SlideShare a Scribd company logo
1 of 2
MICHAEL L SAWALL
12456 Muscovy Dr  Jacksonville, FL 32223  michaellsawall@gmail.com (904)229-2737
INFORMATION ASSURANCE ANALYST
Results-focused IT Security professional with Information Assurance experience In a Department
of Defense environment with overseas deployment experience. Highly reliable computer security
analyst, efficient in meeting goals and ensuring utilization of resources, problem analysis,
deploying vulnerability management strategies using DOD approved information assurance tools,
Vulnerability (IAVA) scanning/remediation, and regulatory compliance measures. Effective
communicator, able to explain complex processes in easy-to-understand terms for end users,
customers, and management. Skilled in proactive identification and resolution of critical
systems/network issues. DoD 8570.01 IAT Level III/ IAM level III Compliant and current SECRET
clearance.
Competencies
 ACAS (Tenable Network Security) scanning and reporting network security vulnerabilities
 HBSS (McAfee Policy Orchestrator Server) users and computers accounts
 QTip – DoD approved scanning to detect unapproved software and software versions
 Remedy – IT ticket management
 SCAP scanning and reporting – required by DISA
 Retina security scanning and reporting
 DoD Information Assurance Analyst
 IA incident investigation and resolution management
 Auditing, vulnerability, and compliance management of Microsoft Windows operating systems
 SCCM – deploying secure operating systems and security patches
Security Clearance
 U.S Department of Defense - SECRET
PROFESSIONAL EXPERIENCE
ITT SYSTEMS / EXELIS/VECTRUS, INC (CONTRACTOR) / US ARMY SIGNAL COMMAND
FOB FENTY, AFGHANISTAN INFORMATION ASSURANCE ANALYST DEC, 2014 TO JAN, 2016
 Responsible for providing key government personnel with policy coordination and interpretation
support, general information security support designed to protect Information systems and
documents
 Responsible for ensuring and documenting that all systems are regularly scanned and audited in
accordance with applicable DoD policy and procedures
 Monitored trends, audited Active Directory activities, and observed common practice procedures
as a proactive means to identify information assurance vulnerabilities and non-compliance
 Employ network scanning tools such as SCAP, SCCM, QTip, and ACAS to detect system and
network vulnerabilities/deficiencies, as part of a proactive network security policy
 Respond to IA Incidents that impact and increase risk to security posture of military networks
 Provide guidance to and interface with resident military units and commands regarding
information security related issues
ITT SYSTEMS / EXELIS/VECTRUS, INC (CONTRACTOR) / US ARMY SIGNAL COMMAND
KANDAHAR AIR FIELD, AFGHANISTAN TIER II COMPUTER SYSTEMS TECHNICIAN APR, 2011 TO DEC, 2014
 Team Lead in charge of troubleshooting of both day to day and unique hardware and software
issues on DOD information systems in an austere environment supporting and training over
20,000 military and civilian users over 3 separate military enclaves
 Ensure proper handling, classification and disposal of sensitive and classified Information
systems according to strict DOD guidelines such as DOD authorized disk erasing software
 Extensive use of Microsoft Active Directory and various system management tools
 Installation, configuration, and troubleshooting of SCCM delivered Windows 7 client operating
system, training of new associates in secure operations
Arrowpoint Corp (Contractor), Navy Sea Logistics Center (NSLC) Naval Station Mayport
Jacksonville, Florida Tier I Database Administrator Nov, 2009 to March, 2011
 Employed Remedy call tracking system to manage and track progress of support tickets
 Managed PKI / CAC environment as a gateway administrator, and delivered support for certificate
issues and access rights via military telephone systems and e-mail to more than 20,000
worldwide civilian and military users of the secured Army Workload and Performance Systems
(AWPS) financial database
 PKI / CAC (Common Access Card) troubleshooting and configuration
 Testing and documentation of non-production systems and software (Sharepoint)
Plumchoice Online PC Services
Boston, Massachusetts Technical Support Specialist – Tier II March, 2009 to Nov, 2011
 Respond to telephone calls, emails, and personal requests for technical support (telecommute)
 Using Bomgar remote control software, provided excellent technical support to remote channel
partner customers throughout North America, specializing in virus, root kit, and malware removal,
home network setup, peripheral installation, software install and removal, personal Email
configuration, general troubleshooting, and computer optimization services
 Document successful resolution and troubleshooting techniques for on-going knowledge base
library
2007 to 2009 – Successful Contract IT Support Specialist Challenges in Jacksonville, Florida
 Fidelity National Information Systems (Apex Systems, Inc contractor) 2008 to 2009
 CitiGroup (Peak Technology contractor) 2008
 Whitewave Foods (Insight Global, Inc contractor) 2007 to 2008
 Fidelity National Information Systems (Global Consulting, Inc contractor) 2007
**************************************************************************
 Provided functional and technical support, troubleshooting and diagnosing hardware and software
problems, including desktop, laptop, WAN, LAN, and remote systems
 Supported VPN, Touchscreen, Blackberry, handheld barcode scanner, networked print device,
mainframe emulator, Web security cameras, Audio Visual media, encryption, migration, hardware
refresh in small to large scale, operating system imaging, hardware and software upgrading,
Email client configuration, business critical software application testing and new hardware
compatibility testing, site surveying, Active Directory administration, backup and recovery
operations, secure WIFI, project management, and exemplary focused customer support, with all
contract projects completed under budget and on time
Educationand Certification
 Michigan State University Bachelor’s Degree: Institutional Management
 Florida State University Completed MCSE Training Program Coursework
 CASP ce CompTIA Advanced Security Practitioner
 SERVER + CompTIA Server Plus
 Security +ce CompTIA Security Plus
 Network +ce CompTIA Network Plus
 A+ce CompTIA A Plus
 MCP Microsoft Certified Professional
 ITIL v. 3 Foundation Exin IT Service Management
 DCSE Dell Certified Systems Expert

