SlideShare a Scribd company logo
1 of 2
KEN BROWN__________________________________________
• Address: Martinsburg, WV 25405 • email: brownk2365@gmail.com
SYSTEMS ENGINEER
Areas of Expertise: Information Technology Professional with 15 years of Unix Administration experience; 5
years of Linux Experience; 4 years of practicing/implementing Systems Engineering phases; 4 years of
Information Technology Development and/or Instruction; 8 years of Help Desk experience; and 2 years of
Information Assurance Analyst experience.
Security Clearance: Inactive TS/SCI granted 2/2012
Certifications: Security + (Good For Life), DISA Level 2 System Administrator
Technical Proficiencies:
Applications: Jira, Confluence, Infra Trouble Management
System, Big Brother, Universal Identity Service, RSA SecurID,
UniCERT HP Openview, Siebel, Remedy and Vulnerability
Management System (VMS)
Cross Domain Technologies: Data Sync Guard, Multi-
Domain Dissemination System, Radiant Mercury and Trusted
Data Exchange
Hardware: x86 based processors, AMD64
based processors, IA64 based processors,
SPARC based workstations, and SPARC based
servers.
Operating Systems: Centos 6.X and 7.X,
Ubuntu X.XX, STOP OS 6.X and Solaris 2.X
through Solaris 10, Trusted Solaris 8.
Professional Training:
Risk Decision Accreditation Criteria (RDAC 2.0) [2010], Raytheon Systems Engineer [2006], SAIC Systems
Engineer Course [2006]
Professional Experiences:
Verizon Enterprise Solutions, Ashburn,VA 9/2012 – 6/2015
Lead Specialist Network Security Engineer (IAM Analyst)
• Provided intermediate support for Verizon's Universal Identity Service, RSA's SecurID and UniCERT
(Certificate Authority) Identity Management based applications for Verizon's international customer
base.
• Resolved or escalated infrastructure Operating System (Linux and/or MS Windows) and /or networking
issues that hamper operations.
• Resolved or escalated customer requests submitted to Service Desk
• Translated remediation processes into organizational procedures for use by organizational elements.
• Created and implemented organizational change controls for product architectural components.
Booz Allen Hamilton, Linthicum,MD 8/2010 – 9/2012
Senior Consultant
• Translated secure implementations for Trusted Solaris 8, Solaris 10 with Trusted Extensions and
Secure Trusted Operating Program (STOP OS) to Risk Decision Authority Criteria technology
mitigation concepts.
• Provided Security + instruction for the 336 Training Squadron’s (Keesler AFB, Biloxi,MS) Just in Time
personnel and Air Force level three personnel.
• Augmented the Point of Contact and Common Test and Evaluation training for a division within the
National Security Agency.
• Provided Cross Domain Solution ticket support for the Navy Cross Domain Solution Office
(SPAWAR,Charleston,SC).
• Provided technical guidance for the Cross Domain Solution Obsolescence Study conducted by Air
Force Rome Labs in support of a Unified Cross Domain Office effort.
• Co-Authored the Cross Domain Ticket Handbook and Technical Exchange Meeting Policy for a division
within the National Security Agency.
Tapestry Technologies, Chambersburg,PA 2/2009 – 5/2010
Information Assurance Engineer
• Conducted security posture reviews using Security Technical Implementation Guides (STIG) and other
tools for Unix based systems; Apache based platforms and Domain Name Service (DNS) systems on
behalf of Defense Information Systems Agency (DISA) Field Security Office for Department of Defense
(DoD) information systems certification.
• Supported various Cross Domain Solutions (CDS) security checklist deployed throughout DoD. Duties
included and are were not limited to performing Security Test and Evaluation (ST&E) filter support
testing, CDS technology related training and periodic CDS posture reviews of various DoD CDS.
• Created Data Sync Guard checklist using 800-53 controls in Vulnerability Management System (VMS)
• Supported DoD community security checklist inquiries via Remedy (Service Desk Support Software) for
CDS, Domain Name Service, VMware ESX 4.x, Citrix Xen App and Unix.
Trusted Computer Solutions, Herndon,VA 11/2007 – 2/2009
Secure Systems Engineer
• Submitted, tested and documented system test cases to interact with agency security personnel for
system connectivity and operation / maintenance.
• Installed, configured and maintained Trusted Computer Solutions product Web-shield to include
components that compromise the Multiple Domain Dissemination System 3.2 baseline.
• Coordinated with organizational entities for support Oracle/SUN servers located in a Data Center
located at Bolling AFB
Raytheon, Springfield, VA 5/2005 – 11/2007
Process Control Operator
• Monitored real-time application and system resources to support system operations.
• Provided real-time operational response to system alerts and changes in the system environment
including system reconfiguration, data analysis and data reporting.
• Submited / reviewed system improvement procedures and Problem Reports.
Science Applications International Corporation, Alexandria, VA 2/2000 – 10/2005
Secure Systems Engineer / Secure Systems Integrator
• Installed, configured and tested software required for the life cycle of the Secure Trusted Operating
Program (STOP) operating system and Trusted Data Exchange (TDX) application.
• Reviewed and evaluated customer sites for Cross Domain Guard system deployment.
• Installed and configured releases of the TDX application for deployment (DISA, Slidell, LA) for CT &E
testing.
• Defined hardware life cycle and deployed the prototype of the Secure File Transmissions Guard Data
Center model.
• Assisted Configuration Management personnel with inventory and tracking of Cross Domain products.
• Evaluated and retrieved Secure Transmission Software and Integrity Validation Software for the Solaris
Operating system, Operating System used in Cross Domain Guard .
• Researched, evaluated , recommended, tested, ordered and/or purchased hardware/ software/
equipment required to support DISA’s Cross Domain Solutions (Command & Control Guard [C2G] and
TDX) life cycle and support lab operations (system builds,configuration,demos and deployments)

