RESUME
RODGER JOHNSTON
With over 23 years in Information Technology, I now specialize in cybersecurity, having completed
the Google Cybersecurity Program in November 2023. This resume showcases my experience and
my 10 Cybersecurity projects, reflecting my dedication to advanced security solutions.
Provided technical support for a wide range of short term IT services to businesses locally,
nationally, and internationally.
Provided technical support for various IT services as a freelancer to businesses,
showcasing foundational cybersecurity knowledge Performed data backups on servers,
workstations, laptops, and cell phones.
Managed websites, removed viruses, and prevented malware/ransomware attacks.
Created , updated and repaired VMware & Oracle VM VirtualBox installations
Performed security audits and repairs and for critical databases and server systems
Authored “The Good Seed” , “The Best Girl I Have Never Met” and Escape Room - Hidden In
Plain Sight” books that were published on multiple platforms in multiple countries
Contact
Address
Las Vegas, Nevada, 89122
Phone
(702) 483-7095
Email
jobs@rodgerjohnston.com
Specialized Training
U.S. Army Military Police
School (1981)
Odessa College Law
Enforcement Academy (1994)
(Armed Security) Hughes
Aircraft Company (1983-1992)
Certifications
CompTIA A+ Certified (1998)
Microsoft MCP (1999)
Advanced Google Analytics
Certificates
Google Cybersecurity Certificate
Google Analytics for Beginners
Google Advanced Analytics
Microsoft Professional AI
MS SQL DBA Administration
Database Security CyberPro
EC Council Master Wireshark
EC-Council WordPress Security
EC-Council SQL Injection
EC-Council Hackers & Pen Testers
Data Science with Python
ISO 27001/ NIST 800-53
DOD Mandatory Controlled (CUI)
Laptop Repair Certificate
Simple & Complex SQL Queries
OS & Network Forensics
Microsoft PowerShell
Linux OS Commands
SSL Certs for Web Developers
Starline Tours of Hollywood 6/ 2011-12/ 2014
IT Specialist
Proactively managed the company helpdesk for nine separate offices
Actively respond to users’ technical issues in a timely manner
Successfully make recommendations for services and products to meet operational needs.
Competently assist users in resolving technical PC and network problems, provisioning of
new hardware and software on end users’ computer
Effectively remove viruses and optimized computers as needed.
Capably train end users in operation of software and hardware
Efficiently perform documentation of system procedures
Troubleshoot, diagnose, and solve issues that arise and address issues at all levels
Skillfully provided desktop support for company laptops, desktop, servers, and tablets
Competently imaged, deployed and migrated computers as required
Competently pulled surveillance footage from security cameras as directed
Performed Installations, configured Linux based systems for use and sale to employees
Competently performed data backups at all offices, including corporate offsite location.
Utilizing NAS hardware and other media to perform regular and timely backup of critical
data.
PROFESSIONAL EXPERIENCE
Continued Con
RESUME
E! Entertainment 3/2007-4/2008
Active Directory Administrator / Helpdesk Operator
Actively responded to assigned tickets and completed repairs, including HD replacements, ram upgrades and
addressing video issues.
Successfully performed Windows administration, using Active Directory and other admin tools
Competently unlocked users account and provided call center and desktop support,
Efficiently setup and configured Outlook /Microsoft Exchange
Xdrive.com/America Online 7/ 2004-6/2006
Customer Service Representative Level 2
Proactively responded to and resolved customer inquiries and issues
Competently troubleshot Internet connectivity issues relating to the product
Actively tested software and reported bugs and other anomalies to the department manager
Successfully documented
Rodger Johnston 5/2008-3/2011
Freelance Technical Support Specialist/ Web developer
Efficiently maintained and updated websites for clients
Proactively provided exceptional customer service to both for profit and nonprofit organizations
Successfully managed all aspects of an internet radio station for a non-profit
Capably setup and managed a webhosting company
Effectively performed repairs at businesses and home locations
Produced long form and Short form shows for broadcast television
Actively removed viruses and optimized computers as needed
Capably processed email and web visitors with counts in the millions
Upgraded ram, hard disk and video cards as needed or required
Time Warner Communications 8/1999-9/2002
Senior Tech Support Specialist - Level 3
Responsible for technical support at level 3 for a customer base of over a million people
Trained and monitored level 1 technicians for quality control and compliance
Responsible for all Apple service calls at level 3
Worked with level 1, level 2, and level 3 technicians to resolve issues and issue credits to customers
Competently performed repairs at businesses and home locations
SCHOOLS
US Army Military Police School
Odessa College Law Enforcement Academy
LeTourneau University (Junior)
LICENSES
GMDSS Operator/ Maintainer License with Ship Radar Endorsement
General Radiotelephone License (FCC)
PROFESSIONAL ORGANIZATIONS
Professional Association for SQL Server (SQLPass)
Technology Association of Georgia (TAG)
Screen Actors Guild (SAG-AFTRA)
International Association of Professional Writers & Editors (IAPWE)
Contact: Rodger Johnston rodger@rodgerjohnston.com
I have developed ten comprehensive Cybersecurity programs: Network Scanner, Password
Manager, File Monitor, Incident Response Tool, Web Scraper, File Integrity Checker, Log Analyzer,
Notier, Anti-Phish, and IP Changer. Each project reects my commitment to enhancing security
measures and showcases my expertise in articial intelligence, software engineering, and
Cybersecurity.