More Related Content

What's hot

Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approachIdexcel Technologies
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by primePrime Infoserv
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+DesignAlfred Ouyang
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comamaranthbeg53
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hackerkeriann70
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...Zara Nawaz
 
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3Edward Johnson
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesKellep Charles
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comamaranthbeg55
 

What's hot (19)

VSEC LAN Security Assessment Service Profile
VSEC LAN Security Assessment Service ProfileVSEC LAN Security Assessment Service Profile
VSEC LAN Security Assessment Service Profile
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
 
Mini IT Security Assessment
Mini IT Security AssessmentMini IT Security Assessment
Mini IT Security Assessment
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Nac market
Nac marketNac market
Nac market
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.com
 
Euro mGov Securing Mobile Services
Euro mGov Securing Mobile ServicesEuro mGov Securing Mobile Services
Euro mGov Securing Mobile Services
 
02.security systems
02.security systems02.security systems
02.security systems
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hacker
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Database Security - IK
Database Security - IKDatabase Security - IK
Database Security - IK
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.com
 

Similar to Experienced DoD Information Assurance Analyst

Priscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBSPriscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBSPriscilla Thakurdas
 
rafael_pabon_20160524
rafael_pabon_20160524rafael_pabon_20160524
rafael_pabon_20160524Rafael Pabon
 
William H Cooke resume 1
William H Cooke resume 1William H Cooke resume 1
William H Cooke resume 1William Cooke
 
Kevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy Menezes
 
Minnette Davis - Professional Network Systems Engineer Accomplishments
Minnette Davis -  Professional Network Systems Engineer AccomplishmentsMinnette Davis -  Professional Network Systems Engineer Accomplishments
Minnette Davis - Professional Network Systems Engineer AccomplishmentsMinnette Davis
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1Robert Donald
 
JBiaggi Resume NH Updated 09-12-2014
JBiaggi Resume NH Updated 09-12-2014JBiaggi Resume NH Updated 09-12-2014
JBiaggi Resume NH Updated 09-12-2014Jose Biaggi
 
Michael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham
 
Sam Roby Resume
Sam Roby ResumeSam Roby Resume
Sam Roby ResumeSam Roby
 
Peyton thomas desktop administrator
Peyton thomas   desktop administratorPeyton thomas   desktop administrator
Peyton thomas desktop administratorPEYTON THOMAS
 
Brian_Starr_Resume
Brian_Starr_ResumeBrian_Starr_Resume
Brian_Starr_ResumeBrian Starr
 
Information Systems Professional 1 (1)
Information Systems Professional 1 (1)Information Systems Professional 1 (1)
Information Systems Professional 1 (1)Charles Mann
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum CopyLblum1234
 

Similar to Experienced DoD Information Assurance Analyst (20)

Priscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBSPriscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBS
 
Liberatore_Resume
Liberatore_ResumeLiberatore_Resume
Liberatore_Resume
 
rafael_pabon_20160524
rafael_pabon_20160524rafael_pabon_20160524
rafael_pabon_20160524
 
William H Cooke resume 1
William H Cooke resume 1William H Cooke resume 1
William H Cooke resume 1
 
Kevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer Chronological
Kevin Farmer Chronological
 
Recentresume_Dec2016
Recentresume_Dec2016Recentresume_Dec2016
Recentresume_Dec2016
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
 
Minnette Davis - Professional Network Systems Engineer Accomplishments
Minnette Davis -  Professional Network Systems Engineer AccomplishmentsMinnette Davis -  Professional Network Systems Engineer Accomplishments
Minnette Davis - Professional Network Systems Engineer Accomplishments
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1
 
McFarlin 2016
McFarlin 2016McFarlin 2016
McFarlin 2016
 
JBiaggi Resume NH Updated 09-12-2014
JBiaggi Resume NH Updated 09-12-2014JBiaggi Resume NH Updated 09-12-2014
JBiaggi Resume NH Updated 09-12-2014
 
Michael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISA
 
Sam Roby Resume
Sam Roby ResumeSam Roby Resume
Sam Roby Resume
 
SSBRadley Resume_June2015
SSBRadley Resume_June2015SSBRadley Resume_June2015
SSBRadley Resume_June2015
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Peyton thomas desktop administrator
Peyton thomas   desktop administratorPeyton thomas   desktop administrator
Peyton thomas desktop administrator
 
Brian_Starr_Resume
Brian_Starr_ResumeBrian_Starr_Resume
Brian_Starr_Resume
 
Information Systems Professional 1 (1)
Information Systems Professional 1 (1)Information Systems Professional 1 (1)
Information Systems Professional 1 (1)
 
