- Jon Little

advertisement
Jon Little
421201 Kittridge St  Woodland Hills CA 91303
Phone: 818-577-9286  E-Mail: jonathantlittleit@gmail.com
Overview
Broad knowledge of hardware, software, and systems with networking technologies to provide a powerful combination of analysis, implementation, and
support. Experience in system and network administration and engineering, hardware evaluation, project management, systems and network security,
incident analysis and recovery. I have provided support to over 71,000 users with the MEDCOM division of the ARMY, while providing proprietary software
support. Organizing SMS package pushes to 8,000+ workstations at USAA while providing customer software support and optimization. Provided
performance engineering to software and hardware used by Tesoro’s floor traders to help trade 10-40 million in oil trades daily. Email support at CISCO on
AsyncOS 7.0+ a linix FREE BSD platform with 500+ fortune 500 companies. Provided linux support to Netforensics SIMOne databases.
Experience
PennyMac | Moore Park
07-2012 – Present – Security Operations Analyst
Resolving security events and mitigating solutions. Providing assistance in preparing for federally controlled security
audits and making a security plan for the future. Specializing in Security devices such as Qualy’s scans and trend micro
deep security. Help to assist in correcting and maintaining the security posture.

Designed the SOC event monitoring system with procedures

Lead and engineered the re-deployment of Trend Micro Deep Security

Architected the process flow of security events and response

Maintain the SOC events and security threats

Developed automation through pearl scripting and power shell
Computer Services Inc. | Austin
02-01-2012 – 04-2013 – Security Analyst
Resolving security events and mitigating solutions on complex networks To 500+ customers.
Providing assistance in preparing for federally controlled security audits and making a
security plan for the future. From network topology changes to better configuration on
network devices while specializing in Security devices. Able to correct and maintain a client’s security posture.

Net forensics SIM|One security event monitoring

WiKi Contributor and content developer for HIVE operations at CSI

backend database and collector administration (Red Hat Linux)

Sonicwall firewalls, fortgate firewalls management

Dell Switches

Web Application Security Scanners

D-link switches

Promiscuous and inline IPS configuration and installation

ASA,IPS,IDS, and sensor management

Closely worked with CISCO with new IOS releases.

Packet analysis and log analysis

NESSUS PEN test and VA Scans

Vulnerability assessments

Setting up Secondary DR sites for redundancy

IPS install and setup (RMA’d devices)

CSM integration and device management

CISCO LMS Management

CISCO Security Agent Management

ASA threat detection configuration

ASA Policy Map configuration

AIP , SSM, and security module installation and configuration

DDOS Hardening and protection planning

CISCO Signature development and customization

Configuration back-up with cat-tools

Troubleshoot Remote and Site to Site VPN

Working as a CISCO Gold partner in CSI managed services HIVE in Austin.

Train and mentor Analysts at CSI

Develop training documentation and procedural process for standardization of network
security analysis.

Routers, Switches, ASA 5500 series, 4000 series, PIX, SonicWALL devices.

Firewall changes and IOS update/maintenance

Sensor configuration and IOS update/maintenance

Help customers meet Audit requirement and correct VA assessments.

CISCO MARS event analysis

End Point Protection

Application Assessments OSWAP top 10
Cisco Systems | Austin
9-26-2011 – 12-2011–Network Security Analyst

CISCO IronPort Tier II Support

complex cluster configuration

Provide email security appliance support to top fortune 500 engineers

Identify new and known bugs

Assist customers with filter modification, and provide CLI and GUI configuration help.

Interact with Anti-Spam Rules Teams, the Case Operations Group, Project Management, and third party vendors.

Assist with configuration and email flow changes of ESA and SMA devices

RegEx scripting

Working with devices in Cloud architecture

Daily use of OpenBSD for AsyncOS 7.X

Monitor Cloud devices in Data Center

IDS/IPS

Firewall and log analysis

Mail flow administration

Packet analysis

Scripted configuration backup of IPS/IDS and firewall with Kiwi
2
Tesoro Corporation| San Antonio











Break/fix PCs
Configuration of CISCO call Manager(CCM)
Enterprise IT Project management
Help manage and further develop the support desk with a team of 5 others.
Created the training documents and procedures still used today
Develop and co-organize major international IT projects
Endpoint encryption
Spyware and antivirus support
Complex software install for Routers and other stock trading software
Server blade configuration
Trader workstation, use of RGS and Monitor configuration with support
Rackspace | San Antonio













6-01-2010 – 01-05-2011 – System Administrator
Supported Army MEDCOM and the 71,000+ user network with End user
Used data center monitoring tools
Windows Xp and Office 2007/03 support
Certificate installations and configurations for Army Medcom PCs.
USAA | San Antonio





2-01-2011 – 03-05-2011 –Data Center Engineer
Set up remote connection of products such as ASA, firewall, IDS for network Security
Installing: switches, routers, firewalls, ASA, load balancers, IDS,IPS
Installing and configuring RAID controllers and RAID drives
Installing Red Hat Linux and Windows OS.
Setting up iLO and DRAC on Dell and HP servers
Configuring custom Linux kernels for hardening servers
Back-up media management of tapes
Rack/stack
OS Patching
Clustering and load balancing
Working with devices in Cloud architecture
Use of data center monitoring tools
Monitoring data center power integrity
GoldBelt Raven | San Antonio




3-15-2011 – 9-23-2011-Systems Analyst/Project Manager
6-01-2009 – 05-25-2010 – Deployment Technician
Supported internal PC’s and directed the deployment of new PCs.
Flushed DNS of each workstation.(8,000)
Resolved DNS conflicts per new workstation deployment
Maintained .1x network security protocol.
3
Dave’s PC Repair | San Antonio


Supported T-mobile San Antonio with Networking and PC Repair.
CISCO 3920 switches and firewall
CTG – Computer Task Group | Buffalo [New York]


6-01-2005 – 01-05-2009 – Network and PC Technician
6-01-2003 – 01-05-2005 – PC Technician
Computer Repair of internal PC’s
Norton Ghosting of PC’s/laptops
Education
Northwestern Governors University
2011-2015
Studying Network administration and core networking fundamentals for NSA approved Network security program.
B.A.S
CISCO Networking Academy
2002,2011
Completed CISCO discovery and explorer curriculum and classwork.
Skills
Network Penetration testing (Nessus,Metasploit)
Web Application Fuzzing (SkipFish,Metasploit)
CICSP – CISCO IronPort Certified Security Professional –Certified
Microsoft - Windows XP - MCP - Certified
Comptia - Security+ 2008 Edition - Certified
4
Download