We provide IT Staff Augmentation Services!

Systems Engineer Reswume Profile Augusta, Ga

3.00/5 (Submit Your Rating)

SUMMARY

Innovative enterprise security, privacy and compliance professional with over 35 years experience. Responsible for the strategic initiative development regarding all aspects of Enterprise Security with a primary focus on developing Enterprise Wide Converged Security Capabilities, Offensive Defensive Cyber Network Operations, Data Privacy, Compliance Assurance programs, information technology, architecture, hardware acquisitions, application development, implementation, support of IT systems, system reliability, compliance and information assurance ensuring integrity of data, system security and proprietary information.

EXPERIENCE

Confidential

COCyber Engineer

  • COO and Deputy, US Army Cyber Protection Brigade, Cyber Protection Team, responsible for the supervision and care of Cyber Protection Teams, Agent of the Certification Authority ACA group, Command Compliance Readiness Inspection teams and the C2 element of the Brigade
  • Oversee the passive and active cyberspace operations intended to preserve the ability to utilize friendly cyberspace capabilities and protect data, networks, net-centric capabilities, and other designated systems. Army forces conduct DCO by detecting, identifying, and responding to attacks impending or in progress against friendly networks
  • Direct real-time cyberspace defense for priority missions by identifying adversary actions in cyberspace and then mitigating their ability to operate in and through cyberspace
  • Assess cyberspace aspects of the operational environment and conduct risk analysis for the mission, and then deploy, integrate, and improve advanced cyberspace protection capabilities for five functional capability sets. Each of the five capability sets is designated to perform one of five tailored cyberspace defense missions defensive-counter-infiltration, cyber threat emulation, mission protection, cyber readiness, and cyber support.
  • Information Technology Specialist, GS 2210 INFOSEC , providing technical Cyber network/computer security and risk management planning, strategic planning, and technical oversight for the protection and certification of networks, systems, applications, and associated computer hardware/software resources in support of the 7th Signal Command Theater , United States Army South, United States Southern Command, the CONUS SIPRNET, Fort Bragg Area Processing Center APC , and the CONUS Point of Presence POP for the South West Asia SWA Afghanistan Mission Network AMN Coalition LAN COLAN , Combined Enterprise Regional Information Exchange System CENTRIXS CX-I , Global Mission Network GMN and other organizations as necessary. Additional responsibility of Security Management Subject Matter Expert SME for CMU Cyber Protection Teams, Agent of the Certification Authority ACA group, Command Compliance Readiness Inspection teams and the C2 element of the Cyber Mission Unit 102 personnel, military, civilian and contractor staff and its facilities that support the CMU and Army Cyber personnel

