Profiles search
David Coleman
Cyber Security Analyst at Resource Management Concepts, Inc.
White Plains Village, MD, United States
Details
Education:
LAplata High school-Diploma, CSM-Under studies CTI- Graduated
Cyber security
La Plata high school, College of Southern MD, Carrer Technical Institute
Cyber security
La Plata high school, College of Southern MD, Carrer Technical Institute
Experience:
2020 : Present
Resource Management Concepts, Inc.
Cyber Security Analyst
2018 :
UICGS / Bowhead Family of Companies
System Network Security Engineer
IA Security Assessor
2016 :
PRISM
Information Assurance
Technical Skills :
• Operating Systems : Windows, some Linux, and Python knowledge
• Microsoft tool : Project, Word, Excel, PowerPoint
• Process/ Standard : FISMA, Vulnerability Management NIST SP 800-40, Security Risk Assessment
/Security Attestation - NIST SP 800-53
Ability to perform gap analysis. So I am able to help with best practice recommendations. SWOT analysis (Strength, Weakness, Opportunities, and Threats) Risk analysis and User Acceptance Testing (UAT).
• Knowledge of vulnerability scans using Websense, Nessus, vulnerability management, manage intrusion alerts, and other intrusion detection software tools.
• Written security documentation includes : Daily reports from DNS, VPN, Websense, Solarwinds (LEM)
• NOC experience : Building and using Virtual machines, Log analysis, Malware analysis, Customer service skills, Vulnerability scanning, and Patching of systems.
• Also familiar with : Splunk, Remedy ticket system, STIG (Security Technical Implementation Guide), FireEye, Tenable, Nmap, and Mfilt (Sonicwall).
• Update our security website with articles from the latest threats and vulnerabilities for entire enterprise to view.
• Duties include : Going through “DNS” logs daily, pulling malicious URL’s to be analyzed, filtered out and blocked...
• Test Malware samples in a Sandbox environment. Use Wireshark, Process Explorer, Install rite, and other various tools.
• Phone Factor/VPN/Microsoft Azure/ and Two Factor Authentication are the applications I use to monitor user usage every day of the week, and every other weekend.
• Add and remove filters in the LEM {Log Event Manager} as I see fit.
• Use {Websense} as well. To Add and remove Malicious URL’s, Monitor band with, and filter out bad websites daily for the whole Enterprise.
• Also fill in as needed for {Source fire monitoring} as well as {Snort}.
• Use the {Ghost application} to image machines that come to our location with any type of infection.
Security + Certified
2013 :
Alion Science and Technology
Information assurance analyst Security Clearance : Secret
• Shadow senior security members to gain understanding of Source Fire, Websense, Snort IDS/IPS Solar winds,
• Analyze VPN logs phone factor, Microsoft Azure and DNS entries.
• Build Network cables for server room. Consult on new technology.
• Understanding of NIST 800-53 to ensure system compliance
• Understand and some monitoring of Checkpoint Firewall
• Experience with SonicWall mail filter and Netwitness
Have used some, and understand Nessus Vulnerability scanning
2009 :
Alion Science and Technology
Jr. Information Security Analyst
Resource Management Concepts, Inc.
Cyber Security Analyst
2018 :
UICGS / Bowhead Family of Companies
System Network Security Engineer
IA Security Assessor
2016 :
PRISM
Information Assurance
Technical Skills :
• Operating Systems : Windows, some Linux, and Python knowledge
• Microsoft tool : Project, Word, Excel, PowerPoint
• Process/ Standard : FISMA, Vulnerability Management NIST SP 800-40, Security Risk Assessment
/Security Attestation - NIST SP 800-53
Ability to perform gap analysis. So I am able to help with best practice recommendations. SWOT analysis (Strength, Weakness, Opportunities, and Threats) Risk analysis and User Acceptance Testing (UAT).
• Knowledge of vulnerability scans using Websense, Nessus, vulnerability management, manage intrusion alerts, and other intrusion detection software tools.
• Written security documentation includes : Daily reports from DNS, VPN, Websense, Solarwinds (LEM)
• NOC experience : Building and using Virtual machines, Log analysis, Malware analysis, Customer service skills, Vulnerability scanning, and Patching of systems.
• Also familiar with : Splunk, Remedy ticket system, STIG (Security Technical Implementation Guide), FireEye, Tenable, Nmap, and Mfilt (Sonicwall).
• Update our security website with articles from the latest threats and vulnerabilities for entire enterprise to view.
• Duties include : Going through “DNS” logs daily, pulling malicious URL’s to be analyzed, filtered out and blocked...
• Test Malware samples in a Sandbox environment. Use Wireshark, Process Explorer, Install rite, and other various tools.
• Phone Factor/VPN/Microsoft Azure/ and Two Factor Authentication are the applications I use to monitor user usage every day of the week, and every other weekend.
• Add and remove filters in the LEM {Log Event Manager} as I see fit.
• Use {Websense} as well. To Add and remove Malicious URL’s, Monitor band with, and filter out bad websites daily for the whole Enterprise.
• Also fill in as needed for {Source fire monitoring} as well as {Snort}.
• Use the {Ghost application} to image machines that come to our location with any type of infection.
Security + Certified
2013 :
Alion Science and Technology
Information assurance analyst Security Clearance : Secret
• Shadow senior security members to gain understanding of Source Fire, Websense, Snort IDS/IPS Solar winds,
• Analyze VPN logs phone factor, Microsoft Azure and DNS entries.
• Build Network cables for server room. Consult on new technology.
• Understanding of NIST 800-53 to ensure system compliance
• Understand and some monitoring of Checkpoint Firewall
• Experience with SonicWall mail filter and Netwitness
Have used some, and understand Nessus Vulnerability scanning
2009 :
Alion Science and Technology
Jr. Information Security Analyst
Company:
Resource Management Concepts, Inc.
Years of Experience:
19
Spoken Language:
English
Skills
CompTIA Security+, Computer Security, DNS, Familiar with FireEye, Familiar with Nmap, familiar with Remedy, Familiar with Splunk, Information Assurance, Information Security, IPS/IDS, Lansweeper, Linux, Look at alot of audit logs, Malware Analysis, Nessus, Networking, Network Security, NIST 800-53, Patching, Program Management, Security, Security Certification, Security Clearance, Some Linux and Python, Some Snort, Sourcefire, STIG, Troubleshooting, Virtual Machines, Virtual Private Network (VPN), VPN, Vpn troubleshooting, Vulnerability Management, Websense, Wireshark, Look at alot of audit, CompTIA Security