color-secondary-light);--color-accent: var(--color-accent-light);--scale-ratio: 1.25;--scale0: 1rem;--scale1: calc(var(--scale0) * var(--scale-ratio));--scale2: calc(var(--scale1) * var(--scale-ratio));--scale3: calc(var(--scale2) * var(--scale-ratio));--scale4: calc(var(--scale3) * var(--scale-ratio));--scale5: calc(var(--scale4) * var(--scale-ratio))}@media (prefers-color-scheme: dark){:root{--color-background: var(--color-background-dark);--color-dimmed: var(--color-dimmed-dark);--color-primary: var(--color-primary-dark);--color-secondary: var(--color-secondary-dark);--color-accent: var(--color-accent-dark)}}*{box-sizing:border-box;margin:0;padding:0}html{font-size:14px}body{background:var(--color-background);color:var(--color-primary);display:grid;font:1em/1.5 Lato,sans-serif;gap:2em;grid-template-columns:[full-start] 1fr [main-start side-start] minmax(min-content,12em) [side-end content-start] minmax(min-content,36em) [main-end content-end] 1fr [full-end];grid-template-rows:auto [content] 0;margin-bottom:4em}body:before{content:"";grid-column:full;grid-row:content}ol,ul{padding-left:1em}:not(.icon-list,.tag-list)>li+li{margin-top:.4em}li::marker,.network{color:var(--color-secondary)}a{color:var(--color-accent);text-decoration:none}a:focus,a:hover{text-decoration:underline}h1,h2,h3,h5{font-weight:400}h1,h2,h3{line-height:1.2}h1{font-size:var(--scale5)}h2{color:var(--color-secondary);font-size:var(--scale4)}h3{color:var(--color-secondary);font-size:var(--scale3);grid-column:side;margin-bottom:1rem}h4{font-size:var(--scale2)}h5{font-size:var(--scale1)}h6{font-size:var(--scale0)}blockquote{border-left:.2em solid var(--color-dimmed);padding-left:1em}cite{color:var(--color-secondary);font-style:inherit}cite:before{content:"— "}svg{margin-right:.2em;vertical-align:text-bottom}.masthead{background:var(--color-dimmed);display:inherit;gap:inherit;grid-column:full;grid-template-columns:inherit;padding:4em 0;text-align:center}.masthead>*,section{grid-column:main}.masthead>img{border:4px solid;border-radius:50%;margin:0 auto;max-width:12em}article>*+*,blockquote>*+*,.timeline>div>*+*{margin-top:.6em}.meta{color:var(--color-secondary)}.stack{display:grid;gap:1.5em}.icon-list{display:flex;flex-wrap:wrap;gap:.4em 1em;justify-content:center;list-style:none;padding:0}.grid-list{display:grid;gap:1em}.tag-list{display:flex;flex-wrap:wrap;gap:.4em;list-style:none;padding:0}.tag-list>li{background:var(--color-dimmed);border-radius:.2em;padding:.2em .6em}.timeline>div{position:relative}.timeline>div:not(:last-child){padding-bottom:1rem}.timeline>div:not(:last-child):before{content:"";position:absolute;top:1rem;left:-15px;width:2px;height:100%;background:var(--color-secondary)}.timeline>div:not(:only-child):after{content:"";position:absolute;top:.6rem;left:-20px;width:8px;height:8px;background:var(--color-secondary);border:2px solid var(--color-background);border-radius:50%}@media print,(min-width: 48em){h3{text-align:right;margin-bottom:inherit}.masthead{text-align:inherit}.masthead>*,section{grid-column:content}.masthead img{grid-column:side;grid-row:span 2;max-width:100%}section{display:contents}.icon-list{flex-direction:column}.grid-list{grid-template-columns:repeat(auto-fit,minmax(calc((100% - 1em)/2),1fr))}}time+time-duration:before{content:"· "}@media print{time-duration{display:none}}
|
||||
</style>
|
||||
<script type="module">
|
||||
const pluralize = (num, str) => `${num} ${num === 1 ? str : str.concat('s')}`
|
||||
|
||||
class TimeDuration extends HTMLElement {
|
||||
connectedCallback() {
|
||||
const dates = this.getAttribute('dates')
|
||||
if (!dates) return this.remove()
|
||||
|
||||
const duration = dates.split('|').reduce((acc, _date, i, dates) => {
|
||||
if (i % 2) return acc
|
||||
const [startDate, endDate] = dates.slice(i)
|
||||
return acc + (startDate ? +new Date(endDate || Date.now()) - +new Date(startDate) : 0)
|
||||
}, 0)
|
||||
|
||||
const diffDate = new Date(duration)
|
||||
const years = diffDate.getFullYear() - 1970
|
||||
const months = diffDate.getMonth()
|
||||
const days = diffDate.getDate() - 1
|
||||
|
||||
const segments = [
|
||||
years && pluralize(years, 'yr'),
|
||||
months && pluralize(months, 'mo'),
|
||||
days && !years && !months && pluralize(days, 'day'),
|
||||
].filter(Boolean)
|
||||
if (!segments.length) return
|
||||
|
||||
this.textContent = segments.join(' ')
