SlideShare a Scribd company logo
1 of 4
Download to read offline
Malcolm Boston
San Antonio, TX 78251
(510) 731-4972
Bostonmalcolmx@gmail.com
	
Quality	conscious	individual	who	possess	the	training,	skill	level,	and	a	wealth	of	real	world	
experience	that	would	be	an	asset	to	any	organization.	I	have	garnered	the	knowledge	
necessary	to	perform	such	functions	as	improving	network	effectiveness	and	security,	
configuring	and	maintaining	communication	and	cryptographic	devices,	and	securing	and	
accounting	for	classified	material.	
	
SUMMARY OF QUALIFICATIONS
	
• Active	Top	Secret	Security	
Clearance	
• Valid	Security+	and	GSEC	
Certification	
• Experienced	with	the	latest	Cisco	
IOS	devices	
• Cyber	Protection	Team	
experience	
• 15	years	military	experience	
(continuing	service	in	Air	
National	Guard)	
• Willingness	to	obtain	necessary	
training	in	a	timely	manner	
• Ability	to	learn	quickly	
• Punctual	
• Task	Oriented	
• Works	well	in	groups/teams	
	
• Possesses	strong	leadership	
qualities	
WORK EXPERIENCE
	
08/02--Present		
	
	
USAF	
Washington	D.C.,	Suisun,	CA,	Ali	Al	Salem,	Kuwait,	Hampton,	VA,	San	
Antonio,	TX	
	
04/15--Present	 Cyber	Defense	Operator/Mission	Planner/System	Architect,	
834th	Cyber	Operations	Squadron–	Joint	Base	San	Antonio,	TX	
	
• Safeguarded	a	$680	million	Top	Secret	network	
responsible	for	delivering	critical	error	code	messages	to	
national	leaders	to	include	the	United	States	President.	
Mitigated	over	247	vulnerabilities	and	provided	local	
technicians	instructions	on	how	to	maintain	the	security	of	
the	network.		
	
• Created	a	training	plan	for	the	application	of	Network	
Infrastructure	Technicians	to	network	defense	job	roles.	
Provided	a	smooth	transition	into	new	responsibilities	for	
11	new	team	members.
• Analyzed	network	diagrams	and	developed	an	attack	
strategy	to	protect	a	vital	missile	defense	network.	Selected	
team	members	and	assigned	work	roles.	Led	a	14-person	
team	to	mission	success.	Resulted	in	the	protection	of	the	
network	itself,	and	the	6	nuclear	defense	munitions	bases	it	
supports.	
	
11/10—04/15	 Cyber	Transport	Technician/Communications	Focal	Point	
Supervisor,	10th	Intelligence	Squadron–	Langley	AFB,	VA	
	
• Maintained	a	$750	million	Command,	Control,	
Communications,	Computers,	Intelligence,	Surveillance,	
and	Reconnaissance	system.	This	led	to	80K	intelligence	
products	being	captured,	and	was	vital	to	the	organization	
winning	the	Lt.	General	Harold	Grant	award.	
	
• Created	network	topology	for	$500K	in-house	network	
training	lab.	Provided	hands-on	training	for	new	members	
of	the	organization,	and	saved	$40K	in	training	costs	by	
eliminating	the	need	for	outside	schooling.	
	
• Executed	a	$900K	system	installation.	Identified	security	
gaps,	and	patched	20	intelligence	analysts’	workstations,	
resulting	in	the	collection	of	20	hours	of	full	motion	video	
surveillance,	and	2	high	value	targets	being	detained.	
	
	
	
04/06—11/10	 Network	Infrastructure	Technician/Cryptographic	Systems	
Apprentice/Deployable	Communications	Technician,	60th	
Communications	Squadron	–	Travis	AFB,	CA	
	
• Managed	the	largest	network	in	the	United	States	Air	
Force’s	Air	Mobility	Command,	valued	at	over	$44	million,	
servicing	13,000	customers.	
	
• Configured	150	Voice	over	Internet	Protocol	(VoIP)	
telephones,	allowing	use	of	local	area	network	based	
technology.	This	allowed	use	of	existing	infrastructure	and	
saved	$63K	in	quarterly	maintenance	costs.	
	
