Colin Timothy


Location

University Park, PA
Washington, DC
Education
    Pennsylvania State University-University Park
    July 2018 - December 2022
    degree
    Bachelor's
    major
    Cyber Security Systems
    Gonzaga College High School
Work Experience
    Progeny Systems A General Dynamics Mission Systems Company
    Cybersecurity Systems Engineer
    Manassas, VA, US
    August 2023 - present
    company
    Progeny Systems A General Dynamics Mission Systems Company
    title
    Cybersecurity Systems Engineer
    overview
    - Maintained, i.e. created, modified, and deleted, the IA requirements database using the IBM DOORS application - Collaborated with developers and test engineers to ensure software implementation meets the specified requirements - Regularly meet and collaborate with customer to gain approval of updated requirements and design recommendations - Worked with scrum team to generate design documents and subsystem level requirements - Created whitepaper design documents for future capability items and presented to government representatives and other subsystems - Compared government provided Performance Specification to IA subsystem requirements and updated requirements to ensure continuity - Mapped new Cybersecurity Baseline Requirements to current IA subsystem requirements, created new IA requirements as needed
    iDiscovery Solutions
    Digital Forensics Contractor
    Washington, DC, US
    June 2023 - July 2023
    The MITRE
    Cyber Resiliency Intern
    McLean, VA, US
    June 2021 - August 2021
    CACI International
    Cybersecurity Engineer Intern
    Sterling, VA, US
    May 2019 - August 2019
Skills
Access ControlsAccountingAgile MethodologyAmazon Web ServicesApple Mac SystemsCase StudiesComputer ArchitectureComputer ForensicsComputer NetworksComputer SecurityCoordination SkillsCybercrimeData AnalysisDatabasesDigital ForensicsDOORS (Software)Elk StackFirewalls (Computer Science)HypervisorIncident ResponseInformation SystemsInformation TechnologyKali LinuxLinuxLog FilesMachine LearningMalwareMetasploitMicrosoft WindowsMitre Att&ckNational Institute of Standards and TechnologyNetwork Intrusion Detection SystemsNetwork SecurityOperational SystemsOperations SecurityOSI ModelsPerseverancePhysical SecurityProcess MonitorProduct Software Implementation MethodsPython (Programming Language)Research SkillsRisk AnalysisRisk ManagementRisk ReductionSafety PrinciplesScrum MethodologySecurity PoliciesSoftware DebuggingSoftware Design DocumentsSplunkStock ControlStrategic ThinkingSubsystemsSystem ImagingSystems EngineeringTest EngineeringVirusesVisualizationVulnerabilityVulnerability AnalysisWhite PaperWireshark