Sr Information Security Analyst Resume Arlington, VA - Hire IT People (2024)

Sr Information Security Analyst Resume

0/5 (Submit Your Rating)

Arlington, VA

Hire Now

SUMMARY

  • A highly motivated and experienced cyber security professional with strong project management, leadership, and problem solving. Seeking a position in a growth - oriented organization with a focus on risk assessments, network security, penetration testing, compliance management, application security, and testing od IT security controls.
  • Experienced Professional as an IT Security Professional in IT Infrastructure, Vulnerability, Risk security, GRC, SOC Analyst, SIEM, Information Security, and Cyber Security.
  • Managing Security tools DLP, SIEM, Vulnerability scanner, and ServiceNow Security Operation and Penetrations test.
  • Expert at implementing network security, SIEM tools, new concepts, identity management, new security technologies, securing cloud architecture, and new security controls as well as in developing innovative security controls and processes that meet business and executive requirements in order to protect information.
  • Performed services using industry tools such as Encase Enterprise, Encase eDiscovery, Symantec Clearwell eDiscovery Platform, Discovery Attender, Splunk, Access Data’s Forensic Took Kit, MS SQL 2005/2008, MS Visual Studio, VM Ware, and SIFT Workstation.
  • Experienced with Symantec DLP Policies (DLP templates) compliance and regulation standards such as SOX, PCI, and HIPAA.
  • System Security and administrator Professional, Facility Security Officer (FSO), Information Systems Security Officer (ISSO), Information Security Management, Firewalls, IDS, Penetration Testing, and industry security standards e.g. ISO 27001:2013, NIST 800 series, HITRUST, HIPPA, GDPR and CCPA, and NISPOM regulations.
  • Resolved vulnerabilities in the WebEx and FedRAMP GRC environments, POA&M & NIST, using automated scripts created in Python, PowerShell, Bash.
  • Worked on GRC policies like - ISO Standards - Planning, Implementation and Management of ISO 27001:2013 Information Security Management System (ISMS) and ISO 20000-1:2011 Service Management System (SMS).
  • Experience in Splunk friendly regex expressions and optimising Splunk search queries with optimal performance.
  • Getting different log sources to send data to Splunk along with creating and tuning Technical Add-Ons for proper field extractions using regex
  • Efficiently performed web application, vulnerability assessment using Burp Suite, HP Web Inspect, Nexpose and IBM AppScan.
  • Operated with Splunk professional services to make the best practices that can be followed by everyone to maintain the performance of Splunk Enterprise Security 7.0.4.
  • Experience with various Endpoint tools like McAfee EPO, Carbon Black, BigFix, Symantec EPO (IDS/IPS)
  • Hands on experience for HIPAA and PCI-DSS related projects and servicenow ticketing.
  • Hands-on experience with TCP/IP, security concepts, WAF and LAN concepts, Routing protocols, Firewall Security policies.
  • Assessed the System Owners; used Radiant logic VDS, OIM, RACF, MFA, SailPoints, Archsight, IBM AppScan, Qualys, SiteMinder, Securonix (UEBA) and conducted MRA and Splunk.
  • Integrated the data from SAP to ServiceNow by using API, Web services and captured that data in Service Now by creating a table.
  • Prepared, installed and configured Symantec Endpoint Protection
  • Worked with system owners to achieve FISMA compliance and Authorization to Operate (ATO) for systems based on guidance from the ISO and NIST SP, HITRUST, HIPPA, GDPR and CCPA, and NISPOM regulations and other Risk Management Framework.
  • Used Splunk SIEM threat analyst in a managed service security operation center (SOC), triaging cyber threats utilizing Splunk and various Cloud security tools.
  • Cyber Security Professional,Facility Security Officer (FSO), Information Systems Security Officer (ISSO),Information Security Management, Firewalls, IDS, Penetration Testing, and industry security standards e.g.ISO 27001:2013,NIST 800series,NISPOM.
  • Vulnerability Management: Configured QualysGuard Tool for Vulnerability Analysis of Devices and Applications. Monitored them constantly through the dashboard by running the reports all the time.

