Summary
Overview
Work History
Education
Skills
Affiliations
Certification
Timeline
Generic

Jason Staples

Georgia

Summary

Adept at identifying and resolving IT security vulnerabilities, I enhanced system integrity by 30% at Legally Can't Disclose. My expertise in network security and analytical thinking, honed at Mellys Custom Computers, underpins my ability to deliver robust solutions. I excel in fostering client relationships and driving technological advancements.

Overview

2025
2025
years of professional experience
1
1
Certification

Work History

Paralegal Consultant

Guerilla Paralegal Inc
10.2024 - Current
  • Conferred with clients and other involved parties to gather and track case information.
  • Conducted detailed client intakes and entered information into company database.
  • Prepared legal briefs, motions, and pleadings.
  • Assisted counsel in preparing answers, providing documentation, and information for discovery request.
  • Liaised with other paralegals and legal staff to complete common tasks on schedule.
  • Maintained and updated organized client contact information to keep in touch with clients and provide updates on cases.
  • Communicated with clients, opposing counsel and court personnel to keep all parties informed on case updates.
  • Summarized depositions, legal documents and other material to provide attorney with relevant material for cases.
  • Helped attorneys prepare for trial by organizing exhibits and calling on witnesses to testify at hearings.
  • Edited and proofread legal documents to verify accuracy.
  • Managed scheduling of court calendars and deadlines to maintain smooth flow of firm operations.
  • Assisted in preparation of settlement proposals and agreements to help attorneys negotiate settlement in best interest of client.
  • Assisted attorneys with reviewing and organizing witness reports.
  • Communicated pertinent information to clients via phone, email, and mail.
  • Contacted clients to schedule appointments and discuss progress of cases.
  • Researched statutes, decisions, legal articles, and codes.
  • Revised and finalized letters, briefs, and memos.
  • Collaborated with attorneys to develop strategies for each case.
  • Reviewed, edited and proofread litigation for proper grammar, spelling and punctuation.
  • Analyzed deeds of trust to verify grantor, grantee, trustee and loan amounts for executive leadership.
  • Conducted background investigations on defendant.
  • Reviewed Deed of Trust, Title Commitment, and prior bankruptcies documents.
  • Prepared various exhibits for attorneys for public meetings, zoning commission meetings, and legal resolutions.
  • Generated leads to meet and exceed revenue goals by identifying new clients.
  • Attended court hearings and depositions to take notes and document proceedings.
  • Created weekly, monthly, and quarterly expense reports.
  • Produced legal documents such as briefs, pleadings and appeals.
  • Researched and analyzed legal issues and cases to provide accurate advice to clients.
  • Developed polished motions and briefs to support litigation processes and court proceedings.
  • Contacted witnesses to testify under oath at court hearings.
  • Interviewed clients to obtain information relevant to cases.
  • Wrote and filed pleadings with courts on schedule to maximize case success.

Vulnerability Assessment and Penetration Tester

Legally Can't Disclose
01.2024 - 12.2024
  • Designed tests and tools to break into security-protected applications and networks to probe for vulnerabilities.
  • Developed solutions to security issues such as temperature, humidity, vandalism and natural disasters.
  • Collaborated with external vendors to perform penetration tests on network devices, operating systems and databases.
  • Developed risk assessment reports to identify threats and vulnerabilities.
  • Conducted IT audit assessments for systems or applications to recommend solutions to mitigate risks.
  • Conducted and participated in annual disaster recovery exercises.
  • Analyzed security policies for usefulness and value to suggest security policy improvements.
  • Assessed threats, risks and vulnerabilities from emerging security issues to advise pertinent stakeholders on appropriate measures.
  • Recommended IT security improvements to achieve system confidentiality, integrity and availability.
  • Conducted risk analysis, system certifications, auditing, security documentation and security testing.
  • Identified weaknesses and vulnerabilities in network systems.
  • Assisted with development of cybersecurity policies and procedures to prevent and defend against unauthorized access to systems, networks, and data.
  • Simulated attack scenarios using threat actors' tactics and techniques.
  • Used analysis from attack simulations to identify gaps in threat detection or response.
  • Provided cybersecurity expertise on applications development projects, enabling appropriate operating environment configurations.
  • Researched latest security threats and vulnerabilities to stay abreast of trends and threat actors.
  • Documented entire penetration testing lifecycle during engagements for future review.
  • Recommended measures to protect systems from modification, disclosure, or destruction.
  • Reviewed proposed new systems, networks, and software designs for potential security risks.
  • Conducted breach and attack simulation operations against systems.

Computer Technician

Mellys Custom Computers
  • Used diagnostic tools to identify hardware failures and replace non-functional components.
  • Linked computers to network and peripheral equipment.
  • Tested and installed motherboards, processors, and graphics cards on desktops and laptops for corporate staff.
  • Responded to support requests from end-users and patiently walked individuals through basic troubleshooting tasks.
  • Refurbished PC systems and peripherals such as monitors, networking equipment, printers, and more.
  • Set up and maintained user accounts and client access.
  • Performed troubleshooting to correct computer hardware and software malfunctions.
  • Performed installation, maintenance and repair for complex internal computer hardware and various software applications.
  • Completed routine and complex software installations, assisting users of various levels of computer sophistication in operation of new and existing software.
  • Recovered critical information from data back ups to restore functionality.
  • Recommended new and replacement hardware and software purchases.
  • Maintained office PCs, networks and mobile devices.
  • Managed system-wide operating system and software deployments as well as related software upgrade problems.
  • Set up PCs, projectors, and microphones for use in video conferencing rooms.
  • Configured systems according to prescribed software and hardware frameworks.
  • Established, repaired and optimized networks by installing wiring, cabling and devices.
  • Performed troubleshooting and repaired peripheral devices such as printers, scanners and VoiP.
  • Corrected connectivity faults to restore user access to local networks, cloud-based storage and public web.
  • Monitored server room, wireless network and other server infrastructure, keeping systems running smoothly.
  • Proved successful working within tight deadlines and a fast-paced environment.

Education

U.S. Air Force Security Manager

CDSE Defense Counterintelligence & Security Agency
Washington, DC
11.2024

Behavioral Science in Insider Threat

CDSE Defense Counterintelligence & Security Agency
Washington, DC
11.2024

Marking Special Categories of Classified Informati

CDSE Defense Counterintelligence & Security Agency
Washington, DC
11.2024

Counterintelligence Awareness And Security Brief

CDSE Defense Counterintelligence & Security Agency
Washington, DC
11.2024

Storage Containers And Facilities

CDSE Defense Counterintelligence & Agency
Washington, DC

Introduction To Information Security

CDSE Defense Counterintelligence & Security Agency
Washington, DC
11.2024

Introduction To Personnel Security

CDSE Defense Counterintelligence & Security Agency
Washington, DC
11.2024

Introduction To Industrial Security

CDSE Defense Counterintelligence & Security Agency
Washington, DC
11.2024

Skills

  • Issue diagnosis and resolution
  • Application software testing
  • Network testing
  • Server installations
  • Network security measures
  • Computer configurations
  • Help desk assistance
  • Peripheral device installation
  • Software applications
  • Relationship building
  • Analytical thinking
  • Inventory management
  • Network administration
  • Hardware troubleshooting
  • Workstation testing
  • IT security management
  • HelpDesk support
  • Technical support
  • Email account set up
  • Telephone etiquette
  • PC refurbishment
  • Installation and repair
  • VoIP applications
  • Change management
  • Data recovery
  • System upgrades
  • Cable pulling
  • Remote support
  • Software patching
  • Issue tracking
  • Hardware configuration
  • Computer imaging
  • Network configuration
  • Programming
  • Customer service
  • Work integrity
  • Hardware installation
  • System backup
  • Advanced troubleshooting
  • Printer setup
  • System diagnostics
  • Network operating systems
  • Peripheral repair
  • Hardware and software installation
  • Software feature demonstrations
  • Software updates
  • Technical writing
  • Security best practices
  • Network component installations
  • Computer troubleshooting
  • Installation management
  • Attention to detail
  • Wire pulling
  • Security patching
  • Regulatory compliance
  • Technical analysis
  • Electronic record integrity
  • Performance optimization
  • Disaster recovery
  • Wireless networking
  • Help desk support
  • System testing
  • User training
  • Project management
  • Device configuration
  • Network security
  • Verbal and written communication
  • Server maintenance
  • Preventive Maintenance
  • Web security
  • Valid Driver's license
  • Printers and peripherals installation
  • Desktop and laptop installations
  • Multi-line telephone set up
  • Software licensing
  • Settings configuration
  • Hardware repair
  • Operating system testing
  • Troubleshooting and Diagnostics
  • Virus removal
  • Quality assurance controls
  • Software installation
  • Problem replication

Affiliations

Most Worship Union Grand Lodge of Florida PHA


American Bar Association


Atlanta Paralegal Association


Real Estate Investing Association (Buckhead / Beverly Hills)


Jewelers Board of Trade


Brotherhood of Tramsters

Certification

Google Cyber security

Pentest +

U.S. Air Force Security Manager

Timeline

Paralegal Consultant

Guerilla Paralegal Inc
10.2024 - Current

Vulnerability Assessment and Penetration Tester

Legally Can't Disclose
01.2024 - 12.2024

Computer Technician

Mellys Custom Computers

U.S. Air Force Security Manager

CDSE Defense Counterintelligence & Security Agency

Behavioral Science in Insider Threat

CDSE Defense Counterintelligence & Security Agency

Marking Special Categories of Classified Informati

CDSE Defense Counterintelligence & Security Agency

Counterintelligence Awareness And Security Brief

CDSE Defense Counterintelligence & Security Agency

Storage Containers And Facilities

CDSE Defense Counterintelligence & Agency

Introduction To Information Security

CDSE Defense Counterintelligence & Security Agency

Introduction To Personnel Security

CDSE Defense Counterintelligence & Security Agency

Introduction To Industrial Security

CDSE Defense Counterintelligence & Security Agency
Jason Staples