Richard R.
SOC Engineer/Analyst at DataGuy Academy- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
English Native or bilingual proficiency
Topline Score
Bio
Katherine Garcia
Working with Richard has been the best experience, he’s very hands on when it comes to company moral, major projects, and our students! His expertise in Cybersecurity comes with the skill set of different programs.
Randall Thomas
Richard Romine is a very hard working and faithful man of integrity. As his employer I have found him consistently going above and beyond, with an eagerness to work and a passion for excellence.
Katherine Garcia
Working with Richard has been the best experience, he’s very hands on when it comes to company moral, major projects, and our students! His expertise in Cybersecurity comes with the skill set of different programs.
Randall Thomas
Richard Romine is a very hard working and faithful man of integrity. As his employer I have found him consistently going above and beyond, with an eagerness to work and a passion for excellence.
Katherine Garcia
Working with Richard has been the best experience, he’s very hands on when it comes to company moral, major projects, and our students! His expertise in Cybersecurity comes with the skill set of different programs.
Randall Thomas
Richard Romine is a very hard working and faithful man of integrity. As his employer I have found him consistently going above and beyond, with an eagerness to work and a passion for excellence.
Katherine Garcia
Working with Richard has been the best experience, he’s very hands on when it comes to company moral, major projects, and our students! His expertise in Cybersecurity comes with the skill set of different programs.
Randall Thomas
Richard Romine is a very hard working and faithful man of integrity. As his employer I have found him consistently going above and beyond, with an eagerness to work and a passion for excellence.
Credentials
-
Linux+
COMPTIJan, 2018- Oct, 2024 -
Secure Readiness Reviewer Networking Aditor
DISAMar, 2014- Oct, 2024 -
ECSA
EC-CouncilOct, 2014- Oct, 2024 -
CHFI
EC-CouncilNov, 2013- Oct, 2024 -
CEH
EC-CouncilSep, 2013- Oct, 2024 -
CCNA
CiscoMar, 2013- Oct, 2024 -
Security Plus
CompTIAMar, 2013- Oct, 2024 -
Enlisted Information Dominance Warfare Specialist (EIDWS)
US NavyMay, 2014- Oct, 2024 -
Certified Network Forensics Analyst
Freewater Technologies
Experience
-
DataGuy Academy
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
SOC Engineer/Analyst
-
Sep 2019 - Present
I work fulltime as a consultant for Partnerships such as Dataman. Assigned directly to IBM as a QRadar Engineer.
-
-
Chief Executive Officer
-
May 2019 - Present
-
-
Senior Cyber Security Advisor
-
May 2020 - Jul 2022
Part-time as needed supervisory work. Oversee work colleagues on projects.
-
-
-
Amazon Web Services (AWS)
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
AWS Consultant
-
Sep 2019 - May 2020
-
-
-
Wells Fargo
-
United States
-
Financial Services
-
700 & Above Employee
-
Splunk Content Developer Engineer (ISE5) w/ Teksystems
-
May 2018 - Nov 2018
Develop Splunk content for creating searches, updating and creating new data modules, and dashboard creation within Splunk Enterprise Security. Develop Splunk content for creating searches, updating and creating new data modules, and dashboard creation within Splunk Enterprise Security.
-
-
-
Nuclear Fuel Services
-
United States
-
Defense and Space Manufacturing
-
200 - 300 Employee
-
Cyber Security Engineer w/ TekSystems
-
May 2018 - Aug 2018
Cyber Security Engineer: Configuring and Upgrading universal and heavy forwarders to Splunk ES. Verified and corrected heavy forwarder configurations which resulted in improvement with searches. Dashboard development of software and system errors to improve network security and performance awareness. Installed and configured Nessus Tenable Security Center to include strategic scheduling, vulnerability analysis, and improvement in reporting. Cyber Security Engineer: Configuring and Upgrading universal and heavy forwarders to Splunk ES. Verified and corrected heavy forwarder configurations which resulted in improvement with searches. Dashboard development of software and system errors to improve network security and performance awareness. Installed and configured Nessus Tenable Security Center to include strategic scheduling, vulnerability analysis, and improvement in reporting.
