Michael Giddens Email and Phone Number
Michael Giddens work email
- Valid
- Valid
Michael Giddens personal email
- Valid
Michael Giddens is a Computer Network Defense Consultant, Engineer and Analyst at ECS. He possess expertise in network security, information security, disaster recovery, operating systems, military operations and 8 more skills.
-
Information System Security EngineerEcs Nov 2021 - PresentFairfax, Va, Us -
Vulnerability Management Consultant And AnalystExcelerated Analytics Aug 2018 - Oct 2021Stafford, Virginia, Us• Oversee integration of one new and two existing Splunk Enterprise application (SPK) environments across 3 networks. • Collaborate with systems administration and cybersecurity teams to lead the ongoing improvement and evolution of SPK through OS and SPK application patching, configuration and customization of SPK network analysis tools and features. • Utilize IT principles, methods, and security regulations to recommend SPK environment architectural design improvements and customizations for physical and logical topology.• Utilized IT principles methods and security regulations to manage all aspects of data management and access to systems such as user access, role user role assignment, user and applications permissions, and SPK configuration file mapping and security structure.• Design, create, and maintain system configurations documentation and network topology maps. • Attend Technology Review Boards (TRB) to speak for any proposed improvements to organizations cybersecurity tools and systems. • Developed and ran testing procedures on changes to applications and systems and developed reports for leadership on results for approval to implement changes.• Monitor SPK host OS system’s physical and logical resources such as disk, CPU, memory, and network interface cards to ensure efficient use of logical network and system resources. • Leverage both open source and vendor specific SPK applications and addons that improve functionality, security, and automate critical functions performed by SPK. • Provide quality customer service in interaction with customers both within the organization and with third party vendors when addressing concerns, request, or expanded capabilities related to the SPK environment.• Adhere to organizational policies regarding safeguard of classified information being used and stored on network systems and applications. -
Information Security Compliance Auditor / Acas Technical SmeGeneral Dynamics Information Technology May 2018 - Aug 2018Falls Church, Virginia, Us• Used IT principles, methods, and DOD mandated policies to manage and perform the installation, administration, security configuration, and OS and application maintenance for the Assured Compliance Assessment Solution (ACAS) product Tenable Security Center (SC) and Nessus Vulnerability Scanner (NS) environment across 3 networks. • Planned, coordinated testing for, and executed integration of new SC and NS physical and logical design to improve vulnerability scanning and analysis capabilities. • Wrote best practice policies on standard operating procedures (SOP) related to scanning activity based on DOD and Army established operational and INFOSEC policies and methods. This included scan configurations, automated reporting cycle and content, patching and maintenance cycles, network topology maps and baseline configurations, vulnerability management guidelines and requirements, as well as technical documentation on the configuration steps.• Attend Technology Review Boards (TRB) to speak for any proposed improvements to organizations cybersecurity tools and systems. • Work closely with systems administrators and network team to troubleshoot a variety of hardware, software, network related issues causing such as failed disk, CPU and memory exhaustion, network routing, failed software functions, and configuration file corruption or misconfiguration.• Used online open-source and government-based vulnerability reporting resources to track and identify new emerging threats. Leveraged these resources to gain insight needed to customize our vulnerability definitions packages used during scans to look for these new threats granting us detection capabilities long before vendor release of the package update; a capability that provide critical to the organization.• Adhered to established organizational policies regarding INFOSEC methods and procedures related to classified information being used and stored on network systems and applications. -
Information Assurance Analyst IiLynxnet, Llc Aug 2017 - May 2018Suffolk, Va, Us• Develop reports within Security Center detailing vulnerability characteristics critical to leadership decision making and patch operation management.• Plan and execute effective scan cycles by identifying environment variables such as routing reboot periods, maintenance outages, routine system unavailability, and optimum scanning timeframes.• Create and maintain Security Center scans, asset list, scan policies, Nessus scanners, reports, credentials, and user accounts.• Troubleshoot a variety of scan server issues such as connection timeout, authentication errors, protocol errors, plugin updates, and scan run time latency.• Asses and lead repair efforts regarding remote site Security Analyst access to Security Center to include account configuration, permissions, network routing and switching, and firewall transversal.• Review Security Center System logs to gather pertinent information to be used in solution research.• Monitor, retrieve, translate, and facilitate implementation of Operational Orders across numerous official DOD and ARMY resources. -
Systems EngineerUicgs / Bowhead Family Of Companies Jun 2017 - Aug 2017Springfield, Virginia, Us• Ensure compliance with DOD network security standards by scanning the network for vulnerabilities with tools such as Assured Compliance Assessment Solution (ACAS).• Run Security Content Automation Protocol (SCAP) scans on network devices to identify non-compliance with Security Technical Implementation guidelines (STIG) which address system security vulnerabilities.• Develop solutions to remediate STIG vulnerabilities through configuration and deployment of items like group policies, configuration files, third party security products, and written policies governing routine security practices and operations.• Perform patch management by utilizing central management products such as IBM’s BigFix and Microsoft’s Windows Server Update Service (WSUS).• Configured management products such as System Center Configuration Manager to collect and deploy patches and updates to domain products and endpoints.• Troubleshoot a variety of Windows Server and Workstation issues such as group policy propagation, access to network resources, application errors, data traffic flow, and system image issues. -
Systems Administrator Level 2Digital Consultants, Llc Apr 2016 - Jun 2017• Served primarily as a Windows OS system administrator with collateral duties in virtualization, patch management, and print management. • Installed and configured VMware vSphere 6.0 on 10 Dell Power Edge T330 ESXi embedded servers.• Responsible for installation, configuration, and maintenance of new and existing 2008 and 2012 Windows servers within VMware’s vCenter 5.0 and vSphere 6.0.• Configured Redundant Array of Independent Disk 5 (RAID 5) for performance and redundancy on 5 ESXi host. • Performed vulnerability testing on systems with tools like Security Content Automation Protocol (SCAP) Compliance Checker (SCC) and ACAS to find violations in patch management group policy. • Managed vulnerabilities by configuring group policies designed to mitigate vulnerabilities through Active Directory (AD) and locally through GPO editor snapin.• Completed regular system patching necessary for vulnerability risk mitigation on over 200 Windows 2008 and 2012 servers across both unclassified and secret networks.• Designed and deployed NCIS multifunction printer (MFP) technical configuration and security guide.• Provided consultation and troubleshooting as print environment technical expert for 150 MFP’s across 17 sites on issues with PKI login, scan to network, scan to email, access control, and network security.• Performed daily troubleshooting of information system technologies, applications, services, and network communication.• Delivered weekly briefings to departmental leadership covering status of projects, technical implementations, and projected timelines.• Assisted in assuring backup and storage procedures are in place protecting data from potential loss.
-
User Support Specialist Level 2 (L2) LeadDigital Consultants, Llc Sep 2015 - Apr 2016• Simultaneously managed L2 workflow, image repair operations, and special projects in support of over 2000 Naval Criminal Investigative Service Headquarters (NCIS HQ) government and contract workers.• Worked daily to collaborate multiple information technologies (IT) and services across 6 IT disciplines used to accomplish the NCIS core mission.• Provided support for Active Directory (AD) account issues, NIPR and SIPR domain access, rights and permissions, and application functionality to 63 executive staff members.• Provided support for video and data communications systems as well as troubleshoot video teleconference (VTC) network connection issues.• Followed policies and procedures when making changes to systems, permissions, or configurations.• Utilized Microsoft Management Console (MMC) and Local Registry Edit (regedit) to identify issues with access to local or network files, folders, applications and services. • Used PowerShell or Command Prompt to verify network device status, troubleshoot system configuration, and perform installation of software.• Used Windows command prompt to correct missed check-in to critical update services such as WSUS for NIPR and SIPR systems. • Used AD as well as MMC to examine group policy and permissions to troubleshoot local and network resource access.• Utilized McAfee Host Intrusion Protection System to pinpoint issues with security compliance and resource access.• Checked various servers for DISA STIGs compliancy utilizing the STIG Viewer and SCAP Scans• Review TCP/IP configurations on devices such as desktops, printers, and Video Teleconference terminals to troubleshoot network functionality.
-
Proprietary Systems Specialist Tier 1Caci International Inc. Mar 2015 - Jul 2015• Provided excellent service supporting development of strong relations with end-user• Interviewed customers to develop an understanding of users underlying issues.• Developed and implemented a reliable solution that is tailored to meet the needs of user’s troubles.• Accessed user account information in active directory to troubleshoot a variety of account issues.• Identified password expirations and reset user’s password.• Walked users through mapping of important share folders needed for daily tasking.• Followed proper procedures when granting users rights to distribution and security groups.• Performed troubleshooting of a variety of applications and software both internal and external to the enterprise network.• Developed solutions for remote users trying to access enterprise services from external networks.• Accepted user’s requests through Service Now and processed or routed tickets accordingly.• Identified and sent notifications for planned and emergency outages on critical servers and applications.• Created new user accounts and configured initial permissions, exchange accounts, and drive maps.• Performed removal of user accounts from the active directory when requested per designated policy.
-
Network Services Technician.Bright House Networks Jul 2013 - Mar 2015• Built strong relationship with customers which resulted in end-user satisfaction.• Interviewed customer to collect information about the problem and develop a solution.• Performed troubleshooting of customer issues with email, applications, telephone and wireless internet.• Optimized wireless transmission security • Routed trouble tickets to appropriate team on issues outside of field operation team’s scope.• Tracked progress on tickets routed to other teams to verify resolution has been met. • Configured cabling and splitters from tap to device ensuring maximum RF signal for highest quality service.• Traced RG-6, RG-11, RG-59, RJ-11, and RJ-45 transmission media to locate damages and repair.• Ran diagnostics on frequency and signal-noise ratio (SNR) to identify interference.• Organized and executed efforts to isolate the source of signal interference and make repairs.• Installed new network hardware in the customer’s home to establish networking services.• Made necessary firmware upgrades and configurations to customer’s home network to re-establish service.• Configured Mcafee on customer’s computer to ensure network protection.
-
Help Desk Technical AnalystOne Touch Direct May 2013 - Jun 2013Tampa, Fl, Us• First line assistances for client workstation hardware and software issues.• Provided remote administrative support for Windows 7 Operating System workstations.• Executed reimage and upgrades on workstations to restore system functionality.• Remotely troubleshoot a variety of printer software and hardware problems. • Operated within compliance with company security procedures and policies.• Administered password changes on customer accounts.• Unlocked accounts in the active directory. • Walked customers through troubleshooting steps to restore hardware or software failure. • Troubleshoot VOIP phone functionality and connection errors. -
Guest Service Team LeaderTarget Oct 2012 - May 2013Minneapolis, Mn, Us• Provided top-notch customer service while working through a variety of customers issues.• Planned, organized and executed store projects and sales deployments.• Troubleshoot basic hardware and software issues on guest service workstations.• Performed maintenance on printers.• Led troubleshooting efforts to clear printer paper jams and repair printers as needed.• Resolved credit card reader malfunctions; keeping checkout lanes operational. -
Information Security Program AssistantUnited States Navy Jun 2009 - Jul 2012Washington, Dc, Us• Assisted the Security Manager with daily task. Ensured daily procedures were complete. • Provided all hardware and software upgrades on security systems.• Operated the company’s information security systems.• Enhanced security through constant review and implementation of communications security (COMSEC) policy.• Integrated multiple information systems to provide encrypted video teleconferencing.• Configured settings on security systems equipment for optimum performance.• Designed the disaster recovery plan for organization communications security program.• Maintained and updated an inventory of the company’s information security systems. • Conducted monthly audit on equipment ensuring compliance with COMSEC policy. • Assisted with the evaluation and operational efficiency of new and existing systems.• Prepared and executed periodic COMSEC program evaluations.• Use Defense Message Systems to gather and analyze message traffic. -
Tactical Information Data Link TechnicianUnited States Navy Jun 2005 - Jun 2009Washington, Dc, Us• Established and maintained ship to ship tactical satellite network.• Fine-tuned network system settings to ensure data integrity over the transmission media.• Integrated information systems across multiple departments.• Participated in extensive testing periods to certify equipment and procedural operability.• Optimized hardware performance by completing periodic maintenance and inspection. • Analyzed defense message systems traffic for required changes to network configuration.• Lead efforts in encrypting transmissions and regulating cryptographic software updates.• Created a tactical network standard operating procedure based on Navy-wide policy.
Michael Giddens Skills
Michael Giddens Education Details
-
University Of Maryland Global CampusComputer Networks And Security
Frequently Asked Questions about Michael Giddens
What company does Michael Giddens work for?
Michael Giddens works for Ecs
What is Michael Giddens's role at the current company?
Michael Giddens's current role is Computer Network Defense Consultant, Engineer and Analyst.
What is Michael Giddens's email address?
Michael Giddens's email address is mi****@****ech.com
What schools did Michael Giddens attend?
Michael Giddens attended University Of Maryland Global Campus.
What are some of Michael Giddens's interests?
Michael Giddens has interest in Learning Japanese Culture And Language, New Technologies, Computer Networking And Security, Interactions, It Certifications, Digital Photography, International News, Travel, Professional Development, Affairs.
What skills is Michael Giddens known for?
Michael Giddens has skills like Network Security, Information Security, Disaster Recovery, Operating Systems, Military Operations, Information Analysis, Windows 7, Routers, Help Desk Support, Operational Planning, Security Operations, Information Retrieval.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial