SlideShare a Scribd company logo
1 of 2
Download to read offline
Jamie R. Schroeder
JSCHROEDER18@GMAIL.COM I 615.767.8427 I LINKEDIN.COM/JSCHROEDER18
INFORMATION SECURITY SPECIALIST
Network Security/Endpoint Security Specialist • I am an information security professional
that enjoys the security challenge currently being presented in the information technology realm.
I seem to have a knack for handling High pressure situations and making the decisions that need
to be made for the benefit of the environment. Currently I feel that my skillset is being
underutilized and am looking to advance into a role with more responsibility that would take
advantage of my leadership skills.
URL Filtering Solution Expert Support Cisco/Checkpoint VPN Solution
Anti-Virus/Anti-Malware Admin Vulnerability Assessment/Remediation
Checkpoint Firewall/IDS/IPS Forensic Investigations
Mobile Device Management (MDM) Specialist Project Management Experience
Full Disk Encryption (FDE) Data Recovery Specialist
PowerShell/VBScript proficient Milestone Video Management Expert
PROFESSIONAL EXPERIENCE
Metropolitan Government of Nashville And Davidson County
2008–Present
Information Systems Communications Analyst 3
Endpoint Security Specialist 2011–Present
Information Systems Communications Analyst 2
Network Security Analyst 2008 – 2011
While at Metro Nashville Government I was in charge of branching off the Network Security Team
to form a separate Endpoint Security Team. This team would ultimately be responsible for ensuring
the security of not only the endpoint device but also all end user data and access rights while also
providing backup responsibilities to the Network Security Team.
 Full upgrade/implementation of Forcepoint (Websense) URL Filtering solution
 Served as Project Manager for implementation of Beyondtrust Retina Vulnerability
assessment program including building policies, procedures and processes
 Researched, Designed and built the Airwatch Mobile Device Management solution
 Successfully protected the Metro network from a major Malware outbreak for over 7 years
using Trend Micro Anti-virus and other third party tools
 Currently analyzing the implementation of a Security information and event management
(SIEM)
 Liable for acquiring court admissible Forensic images and performing all Malware
forensics
 Involved in creating overarching security related policies including the Security Incident
Response Plan
Federal Work Study - Network Services
2007–2008
ITT Technical Institute
Assistant Manager, Newport News, VA 2007–2008
 Maintained student network (wired and wireless)
 Responsible for maintenance and upkeep of 100+ computers and printers
 Implemented new policies
 Deployed new computer images and programs
 Assisted students and faculty resolve computer issues
 Approximately 30 Hrs. per week
 Worked as a tutor for up and coming classes
 Substitute instructor
EDUCATION
Associates of Applied Science – Computer Network Systems
ITT – Technical Institute, Nashville TN.
 Highest Honors  Perfect Attendance
 GPA 3.98/4.0  Valedictorian
MILITARY HISTORY
United States Navy, 1991 - 1994 • US Navy AMSA1 School – Aviation Structures Mechanic
Structures Mechanic SH-60F helicopter
PROFESSIONAL TRAINING
CISSP (Currently Attending) Trend Micro Anti-Virus Certified Expert
CHFI (Cert. Hacking Forensic Investigator) AirWatch MDM Certified Expert
CEHv7 (Certified Ethical Hacker) Milestone Video Management (Expert)
Advanced Malware Analysis Perl Scripting class
Advanced PowerShell Scripting Sec+, Net+, A+

More Related Content

What's hot

The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09Tammy Clark
 
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013Wouter Joosen, iMinds Security Department, iMinds The Conference 2013
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013imec
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 
Dang et al. (2013), "Contextual difference and intention to perform informati...
Dang et al. (2013), "Contextual difference and intention to perform informati...Dang et al. (2013), "Contextual difference and intention to perform informati...
Dang et al. (2013), "Contextual difference and intention to perform informati...tduy0506
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Countering Computer Hacks-Sandy Suhling
Countering Computer Hacks-Sandy SuhlingCountering Computer Hacks-Sandy Suhling
Countering Computer Hacks-Sandy Suhlingsuhlingse
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security TrainingAngela Samuels
 
Incident-Response-Policy
Incident-Response-PolicyIncident-Response-Policy
Incident-Response-PolicyYigal Behar
 
