Terian Davis

Enterprise IT Operations at Zigabyte
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Colorado Springs, Colorado, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Endpoint Security Solutions Administrator 201 ePO 5.10
    DISA
    Jan, 2023
    - Nov, 2024
  • Endpoint Security Solutions Advanced Administrator 301 ePO 5.10
    DISA
    Jan, 2023
    - Nov, 2024
  • Endpoint Security Solutions Analyst 501 ePO 5.10
    DISA
    Jan, 2023
    - Nov, 2024
  • Splunk Intro to Splunk
    Splunk
    Dec, 2022
    - Nov, 2024
  • Splunk Search under the hood
    Splunk
    Dec, 2022
    - Nov, 2024
  • Splunk Using Fields
    Splunk
    Dec, 2022
    - Nov, 2024
  • Splunk Visualizations
    Splunk
    Dec, 2022
    - Nov, 2024
  • CompTIA Project+
    CompTIA
    Aug, 2017
    - Nov, 2024
  • CompTIA Security+
    CompTIA
    Dec, 2012
    - Nov, 2024
  • Splunk Scheduling Reports & Alerts
    Splunk

Experience

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Enterprise IT Operations
      • Feb 2023 - Present

      Installs, configures and maintains Microsoft Exchange environments. Designs, installs, configures and maintains Microsoft System Center Configuration Manager environments for client device patching, management, Operating System deployment and Configuration Baseline enforcement. Designs, installs, configures and maintains Active Directory Forest/Domain infrastructures. - DNS configuration and management - GPO configuration and management - Configuring Certificate Auto-enrollment as well as publishing and managing PKI certificates - DHCP configuration and management Installs, configures and maintains Proxy servers, mail gateways and Firewalls. Installs, configures and maintains various storage solutions. - VM Storage - Enterprise Applications - File Storage Configures and maintains Host-Based Security Systems. - Host Intrusion Prevention - Firewall and Virus Scanning - Rogue System Detection - ePolicy Orchestration - Policy Auditing - Asset Baseline Monitoring Installs, configures and maintains Virtual Machine environments. Show less

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • SOC Analyst
      • Dec 2022 - Feb 2023

      Work independently to achieve day-to-day objectives with significant impact to the overall NORAD/USNORTHCOM Government mission. Take responsibility for multiple systems, function interchangeably within a team of engineers and support a cross functional approach to resolving the myriad of issues confronting applications and systems operating within a highly complex and interconnected networked environment. Use your deep understanding of and ability to apply principles, theories, and concepts of technical domain and has broad understanding of other related specialty areas experience with the application of DISA Security Technical Implementation Guides (STIGs) to operating Systems, Information Assurance Vulnerability Alert (IAVA) monitoring and application, system vulnerability scanning. Design, develop, and implement solutions that meet network and system security requirements and perform vulnerability/risk analyses of computer systems, networks and applications in conjunction with the tasking being simultaneously performed by the other cyber professionals, network staff, and resident Government staff. Evaluate the network to identify potential issues of network, system, and user cyber threat activity. Conduct cyber vulnerability analysis and response. Enact and execute downward directed Defensive Cyber Operations actions. Execute Information Condition (INFOCON) or Cyber Protection Condition (CPCON) Maintain up to date IP space tracking with subordinate boundaries. Ensure access to the NOC and the CWOC-DCO watch. Identify and update lists of point of contact for all system/IP inquiries from the CWOC for the entire N&NC IP space. Develop solutions and determines process improvements by providing root cause analysis for vulnerability exploitation and attack realization. Develop appropriate tactics, techniques, and procedures (TTPs) for response to cyber threats, cyber security, and access-related incidents, downward directed tasks, and insider threat triggers. Show less

    • United States
    • Defense and Space Manufacturing
    • 700 & Above Employee
    • Directory Services Supervisor
      • Mar 2018 - Jan 2023

      The DoD Enterprise Directory Services (EDS) is a DISA and DMDC managed suite of products and services that provide DoD Enterprise identity and contact attributes. EDS is comprised of enterprise provisioning services, directory services, synchronization services, and white pages in support of people discovery across the DoD community. EDS retrieves source identity and contact information from the Defense Manpower Data Center (DMDC) and DISA’s Global Directory Services (GDS).

    • Host Based Security System Technician
      • Feb 2015 - Mar 2018

      Host Based Security System is the United States Department of Defense (DOD) commercial off-the-shelf (COTS) suite of software applications used within the DOD to monitor, detect, and defend the DOD computer networks and systems.

    • Cyber Systems Operations Technician
      • May 2012 - Feb 2015

      Provides networked application resources by designing, configuring, installing, and managing data services, operating system, and server applications. Manages system resources, implements security updates and patches, supports information warfare operations, and provides real-time intrusion detection and firewall protections for all networked resources. Reviews and implements Command, Control, Communications, and Computers systems requirements.

Education

  • American Military University
    Bachelor's degree, Information Systems Security
    2016 - 2020
  • Community College of the Air Force
    Associates degree, Management Information Systems, General
    2014 - 2016

Community

You need to have a working account to view this content. Click here to join now