Profileimage by Kenneth Ford Facilities Manager, Consultant, Technical Specialist from

Kenneth Ford

partly available

Last update: 20.06.2023

Facilities Manager, Consultant, Technical Specialist

Graduation: Master of Science in Information Systems
Hourly-/Daily rates: show
Languages: English (Limited professional)

Keywords

Incident Response Facility Operations Time Management Vulnerability Security Audits

Attachments

kenneth_ford_-v_.pdf

Skills

Organized and dependable candidate successful at managing multiple priorities with a positive attitude. In the search of maintain full-time position that offers professional challenges utilizing interpersonal skills, excellent time management and problem-solving skills. Skilled in identifying, analyzing, and resolving security vulnerabilities, implementing countermeasures and incident response plans, and performing security audits and reviews.

Project history

09/2022 - 01/2023
Cyber Security Specialist
Bootcamp of RemoteMode

Bootcamp of RemoteMode, Online
Commissioned project for client's Network Security Team that involves following
tasks:
Embed canary token to trigger security alerts.
Set up Web Application Firewall (WAF) to protect web service.
Installed Snort to detect network activity.
Installed Splunk and monitor network activities.
Project involves enhancing security of company's network, servers and files by
performing following tasks:
Setting access rules for critical file to which only authorized individuals should
have access.
Searching for possible malware on network and destroying it.
Setting up software to monitor network.
Threat protection project to improve security of company's systems:
Created and configured Virtual Machine.
Used StegHide to hide and then recover text document within image file.
Created Cowrie honeypot to trap potential hackers.
Installed OSSEC to detect intrusions on network.
Installed GoldenEye to simulate DDOS attacks.
Built relationships and fostered effective communication with legal personnel
to conduct practical investigations

02/2018 - 09/2020
Technical Specialist
AAF Companies LLC

AAF Companies LLC, Silver Spring
Maintained system quality control, surveying users, collecting metrics data and
handling IT audits
to support updates and maintenance.
Completed troubleshooting and diagnostics on company resources.
Monitored employee tasks to gauge business functions and inefficiencies.
Developed and implemented security policies, procedures and best practices
to protect organization's IT systems and data.
Performed security risk assessments and vulnerability scans to identify and
mitigate security threats.
Analyzed and assessed different business models for direction of companies
under Advanced Authoring Format (AAF).
Configured and maintained firewalls, routers, and other security and network
devices.
Generated Project Vision Documents for marketing and branding with
utilization of social media.
Developed and implemented 15 new technical solutions to improve customer
service and increase efficiency.

07/2014 - 02/2018
Information Technology Specialist
The Real Hip Hop Network

The Real Hip Hop Network, Washington, D.С.
Controlled and managed server room, wireless network, server infrastructure,
audiovisual
equipment, laptops and video conferencing equipment.
Analyzed and recommended security enhancements to existing systems.
Reviewed and approved access rights to systems and data.
Generated Project Vision Documents for management for implementation of
emerging technologies into digital media, brand promotion, brand marketing,
and social networking platforms.
Developed and executed security audits as needed to detect any potential
vulnerabilities.
Retained existing clients and developed 15 new accounts by extending high
quality and efficient
support service.

01/2004 - 05/2011
Network Security Consultant
COMPUTER SECURITY SERVICE

COMPUTER SECURITY SERVICE, Waldorf
Conducted research, gathered information about home-based businesses
from multiple sources and presented results.
Led projects and analyzed data to identify opportunities for improvement.
Collaborated with stakeholders about network security and emerging
technologies requirements for home-based businesses.
Helped to choose best computer security software suited to home-based
businesses.
Implemented security measures on more than 50 corporate networks, ensuring
reliable data protection and improved network performance.

05/2001 - 01/2004
Computer Scientist
United States Department Of Defense

United States Department Of Defense, Virginia
Developed and implemented security policies, protocols and procedures.
Oversee installation of security software, hardware and equipment.
Analyzed and documented security breaches to identify areas of
improvement.
Created, tested and maintained disaster recovery plans.
Participated in risk assessment and security audits.
Documented, assessed, and analyzed ingress and egress network traffic for
cyber-attacks for Requirement Traceability Matrix (RTM).
Produced Use Cases of prevalence of network vulnerabilities, threats, exploits,
hacking tools,
rootkits, and viruses used to conduct cyber-attacks to fulfill stakeholders'
requirement of relevant
information to protect networks.

Local Availability

Only available for remote work
Profileimage by Kenneth Ford Facilities Manager, Consultant, Technical Specialist from Facilities Manager, Consultant, Technical Specialist
Register