Tyler Perkins
Details
Cyber Security
University of Maine at Augusta
2018 : 2022
Associate's degree
Business Administration and Management, General
Eastern Maine Community College
2013 : 2020
-Coordinate, monitor and test the Corporation's information security controls, including Spam wall and Firewall administration to ensure compliance with the Information Security Policy; prepares management reports on results and remediation
-Ensures appropriate planning, documentation, scheduling, and testing of the Corporation's Information Security Program and Policy to include GLBA, Dodd Frank and other regulatory programs
-Oversight of daily administration of information security systems that includes firewalls, spam filtering, -SIEM, and other perimeter security systems
-Leads the Cybersecurity vulnerability remediation efforts for network devices and systems
-Reviews the firewall ticketing system and document effective change management controls
-Maintains the current information/documentation to support the Corporation's FDICIA/SOX reporting, internal audits, and regulatory reviews
-Authenticates email administration (SPF, DKIM, DMARC)
-Maintains DLP (Data Loss Prevention) measures across company systems
-Technical project lead for Information Security strategic initiatives
2020 : Present
Camden National Bank
AVP, Information Security Analyst II
• Responsible for designing, building, configuring, operating, and maintaining cybersecurity capabilities and the implementation of a defensible network architecture in support of cyber operations internal defensive measures within the DODIN in order to enumerate, illuminate, locate, eradicate threats and respond to unauthorized activity, security alerts, attempted exploitation, data exfiltration, escalation, and any additional threats to mission command.
• Oversee the implementation of cybersecurity policies at all echelons, direct internal defensive measures across the integrated enterprise and tactical network, assist in cryptographic network (cryptonet) planning and supports Electromagnetic Spectrum Operations (EMSO) to reduce detection by electronic signature.
• Train and supervise cybersecurity personnel in the building, configuring, operating, securing, defending, protecting, and sustaining cybersecurity equipment to maintain a protected network environment thus enabling combat power projection in all warfighting domains.
• Provide technical guidance and advise Commanders and staffs on the management and operation of Army, Joint, intergovernmental, interagency, and multinational cybersecurity efforts to include the identification of key terrain, mission critical networks, nodes, applications and systems while operating within optimal, degraded, intermittent, or latent environments.
2006 :
Army National Guard
255S Information Protection Technician
· Implementation of DoD Risk Management Framework (RMF) process
· Utilize Enterprise Mission Assurance Support System (eMASS) repository on to implement IS compliance processes including but not limited to implementation plan updates, Plan of Action and Milestones (POA&M) developments and updates, test results and overall review of security controls assigned to the IS.
· Conduct security control assessments to determine compliance and effectiveness
· Developed security artifacts (policies and procedures) which support various Assessment and Authorization (A&A) activities including but not limited to self-assessments, topology & network infrastructure development, SW/HW identification and STIG configurations
· Research of identified vulnerabilities
· Review and implement designated Identification and Authentication( IA) controls
· Participate with System Administrators/Web Developers to design and implement effective controls
· Develop project time lines that correlate with current goals (intermediate & long term)
· Research DoD and NIST regulations applicable to Assessment and Authorization (A&A) documentation
· Mitigation and documentation of existing vulnerabilities on system POA&M
· Research DISA STIG’s requirements applicable to system architecture
· Daily utilization of NIST 800 Series and Risk Management Framework (RMF) policies
· Develop and maintain risk assessments
· Understanding of several DoD IA policies and procedures including DoDI 8500.2, 800-37, DoDI 8510.01 and NIST 800-53.
· Develop and analyze, Contingency, Disaster Recovery and Incident Response plans IAW federal regulations and NIST compliance
· Provides web vulnerability assessment scanning using guidance from 2nd Regional Cyber Center and Kali Linux tools : WhatWeb, SkipFish, and Nikto, along with BurpSuite professional to provide a detailed analysis of potential vulnerabilities to various website owners.