TECHNICAL SKILLS

Antivirus: McAfee Virus Scan Enterprise, Symantec, Endpoint Protection Suite

DLP: Websense, Symantec & McAfee

SIEM: Splunk ES, McAfee, Arcsight, Qradar, LogRhythm

End Point Security: McAfee Suits (VSE, HIPS & HDLP), McAfee MOVE AV, Safeboot

IPS/IDS: McAfee IPS, HP Tipping Point, Cisco IDS, SecureWorks IDS/IPS

SIEM: RSA Envision, Arcsight, Splunk security manager, IBM Qradar

Cloud Security: AWS, Azure, OpenStack, Docker, Ansible, Chef, Ansible, CI/CD, Terraform

Worked on: Configuration management tool Puppet for continuous delivery. Experience in working with Modules, Classes, and Manifests in Puppet.

MSS: Vulnerability Assessment, Content Filter, Antispam, IDS/IPS Management

Vulnerability Management Tools: Foundstone, QualysGuard, Nessus, Nmap, Nexpose, Wireshark

Security Tools: Splunk ES, McAfee Vulnerability management solutions, Burpsuite, OpenVAS, Nessus, Qualys, SolarWinds, ForeScout

PROFESSIONAL EXPERIENCE

Confidential, Arlington, VA

Sr Information Security Analyst

Responsibilities:

  • Responsible for capturing security and privacy requirements for clients to be compliant with Payment Card Industry (PCI).
  • Prepared AD Splunk environment by Verifying that all of the domain controllers and DNS servers in the environment have the latest service packs and hot fixes installed
  • Networked and hosted DLP monitoring and logging and created regex-based parser to parser logs and configuring different connectors
  • Worked on Splunk (ES) in building the real time monitoring to get a clear visual picture of organization's security posture, easily customize views and drill down to the raw event.
  • Automated the centralized detection of security vulnerabilities with scripts for Vulnerability assessment tools like Qualys guard and Splunk.
  • In-depth study and investigation of Governance Risk and Compliance including a deep dive into the NIST Risk Management Framework, FISMA, FedRAMP, HITRUST, HIPPA, GDPR and CCPA, ISO-PCI DSS, GDPR, UCF CCH, Cloud Security Alliance CCM, SOX, ISO 27001, HITRUST, Microsoft SDL, CIS 20 Controls and other legal aspects associated with GRC
  • Configuration of SPLUNK data inputs by understanding various parsing parameters like Index, source, source typing, queue sizes, index sizes, index locations, read/write timeout values, line breaks, event breaks and time formats during index-time.
  • Migration of Splunk clusters in various AWS accounts to single AWS account rehydration of Splunk cluster on AWS environment.
  • Involved in standardizing Splunk forwarder deployment, configuration and maintenance across UNIX and Windows platforms.
  • Worked on Splunk ES to build the correlation searches, alerts, reports and dashboards to get specific monitoring.
  • Integrated the data from SAP to ServiceNow by using API, Web services and captured that data in Service Now by creating a table.
  • Planned, assigned, supervised, and reviewed the work of the SOAR staff as well as perform code reviews and mentored junior developers.
  • Led O M team through successful full C A of current infrastructure as well as the POC for all monthly audits for SOAR
  • Worked with product managers and/or PMO to understand feature requirements, and drive their detailed definition.
  • Kept project manager well informed of status of development effort and serves as liaison between development staff and project manager.
  • Led CNA and monthly audit activities to include 3rd party compliance validation, remediation of vulnerabilities, and result presentations to clients.
  • Responsible for leading and contributing to all aspects of planning, estimating, development, testing, documentation, delivery and risk management.
  • I set general priorities and goals for employees establishing deadlines and ensures timely completion of work assignments and communicate information to status to Senior Government and BAH staff
  • Installed, configured, and administered .Net ColdFusion web servers web applications hosting Administration support on production and development servers include monitoring, handling run time production issues and security patches
  • Implementation of name resolution using WINS & DNS in TCP/IP environment
  • Worked using Perl CGI, python, Java Script, jQuery, Ajax and automating the test cases using python framework
  • Actively used Splunk Phantom SOAR technology for searching and monitoring real time events for network security and compliance.
  • Working closely with AppScan, Symantec and Rapid7 for any malware activity on environment.
  • Ensuring Symantec DLP policies are in place and scanning the environments for incidents.
  • Assisting in DLP policy development for the non-production environment.
  • Actively monitored and responded to activity impacting various enterprise endpoints facilitating network communication and data handling (McAfee End Point Security, DLP)
  • Data Loss Prevention suit, Symantec DLP Product - Implementation and deployment as the champion team.
  • Gained experience with Symantec DLP Software: DLP Cloud Prevent for Symantec DLP.
  • Worked on Splunk Phantom SOAR Proof of Value (POV) for testing the out of the box use cases.
  • Setup CI/CD with Code Pipeline to automate with AWS CloudFormation and focused on cloud strategy (AWS), product marketing, competitive research, customer journey analysis, and strategic partnerships.
  • Responsible to onboard applications onto Splunk Enterprise 7.x
  • Created case for the suspicious issue and forwarding it to Onsite SOC team for further investigation.
  • Conducted Vulnerability assessment for network using Nessus
  • Actively used SIEM technology for searching and monitoring real time events for network security and compliance
  • Assist in the implementation, setup, and management of Symantec DLP (Data Loss Prevention)