More Related Content

What's hot

Sql Vulnerability Advisory Presentation
Sql Vulnerability Advisory PresentationSql Vulnerability Advisory Presentation
Sql Vulnerability Advisory Presentation
Nicholas Davis
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
Birodh Rijal
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
James W. De Rienzo
 
Security Framework
Security FrameworkSecurity Framework
Security Framework
Marcel Dera
 

What's hot (20)

Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
 
Sql Vulnerability Advisory Presentation
Sql Vulnerability Advisory PresentationSql Vulnerability Advisory Presentation
Sql Vulnerability Advisory Presentation
 
01-15a
01-15a01-15a
01-15a
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDS
 
SeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTureSeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTure
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
 
Software test engineer
Software test engineerSoftware test engineer
Software test engineer
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
 
MendozaC2res (1)
MendozaC2res (1)MendozaC2res (1)
MendozaC2res (1)
 
Outlier+Overview
Outlier+OverviewOutlier+Overview
Outlier+Overview
 
Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation Directives
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 
Classification of vulnerabilities
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilities
 
Database security
Database securityDatabase security
Database security
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
 
Security Framework
Security FrameworkSecurity Framework
Security Framework
 

Viewers also liked

UN course completion-Ethics and Integrity
UN course completion-Ethics and IntegrityUN course completion-Ethics and Integrity
UN course completion-Ethics and Integrity
ESTHER ODONGO
 
Welcome to wood
Welcome to woodWelcome to wood
Welcome to wood
adhmad
 
HZ diploma International Logistics
HZ diploma International LogisticsHZ diploma International Logistics
HZ diploma International Logistics
Lu (Richard) Zhang
 

Viewers also liked (13)

германика
германикагерманика
германика
 
UN course completion-Ethics and Integrity
UN course completion-Ethics and IntegrityUN course completion-Ethics and Integrity
UN course completion-Ethics and Integrity
 
Examen academia matermaticas cutonala
Examen academia matermaticas cutonalaExamen academia matermaticas cutonala
Examen academia matermaticas cutonala
 
Tics en sordos by Bleydis Ballen H.
Tics en sordos by Bleydis Ballen H.Tics en sordos by Bleydis Ballen H.
Tics en sordos by Bleydis Ballen H.
 
Welcome to wood
Welcome to woodWelcome to wood
Welcome to wood
 
HZ diploma International Logistics
HZ diploma International LogisticsHZ diploma International Logistics
HZ diploma International Logistics
 
Steve Pickles CV
Steve Pickles CVSteve Pickles CV
Steve Pickles CV
 
白孔雀開屏
白孔雀開屏白孔雀開屏
白孔雀開屏
 
DIFICULTADES DEL APRENDIZAJE DE MATEMATICAS EN LA EDUCACIÓN BÁSICA
DIFICULTADES DEL APRENDIZAJE DE MATEMATICAS EN LA EDUCACIÓN BÁSICADIFICULTADES DEL APRENDIZAJE DE MATEMATICAS EN LA EDUCACIÓN BÁSICA
DIFICULTADES DEL APRENDIZAJE DE MATEMATICAS EN LA EDUCACIÓN BÁSICA
 
Strength and Conditioning Coach
Strength and Conditioning CoachStrength and Conditioning Coach
Strength and Conditioning Coach
 
Ecommerce Social Media Checklist
Ecommerce Social Media ChecklistEcommerce Social Media Checklist
Ecommerce Social Media Checklist
 
Prestashop: la community dell’ecommerce
Prestashop: la community dell’ecommercePrestashop: la community dell’ecommerce
Prestashop: la community dell’ecommerce
 
Video Digital
Video DigitalVideo Digital
Video Digital
 

Similar to Ken Brown's Resume.20160706

Willard_Grayson_2015
Willard_Grayson_2015Willard_Grayson_2015
Willard_Grayson_2015
Will Grayson
 
Resume-GreggCure-June3,2015
Resume-GreggCure-June3,2015Resume-GreggCure-June3,2015
Resume-GreggCure-June3,2015
Gregg Cure
 

Similar to Ken Brown's Resume.20160706 (20)

Resume-Ckelley1
Resume-Ckelley1Resume-Ckelley1
Resume-Ckelley1
 
fsp_22Sep15
fsp_22Sep15fsp_22Sep15
fsp_22Sep15
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
Willard_Grayson_2015
Willard_Grayson_2015Willard_Grayson_2015
Willard_Grayson_2015
 
08/14/18 & 08/15/18 Raytheon RMS & IIS Career Fair - North Texas
08/14/18 & 08/15/18 Raytheon RMS & IIS Career Fair - North Texas08/14/18 & 08/15/18 Raytheon RMS & IIS Career Fair - North Texas
08/14/18 & 08/15/18 Raytheon RMS & IIS Career Fair - North Texas
 
Lane Jamboretz 2016
Lane Jamboretz 2016Lane Jamboretz 2016
Lane Jamboretz 2016
 
08/16/18 Raytheon IIS Career Fair - Dulles, VA
08/16/18 Raytheon IIS Career Fair - Dulles, VA08/16/18 Raytheon IIS Career Fair - Dulles, VA
08/16/18 Raytheon IIS Career Fair - Dulles, VA
 
05/08/18 Raytheon IIS Career Fair (Fort Worth)
05/08/18 Raytheon IIS Career Fair (Fort Worth) 05/08/18 Raytheon IIS Career Fair (Fort Worth)
05/08/18 Raytheon IIS Career Fair (Fort Worth)
 
Resume-GreggCure-June3,2015
Resume-GreggCure-June3,2015Resume-GreggCure-June3,2015
Resume-GreggCure-June3,2015
 
Frank Johnston resume
Frank Johnston resumeFrank Johnston resume
Frank Johnston resume
 
04/12/18 Raytheon IIS Career Fair
04/12/18 Raytheon IIS Career Fair04/12/18 Raytheon IIS Career Fair
04/12/18 Raytheon IIS Career Fair
 
Noland Talley Resume
Noland Talley ResumeNoland Talley Resume
Noland Talley Resume
 
Noland Talley Resume
Noland Talley ResumeNoland Talley Resume
Noland Talley Resume
 
HAJJI RESUME
HAJJI RESUMEHAJJI RESUME
HAJJI RESUME
 
05/08/18 Raytheon IIS Career Fair (Fort Worth)
05/08/18 Raytheon IIS Career Fair (Fort Worth) 05/08/18 Raytheon IIS Career Fair (Fort Worth)
05/08/18 Raytheon IIS Career Fair (Fort Worth)
 
VKH-WORK
VKH-WORKVKH-WORK
VKH-WORK
 
03/27/18 Raytheon IIS Career Fair - Richardson, TX
03/27/18 Raytheon IIS Career Fair - Richardson, TX03/27/18 Raytheon IIS Career Fair - Richardson, TX
03/27/18 Raytheon IIS Career Fair - Richardson, TX
 
04/12/18 Raytheon IIS Career Fair (Denver)
04/12/18 Raytheon IIS Career Fair (Denver) 04/12/18 Raytheon IIS Career Fair (Denver)
04/12/18 Raytheon IIS Career Fair (Denver)
 
Resume James Norwood
Resume James NorwoodResume James Norwood
Resume James Norwood
 
Resume
ResumeResume
Resume
 

Ken Brown's Resume.20160706

  • 1. KEN BROWN__________________________________________ • Address: Martinsburg, WV 25405 • email: brownk2365@gmail.com SYSTEMS ENGINEER Areas of Expertise: Information Technology Professional with 15 years of Unix Administration experience; 5 years of Linux Experience; 4 years of practicing/implementing Systems Engineering phases; 4 years of Information Technology Development and/or Instruction; 8 years of Help Desk experience; and 2 years of Information Assurance Analyst experience. Security Clearance: Inactive TS/SCI granted 2/2012 Certifications: Security + (Good For Life), DISA Level 2 System Administrator Technical Proficiencies: Applications: Jira, Confluence, Infra Trouble Management System, Big Brother, Universal Identity Service, RSA SecurID, UniCERT HP Openview, Siebel, Remedy and Vulnerability Management System (VMS) Cross Domain Technologies: Data Sync Guard, Multi- Domain Dissemination System, Radiant Mercury and Trusted Data Exchange Hardware: x86 based processors, AMD64 based processors, IA64 based processors, SPARC based workstations, and SPARC based servers. Operating Systems: Centos 6.X and 7.X, Ubuntu X.XX, STOP OS 6.X and Solaris 2.X through Solaris 10, Trusted Solaris 8. Professional Training: Risk Decision Accreditation Criteria (RDAC 2.0) [2010], Raytheon Systems Engineer [2006], SAIC Systems Engineer Course [2006] Professional Experiences: Verizon Enterprise Solutions, Ashburn,VA 9/2012 – 6/2015 Lead Specialist Network Security Engineer (IAM Analyst) • Provided intermediate support for Verizon's Universal Identity Service, RSA's SecurID and UniCERT (Certificate Authority) Identity Management based applications for Verizon's international customer base. • Resolved or escalated infrastructure Operating System (Linux and/or MS Windows) and /or networking issues that hamper operations. • Resolved or escalated customer requests submitted to Service Desk • Translated remediation processes into organizational procedures for use by organizational elements. • Created and implemented organizational change controls for product architectural components. Booz Allen Hamilton, Linthicum,MD 8/2010 – 9/2012 Senior Consultant • Translated secure implementations for Trusted Solaris 8, Solaris 10 with Trusted Extensions and Secure Trusted Operating Program (STOP OS) to Risk Decision Authority Criteria technology mitigation concepts. • Provided Security + instruction for the 336 Training Squadron’s (Keesler AFB, Biloxi,MS) Just in Time personnel and Air Force level three personnel. • Augmented the Point of Contact and Common Test and Evaluation training for a division within the National Security Agency.
  • 2. • Provided Cross Domain Solution ticket support for the Navy Cross Domain Solution Office (SPAWAR,Charleston,SC). • Provided technical guidance for the Cross Domain Solution Obsolescence Study conducted by Air Force Rome Labs in support of a Unified Cross Domain Office effort. • Co-Authored the Cross Domain Ticket Handbook and Technical Exchange Meeting Policy for a division within the National Security Agency. Tapestry Technologies, Chambersburg,PA 2/2009 – 5/2010 Information Assurance Engineer • Conducted security posture reviews using Security Technical Implementation Guides (STIG) and other tools for Unix based systems; Apache based platforms and Domain Name Service (DNS) systems on behalf of Defense Information Systems Agency (DISA) Field Security Office for Department of Defense (DoD) information systems certification. • Supported various Cross Domain Solutions (CDS) security checklist deployed throughout DoD. Duties included and are were not limited to performing Security Test and Evaluation (ST&E) filter support testing, CDS technology related training and periodic CDS posture reviews of various DoD CDS. • Created Data Sync Guard checklist using 800-53 controls in Vulnerability Management System (VMS) • Supported DoD community security checklist inquiries via Remedy (Service Desk Support Software) for CDS, Domain Name Service, VMware ESX 4.x, Citrix Xen App and Unix. Trusted Computer Solutions, Herndon,VA 11/2007 – 2/2009 Secure Systems Engineer • Submitted, tested and documented system test cases to interact with agency security personnel for system connectivity and operation / maintenance. • Installed, configured and maintained Trusted Computer Solutions product Web-shield to include components that compromise the Multiple Domain Dissemination System 3.2 baseline. • Coordinated with organizational entities for support Oracle/SUN servers located in a Data Center located at Bolling AFB Raytheon, Springfield, VA 5/2005 – 11/2007 Process Control Operator • Monitored real-time application and system resources to support system operations. • Provided real-time operational response to system alerts and changes in the system environment including system reconfiguration, data analysis and data reporting. • Submited / reviewed system improvement procedures and Problem Reports. Science Applications International Corporation, Alexandria, VA 2/2000 – 10/2005 Secure Systems Engineer / Secure Systems Integrator • Installed, configured and tested software required for the life cycle of the Secure Trusted Operating Program (STOP) operating system and Trusted Data Exchange (TDX) application. • Reviewed and evaluated customer sites for Cross Domain Guard system deployment. • Installed and configured releases of the TDX application for deployment (DISA, Slidell, LA) for CT &E testing. • Defined hardware life cycle and deployed the prototype of the Secure File Transmissions Guard Data Center model. • Assisted Configuration Management personnel with inventory and tracking of Cross Domain products. • Evaluated and retrieved Secure Transmission Software and Integrity Validation Software for the Solaris Operating system, Operating System used in Cross Domain Guard . • Researched, evaluated , recommended, tested, ordered and/or purchased hardware/ software/ equipment required to support DISA’s Cross Domain Solutions (Command & Control Guard [C2G] and TDX) life cycle and support lab operations (system builds,configuration,demos and deployments)