Network Scanner
The CyberDefender - Network Scanner is an indispensable tool for cybersecurity professionals and
network administrators. It oers versatile scanning options, including TCP Connect, SYN Stealth,
and UDP scans, enabling you to identify open ports, assess vulnerabilities, and detect unauthorized
devices in real-time. With features such as detailed scan reports, network mapping, and intrusion
detection, this tool provides valuable insights into your networks security, helping you preempt
potential threats.
Incident Response Tool
When dealing with cybersecurity incidents, the CyberDefender - Incident Response Tool provides
essential support. It enables you to document incidents with comprehensive details, create event
timelines, collect and store evidence, and update incident statuses. Designed to enhance your
incident response capabilities, this tool simplies the documentation, analysis, and resolution of
security issues
File Monitor
The CyberDefender - File Monitor delivers real-time oversight of le modications, creations, and
deletions, maintaining the integrity and security of your data. Ideal for system administrators and
cybersecurity professionals, it includes features like a detailed event log, real-time notications,
and highlighted changes, enabling to track and respond to unauthorized le activities promptly.
Password Manager
In today’s digital age, secure password management is crucial. The CyberDefender - Password
Manager ensures your credentials are stored and managed securely. Featuring AES-256 encryption,
this tool allows you to generate strong, random passwords, store them safely, and manage your
password data eortlessly. Whether for personal or enterprise use, this tool safeguards your
sensitive information from unauthorized access.
File Monitor
The CyberDefender - File Monitor delivers real-time oversight of le modications, creations, and
deletions, maintaining the integrity and security of your data. Ideal for system administrators and
cybersecurity professionals, it includes features like a detailed event log, real-time notications,
and highlighted changes, enabling you to track and respond to unauthorized le activities promptly.
Log Analyzer
Introducing the CyberDefender - Log Analyzer, a powerful tool for in-depth log analysis. Designed
for both cybersecurity professionals and enthusiasts, it simplies log management with advanced
features such as extensive le navigation, sophisticated lters for critical incident isolation, and
customizable reports with charts. Enhanced with visualization tools and specialized security
features like anomaly detection and threat intelligence integration, the Log Analyzer converts raw
log data into actionable insights, helping you stay ahead of potential threats
Web Scraper
The CyberDefender - Web Scraper is a versatile application for data extraction, suited for
researchers, data enthusiasts, and professionals. It automates the web scraping process, allowing
you to schedule tasks, view results in real-time, and save data in various formats, including TXT,
CSV, PDF, and XLSX. This tool streamlines data extraction for tasks such as vulnerability research,
content analysis, and competitive intelligence.
Notier
The CyberDefender - Notier eiciently manages and schedules notications with ease. It oers
features like easy notication setup, scheduled notications, real-time progress tracking, and
options for saving data in multiple formats. Whether you need to send SMS notications, manage
API keys, or toggle between light and dark modes, this tool is designed to enhance your productivity
and keep you informed. Its user-friendly interface and portability make it ideal for both novice and
advanced users.
Anti-Phish
The CyberDefender - Anti-Phish is a specialized tool in development aimed at protecting users from
phishing attacks. It uses advanced machine learning algorithms trained on a balanced dataset of
legitimate and phishing URLs to detect and prevent phishing attempts. The application also
integrates with a whitelist of known safe domains to reduce false positives. With features like static
and continuous model training, 3D data visualization, and dark mode, Anti-Phish oers robust
phishing detection capabilities. Please note that this tool is currently in an experimental phase and
is not yet part of the public CyberDefender suite.
IP Changer
The CyberDefender - IP Changer is a crucial tool for enhancing your network’s security by
dynamically altering your IP address at predened intervals. This helps in reducing the likelihood of
targeted attacks by making it harder for potential threats to track and exploit your network. The tool
oers features such as automated IP change schedules, customizable intervals, and options for
both manual and automatic switching between IP addresses. With its user-friendly interface and
seamless integration into your existing network infrastructure, the IP Changer adds an extra layer of
security, making it an essential addition to your cybersecurity toolkit.