Confidential, Lawrenceville, GA

Information Security Analyst

Responsibilities:

  • Monitoring the network to avoid intrusions and applied mitigation techniques using NIDS/HIPS through standard vendor devices such as CISCO Firesight and Firepower
  • Helped win new work at the FAA to support the IT Modernization efforts for their SOAR grants management system. This win is particularly important as it allows us to add large-scale System Development support to our long-standing FAA portfolio. This is a single award, 10-year contract valued at 28M, with 80 of the ceiling anticipated to be executed within the first 3
  • Responsible for SOAR O M budget of 1.1M and responsible for the successful management of the SOAR II System Development budget.
  • Created, prepared and updated the O M and System Development project schedule using Microsoft Project.
  • Implemented first every SOAR Change Control Board 3 months after project transition from previous contractor who had the project for 10 years.
  • Led Operations and Maintenance of a 10 member team consisting of developers, help desk support and security personnel. Developers and Analysts are made up of multiple subcontractors.
  • Led the transition of distributed operation hot backup sites in multiple locations across the US.
  • Solely stood up, updated and configured all applications and databases on FAA production environment to the Global Hosting Center at Booz Allen from scratch.
  • Lead the transition of applications and specialized software running on RedHat Enterprise Linux, CentOS, VMware, and Windows environments on 11 production servers from incumbent.
  • Led System Development of the SOAR modernization team consists of 22 developers, business analyst, requirements analyst, testers, configuration management and security staff.
  • Ensured requirement traceability was established from business requirements to the developer by leveraging the Rational product suite.
  • SOAR Technical Representative at the System Review Board
  • Helped create the overall project schedule for SOAR II as well as determined necessary staff to meet requirement and funding constraints.
  • Assisted with Enterprise Identity Management EIIM implementations utilizing LDAP
  • Researched, synthesized, and analyzed data from numerous sources to develop reports and recommendations for the proposed modernization of the SOAR architecture which included the legacy SOAR Cold Fusion/ .Net architecture to the proposed SOAR II architecture to Java stack to include the following Oracle 11g technologies Webcenter Suite, Database, Access Manager, Identity Directory, Business Intelligence, Primavera, Unified Content Manager, SOA Suite.
  • Helped design the final selected SOAR architecture, infrastructure and software consisting of the IBM BPM Suite Process Manager, Operational Decision Manager, Performance Data Warehouse, .
  • Technical representative of the SOAR project JHS Engineering Review Board
  • Led the BAH CAST Pilot integration with SOAR to capture and quantify the reliability, security, complexity and size of SOAR business application.
  • Worked using Splunk best practice GRC standards for OWASP top 10 CIS CSC, DLP, Data classification, and Encryption standards for Contractors and employee.
  • Created GRC Policy according to HIPPA rule and served as a resource for departments affected by Health Information Portability and Accountability Act (HIPAA) and provides on the requirements to perform actions such as initial inventory, gap analysis, and risk assessments to determine appropriate privacy and security-related organizational policies and Splunk/Phantom 4.1.94.
  • Analysis of Static and Dynamic Application Security Testing (SAST/DAST) tools for use by GSS infrastructure contractor and Application Developer Organizations (ADOs).
  • Supported the GRC implementation of RSA Archer 6.2 Regulatory and Corporate Compliance, Incident, Task and Risk Management Solutions/Use Cases and maintenance of technology for the Compliance Management.
  • Worked on Splunk Phantom SOAR Proof of Value (POV) project and created regex-based parser to parser logs and configuring different connectors
  • Strong understanding of enterprise, network, system/endpoint, and application-level security issues and risks
  • Experience with Windows, Linux, vulnerability assessment tools, firewalls, IDS/IPS, Nessus, NMAP, SIEM, Splunk, Active directory user's attribute bulk modification in PowerShell, query user's details in PowerShell and export reports.
  • Ensured smooth transition for all the Security Applications, Preparing Team Metrics report and weekly/monthly Project status report presenting to the Customer.

