Darryl Smith has over 7 years of experience as a Computer Systems Analyst and Network Defense Analyst for the Department of Defense. He has extensive qualifications and certifications in cyber security, including the CCNA, CEH, Security+, and JCAC. His technical skills include network administration, penetration testing, Python, Wireshark, Splunk, and SIEM systems. He has worked for the U.S. Navy developing countermeasures and handling computer network incidents. His responsibilities included maintaining sensor grids, conducting network exploitation operations, developing SNORT signatures, and responding to network incidents. He holds an Associate's degree in Network Security and is pursuing a Bachelor's degree expected to complete in July 2017.
1. Darryl Smith
Career Overview
Experienced Computer Systems Analyst with diverse industry experience in the Department of Defense.
Professional expertise includes Cyber Security, Network Exploitation, Network Defense Analysis, and Network
Counter-measures Development.
Qualifications
CISCO Certified Network Associate (CCNA)
(2015-2018)
EC-Council Certified Ethical Hacker
(CEH)(2015-2018)
CompTIA Security +(2014-2017)
Joint Cyber Analysis Course (JCAC)
TS/SCI Clearance
Strong analytical skills
Proficiency in TCP/IP protocols
Information security
Network penetration testing
UNIX/LINUX
Excellent problem solving skills
Windows (7,8, and 10)
Windows servers (2008 and 2012)
Python
Technical Writing
Technical Skills
Skills Proficiency Total Years Last Used
Wireshark Journeyman 6 Years Current
Network Administration Apprentice 3 Years Current
Penetration Testing Apprentice 3 Years Current
Python Apprentice 3 Years Current
McAfee Host Intrusion Prevention
System
Journeyman 3 Years 2015
Splunk Journeyman 3 Years 2015
Snort Journeyman 3 Years 2015
SIEM's (McAfee & Novell) IDS/IPS Journeyman 3 Years 2015
Work Experience
Counter Measure Developer and Computer Network Defense Analyst/Incident Handler
March 2011 to Current
United States Navy - Virginia Beach, Virginia
Functioned as Administrator for a defense sensor grid for U.S. Navy networks in the continental United States.
Performed daily maintenance, troubleshooting, and operational checks to ensure optimal performance.
Worked in a team environment and developed/conducted Computer Network Exploitation (CNE) operations to
determine the effect of various Open Source Software (OSS) and server functions on traffic patterns and network
performance in a WAN and wireless environment.Created comprehensive exploitation strategies that identified
technical and operational vulnerabilities.Analyzed multiple networks and identified/assessed vulnerabilities in
order to conduct CNE operations.Utilized various Enterprise-specific and commercially available tools to conduct
CNE target development.
Created comprehensive exploitation strategies that identified technical and operational vulnerabilities.
Analyzed multiple networks and identified/assessed vulnerabilities in order to conduct CNE operations.
Utilized various Enterprise-specific and commercially available tools to conduct CNE target development.
Ensured validity of all SNORT rules prior to deployment and developed/deployed SNORT signatures used
to detect emerging threats against U.S. Navy networks.
Created and deployed HBSS signatures that detected current and emerging threats against the networks.
1327 Smoky Fennel, San Antonio TX 78245
Cell: 757-351-9560 - darryls17@yahoo.com
2. Coordinated response and remediation of HBSS alerts with designated Points of Contact (POCs) across
the enterprise.
Detected and responded to identified network incidents.
Prepared trending analysis and statistical reports on network activity using multiple proprietary and
industry accredited network monitoring devices.
Utilized comprehensive knowledge of network protocols, computer operating systems, vulnerabilities, and
intrusion methods to initiate Computer Network Defense activities in response to 100,000 network events.
Identified adversary's Tactics, Techniques, and Procedures (TTPs) and advised senior management on
technical mitigation strategies for preventing, controlling, and isolating incidents.
Coordinated with the local site Information Assurance Managers (IAM) on incident discovery, isolation, and
remediation.
Developed comprehensive expertise in Netflow and PCAP analysis and skills in various network and
hosted devices for use in forensic network investigations and compromises that include Windows IIS, ISA,
and Firewalls.
Education and Training
Associate of Science : Computer and Information Science with a major in Network Security, 2016
ECPI University - Virginia Beach, Virginia, United States
Bachelor of Science : Computer and Information Science with a major in Network Security, 2017
ECPI University - Virginia Beach, Virginia, United States
(Expected Graduation: July 2017)