Profiles search
Mark Jessup
Cybersecurity Incident Coordinator at CACI International Inc
Fulton, MD, United States
Details
Experience:
Work with Computer Security Operations (CSOC) at DOD agency as member of the Incident Monitoring and Defense team. Utilize network and security tools to analyze network data, create investigations, provide malware analysis, and work with Perimeter Defense and Counter Intelligence teams to protect against intrusions and vulnerabilities. Work with Sourcefire, Netscout, and ArcSight products. Create weekly activity and trend reporting and provide presentations to government customers. Support 24/7/365 security operation.
2015 : Present
CACI International Inc
Cybersecurity Incident Coordinator
Work with Computer Network Defense Service Provider (CNDSP) operations as a member of the Detect team. Utilize Network Intrusion and Detection Tools to monitor network traffic and react to alerts, intrusions, and vulnerabilities. Involved in working with other cybersecurity teams such as the Response, Sustain, and Protect Teams , in addition to members of the Network Operations Service Center (NOSC). Experienced in using network tools such as ArcSight, Solera, Bluecoat Reporter, SourceFire, and Barracuda to capture data, analyze information, and create cases for further research and analysis. Work as a part of a 24/7/365 Watch Center environment.
2013 : 2015
Metronome LLC
Cybersecurity Network Analyst
Work as a Cyber Security Analyst for the Intelligence Community Incident Response Center (ICIRC) on the second shift. Provide cyber security situational awareness and analytical support to the Intelligence Community (IC) elements. Work in a 24/7/365 Watch Center housed at Defense Intelligence Agency (DIA) to provide customer support, collaboration, and communication within the IC. Work with various IC reporting agency members such as the CIA, FBI, DOS, DOE, DHS, NSA and others to receive and support security violations and incident handling.
2012 : 2014
Mantech International
Incident Detection Analyst – Security Auditor
Work as a member of the WPC Network team supporting the Tomahawk Missile systems. Work to design new networks, test the current staged networks, and maintain operational networks for the Department Of Navy. Experienced in presenting design and implementation proposals to government customers. Maintain SIPRNET and JWICS networks using Cisco ASA firewalls, routers and Catalyst switches. Maintain T-1 circuit and encryption to Fort Belvoir, VA., as well as other organizations such as NCDOC and ONI. Work in SCIF environment and utilize McAfee Network Security Platform M-1450.
2012 : 2012
SAIC
Senior Network Engineer
Work as a member of the DIA Intrusion Detection Team on the NSITE contract responsible for safeguarding DIA from cyber attacks. Worked as a second shift position. Responsible for using software application tools to monitor network and/or system activities for malicious activities or policy violations. Handle identification of possible intrusion incidents, logging of related information, and reporting unauthorized attempts. Duties include processing information from other detection centers, running intrusion detection software tools, providing cybersecurity reports, identifying security issues, analyzing packet signatures, monitoring network alarms, escalating intrusion incidents, and work with the Intrusion Response Team for immediate resolution of security issues related to DIA. Performed malware analysis using VMWARE based sandbox units running tools such as Wireshark, Filemon, InCtrl, and CaptureBat. Work in 24-by-7 network operations center and support over 1000 users.
2011 : 2012
Tanager Inc
Senior CND-SP Infrastructure Support Engineer – DCNDC
2015 : Present
CACI International Inc
Cybersecurity Incident Coordinator
Work with Computer Network Defense Service Provider (CNDSP) operations as a member of the Detect team. Utilize Network Intrusion and Detection Tools to monitor network traffic and react to alerts, intrusions, and vulnerabilities. Involved in working with other cybersecurity teams such as the Response, Sustain, and Protect Teams , in addition to members of the Network Operations Service Center (NOSC). Experienced in using network tools such as ArcSight, Solera, Bluecoat Reporter, SourceFire, and Barracuda to capture data, analyze information, and create cases for further research and analysis. Work as a part of a 24/7/365 Watch Center environment.
2013 : 2015
Metronome LLC
Cybersecurity Network Analyst
Work as a Cyber Security Analyst for the Intelligence Community Incident Response Center (ICIRC) on the second shift. Provide cyber security situational awareness and analytical support to the Intelligence Community (IC) elements. Work in a 24/7/365 Watch Center housed at Defense Intelligence Agency (DIA) to provide customer support, collaboration, and communication within the IC. Work with various IC reporting agency members such as the CIA, FBI, DOS, DOE, DHS, NSA and others to receive and support security violations and incident handling.
2012 : 2014
Mantech International
Incident Detection Analyst – Security Auditor
Work as a member of the WPC Network team supporting the Tomahawk Missile systems. Work to design new networks, test the current staged networks, and maintain operational networks for the Department Of Navy. Experienced in presenting design and implementation proposals to government customers. Maintain SIPRNET and JWICS networks using Cisco ASA firewalls, routers and Catalyst switches. Maintain T-1 circuit and encryption to Fort Belvoir, VA., as well as other organizations such as NCDOC and ONI. Work in SCIF environment and utilize McAfee Network Security Platform M-1450.
2012 : 2012
SAIC
Senior Network Engineer
Work as a member of the DIA Intrusion Detection Team on the NSITE contract responsible for safeguarding DIA from cyber attacks. Worked as a second shift position. Responsible for using software application tools to monitor network and/or system activities for malicious activities or policy violations. Handle identification of possible intrusion incidents, logging of related information, and reporting unauthorized attempts. Duties include processing information from other detection centers, running intrusion detection software tools, providing cybersecurity reports, identifying security issues, analyzing packet signatures, monitoring network alarms, escalating intrusion incidents, and work with the Intrusion Response Team for immediate resolution of security issues related to DIA. Performed malware analysis using VMWARE based sandbox units running tools such as Wireshark, Filemon, InCtrl, and CaptureBat. Work in 24-by-7 network operations center and support over 1000 users.
2011 : 2012
Tanager Inc
Senior CND-SP Infrastructure Support Engineer – DCNDC
Company:
CACI International Inc