1 page JLS bio
1 page JLS bio1 page JLS bio
1 page JLS bioJim Lynch
 
Anthony Sprague Presentation_Resume
Anthony Sprague Presentation_ResumeAnthony Sprague Presentation_Resume
Anthony Sprague Presentation_ResumeAnthony Sprague
 
Stewart Color Resume letter2
Stewart Color Resume letter2Stewart Color Resume letter2
Stewart Color Resume letter2Stewart palacios
 
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...Anas Lahrichi
 
Security Management Trends 2004
Security Management Trends 2004Security Management Trends 2004
Security Management Trends 2004Anton Chuvakin
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPace IT at Edmonds Community College
 

What's hot (20)

PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013Wouter Joosen, iMinds Security Department, iMinds The Conference 2013
Wouter Joosen, iMinds Security Department, iMinds The Conference 2013
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery ConceptsPACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery Concepts
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen TestingPACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
 
Dang et al. (2013), "Contextual difference and intention to perform informati...
Dang et al. (2013), "Contextual difference and intention to perform informati...Dang et al. (2013), "Contextual difference and intention to perform informati...
Dang et al. (2013), "Contextual difference and intention to perform informati...
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
 
Countering Computer Hacks-Sandy Suhling
Countering Computer Hacks-Sandy SuhlingCountering Computer Hacks-Sandy Suhling
Countering Computer Hacks-Sandy Suhling
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Incident-Response-Policy
Incident-Response-PolicyIncident-Response-Policy
Incident-Response-Policy
 
Cv for ala' zayadeen
Cv for  ala' zayadeen Cv for  ala' zayadeen
Cv for ala' zayadeen
 
1 page JLS bio
1 page JLS bio1 page JLS bio
1 page JLS bio
 
Anthony Sprague Presentation_Resume
Anthony Sprague Presentation_ResumeAnthony Sprague Presentation_Resume
Anthony Sprague Presentation_Resume
 
Stewart Color Resume letter2
Stewart Color Resume letter2Stewart Color Resume letter2
Stewart Color Resume letter2
 
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...
Engineering solutions pandemic by Mr.Anas Lahrichi/ presented during Coronavi...
 
Security Management Trends 2004
Security Management Trends 2004Security Management Trends 2004
Security Management Trends 2004
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
 

Viewers also liked

Guia TP 1 2012
Guia TP 1 2012Guia TP 1 2012
Guia TP 1 2012Fede Pino
 
Family Life Education - HIV
Family Life Education - HIVFamily Life Education - HIV
Family Life Education - HIVAdam Thompson
 
HEIDI_PETERSON_PORTFOLIO2016
HEIDI_PETERSON_PORTFOLIO2016HEIDI_PETERSON_PORTFOLIO2016
HEIDI_PETERSON_PORTFOLIO2016Heidi Peterson
 
スパイス・パークの全リスト(2013年8月度)
スパイス・パークの全リスト(2013年8月度)スパイス・パークの全リスト(2013年8月度)
スパイス・パークの全リスト(2013年8月度)spicepark
 
Dealing with Difficult People (Part 1)
Dealing with Difficult People (Part 1)Dealing with Difficult People (Part 1)
Dealing with Difficult People (Part 1)Miriam Oliensis-Torres
 
„1 decembrie 1918 – Marea Unire și desăvârșirea unității statale românești”
„1 decembrie 1918 – Marea Unire și desăvârșirea unității statale românești”„1 decembrie 1918 – Marea Unire și desăvârșirea unității statale românești”
„1 decembrie 1918 – Marea Unire și desăvârșirea unității statale românești”DIB ULIM
 
Membership Sales Presentation - PDF
Membership Sales Presentation - PDFMembership Sales Presentation - PDF
Membership Sales Presentation - PDFSam Pick
 
9 decembrie - Ziua Internațională Anticorupție
9 decembrie - Ziua Internațională Anticorupție9 decembrie - Ziua Internațională Anticorupție
9 decembrie - Ziua Internațională AnticorupțieDIB ULIM
 
Donaţie de carte din cadrul proiectului „INOTLES TEMPUS”, Editura OXFORD
Donaţie de carte din cadrul proiectului „INOTLES TEMPUS”, Editura OXFORDDonaţie de carte din cadrul proiectului „INOTLES TEMPUS”, Editura OXFORD
Donaţie de carte din cadrul proiectului „INOTLES TEMPUS”, Editura OXFORDDIB ULIM
 