Confidential, NYC, NY

Security Analyst

Responsibilities:

  • Worked on Splunk products such as Splunk ES and SOAR and developed and operationalized target network architecture to have successful interaction with event sources to design, develop, and implement the solution
  • Worked using Splunk best practice standards for OWASP top 10 CIS CSC, DLP, Data classification, and Encryption standards for Contractors and employee.
  • Migration of Splunk clusters in various AWS accounts to single AWS account rehydration of Splunk SOAR on AWS environment.
  • Worked for AWS EC2 and Cloud watch services. CI/CD pipeline management through Jenkins as a part of Cloud Security.
  • Guided all the SME's in using Splunk to create dashboards, reports, Alerts etc.
  • Extracted the fields using Rex, Regex, IFX, which are not extracted by Splunk SOAR and extracted the fields using Rex, Regex, IFX, which are not extracted by Symantec SEP.
  • Implemented Symantec endpoint encryption (SEE) and DLP to prevent data breaches for lost and stolen devices
  • Assisted in the implementation, setup, and management of Symantec DLP (Data Loss Prevention).
  • Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools.
  • Provided leadership in architecting and implementing security solutions towards Qualys and SIEM tools like Splunk, Solutionary, LogRhythm, SCCM, Altiris, LanDesk, BigFix, McAfee/Symantec.
  • In depth experience with internal, external, network, & application vulnerability assessments utilizing QualysGuard and FireEye.
  • Involved in standardizing Splunk Phantom SOAR POV deployment, configuration and maintenance across UNIX and Windows platforms.
  • Extensive Experience with Symantec DLP and RSA DLP architecture and implementation for enterprise level.
  • Developed Cyber Security GRC Standards on NIST Framework, HITRUST, HIPPA, GDPR and CCPA, and NISPOM regulations and insured their proper implementation to reduce the risk of vulnerability to IT assets
  • Tested and performed vulnerability analysis (VA) for the client through Nessus & Qualys Guard Scan and McAfee Found stone. Also maintain endpoint protection system.
  • Analyzed credit card number disclosure events via McAfee DLP.
  • In depth knowledge of TCP/IP, IEEE 802.11, wireless, & routing protocols
  • Administering multi-Server windows LAN, WAN.

Hire Now

Report an issue

Privacy Policy
Resume Categories
  • .NET Developers/Architects Resumes
  • Java Developers/Architects Resumes
  • Informatica Developers/Architects Resumes
  • Business Analyst (BA) Resumes
  • Quality Assurance (QA) Resumes
  • Network and Systems Administrators Resumes
  • Help Desk and Support specialists Resumes
  • Oracle Developers Resumes
  • SAP Resumes
  • Web Developer Resumes
  • Datawarehousing, ETL, Informatica Resumes
  • Business Intelligence, Business Object Resumes
  • MainFrame Resumes
  • Network Admin Resumes
  • Oracle Resumes
  • ORACLE DBA Resumes
  • Other Resumes
  • Peoplesoft Resumes
  • Project Manager Resumes
  • Quality Assurance Resumes
  • Recruiter Resumes
  • SAS Resumes
  • Sharepoint Resumes
  • SQL Developers Resumes
  • Technical Writers Resumes
  • WebSphere Resumes
  • Hot Resumes

Sr Information Security Analyst Resume Arlington, VA - Hire IT People (3)

  • Contact
  • Schedule A Meeting
  • Franchise Opportunity
  • Suppliers
  • LCA Posting Notices
  • Hire IT Global, Inc - LCA Posting Notices
  • Electronic PERM posting Notice
Client Services
  • IT Staff Augmentation
  • Hire Programmers
  • Government Services
  • IT Project Management
  • Industry Expertise
  • Resume Database
Job Seekers
  • Browse Jobs
  • Upload Resume
  • Employee Benefits
  • Resume Marketing
  • Us Citizens/Green Cards
  • Visa Sponsorship
  • Employer on Record Services (EOR)
  • Forms Checklists
Visa Sponsorship
  • H1B Visa Transfer
  • E3 Visa Sponsorship
  • TN Visa Sponsorship
  • EB3 to EB2 Porting
  • Green Card Sponsorship

Loading, Please wait...

