Accuvant Sep 2013 - Mar 2015
Senior Siem Security Analyst | Shift Lead I
Mantech Jun 2013 - Dec 2013
Senior Cyber Security Analyst
Lockheed Martin Aug 2010 - Jun 2013
Senior Cyber Intel Analyst | Shift Lead
Lockheed Martin Jun 2004 - Aug 2010
Senior Systems Engineer
Primerica Aug 1999 - Jan 2008
Personal Financial Advisor
Education:
Capitol Technology University 2013 - 2017
Masters, Engineering
University of Maryland Jan 2011
University College 2011
Bowie State University May 2004
Master of Science, Masters
Bowie State University 2000 - 2004
Masters, Management
University of Maryland Eastern Shore 1994 - 1998
Bachelors, Bachelor of Science
Capitol Technology University
Doctor of Medicine, Doctorates
Skills:
Memory Commitment To Excellence Ibm Team Operations Computing Cost Fortune 500 Jira Penetration Testing Mentoring Policy Development Perimeter Protection Hacking Incident Reporting Network Topology Sop Development Security Awareness Private Networks Cia Ssh Customer Support Siem Design Vulnerability Assessment Akamai Routers Computer Network System Architecture Initiation Resolve Powerpoint Splunk Cissp Crisc Human Resources Incident Response Security Incident Isolation Posture Server Monitoring Messaging Volunteering System Data Systems Security Operations Center Troubleshooting Education Essentials Hotels Inventory Enterprise Architecture Risk Management Security+ Bmc Remedy Policy Employee Training Sla Intranet Scripting Vpn Documentation Instant Messaging Commercial Real Estate Hardware Hospitals Local Area Information Technology Packet Protecting Calling Identity Theft Appliance User Training Viruses C Security Analysis Coordination Retail Holidays Doors Kaspersky Sensors Communication Negotiation Tcp Customer Needs Active Privacy Law Security Training Government Agencies Marketing Gaming Change Management Indicators Safeguard Authentication Systems Sourcefire Computer Networking Facilities Management Intellectual Property Cloud Computing Responsibility Banners Firewalls Policies and Procedures Regulations International Active Directory Threat High Quality Trust Structured Finance Security Architecture Design Diagnostics Arcsight Compliance Xss Addressing Facebook Microsoft Word Knowledge Base Proposal Writing Computer Technology Cryptography Sametime Aerospace Semiconductors Trojans Risk Technical Issues Logging Writing Carbon Black Netcool Flash Drives Patch Management Ids Overseeing Acting Vulnerability Customer Oriented Oracle Database Natural Gas Reconnaissance Network Mapping Finance Nids Access Control Physical Therapy Driving Network Devices Travel Wan Vortex Multi User Coaching Telnet Calls Cellular Communications Computer Information Systems Information Assurance Guiding Crm Metrics Senate Group Policy Auditing Alerts Accounting Linux Methodology Idp Outages Guidance Networking Local Area Network After Action Reviews Customer Satisfaction Mcafee Trade Unions 10K Switches Engineering Reports Innovative Solutions Branding Talent Management Mclean System Operations Operations Management Pts Testing Disaster Recovery Network Hardware Persistent Comsec Wealth Confidentiality Mitigation System Monitoring Netflow Investigation Compliance Management Microsoft Security Policy Command and Control General Practitioner Advertising Agency Tactics Systems Analysis Producing Large Enterprise Contingency Planning Multi Functional Space Query Writing Agile Environment Reactive Intel Advertising Quality Assurance Evasion Snmp Putty Time Management System Performance Balancing Project Planning Security Clearance New Trends Investment Banking Servers Media Utility It Solutions Bluecoat Arb Digital Certificates Intelligence Community Perfect Attendance Efficient Intrusion Detection Vectors Sidewinder Army Lotus Notes Solutions Oriented Finacial Recovery Planning Records Management Social Engineering Resolve Issues Outlook Requirement Specifications Content Filtering Compromise Network Communications Us Federal Independent Contributor Cracking Repeaters Polycom Network Defense Mergers and Acquisitions Architecture Evaluation Bridge Coordinated Quality Results Databases Network Forensics Reflection Os X Top Secret Chemical Citrix Security Intelligence Vendors Versed Performer Intelligence Systems All Source Intelligence Baselines Attachments Network Security Cyber Operations Examining Bots Windows 7 Organizational Structure Injectable Detection Closure Tier 2 Ddos Science Security Route Sop Analyzer Ic Gcih Publications Defense Source Collaborative Circuit Analysis Traffic Monitoring Thin Client Escalation Manuals Telecommunications Consciousness Threat Intelligence Healthcare Wireshark Trace Supervision Microsoft Office Risk Analysis V&V Microsoft Excel Encryption New Hire Training Customer Service Status Reports Mcafee Antivirus Communications Security Scheduling Remote Access Network Systems Remote Desktop Analysis Ratings Root Verizon Web Servers Rights Traceroute Dns Operating Systems Dos Applications Accountability Pattern Matching Detail System Administration Suite Asking Questions Visibility Petroleum Network Engineering Document Management Network Administration Polygraph National Security Microsoft Project Permissions Lockheed Martin Remediation Project Sql Malware Analysis Unix Nslookup Nature Linkedin Council Internal Audit Code Computer Hardware Cyber Defense Exploit Reviews Computer Security Dump Nips Java Organizational Behavior Hospitality Alarm Systems Event Monitoring Military Artemis Controlling Conceptual Modeling Wireless Delivery Disaster Bot Iss Network Administrators Test Engineering Consulting Ceh Insurance Technical Assistance Windows Situational Awareness Giac Incident Handling Cyber Security Spam Filtering Legal Information Security Management Accessibility Management Cyber File Systems User Interface Design Hardening It Security Operations Statistics Routing Chain Information Systems Monitors Security Incident Response Systems Engineering Execution Antivirus Security Operations Smtp Proventia Qradar Nitro Languages Business Services Cell Guarding Computer Information Offering Engagements Threat Analysis Tcp/Ip Support Agreement Visual Basic Leading People Training Forensic Analysis Point of Contact Adware Enterprise Software Critical Systems Rehabilitation Services Virtual Information Processing Mobile Computing Sflow Reporting Incident Internet Security Sscp Computer Forensics Information Security Unified Threat Management Workstations Accreditation Rehabilitation Training Manuals Appliances Debate Configuration Management Ips Forgery Protection Systems Operations Interactive Advertising Queries Credit Technical Support Software Engineering Rpt Analytical Support Intelligence Classification Refining System Development Computer Network Operations Selections Administering Government Electronics Information Security Engineering Prevention Sci Clearance Visio Sql Injection Software Ping Mac Video Comptia Network+ Case Management Business Continuity A+ Privacy Policies Test Cases Rate Spyware Federal Government Production Systems Console Hunting Scanners Rave Problem Solving Mis Meetings Messaging Security Ethical Hacking
Interests:
Football Pilates Art Arts and Culture Weight Lifting Digital Photography Health Children Electronics Education Environment Photography Science and Technology Exercising Human Rights Civil Rights and Social Action Poverty Alleviation Disaster and Humanitarian Relief Social Services Economic Empowerment Traveling Yoga Politics See Less Basketball Cycling See 4 Shopping Animal Welfare Track and Field
Internal Systems Developer at Ag Leader Technology
Location:
Ames, Iowa
Industry:
Information Technology and Services
Work:
Ag Leader Technology since May 2008
Internal Systems Developer
Pioneer Hi-Bred International, Inc. Mar 2003 - May 2008
Application Developer
Scalable Computing Laboratory 2001 - 2001
Research Assistant
Epson 1999 - 1999
Intern
Education:
Iowa State University 1998 - 2002
B.S., Major in Computer Science, Minor in English
Youtube
Scott 4.0 Cedarric Collins Exposed?!
theoriginalstrai... #LAMH MERCH STORE Original...
Duration:
16m 22s
March 13, 2023
My first vid show love.
Duration:
5m 18s
EXTREME Bite, Lick, Nothing with Collins and ...
EXTREME Bite, Lick, Nothing with Collins and Devan Key! *gross* with B...
Duration:
16m 55s
Cedric Collins - CB - Dallas, TX - Skyline HS
Video of college football prospect Cedric Collins class of 2014.
Duration:
57s
Cedric Collins 2014 Texas A&M CB Commit ABC 40
Sports sometimes can take our greatest passion away from us, but it is...
on the promise of a scholarship to an athlete who was no longer able to play the game. Cedric Collins (Skyline High/Dallas) will never play again after experiencing numbness in his legs after a hit in 2012, according to The Dallas Morning News, but Texas A&M nonetheless awarded him a scholarship.
recruiting class will never play a down of football for the Aggies. Dallas Skyline cornerback Cedric Collins committed to the Aggies before his junior year in 2012, but discovered at the end of that season that he had a rare congenital cervical problem and couldnt continue his football career. The
Date: Feb 05, 2014
Category: Sports
Source: Google
Guards shoot at teen outside FDA office in Bothell
A 15-year-old boy sped off after the gunfire at about 7 a.m., leaving muddy ruts through a parking strip. He was involved in a hit-and-run accident about a mile away on state Route 527 and then was tracked to his home, said Bothell police Sgt. Cedric Collins.
Cedric Collins (1977-1981), Bobby Lewis (1980-1984), Joyce Davis (1970-1974), Valerie Wiley (1976-1980), Tanya Tribble (1989-1993), Jeanette Allen (1998-2002)