Splunk search not updating

Mentored and guided Marines to allow them to achieve full potential.Instructed Marines on various military and intelligence subjects Intelligence Analysis, CIDNE, HUMINT, Intelligence, Analyst Notebook, Counterinsurgency, Counterintelligence, Data Loss Protection, Afghanistan, Falcon View, Tactics, Palantir, Marine Corps, Security Management, Security Clearance, Intelligence Community, Counterterrorism, Intelink, Military Operations, SIGINT, All-Source Intelligence, Reconnaissance, M3, Google Earth, JPAS, C2PC, CPOF, Intelligence Operations, Active TS/SCI Clearance, JWICS, SIPRNET, Counter-insurgency..., All-Source Analysis, Intelligence Collection, Analyst Briefings, Microsoft Office, Leadership, Link Analysis, Training, SPLUNK, Counter-insurgency analyst During this time, Brandon was responsible for the overseeing of all production and analysis at 6th Marine Regiment.Responsible for the installation and maintenance of LAN/WANResponsible for 15 help desk team that was responsible for responding to network issues and maintaining a ticket database at a command that employed 750 personnel and 30 training units.COMSEC, CRYPTO, DIACAP, Security Clearance, Security, Information Assurance, Network Security, Computer Security, Military, Do D, Leadership, Training, Command, Government, Software Documentation, Army, Analysis, Defense, Government Contracting, Top Secret, Management, Navy, Integration, FISMA, Troubleshooting, Network Engineering, Routers, C&A, System Administration, Disaster Recovery, Networking, Program Management, Intelligence, Testing, Security , Servers, Information Security, Systems Engineering, Software Installation, Technical Writing, Computer Hardware, VMware, Vulnerability Assessment, LAN-WAN, Proposal Writing, SIGINT, CISSP, Intelligence Analysis, Help Desk Support, Information Technology, Air Force, solutions, architecture Responsible for sending over the air CRYPTO to deployed units Responsible for inventorying all CRYPTO equipment Responsible for ordering CRYPTO while deployed Responsible for download over the air CRYPTO while deployed Information processing using computer terminals observing all applicable security measures.Write and brief both current and long term studies to steer operations and exploit intelligence information.

Created a single radar picture even though multiple radars might be tracking the same object.

Management and training of subordinates were required to ensure the efficient operation of the intelligence section.

Intelligence Analysis, CIDNE, HUMINT, Intelligence, Analyst Notebook, Counterinsurgency, Counterintelligence, Data Loss Protection, Afghanistan, Falcon View, Tactics, Palantir, Marine Corps, Security Management, Security Clearance, Intelligence Community, Counterterrorism, Intelink, Military Operations, SIGINT, All-Source Intelligence, Reconnaissance, M3, Google Earth, JPAS, C2PC, CPOF, Intelligence Operations, Active TS/SCI Clearance, JWICS, SIPRNET, Counter-insurgency..., All-Source Analysis, Intelligence Collection, Analyst Briefings, Microsoft Office, Leadership, Link Analysis, Training, SPLUNK, Counter-insurgency analyst Ordered COMSEC for command departments.

CRYPTO, ACCES, management, security, operate, network servers, patch panels, modems, router, multiplexers, DIACAP, Security Clearance, Security, Information Assurance, Network Security, Computer Security, Military, Do D, Leadership, Training, Command, Government, Software Documentation, Army, Analysis, Defense, Government Contracting, Top Secret, Management, Navy, Integration, FISMA, Troubleshooting, Network Engineering, Routers, C&A, System Administration, COMSEC, Disaster Recovery, Networking, Program Management, Intelligence, Testing, Security , Servers, Information Security, Systems Engineering, Software Installation, Technical Writing, Computer Hardware, VMware, Vulnerability Assessment, LAN-WAN, Proposal Writing, SIGINT, CISSP, Intelligence Analysis, Help Desk Support, Information Technology, Air Force, solutions, architecture Provide information security engineering and compliance support to Navy hospitals effort to combine electronic medical record system into a cloud environment.

Ensuring that the infrastructure meets or exceeds HIPAA, FISMA and Nist 800-53 controls standards in protecting data.• Ensure compliance with HIPAA, PCI-DSS and NIST 800 • Manage adherence to NIST 800-53 for cloud and virtual environment• Test analyze web applications • Manage Risk Management planning, analyzing and testing security plans • Conduct Nessus security vulnerability scanning and Analyst results for vulnerabilities• Design software and hardware for network infrastructure• Develop and Manage Information Assurance Vulnerability Management (IAVM) plans• Review all security related documents and test plans• Work with administrators and team leads to ensure each team member only have access required by their job role and level of responsibility • Work cross teams to ensure all projects and task are on schedule• Work with developers to ensure software security to protect user data• Manager Public and Private key store• Review audit logs from WINDOWS, Linux, IDS, IPS and firewalls HIPAA, FISMA, NIST, WINDOWS, Linux, IDS, DIACAP, Security Clearance, Security, Information Assurance, Network Security, Computer Security, Military, Do D, Leadership, Training, Command, Government, Software Documentation, Army, Analysis, Defense, Government Contracting, Top Secret, Management, Navy, Integration, Troubleshooting, Network Engineering, Routers, C&A, System Administration, COMSEC, Disaster Recovery, Networking, Program Management, Intelligence, Testing, Security , Servers, Information Security, Systems Engineering, Software Installation, Technical Writing, Computer Hardware, VMware, Vulnerability Assessment, LAN-WAN, Proposal Writing, SIGINT, CISSP, Intelligence Analysis, Help Desk Support, Information Technology, Air Force, solutions, architecture Provide consolidated all-source, multi-agency intelligence support to the Office, Director of National Intelligence (ODNI) principals by leveraging the expertise and resources of all the intelligence communities’ operations centers.

Leave a Reply