Sr Information Security Analyst Resume Arlington, VA -  Hire IT People (2024)

FAQs

How much does an information security analyst earn in Arlington VA? ›

As of Jul 31, 2024, the average annual pay for a Cyber Security Analyst in Arlington is $107,944 a year.

What are the top 3 top paying industries for information security analysts? ›

Industry profile for Information Security Analysts:
IndustryEmployment (1)Annual mean wage (2)
Computer Systems Design and Related Services36,280$ 108,910
Data Processing, Hosting, and Related Services5,240$ 108,600
Telecommunications4,450$ 104,470
Software Publishers2,770$ 117,260
1 more row

Is information security analyst in high demand? ›

Information security analysts' employment outlook is positive, with an expected growth rate of 32% between 2022 and 2032 with an estimated 16,800 job openings per year on average during the same timeframe.

What is the role of a senior IT security analyst? ›

Senior security analyst provides forensic analysis of network packet captures, DNS, EDR, DNS, proxy, host-based security and application logs, as well as logs from various types of security sensors.

What is the highest salary for a security analyst? ›

Security Analyst salary in India ranges between ₹ 3.0 Lakhs to ₹ 10.0 Lakhs with an average annual salary of ₹ 6.0 Lakhs.

How much does a senior cyber security analyst make in Virginia? ›

Senior Cyber Security Analyst Salary in Virginia
Annual SalaryHourly Wage
Top Earners$138,799$67
75th Percentile$127,900$61
Average$106,184$51
25th Percentile$99,100$48

Can you make $500,000 a year in cyber security? ›

For example, in security operations (SecOps) and governance, risk and compliance (GRC) roles, the top 25% averages around $523,000 per year in cash compensation. That figure drops to $447,000 for product security department heads, $465,000 for deputy CISOs and $360,000 for identity and access management leaders.

Which IT job is the highest paid? ›

Top 10 Highest Paid Jobs in IT Sector in 2024
  • Big Data Engineer.
  • Machine Learning Engineer.
  • AI/ML Architect.
  • IoT Solutions Architect.
  • Cloud Architect.
  • Blockchain Developer.
  • Full Stack Developer.
  • AR/VR Developer.
Jul 10, 2024

Can you make 100k a year in security? ›

Yes. The cybersecurity field pays higher-than-average salaries; even entry-level positions can pay more than $100,000 per year, according to salary data from CyberSeek. Earning potential varies based on factors like location, industry, and workers' professional certifications.

How stressful is information security analyst? ›

Cybersecurity Analysts often operate in high-stakes environments where vigilance is paramount, as they protect sensitive data from ever-evolving threats. This responsibility can be stressful, necessitating continuous learning and adaptability.

What is the average age of information security analyst? ›

The workforce of Information security analysts in 2022 was 157,973 people, with 16.8% woman, and 83.2% men. The average age of male Information security analysts in the workforce is 41.1 and of female Information security analysts is 42.2, and the most common race/ethnicity for Information security analysts is White.

Which state employs the most information security analyst? ›

Geographic profile for Information Security Analysts:
StateEmployment (1)Location quotient (9)
Virginia18,4604.01
California16,5100.80
Texas14,8700.95
Florida12,8401.16
1 more row

What position comes after security analyst? ›

After working as a cybersecurity analyst for 2-5 years, most cybersecurity professionals move up to mid-level cybersecurity roles as architects. Cybersecurity architect roles include Penetration Tester (also known as Pen Testers), Certified Ethical Hacker, and Threat Hunter.

What does a senior information security analyst do? ›

Job Description:

Responsible for investigating incidents, analysing attack methods, researching new defense techniques and tools, developing security policy, and documenting procedures for SOC. Maintain baselines for secure configuration and operations.

How long does IT take to become a senior cybersecurity analyst? ›

For most information security analysts, the career path takes 4-6 years. These professionals typically complete a four-year degree and build skills in cloud security, threat hunting, and threat intelligence. They may need several certifications, including CompTIA Security+.