628577
628577628577
628577
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
 

Experienced DoD Information Assurance Analyst

  • 1. MICHAEL L SAWALL 12456 Muscovy Dr  Jacksonville, FL 32223  michaellsawall@gmail.com (904)229-2737 INFORMATION ASSURANCE ANALYST Results-focused IT Security professional with Information Assurance experience In a Department of Defense environment with overseas deployment experience. Highly reliable computer security analyst, efficient in meeting goals and ensuring utilization of resources, problem analysis, deploying vulnerability management strategies using DOD approved information assurance tools, Vulnerability (IAVA) scanning/remediation, and regulatory compliance measures. Effective communicator, able to explain complex processes in easy-to-understand terms for end users, customers, and management. Skilled in proactive identification and resolution of critical systems/network issues. DoD 8570.01 IAT Level III/ IAM level III Compliant and current SECRET clearance. Competencies  ACAS (Tenable Network Security) scanning and reporting network security vulnerabilities  HBSS (McAfee Policy Orchestrator Server) users and computers accounts  QTip – DoD approved scanning to detect unapproved software and software versions  Remedy – IT ticket management  SCAP scanning and reporting – required by DISA  Retina security scanning and reporting  DoD Information Assurance Analyst  IA incident investigation and resolution management  Auditing, vulnerability, and compliance management of Microsoft Windows operating systems  SCCM – deploying secure operating systems and security patches Security Clearance  U.S Department of Defense - SECRET PROFESSIONAL EXPERIENCE ITT SYSTEMS / EXELIS/VECTRUS, INC (CONTRACTOR) / US ARMY SIGNAL COMMAND FOB FENTY, AFGHANISTAN INFORMATION ASSURANCE ANALYST DEC, 2014 TO JAN, 2016  Responsible for providing key government personnel with policy coordination and interpretation support, general information security support designed to protect Information systems and documents  Responsible for ensuring and documenting that all systems are regularly scanned and audited in accordance with applicable DoD policy and procedures  Monitored trends, audited Active Directory activities, and observed common practice procedures as a proactive means to identify information assurance vulnerabilities and non-compliance  Employ network scanning tools such as SCAP, SCCM, QTip, and ACAS to detect system and network vulnerabilities/deficiencies, as part of a proactive network security policy  Respond to IA Incidents that impact and increase risk to security posture of military networks  Provide guidance to and interface with resident military units and commands regarding information security related issues ITT SYSTEMS / EXELIS/VECTRUS, INC (CONTRACTOR) / US ARMY SIGNAL COMMAND KANDAHAR AIR FIELD, AFGHANISTAN TIER II COMPUTER SYSTEMS TECHNICIAN APR, 2011 TO DEC, 2014  Team Lead in charge of troubleshooting of both day to day and unique hardware and software issues on DOD information systems in an austere environment supporting and training over 20,000 military and civilian users over 3 separate military enclaves  Ensure proper handling, classification and disposal of sensitive and classified Information systems according to strict DOD guidelines such as DOD authorized disk erasing software
  • 2.  Extensive use of Microsoft Active Directory and various system management tools  Installation, configuration, and troubleshooting of SCCM delivered Windows 7 client operating system, training of new associates in secure operations Arrowpoint Corp (Contractor), Navy Sea Logistics Center (NSLC) Naval Station Mayport Jacksonville, Florida Tier I Database Administrator Nov, 2009 to March, 2011  Employed Remedy call tracking system to manage and track progress of support tickets  Managed PKI / CAC environment as a gateway administrator, and delivered support for certificate issues and access rights via military telephone systems and e-mail to more than 20,000 worldwide civilian and military users of the secured Army Workload and Performance Systems (AWPS) financial database  PKI / CAC (Common Access Card) troubleshooting and configuration  Testing and documentation of non-production systems and software (Sharepoint) Plumchoice Online PC Services Boston, Massachusetts Technical Support Specialist – Tier II March, 2009 to Nov, 2011  Respond to telephone calls, emails, and personal requests for technical support (telecommute)  Using Bomgar remote control software, provided excellent technical support to remote channel partner customers throughout North America, specializing in virus, root kit, and malware removal, home network setup, peripheral installation, software install and removal, personal Email configuration, general troubleshooting, and computer optimization services  Document successful resolution and troubleshooting techniques for on-going knowledge base library 2007 to 2009 – Successful Contract IT Support Specialist Challenges in Jacksonville, Florida  Fidelity National Information Systems (Apex Systems, Inc contractor) 2008 to 2009  CitiGroup (Peak Technology contractor) 2008  Whitewave Foods (Insight Global, Inc contractor) 2007 to 2008  Fidelity National Information Systems (Global Consulting, Inc contractor) 2007 **************************************************************************  Provided functional and technical support, troubleshooting and diagnosing hardware and software problems, including desktop, laptop, WAN, LAN, and remote systems  Supported VPN, Touchscreen, Blackberry, handheld barcode scanner, networked print device, mainframe emulator, Web security cameras, Audio Visual media, encryption, migration, hardware refresh in small to large scale, operating system imaging, hardware and software upgrading, Email client configuration, business critical software application testing and new hardware compatibility testing, site surveying, Active Directory administration, backup and recovery operations, secure WIFI, project management, and exemplary focused customer support, with all contract projects completed under budget and on time Educationand Certification  Michigan State University Bachelor’s Degree: Institutional Management  Florida State University Completed MCSE Training Program Coursework  CASP ce CompTIA Advanced Security Practitioner  SERVER + CompTIA Server Plus  Security +ce CompTIA Security Plus  Network +ce CompTIA Network Plus  A+ce CompTIA A Plus  MCP Microsoft Certified Professional  ITIL v. 3 Foundation Exin IT Service Management  DCSE Dell Certified Systems Expert