Summary
Overview
Work History
Education
Skills
Education Training And Certifications
References
Teaching And Instructional Experience
Core Technical Competencies
Timeline
Generic

Harold E. Poling Jr.

Folsom

Summary

Senior IT Infrastructure and Security professional with over 25 years of progressive experience supporting enterprise, government, education, and financial environments. Deep expertise in Windows Server (2000–2025), CrowdStrike, Fortinet, and Nutanix. Security tooling, digital forensics, and incident response. Proven leader in high‑visibility investigations, lab architecture, and secure environment design. Trusted contributor to California State Security Initiatives.

Overview

30
30
years of professional experience

Work History

Owner Non-Profit

One Tech Four You
01.2022 - Current
  • Led Multiple IR actions to restore operations for churches.
  • IR actions usually consist of open-source software like Velociraptor, Elastic, Arkime, and Guacamole for TLS secured RDP access to replace other things that got them infected.
  • Build out over 50 locations with Fortinet, PfSense, Opensense, NFGFW, Layer 3 LAN, and establish free imaging software using Fog by Linux.
  • In the process of completing two large projects with my mentor group that meets Tuesday through Thursdays.
  • I mentor up to 10 people at a time because most of them have minimal experience.
  • I mentor them in Installing CAT 6 upgrading existing infrastructure Switches, Firewalls, and teach the how to conduct IR response.
  • Security Architecture for Churches and Non-Profit

Information Technology Specialist III (Technical)

California Office of Technology Services
01.2020 - Current
  • Testing and training on multiple platforms Elastic, Nutanix, CrowdStrike, Security Onion, Arkime.
  • Created videos in test lab to instruct new users with mp4’s.
  • Established business requirements for a secure Test Lab and Forensics Containment Area with two‑person control, 24×7 camera monitoring, and formal chain‑of‑custody.
  • Developed and delivered training plans enabling L1/L2 staff to rapidly adopt CDT security tools.
  • Conducted tabletop exercise’s and active LAB exercises for physical incident response exercises using CrowdStrike, Splunk, and Vectra.
  • Produced Visio diagrams of existing infrastructure, identifying end‑of‑life hardware and guiding replacement strategies for security tools.
  • Evaluate security software in our Air Gapped lab with live viruses and exploits to evaluate detection and performance.
  • Create countless as-builts for incident response recovery projects.

Information Technology Specialist II

California Office of Technology Services
01.2017 - 01.2020
  • Led two high‑level digital forensics investigations in coordination with California Highway Patrol (CHP).
  • Served as technical lead and project manager for CrowdStrike Enterprise Deployment with minimal operational impact.
  • Built multiple CrowdStrike instances (LAB and IR‑specific).
  • Created PowerShell scripts to automate device ingestion during incidents that included Memory Dump, and Packet Capture using Netsh, Current Patches.
  • Installed and tested Vectra appliances for lateral‑movement detection and packet capture; assisted with enterprise rollout.
  • Authored CrowdStrike policies, procedures, and role definitions (L1–L3).
  • Developed PowerShell scripts for covert epl to pcap.
  • Temporary duty assignment CALOES (CALSIC) were we used CrowdStrike for IR.
  • Went on multiple IR deployments were tools were limited to only a couple tools so CrowdStike was our main tool.
  • Designed incident response kit with CALSIC using CrowdStike, FireEye and Vectra.

Systems Software Specialist II

California Office of Technology Services
01.2012 - 01.2017
  • Managed multiple concurrent enterprise Windows infrastructure projects.
  • Architected disaster recovery solutions using CommVault.
  • Performed lifecycle analysis and patch leadership for 1,500+ Windows servers (2003–2016).
  • Designed SCCM deployment packages and resolved client communication issues.
  • Created VMware 5.1 training documentation and videos for staff onboarding.

Systems Software Specialist II

California Department of Justice
01.2010 - 01.2012
  • Built Exchange 2010 training lab supporting enterprise migration.
  • Maintained GroupWise 7/8 and SUSE Linux servers.
  • Designed DR solutions using Networker/Avamar over constrained WAN links.
  • Trained staff on VMware and vCenter migration procedures.

Owner & Business Manager

HL‑TECH
01.2003 - 01.2010
  • Designed, migrated, and supported Windows 2003/2008 Enterprise environments on VMware ESX 4.x.
  • Implemented Exchange 2003 clusters, SQL Server 2005, WSUS, SCCM, SharePoint (WSS/MOSS).
  • Managed Cisco ASA firewalls, VPNs, IDS/IPS systems.
  • Led district‑wide fiber, VLAN, and Layer‑3 switching projects for multiple school districts.
  • Owner & Business Manager