• Created	a	local	parts	supply	program	maintaining	positive	
control	of	$5K	items.	Was	lauded	as	the	best	of	26	
inspections	during	an	organization	wide	managerial
inspection	performed	by	Quality	Assurance.	
	
• Configured	10	devices	for	a	$250K	Non-Secure	Internet	
Protocol	Router	Network	and	Defense	Switch	Network	
project.	Ensured	reliable	information	technology	to	senior	
leaders	30	days	ahead	of	schedule.	
	
• Developed	an	attack	strategy	and	meticulously	oversaw	the	
scanning	of	3.7K	computers	for	vulnerabilities	in	response	
to	a	Department	of	Defense-wide	cyber	attack.	Resulted	in	
Travis	AFB	to	be	the	first	base	in	its	command	to	solidify	its	
network.	
	 	
	 	
	
EDUCATIONAL BACKGROUND
	 	
07/15—08/15	 Global	Information	Assurance	Certification	(GIAC)	Security	
Essentials	-GSEC,	Network	Warfare	Bridge	Course	–	Hurlburt	Field	
AFB,	FL	
	
04/16—05/16	 TEMPEST/EMSEC	Fundamentals	and	TEMPEST	for	System	
Installation	and	Facility	Design,	344th	Training	Squadron	–	JBSA	
Lackland,	TX	
	
04/15—06/15	 Cyberspace	Operations	Fundamentals	Course	(Formerly	X-
Course),	Online	Course.	
	
07/15—09/15	 Network	Warfare	Bridge	Course, 39	Information	Operations	
Squadron	–	Hurlburt	Field	AFB,	FL	
	
03/08—02/09	 Network	Infrastructure	Systems	Course	338th	Training	
Squadron	–	Keesler	AFB,	MS	
03/07—05/07	 Basic	Leadership	Development	Course Sgt.	Paul	P.	Ramoneda	
Airman	Leadership	School	–	Travis	AFB,	CA	
	
03/16—05/16	 Advanced	Leadership	and	Management	Development	Course,	
The	Robert	D.	Gaylor	Non-Commissioned	Officer	Academy	–	
Lackland	AFB,	CA
Malcolm Boston Resume

More Related Content

What's hot

Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligenceabhisheksinghcs
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systemshilal12
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hackingNigam Dave
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and ComplianceAnton Chuvakin
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)FloydCarrasquillo
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 

What's hot (20)

Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Cyber Security Companies
Cyber Security CompaniesCyber Security Companies
Cyber Security Companies
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systems
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Network security # Lecture 2
Network security # Lecture 2Network security # Lecture 2
Network security # Lecture 2
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and Compliance
 
Charity Winkler
Charity WinklerCharity Winkler
Charity Winkler
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
Network Security Goals
Network Security GoalsNetwork Security Goals
Network Security Goals
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security
Information securityInformation security
Information security
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 

Viewers also liked

อุปกรณ์เชื่อมต่อคอมพิวเตอร์
อุปกรณ์เชื่อมต่อคอมพิวเตอร์อุปกรณ์เชื่อมต่อคอมพิวเตอร์
อุปกรณ์เชื่อมต่อคอมพิวเตอร์Nannapatktwrps
 
อุปกรณ์สำรองข้อมูล
อุปกรณ์สำรองข้อมูลอุปกรณ์สำรองข้อมูล
อุปกรณ์สำรองข้อมูลYoshikuni Yuusuke
 
Econometrics Paper - Copy
Econometrics Paper - CopyEconometrics Paper - Copy
Econometrics Paper - CopyDerek Applegate
 
อุปกรณ์พื้นฐานคอมพิวเตอร์
อุปกรณ์พื้นฐานคอมพิวเตอร์อุปกรณ์พื้นฐานคอมพิวเตอร์
อุปกรณ์พื้นฐานคอมพิวเตอร์Kasamesak Posing
 
Potosi Sidewalk Plan
Potosi Sidewalk PlanPotosi Sidewalk Plan
Potosi Sidewalk PlanBrody Johnson
 
Statistical detection of test fraud (data forensics) - where do I start?
Statistical detection of test fraud (data forensics) - where do I start?Statistical detection of test fraud (data forensics) - where do I start?
Statistical detection of test fraud (data forensics) - where do I start?Nathan Thompson
 
