Vous êtes sur la page 1sur 3

Robert Kane BSIT MSIA CISSP MCSE SNORTCP P.O.

Box 733 Johnstown, PA 15907 Home 814-619-0009 Cell 814-248-0114 rk1309568@westpost.net OBJECTIVE A rewarding position to apply innovative talents to research and employ new and emerging technologies, procedures, and processes to identify and remedy network security shortfalls. HIGHLIGHTS * Over twenty years experience in the IT industry with recent 20+ years experien ce with US Army, DOD and DOJ projects. * Well versed in vulnerability assessments and penetration testing for Certifica tion and Accreditation (C&A) of networks and systems. * Very familiar with the C&A process, particularly the DOD Information Technolog y Security Certification and Accreditation Process (DITSCAP) and the DOD Informa tion Assurance Certification and Accreditation Process (DIACAP). * Highly skilled and experienced at designing and developing network security so lutions and processes tailored to specific situations. * Experienced in installing, integrating and managing firewalls, intrusion detec tion systems, reverse proxy technologies and many other network security devices . * In depth knowledge of operating systems such as Microsoft Windows NT/2000/XP/7 and many flavors of Unix and Linux on Sun, HP, and PC hardware. * Excellent exposure to CISCO technologies. * Have worked with PKI on the job and attended DOD conferences on the subject. * Extensive work with IDS systems and signature development. * Willing to relocate for the right job. * Will travel worldwide. Security: DOD Top Secret Clearance EXPERIENCE Northrop Grumman, Johnstown, PA Systems Engineer/Cyber Architect December 2006 to Present Developed a secure Linux environment with SELinux to support a Cross-Domain solu tion for U.S. Airforce training environments. Provided hardening scripts and ot her OS level programs to assist in getting the system accredited. Provide Certification and Accreditation guidance as well as subject matter exper tise doing Security Technical Implementation Guides (STIG) and Gold Disk evaluat ions for the Defense Information Systems Agency (DISA). Working on the Joint Ta ctical Radio System program to develop a secure operating system environment usi ng the Security Enhanced Linux (SELinux) environment. Northrop Grumman IT, Johnstown, PA Network Security Engineer June 2005 to December 2006 Worked for Northrop Grumman on computer security programs for the Department of Justice National Drug Intelligence Center (NDIC) in Johnstown, PA. Responsible for monitoring, maintaining, and improving the Network Intrusion Detection Syste

ms (NIDS) and the Host-based Intrusion Detection Systems (HIDS) for the NDIC. T asked to perform network Penetration Testing of the NDIC Justice Network System (JNS) as part of the C&A process. Provided technical expertise in the procureme nt and design of enhancements to the current Network Security Architecture The Boeing Company, St. Louis, MO Security Architect January 2005 to June 2005 Worked for Engineering Services Group (ESG) out of Parsippany, NJ under contract to Boeing in St. Louis, MO on classified security programs for DOD and other ag encies. Prepared System Security Plans (SSP) in accordance with the NISPOM and JAFAN. Conducted computer security audits for compliance to government guidelin es/procedures. Consulted on computer security issues and research computer secu rity technology. Signal Solutions, Inc., Fort Huachuca, AZ Senior Network Security Engineer April 2004 to August 2004 Worked with the U.S. Army Information Systems Engineering Command (USAISEC) on t he Installation Information Infrastructure Modernization Program (I3MP). Primar ily assisted U.S. Army installations in the design, procurement, installation, c onfiguration and maintenance of LAN, WAN, and POP equipment to provide their use rs with connectivity to the Army networks and beyond. Prepared all necessary do cumentation leading to DITSCAP certification. This consisted of Systems Securit y Authorization Agreement (SSAA), the Requirements Traceability Matrix (RTM), th e System Test & Evaluation (ST&E) and other C&A documentation as part of DITSCAP . Northrop Grumman IT, Fort Huachuca, AZ Computer Scientist / Associate Manager May 1998 to February 2004 Served as Senior Technical Advisor to the Chief of the US Army Regional Computer Emergency Response Team, CONUS (RCERT-C) and managed small team of security pro fessionals that were members of the RCERT-C. Field tested the concept of using proxy engines to defeat a huge multi-user/mult i-homed denial-of-service attack against a DOD target as part of the Security-In -Depth working group at the Office of the Army CIO. Using this success; designe d, developed, installed, and maintained the Army''s Reverse Proxy Server capabil ity to protect Army web sites from disruption, manipulation of data, or destruct ion. Installed this solution at 35 locations within CONUS and 2 locations overs eas. This effort required analysis of common attack signatures and the developm ent of countermeasures that were installed on the proxy engines. PRC,Inc., Mannheim, Germany Principle Network Security Analyst July 1993 to May 1998 Worked with the Intelligence Branch of the US Army 5th Signal Command to develop the European Theater's information security program and create a network securi ty center of excellence that became the RCERT - Europe, the Army's first RCERT. During this period, grew from a staff of 2 to over 35 employees. Principal des igner and developer of the first theater-wide intrusion detection system (IDS) d eployed anywhere in the Army. Installed, integrated and maintained the IDS capability using TCP Wrappers to re port to an HP Openview console via SNMP.

TechDyn Systems, Worms, Germany Computer Programmer/Analyst February 1988 to July 1993 Developed communications management modules for European Telephone Systems (ETS) Support. Lead designer of the Switched Systems Management Support System (SSMS S) and the Network Configuration Management System (NCMS). These two systems we re designed to support better management of the over 100 ETS telephone switches currently in place. Programmed in a combination of C programs and routines writ ten in Perl to provide near-real-time capture and processing of traffic manageme nt and configuration information. Captured data was inserted into an Informix d atabase for queries and reporting. ITT Federal Systems and Serve-Air, Inc., Mannheim, Germany Programmer Analyst Aug 1985 to February 1988 Brought over to Germany by ITT Federal Systems to serve as the programmer/analys t for the Area Maintenance Supply Facility (AMSF) in Mannheim, Germany. Working with a van mounted Honeywell mini-computer known as a DAS-3 developed supply an d logistics software which replicated the standard Army DS4 supply system, but d id so more rapidly and on a more frequent schedule. Monthly routines needed to be run on a weekly basis and so on. Software was developed in COBOL with extensive JCL. EDUCATION Cochise College, Sierra Vista, AZ AS Computer Science 1983 Excelsior College, Albany, NY BS Information Technology (Information Security) Capitol College, Laurel, MD MS Information Assurance 2009 Certified Wireless Network Professional, Inc. Smyrna, GA CWTS 2009 SourceFire, Inc. Columbia, MD SnortCP 2005 International Information Systems Security Phoenix, AZ Certifications Consortium, Inc. CISSP 2004 DRA Software Training Center, Tucson, AZ MCSE 1999 U.S. Army Network & Systems Administrator Security Course, Fort Gordon, GA Certificate 1999 References: Available upon request 2008

Vous aimerez peut-être aussi