SlideShare a Scribd company logo
Joshua K Young
409 North Levitt Street, Apt 6, Rome NY 13440
(315) 489-3362
felexir@yahoo.com
http://www.linkedin.com/in/jyoung91
OBJECTIVES:
I would like to become a valuable asset to your organization and use my experience to add to my knowledge of computers and computer
softwareand to pursuea career in cyber security.
CLEARANCE: Secret
KEY SKILLS:
Software and Programs: Microsoft Office, Nmap, Metasploit, Netcat, Wireshark, Burp Suite, Nexpose, Nessus.
Systems: Windows Vista, XP, 7, and 8. Ubuntu, Kali, Backtrack, Parrot OS, Fedora, Linux
Troubleshooting: Knowledge and experience in maintaining and repairing most computer hardware problems including re-imaging,
soldering, and replacing parts and components, as well as basic electronics and circuit principles.
Radio: Knowledge and experience of the Harris radios including ANW2 networking, programming, and troubleshooting of the radios.
Security: Knowledge and experience in Security principles, including virus protection and systemsecurity measurements and
precautions. Knowledge of vulnerability analysis and systemhardening. Knowledge of incident response, information assurance ethics,
policies, and disaster recovery.
Networking: Knowledge and experience with networking principles including subnetting, TCP/IP, router, switch, and firewall
configuration. Knowledge of Virtualization. Knowledge and experience in VOIP/Call manager.
Cable: Past ETA Certified Fiber Optics Installer. Experience in CAT 5 cables.
Information Systems: Knowledgeand experience in basic skills of micro-computing and softwareutilities, assembly/disassembly of
microcomputers, data communication, local area networks, problem solving structured design techniques, database systemdesign and
development.
Communication: Excellent peopleskills from dealing with multiple clients with computer related issues.
Programming: Basic HTMLand CSS programming using Dreamweaver. Python, Ruby, and basic C programming skills.
EXPERIENCE:
Cyber Engineering Intern at Alion Science andTechnology 2015-Present: I work as a cyber security engineer, developing my skills
in information assurance, ethical hacking, and testing the security of Linux, Mac, and Windows machines. I work as a member of a team
developing products that help prevent malicious behavior or unauthorized access in computer systems and worked on research and
development programs.
Projects: Alion Counter UAS Technology: An unmanned aircraft system(UAS), commonly known as drone, can be extremely
dangerous, and this effort allows peopleto do more than complain. The Alion C-UAS Technology is capable of autonomously detecting
the offending drone, breaking its data link to its controller, and issuing new commands to safely land it.
25B (Information System Specialist) for427 BSB: 2013-Present as Army National Guard
Served in theCSSAMO (combat service support automation management office) section as a networking technician.
25B (Information System Specialist) for2-108 INF Battalion: 2010-Present as Army National Guard
I served as the primary Computer Specialist, providing computer support to 6 different companies during my deployment to Afghanistan.
I was theInformation Management Officer, working with the Air Force to create and maintain a strong secure network for military
operations throughout RC West. I completed the sanitization process of over 200 pieces of automation. I executed full data recovery and
systemrebuilds of over 140 laptops.
EDUCATION:
State University of New York Polytechnic: Working on a Bachelors in Network and Computer Security. Graduation date December
2016.
Advanced Individual Training Military School (25B) 2010: Qualified as an Information Systems Specialist for theUnited States
Army.
Jefferson Lewis BOCES Technical Center2008-2010: Completed a two year Electronics Engineering course.
References available upon request

More Related Content

What's hot

Computer security
Computer securityComputer security
Computer security
OZ Assignment help
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
Cybryx
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
Rahmat Suhatman
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
Frederik Questier
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
Khoa Nguyen
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer security
SoundaryaB2
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
Yuval Sinay, CISSP, C|CISO
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
Aasim Mushtaq
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Computer Security
Computer SecurityComputer Security
Computer Security
vishal purkuti
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Role of Information Security Manager
Role of Information Security ManagerRole of Information Security Manager
Role of Information Security Manager
Centextech
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
Karwan Mustafa Kareem
 
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
Society of Women Engineers
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Security Measures
Security MeasuresSecurity Measures
Security Measureshanna91
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
Manesh T
 
System security
System securitySystem security
System security
invertis university
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
Aventis Systems, Inc.
 

