• Biographie
    I'm a Information security specialist whose qualifications include former U.S. Marine , adjunct college professor, and team lead with advance degrees in computer science; detailed knowledge of security tools, technologies and best practices. I...
    En savoir plus
  • Expériences professionnelles
    2008 - Courant
    Instructs students on Cisco network fundamentals, routing and routing protocols, local area networks (LAN), virtual local area networks (VLANS) and wide area networks (WAN) Network infrastructure security issues, including perimeter security defense, firewalls, Virtual Private Networks, Intrusion Detection Systems, wireless security, network security auditing tools and ethical considerations. Advanced routing infrastructure implementation using OSPF, RIPv2, EIGRP, BGP, multi-homed BGP setups and IGP/EGP redistribution. TCP/IP and OSI networking models, history and need for user authentication systems, three factors of authentication ,difference between role and account-based security. The implementation of role-based security in operating systems and the use in various access control models, biometric authentication technology, application of cryptography to authentication through IPSec.
    2006 - 2011
    -Writes white paper, articles, and presentations promoting improved security through digital situational awareness and defensible network architectures -Teaches classes to security analysts/operators, engineers, architects and college students -Performs independent consulting/contract work for military, government, and commercial clients Design, deploy, operate, and augment the protection, detection, and response architectures for customers in accordance with industry best practices and government regulations
    2010 - 2011
    -Incident Response: Designed, lead and support in all phases of Computer Network Defense and Incident Response (malware analysis, intrusion detection, forensics, etc.) -Infrastructure: Co-Led a comprehensive Network, VoIP, Wireless, & Security infrastructure design for a billion dollar children’s hospital utilizing Juniper Avaya, and Aruba for Routing, Switching, VoIP, Wireless and Network access control (NAC). -Leadership: Taught a range of network, security, and digital forensics courses at several Chicago land colleges at the undergraduate and graduate levels. Researched, lead, and advised leadership on security trends and methods to defend the enterprise to include information security policy creation -E-Commerce and Web Application Security- Leveraging the F5 BIG-IP 3900 & Application Security Manager (ASM) with WhiteHat Sentinel security services, we have provided a secure method for families to view patient health information (PHI)
    2008 - 2009
    Instructs students on Cisco network fundamentals, routing and routing protocols, local area networks (LAN), virtual local area networks (VLANS) and wide area networks (WAN) Network infrastructure security issues, including perimeter security defense, firewalls, Virtual Private Networks, Intrusion Detection Systems, wireless security, network security auditing tools and ethical considerations. Advanced routing infrastructure implementation using OSPF, RIPv2, EIGRP, BGP, multi-homed BGP setups and IGP/EGP redistribution. TCP/IP and OSI networking models, history and need for user authentication systems, three factors of authentication ,difference between role and account-based security. The implementation of role-based security in operating systems and the use in various access control models, biometric authentication technology, application of cryptography to authentication through IPSec.
    2005 - 2007
    Ensured VISA PCI DSS, SOX, and CPNI compliancy of enterprise systems for U.S. Cellular® Designed and maintained multi-vendor Firewalls, intrusion prevention and VPN infrastructure in a service provider environment Perform security reviews and audits to help U.S. Cellular Engineering with network security issues Maintained perimeter router security and availability for the organizations gateway devices Provided external VPN transport for the federal, state, and local law enforcement Data and Voice CALEA Performed manual security risk assessment of vendor provided solutions Provided daily operational support of security owned technologies (i.e. DNS, Firewalls, VPN’s, edge router infrastructure acl’s, OOB console devices, and 1x cellular service’s critical to the U.S. Cellular customers
    2005 - 2005
    Analyzed vulnerability of company databases and applications, including internal and external Web sites to identify vulnerabilities. Ensured Sarbanes-Oxley and Visa CISP/PCI compliance of enterprise systems for fortune 100 company. Conducted technical configuration assessments of UNIX, Windows, Oracle Databases, and perimeter network security devices. Conducted gap analysis, designed control tests, tested, designed new controls, and provided recommendations to management for the Operations, Change Management, and Technical Configuration 404 control areas
    1993 - 1998
    Transmitted and received topographical, voice and data over satellite systems for the United States Marine Corps Surveillance Reconnaissance Intelligence Group (SRIG)
    Voir toutes les Expériences professionnelles (8)
  • Compétences professionnelles
    Juniper - UAC-IC6500, SRX-3600, EX-42xx & 82xx, SBR, NSM, SA6500 SSL VPN, Intrusion Detection, Security Treat Response Manager SIEM (STRM) 5000 QRadar, 802.1x NAC, Cisco- ASA Firewall 55xx 8.x, Catalyst 65xx, Site-to-Site & Client-to-Site VPN's Protocols -RIP, OSPF, EIGRP, MPLS, VRF, TACACS+, IPSec, RADIUS, VoIP, SIP, QoS, CoS, 802.1xSecurity Communities & Standards-NIST, IANS, ISACA, GIAC, OWASP, ISECOM, CobiT, ITIL, VISA PCI DSS, Sarbanes-Oxley (SOX), HIPAA, Hi Tech, GLBA, CALEA
  • Relations
    Chargement... Veuillez patienter...
Cherchez-vous un(e) autre Joseph Jones , CISSP ?