Microcomputer Specialist

Gold Oak Union School District
01.2000 - 01.2003

IT Manager

Western Sierra Bancorp
01.1997 - 01.2000

Network Administrator / Project Manager

A&A Computers
01.1996 - 01.1997

Education

Community College of the Air Force

Information Security Leadership Academy

California Department of Technology ISLA

CompTIA Security+ -

SANS 501 - Advanced Security Essentials – Enterprise Defender

SANS 504 - Hacker Tools, Techniques, Exploits & Incident Handling

Microsoft 365 Security Threat Protection Implementation and Management

CrowdStrike FHT 101, FHT 120, FHT 202

Deploying Securing and Administering Palo Alto Firewalls

Palo Alto Firewalls

Incident Response, Splunk, Ethical Hacking, NSM

Extensive Pluralsight training

Cyber Threats and Kill Chain Methodology

Threat Intelligence

Requirements, Planning, Direction, and Review

Threat Intelligence

Skills

  • Nutanix AHV
  • VMware ESXi 67-803
  • HyperV 2012 to 2025
  • Windows Server 2000–2025
  • Windows XP–11
  • Ubuntu
  • Oracle Linux
  • SUSE Linux
  • NetWare
  • CrowdStrike Falcon
  • FireEye
  • Splunk
  • Vectra
  • Security Onion
  • Autopsy Forensics
  • FTK Imager
  • Elastic
  • Arkime
  • Velociraptor
  • Active Directory 2000 to 2022
  • Group Policy
  • DNS
  • DHCP
  • Exchange
  • HP Switches
  • Cisco Switches VLANs
  • Layer 2/3 Switching
  • VPNs
  • SCCM
  • WSUS
  • CommVault
  • Avamar
  • Networker
  • Remedy
  • Visio
  • PowerShell
  • Bash Scripts
  • Fortinet
  • Palo Alto
  • Cisco ASA
  • PfSense
  • OpenSense

Education Training And Certifications

  • Community College of the Air Force
  • California Department of Technology ISLA (Information Security Leadership Academy)
  • CompTIA Security+
  • SANS 501: Advanced Security Essentials – Enterprise Defender
  • SANS 504: Hacker Tools, Techniques, Exploits & Incident Handling
  • Microsoft 365 Security Threat Protection Implementation and Management
  • CrowdStrike FHT 101, FHT 120, FHT 202
  • Palo Alto Firewalls (Deploying Securing and Administering Palo Alto Firewalls)
  • Extensive Pluralsight training in Incident Response, Splunk, Ethical Hacking, NSM
  • Threat Intelligence: Cyber Threats and Kill Chain Methodology
  • Threat Intelligence: Requirements, Planning, Direction, and Review
  • Active SECRET Security Clearance (CAL OES)
  • Ethical Hacking Understanding Ethical Hacking
  • Hands-On Incident Response Fundamentals
  • Identity and Access Management for CompTIA Security+
  • Network Penetration Testing Using Python and Kali Linux
  • Responding to Incidents
  • Threats, Attacks, and Vulnerabilities for CompTIA Security+

References

Available upon request

Teaching And Instructional Experience

Incident Response Instructor, Cyber Dawn Program, 01/01/25, Taught Incident Response (IR) fundamentals and advanced procedures. Delivered tabletop and hands‑on lab exercises covering detection, containment, eradication, and recovery. Emphasized real‑world response workflows, documentation, and chain‑of‑custody practices. Used paid and Open-Source software like Velociraptor, CrowdStrike, Elastic, Splunk in my class to teach real world IR defending against California National Guard cyber team.

Core Technical Competencies

Nutanix AHV, VMware ESXi 6.7-8.03, HyperV 2012 to 2025, Windows Server 2000–2025, Windows XP–11, Ubuntu, Oracle Linux, SUSE Linux, NetWare, CrowdStrike Falcon, FireEye, Splunk, Vectra, Security Onion, Autopsy Forensics, FTK Imager, Elastic, Arkime, Velociraptor., Active Directory 2000 to 2022, Group Policy, DNS, DHCP, Exchange, HP Switches, Cisco Switches VLANs, Layer 2/3 Switching, VPNs, SCCM, WSUS, CommVault, Avamar, Networker, Remedy, Visio, PowerShell, Bash Scripts, and most opensource IR/EDR tools., Fortinet, Palo Alto Cisco ASA, PfSense, OpenSense

Timeline

Owner Non-Profit

One Tech Four You
01.2022 - Current

Information Technology Specialist III (Technical)

California Office of Technology Services
01.2020 - Current

Information Technology Specialist II

California Office of Technology Services
01.2017 - 01.2020

Systems Software Specialist II

California Office of Technology Services
01.2012 - 01.2017

Systems Software Specialist II

California Department of Justice
01.2010 - 01.2012

Owner & Business Manager

HL‑TECH
01.2003 - 01.2010

Microcomputer Specialist

Gold Oak Union School District
01.2000 - 01.2003

IT Manager

Western Sierra Bancorp
01.1997 - 01.2000

Network Administrator / Project Manager

A&A Computers
01.1996 - 01.1997

Community College of the Air Force

Information Security Leadership Academy

California Department of Technology ISLA

CompTIA Security+ -

SANS 501 - Advanced Security Essentials – Enterprise Defender

SANS 504 - Hacker Tools, Techniques, Exploits & Incident Handling

Microsoft 365 Security Threat Protection Implementation and Management

CrowdStrike FHT 101, FHT 120, FHT 202

Deploying Securing and Administering Palo Alto Firewalls

Palo Alto Firewalls

Incident Response, Splunk, Ethical Hacking, NSM

Extensive Pluralsight training

Cyber Threats and Kill Chain Methodology

Threat Intelligence

Requirements, Planning, Direction, and Review

Threat Intelligence
Harold E. Poling Jr.