What's hot (20)

Computer security
Computer securityComputer security
Computer security
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer security
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Role of Information Security Manager
Role of Information Security ManagerRole of Information Security Manager
Role of Information Security Manager
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
System security
System securitySystem security
System security
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 

Viewers also liked

Erin Leitten Resume
Erin Leitten ResumeErin Leitten Resume
Erin Leitten Resume
li2ny
 
RDP Connection to Linux Azure Virtual Machine
RDP Connection to Linux Azure Virtual Machine RDP Connection to Linux Azure Virtual Machine
RDP Connection to Linux Azure Virtual Machine
Mahesh Dahal
 
Derek Young Resume
Derek Young ResumeDerek Young Resume
Derek Young Resume
derekyoung
 
Creating and hosting a Azure Website with a custom domain
Creating and hosting a Azure Website with a custom domainCreating and hosting a Azure Website with a custom domain
Creating and hosting a Azure Website with a custom domain
Mahesh Dahal
 
Teaser #1 – «Drilling tool Bogomolov»
Teaser #1 – «Drilling tool Bogomolov»Teaser #1 – «Drilling tool Bogomolov»
Teaser #1 – «Drilling tool Bogomolov»
Igor Golovin
 
Deploying a MVC3 WebService in Windows Azure
Deploying a MVC3 WebService in Windows AzureDeploying a MVC3 WebService in Windows Azure
Deploying a MVC3 WebService in Windows Azure
Mahesh Dahal
 
Обучение за границей
Обучение за границейОбучение за границей
Обучение за границей
Сандина Алибекова
 
拡大する日本のバイアウト・ファンド
拡大する日本のバイアウト・ファンド拡大する日本のバイアウト・ファンド
拡大する日本のバイアウト・ファンド
Fusion Reactor LLC
 
The human environment
The human environmentThe human environment
The human environment
Saatwik Beli
 
iGEM jamboree presentation final
iGEM jamboree presentation finaliGEM jamboree presentation final
iGEM jamboree presentation finalJohn Errico
 
Historia de-la-sif il-is
Historia de-la-sif il-isHistoria de-la-sif il-is
Historia de-la-sif il-is
guadalupe281
 
Problemas de los examenes del curso 2.006 2.007
Problemas de los examenes del curso 2.006 2.007Problemas de los examenes del curso 2.006 2.007
Problemas de los examenes del curso 2.006 2.007
Aurelio Garcia Marcos
 
iGEM IIT Kharagpur's Official Guide Book on Food Spoilage
iGEM IIT Kharagpur's Official Guide Book on Food SpoilageiGEM IIT Kharagpur's Official Guide Book on Food Spoilage
iGEM IIT Kharagpur's Official Guide Book on Food Spoilage
iGEM IIT Kharagpur
 
FNBE 0315: Social Psychology - Video Project Report
FNBE 0315: Social Psychology - Video Project ReportFNBE 0315: Social Psychology - Video Project Report
FNBE 0315: Social Psychology - Video Project Report
haeykceb
 
Ger ekonomisk tillväxt mänsklig utveckling? webb
Ger ekonomisk tillväxt mänsklig utveckling? webbGer ekonomisk tillväxt mänsklig utveckling? webb
Ger ekonomisk tillväxt mänsklig utveckling? webb
Göran Lindgren
 
The missing signalling layer for WebRTC
The missing signalling layer for WebRTCThe missing signalling layer for WebRTC
The missing signalling layer for WebRTC
WebRTCConferenceJapan
 
Citomegalovirus
CitomegalovirusCitomegalovirus
Citomegalovirus
Karina Bastidas
 
Historia de Cataluña
Historia de CataluñaHistoria de Cataluña
Historia de Cataluña
Benjamín Olmedo Cañas
 

Viewers also liked (19)

Erin Leitten Resume
Erin Leitten ResumeErin Leitten Resume
Erin Leitten Resume
 
RDP Connection to Linux Azure Virtual Machine
RDP Connection to Linux Azure Virtual Machine RDP Connection to Linux Azure Virtual Machine
RDP Connection to Linux Azure Virtual Machine
 
Derek Young Resume
Derek Young ResumeDerek Young Resume
Derek Young Resume
 
Creating and hosting a Azure Website with a custom domain
Creating and hosting a Azure Website with a custom domainCreating and hosting a Azure Website with a custom domain
Creating and hosting a Azure Website with a custom domain
 