Shuja Resume Updated
Shuja Resume UpdatedShuja Resume Updated
Shuja Resume Updatedshuja Rehman
 
CV_Kunto S Wibowo - 2016 - Management
CV_Kunto S Wibowo - 2016 - ManagementCV_Kunto S Wibowo - 2016 - Management
CV_Kunto S Wibowo - 2016 - ManagementKunto Sri Wibowo, PMP
 
Ross-Broiler-Handbook-2014i-EN
Ross-Broiler-Handbook-2014i-ENRoss-Broiler-Handbook-2014i-EN
Ross-Broiler-Handbook-2014i-ENLB Naresh
 
The Ultimate Guide To Carousel Ads For Facebook & Instagram
The Ultimate Guide To Carousel Ads For Facebook & InstagramThe Ultimate Guide To Carousel Ads For Facebook & Instagram
The Ultimate Guide To Carousel Ads For Facebook & InstagramHappy Marketer
 
PROGRAMA CURRICULAR DE EDUCACIÓN SECUNDARIA 2017
PROGRAMA CURRICULAR DE EDUCACIÓN SECUNDARIA 2017PROGRAMA CURRICULAR DE EDUCACIÓN SECUNDARIA 2017
PROGRAMA CURRICULAR DE EDUCACIÓN SECUNDARIA 2017Celia Ramos
 

Viewers also liked (14)

อุปกรณ์เชื่อมต่อคอมพิวเตอร์
อุปกรณ์เชื่อมต่อคอมพิวเตอร์อุปกรณ์เชื่อมต่อคอมพิวเตอร์
อุปกรณ์เชื่อมต่อคอมพิวเตอร์
 
Course Outline
Course OutlineCourse Outline
Course Outline
 
อุปกรณ์สำรองข้อมูล
อุปกรณ์สำรองข้อมูลอุปกรณ์สำรองข้อมูล
อุปกรณ์สำรองข้อมูล
 
Econometrics Paper - Copy
Econometrics Paper - CopyEconometrics Paper - Copy
Econometrics Paper - Copy
 
อุปกรณ์พื้นฐานคอมพิวเตอร์
อุปกรณ์พื้นฐานคอมพิวเตอร์อุปกรณ์พื้นฐานคอมพิวเตอร์
อุปกรณ์พื้นฐานคอมพิวเตอร์
 
Potosi Sidewalk Plan
Potosi Sidewalk PlanPotosi Sidewalk Plan
Potosi Sidewalk Plan
 
Statistical detection of test fraud (data forensics) - where do I start?
Statistical detection of test fraud (data forensics) - where do I start?Statistical detection of test fraud (data forensics) - where do I start?
Statistical detection of test fraud (data forensics) - where do I start?
 
Shuja Resume Updated
Shuja Resume UpdatedShuja Resume Updated
Shuja Resume Updated
 
CV_Kunto S Wibowo - 2016 - Management
CV_Kunto S Wibowo - 2016 - ManagementCV_Kunto S Wibowo - 2016 - Management
CV_Kunto S Wibowo - 2016 - Management
 
Ross-Broiler-Handbook-2014i-EN
Ross-Broiler-Handbook-2014i-ENRoss-Broiler-Handbook-2014i-EN
Ross-Broiler-Handbook-2014i-EN
 
The Ultimate Guide To Carousel Ads For Facebook & Instagram
The Ultimate Guide To Carousel Ads For Facebook & InstagramThe Ultimate Guide To Carousel Ads For Facebook & Instagram
The Ultimate Guide To Carousel Ads For Facebook & Instagram
 
PROGRAMA CURRICULAR DE EDUCACIÓN SECUNDARIA 2017
PROGRAMA CURRICULAR DE EDUCACIÓN SECUNDARIA 2017PROGRAMA CURRICULAR DE EDUCACIÓN SECUNDARIA 2017
PROGRAMA CURRICULAR DE EDUCACIÓN SECUNDARIA 2017
 
กล้วยฉาบ (Banana Crips)
กล้วยฉาบ (Banana Crips)กล้วยฉาบ (Banana Crips)
กล้วยฉาบ (Banana Crips)
 
Quick guide single_page
Quick guide single_pageQuick guide single_page
Quick guide single_page
 

Similar to Malcolm Boston Resume

04/12/18 Raytheon IIS Career Fair
04/12/18 Raytheon IIS Career Fair04/12/18 Raytheon IIS Career Fair
04/12/18 Raytheon IIS Career FairToni Havlik
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016Adel Zayed
 
11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)
11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)
11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)Toni Havlik
 
Resume Tony Welker
Resume Tony WelkerResume Tony Welker
Resume Tony WelkerTony Welker
 
04/12/18 Raytheon IIS Career Fair (Denver)
04/12/18 Raytheon IIS Career Fair (Denver) 04/12/18 Raytheon IIS Career Fair (Denver)
04/12/18 Raytheon IIS Career Fair (Denver) Toni Havlik
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey Smith
 
Seth Smith Resume v2 (2)
Seth Smith Resume v2 (2)Seth Smith Resume v2 (2)
Seth Smith Resume v2 (2)seth smith
 
05/08/18 Raytheon IIS Career Fair (Fort Worth)
05/08/18 Raytheon IIS Career Fair (Fort Worth) 05/08/18 Raytheon IIS Career Fair (Fort Worth)
05/08/18 Raytheon IIS Career Fair (Fort Worth) Toni Havlik
 
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4Kevin Lucier
 
03/15/18 Raytheon IIS Colorado Springs Career Fair
03/15/18 Raytheon IIS Colorado Springs Career Fair03/15/18 Raytheon IIS Colorado Springs Career Fair
03/15/18 Raytheon IIS Colorado Springs Career FairToni Havlik
 
03/27/18 Raytheon IIS Career Fair - Richardson, TX
03/27/18 Raytheon IIS Career Fair - Richardson, TX03/27/18 Raytheon IIS Career Fair - Richardson, TX
03/27/18 Raytheon IIS Career Fair - Richardson, TXToni Havlik
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 

Similar to Malcolm Boston Resume (20)

04/12/18 Raytheon IIS Career Fair
04/12/18 Raytheon IIS Career Fair04/12/18 Raytheon IIS Career Fair
04/12/18 Raytheon IIS Career Fair
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
 
DeJesusSres274
DeJesusSres274DeJesusSres274
DeJesusSres274
 
Bryan Sanabria New
Bryan Sanabria NewBryan Sanabria New
Bryan Sanabria New
 
11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)
11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)
11/09/17 Raytheon IIS Career Fair - Denver, CO (Aurora Openings)
 
Resume Tony Welker
Resume Tony WelkerResume Tony Welker
Resume Tony Welker
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
04/12/18 Raytheon IIS Career Fair (Denver)
04/12/18 Raytheon IIS Career Fair (Denver) 04/12/18 Raytheon IIS Career Fair (Denver)
04/12/18 Raytheon IIS Career Fair (Denver)
 
ConklinResume2
ConklinResume2ConklinResume2
ConklinResume2
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016
 
Seth Smith Resume v2 (2)
Seth Smith Resume v2 (2)Seth Smith Resume v2 (2)
Seth Smith Resume v2 (2)
 
Resume
ResumeResume
Resume
 
05/08/18 Raytheon IIS Career Fair (Fort Worth)
05/08/18 Raytheon IIS Career Fair (Fort Worth) 05/08/18 Raytheon IIS Career Fair (Fort Worth)
05/08/18 Raytheon IIS Career Fair (Fort Worth)
 
Gregory C. Witcher Full CV
Gregory C. Witcher Full CV Gregory C. Witcher Full CV
Gregory C. Witcher Full CV
 
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
 
03/15/18 Raytheon IIS Colorado Springs Career Fair
03/15/18 Raytheon IIS Colorado Springs Career Fair03/15/18 Raytheon IIS Colorado Springs Career Fair
03/15/18 Raytheon IIS Colorado Springs Career Fair
 
03/27/18 Raytheon IIS Career Fair - Richardson, TX
03/27/18 Raytheon IIS Career Fair - Richardson, TX03/27/18 Raytheon IIS Career Fair - Richardson, TX
03/27/18 Raytheon IIS Career Fair - Richardson, TX
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
resume
resumeresume
resume
 