How much does an information security analyst earn in northern Virginia? ›

Information security analysts earn an average yearly salary of $108,580. Wages typically start from $68,250 and go up to $162,830.

Is becoming a information security analyst hard? ›

Entry-level experience as an information security analyst may at first be difficult to land without completing an undergraduate degree or relevant bootcamp program. At the same time that landing a job out the gates may appear difficult, there are ways that candidates can prepare appropriately.

How long does it take to become an information security analyst? ›

For most information security analysts, the career path takes 4-6 years. These professionals typically complete a four-year degree and build skills in cloud security, threat hunting, and threat intelligence. They may need several certifications, including CompTIA Security+.

Is being an information security analyst stressful? ›

The nature of cybersecurity work can be incredibly stressful, with the potential for significant consequences in the event of oversight. A work-life balance is crucial for managing stress, reducing the likelihood of mistakes, and ensuring that analysts are consistently performing at their best.

References

Top Articles
9 Ways Bananas Can Help You Lose Weight, Say Dietitians
Bacteria - Definition, Shapes, Characteristics, Types & Examples
Durr Burger Inflatable
O'reilly's Auto Parts Closest To My Location
Week 2 Defense (DEF) Streamers, Starters & Rankings: 2024 Fantasy Tiers, Rankings
Nehemiah 4:1–23
The Definitive Great Buildings Guide - Forge Of Empires Tips
Missing 2023 Showtimes Near Cinemark West Springfield 15 And Xd
Google Sites Classroom 6X
Koordinaten w43/b14 mit Umrechner in alle Koordinatensysteme
Chelsea player who left on a free is now worth more than Palmer & Caicedo
Unlocking the Enigmatic Tonicamille: A Journey from Small Town to Social Media Stardom
The Binding of Isaac
Caresha Please Discount Code
How to Store Boiled Sweets
Animal Eye Clinic Huntersville Nc
ocala cars & trucks - by owner - craigslist
Money blog: Domino's withdraws popular dips; 'we got our dream £30k kitchen for £1,000'
Missed Connections Dayton Ohio
Conscious Cloud Dispensary Photos
Unit 33 Quiz Listening Comprehension
Rondom Ajax: ME grijpt in tijdens protest Ajax-fans bij hoofdbureau politie
Morristown Daily Record Obituary
Rural King Credit Card Minimum Credit Score
Where Is George The Pet Collector
Cincinnati Adult Search
Company History - Horizon NJ Health
LCS Saturday: Both Phillies and Astros one game from World Series
The Listings Project New York
Move Relearner Infinite Fusion
Robotization Deviantart
Tactical Masters Price Guide
Umn Biology
Current Students - Pace University Online
*!Good Night (2024) 𝙵ull𝙼ovie Downl𝚘ad Fr𝚎e 1080𝚙, 720𝚙, 480𝚙 H𝙳 HI𝙽DI Dub𝚋ed Fil𝙼yz𝚒lla Isaidub
Kamzz Llc
Napa Autocare Locator
Bt33Nhn
Panchitos Harlingen Tx
Boggle BrainBusters: Find 7 States | BOOMER Magazine
Msnl Seeds
Ticketmaster Lion King Chicago
Philadelphia Inquirer Obituaries This Week
Insideaveritt/Myportal
2023 Fantasy Football Draft Guide: Rankings, cheat sheets and analysis
Emulating Web Browser in a Dedicated Intermediary Box
Bill Manser Net Worth
Nimbleaf Evolution
Candise Yang Acupuncture
3500 Orchard Place
Frequently Asked Questions
Craigs List Sarasota
Latest Posts
Article information

Author: Horacio Brakus JD

Last Updated:

Views: 6054

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Horacio Brakus JD

Birthday: 1999-08-21

Address: Apt. 524 43384 Minnie Prairie, South Edda, MA 62804

Phone: +5931039998219

Job: Sales Strategist

Hobby: Sculling, Kitesurfing, Orienteering, Painting, Computer programming, Creative writing, Scuba diving

Introduction: My name is Horacio Brakus JD, I am a lively, splendid, jolly, vivacious, vast, cheerful, agreeable person who loves writing and wants to share my knowledge and understanding with you.