This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "User:P0stal"

From OWASP
Jump to: navigation, search
m (Creating user page for new user.)
 
(==)
 
Line 17: Line 17:
 
• Interpret and implement DoD STIG (secure technical implementation guides) on DoD assets.
 
• Interpret and implement DoD STIG (secure technical implementation guides) on DoD assets.
 
• Responsible for preforming advance analysis and assessments of DoD networks using various tools including ACAS, VRAM and Forescout.
 
• Responsible for preforming advance analysis and assessments of DoD networks using various tools including ACAS, VRAM and Forescout.
 
NETWORK/PC TECHNICIAN, APTIS/TIMPO
 
February 2008 – January 2010
 
• As a senior PC technician and installer was directly responsible for Configuration and installation of applications, email client configuration and other BUMED and DoD software.
 
• Provided user data migration, integration and management of services to clients.
 
• Installed and upgraded equipment such as printers, scanners and multifunction devices
 
• Troubleshoot network drops and installed CAT 5 cable
 

Latest revision as of 22:36, 11 April 2016

ISSO DoD USN Cyber Security Analyst DoD USN Senior HBSS Analyst DoD USN

6 years experience working in Information Assurance field for the DoD United States Navy. Specializing in Host Based Security Systems and Assured Compliance Assessment Solution.

==

SENIOR HBSS AND INFORMATION ASSURANCE ANALYST, FIVE STONES RESEARCH CORP February, 2010 - Current Recognized as subject matter expert (SME) for Naval Hospital Jacksonville as the senior HBSS administrator. Directly responsible for supporting, configuring and tuning over 5,000 end users and 3200 windows hosts, servers and medical devices, located at Naval Hospital Jacksonville and 6 remote locations. • Consistently consulted from higher level support tiers and tenant commands for technical advice in regards to HBSS. • Provide detailed analytical reports to monitor deployments, vulnerabilities, protection levels, INFOCON levels and compliance. • Provide custom configurations for the Host Intrusion Prevention System (HIPS), which allows common and unique applications to safely operate, while providing a layer of protection to the McAfee Agent and end point asset. • Perform detailed vulnerability scans on DoD assets, document compliance status and provide detailed analysis of HBSS CTOs • Perform detailed auditing and documentation for DoD and NIST requirements. • Created various SOP (standard operating procedures) for HBSS, log analysis and troubleshooting procedures. • Interpret and implement DoD STIG (secure technical implementation guides) on DoD assets. • Responsible for preforming advance analysis and assessments of DoD networks using various tools including ACAS, VRAM and Forescout.