Defense Cyberspace Operations - Penetration Tester- Cyber Threat Analyst- Cyber Threat Hunt- Incident Handling SUMMARY Significant experience in Defense Cyberspace Operations including Infrastructure Support, Packet Analysis, SIEM, Flow Data Analysis, Networking Security Engineering including Firewall, Bluecoat, VPN, staff supervision and project execution. • Recognized for successfully managing change, mitigating risk, infusing new ideas and delivering results that take enterprise system performance/productivity to the next level.• Adept at documenting and clearly presenting project plans and complex technical information to diverse audiences. • Successfully partner with business leaders and technical teams to plan, integrate, document and execute project plans on time and under aggressive deadlines.Specialties: SIEM: ArcSightO/S: Windows and LinuxNetwork Security: Sourcefire IDS, Bluecoat Proxy, Palo Alto Firewalls, Software: ArcSight ESM, ArcSight Logger, Wireshark, PCAP, Security Onion, BRO, Tanium, Syslog.
-
Penetration TesterKevon Security Llc Aug 2021 - PresentRemoteI specialize in Red/Purple Team Operations, Penetration Testing, Breach and Attack Simulations, Cloud Penetration Testing, and Network Hygiene.I have a solid understanding of exploitation and the different exploit/vulnerability classes with the ability to modify exploits and payloads to function with newly introduced defensive countermeasures.I Identify gaps and areas of improvement and supply recommendations to strengthen the posture of ones network. -
Cyber Warfare TechnicianUs Army Aug 2021 - PresentFort George G. Meade, Maryland, United States -
Senior Analyst (Cnd) / Threat Hunt LeadUs Army Oct 2019 - PresentUnited States Army Regional Cyber Center - Southwest AsiaI support, work, and collaborate with outside agencies like NSA, MITRE, and combined and joint organizations in my role as a Cyber Network Defender. I develop custom dashboards and analytics, utilizing the MITRE ATT&K framework, on the Security Information and Event Management console IOT detect indicators of compromise and other security events for hunting, incident handling , and incident response (IR) actions. I have conducted several Network Assistance Visits across the Area Of Responsibility in support of Numerous Operations consisting of network scanning, vulnerability assessments and wireless access point scanning. I provide recommendations and develop custom scripts for mitigation of vulnerabilities, insider threats, malicious cyber actors’, and the overall improvement of units’ cybersecurity posture. I provide expertise for the configuration and optimization of Security Onion, Bro logs (Zeek), Cisco’s FirePower Snort signatures, Splunk and ArcSight. -
Defense Cyberspace Operations Division NcoicUs Army Aug 2019 - Oct 2019United States Army Regional Cyber Center - Southwest AsiaCorrelate and analyze network security events to determine if anonymous and suspicious network activity warrants further investigation. Employs security logs, to include SNORT IDS alerts, BlueCoat Proxy logs, Netflow, Tanium, various system and firewall logs, as well as packet capture (PCAP) data. Ability to navigate and manipulate raw data in a Linux operating system environment. Maintain knowledge of Cyber Network Exploitation (CNE) actors’ exploitation tactics that aid in determining true malicious activity. Maintaining knowledge of common web vulnerabilities to aid in determine malicious CNE attempts. Initiate incident handling and response to probable network intrusions by identifying, locating, and isolating threat while further investigating how system/network incurred an infection/compromise and making recommendations to network and system administrators on hardening security to prevent repeat exploitation. Report all findings and categorize activities in accordance with CJCSM 6510.01B -
Senior Analyst (Dodin) / Network EngineerUs Army Sep 2018 - Jul 2019United States Army Regional Cyber Center - Southwest Asia• Monitor and audit events from various operating systems, databases, and applications. Analyze and correlate event data, create situational awareness, and provide trending reports for senior management. Conduct OSINT on new trending threats to determine Tactics, Techniques, and Procedures and implement this information in the monitoring process. Consolidate and deduce threat reports from various feeds, organizations, and platforms to provide rich, actionable intelligence throughout the environment. Mentor and assist junior analysts during investigations/ incidents helping grow their knowledge and skill set improving mission capabilities.• Managed, monitored and maintained situational awareness for all networks and systems at the enterprise level under the responsibility of the Regional Cyber Center - Southwest Asia (RCC-SWA), to include, answering service calls and emails; and creating and routing tickets using Remedy to the appropriate functional area for action.• Successfully provided technical/operational support for more than 100,000 functional users in the theater and responded to outages, degradation or other events affecting the networks for over 30,000 systems.• Experience in troubleshooting techniques in MPLS-TE -
Senior MechanicUs Army Jan 2018 - Sep 2018Fort HoodPerformed preventative maintenance and repairs on diesel engines and vehicles. I specialize in working with large trucks and generators. I also have experience in working on heavy machinery that utilizes hydraulics such as bulldozers, cranes, tractors, and forklifts -
Material Retrograde Team NcoUs Army Apr 2017 - Dec 2017AfricaServed as the Deployed Forward Material Retrograde NCO for the 13th Expeditionary Sustainment Command. Principle advisor to the 13th ESC and United States Army Africa (USARAF) on commodities, supply operations and managing information systems assets. Assess theater retrograde processes, identifies trends and provides analysis to improve operational efficiency ISO U.S. Forces retrograde operations in Uganda, Central African Republic(CAR) and South Sudan. Provided oversight, guidance, resources and assistance to USARAF, United States Army AfricaCommand (AFRICOM) and Special Operations Command Africa on tactical information systems, acquisition, storage, quality surveillance, issue and distribution of all Classes of supply. -
Platoon SergeantUs Army Mar 2015 - Apr 2017Fort HoodServed as the Headquarters Platoon Sergeant and Communications Specialist, responsible for the welfare, training, discipline, and morale of five NCOs and 19 Soldiers. Provided supervision and technical guidance to subordinates, supervises, plans and executes the installation, operation, and maintenance of all signal support systems to include local area and wide area networks and routers; responsible for network integration using radio, wire, satellite, and battlefield automated systems; directs unit signal training and provides technical advice and assistance. Managed automation setup, accountability, distribution and troubleshooting of information systems and devices valued at $1,763,073. -
Wheel Vehicle MechanicUs Army Apr 2013 - Mar 2015South KoreaPerformed preventative maintenance and repairs on diesel engines and vehicles. -
Wheeled Vehicle MechanicUs Army Apr 2012 - Mar 2013Fort Polk, LouisianaPerformed preventative maintenance and repairs on diesel engines and vehicles. -
Wheeled Vehicle MechanicUs Army Sep 2009 - Apr 2012South KoreaPerformed preventative maintenance and repairs on diesel engines and vehicles.
Sir Addison Education Details
-
General Studies
Frequently Asked Questions about Sir Addison
What company does Sir Addison work for?
Sir Addison works for Kevon Security Llc
What is Sir Addison's role at the current company?
Sir Addison's current role is Cyber Security Expert | OSCP.
What schools did Sir Addison attend?
Sir Addison attended Central Texas College.
Not the Sir Addison you were looking for?
-
sir_ addison
Ghana
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial