ANDRE J. LOVELL 5918 Knightsbridge Way, Portsmouth, VA 23703 (757) 580-9041 <Cell> <Email> Andre_Lovell@yahoo.com HIGHLIGHTS OF QUALIFICATIONS Nine-year Navy veteran with success and experience as a Network Security Analyst and Electronic Warfare / Intelligence Operations Operator and Analyst, with an active Top Secret/SCI CI Poly in JPASS and VERIFIABLE record for: Communicating effectively, orally and in writing, the intelligence operations briefings to senior leadership in groups in excess of 30 personnel Being recognized as a self-starter with the ability to work independently, as part of a team, or in a leadership capacity Producing higher performance standards and enhanced productivity during a period of shrinking budgets and personnel Superior computer skills with proficiency in Microsoft Server 2008 R2 and Work Station (Installation and administration, security group policies, configuration of protocols and drivers, configuration of DHCP and DNS, and directory services administration), network defense and countermeasures, Virtual Microsoft Software (VMware), and Microsoft Office (Word, Excel, Access and PowerPoint) EDUCATION ECPI University, Virginia Beach, VA Pursuing a Bachelor of Science Degree in Computer and Information Science Concentration: Network Security Associates of Science Degree in Computer and Information Science, September 2013 Concentration: Network Security Final GPA: 3.68 ADDITIONAL PROFESSIONAL TRAINING United States Navy Surface Electronic Warfare (J-2G-0210), Norfolk, VA Electronic Warfare Threat Recognition (A-233-0005), Norfolk, VA Work Center Supervisor Leadership Course (CIN-A-500-0102), Norfolk, VA Elint Cryptologic Afloat Training Three (A-230-0033), Norfolk, VA EXPERIENCE Network Security Analyst Incident Responder, Jan. 2011 – Mar. 2012 Northrop Grumman, Crystal City, VA Monitored and analyzed security alerts (primarily from IDS, Firewall, Windows, Web, Antivirus, etc.) using security tools and escalated them to local support personnel Logged event correlation Security Information Management (SIM) tools such as, ArcSight, Niksun, Websense, Wireshark, HBSS, and McAfee to analyze network traffic for malicious intrusions Escalated events that warranted immediate attention for in-depth analysis to Intrusion Responders Maintained system hardening, vulnerability assessment and management, antivirus, firewalls, and techniques for analyzing TCP/IP network traffic and event logs Reported the daily IDS numbers from automated predefined reporting tools Contributed to simplifying explanations of exploits within the daily report 1 of 2 Followed incident instructions in problem resolution in accordance within the established troubleshooting procedures and Standard Operation Procedures created for the US Courts security and system administration program United States Navy Jan. 2007 – Aug. 2009 Tactical Elint Coordinator/Team Leader Virginia Beach, VA Knowledgeable of DOD operations and Intelligence Analyst Community Increased the efficiency and organization of Tactical Electronic Intelligence Report messages for its’ Intelligence Analysts’- for dissemination to Fleet Type Commanders Researched, analyzed and evaluated naval tactical databases using multiple-all source, such as, the Electronic Warfare Integrated Reprogramming Database, Signal Analysis Integrated Library System, Navy Information Operations Database, Office of Naval Intelligence, Intellipedia website and the Electronic Parametric Library threat libraries to analyze surface, subsurface, airborne platforms (military and commercial) Fused SIGINT with other intelligence disciplines and prepared special reports on analytical findings Managed and automated highly classified and technical material and equipment in support of national security Obtained information needed to prepare in-house training programs; prepared training materials; developed course content; and coordinated the development of training aids Feb. 2006 – Jan. 2007 Computer Network Security Analyst Virginia Beach, VA Accomplished as a Web Risk Assessment Analyst (WRA) with Cryptologic Technician Networks and Information Technology personnel; maintained fleet intrusion of network vulnerabilities and Incident Response/ Reconstruction, network traffic analysis and maintenance. Conducted Blue Team Training exercises for Naval Ships worldwide on Network Security vulnerabilities Performed Intrusion Detection Analysis with Snort, Nutcracker, Grappler, NetLog and Real Secure while monitoring intrusion detection sensors for malicious activity Responsible for the overall assessment of over 3,600 Naval websites, registration, and enforcement compliance IAW SECNAV and Department of Defense Directives Provided Computer and Security Network training, assistance, and incident handling support to more than 400 US Navy Fleet units and Military Sealift Commands Provided Blue/Red Team summary/evaluation reports to senior command officials Jun. 2000 – Jan. 2006 Cryptologic Technician Technical / Supervisor Norfolk, VA Managed the daily operations of 10 personnel, to include the coordination of the daily watch team schedule, which resulted in zero mishaps and a ninety-five percent advancement rate Identified emitting signatures – dependent systems, sensors and process requirements in the intelligence community during three at-sea deployments to the Northern Europe, Mediterranean Sea and Arabian Gulf for Maritime Interception Operations Used analysis equipment, including signal generators, graphic recorders, and spectrum analyzers, for which technical reports were prepared and presented to senior leadership Identified and classified the general characteristics of electromagnetic signals; operate a computer system; inspect, clean, and make necessary adjustments to equipment; perform minor repairs; maintain logs, record files, and publications 2 of 2