Profiles search
Andrew Burnette
CCNA | Solutions Architect | Security+ | MS Cybersecurity | Security is a process not a product
North Port, FL, United States
Details
Experience:
Devise mitigation plans against both external and internal vulnerabilities to enterprise computer infrastructures and sensitive digital assets
Analyzes and evaluates multiple risk assessment methods and strategies
Compares and contrasts the legal and ethical aspects of cybersecurity at the Federal, State, and International level
Assesses and summarizes the legal and ethical requirements of a cyber security professional
Integrates project management skills to produce a cybersecurity solution
Evaluates the results of a security assessment to assess the security status of a network or computer system
Conducts in-depth research into a specific cybersecurity topic, including finding and integrating relevant research results of others
Integrates systems-level-infrastructure thinking into cybersecurity problem identification and resolution, and effectively communicate the solution
2022 : Present
National University
MS Cybersecurity
Develops and maintains a high level of confidence providing VoIP solutions to meet business requirements. Deploy, configure, and manage VoIP and PBX phone systems for hundreds of new businesses across the United States. Works closely with business owners to ensure configuration of PBX meets the operational and strategic requirements of the company.
2021 :
Lightspeed Voice
VoIP System Implementation
Experience with router configurations and other networking concepts including switches, IP telephones, and VPNs. Effectively troubleshoot networking issues in LANs, WANs, and WLAN environments and internet connectivity issues using various common network troubleshooting tools. Troubleshoot, repair, configure, and optimize VoIP networks and PBX systems for over 4000 offices ranging from 3 to 200+ users. Demonstrate critical and decisive thinking while maintaining customer relations in a highly active environment.
2020 : 2021
Lightspeed Voice
VoIP Technician
Uses Linux ufw and iptables to implement firewall rules; archive data, schedule archival backups, and manage cron log files.
Implements Microsoft Deployment Toolkit Imaging system to streamline deployment and restoration of workstations.
Uses Docker in penetration testing scenarios to explore other OSs by creating shell environments on Docker images, and various other use cases
Uses Visual Studio to test and debug Python code for thousands of lines of code
Deploys, configures, maintains virtual environments using VMware and VirtualBox
Applies best practices in network security management to enterprise processes
Analyses security problems and designs appropriate security measures to prevent network intrusion
Applies security control principles in the construction of network defense solutions
Securely administers Windows and Linux systems using security automation tools and techniques
2017 : 2021
National University
BS Cybersecurity
Used Wireshark to capture and analyze network communications
Used Syn Scans to identify suspicious patterns of network activity
Used Linux ufw to implement firewall rules; archived data, scheduled archival backups, and managed cron log files
Interpreted rules for intrusion detection and wrote custom rules using Snort
Configured the services to run a LAMP server
Used Burp Repeater to modify and replay HTTP requests and used Burp Intruder to script series of requests
Identified and exploited XSS vulnerabilities and constructed syntax-breaking XSS payloads
Detected XSS with Burp Suite
Identified CRUD queries with SQL
Tested for Local and Remove File Inclusion vulnerabilities
Exfiltrated data from a server using webshells
Delivered cookie-steeling XSS to a vulnerable site via RFI
Tested for command injection vulnerabilities and bypassed basic command injection filters
Created advanced searches using the Splunk Processing Language and analyzed events using statistical methods such as frequencies , baselines and thresholds
Used Autopsy 4.0 to preserve and document evidence, and analyzed iPhone images and explored the databases and file structure on an iPhone’s database
Used Metasploit to exploit Heartbleed and Shellshock
Manually dumped information from a MySQL database and created malicious binaries with msfvenom
Dumped NTLM password hashes with the hashdump post-exploitation module to gain access to an adjacent machine on the network to gather information on the newly compromised host
2019 : 2020
University of California San Diego
Cyber Security Specialist
Analyzes and evaluates multiple risk assessment methods and strategies
Compares and contrasts the legal and ethical aspects of cybersecurity at the Federal, State, and International level
Assesses and summarizes the legal and ethical requirements of a cyber security professional
Integrates project management skills to produce a cybersecurity solution
Evaluates the results of a security assessment to assess the security status of a network or computer system
Conducts in-depth research into a specific cybersecurity topic, including finding and integrating relevant research results of others
Integrates systems-level-infrastructure thinking into cybersecurity problem identification and resolution, and effectively communicate the solution
2022 : Present
National University
MS Cybersecurity
Develops and maintains a high level of confidence providing VoIP solutions to meet business requirements. Deploy, configure, and manage VoIP and PBX phone systems for hundreds of new businesses across the United States. Works closely with business owners to ensure configuration of PBX meets the operational and strategic requirements of the company.