Grine_Resume
Grine_ResumeGrine_Resume
Grine_Resume
 

Malcolm Boston Resume

  • 1. Malcolm Boston San Antonio, TX 78251 (510) 731-4972 Bostonmalcolmx@gmail.com Quality conscious individual who possess the training, skill level, and a wealth of real world experience that would be an asset to any organization. I have garnered the knowledge necessary to perform such functions as improving network effectiveness and security, configuring and maintaining communication and cryptographic devices, and securing and accounting for classified material. SUMMARY OF QUALIFICATIONS • Active Top Secret Security Clearance • Valid Security+ and GSEC Certification • Experienced with the latest Cisco IOS devices • Cyber Protection Team experience • 15 years military experience (continuing service in Air National Guard) • Willingness to obtain necessary training in a timely manner • Ability to learn quickly • Punctual • Task Oriented • Works well in groups/teams • Possesses strong leadership qualities WORK EXPERIENCE 08/02--Present USAF Washington D.C., Suisun, CA, Ali Al Salem, Kuwait, Hampton, VA, San Antonio, TX 04/15--Present Cyber Defense Operator/Mission Planner/System Architect, 834th Cyber Operations Squadron– Joint Base San Antonio, TX • Safeguarded a $680 million Top Secret network responsible for delivering critical error code messages to national leaders to include the United States President. Mitigated over 247 vulnerabilities and provided local technicians instructions on how to maintain the security of the network. • Created a training plan for the application of Network Infrastructure Technicians to network defense job roles. Provided a smooth transition into new responsibilities for 11 new team members.
  • 2. • Analyzed network diagrams and developed an attack strategy to protect a vital missile defense network. Selected team members and assigned work roles. Led a 14-person team to mission success. Resulted in the protection of the network itself, and the 6 nuclear defense munitions bases it supports. 11/10—04/15 Cyber Transport Technician/Communications Focal Point Supervisor, 10th Intelligence Squadron– Langley AFB, VA • Maintained a $750 million Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance system. This led to 80K intelligence products being captured, and was vital to the organization winning the Lt. General Harold Grant award. • Created network topology for $500K in-house network training lab. Provided hands-on training for new members of the organization, and saved $40K in training costs by eliminating the need for outside schooling. • Executed a $900K system installation. Identified security gaps, and patched 20 intelligence analysts’ workstations, resulting in the collection of 20 hours of full motion video surveillance, and 2 high value targets being detained. 04/06—11/10 Network Infrastructure Technician/Cryptographic Systems Apprentice/Deployable Communications Technician, 60th Communications Squadron – Travis AFB, CA • Managed the largest network in the United States Air Force’s Air Mobility Command, valued at over $44 million, servicing 13,000 customers. • Configured 150 Voice over Internet Protocol (VoIP) telephones, allowing use of local area network based technology. This allowed use of existing infrastructure and saved $63K in quarterly maintenance costs. • Created a local parts supply program maintaining positive control of $5K items. Was lauded as the best of 26 inspections during an organization wide managerial
  • 3. inspection performed by Quality Assurance. • Configured 10 devices for a $250K Non-Secure Internet Protocol Router Network and Defense Switch Network project. Ensured reliable information technology to senior leaders 30 days ahead of schedule. • Developed an attack strategy and meticulously oversaw the scanning of 3.7K computers for vulnerabilities in response to a Department of Defense-wide cyber attack. Resulted in Travis AFB to be the first base in its command to solidify its network. EDUCATIONAL BACKGROUND 07/15—08/15 Global Information Assurance Certification (GIAC) Security Essentials -GSEC, Network Warfare Bridge Course – Hurlburt Field AFB, FL 04/16—05/16 TEMPEST/EMSEC Fundamentals and TEMPEST for System Installation and Facility Design, 344th Training Squadron – JBSA Lackland, TX 04/15—06/15 Cyberspace Operations Fundamentals Course (Formerly X- Course), Online Course. 07/15—09/15 Network Warfare Bridge Course, 39 Information Operations Squadron – Hurlburt Field AFB, FL 03/08—02/09 Network Infrastructure Systems Course 338th Training Squadron – Keesler AFB, MS 03/07—05/07 Basic Leadership Development Course Sgt. Paul P. Ramoneda Airman Leadership School – Travis AFB, CA 03/16—05/16 Advanced Leadership and Management Development Course, The Robert D. Gaylor Non-Commissioned Officer Academy – Lackland AFB, CA