Jeffrey Smith Austin, Texas
Cell: 850-529-4804 Email: Jeffrey.Smith2012@yahoo.com
SUMMARY
• Twenty years of Information Assuranceand Computer/Digital Network Intell igenceexperience.
• Twelve years Cyber Security Analysis;knowledgeablein NSA and Naval automated databases;leveraged new
technologies and designed new processes for cyber threat analysis and reporting.
• Twenty years of military servicewith 16 years of military leadership experience.
• Active Top Secret/Sensitive Compartment Information (TS/SCI) with CI Polygraph.
QUALIFICATIONS AND EDUCATION
• Masters of Science, Information Assurance, Capitol College,Laurel MD
• ECCouncil Certified Ethical Hacker (CEH) V8, GIAC Certified Penetration Tester (GPEN), Comptia Security+,
Comptia Network+, MCSA Windows 7, MCSA Server 2008,Core ImpactCertified Professional
• Basic,Intermediate, and Advanced Digital Network Analysis Course
• Network Security and Vulnerabilities Technician Course
• Information Systems Security Manager Course
• Master TrainingSpecialist
TECHNICAL SKILLS
• Knowledgeable in deep packet analysis,malwareanalysis,vulnerability analysis,forensics,penetration tes ting,
information system accreditation,offensiveand defensive cyber operations,ethical hacking, QRadar SIEMevent
analysis,VMware ESXi, Nessus,Metasploit, Unix and Windows system administration and security,Cisco router
configuration,and academic familiarity with C+, Perl, and Python.
EXPERIENCE
06/15-Present IBM, Austin Texas
Lead Network Threat Analyst
• Responsiblefor researchingand huntingemerging threats and malwarewith QRadar,a state-of-the-art SIEM
platform. Research and develop Indicators of Compromise(IOC) for both signatureand reference set
development, as well as activesearches. Lead and mentor other analysts in variousaspects of QRadar,network
traffic,and advanced log sources and databases availablefor incidentanalysis.
• Providemanagement and oversightof the identification,triage,and responseto events or incidents of apparent
security breaches.
• Author security alerts,investigation reports,and threat intelligencereports. Communicate with CSIRT, data
owners, and end users duringincidentresponseand remediation efforts.
• Provideinitial investigation of security incidents,triage,incidenthandling,analysis,and documentation for
severity two and three security incidents. Triageand resolveadvanced attacks such as Botnets and Advanced
PersistentThreat (APT) malware.
• Tune IDS and proxy policy,based on threat feeds, trustand reputation data,incidents,or vulnerabilities and
exploits of downstream systems.
EXPERIENCE
11/11-06/15 Telecommunications Systems, Pensacola Florida
Computer Network Operations Instructor/System Engineer
• Manage, configure and install virtual and physical networks and operatingsystems utilizingESXi Servers,VMware
Workstation,and Windows Server 2008/2012. Virtual machines includeLinux/Unix/Windowsand Dynamips
virtual routers.UtilizevSphere Hypervisor and vCenter to manage and deploy multiplehighly available,redundant
virtual networks, supporting500 end users.
• Teach advanced network analysisskills,vulnerability analysis,ethical hacking,and penetration testing.
Technologies covered includemultipleversions of Linux/Unix,Windows,NMAP, Wireshark,Metasploit,Kali Linux,
and deep packet analysis.
03/11-11/11 Center for Information Dominance, Corry Station
Joint Cyber Analysis Department Chief
• Managed the Joint Cyber Analysis Course,a six month in depth computer science,network analysis,and
computer network exploitation course.
• Managed and supervised a staff of ten military instructors,50 civilian contractors,and 660 students,to include
performance evaluations,staffingdecisions,and studentretention and reassignment.
• Responsiblefor coordinatingfacilities and information technology supportfor 16 classrooms,to includeclassified
and unclassified computer networks encompassing400 workstations and 350 laptop computers.
09/08-09/10 Navy Information Operations Command Pensacola, FL
Senior Cyber Operations Analyst
• Senior Cyber Analyst,responsiblefor all facets of the Digital Network Analysis mission to includetasking,
analysis,and reporting. Managed and led a team of 122 network analysts thatperformed digital network
mapping, social network analysis,and malwareanalysis.
• Performed NSA/CSS Threat Operations Center target coordination, prioritized operational requirements related
to current cyber events, analyzed and reported on high priority anomalous network traffic.
• Administered the personnel trainingprogramto includecreatingengagement costestimates, budgeting
formal/vendor training,and definingsuccess criteriaand metrics.
09/07-09/08 Navy Information Operations Command Pensacola, FL
Cyber Operations Analyst
• Provided real world computer network attack and defense exerciseplanningand supportto includeexercise
command and control as well as scenario development for national level Cyber/CNO exercises to includemulti
service,worldwide USSTRATCOM initiatives.Efforts analyzed various regional Network Operations Centers ability
to recognize, identify, and respond to advanced cyber attacks.Produced after action plans thatrecommended
remediation efforts, policy planning,and industry bestpractices to enhance threat detection and reporting ability.
• Developed and implemented jointservicestandard operatingprocedures and tactics,techniques,and
procedures for testing and trainingcomputer network defense analysts,improvingtheir detection and reporting
capabilities.