2021 :
Lightspeed Voice
VoIP System Implementation
Experience with router configurations and other networking concepts including switches, IP telephones, and VPNs. Effectively troubleshoot networking issues in LANs, WANs, and WLAN environments and internet connectivity issues using various common network troubleshooting tools. Troubleshoot, repair, configure, and optimize VoIP networks and PBX systems for over 4000 offices ranging from 3 to 200+ users. Demonstrate critical and decisive thinking while maintaining customer relations in a highly active environment.
2020 : 2021
Lightspeed Voice
VoIP Technician
Uses Linux ufw and iptables to implement firewall rules; archive data, schedule archival backups, and manage cron log files.
Implements Microsoft Deployment Toolkit Imaging system to streamline deployment and restoration of workstations.
Uses Docker in penetration testing scenarios to explore other OSs by creating shell environments on Docker images, and various other use cases
Uses Visual Studio to test and debug Python code for thousands of lines of code
Deploys, configures, maintains virtual environments using VMware and VirtualBox
Applies best practices in network security management to enterprise processes
Analyses security problems and designs appropriate security measures to prevent network intrusion
Applies security control principles in the construction of network defense solutions
Securely administers Windows and Linux systems using security automation tools and techniques
2017 : 2021
National University
BS Cybersecurity
Used Wireshark to capture and analyze network communications
Used Syn Scans to identify suspicious patterns of network activity
Used Linux ufw to implement firewall rules; archived data, scheduled archival backups, and managed cron log files
Interpreted rules for intrusion detection and wrote custom rules using Snort
Configured the services to run a LAMP server
Used Burp Repeater to modify and replay HTTP requests and used Burp Intruder to script series of requests
Identified and exploited XSS vulnerabilities and constructed syntax-breaking XSS payloads
Detected XSS with Burp Suite
Identified CRUD queries with SQL
Tested for Local and Remove File Inclusion vulnerabilities
Exfiltrated data from a server using webshells
Delivered cookie-steeling XSS to a vulnerable site via RFI
Tested for command injection vulnerabilities and bypassed basic command injection filters
Created advanced searches using the Splunk Processing Language and analyzed events using statistical methods such as frequencies , baselines and thresholds
Used Autopsy 4.0 to preserve and document evidence, and analyzed iPhone images and explored the databases and file structure on an iPhone’s database
Used Metasploit to exploit Heartbleed and Shellshock
Manually dumped information from a MySQL database and created malicious binaries with msfvenom
Dumped NTLM password hashes with the hashdump post-exploitation module to gain access to an adjacent machine on the network to gather information on the newly compromised host
2019 : 2020
University of California San Diego
Cyber Security Specialist
Company:
National University
Spoken Language:
English
About
Military professional with a combined 15 years experience in networking; including installation, configuration, troubleshooting, along with experience in enterprise network defense and cybersecurity.
Having spent 10 years as a United States Marine, I've thrived in collaborative and collegial environments. I've dealt with and planned for moments of uncertainty, changing terrain, defense, and evolving threats with great success. During those 10 years I've had the time to refine my situational awareness, precision, and problem-solving abilities. I'm at home in dynamic and mentally stimulating environments, and with my mission-first attitude, I'm confident I'll provide great value and expertise wherever I may land.