|
||||
}
|
||||
}
|
||||
|
||||
customElements.define('time-duration', TimeDuration)
|
||||
|
||||
</script>
|
||||
</head>
|
||||
<body>
|
||||
|
||||
<header class="masthead">
|
||||
|
||||
<div><h1>Phillip Tarrant</h1> <h2>Cybersecurity Director | Automation Leader</h2></div>
|
||||
<article><p>Accomplished and analytical professional with 20+ years of experience in cybersecurity, server infrastructures, and data-center operations. Proven expertise in AI use in Cyber Operations, digital forensics, penetration testing, information system management, malware reversing, threat detection, and threat hunting. Proactive leader with a proven record of managing multiple large teams and leading the charge to complete project goals. Managed MSSP operations for 50+ large business clients encompassing over 150,000 assets and 1 million+ users.</p></article>
|
||||
<ul class="icon-list">
|
||||
|
||||
<li>
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="feather feather-map-pin"><path d="M21 10c0 7-9 13-9 13s-9-6-9-13a9 9 0 0 1 18 0z"></path><circle cx="12" cy="10" r="3"></circle></svg> Morrison, United States
|
||||
</li>
|
||||
|
||||
|
||||
<li>
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="feather feather-mail"><path d="M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z"></path><polyline points="22,6 12,13 2,6"></polyline></svg>
|
||||
<a href="mailto:ptarrant@gmail.com">ptarrant@gmail.com</a>
|
||||
</li>
|
||||
|
||||
|
||||
<li>
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="feather feather-phone"><path d="M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z"></path></svg>
|
||||
<a href="tel:(706)294-6733">(706) 294-6733</a>
|
||||
</li>
|
||||
|
||||
<li><svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="feather feather-link"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg> <a href="https://www.linkedin.com/in/phillip-tarrant-cyber">www.linkedin.com/in/phillip-tarrant-cyber</a></li>
|
||||
|
||||
<li>
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="feather feather-linkedin"><path d="M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"></path><rect x="2" y="9" width="4" height="12"></rect><circle cx="4" cy="4" r="2"></circle></svg> <a href="https://www.linkedin.com/in/phillip-tarrant-cyber">phillip-tarrant-cyber</a>
|
||||
<span class="network">(LinkedIn)</span>
|
||||
</li>
|
||||
|
||||
</ul>
|
||||
</header>
|
||||
|
||||
<section id="work">
|
||||
<h3>Work</h3>
|
||||
<div class="stack">
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>Senior Information Security Consultant</h4>
|
||||
<div class="meta">
|
||||
|
||||
<div>
|
||||
<strong>Confidential</strong>
|
||||
</div>
|
||||
<div><time datetime="2025-01">Jan 2025</time> – Present <time-duration dates="2025-01|"></time-duration></div>
|
||||
<div>Remote</div>
|
||||
|
||||
</div>
|
||||
</header>
|
||||
<div class="timeline">
|
||||
|
||||
<div>
|
||||
|
||||
<p>Contract consulting role providing cybersecurity leadership and technical expertise.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Develop, design, and review risk assessments and vulnerability scans of client networks and systems</p></li><li><p>Developing and implementing robust security controls and countermeasures to mitigate identified risks</p></li><li><p>Designing and deploying secure architectures for cloud, on-premises, and hybrid environments</p></li><li><p>Providing guidance on compliance with industry regulations (HIPAA, PCI-DSS, GDPR, NIST 800-53)</p></li><li><p>Collaborating with clients to develop and implement incident response and disaster recovery plans</p></li><li><p>Conducting regular security audits and assessments to ensure ongoing compliance and security posture</p></li><li><p>Short-term director role at American Technology Services (ATS) restructuring SOC flow and training</p></li><li><p>Managed Vulnerability Management Program for largest fintech client using Qualys</p></li><li><p>Currently managing SOC operations for US Defense Space market supplier across multiple Microsoft tenants</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>Compuquip Cybersecurity</h4>
|
||||
<div class="meta">
|
||||
|
||||
|
||||
<div><time-duration dates="2024-06|2024-12|2023-03|2024-06|2021-01|2023-03"></time-duration></div>
|
||||
|
||||
</div>
|
||||
</header>
|
||||
<div class="timeline">
|
||||
|
||||
<div>
|
||||
|
||||
<div>
|
||||
<h5>Director of Automation</h5>
|
||||
<div class="meta">
|
||||
<div><time datetime="2024-06">Jun 2024</time> – <time datetime="2024-12">Dec 2024</time> <time-duration dates="2024-06|2024-12"></time-duration></div>
|
||||
<div>Doral, Florida</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<p>Lead the Automation Team to deliver the automation needs of the business.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Spearheaded new automation processes and procedures including standup of new architecture and infrastructure</p></li><li><p>Drove and mentored the team in new Automation workflows using Python, AWS Lambda and SOAR technology</p></li><li><p>Developed custom AI processes to handle several key business needs using custom prompts and data</p></li><li><p>Built automation handling 3,500 tickets weekly with 47% closed without human involvement</p></li><li><p>Designed, programmed, and deployed AI tools, prompts, code, and logic for security automation</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
|
||||
<div>
|
||||
<h5>SOC Director</h5>
|
||||
<div class="meta">
|
||||
<div><time datetime="2023-03">Mar 2023</time> – <time datetime="2024-06">Jun 2024</time> <time-duration dates="2023-03|2024-06"></time-duration></div>
|
||||
<div>Doral, Florida</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<p>Directed Security Operations Center and Red Team operations for MSSP clients.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Grew SOC client base from 16 to 52 customers over tenure with expansion of services</p></li><li><p>Improved SOC profitability from 18% to 52% margin (80% in one quarter) contributing to 15% annual net income growth</p></li><li><p>Directly managed team of 17 reports</p></li><li><p>Oversaw Red team / Offensive Security Teams and Managed Remediation Service projects</p></li><li><p>Managed DFIR engagements, MDR services, Proactive Vulnerability Scanning, Patching, and Pentesting</p></li><li><p>Maintained situational awareness reports for advanced threats (APT and FO incidents)</p></li><li><p>Part of leadership team with COO/CEO/CFO involved in quarterly strategic planning</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
|
||||
<div>
|
||||
<h5>SOC Technical Manager</h5>
|
||||
<div class="meta">
|
||||
<div><time datetime="2021-01">Jan 2021</time> – <time datetime="2023-03">Mar 2023</time> <time-duration dates="2021-01|2023-03"></time-duration></div>
|
||||
<div>Tampa, Florida</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<p>Managed SOC Operations and led incident research and engineering teams.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Authored SOPs and training documentation for SOC team</p></li><li><p>Lead Incident Research and mentored SOC Engineers</p></li><li><p>Developed threat trend analysis reports and metrics</p></li><li><p>Managed SOC Operations and developed SOC playbooks/workflows</p></li><li><p>Generated end-of-month reports for managers and customers</p></li><li><p>Maintained situational awareness reports for advanced threats</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>Sr. Cyber Security Architect</h4>
|
||||
<div class="meta">
|
||||
|
||||
<div>
|
||||
<strong>Travel Syndication Technology (TST)</strong>
|
||||
</div>
|
||||
<div><time datetime="2020-04">Apr 2020</time> – <time datetime="2021-01">Jan 2021</time> <time-duration dates="2020-04|2021-01"></time-duration></div>
|
||||
<div>Alpharetta, Georgia</div>
|
||||
|
||||
</div>
|
||||
</header>
|
||||
<div class="timeline">
|
||||
|
||||
<div>
|
||||
|
||||
<p>Responsible for security architecture, training programs, and compliance across the organization.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Formulated and oversaw phishing and developer security training programs</p></li><li><p>Developed and maintained cloud security protections and security posture</p></li><li><p>Created custom tools to automate attacks against infrastructure and design detections</p></li><li><p>Saved $10,000+ through effective vendor/supplier negotiations</p></li><li><p>Steered organization through PCI and NIST 800 series audits</p></li><li><p>Devised, created, and upgraded cybersecurity related policies and procedures</p></li><li><p>Designed and implemented automated security verification and attack programs</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>Intercontinental Exchange</h4>
|
||||
<div class="meta">
|
||||
|
||||
|
||||
<div><time-duration dates="2020-03|2020-04|2018-08|2020-03"></time-duration></div>
|
||||
|
||||
</div>
|
||||
</header>
|
||||
<div class="timeline">
|
||||
|
||||
<div>
|
||||
|
||||
<div>
|
||||
<h5>Senior Cyber Security Engineer</h5>
|
||||
<div class="meta">
|
||||
<div><time datetime="2020-03">Mar 2020</time> – <time datetime="2020-04">Apr 2020</time> <time-duration dates="2020-03|2020-04"></time-duration></div>
|
||||
<div>Marietta, Georgia</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<p>Part of the Architecture and Automation Team focused on security data flow and automation.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Designed and maintained security data flow from network endpoints through aggregation, parsing, and storage</p></li><li><p>Created methods, processes, and algorithms to extract knowledge from structured/unstructured data</p></li><li><p>Designed custom tools to automate SOC triage and response activities</p></li><li><p>Incorporated security into infrastructure CI/CD pipelines including cloud technologies</p></li><li><p>Formulated vulnerability and threat hunting dashboard for tracking and mitigation</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
|
||||
<div>
|
||||
<h5>Cyber Security Engineer</h5>
|
||||
<div class="meta">
|
||||
<div><time datetime="2018-08">Aug 2018</time> – <time datetime="2020-03">Mar 2020</time> <time-duration dates="2018-08|2020-03"></time-duration></div>
|
||||
<div>Marietta, Georgia</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<p>Part of the Incident Response / Digital Forensics Team as lead investigator.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Served as lead investigator on critical incidents with thorough investigations</p></li><li><p>Created extensive documentation on processes and procedures for the entire IR team</p></li><li><p>Served as leader in Malware Analysis in isolated sandboxed environments</p></li><li><p>Developed skills of junior agents including custom malware writing through training</p></li><li><p>Managed multi-server compromise investigations coordinating across three teams and time zones</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>The National Wild Turkey Federation</h4>
|
||||
<div class="meta">
|
||||
|
||||
|
||||
<div><time-duration dates="2015-10|2018-08|2015-01|2015-10"></time-duration></div>
|
||||
|
||||
</div>
|
||||
</header>
|
||||
<div class="timeline">
|
||||
|
||||
<div>
|
||||
|
||||
<div>
|
||||
<h5>Technical Services Manager</h5>
|
||||
<div class="meta">
|
||||
<div><time datetime="2015-10">Oct 2015</time> – <time datetime="2018-08">Aug 2018</time> <time-duration dates="2015-10|2018-08"></time-duration></div>
|
||||
<div>Edgefield, South Carolina</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<p>Managed IT team supporting 300+ staff members with focus on infrastructure and security.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Managed team of technicians and developers facilitating 300+ staff members</p></li><li><p>Oversaw 8 direct reports with performance management responsibilities</p></li><li><p>Conducted vendor/supplier negotiations to minimize costs</p></li><li><p>Managed security of entire web presence including network and programming code</p></li><li><p>Efficiently managed doubling of server space and usage</p></li><li><p>Migrated 3rd party tools to in-house solutions saving $50,000+ yearly</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
|
||||
<div>
|
||||
<h5>Network / Server Administrator</h5>
|
||||
<div class="meta">
|
||||
<div><time datetime="2015-01">Jan 2015</time> – <time datetime="2015-10">Oct 2015</time> <time-duration dates="2015-01|2015-10"></time-duration></div>
|
||||
<div>Edgefield, South Carolina</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<p>Managed Windows and Linux server environments with focus on infrastructure and automation.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Designed, managed, and monitored infrastructure systems (LANs, WANs, Security)</p></li><li><p>Developed and maintained process automation through scripting and programming</p></li><li><p>Administered servers, computers, printers, routers, switches, firewalls, and phones</p></li><li><p>Spearheaded performance tuning, hardware upgrades, and resource optimization</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>System Administrator</h4>
|
||||
<div class="meta">
|
||||
|
||||
<div>
|
||||
<strong>Morgan Thermal Ceramics</strong>
|
||||
</div>
|
||||
<div><time datetime="2014-10">Oct 2014</time> – <time datetime="2014-12">Dec 2014</time> <time-duration dates="2014-10|2014-12"></time-duration></div>
|
||||
<div>Augusta, Georgia</div>
|
||||
|
||||
</div>
|
||||
</header>
|
||||
<div class="timeline">
|
||||
|
||||
<div>
|
||||
|
||||
<p>Contract role managing network support and infrastructure upgrades.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Managed network support and upgrades including fiber optic link installation</p></li><li><p>Served key role implementing 35 managed switches with several VLANs</p></li><li><p>Resolved major data outage in main switch room without assistance</p></li><li><p>Completed three-month contract in one month</p></li><li><p>Developed automated cloning system to minimize cost and speed deployment</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>IT Coordinator / Network Administrator / System Administrator</h4>
|
||||
<div class="meta">
|
||||
|
||||
<div>
|
||||
<strong>Briarwood Academy</strong>
|
||||
</div>
|
||||
<div><time datetime="2006-08">Aug 2006</time> – <time datetime="2014-04">Apr 2014</time> <time-duration dates="2006-08|2014-04"></time-duration></div>
|
||||
<div>Warrenton, Georgia</div>
|
||||
|
||||
</div>
|
||||
</header>
|
||||
<div class="timeline">
|
||||
|
||||
<div>
|
||||
|
||||
<p>Oversaw IT department budgets and deployment strategies for the school.</p>
|
||||
|
||||
<ul>
|
||||
<li><p>Oversaw budgets and deployment strategies for entire IT department</p></li><li><p>Administered servers, desktop computers, printers, routers, switches, firewalls</p></li><li><p>Shifted all servers from physical to virtual to save space and minimize costs</p></li><li><p>Rolled out wireless for entire campus comprising several acres</p></li><li><p>Negotiated and delivered fiber link for the school free of charge</p></li><li><p>Managed Linux NAS storage solutions for 200+ workstations</p></li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>Computer Service Technician</h4>
|
||||
<div class="meta">
|
||||
|
||||
<div>
|
||||
<strong>Pronet</strong>
|
||||
</div>
|
||||
<div><time datetime="2005-05">May 2005</time> – <time datetime="2006-08">Aug 2006</time> <time-duration dates="2005-05|2006-08"></time-duration></div>
|
||||
<div>Georgia</div>
|
||||
|
||||
</div>
|
||||
</header>
|
||||
<div class="timeline">
|
||||
|
||||
<div>
|
||||
|
||||
<p>IT expert for hire in block time situations and emergency disaster recovery.</p>
|
||||
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>Tier 3 Support</h4>
|
||||
<div class="meta">
|
||||
|
||||
<div>
|
||||
<strong>Sitel Group</strong>
|
||||
</div>
|
||||
<div><time datetime="1999-05">May 1999</time> – <time datetime="2001-05">May 2001</time> <time-duration dates="1999-05|2001-05"></time-duration></div>
|
||||
|
||||
|
||||
</div>
|
||||
</header>
|
||||
<div class="timeline">
|
||||
|
||||
<div>
|
||||
|
||||
<p>Assisted Tier 2 technicians with customer service issues and tested new developing technologies.</p>
|
||||
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</article>
|
||||
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<section id="education">
|
||||
<h3>Education</h3>
|
||||
<div class="stack">
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>Virginia College</h4>
|
||||
<div class="meta">
|
||||
<div>Associate in <strong>Network Administration</strong></div>
|
||||
<div><time datetime="2014">Jan 2014</time> – <time datetime="2016">Jan 2016</time> <time-duration dates="2014|2016"></time-duration></div>
|
||||
</div>
|
||||
</header>
|
||||
|
||||
</article>
|
||||
|
||||
</div>
|
||||
</section>
|
||||
|
||||
|
||||
<section id="awards">
|
||||
<h3>Awards</h3>
|
||||
<div class="stack">
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>Lethal Forensicator Coin Winner</h4>
|
||||
<div class="meta">
|
||||
<div>Awarded by <strong>SANS/GIAC</strong></div> <time datetime="2019-01-01">Jan 2019</time>
|
||||
</div>
|
||||
</header>
|
||||
<p>SANS Challenge Coin for excellence in digital forensics</p>
|
||||
</article>
|
||||
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<section id="certificates">
