United States Department Of Defense, Virginia
Developed and implemented security policies, protocols and procedures.
Oversee installation of security software, hardware and equipment.
Analyzed and documented security breaches to identify areas of
improvement.
Created, tested and maintained disaster recovery plans.
Participated in risk assessment and security audits.
Documented, assessed, and analyzed ingress and egress network traffic for
cyber-attacks for Requirement Traceability Matrix (RTM).
Produced Use Cases of prevalence of network vulnerabilities, threats, exploits,
hacking tools,
rootkits, and viruses used to conduct cyber-attacks to fulfill stakeholders'
requirement of relevant
information to protect networks.