Nickolas J. Baker

Senior Cybersecurity Consultant at Polito, Inc.
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Clarksville, Tennessee, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Certified Expert Security Analyst (CESA)®
    Lunarline, Inc
    Dec, 2016
    - Nov, 2024
  • GIAC Certified Enterprise Defender (GCED)
    GIAC Certifications
    Jul, 2019
    - Nov, 2024
  • GIAC Security Essentials Certification (GSEC)
    GIAC
    Nov, 2014
    - Nov, 2024
  • A+ CE
    CompTIA
    Jul, 2011
    - Nov, 2024
  • CompTIA CySA+ ce Certification
    CompTIA
    May, 2020
    - Nov, 2024
  • CompTIA IT Operations Specialist – CIOS Stackable Certification
    CompTIA
    Jul, 2011
    - Nov, 2024
  • CompTIA Secure Infrastructure Specialist – CSIS Stackable Certification
    CompTIA
    Jul, 2011
    - Nov, 2024
  • CompTIA Security Analytics Professional – CSAP Stackable Certification
    CompTIA
    May, 2020
    - Nov, 2024
  • Network+ CE
    CompTIA
    Apr, 2011
    - Nov, 2024
  • Security+ CE
    CompTIA
    Apr, 2011
    - Nov, 2024
  • GIAC Systems and Network Auditor (GSNA)
    GIAC Certifications
    Nov, 2017
    - Nov, 2024
  • GIAC Penetration Tester (GPEN)
    GIAC Certifications
    Oct, 2017
    - Nov, 2024
  • GIAC Certified Intrusion Analyst (GCIA)
    GIAC Certifications
    Sep, 2017
    - Nov, 2024
  • GIAC Certified Incident Handler (GCIH)
    GIAC Certifications
    Aug, 2017
    - Nov, 2024
  • GIAC Certified Windows Security Administrator (GCWN)
    GIAC Certifications
    Aug, 2017
    - Nov, 2024
  • GIAC Certified Forensic Analyst (GCFA)
    GIAC Certifications
    Jul, 2017
    - Nov, 2024
  • Certified Information Systems Security Professional (CISSP®)
    (ISC)²
    May, 2016
    - Nov, 2024
  • Certified Ethical Hacker
    EC-Council
    Aug, 2018
    - Nov, 2024
  • GIAC Continuous Monitoring Certification (GMON)
    GIAC Certifications
    May, 2020
    - Nov, 2024

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Senior Cybersecurity Consultant
      • Jun 2021 - Present

      Conducts and supports cybersecurity risk assessments, vulnerability assessments, penetration testing, social engineering (SE), wireless network assessments, network security monitoring, log analysis, threat hunting, incident response (IR), digital forensics, cyber threat intelligence, indicators of compromise analysis, security architecture and configuration review, open-source intelligence investigations, and other key cybersecurity services primarily for commercial clients in diverse industries. Produces and review’s client deliverables including detailed vulnerability findings and recommended mitigations, penetration test reports, SE reports, IR and forensic reports, and best practice recommendations. Occasionally leads small teams in support of varying degrees of cybersecurity assessments. My duties involve project management tasks to include client scoping call to determined requirements; discuss statement(s) of work (SOW); conduct kickoff call; providing status updates as needed via various means; leading and managing the teams’ lines of work effort to determine the current, future, and final tasks that are needed to achieve the required SOW; producing all deliverables as required; conducting final briefings, outcalls and continued support as needed. Uses various tools and platforms, such as Windows, Kali, Nessus, Shodan, Nmap, client specific systems as need, and other open-source tools and techniques to conduct cybersecurity assessments and penetration testing. Show less

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Network Defense Technician
      • Jan 2018 - May 2021

      I provide the Army with a source of expertise for the proper employment, support, and defense of strategic and tactical information networks, systems, and services in operations supporting the Army’s portion of the cyberspace domain. My daily duties include network monitoring, end point security and defense, and vulnerability assessments through the use of various tools including, ACAS SecurityCenter, McAfee ePolicy Orchestrator (ePO), McAfee Enterprise Security Manager (ESM), SecuityOnion, PaltoAlto Panorama and software based firewalls. I also audit user and network accounts using Microsoft Active Directory for compliance and activity usage. I oversee the COMSEC and cybersecurity, departments to provide guidance and technical expertise on daily operations, policy development, and project management. I advise outside department managers and executives on the appropriate courses of action regarding cybersecurity and technological decisions at all levels.I have participated in many military exercises that has required me to, either lead or be part of a team, defend a portion of a network through the use of various techniques including threat hunting, employing and using various defensive and SIEM tools such as those previously mentioned and including FireEye, Endgame, Cisco Stealthwatch and RedSeal, creating a honeypot environment with various honey items such as DNS, user accounts, systems, and documents. Some exercises required my team to lower our defenses in order to test our reactive techniques and actions. In one instance, we received a phishing e-mail that I analyzed offline in a sandbox environment to determine its function. All of these exercise were extremely valuable as I learned about both red and blue team TTPs. Show less