|
||||
<h3>Certificates</h3>
|
||||
<div class="stack">
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>GWAPT - Web Application Penetration Tester</h4>
|
||||
<div class="meta">
|
||||
<div>Issued by <strong>GIAC</strong></div> <time datetime="2020-01-01">Jan 2020</time>
|
||||
</div>
|
||||
</header>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>GCFA - Forensic Analyst</h4>
|
||||
<div class="meta">
|
||||
<div>Issued by <strong>GIAC</strong></div> <time datetime="2019-01-01">Jan 2019</time>
|
||||
</div>
|
||||
</header>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>GCIH - Incident Handler</h4>
|
||||
<div class="meta">
|
||||
<div>Issued by <strong>GIAC</strong></div> <time datetime="2018-01-01">Jan 2018</time>
|
||||
</div>
|
||||
</header>
|
||||
</article>
|
||||
|
||||
<article>
|
||||
<header>
|
||||
<h4>A+ Certification</h4>
|
||||
<div class="meta">
|
||||
<div>Issued by <strong>CompTIA</strong></div> <time datetime="2001-01-01">Jan 2001</time>
|
||||
</div>
|
||||
</header>
|
||||
</article>
|
||||
|
||||
</div>
|
||||
</section>
|
||||
|
||||
|
||||
<section id="skills">
|
||||
<h3>Skills</h3>
|
||||
<div class="grid-list">
|
||||
|
||||
<div>
|
||||
<h4>Security Operations & SIEM</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>Splunk</li><li>ELK Stack</li><li>Microsoft Sentinel</li><li>Microsoft Defender</li><li>Sentinel One</li><li>Rapid7 IDR</li><li>Stellar Cyber</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<h4>SOAR Platforms</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>Swimlane</li><li>D3 SOAR</li><li>Torq</li><li>Playbook Development</li><li>Workflow Automation</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<h4>EDR & Threat Detection</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>Darktrace</li><li>Tanium</li><li>Vectra</li><li>FireEye</li><li>Sentinel One</li><li>Detection Engineering</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<h4>DFIR & Forensics</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>Volatility</li><li>Malware Analysis</li><li>Reverse Engineering</li><li>Incident Response</li><li>Evidence Collection</li><li>Multi-host Investigation</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<h4>Penetration Testing & Red Team</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>Metasploit</li><li>Web Application Security</li><li>Attack Simulation</li><li>Red Team Oversight</li><li>Purple Team Testing</li><li>Vulnerability Assessment</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<h4>Cloud Platforms & Security</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>AWS</li><li>Azure</li><li>Oracle Cloud</li><li>Lambda</li><li>EC2</li><li>Cloud Security Architecture</li><li>Hybrid Environments</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<h4>AI/ML & Automation</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>AWS Bedrock</li><li>Large Language Models</li><li>RAG</li><li>Machine Learning</li><li>Python Automation</li><li>Custom Tool Development</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<h4>Programming & Scripting</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>Python</li><li>PowerShell</li><li>Bash</li><li>SQL</li><li>YAML</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<h4>Infrastructure & Systems</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>Windows Server</li><li>Linux/UNIX</li><li>Active Directory</li><li>VMware</li><li>Docker</li><li>Kubernetes</li><li>Network Architecture</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<h4>Compliance & Frameworks</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>NIST 800-53</li><li>PCI-DSS</li><li>HIPAA</li><li>GDPR</li><li>CIS Benchmarks</li><li>Security Audits</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<h4>Leadership & Management</h4>
|
||||
|
||||
<ul class="tag-list">
|
||||
<li>Team Leadership (17+ reports)</li><li>MSSP Operations</li><li>Budget Management</li><li>Vendor Negotiations</li><li>Training Programs</li><li>Hiring & Mentorship</li>
|
||||
</ul>
|
||||
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</section>
|
||||
|
||||
<section id="languages">
|
||||
<h3>Languages</h3>
|
||||
<div class="grid-list">
|
||||
<div><h4>English</h4> Native speaker</div>
|
||||
</div>
|
||||
</section>
|
||||
|
||||
|
||||
</body>
|
||||
</html>
|
||||
Reference in New Issue
Block a user