Peter Cyber

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Peter B.

Shields
(667-355-1796)
Pshields1948@gmail.com
Top Secret (TS- SCI) Security Clearance

Cyber Security professional, experienced working in fast-paced and high pressured environments
demanding proven organizational, technical, and cross-functional communications skills, combined with
10+ years of experience in IT

Project Management. Trustworthy, dedicated, committed to strong customer service with both internal
and external customers. Offering an exceptional ability to work under pressure and deliver innovative
improvement strategies to meet organizational objectives.

HIGHLIGHTS OF SKILLS & ABILITIES

 Splunk
 ArcSight
 eMASS and XACTA
 McAfee ePO
 Nmap and Nslookup
 PowerShell and PowerShell ISE
 SCCM and WSUS
 Wireshark, Kali Linux, and Metasploit
 Active Directory
 RSA Archer
 SCAP Compliance Checker and STIG viewer
 NetFlow Analyzer
 Remedy
 Nessus (DISA ACAS)

EDUCATION

 George Washington University, Washington, DC August 2016


Master Certificate in Information Technology Project Manager
 University of Maryland University College, Adelphi, MD May 2015
Master of Business Administration
 University of Maryland University College, Adelphi, MD December 2012
Master of Science in Information Technology: Information Assurance
 Delaware State University, Dover, DE December 2010
 Bachelor of Art: Psychology

CERTIFICATION
 Certified Information Systems Security Professional (CISSP) July 2018- August 2023
 ISC2 Certified Authorization Professional (CAP) May 2017- August 2023
 Navy Qualified Validator (NQV) Level II June 2020
 EC-Council Certified Ethical Hacker (CEH) July 2014-2023
 CompTIA Security+ CE Certified December 2011-2023
 PMI Project Management Professional (PMP) August 2016-2025
 ITIL v4 Foundation September 2019
 Microsoft Certified Solutions Associate (MCSA): Windows Server 2016 January 2019
 DISA Assured Compliance Assessment Solution (ACAS) August 2017
 AWS Certified Solutions Architect - Associate (SAA) October 2022-

CAREER EXPERIENCE

PAR Government supporting


U.S. Naval Forces Central Command Bahrain
Cybersecurity Engineer/ Risk Management Framework (RMF) Subject Matter Expert (SME)
December 2019-Present

 Risk Management Framework (RMF) Subject Matter Expert (SME) leading RMF packages for
COMUSNAVCENT classified systems that includes; JWICS, PACSTAR, FMVE, DCGS-N,
RADMERC, and CENTRIXS.
 Conduct risk assessment as an ISSE and Validator to receive Authorization to Operate from
Fleet Cyber Command (FLTCYBERCOM) Navy Authorizing Official (NAO) and Office of Naval
Intelligence (ONI).
 Assist the ISSM with Cybersecurity activities and reporting.

Vectrus Systems Corporation supporting


U.S. Army Central Kuwait
Information Assurance Analyst September 2017-December 2019

 Interpret and enforce Army Regulation 25-2: Information Assurance Policy and Procedures.
Employ network-scanning tools such as DISA ACAS, SCCM/SMS, WSUS etc., to detect system
and network vulnerabilities/deficiencies, as part of a proactive network security policy.
 Provide Tier II level support to RMF by submitting artifacts within Enterprise Mission Assurance
Support Service (eMASS).
 Generate daily Information Assurance Vulnerability Alert (IAVA) reports utilizing vulnerability-
scanning tools such as DISA ACAS.
 Provide weekly standup briefing to LNEC and Information Management Officers (S6) on security
activities.
 Facilitate security incidents with South West Asia Cyber Center (SWACC)/ Regional Network
Operations and Security Center (RNOSC).
 Provide Quality Assurance to Elevated Accounts paperwork within Army Training and
Certification Tracking System (ATCTS).

Department of Homeland Security (DHS) Washington, DC


Information Technology Project Manager
May 2013 - August 2017

 Government liaison for the DHS Security Operation Center (SOC) and Network Operation Center
(NOC) providing innovative capability that offers a full range of information security services to
protect classified networks and data.
 Reported any security incidents to the CISO/ISSM on the network and work with other tech
leads to help mitigate incidents.
 Utilized security tools such as Splunk, ArcSight, and Sourcefire to monitor network traffic on a
classified network.
 Supported continuous monitoring program within the Information Assurance Branch, providing
a risk assessment based on NIST standards to ensure Information Assurance (IA) design
sufficiently mitigates IA risks in DHS Sensitive Compartmented Information Facilities (SCIF) and
on Classified Networks.
 Identify, document, and report security issues and concerns to the NSS CISO and CIO on a
weekly basis.
 Developed remediation plans and coordinated activities with DHS partners.
Supported the lead Security Control Assessor in certification and accreditation, vulnerability
assessment, and patch management process in compliance with Intelligence Community
Directive (ICD) 503.
 Delivered IT services for over 75+ federal, state, tribal, and private sector partners to facilitate
secure information sharing through classified and unclassified systems.
 Managed over 2 million dollars for new and ongoing IT projects and programs that significantly
impact the delivery of national security and intelligence systems.
 Represented the agency in meetings and discussions with representatives of industry, intra-
agency advisory committees, and various federal, state and local agencies to resolve IT
problems. Worked with partnered agencies' IT experts in the strategy, security, and delivery of
classified hardware and software for new networks or for significant modifications to existing
networks.
 Performed advantageous approaches for enhancing existing systems, or for purchasing or
developing new systems that satisfy intelligence customer needs at the lowest cost.
 Managed the maintaining, monitoring, performance tuning, backup, and recovery of databased;
installed, configured, and maintained database management systems software; analyzed,
planned, and anticipated changes in data capacity requirements; developed and administered
data standards, policies and procedures, or enhanced the level of IT services provided.

Department of Homeland Security (DHS)


Washington, DC
Public Key Infrastructure (PKI) Administrator (Internship)
January 2012 - May 2013

 Issued certificates for public keys to over 85% of DHS I&A workforce.
 Authored the Data Access Account Management Process Guide referencing PKI certificate
creation, analyst data source account creation, and management.
 Provided training and assistance to intelligence analysts on properly using multiple Intelligence
Community (IC) databases and reporting systems.
 Managed access control/privileges for 48+ data access sources throughout the IC.
 Provided risk assessments, analysis, management, security practices and procedures, and
solutions for process improvement.
Department of Homeland Security (DHS) Washington, DC
IT Security Compliance Review Analyst/ Security Control Assessor (Internship)
May 2011 - May 2013

 Conducted IT security compliance reviews for various SCIFs to ensure accurate accounting of all
SCI equipment operating, processing, transferring, or storing SCI data.
 Updated and maintained the NSS CISO IT Security Training Portal Latest Security News section
with IT and cyber-security news from various organizations and news agencies.
 Reported and responded to security incidents, determined causes of security violations and
recommended corrective actions to ensure data security and followed up with the 24 X 7 X 365
Intelligence Community.
 Incident Response Center (IC- IRC) and Security Operation Center (SOC).
 Conducted information on inventory of hardware and software listing; presented the findings to
the NSS CISO for reporting to higher-level management.
 Provided executive-level support in the creation of agency-wide security policies and procedures
for future mandate DHS Sensitive Compartmented Information (SCI) Systems Policy Directive
4300C.
 Managed for multiple Enterprise Architecture frameworks, methodologies, artifacts, best
practices, tools and repository.
 Reporting include documentation review, preparation, Plan of Action and Milestones
generation/status, and maintenance for National Security System using Software Development
Life Cycle tool.

You might also like