Andre's Resume

advertisement
ANDRE J. LOVELL
5918 Knightsbridge Way, Portsmouth, VA 23703
(757) 580-9041 <Cell> <Email> Andre_Lovell@yahoo.com
HIGHLIGHTS OF QUALIFICATIONS
Nine-year Navy veteran with success and experience as a Network Security Analyst and Electronic
Warfare / Intelligence Operations Operator and Analyst, with an active Top Secret/SCI CI Poly in
JPASS and VERIFIABLE record for:
 Communicating effectively, orally and in writing, the intelligence operations briefings to senior
leadership in groups in excess of 30 personnel
 Being recognized as a self-starter with the ability to work independently, as part of a team, or in a
leadership capacity
 Producing higher performance standards and enhanced productivity during a period of shrinking
budgets and personnel
 Superior computer skills with proficiency in Microsoft Server 2008 R2 and Work Station
(Installation and administration, security group policies, configuration of protocols and drivers,
configuration of DHCP and DNS, and directory services administration), network defense and
countermeasures, Virtual Microsoft Software (VMware), and Microsoft Office (Word, Excel,
Access and PowerPoint)
EDUCATION
ECPI University, Virginia Beach, VA
 Pursuing a Bachelor of Science Degree in Computer and Information Science
Concentration: Network Security
 Associates of Science Degree in Computer and Information Science, September 2013
Concentration: Network Security
Final GPA: 3.68
ADDITIONAL PROFESSIONAL TRAINING

United States Navy
Surface Electronic Warfare (J-2G-0210), Norfolk, VA
Electronic Warfare Threat Recognition (A-233-0005), Norfolk, VA
Work Center Supervisor Leadership Course (CIN-A-500-0102), Norfolk, VA
Elint Cryptologic Afloat Training Three (A-230-0033), Norfolk, VA
EXPERIENCE
Network Security Analyst Incident Responder, Jan. 2011 – Mar. 2012
Northrop Grumman, Crystal City, VA
 Monitored and analyzed security alerts (primarily from IDS, Firewall, Windows, Web, Antivirus,
etc.) using security tools and escalated them to local support personnel
 Logged event correlation Security Information Management (SIM) tools such as, ArcSight,
Niksun, Websense, Wireshark, HBSS, and McAfee to analyze network traffic for malicious
intrusions
 Escalated events that warranted immediate attention for in-depth analysis to Intrusion Responders
 Maintained system hardening, vulnerability assessment and management, antivirus, firewalls, and
techniques for analyzing TCP/IP network traffic and event logs
 Reported the daily IDS numbers from automated predefined reporting tools
 Contributed to simplifying explanations of exploits within the daily report
1 of 2

Followed incident instructions in problem resolution in accordance within the established
troubleshooting procedures and Standard Operation Procedures created for the US Courts security
and system administration program
United States Navy
Jan. 2007 – Aug. 2009
Tactical Elint Coordinator/Team Leader
Virginia Beach, VA
 Knowledgeable of DOD operations and Intelligence Analyst Community
 Increased the efficiency and organization of Tactical Electronic Intelligence Report messages for
its’ Intelligence Analysts’- for dissemination to Fleet Type Commanders
 Researched, analyzed and evaluated naval tactical databases using multiple-all source, such as,
the Electronic Warfare Integrated Reprogramming Database, Signal Analysis Integrated Library
System, Navy Information Operations Database, Office of Naval Intelligence, Intellipedia
website and the Electronic Parametric Library threat libraries to analyze surface, subsurface,
airborne platforms (military and commercial)
 Fused SIGINT with other intelligence disciplines and prepared special reports on analytical
findings
 Managed and automated highly classified and technical material and equipment in support of
national security
 Obtained information needed to prepare in-house training programs; prepared training materials;
developed course content; and coordinated the development of training aids
Feb. 2006 – Jan. 2007
Computer Network Security Analyst
Virginia Beach, VA
 Accomplished as a Web Risk Assessment Analyst (WRA) with Cryptologic Technician Networks
and Information Technology personnel; maintained fleet intrusion of network vulnerabilities and
Incident Response/ Reconstruction, network traffic analysis and maintenance.
 Conducted Blue Team Training exercises for Naval Ships worldwide on Network Security
vulnerabilities
 Performed Intrusion Detection Analysis with Snort, Nutcracker, Grappler, NetLog and Real
Secure while monitoring intrusion detection sensors for malicious activity
 Responsible for the overall assessment of over 3,600 Naval websites, registration, and
enforcement compliance IAW SECNAV and Department of Defense Directives
 Provided Computer and Security Network training, assistance, and incident handling support to
more than 400 US Navy Fleet units and Military Sealift Commands
 Provided Blue/Red Team summary/evaluation reports to senior command officials
Jun. 2000 – Jan. 2006
Cryptologic Technician Technical / Supervisor
Norfolk, VA
 Managed the daily operations of 10 personnel, to include the coordination of the daily watch team
schedule, which resulted in zero mishaps and a ninety-five percent advancement rate
 Identified emitting signatures – dependent systems, sensors and process requirements in the
intelligence community during three at-sea deployments to the Northern Europe, Mediterranean
Sea and Arabian Gulf for Maritime Interception Operations
 Used analysis equipment, including signal generators, graphic recorders, and spectrum analyzers,
for which technical reports were prepared and presented to senior leadership
 Identified and classified the general characteristics of electromagnetic signals; operate a computer
system; inspect, clean, and make necessary adjustments to equipment; perform minor repairs;
maintain logs, record files, and publications
2 of 2
Download