Resumes
Resumes
Berlyn Mchenry
View pageLocation:
Atlanta, GA
Industry:
Computer & Network Security
Work:
Security Management & Integration
Senior Network Security Analyst
Infosec Institute
It Specialist
Teksystems Orascom
Senior Network Security Analyst
Trace Systems
Senior Security Engineer
Quantum Research Int'l
Senior Network Security Analyst
Senior Network Security Analyst
Infosec Institute
It Specialist
Teksystems Orascom
Senior Network Security Analyst
Trace Systems
Senior Security Engineer
Quantum Research Int'l
Senior Network Security Analyst
Education:
Strayer University Jul 2013
Master of Science, Masters Capella University Jul 2010
Master of Science, Masters Park University 2004
Bachelors, Bachelor of Science
Master of Science, Masters Capella University Jul 2010
Master of Science, Masters Park University 2004
Bachelors, Bachelor of Science
Skills:
Consulting
Top Secret
Help Desk Support
Ids
Windows Server
Ceh
Corrective Actions
Overseeing
Cap
Windows
Vendors
Community
Us Army
Computing
Situational Awareness
Data Entry
Vulnerability
Students
Programmatic
Penetration Testing
Policy Development
Security Controls
Information System
Symantec Endpoint Protection
Oversight
Investigative Research
Significance
Hacking
Sep Ira
Network Security
Theatre
Continuous Monitoring
Afghanistan
Windows Xp
Information Security Management
Assessment
Detection
Epo
Cnd
Management
Design
Modification
Pc
Cyber
Impact Assessment
Vulnerability Assessment
Windows System Administration
Comptia
Security
Contractors
Security Products
Desktop Computers
Computer Information Systems
Command Center
Information Assurance
Integration
Routers
Epolicy Orchestrator
Aid
Data Storage
Information Systems
Security Research
Monitors
Chfi
Ssps
Defense
Requirements Analysis
Linux
Cissp
Baseline
Human Resources
Antivirus
Security Operations
Incident Response
Georgia
Migrating
Guidance
Messaging
Networking
Posture
Local Area Network
Network Development
Troubleshooting
System
Mcafee
Business Services
Security Operations Center
Data Recovery
St&E
Atlanta
Switches
Data Systems
Wireshark
Tests
Data Processing
Validation
Asia
Engineering
Reports
Homeland Security
Disease Control
Element
Windows 2000
Trace
Red Hat Linux
Tcp/Ip
Vulnerability Management
Destruction
Strategies
Related Activities
Fedora
Kuwait
Testing
Encryption
Security+
Cobol
Training
Forensic Analysis
Policy
Development of Programs
Soc
Customer Service
Bmc Remedy
Enterprise Software
Retina
Disaster Recovery
Image
Subject Matter Expert
Quantum
Virus
Documentation
Hardware Installation
Vpn
Research
Remote Access
System Monitoring
Reporting
Internet Security
Investigation
Operational Support
Microsoft
Guides
Analysis
Hardware
Written
Security Policy
Advertising Agency
Local Area
.Net
Information Technology
Snort
Information Security
Workstations
Accreditation
Cdc
Viruses
C
Coordination
Computer Operations
Configurations
Data Control
Fix Protocol
Operating Systems
Virginia
Applications
Hercules
A+ Certified
Interfacing
Sensors
Logistics
Accountability
Comptia Network+ Certified
Y2K
Phase 2
Ips
System Administration
Active
Privacy Law
Protection Systems
Operations
Suite
Triage
Military Personnel
Risk Assessment
Document Management
Network Administration
Intrushield
Security Management
Safeguard
Technical Support
Project Planning
Security Clearance
Microsoft Certified Professional
Remediation
Contractual Agreements
Computer Networking
Supports
Ftp
Fisma
Classroom
Unix
Data Migration
Incident Investigation
Dod
Static
Servers
Diacap
Emergency Services
Laptops
Presentations
National Operations
Silk
Responsibility
Tcpdump
Means
Firewalls
Policies and Procedures
Regulations
Meaningful
Security Certification
Camp
Software Design
International
Art
Justice
Contract Management
Nsa
Information Server
Security Engineering
Active Directory
Intrusion Detection
Threat
Open Source
Army
Software Installation
Curriculum Design
Computer Network Operations
Teaching
Disa Gold Disk
Network Connectivity
Reviews
Gold
Electronics
Watches
Stat
Government
Harris
Disclosure
Computer Security
Nist
Legal Advice
Bridge Inspection
Nispom
Hbss
Software
Windows Nt
Arcsight
Compliance
Sensitive Information
Mcsa
A+
Network Communications
C&A
Internal Controls
Asset
Telephony
Military
Platforms
Iaso
Host Intrusion Prevention
Contingency
Network+
Budgets
Scanners
Compliancy
Currently Pursuing
Tipping Point
Risk
Technical Implementation
Customer Base
Architecture
Evaluation
Lans
Coordinated
Automation
Vulnerability Scanning
Prototype
Databases
Top Secret
Help Desk Support
Ids
Windows Server
Ceh
Corrective Actions
Overseeing
Cap
Windows
Vendors
Community
Us Army
Computing
Situational Awareness
Data Entry
Vulnerability
Students
Programmatic
Penetration Testing
Policy Development
Security Controls
Information System
Symantec Endpoint Protection
Oversight
Investigative Research
Significance
Hacking
Sep Ira
Network Security
Theatre
Continuous Monitoring
Afghanistan
Windows Xp
Information Security Management
Assessment
Detection
Epo
Cnd
Management
Design
Modification
Pc
Cyber
Impact Assessment
Vulnerability Assessment
Windows System Administration
Comptia
Security
Contractors
Security Products
Desktop Computers
Computer Information Systems
Command Center
Information Assurance
Integration
Routers
Epolicy Orchestrator
Aid
Data Storage
Information Systems
Security Research
Monitors
Chfi
Ssps
Defense
Requirements Analysis
Linux
Cissp
Baseline
Human Resources
Antivirus
Security Operations
Incident Response
Georgia
Migrating
Guidance
Messaging
Networking
Posture
Local Area Network
Network Development
Troubleshooting
System
Mcafee
Business Services
Security Operations Center
Data Recovery
St&E
Atlanta
Switches
Data Systems
Wireshark
Tests
Data Processing
Validation
Asia
Engineering
Reports
Homeland Security
Disease Control
Element
Windows 2000
Trace
Red Hat Linux
Tcp/Ip
Vulnerability Management
Destruction
Strategies
Related Activities
Fedora
Kuwait
Testing
Encryption
Security+
Cobol
Training
Forensic Analysis
Policy
Development of Programs
Soc
Customer Service
Bmc Remedy
Enterprise Software
Retina
Disaster Recovery
Image
Subject Matter Expert
Quantum
Virus
Documentation
Hardware Installation
Vpn
Research
Remote Access
System Monitoring
Reporting
Internet Security
Investigation
Operational Support
Microsoft
Guides
Analysis
Hardware
Written
Security Policy
Advertising Agency
Local Area
.Net
Information Technology
Snort
Information Security
Workstations
Accreditation
Cdc
Viruses
C
Coordination
Computer Operations
Configurations
Data Control
Fix Protocol
Operating Systems
Virginia
Applications
Hercules
A+ Certified
Interfacing
Sensors
Logistics
Accountability
Comptia Network+ Certified
Y2K
Phase 2
Ips
System Administration
Active
Privacy Law
Protection Systems
Operations
Suite
Triage
Military Personnel
Risk Assessment
Document Management
Network Administration
Intrushield
Security Management
Safeguard
Technical Support
Project Planning
Security Clearance
Microsoft Certified Professional
Remediation
Contractual Agreements
Computer Networking
Supports
Ftp
Fisma
Classroom
Unix
Data Migration
Incident Investigation
Dod
Static
Servers
Diacap
Emergency Services
Laptops
Presentations
National Operations
Silk
Responsibility
Tcpdump
Means
Firewalls
Policies and Procedures
Regulations
Meaningful
Security Certification
Camp
Software Design
International
Art
Justice
Contract Management
Nsa
Information Server
Security Engineering
Active Directory
Intrusion Detection
Threat
Open Source
Army
Software Installation
Curriculum Design
Computer Network Operations
Teaching
Disa Gold Disk
Network Connectivity
Reviews
Gold
Electronics
Watches
Stat
Government
Harris
Disclosure
Computer Security
Nist
Legal Advice
Bridge Inspection
Nispom
Hbss
Software
Windows Nt
Arcsight
Compliance
Sensitive Information
Mcsa
A+
Network Communications
C&A
Internal Controls
Asset
Telephony
Military
Platforms
Iaso
Host Intrusion Prevention
Contingency
Network+
Budgets
Scanners
Compliancy
Currently Pursuing
Tipping Point
Risk
Technical Implementation
Customer Base
Architecture
Evaluation
Lans
Coordinated
Automation
Vulnerability Scanning
Prototype
Databases