SlideShare a Scribd company logo
1 of 2
[PO Box 1534, Graham, WA 98338] [253-655-5787] [e-mail: zactek@msn.com] 
Resume | Zachary A. Crawford 1 
Zachary A. Crawford 
Objective To be the best information security professional who will assist IT companies or departments in the 
protection of their corporate assets 
Professional 
Highlights 
Cert ifications 
 Certified Information Systems Security Professional (CISSP) (CISSP ID #: 450926) 
 Certified CompTIA A+ IT Technician (COMP001006341473) 
 Certified Internet Web (CIW) v5 Associate (Certification ID#: 296549) 
 Certified CA SiteMinder 6.0 Administrator (Student #: C0130660) 
 Certified CA IdentityMinder 6.0 Web Edition Administrator 
 Completed Certified Hacking Forensic Investigator (CHFI) Course with Fishnet Security 
Windows Security 
 Administration and auditing of Microsoft Active Directory and Windows 2000/2003/2008 Server 
environments 
 Developed IT Security controls with PriceWaterhouseCooper, Deloitte and Jefferson Wells to address 
Sarbanes-Oxley (SOX) requirements 
 Implemented Microsoft Windows security best practices in large enterprise environments 
 Implemented Microsoft Group Policy Objects (GPOs) for client security requirements 
 Administration of Microsoft Windows System Management Server (SMS) 2000/2003 
 Administration and auditing of Exchange 5.5 / 2000 / 2003 / 2007 / 2010 messaging environments 
UNIX Security 
 Auditing of UNIX (AIX and HP-UX) server environments for user and data access 
 Developed IT Security controls with the above companies to address Sarbanes-Oxley (SOX) 
requirements 
Network Security 
 Administration of BindView for Internet Security and UNIX console and agents 
 Administration of vendor and guest wireless access through the Cisco Building Broadband Service 
Manager (BBSM) 
 Administration of Cisco PIX, ASA 5500 and Juniper (Netscreen / JunOS) firewall appliances 
 Administration of BlueCoat Proxy and Mach5 WAN acceleration appliances 
 Administration of CheckPoint FW-1 devices 
 Administration of HP OpenView Operations for Windows (HPOVOW) 
 Administration of ISS SiteProtector servers and agents 
 Implementation and administration of EMC/RSA Network Intelligence Security Event Manager 
 Administration of Nortel Contivity, Cisco IPSec, and Juniper SSL VPN accounts and appliances 
 Administration of RSA ACE Server and SecureID tokens 
 Administration of Symantec Antivirus and McAfee e-Orchestrator (ePO) console server and agents 
 Administration of TippingPoint 200E / 600E / 660E Intrusion Prevention System (IPS) appliances 
Web Applicat ion Security 
 Implementation and administration of WatchFire web application auditing software 
 Administration of Computer Associates SiteMinder and IdentityMinder 6.0 software 
 Administration of Citrix MetaFrame Application and Presentation Servers 
 Administration of Microsoft ISA 2000/2006 servers and SecureComputing's SmartFilter product for 
content filtering 
 Performed evaluation of vulnerability tools from eEye Digital Security, Qualys, and Rapid7
[PO Box 1534, Graham, WA 98338] [253-655-5787] [e-mail: zactek@msn.com] 
Resume | Zachary A. Crawford 2 
Zachary A. Crawford 
Skills 
 Attention to detail 
 Results-oriented with a positive attitude 
 Administrative Scripting (VBScript, 
JScript, Perl, PowerShell) 
 Auditing and penetration testing 
 Microsoft Windows security 
administration 
 Network security administration 
 Patch management administration 
 Risk management 
 Sarbanes-Oxley (SOX) IT Controls 
 UNIX security administration 
 Web application security administration 
Employment 
History 
Packet Filter Analyst 
VSAT Engineer 
CSC @ Boeing, Bellevue, WA 
Proactive Communications, Afghanistan 
06/2013-Present 
07/2011-04/2013 
Network Security Specialist Alabama DOT, Montgomery, AL 10/2008-07/2011 
Network Engineer Northrop Grumman, Montgomery, AL 9/2008-10/2008 
Systems Administrator Alfa Insurance, Montgomery, AL 6/2008-8/2008 
Network Security Analyst Cincinnati Financial, Cincinnati, OH 7/2007 – 5/2008 
Network Administrator Kendle, Cincinnati, OH 4/2007 – 7/2007 
Security Administrator Toyota Motor Mfg, Erlanger, KY 5/2005-4/2007 
Systems Administrator Cinergy / Duke Energy, Cincinnati, OH 1/2005-5/2005 
Security Analyst Omnicare, Cincinnati, OH 9/2004-1/2005 
Documentation Specialist Citibank, Erlanger, KY 4/2004-9/2004 
Sr. Systems Administrator EDS / Weyerhaeuser, Federal Way, WA 10/2000-2/2004 
Small Computer Systems 
US Marine Corps, Okinawa, Japan 7/1996-7/2000 
Specialist 
Education Bachelors of Science, IT – 
Security Emphasis 
Western Governor’s University, Salt Lake City, 
UT (Online) 
12/2006-12/2008 
Computer Science School, 
MOS 
Computer Science School, Quantico, VA 2/1997 
US Marine Corps Recruit 
Training 
MCRD Parris Island, SC 10/1996 
References References are available on request.

