SlideShare a Scribd company logo
1 of 2
Download to read offline
Darryl Smith
Career Overview
Experienced Computer Systems Analyst with diverse industry experience in the Department of Defense.
Professional expertise includes Cyber Security, Network Exploitation, Network Defense Analysis, and Network
Counter-measures Development.
Qualifications
CISCO Certified Network Associate (CCNA)
(2015-2018)
EC-Council Certified Ethical Hacker
(CEH)(2015-2018)
CompTIA Security +(2014-2017)
Joint Cyber Analysis Course (JCAC)
TS/SCI Clearance
Strong analytical skills
Proficiency in TCP/IP protocols
Information security
Network penetration testing
UNIX/LINUX
Excellent problem solving skills
Windows (7,8, and 10)
Windows servers (2008 and 2012)
Python
Technical Writing
Technical Skills
Skills Proficiency Total Years Last Used
Wireshark Journeyman 6 Years Current
Network Administration Apprentice 3 Years Current
Penetration Testing Apprentice 3 Years Current
Python Apprentice 3 Years Current
McAfee Host Intrusion Prevention
System
Journeyman 3 Years 2015
Splunk Journeyman 3 Years 2015
Snort Journeyman 3 Years 2015
SIEM's (McAfee & Novell) IDS/IPS Journeyman 3 Years 2015
Work Experience
Counter Measure Developer and Computer Network Defense Analyst/Incident Handler
March 2011 to Current
United States Navy - Virginia Beach, Virginia
Functioned as Administrator for a defense sensor grid for U.S. Navy networks in the continental United States.
Performed daily maintenance, troubleshooting, and operational checks to ensure optimal performance.
Worked in a team environment and developed/conducted Computer Network Exploitation (CNE) operations to
determine the effect of various Open Source Software (OSS) and server functions on traffic patterns and network
performance in a WAN and wireless environment.Created comprehensive exploitation strategies that identified
technical and operational vulnerabilities.Analyzed multiple networks and identified/assessed vulnerabilities in
order to conduct CNE operations.Utilized various Enterprise-specific and commercially available tools to conduct
CNE target development.
Created comprehensive exploitation strategies that identified technical and operational vulnerabilities.
Analyzed multiple networks and identified/assessed vulnerabilities in order to conduct CNE operations.
Utilized various Enterprise-specific and commercially available tools to conduct CNE target development.
Ensured validity of all SNORT rules prior to deployment and developed/deployed SNORT signatures used
to detect emerging threats against U.S. Navy networks.
Created and deployed HBSS signatures that detected current and emerging threats against the networks.
1327 Smoky Fennel, San Antonio TX 78245
Cell: 757-351-9560 - darryls17@yahoo.com
Coordinated response and remediation of HBSS alerts with designated Points of Contact (POCs) across
the enterprise.
Detected and responded to identified network incidents.
Prepared trending analysis and statistical reports on network activity using multiple proprietary and
industry accredited network monitoring devices.
Utilized comprehensive knowledge of network protocols, computer operating systems, vulnerabilities, and
intrusion methods to initiate Computer Network Defense activities in response to 100,000 network events.
Identified adversary's Tactics, Techniques, and Procedures (TTPs) and advised senior management on
technical mitigation strategies for preventing, controlling, and isolating incidents.
Coordinated with the local site Information Assurance Managers (IAM) on incident discovery, isolation, and
remediation.
Developed comprehensive expertise in Netflow and PCAP analysis and skills in various network and
hosted devices for use in forensic network investigations and compromises that include Windows IIS, ISA,
and Firewalls.
Education and Training
Associate of Science : Computer and Information Science with a major in Network Security, 2016
ECPI University - Virginia Beach, Virginia, United States
Bachelor of Science : Computer and Information Science with a major in Network Security, 2017
ECPI University - Virginia Beach, Virginia, United States
(Expected Graduation: July 2017)

More Related Content

What's hot

Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)FloydCarrasquillo
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhdtopiccom
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updatedSantos Kumaar.S
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercisesisc2-hellenic
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testingMohit Belwal
 
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...North Texas Chapter of the ISSA
 
ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar    ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar sasikalaD3
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?Ryan G. Murphy
 
Ceh v11 all you need to know-converted
Ceh v11   all you need to know-convertedCeh v11   all you need to know-converted
Ceh v11 all you need to know-convertedredteamacademypromo
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security ProjectsPhdtopiccom
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationBryan Len
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Exclusive Networks ME
 

What's hot (20)

Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
edCeh brochure
edCeh brochureedCeh brochure
edCeh brochure
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
 
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
 
ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar    ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
 
Ceh v11 all you need to know-converted
Ceh v11   all you need to know-convertedCeh v11   all you need to know-converted
Ceh v11 all you need to know-converted
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
 
Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016 Carbon Black Corporate Overview 2016
Carbon Black Corporate Overview 2016
 

Similar to Darryl T. Smith Resume (1)

Similar to Darryl T. Smith Resume (1) (20)

Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
Terrance A. 10.20.15
Terrance A. 10.20.15Terrance A. 10.20.15
Terrance A. 10.20.15
 
Shashikant Chavan_Resume
Shashikant Chavan_ResumeShashikant Chavan_Resume
Shashikant Chavan_Resume
 
resume IT security
resume IT securityresume IT security
resume IT security
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
Latest_Resume
Latest_ResumeLatest_Resume
Latest_Resume
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Srijan chitransh
Srijan chitransh Srijan chitransh
Srijan chitransh
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CV
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505
 
Resume justin kelso 2017
Resume justin kelso 2017Resume justin kelso 2017
Resume justin kelso 2017
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2
 
CV_A-Barakat
CV_A-BarakatCV_A-Barakat
CV_A-Barakat
 
RESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEMRESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEM
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 

Darryl T. Smith Resume (1)

  • 1. Darryl Smith Career Overview Experienced Computer Systems Analyst with diverse industry experience in the Department of Defense. Professional expertise includes Cyber Security, Network Exploitation, Network Defense Analysis, and Network Counter-measures Development. Qualifications CISCO Certified Network Associate (CCNA) (2015-2018) EC-Council Certified Ethical Hacker (CEH)(2015-2018) CompTIA Security +(2014-2017) Joint Cyber Analysis Course (JCAC) TS/SCI Clearance Strong analytical skills Proficiency in TCP/IP protocols Information security Network penetration testing UNIX/LINUX Excellent problem solving skills Windows (7,8, and 10) Windows servers (2008 and 2012) Python Technical Writing Technical Skills Skills Proficiency Total Years Last Used Wireshark Journeyman 6 Years Current Network Administration Apprentice 3 Years Current Penetration Testing Apprentice 3 Years Current Python Apprentice 3 Years Current McAfee Host Intrusion Prevention System Journeyman 3 Years 2015 Splunk Journeyman 3 Years 2015 Snort Journeyman 3 Years 2015 SIEM's (McAfee & Novell) IDS/IPS Journeyman 3 Years 2015 Work Experience Counter Measure Developer and Computer Network Defense Analyst/Incident Handler March 2011 to Current United States Navy - Virginia Beach, Virginia Functioned as Administrator for a defense sensor grid for U.S. Navy networks in the continental United States. Performed daily maintenance, troubleshooting, and operational checks to ensure optimal performance. Worked in a team environment and developed/conducted Computer Network Exploitation (CNE) operations to determine the effect of various Open Source Software (OSS) and server functions on traffic patterns and network performance in a WAN and wireless environment.Created comprehensive exploitation strategies that identified technical and operational vulnerabilities.Analyzed multiple networks and identified/assessed vulnerabilities in order to conduct CNE operations.Utilized various Enterprise-specific and commercially available tools to conduct CNE target development. Created comprehensive exploitation strategies that identified technical and operational vulnerabilities. Analyzed multiple networks and identified/assessed vulnerabilities in order to conduct CNE operations. Utilized various Enterprise-specific and commercially available tools to conduct CNE target development. Ensured validity of all SNORT rules prior to deployment and developed/deployed SNORT signatures used to detect emerging threats against U.S. Navy networks. Created and deployed HBSS signatures that detected current and emerging threats against the networks. 1327 Smoky Fennel, San Antonio TX 78245 Cell: 757-351-9560 - darryls17@yahoo.com
  • 2. Coordinated response and remediation of HBSS alerts with designated Points of Contact (POCs) across the enterprise. Detected and responded to identified network incidents. Prepared trending analysis and statistical reports on network activity using multiple proprietary and industry accredited network monitoring devices. Utilized comprehensive knowledge of network protocols, computer operating systems, vulnerabilities, and intrusion methods to initiate Computer Network Defense activities in response to 100,000 network events. Identified adversary's Tactics, Techniques, and Procedures (TTPs) and advised senior management on technical mitigation strategies for preventing, controlling, and isolating incidents. Coordinated with the local site Information Assurance Managers (IAM) on incident discovery, isolation, and remediation. Developed comprehensive expertise in Netflow and PCAP analysis and skills in various network and hosted devices for use in forensic network investigations and compromises that include Windows IIS, ISA, and Firewalls. Education and Training Associate of Science : Computer and Information Science with a major in Network Security, 2016 ECPI University - Virginia Beach, Virginia, United States Bachelor of Science : Computer and Information Science with a major in Network Security, 2017 ECPI University - Virginia Beach, Virginia, United States (Expected Graduation: July 2017)