2019 : 2020
U.S. Army Cyber Command
Risk Management Framework (RMF) Analyst
· Provides web vulnerability assessment scanning using guidance from 2nd Regional Cyber Center and Kali Linux tools : WhatWeb, SkipFish, and Nikto, along with BurpSuite professional to provide a detailed analysis of potential vulnerabilities to various website owners.
· Utilize a structured analytical process to identify physical, information, personnel, and operational protection gaps that could provide an adversary with insights into critical information.
· Search DoD public facing websites related to the Army for information and trends of data that could be used to breach security or pose a threat to defensive and offensive operations and military personnel.
· Using a browser, Operations Security (OPSEC) guidance, the web crawler program WEBrms, and a list of target websites, perform content review on several DoD webpages.
· Provide web vulnerability assessment scanning using guidance from 2nd Regional Cyber Center
· Analyze URLs for PII, classified spillage and OPSEC violations.
· Coordinate, Advise and Instruct web site owners to ensure they are compliant with AR 25-1 and AR 25-1DISA and DoD standard procedures are in guidelines.
· Led team of three junior analysts, ensuring work quality and proper analysis procedures.
2019 : 2020
U.S. Army Cyber Command
Senior Web Vulnerability Analyst and Team Lead
Interviews beneficiaries, inquirers or their representatives to determine the nature of their problem or interest.
Explains technical provisions, elicits relevant facts and resolves problems with payments or eligibility. Investigates case situations and reconciles discrepancies causing interruption in the receipt of monthly
benefits.
Investigates case situations and reconciles discrepancies causing interruption in receipt of monthly benefits or Medicare payments; pursues to completion incidents of dissatisfaction with Medicare reimbursement rates or other practices which are remedial through administrative processes.
Develops, documents and resolves Title XVI overpayments. Determines amount of excess payment and
resolves overpayment by recovery, waiver and/or determination that the overpayment did not exist or is uncollectible. Documents SSI file and issues appropriate notices.
2018 : 2020
Social Security Administration
Contact Representative
Skills
Analytical Skills, Auditing, Communication, Customer Service, Cybersecurity, Cyber Security Awarness Training , Data Analysis, Databases, Data Entry, Data Loss Prevention (DLP), Data Management, Data Privacy, Documentation, Easily Adaptable, eMASS, Firewalls, Information Assurance, Information Security, Information Security Policy, Information Technology, Leadership, Management, Microsoft Excel, Microsoft Office, Microsoft Word, Military Training, NIST, Operational Planning, Organizational Leadership, Problem Solving, Project Management, Reporting & Analysis, Report Writing, Research, Risk Management Framework, Security, Security Audits, Security Information and Event Management (SIEM), Standard Operating Procedure (SOP), Strategic Planning, Team Building, Team Leadership, Teamwork, Technical Documentation, Threat & Vulnerability Management, Time Management, Troubleshooting, U.S. Department of Defense, U.S. Federal Information Security Management Act (FISMA), Vulnerability Assessment
About
Results-driven professional with five years of experience in safeguarding organizational computer networks from data hacks or breaches. Passionate about researching the latest trends and educating staff on security risks. Able to juggle multiple projects and priorities in high-pressure environments. Strategic thinker with a strong analytical mindset to make data-driven decisions. I am also in the Army National Guard for over 16 years and am currently a Warrant Officer (255S) in a Cyber Warfare company.
Some of my accomplishments and contributions include:
Implementing and operating Phishing program for over 600 employees with direct oversight of new hire training in regard to Information Security.
Oversaw end-of-life firewall transition from start to finish. This includes vendor shopping, rule and policy scrubbing, conversion implementation, and multi-departmental collaboration.
My wife and I are heavily invested in fostering in-need dogs from our local humane society over the last few years. We have especially enjoyed providing care for elderly and special case dogs (health issues/fights rings). So far we have fostered and successfully found forever homes for close to 30 dogs since 2020 and don't plan to stop anytime soon!