More Related Content

What's hot

Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Digital Bond
 
Owasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecOwasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecCyberops Infosec LLP
 
Managed security services
Managed security servicesManaged security services
Managed security servicesmanoharparakh
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMAlienVault
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
BitSensor Webwinkel Vakdagen
BitSensor Webwinkel VakdagenBitSensor Webwinkel Vakdagen
BitSensor Webwinkel Vakdagenwebwinkelvakdag
 
CSS17: Houston - Stories from the Security Operations Center
CSS17: Houston - Stories from the Security Operations CenterCSS17: Houston - Stories from the Security Operations Center
CSS17: Houston - Stories from the Security Operations CenterAlert Logic
 
Security in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learnedSecurity in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learnedBoaz Shunami
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWSAlert Logic
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Reddy Marri
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantRobert Crane
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systemsAlan Tatourian
 
CLASS 2016 - Palestra Vitor Eduardo Lace Maganha
CLASS 2016 - Palestra Vitor Eduardo Lace MaganhaCLASS 2016 - Palestra Vitor Eduardo Lace Maganha
CLASS 2016 - Palestra Vitor Eduardo Lace MaganhaTI Safe
 
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious ProfilesiOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious ProfilesYair Amit
 
Top 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTop 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTeri Radichel
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...DevOps.com
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure Corporation
 
FCI-company profile
FCI-company profileFCI-company profile
FCI-company profileAmit Sardar
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
 

What's hot (20)

Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
 
Owasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecOwasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosec
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
BitSensor Webwinkel Vakdagen
BitSensor Webwinkel VakdagenBitSensor Webwinkel Vakdagen
BitSensor Webwinkel Vakdagen
 
CSS17: Houston - Stories from the Security Operations Center
CSS17: Houston - Stories from the Security Operations CenterCSS17: Houston - Stories from the Security Operations Center
CSS17: Houston - Stories from the Security Operations Center
 
Security in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learnedSecurity in the Development Lifecycle - lessons learned
Security in the Development Lifecycle - lessons learned
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systems
 
CLASS 2016 - Palestra Vitor Eduardo Lace Maganha
CLASS 2016 - Palestra Vitor Eduardo Lace MaganhaCLASS 2016 - Palestra Vitor Eduardo Lace Maganha
CLASS 2016 - Palestra Vitor Eduardo Lace Maganha
 
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious ProfilesiOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
 
Top 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTop 5 Priorities for Cloud Security
Top 5 Priorities for Cloud Security
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
FCI-company profile
FCI-company profileFCI-company profile
FCI-company profile
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 

Viewers also liked

Dealing with Difficult People (Part 2)
Dealing with Difficult People (Part 2)Dealing with Difficult People (Part 2)
Dealing with Difficult People (Part 2)Miriam Oliensis-Torres
 
AngéLica Paola Carvajal SáNchez
AngéLica Paola Carvajal SáNchezAngéLica Paola Carvajal SáNchez
AngéLica Paola Carvajal SáNchezAngelica Carvajal
 