Jeffrey_Smith_Resume_2016

  • 1.
    Jeffrey Smith Austin,Texas Cell: 850-529-4804 Email: Jeffrey.Smith2012@yahoo.com SUMMARY • Twenty years of Information Assuranceand Computer/Digital Network Intell igenceexperience. • Twelve years Cyber Security Analysis;knowledgeablein NSA and Naval automated databases;leveraged new technologies and designed new processes for cyber threat analysis and reporting. • Twenty years of military servicewith 16 years of military leadership experience. • Active Top Secret/Sensitive Compartment Information (TS/SCI) with CI Polygraph. QUALIFICATIONS AND EDUCATION • Masters of Science, Information Assurance, Capitol College,Laurel MD • ECCouncil Certified Ethical Hacker (CEH) V8, GIAC Certified Penetration Tester (GPEN), Comptia Security+, Comptia Network+, MCSA Windows 7, MCSA Server 2008,Core ImpactCertified Professional • Basic,Intermediate, and Advanced Digital Network Analysis Course • Network Security and Vulnerabilities Technician Course • Information Systems Security Manager Course • Master TrainingSpecialist TECHNICAL SKILLS • Knowledgeable in deep packet analysis,malwareanalysis,vulnerability analysis,forensics,penetration tes ting, information system accreditation,offensiveand defensive cyber operations,ethical hacking, QRadar SIEMevent analysis,VMware ESXi, Nessus,Metasploit, Unix and Windows system administration and security,Cisco router configuration,and academic familiarity with C+, Perl, and Python. EXPERIENCE 06/15-Present IBM, Austin Texas Lead Network Threat Analyst • Responsiblefor researchingand huntingemerging threats and malwarewith QRadar,a state-of-the-art SIEM platform. Research and develop Indicators of Compromise(IOC) for both signatureand reference set development, as well as activesearches. Lead and mentor other analysts in variousaspects of QRadar,network traffic,and advanced log sources and databases availablefor incidentanalysis. • Providemanagement and oversightof the identification,triage,and responseto events or incidents of apparent security breaches. • Author security alerts,investigation reports,and threat intelligencereports. Communicate with CSIRT, data owners, and end users duringincidentresponseand remediation efforts. • Provideinitial investigation of security incidents,triage,incidenthandling,analysis,and documentation for severity two and three security incidents. Triageand resolveadvanced attacks such as Botnets and Advanced PersistentThreat (APT) malware. • Tune IDS and proxy policy,based on threat feeds, trustand reputation data,incidents,or vulnerabilities and exploits of downstream systems.
  • 2.
    EXPERIENCE 11/11-06/15 Telecommunications Systems,Pensacola Florida Computer Network Operations Instructor/System Engineer • Manage, configure and install virtual and physical networks and operatingsystems utilizingESXi Servers,VMware Workstation,and Windows Server 2008/2012. Virtual machines includeLinux/Unix/Windowsand Dynamips virtual routers.UtilizevSphere Hypervisor and vCenter to manage and deploy multiplehighly available,redundant virtual networks, supporting500 end users. • Teach advanced network analysisskills,vulnerability analysis,ethical hacking,and penetration testing. Technologies covered includemultipleversions of Linux/Unix,Windows,NMAP, Wireshark,Metasploit,Kali Linux, and deep packet analysis. 03/11-11/11 Center for Information Dominance, Corry Station Joint Cyber Analysis Department Chief • Managed the Joint Cyber Analysis Course,a six month in depth computer science,network analysis,and computer network exploitation course. • Managed and supervised a staff of ten military instructors,50 civilian contractors,and 660 students,to include performance evaluations,staffingdecisions,and studentretention and reassignment. • Responsiblefor coordinatingfacilities and information technology supportfor 16 classrooms,to includeclassified and unclassified computer networks encompassing400 workstations and 350 laptop computers. 09/08-09/10 Navy Information Operations Command Pensacola, FL Senior Cyber Operations Analyst • Senior Cyber Analyst,responsiblefor all facets of the Digital Network Analysis mission to includetasking, analysis,and reporting. Managed and led a team of 122 network analysts thatperformed digital network mapping, social network analysis,and malwareanalysis. • Performed NSA/CSS Threat Operations Center target coordination, prioritized operational requirements related to current cyber events, analyzed and reported on high priority anomalous network traffic. • Administered the personnel trainingprogramto includecreatingengagement costestimates, budgeting formal/vendor training,and definingsuccess criteriaand metrics. 09/07-09/08 Navy Information Operations Command Pensacola, FL Cyber Operations Analyst • Provided real world computer network attack and defense exerciseplanningand supportto includeexercise command and control as well as scenario development for national level Cyber/CNO exercises to includemulti service,worldwide USSTRATCOM initiatives.Efforts analyzed various regional Network Operations Centers ability to recognize, identify, and respond to advanced cyber attacks.Produced after action plans thatrecommended remediation efforts, policy planning,and industry bestpractices to enhance threat detection and reporting ability. • Developed and implemented jointservicestandard operatingprocedures and tactics,techniques,and procedures for testing and trainingcomputer network defense analysts,improvingtheir detection and reporting capabilities.