-
-
-
US Navy
-
United States
-
Armed Forces
-
700 & Above Employee
-
Cyber Security Analyst
-
May 2012 - May 2018
Network Forensics Analyst Tier 3: Analyzed over a total of more than 500 million lines of code (140+ Gigabytes) both as a Log Forensics Analyst and as a Vulnerability Assessment Analyst. Responsible for handling hundreds of compromised networks, parsing with specially crafted REGEX searches for Cross Site Scripting, Directory Traversals, and SQL Injections to name a few; essentially covering the most recent OWASP top 10 threats. Line by line behavioral & historical analysis of all events, never missing critical information while learning efficient tactics used by other analysts; ultimately making reliable mitigation recommendations of large data centers. Network Intrusion Detection Analyst: Well trained by the Department of Defense in detecting malicious network activity and providing mitigation recommendations. Developed over at least 20 types of effective Snort Rule signature creations, blocking hundreds of malicious bots, actors, and unauthorized outbound traffic. Routine analyzing of large streams of network traffic utilizing tools like Wire Shark and TCP Dump. Mastery of MacAfee's Network Security Manager and Novel Sentinel Manager which includes analysis of over 2,300 types of network signatures. Recommendations include reconfiguration/addition of safe Firewall ACL's, IP Block List, Server Vulnerabilities, Domain Block List, and malicious email signatures. Capable of developing Standard Operating Procedures of how to categorize all types of modern network intrusion attacks while providing a reliable mitigation handling standard. Sensor Operations Analyst--work with large teams of 40 personnel responsible for the timely reporting and troubleshooting of 178 Intrusion Detection Sensors and Intrusion Prevention Systems. Show less
-
-
-
Jackson Hewitt
-
United States
-
Hardware Support Specialist
-
Aug 2011 - Apr 2012
Troubleshooting and correcting medium sized networks with network performance and security. Responsibilities • Upgraded Cisco routers, switches, and firewalls to defend outside threats. • Helped implement an Intrusion Detection and Prevention System. • Answered trouble calls of both customers and clients on the network. • Assisted in the creation of systems for franchise owners for daily operations and provided network consulting to local customers in the region. • Implemented ACL requirements on both Firewall and Router Devices. • Installing and configuring Splunk 4.0 for event log aggregation and analysis Environment: Cisco VPN technology, Snort IDS, MacAfee IPS, Firewall ACL, Router ACL Show less
-
-
-
BlueGrace Logistics
-
United States
-
Transportation, Logistics, Supply Chain and Storage
-
500 - 600 Employee
-
C# Programmer & DB Developer & IT Security Analyst
-
Jun 2008 - Jul 2011
1. C# Programmer / Database Developer In charge of creating Use Case Scenarios, modifying code, and creating their back-end database Responsibilities • Replacing systems and operations with an in house solution, eliminating excess waste and expenses. • Testing for web vulnerabilities following the OWASP top 10. • Designed the backbone of the backend database to support their website (intranet and external) which included inventory and payroll items for their customers and sales department. • Co-developed and assisted with their MVC system to integrate several new components to include distance measuring algorithms and calculations to optimize their day to day operations. 2. IT Security Analyst • Reviewed ACL's, Event Logs, and Router configurations to assist in both troubleshooting and detecting unauthorized access. Environment: Microsoft MVC ASP.NET, Microsoft SQL, Event Viewer, Log Parser 2.0, Log Lizard Pro Show less
-
-
-
-
Database Developer
-
Jan 2010 - Jun 2011
Created management systems to provide effective and efficient access to information stored in databases. Provided expertise and guidance in the design, implementation and maintenance of database management systems. Determined filing system organization and access points. Carefully implemented and controlled security procedures to protect the database from accidental damage or data loss. Created management systems to provide effective and efficient access to information stored in databases. Provided expertise and guidance in the design, implementation and maintenance of database management systems. Determined filing system organization and access points. Carefully implemented and controlled security procedures to protect the database from accidental damage or data loss.
-
-
-
Static Corporation
-
China
-
Network Consultant
-
Feb 2008 - Jun 2011
Monitored day-to-day operations of computer networks including hardware/software support, training, and special projects; plans, designs and implements data connectivity for local area network (LAN) and wide area network (WAN) systems; assists in coordinating special projects including network related wiring plans, LAN/WAN hardware/software purchases, and system installation, backup, maintenance and problem solving; assists in providing network and remote connectivity hardware/software support; maintains LAN user documentation including hardware/software applications, support logs and other related information Show less
-
-
-
Maxim Crane Works, LP
-
United States
-
Construction
-
700 & Above Employee
-
SQL Administrator & QA Tester
-
Aug 2007 - Jan 2008
Developer Q/C Tested and help design systems for customers, clients, and employees for a maximum output. Responsibilities • Designed and enhanced the flow of information operations by parsing and combining program functions • Provided feedback as to the quality of finished and unfinished programs. • Public speaker to managers and customers regarding application capabilities and errors. • Developed programs that bridged the gap between systems. • Worked on back-end functions and Use Case Scenario's. Environment: Access 2009, Microsoft VB ASP.NET, Microsoft SQL Show less
-
-
Education
-
Western Governors University
MSISA, Information Security -
U.S Navy
Joint Cyber Analysis Course (JCAC), Computer Network Defense, Computer Network Exploitation, Computer Network Attack -
University of South Florida
BS, Information Technology -
University of South Florida
Bachelors in Information Technology, Information Technology