Biologia – 12º Ano (Mecanismos Que Controlam O Desenvolvimento EmbrionáRio)
Biologia – 12º Ano (Mecanismos Que Controlam O Desenvolvimento EmbrionáRio)Biologia – 12º Ano (Mecanismos Que Controlam O Desenvolvimento EmbrionáRio)
Biologia – 12º Ano (Mecanismos Que Controlam O Desenvolvimento EmbrionáRio)Nuno Correia
 
Select Hotels Special offers 2014 A4toA5 proof4
Select Hotels Special offers 2014 A4toA5 proof4Select Hotels Special offers 2014 A4toA5 proof4
Select Hotels Special offers 2014 A4toA5 proof4Laura Pini
 
Donaţie de carte din partea ambasadei indonezei octombrie 2016
Donaţie de carte din partea ambasadei indonezei octombrie 2016Donaţie de carte din partea ambasadei indonezei octombrie 2016
Donaţie de carte din partea ambasadei indonezei octombrie 2016DIB ULIM
 
Trabajos Universitarios
Trabajos Universitarios Trabajos Universitarios
Trabajos Universitarios Xavyer Bermeo
 
Select Hotels Growth INFO
Select Hotels Growth INFOSelect Hotels Growth INFO
Select Hotels Growth INFOLaura Pini
 
E-buletine nr.9/2016
E-buletine nr.9/2016E-buletine nr.9/2016
E-buletine nr.9/2016DIB ULIM
 
Master Your Apple Mac - 10 Top Essential Tips and Tricks
Master Your Apple Mac - 10 Top Essential Tips and TricksMaster Your Apple Mac - 10 Top Essential Tips and Tricks
Master Your Apple Mac - 10 Top Essential Tips and Tricksayman diab
 
Global health sector strategy 2016-2021
Global health sector strategy 2016-2021Global health sector strategy 2016-2021
Global health sector strategy 2016-2021Mayank Badola
 
Act 10 tm_grupo 211612_2_mayo
Act 10 tm_grupo 211612_2_mayoAct 10 tm_grupo 211612_2_mayo
Act 10 tm_grupo 211612_2_mayoAlfredo Pedroza
 
Different interior Styles
Different interior StylesDifferent interior Styles
Different interior StylesShikha Sati
 

Viewers also liked (18)

Dealing with Difficult People (Part 2)
Dealing with Difficult People (Part 2)Dealing with Difficult People (Part 2)
Dealing with Difficult People (Part 2)
 
October54a16
October54a16October54a16
October54a16
 
September54a1
September54a1September54a1
September54a1
 
AngéLica Paola Carvajal SáNchez
AngéLica Paola Carvajal SáNchezAngéLica Paola Carvajal SáNchez
AngéLica Paola Carvajal SáNchez
 
Education Series Flyer 1 2011
Education Series Flyer 1 2011Education Series Flyer 1 2011
Education Series Flyer 1 2011
 
Biologia – 12º Ano (Mecanismos Que Controlam O Desenvolvimento EmbrionáRio)
Biologia – 12º Ano (Mecanismos Que Controlam O Desenvolvimento EmbrionáRio)Biologia – 12º Ano (Mecanismos Que Controlam O Desenvolvimento EmbrionáRio)
Biologia – 12º Ano (Mecanismos Que Controlam O Desenvolvimento EmbrionáRio)
 
Select Hotels Special offers 2014 A4toA5 proof4
Select Hotels Special offers 2014 A4toA5 proof4Select Hotels Special offers 2014 A4toA5 proof4
Select Hotels Special offers 2014 A4toA5 proof4
 
Donaţie de carte din partea ambasadei indonezei octombrie 2016
Donaţie de carte din partea ambasadei indonezei octombrie 2016Donaţie de carte din partea ambasadei indonezei octombrie 2016
Donaţie de carte din partea ambasadei indonezei octombrie 2016
 
Trabajos Universitarios
Trabajos Universitarios Trabajos Universitarios
Trabajos Universitarios
 
Guia TP 2 B
Guia TP 2 BGuia TP 2 B
Guia TP 2 B
 
Edit manita
Edit manitaEdit manita
Edit manita
 
Select Hotels Growth INFO
Select Hotels Growth INFOSelect Hotels Growth INFO
Select Hotels Growth INFO
 
