Uploaded by Brian Rainwater

Application Packet Questionnaire

advertisement
Cyber Protection Team 175
Candidate Questionnaire
2/24/2024
FOUO
1
Candidate Information
Name: Rainwater, Brian
Rank: SPC / E – 4
Current MOS: 88N
Email Address: Brianrainwater@gmail.com
Phone #: 256 – 226 - 3570
Current Unit POC and Phone #:
School Attended (i.e. university, military academy, etc. put N/A if not applicable): The
University of Alabama
Degree Awarded: Bachelor of Science (BS) in Commerce and Business Administration
Graduation Date: DEC 2024
Certifications (i.e. Security +, CEH, CISSP, CCNA, ect.): ITIL 4, CompTia A+, Google
Cybersecurity
Resume (attach with CPT questionnaire):
2/24/2024
FOUO
2
Clearance Information
Do you currently hold a clearance? Yes or No? Yes
If so what is your current level of access?
TOP SECRET / SCI
Interim TOP SECRET
SECRET
X
Interim SECRET
Public Trust
None
2/24/2024
FOUO
3
Questionnaire
What qualifies you to be a Cyber Professional? Include any special skills you have?
I am a diligent, analytical, and determined to be a cybersecurity professional, wholly
committed to the safeguarding of digital assets and the protection of organizations, private
citizens, and the USFG sensitive information from malicious cyber threats. With a strong
grounding in cybersecurity foundational principles and an unwavering dedication to
ongoing learning, I am poised to contribute my skills and knowledge to fortifying,
upholding, and securing digital environments effectively.
2/24/2024
4
Questionnaire
List three of your goals as a Cyber Professional:
Long term
Have a high ranking job in the federal government
Mid term
Have a job at Redstone Arsenal or the new FBI building there
Short term
Graduate UA with a double major in Cybersecurity and Entrepreneurship and pass 17C
school
2/24/2024
5
Questionnaire
List any internships or industry experience:
I am creating my own SaaS business. I am taking certifications online to bolster my
programming skills.
I spent some time at Naval Computer and Telecommunications Station, Far East. I learned
firsthand of proper responses to ensure safety of data.
I have experience with WindowsOS, macOS, Kali Linux, SQL, HTML, JS, RSA,
Kleopatra, VPN, GUI, CLI, Bash, Metasploit, Magnet Axiom, Python, C#, Ruby, SQL
2/24/2024
6
Questionnaire
What is the hardest technical problem that you have solved?
I have faced many tasks. I have put together my computer and troubleshot it as problems
arose. I was also an electrician on MH-60S. I helped solve a large number of electrical
issues during my stint in the navy.
2/24/2024
7
Questionnaire
Please rate your level of proficiency in the following areas on a scale of 1-5.
1 being least familiar and 5 being very comfortable. Do not mark any if you have no experience.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Linux OS/UNIX, to include derivatives
such as BSD, Mac OSX, Ubuntu
Windows OS
Forensics (disk, memory, netork)
Software Analysis & Malware reversal
Assembly
FORTRAN
C++
Java
Python
Penetration Testing
Binary Analysis
BASIC
C
SQL
JavaScript
Perl
Other ________C#______
Other ______________
2/24/2024
USER ____3______
USER _____4_____
USER _____2_____
USER _____2_____
USER __________
USER __________
USER __________
USER __________
USER ______3____
USER ____2______
USER __________
USER __________
USER __________
USER ____2______
USER __________
USER __________
USER _____2_____
USER __________
ADMIN ___2______
ADMIN ____4_____
ADMIN ____2_____
ADMIN _____2____
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
ADMIN _________
8
Scenario 1
Your in a lab environment with multiple computer assets and tools. You are working on a
person’s computer that is suspected to be infected with a virus. The operating system is
Windows 7. What steps would you take in analyzing this computer?
2/24/2024
9
Scenario 1 Cont’d
Provide answer below:
• Isolate the computer
• Enter into safe mode
• Back up important data
• Use a reliable antivirus
• System Restore
• Malware scans
• Update and patch
• Clean install
• change all passwords and monitor accounts and systems for any signs of unauthorized
access or lingering issues.
2/24/2024
10
Scenario 2
A piece of malware is running on a Windows 7 machine via process injection, so it does not
show up in a process list. What remote forensic technique could be used to discover the
malware that is running under the contents of a specific process?
2/24/2024
11
Scenario 2 Cont’d
Provide answer below:
I would then use antivirus to scan and see if it could find any any abnormalities first. I
would try Process Monitor from Sysinternals and then cross reference with process explorer
and wireshark to see if there is any unusual activity going out of my computer. If still not
rectified, I would use live activities such as KAPE to see if I could root out the issue that
way.
2/24/2024
12
Scenario 3
Describe a corporate network infrastructure design with which you’re familiar and define
the critical areas that need to be secured. What vulnerabilities exist and what are methods
for mitigation? Prioritize what needs to be secured and what the potential impacts would be
if not secured properly.
2/24/2024
13
Scenario 3 Cont’d
Provide answer below:
Physical access and digital access. Locked doors behind pin codes and key cards and
security systems manned by watch personnel to ensure the unauthorized personnel cannot
gain access to areas to which they are not allowed. Security cameras to ensure that only
authorized personnel would be allowed entry.
For digital access, I would say ID cards like the military CAC. Authorizing by email and
digital pin to access accounts and regular trainings to ensure user error is at a minimum.
2/24/2024
14
Scenario 4
Given the following program, explain the specifics of what is being done.
int fact(int n)
{
if (n < = 1) // base case
return 1;
else
return n*fact(n-1);
}
2/24/2024
15
Scenario 4 Cont’d
Provide answer below:
It is a function calling integer “n”. The process of the function is a factorial of what ever
number “n” is set to. When the function reaches 1 in the if statement, it will print out the
final number of the factorial. Else if a number is less than 1, it would just print 1.
2/24/2024
16
Recommendation for Approval
• CPT 175 Mission Element Lead (CW2/1LT or above):
• Date of interview:
• Recommend for approval (include justification):
2/24/2024
FOUO
17
Download