    • Information Protection Technician Student
      • Jun 2017 - Dec 2017

      This course provides detailed instruction for the Information Protection Technician to perform Information Assurance/Computer Network Defense (IA/CND) protection and detection reaction measures at all levels, Securing Windows, Computer Forensic Investigations and Incident Response, Intrusion Detection In-Depth, Hacker Techniques, Exploits and Incident Handling, Network Penetration Testing and Ethical Hacking to include Auditing Networks, Perimeters & Systems. Focus is on the supervision and management of information assurance, electronic protection, transport, services, application layers, to achieve integrity and availability of information to the user. The student is instructed to install, maintain, and operate information protection to correspond with current network defense measures. Training includes cryptographic network (cryptonet) planning, Electromagnetic Spectrum Operations (EMSO), electronic keys, network, and defense measures. This course will reinforce Leadership Skills, to include skills and knowledge to provide the technical guidance and information protection policy recommendations required for the Army, Joint, intergovernmental, interagency, and multinational agencies. Provide advanced instruction on directed and mandated subjects and topics to include: Institutional Resilience Training, Sexual Assault Prevention and Response (SAPR), Personnel Recovery (PR), Military History, Every Soldier is a Sensor (ES2), Cultural Awareness (CA), Improvised Explosive Device (IED) Defeat (IED-Defeat), and Operations Security (OPSEC). A capstone training event is conducted at the course completion to evaluate the student's ability to perform MOS critical skills in simulated field environment. Show less

    • Information Services Technician
      • Jun 2013 - May 2017

      My daily duties included the following: Information Assurance Security Officer (IASO) and Information Management Officer (IMO) functions, especially regarding user account maintenance and user compliance tracking through the use of the Army Training and Certification Tracking System (ATCTS) and Active Directory, Approver and user for Enterprise Remedy; I shared duties as a SharePoint Owner for several SharePoint sites; I also oversaw the ETA program for SIPNET Tokens; I held duties as CPSO for the KMI COMSEC system. I held elevated system and network rights to conduct maintenance as needed. These tasks include: read only rights to switches and routers; the ability to install and uninstall software, configure computer network settings, monitor event logs, join a workstation to the domain, and configure both local and networked printers and digital senders. I planned and develop Group level communication plans for CJSOTF operations for Exercises which are dislocated from Joint Base Lewis-McChord (JBLM) and required that the Signal Center (SIGCEN) setup our own SDN-H, Tactical Local Area Network (TACLAN), and Radio systems. I managed the TACLAN system while maintaining 99.999% uptime. The daily duties for this LAN required the maintenance of 10 servers, 8 network storage devices, 3 routers, 9 switches, 2 security appliances, 125 users, and 125 devices that include: computers, printers, and Voice over Internet Protocol (VoIP) phones across two networks.Developed policies and trained individuals on Wi-Fi security, digital forensics, data obfuscation, and safe traveler digital footprint practices. Show less

    • Information Services Technician Student
      • Oct 2012 - Jun 2013

      Information Services Technicians establish and maintain the ability to collect, process, store, secure, search for and discover, retrieve and disseminate information utilizing the application layer environment of the Army’s portion of the Cyberspace domain; they enable information dissemination management/content staging in order to perform the required information management/knowledge management functions supporting combat information superiority and decision dominance. They supervise and manage the systems, services and personnel in operation centers that ensure efficient and effective caching, compiling, cataloging, retrieval and distribution of information as an element of combat power. Information services technicians plan, install, administer, manage, maintain, operate, integrate, service, secure and troubleshoot information systems and services to include Mission command systems and various automation information systems enabling voice, video, data and imagery processing. They manage the training of personnel on the planning, installation, administration, management, maintenance, operation, integration, servicing, securing and troubleshooting of information systems and services. They develop policy recommendations and provide technical guidance and advice to commanders and staffs on the management and operation of Army, joint, intergovernmental, interagency and multinational information systems and services. Show less

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Senior Data Systems Integrator
      • Aug 2008 - Jul 2012

      For my services I was awarded the Meritorious Service Medal. I was assigned to 160th Special Operations Aviation Regiment (Airborne), severing as the Senior Data System Integrator for the Regimental S-6 shop as well as serving additional duties as the Assistant COMSEC custodian. I was responsible for operating and supervising the Regimental Tier II helpdesk that provides desk-side automation support for Windows XP and 7 OS's and network support to over 3,500 users, 3,000 computer systems, and 360 networked devices on two separate US and Joint Local Area Networks. My organization was also responsible for the imaging of all the Regimental computer systems ensuring that the meet they the Army Golden Master 8.0 standards. As the assistant COMSEC custodian I helped to successfully manage and account for over 700 lines of Secret and Top Secret COMSEC material with no compromises. I provided COMSEC support and training of hand receipt holders for the four battalions in two different theaters in support of Overseas Contingency Operations. Show less

    • Communications NCO
      • 2009 - 2012

      I Deployed on multiple occasions in support of OEF. Over the course of three years, I fulfilled three combat tours for a total of 8 months. As the S6 NCOIC at three different outstations, I supervised the installation, operation, maintenance of automation and information systems equipment. I also performed duties as an OU administrator, providing helpdesk support for 125 users, 250 computer systems with peripherals, and 50 networked devices spanning five different US, Joint and Coalition Local Area Networks. I was also able to provide radio and cryptographic device support by filling, loading, and programming approximately 10 different devices, making them fully mission capable. I was also responsible for the maintenance of the PACWIND video feed system, consisting of two antennas, one computer, and one radio, on three different attack helicopters allowing the operators and customers to see the target destination in real time. Show less

    • Information Systems Team Chief
      • Nov 2007 - Aug 2008

      I served as the Information Systems Team Chief for the Battalion S-6 shop while serving additional duties as an Information Security Assurance Officer and Organizational Unit administrator. As the senior 25B of my section I was responsible for mentoring two soldiers and for the installation, maintenance, and administration of four strategic tactical communications systems. I prepared three soldiers for successful deployments to both Operations Iraqi and Enduring Freedom. I provided rear communications support for three separate OCONUS combat locations. I was an Organizational Unit administrator who provided computer and network support for approximately 500 users, 450 computers, and 60 associated devices on three separate Local Area Networks. I was solely responsible for reestablishing the battalion's Joint Medium Earth Rate Terminal satellite system, which I was able to use to establish a Tactical Operations Center in support of a battalion exercise to provide secure computer and telephone communications that resulted in 100% uptime. I managed the battalion’s automation life-cycle program by replacing 146 computers valued at $300,000. Show less

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Analysis Team Chief
      • Aug 2005 - Aug 2007

      For my services I was awarded the Army Commendation Medal. I served as the Analysis Team Chief for the Division Automation Management Office. I provided computer and network user support on two US Local Area Networks. I supported over 800 users, 25 networked devices, and 540 computers with their associated peripheral devices. I helped customers on an everyday basis with computer related troubleshooting and operations. I built two computer baselines, which were implemented division wide. I attended the Global Command and Control System-Army system administrators course. I was the supervisor of two NCOs and nine soldiers consisting of three different MOS's, all of who I mentored and supervised on MOS job skills and basic soldering tasks. During my assignment I was responsible for helpdesk operations of Command Post Exercise Mountain Summit, which enhanced the Division's focus for their upcoming deployment to Afghanistan. Show less

    • Joint Automation NCOIC
      • Jan 2006 - Jan 2007

      For my service I was awarded one Army Achievement Medal and one Joint Service Commendation Medal. I served as the Combined Joint Task Force-76 helpdesk NCOIC in support of Operation Enduring Freedom. During my deployment I operated, supervised, and maintained the 10th Mountain Division (LI) tactical helpdesk while also providing support for three Command Posts. The helpdesk provided support to all 10th Mountain Division and their counterparts for all of Regional Command-West in Afghanistan. I directly supported over 2500 users, 1000 computers with associated devices, on three separate US and Coalition Local Area Networks (LANs); while also supporting an additional 10 US LANs and 20,000 users. I was responsible for overseeing the processing of approximately 600 helpdesk tickets a month. I was also the first to deploy a tactical network forward for a supporting operation in Afghanistan. During this operation I supported 60 users and 120 network device on three US and Coalition LANs. During my deployment I provided automation and signal support for a two star general who was the Deputy Commander of Security for International Security Assistance Force. I was responsible for establishing a new office and quarter spaces that provided both non-secure and secure communications. This task involved setting up new computers, Voice over Internet phones, Cisco switches and running 2000 ft of fiber optic cabling. Show less

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Network Engineer 3
      • Feb 2004 - Feb 2005

      As an employee my main job consisted of network monitoring of Cisco switches, routers, and INDX Promina systems using a propriety Simple Network Monitoring Program. I used this program to perform software diagnosis and troubleshooting of networked devices. I learned very quickly how to diagnose and troubleshoot all types of network outages. I become very knowledgeable of the customers and network that I was working with. I become the go to guy during my shift. My work quality surpassed most of other employees working in the same section. I expanded my job knowledge through any means, including reading the most up-to-date technical publications, and using computer based training programs. This job provided with further insight of how networks operated at the software level. During my tenure at the company I received a four out of five on my yearly employee performance review. Show less

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Wide Area Network Technician
      • Dec 2002 - Feb 2005

      For my professionalism and dedication I was awarded the Joint Service Commendation Medal. I served as a network technician in the Wide Area Network Problem Resolution Center for the National Security Agency. I was one of six personal to be fully qualified in all three areas of the communications room. I was one of many whose responsibility to make sure that approximately 3500 circuits had 99.999% uptime. Our daily tasked included circuit and COMSEC troubleshooting and maintenance. My exceptional knowledge and sound judgement made me stand out among my peers. I was able to very quickly learn and was able to teach others about signal flow in addition to circuit and COMSEC troubleshooting. I was taught how to troubleshoot both traditional cooper and fiber optic circuits, and was trained and qualified on over 50 different pieces of communication and cryptographic devices. I created a technical library consisting of: operating procedures, manuals, and circuit diagrams that provided a single point of reference for all troubleshooting resources and reduced circuit outages times by 40 percent. I created two different training slides shows that provided over 250 hours of training to 12 joint personnel. Show less

    • Automation Technician
      • Feb 2002 - Nov 2002

      For my meritorious service I was awarded two Army Achievement Medals, and one Army Commendation Medal. I served as the automation technician as well as the Information Management Officer and Network and System Administrator for the post. I provided computer and network support for 100 computer systems and 75 users. As a private in the US Army this was a responsibility I was ready to handle. I was able to take the skills and training from my previous assignment and apply them on a greater level. During my assignment I was solely responsible for reestablishing the Defense Messaging System, which saved countless hours of travel time to and from the messaging center 50 miles away. I also wrote a Standing Operating Procedure and trained seven soldiers on how to use this system. I provided telecommunications support for two peninsula-wide exercises: Reception, Staging, Onward movement and Integration and ULCHI FOCUS LENS, that took place at my post. During these exercises, I provided e-mail, Internet, and telephone services for an additional 50 users as well as Local Area Network access for the visiting VIPs. During these exercises I was also responsible for coordinating and setting up the VTC room for VIPs briefings. This assignment allowed me to further expand my knowledge of the communications field. Show less

    • Computer Analyst
      • Nov 2001 - Feb 2002

      For my service I was awarded a Certificate of Achievement. I served as the computer analyst as well as the Information Management Officer (IMO) for the Combined Effects Synchronization Cell. I became the go to guy for any and all computer related questions and concerns for my section. As a new private in the US Army I found this to be very challenging and career building experience. I was able provided computer and network support for approximately 20 users of all ranks and grades. My daily tasks included: processing new computer accounts, setting up new computers, and providing computer hardware and software, printer, e-mail and Internet user level support, along with installing and terminating computer network cables. I became a very knowledgeable and an important asset to my section. During my assignment I attended the IMO course along with two Microsoft approved courses that greatly enhanced my job skills and the abilities to contribute to my section. Show less

Education

  • Strayer University
    Master’s Degree, Information Assurance
    2015 - 2019
  • Strayer University-Georgia
    Bachelor of Science (B.S.), Information Systems Concentration in Networking
    2004 - 2013

Community

You need to have a working account to view this content. Click here to join now