Diario dietario
Diario dietarioDiario dietario
Diario dietario
 
E-buletine nr.9/2016
E-buletine nr.9/2016E-buletine nr.9/2016
E-buletine nr.9/2016
 
Master Your Apple Mac - 10 Top Essential Tips and Tricks
Master Your Apple Mac - 10 Top Essential Tips and TricksMaster Your Apple Mac - 10 Top Essential Tips and Tricks
Master Your Apple Mac - 10 Top Essential Tips and Tricks
 
Global health sector strategy 2016-2021
Global health sector strategy 2016-2021Global health sector strategy 2016-2021
Global health sector strategy 2016-2021
 
Act 10 tm_grupo 211612_2_mayo
Act 10 tm_grupo 211612_2_mayoAct 10 tm_grupo 211612_2_mayo
Act 10 tm_grupo 211612_2_mayo
 
Different interior Styles
Different interior StylesDifferent interior Styles
Different interior Styles
 

Similar to Zach_Crawford_Brief

AboutWeb Presentation
AboutWeb PresentationAboutWeb Presentation
AboutWeb Presentationjulieharyono
 
Roger Findley's Resume'
Roger Findley's Resume'Roger Findley's Resume'
Roger Findley's Resume'Roger Findley
 
Roger Findley's Resume
Roger Findley's ResumeRoger Findley's Resume
Roger Findley's ResumeRoger Findley
 
Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Ahmed
 
Gaurav security profile_5_years_experience
Gaurav security profile_5_years_experienceGaurav security profile_5_years_experience
Gaurav security profile_5_years_experiencegaurav sharma
 
Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark Koehler
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016Adel Zayed
 
Willard_Grayson_2015
Willard_Grayson_2015Willard_Grayson_2015
Willard_Grayson_2015Will Grayson
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Shahar Geiger Maor
 
Michael Marange Resume 07-2015
Michael Marange Resume 07-2015Michael Marange Resume 07-2015
Michael Marange Resume 07-2015mmarange
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security ArchitectureCisco Canada
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav
 

Similar to Zach_Crawford_Brief (20)

Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
AboutWeb Presentation
AboutWeb PresentationAboutWeb Presentation
AboutWeb Presentation
 
CV_almurdh A
CV_almurdh  A CV_almurdh  A
CV_almurdh A
 
Roger Findley's Resume'
Roger Findley's Resume'Roger Findley's Resume'
Roger Findley's Resume'
 
Roger Findley's Resume
Roger Findley's ResumeRoger Findley's Resume
Roger Findley's Resume
 
Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Resume(Information Security)
Wasib Resume(Information Security)
 
AboutWeb
AboutWebAboutWeb
AboutWeb
 
Gaurav security profile_5_years_experience
Gaurav security profile_5_years_experienceGaurav security profile_5_years_experience
Gaurav security profile_5_years_experience
 
Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1
 
CV_A-Barakat
CV_A-BarakatCV_A-Barakat
CV_A-Barakat
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
 
Willard_Grayson_2015
Willard_Grayson_2015Willard_Grayson_2015
Willard_Grayson_2015
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
 
resume IT security
resume IT securityresume IT security
resume IT security
 
Michael Marange Resume 07-2015
Michael Marange Resume 07-2015Michael Marange Resume 07-2015
Michael Marange Resume 07-2015
 
Building a Security Architecture
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
 