Teaser #1 – «Drilling tool Bogomolov»
Teaser #1 – «Drilling tool Bogomolov»Teaser #1 – «Drilling tool Bogomolov»
Teaser #1 – «Drilling tool Bogomolov»
 
Deploying a MVC3 WebService in Windows Azure
Deploying a MVC3 WebService in Windows AzureDeploying a MVC3 WebService in Windows Azure
Deploying a MVC3 WebService in Windows Azure
 
Обучение за границей
Обучение за границейОбучение за границей
Обучение за границей
 
拡大する日本のバイアウト・ファンド
拡大する日本のバイアウト・ファンド拡大する日本のバイアウト・ファンド
拡大する日本のバイアウト・ファンド
 
The human environment
The human environmentThe human environment
The human environment
 
iGEM jamboree presentation final
iGEM jamboree presentation finaliGEM jamboree presentation final
iGEM jamboree presentation final
 
Historia de-la-sif il-is
Historia de-la-sif il-isHistoria de-la-sif il-is
Historia de-la-sif il-is
 
Problemas de los examenes del curso 2.006 2.007
Problemas de los examenes del curso 2.006 2.007Problemas de los examenes del curso 2.006 2.007
Problemas de los examenes del curso 2.006 2.007
 
Geolinkeddata 07042011 1
Geolinkeddata 07042011 1Geolinkeddata 07042011 1
Geolinkeddata 07042011 1
 
iGEM IIT Kharagpur's Official Guide Book on Food Spoilage
iGEM IIT Kharagpur's Official Guide Book on Food SpoilageiGEM IIT Kharagpur's Official Guide Book on Food Spoilage
iGEM IIT Kharagpur's Official Guide Book on Food Spoilage
 
FNBE 0315: Social Psychology - Video Project Report
FNBE 0315: Social Psychology - Video Project ReportFNBE 0315: Social Psychology - Video Project Report
FNBE 0315: Social Psychology - Video Project Report
 
Ger ekonomisk tillväxt mänsklig utveckling? webb
Ger ekonomisk tillväxt mänsklig utveckling? webbGer ekonomisk tillväxt mänsklig utveckling? webb
Ger ekonomisk tillväxt mänsklig utveckling? webb
 
The missing signalling layer for WebRTC
The missing signalling layer for WebRTCThe missing signalling layer for WebRTC
The missing signalling layer for WebRTC
 
Citomegalovirus
CitomegalovirusCitomegalovirus
Citomegalovirus
 
Historia de Cataluña
Historia de CataluñaHistoria de Cataluña
Historia de Cataluña
 

Similar to Josh Young Resume 2016-17

Criss_Davis_Resume_14Sep2015
Criss_Davis_Resume_14Sep2015Criss_Davis_Resume_14Sep2015
Criss_Davis_Resume_14Sep2015Criss Davis
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
frcarlson
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
Ahmed Sallam
 
Will_Grayson_Full_201502
Will_Grayson_Full_201502Will_Grayson_Full_201502
Will_Grayson_Full_201502Will Grayson
 
Will_Grayson_Full_201504
Will_Grayson_Full_201504Will_Grayson_Full_201504
Will_Grayson_Full_201504Will Grayson
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Michael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updatedSantos Kumaar.S
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJuanita McConnell
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
mike parks
 
John Michael Rzepkowski Resume Oct2015
John Michael Rzepkowski Resume Oct2015John Michael Rzepkowski Resume Oct2015
John Michael Rzepkowski Resume Oct2015John Rzepkowski
 
End.Eng._Scott Bier_VA
End.Eng._Scott Bier_VAEnd.Eng._Scott Bier_VA
End.Eng._Scott Bier_VAScott Bier
 
M.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVM.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVMahmoud Yassin
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber ElijahElijah Weber
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
Splunk
 

Similar to Josh Young Resume 2016-17 (20)

Networking resumee
Networking resumeeNetworking resumee
Networking resumee
 
Criss_Davis_Resume_14Sep2015
Criss_Davis_Resume_14Sep2015Criss_Davis_Resume_14Sep2015
Criss_Davis_Resume_14Sep2015
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Computer Resume
Computer ResumeComputer Resume
Computer Resume
 
Will_Grayson_Full_201502
Will_Grayson_Full_201502Will_Grayson_Full_201502
Will_Grayson_Full_201502
 
Will_Grayson_Full_201504
Will_Grayson_Full_201504Will_Grayson_Full_201504
Will_Grayson_Full_201504
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Shawn McKennon
Shawn McKennonShawn McKennon
Shawn McKennon
 
Michael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISA
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissance
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
John Michael Rzepkowski Resume Oct2015
John Michael Rzepkowski Resume Oct2015John Michael Rzepkowski Resume Oct2015
John Michael Rzepkowski Resume Oct2015
 
Resume
ResumeResume
Resume
 
End.Eng._Scott Bier_VA
End.Eng._Scott Bier_VAEnd.Eng._Scott Bier_VA
End.Eng._Scott Bier_VA
 
M.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVM.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CV
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber Elijah
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
 

Josh Young Resume 2016-17

  • 1. Joshua K Young 409 North Levitt Street, Apt 6, Rome NY 13440 (315) 489-3362 felexir@yahoo.com http://www.linkedin.com/in/jyoung91 OBJECTIVES: I would like to become a valuable asset to your organization and use my experience to add to my knowledge of computers and computer softwareand to pursuea career in cyber security. CLEARANCE: Secret KEY SKILLS: Software and Programs: Microsoft Office, Nmap, Metasploit, Netcat, Wireshark, Burp Suite, Nexpose, Nessus. Systems: Windows Vista, XP, 7, and 8. Ubuntu, Kali, Backtrack, Parrot OS, Fedora, Linux Troubleshooting: Knowledge and experience in maintaining and repairing most computer hardware problems including re-imaging, soldering, and replacing parts and components, as well as basic electronics and circuit principles. Radio: Knowledge and experience of the Harris radios including ANW2 networking, programming, and troubleshooting of the radios. Security: Knowledge and experience in Security principles, including virus protection and systemsecurity measurements and precautions. Knowledge of vulnerability analysis and systemhardening. Knowledge of incident response, information assurance ethics, policies, and disaster recovery. Networking: Knowledge and experience with networking principles including subnetting, TCP/IP, router, switch, and firewall configuration. Knowledge of Virtualization. Knowledge and experience in VOIP/Call manager. Cable: Past ETA Certified Fiber Optics Installer. Experience in CAT 5 cables. Information Systems: Knowledgeand experience in basic skills of micro-computing and softwareutilities, assembly/disassembly of microcomputers, data communication, local area networks, problem solving structured design techniques, database systemdesign and development. Communication: Excellent peopleskills from dealing with multiple clients with computer related issues. Programming: Basic HTMLand CSS programming using Dreamweaver. Python, Ruby, and basic C programming skills. EXPERIENCE: Cyber Engineering Intern at Alion Science andTechnology 2015-Present: I work as a cyber security engineer, developing my skills in information assurance, ethical hacking, and testing the security of Linux, Mac, and Windows machines. I work as a member of a team developing products that help prevent malicious behavior or unauthorized access in computer systems and worked on research and development programs. Projects: Alion Counter UAS Technology: An unmanned aircraft system(UAS), commonly known as drone, can be extremely dangerous, and this effort allows peopleto do more than complain. The Alion C-UAS Technology is capable of autonomously detecting the offending drone, breaking its data link to its controller, and issuing new commands to safely land it. 25B (Information System Specialist) for427 BSB: 2013-Present as Army National Guard Served in theCSSAMO (combat service support automation management office) section as a networking technician. 25B (Information System Specialist) for2-108 INF Battalion: 2010-Present as Army National Guard I served as the primary Computer Specialist, providing computer support to 6 different companies during my deployment to Afghanistan. I was theInformation Management Officer, working with the Air Force to create and maintain a strong secure network for military operations throughout RC West. I completed the sanitization process of over 200 pieces of automation. I executed full data recovery and systemrebuilds of over 140 laptops. EDUCATION: State University of New York Polytechnic: Working on a Bachelors in Network and Computer Security. Graduation date December 2016. Advanced Individual Training Military School (25B) 2010: Qualified as an Information Systems Specialist for theUnited States Army. Jefferson Lewis BOCES Technical Center2008-2010: Completed a two year Electronics Engineering course.