VINCENT N. CANNADY
El Dorado Springs, Mo 64744
202-***-**** ****@****.***
Objectives
I am an Cyber Security Analyst with 25 years of Application Security. My background is in Cyber Threat Analyst with experience in Penetration Testing, Application Security, Nessus, NMAP, Fortify, Multiple Cloud Architecture, Palo Alto Firewalls. EDUCATION: Pennsylvania State University- World Campus Master of Professional Studies in Cyber Analytics and Operations May 2022
University of Missouri – Kansas City, Kansas City, MO Master of Arts, August 2013
Major Political Science
Bachelor of Arts May 2011
Major: Political Science
Psi Beta Sigma Political Science Honor Society
DeVry Institute Technology, Alpharetta, GA
Major: Technical Management (Dec 2004- Feb 2007)
Minor CIS (1991-1994) Associates Degree
2004-2006 National Dean’s List with a 3.54, selected for honor four times.
Powerpedia Digital Content Intern at the Department of Energy 09/2021-05/2022
Resume
WORK EXPERIENCE:
Experis at Kyndryl 05/2022-Present
(Remote) Principal Security Engineer
• Tech Review Report Creation
• Cyber Threat detection and monitoring
• Tenable Vulnerability Management Report Creation
• Tenable.io Vulnerability Scanning
• NodeZero Autonomous Pen Testing
• Tenable audit and compliance scanning and reporting
• Lead Cyber Policy and Testing Service engineer
• Lead a Team of Cyber Security Engineers
• Create Pentest reports Intrusion Detection- SIEM, IPS, IDS
• Instruct personnel in Cyber Security Protocols.
• Threat Assessment for Cyber Attacks using Nessus
• Cr eat e Vulnerability Management Remediation Reports
• Cr eat e Penetration Testing scenarios of Multi Cloud Environments Azure, AWS, Google Cloud, IBM Cloud (Bluemix)
• Cr eat e Penetration Testing scenarios using Teneable IO, Fortify,Burpsuite, and Wireshark
• Conducting risk and vulnerability assessments of planned and installed information systems to the network to identify weaknesses, risks, and protection needs etc. using programs designed specifically for this purpose.
National Veterans Service Bureau 06/2009-Present
(Remote) Senior Security Analyst
• Incident Handling and Incident Creation
• Cyber Threat detection and monitoring
• Intrusion Detection-SAST, DAST, SIEM, IPS, IDS, Mobile Applications for IoS and Android Devices and medical devices
• Instruct personnel in PII protection
• Tenable Vulnerability Management Report Creation
• Tenable.io Vulnerability Scanning
• NodeZero Autonomous Pen Testing
• Tenable audit and compliance scanning and reporting
• Lead Cyber Policy and Testing Service engineer
• Lead a Team of Cyber Security Engineers
• Threat Assessment for Cyber Attacks using Nessus for IoT
• Penetration Testing using Cain and Able Password Cracker, Nmap for Networks
• Penetration Testing using Eraser, SuperScan, Kikto, Burpsuite, and Wireshark
• Penetration Testing of medical and wireless (mobile) devices
• Conducting risk and vulnerability assessments of planned and installed information systems to the network to identify weaknesses, risks, and protection needs etc. using programs designed specifically for this purpose.
• Installing and maintaining software and hardware, controls current versions and future releases of applications software, and documents the physical configuration of an information system.
•Ensuring that the hardware and software components of the network infrastructure are properly configured and that the security features and controls appropriate to the intended level of system operation are properly set.
• Maintaining mobile systems, networks, security, medical devices and connectivity to ensure sound security
principles.
• Utilizing computer-based system applications and software including databases and inventory systems sufficient to monitor and track program requirements (i.e., SharePoint), milestones and schedules.
• Maintaining and coordinating activities (such as Mobile Systems and Medica Devices, Network/IT Infrastructure Upgrades,
Network/IT Resource deployment or Net) to support an organization's office automation efforts.
• Evaluating and initiating appropriate action on requests to satisfy new/unique requirements for the security of various operating systems.
• Integrating, maintaining, and enhancing information management and information technology programs to provide systems, tools, and analytical capabilities.
• Supporting information security activities, initiatives policies, procedures and programs for the security of various operating systems.
• Coordinating development and implementation of policies and standards for classified network systems regarding sharing and safeguarding classified information.
• Integrating, maintaining, and enhancing information management and information technology programs to provide systems, tools, and analytical capabilities.
• Managing an organization's office automation efforts to integrate, maintain, and enhance the organization's information management and information technology programs to provide systems, tools, and analytical capabilities in support of the organization's mission and operations.
• Utilizing computer-based system applications and software including databases, computer-aided design, and inventory systems sufficient to monitor and track program requirements (i.e., SharePoint), milestones and schedules.
• Coordinating development and implementation of policies and standards for classified network systems regarding sharing and safeguarding classified information computer network.
• Implementing, managing, maintaining, and coordinating activities (such as Network/IT Infrastructure Upgrades and Network/IT Resource deployment) both technical/non- technical, for short/long-term milestones to support an organization's office automation efforts.
• Integrating, maintaining, and enhancing information management and information technology programs to provide systems, tools, and analytical capabilities.
• Providing in-depth and independent information technology guidance, services, advice, and recommendations to leadership on information security matters.
• Performing network monitoring and intrusion detection ensuring sound security principles.
GPS Staffing at Sprint 05/2019-01/2020
(Remote)Cyber Security Incident Analyst Tier II
• Use NMAP and Nessus to Identify Cyber Threats to Sprints Infrastructure
• Setup and Monitor Palo Alto Firewall Settings
• Create Tickets for Incidents and Cyber Threats
• Oracle ERP E Business Suite R12.2
• Deployment Specialist from Test to Production
• Network Threat Assessment using Nessus
• Threat Assessment for Wireless Devices
• Work with Offshore Tier II Support for Cyber Threat Analyst State of Missouri ITSD/DOLIR 07/2015-05/2018
(Remote)Cyber Security Specialist I
• Application Security using Nessus, Veracode, Fortify, and App Scan
• Analyzing Cyber Threats using IPS/IDS
• Setup settings and Monitoring Palo Alto Firewalls
• Review Aggregate Logs for Threats
• Threat Assessment for Cyber Attacks on Wireless Devices (IoT, IoS, Android)
• Penetration Testing using Veracode • JBoss, Eclipse, Hibernate,
• Review Veracode Report for CRLF and Java Source Security Controls
• Review Veracode Report for Cross Site Scripting
USDA Agriculture Security Operations Center 01/2013-06/2013 Cyber Security Specialist-
• Penetration Testing using LCD Windows Cracker, Nmap for Networks
•Incident Handling and Incident Creation
•Review STACK information if Intrusion Detection
•Review Java Source Code for Security Controls.
•Threat Assessment for Cyber Attacks
• Application Security using AppScan and fortify
• Instruct USDA Personnel on PII protocol.
CSC 9/2008 – 5/2009
BOEING Systems Analyst
•Built Supplier Parts Internet Interface using Flex 3.0, Java, JSP, and Web Services.
•Tools used included MySQL 3.0, GlassFish Web Server, Tomcat 6.0, NetBeans 6.5.
•Create Flex Sites, MySQL Database, wrote stored procedures, XML templates.
•Responsible for CVS setup, Web Service(.wsdl) creation and source code review, and deployment.
•Controlled Access to Remote Servers, wrote Flex code.
•Monitored Web Traffic, wrote web services for connections to customer AIX Database.
• Threat Assessment for Cyber Attacks
• Penetration Testing using Eathereal now known as Wireshark, Eraser for Data Intrusion
• Application Security access control using Active Directory Matrix Resources 3/2008 – 9/2008
AT&T Web Administrator
•Administration of Multiple Coldfusion MX8 Servers, performed server maintenance.
•Assign usernames and password using Active Directory.
•Create Flex Sites, SQL Server 2005 Database, wrote stored procedures, XML templates.
•Responsible for 15 of developer web accounts to include SVN, FTP, SMTP.
•Controlled Access to Remote Servers using Active Directory,
•Monitored Web Traffic, White, Black, and Grey Box Security Scanning
• Threat Assessment for Cyber Attacks using manual source code review techniques
• Penetration Testing using John the Ripper Password Cracker, Nessus remote security scanner, Tech Center 2/2007 – 3/2008
MIS Manager
•Develop and analyze code for errors with development tools such as Cold Fusion MX7, MS Project, C#.NET, MS SQL, Ajax, SVN, and Agile Methodology.
•Controlled the Setup IIS 5.0, Cold Fusion MX Server, Flex 2.0, SQL Server, Visual Studio and VSS.
• Deployed all Code for production, quality assurance, and development web servers.
• Managed a team of sixteen Developers using MS Project.
• Μy team controlled access to network resources using Active Directory.
• Mentored junior programmers in code development and analyzing techniques.
• Threat Assessment for Cyber Attacks
• Application Security using HP Fortify and AppScan
• Penetration Testing using John the Ripper
Yoh IT Services at Sprint University 11/2006 – 2/2007 Performance Technologist
•Administration of Multiple Coldfusion Servers, performed server maintenance
•Assign usernames and password for 250 Developers using Active Directory.
• Threat Assessment for Cyber Attacks using code review of Java Source Code
• Penetration Testing using John the Ripper Password Cracker
• Application Security using HP Fortify and IBM AppScan
•Create Flex Sites, SQL Server 2005 Database, wrote stored procedures, XML templates. •Very High Level Position responsible for 100's of developers
•Controlled Access to Remote Servers, wrote AJAX code.
• Coordinated major University Human Resource Project for Sprint using MS Project Nextel and Embarq.
Matrix at Douglas County Sheriff’s Office – Douglas County, GA 11/05 – 11/2006 Programmer/Analyst
• Integrated GEOMETRIX, BIOMETRIX face recognition software and jail management system.
• Develop jail management system using Cold Fusion MX7, Flex 2.0, Dreamweaver 8, SQL Server 2003, CFC’S Web Services, C#.NET, SQL Server 2003.
• Integrated JMS, GEOMETRIX, and CrossMatch fingerprinting technology.
• Managed team of Developers from JMS, GEOMETRIX, and Crossmatch using Active Directory
ADP - Alpharetta, GA 12/2002 – 7/2005
Programmer Analyst
• Develop and analyze code for errors with development tools such as Cold Fusion 5.0, MS Project, ASP.NET, MS SQL, VSS, .
• Controlled the Setup IIS 5.0, Cold Fusion MX Server, C#.NET, Flex, SQL Server, Visual Studio, and VSS.
• Mentored junior programmers in code development and analyzing techniques.
• Managed a team of Programmers and Project Managers.