Zach_Crawford_Brief

  • 1. [PO Box 1534, Graham, WA 98338] [253-655-5787] [e-mail: zactek@msn.com] Resume | Zachary A. Crawford 1 Zachary A. Crawford Objective To be the best information security professional who will assist IT companies or departments in the protection of their corporate assets Professional Highlights Cert ifications  Certified Information Systems Security Professional (CISSP) (CISSP ID #: 450926)  Certified CompTIA A+ IT Technician (COMP001006341473)  Certified Internet Web (CIW) v5 Associate (Certification ID#: 296549)  Certified CA SiteMinder 6.0 Administrator (Student #: C0130660)  Certified CA IdentityMinder 6.0 Web Edition Administrator  Completed Certified Hacking Forensic Investigator (CHFI) Course with Fishnet Security Windows Security  Administration and auditing of Microsoft Active Directory and Windows 2000/2003/2008 Server environments  Developed IT Security controls with PriceWaterhouseCooper, Deloitte and Jefferson Wells to address Sarbanes-Oxley (SOX) requirements  Implemented Microsoft Windows security best practices in large enterprise environments  Implemented Microsoft Group Policy Objects (GPOs) for client security requirements  Administration of Microsoft Windows System Management Server (SMS) 2000/2003  Administration and auditing of Exchange 5.5 / 2000 / 2003 / 2007 / 2010 messaging environments UNIX Security  Auditing of UNIX (AIX and HP-UX) server environments for user and data access  Developed IT Security controls with the above companies to address Sarbanes-Oxley (SOX) requirements Network Security  Administration of BindView for Internet Security and UNIX console and agents  Administration of vendor and guest wireless access through the Cisco Building Broadband Service Manager (BBSM)  Administration of Cisco PIX, ASA 5500 and Juniper (Netscreen / JunOS) firewall appliances  Administration of BlueCoat Proxy and Mach5 WAN acceleration appliances  Administration of CheckPoint FW-1 devices  Administration of HP OpenView Operations for Windows (HPOVOW)  Administration of ISS SiteProtector servers and agents  Implementation and administration of EMC/RSA Network Intelligence Security Event Manager  Administration of Nortel Contivity, Cisco IPSec, and Juniper SSL VPN accounts and appliances  Administration of RSA ACE Server and SecureID tokens  Administration of Symantec Antivirus and McAfee e-Orchestrator (ePO) console server and agents  Administration of TippingPoint 200E / 600E / 660E Intrusion Prevention System (IPS) appliances Web Applicat ion Security  Implementation and administration of WatchFire web application auditing software  Administration of Computer Associates SiteMinder and IdentityMinder 6.0 software  Administration of Citrix MetaFrame Application and Presentation Servers  Administration of Microsoft ISA 2000/2006 servers and SecureComputing's SmartFilter product for content filtering  Performed evaluation of vulnerability tools from eEye Digital Security, Qualys, and Rapid7
  • 2. [PO Box 1534, Graham, WA 98338] [253-655-5787] [e-mail: zactek@msn.com] Resume | Zachary A. Crawford 2 Zachary A. Crawford Skills  Attention to detail  Results-oriented with a positive attitude  Administrative Scripting (VBScript, JScript, Perl, PowerShell)  Auditing and penetration testing  Microsoft Windows security administration  Network security administration  Patch management administration  Risk management  Sarbanes-Oxley (SOX) IT Controls  UNIX security administration  Web application security administration Employment History Packet Filter Analyst VSAT Engineer CSC @ Boeing, Bellevue, WA Proactive Communications, Afghanistan 06/2013-Present 07/2011-04/2013 Network Security Specialist Alabama DOT, Montgomery, AL 10/2008-07/2011 Network Engineer Northrop Grumman, Montgomery, AL 9/2008-10/2008 Systems Administrator Alfa Insurance, Montgomery, AL 6/2008-8/2008 Network Security Analyst Cincinnati Financial, Cincinnati, OH 7/2007 – 5/2008 Network Administrator Kendle, Cincinnati, OH 4/2007 – 7/2007 Security Administrator Toyota Motor Mfg, Erlanger, KY 5/2005-4/2007 Systems Administrator Cinergy / Duke Energy, Cincinnati, OH 1/2005-5/2005 Security Analyst Omnicare, Cincinnati, OH 9/2004-1/2005 Documentation Specialist Citibank, Erlanger, KY 4/2004-9/2004 Sr. Systems Administrator EDS / Weyerhaeuser, Federal Way, WA 10/2000-2/2004 Small Computer Systems US Marine Corps, Okinawa, Japan 7/1996-7/2000 Specialist Education Bachelors of Science, IT – Security Emphasis Western Governor’s University, Salt Lake City, UT (Online) 12/2006-12/2008 Computer Science School, MOS Computer Science School, Quantico, VA 2/1997 US Marine Corps Recruit Training MCRD Parris Island, SC 10/1996 References References are available on request.