Viewers also liked (17)

Auguest54a1
Auguest54a1Auguest54a1
Auguest54a1
 
alcoolismo
alcoolismoalcoolismo
alcoolismo
 
Guia TP 1 2012
Guia TP 1 2012Guia TP 1 2012
Guia TP 1 2012
 
Family Life Education - HIV
Family Life Education - HIVFamily Life Education - HIV
Family Life Education - HIV
 
100 fichas atención
100 fichas atención100 fichas atención
100 fichas atención
 
HEIDI_PETERSON_PORTFOLIO2016
HEIDI_PETERSON_PORTFOLIO2016HEIDI_PETERSON_PORTFOLIO2016
HEIDI_PETERSON_PORTFOLIO2016
 
スパイス・パークの全リスト(2013年8月度)
スパイス・パークの全リスト(2013年8月度)スパイス・パークの全リスト(2013年8月度)
スパイス・パークの全リスト(2013年8月度)
 
Trucos del chino
Trucos del chinoTrucos del chino
Trucos del chino
 
Dealing with Difficult People (Part 1)
Dealing with Difficult People (Part 1)Dealing with Difficult People (Part 1)
Dealing with Difficult People (Part 1)
 
Clo de tapas
Clo de tapasClo de tapas
Clo de tapas
 
„1 decembrie 1918 – Marea Unire și desăvârșirea unității statale românești”
„1 decembrie 1918 – Marea Unire și desăvârșirea unității statale românești”„1 decembrie 1918 – Marea Unire și desăvârșirea unității statale românești”
„1 decembrie 1918 – Marea Unire și desăvârșirea unității statale românești”
 
December54c1
December54c1December54c1
December54c1
 
Membership Sales Presentation - PDF
Membership Sales Presentation - PDFMembership Sales Presentation - PDF
Membership Sales Presentation - PDF
 
Animal Habits
Animal HabitsAnimal Habits
Animal Habits
 
9 decembrie - Ziua Internațională Anticorupție
9 decembrie - Ziua Internațională Anticorupție9 decembrie - Ziua Internațională Anticorupție
9 decembrie - Ziua Internațională Anticorupție
 
Marine Mammals
Marine MammalsMarine Mammals
Marine Mammals
 
Donaţie de carte din cadrul proiectului „INOTLES TEMPUS”, Editura OXFORD
Donaţie de carte din cadrul proiectului „INOTLES TEMPUS”, Editura OXFORDDonaţie de carte din cadrul proiectului „INOTLES TEMPUS”, Editura OXFORD
Donaţie de carte din cadrul proiectului „INOTLES TEMPUS”, Editura OXFORD
 

Similar to Jamie Schroeder's Resume

Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Patrick_Mullaney_IT
Patrick_Mullaney_ITPatrick_Mullaney_IT
Patrick_Mullaney_ITtrack4life34
 
Patrick_Mullaney_IT
Patrick_Mullaney_ITPatrick_Mullaney_IT
Patrick_Mullaney_ITtrack4life34
 
Specialist security enigneer
Specialist security enigneerSpecialist security enigneer
Specialist security enigneerMark Long
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security EngineerMark Long
 
Adam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam Moore
 
Michael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham
 
Charles F Lupico CV 2015
Charles F Lupico CV 2015Charles F Lupico CV 2015
Charles F Lupico CV 2015Chuck Lupico
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Alans Resume 2017
Alans Resume 2017Alans Resume 2017
Alans Resume 2017Alan Gray
 
Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib
 
It specialist (best) CV template
It specialist (best) CV templateIt specialist (best) CV template
It specialist (best) CV templateMina Gergis
 

Similar to Jamie Schroeder's Resume (20)

RESUMAD2015-RIGHT1201
RESUMAD2015-RIGHT1201RESUMAD2015-RIGHT1201
RESUMAD2015-RIGHT1201
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson Resume - 2016
Byron Jackson Resume - 2016
 
Llewellyn Link Resume
Llewellyn Link ResumeLlewellyn Link Resume
Llewellyn Link Resume
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Patrick_Mullaney_IT
Patrick_Mullaney_ITPatrick_Mullaney_IT
Patrick_Mullaney_IT
 
Patrick_Mullaney_IT
Patrick_Mullaney_ITPatrick_Mullaney_IT
Patrick_Mullaney_IT
 
Specialist security enigneer
Specialist security enigneerSpecialist security enigneer
Specialist security enigneer
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
 
Adam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam R. Moore Security Architect Resume
Adam R. Moore Security Architect Resume
 
Michael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISA
 
Charles F Lupico CV 2015
Charles F Lupico CV 2015Charles F Lupico CV 2015
Charles F Lupico CV 2015
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Wendy Sorenson 2015 rsm
Wendy Sorenson 2015 rsmWendy Sorenson 2015 rsm
Wendy Sorenson 2015 rsm
 
Alans Resume 2017
Alans Resume 2017Alans Resume 2017
Alans Resume 2017
 
Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib_bio_March_6
Perri Nejib_bio_March_6
 
It specialist (best) CV template
It specialist (best) CV templateIt specialist (best) CV template
It specialist (best) CV template
 

Jamie Schroeder's Resume

  • 1. Jamie R. Schroeder JSCHROEDER18@GMAIL.COM I 615.767.8427 I LINKEDIN.COM/JSCHROEDER18 INFORMATION SECURITY SPECIALIST Network Security/Endpoint Security Specialist • I am an information security professional that enjoys the security challenge currently being presented in the information technology realm. I seem to have a knack for handling High pressure situations and making the decisions that need to be made for the benefit of the environment. Currently I feel that my skillset is being underutilized and am looking to advance into a role with more responsibility that would take advantage of my leadership skills. URL Filtering Solution Expert Support Cisco/Checkpoint VPN Solution Anti-Virus/Anti-Malware Admin Vulnerability Assessment/Remediation Checkpoint Firewall/IDS/IPS Forensic Investigations Mobile Device Management (MDM) Specialist Project Management Experience Full Disk Encryption (FDE) Data Recovery Specialist PowerShell/VBScript proficient Milestone Video Management Expert PROFESSIONAL EXPERIENCE Metropolitan Government of Nashville And Davidson County 2008–Present Information Systems Communications Analyst 3 Endpoint Security Specialist 2011–Present Information Systems Communications Analyst 2 Network Security Analyst 2008 – 2011 While at Metro Nashville Government I was in charge of branching off the Network Security Team to form a separate Endpoint Security Team. This team would ultimately be responsible for ensuring the security of not only the endpoint device but also all end user data and access rights while also providing backup responsibilities to the Network Security Team.  Full upgrade/implementation of Forcepoint (Websense) URL Filtering solution  Served as Project Manager for implementation of Beyondtrust Retina Vulnerability assessment program including building policies, procedures and processes  Researched, Designed and built the Airwatch Mobile Device Management solution  Successfully protected the Metro network from a major Malware outbreak for over 7 years using Trend Micro Anti-virus and other third party tools  Currently analyzing the implementation of a Security information and event management (SIEM)  Liable for acquiring court admissible Forensic images and performing all Malware forensics  Involved in creating overarching security related policies including the Security Incident Response Plan
  • 2. Federal Work Study - Network Services 2007–2008 ITT Technical Institute Assistant Manager, Newport News, VA 2007–2008  Maintained student network (wired and wireless)  Responsible for maintenance and upkeep of 100+ computers and printers  Implemented new policies  Deployed new computer images and programs  Assisted students and faculty resolve computer issues  Approximately 30 Hrs. per week  Worked as a tutor for up and coming classes  Substitute instructor EDUCATION Associates of Applied Science – Computer Network Systems ITT – Technical Institute, Nashville TN.  Highest Honors  Perfect Attendance  GPA 3.98/4.0  Valedictorian MILITARY HISTORY United States Navy, 1991 - 1994 • US Navy AMSA1 School – Aviation Structures Mechanic Structures Mechanic SH-60F helicopter PROFESSIONAL TRAINING CISSP (Currently Attending) Trend Micro Anti-Virus Certified Expert CHFI (Cert. Hacking Forensic Investigator) AirWatch MDM Certified Expert CEHv7 (Certified Ethical Hacker) Milestone Video Management (Expert) Advanced Malware Analysis Perl Scripting class Advanced PowerShell Scripting Sec+, Net+, A+