IA/CYBER DEFENSE

  • As the Subject Matter Expert for Computer Network Defense-Service Provider CND/SP IA Manager for CONUS for Classified SECRET networks Reviewed and approved access controls and privileges for 115,000 users ensuring compliance to mandatory training, regulatory guidance and Best Business Practices
  • Global Admin and reviewer for HBSS, supports Tier III advanced trouble shooting in support of DoDIN DISA Core backbone, Review and supply policy implementation to Global policies in support of USSTRATCOM and ARCYBER initiatives and directives
  • Army - Cyberspace Defense Expert Link provided US Army Cyber Center of Excellence, FT Gordon, GA
  • Computer Network Defense - Response Action CND-RA Mission Event Mission Event Synchronization List Subject Matter Expert for the Department of Army in support of DHS, NSA, and US STRATCOM exercises since 2002. Provisioned IA events to simulate Real-World attacks against computing environments, both logically and physically. As lead developer of mission scenario exercises, established attack vectors and performed as primary trainer for the Department of Defense Joint Cyber Operating Range
  • Lead for the development of the cyber threat characteristics specific to enemy and adversary networks and related capabilities, and then advises on cyberspace operations courses of action extending beyond LandWarNet
  • Analyze and develop network typologies adversary, enemy hostile
  • Establish priority intelligence requirements
  • Establish named areas of interests NAI nodes and users
  • Develop high value targets nodes and users
  • Develop high payoff targets nodes and users
  • Prepare and submit CERF
  • Provide cyberspace operations input and participate in the war-game briefing as required
  • Provide input to CEMA-related operation order appendices and tabs
  • Provide cyberspace operations input for the development of the decision support matrix and decision support template
  • Integrate and synchronize cyberspace operations in support of military deception courses of action
  • Integrate and synchronize cyberspace operations into the fire support plan for each course of action
  • Provide refined input for evaluation request messages as appropriate
  • Provide refined input for evaluation request message
  • Refine cyber effects request formats
  • Refine risk assessment specific to cyberspace operations
  • Integrate defensive cyberspace operations response actions
  • Integrate and synchronize offensive cyberspace operations into the concept of operations for each course of action
  • Provide refined cyberspace operations input to the combined information overlay
  • In collaboration with the staff, war-game enemy and adversary cyber and electronic warfare capabilities against friendly capabilities and vulnerabilities for each course of action
  • Organized IT infrastructure successfully to enable expansion as the SIPRNET CND-Service Provider for the United States
  • Provide guidance to the information assurance team in selecting solutions NIAP approved or CON submission , defining business process, as well as in selecting and setting up the enterprise ITIL Architecture and process relationships
  • Managed the fielding of CENTRIXS-ISAF for 44 deploying units in support of US Central Command into Afghanistan supervised and validated IA packages and movements for CONUS transition of Brigade Combat Teams in to Theater
  • Theater Subject Matter Expert IA Lead Consultant for the Army Training and Certification Tracking System ATCTS for all South Theater civilian, contractor and military personnel performing Information Assurance duties, validates training requirements for all CONUS SIPRNET elevated users 177,000 personnel
  • Preparation also affords the opportunity to rehearse post-attack network restoration activities or exploitation potentially denying the adversary freedom of action within cyberspace by containing, blocking or providing the opportunity to canalize the enemy
  • Provide commanders the means to achieve localized cyberspace superiority, prevent or mitigate attacks, and employ operational defensive measures in response to ongoing attacks and unauthorized activity
  • Provide final input to the combined information overlay
  • Finalize input to cyberspace operations related operation order appendices and tabs
  • Finalize input for evaluation request messages as required
  • Finalize cyber effects request formats
  • Provide final input to the risk assessment specific to cyberspace operations
  • Participate in the staff plans and orders crosswalk as required
  • Participate in the staff plans and orders reconciliation as required
  • Cyberspace Planning actions
  • Prepare and process evaluation response messages
  • Conduct review and approval process.
  • McAfee HBSS certified Global Administrator at Tier III, developed policies, updates and managed allocation of services for all Army ePO level devices.
  • Developed partnership with Army Cyber Command, CENTCOM and other joint agencies to develop and maintain internet and intranet sites to support Family Support Groups to enhance morale for deployed troops
  • NETCOM Subject Matter Expert for the Army Data Center Consolidation Program ADCCP , maintained 100 reporting to OMB database and sat in on all DOD level discussions for future plans and policy development for FISMA compliance
  • Developed Security Requirements system, detailed, and derived , and C A test plan and procedures for 250K systems within the US LandWarNet
  • Oversaw security controls Enterprise ITSM trouble ticketing system ensuring all Regional Hub Nodes, Military District of Washington and the Pentagon had 100 access to facilitate generation of tickets in support of hardware and software outages
  • NETCOM Subject Matter Expert for the Army Portfolio Management Solution APMS database, maintained a 100 uptime for 10 years, Army average was 83
  • Resident Subject Matter Expert in all areas of COMSEC, Technical Security, and TEMPEST/EMSEC regulated requirements, inspected by NETCOM, 21st Sig Bde, and NSA with no deficiencies noted for 10 consecutive years
  • Competed Fixed Facility Checklists, Tempest requests, and SCIF Construction documentation, approved by DIA on first turn in attention to detail and knowledge of applicable requirements was essential for this task
  • Technical Subject Matter Expert for Global Secret Internet Protocol and Dedicated Sensitive Military Networks in support of the United States Southern Command
  • As IA Manager was responsible for IAVA compliance for Theater network equipment PM/POR managed systems at the Tier 0/1 level in support of Army and DoD missions
  • Oversaw the input into Vulnerability Management System VMS and is the ISSM approving authority for all POA M documentation submitted in support of the Commanding General, 7th Signal Command Theater
  • Created, developed and maintained documentation necessary to comply with DODI 5200.40, DITSCAP DIACAP, Federal Information Processing Standards Publications, DCID 6/3 and JDCSISSS includes System Security Authorization Agreement, Security Concept of Operations, Threat and Vulnerability Assessment, DITYVAP ACAS, eRetina, STAT and ISS Scanner , Risk Assessment, DIA spillage and STIG/baseline collections, and Password verification tools
  • Performed the duties of Chief Information Security Officer, Systems Operations Division Chief, Security Manager, Anti-Terrorism/Emergency Management Officer, COOP Officer, PKI Trusted Agent, and DOD TSACS Manager, Systems Operations Division
  • Supervised the Video-teleconferencing staff Database administration, Remedy technicians Supply/Logistics staff Server Administrators Software and Hardware Desktop Support section Information Assurance Division Security Network and Physical Section, both military and civilians during the deployment of Supervisor to Iraq on 2 occasions-18 months in total
  • As IA tools Subject Matter Expert, supervised and performed vulnerability assessments using tools and devices to ensure applicable Security Guides and vulnerabilities were mitigated. Validated by DISA FSO during annual CCRIs, resulting in Excellence ratings, or No Concern Inspection results. There have been no confirmed Intrusions within any of the South-TNOSC networks due to the enhanced security controls we have in place and the command's stress for security in the work place
  • As Subject Matter Expert, maintained all DoD Intrusion Detection Systems ISS, Site Protector, Snort, ITA Manager and firewalls Check Point, Axent, Symantec, Gauntlet, Cisco Pix for Army and Joint Top Level Architecture using multiple platforms and OS'es.
  • As senior Database Administrator SQL Server, responsible for all data from ITA Manager, ArcSight, Site Protector, and McAfee IPS, ensuring confidentiality, integrity and availability of data from security appliances within the theater of operations for direct input into ArcSight SIEM tool. This data was instrumental in developing trends, analysis and attack tippers to reduce vulnerabilities and identify the Bad Boy lists for DoD community
  • Department of Defense, Global Manager for Terminal Server Access and Support Services for remote access to both Sensitive and Secure connectivity to military networks, managed 100K users and 215 VIP accounts with 100 compliance rate for satisfaction
  • Focus on strategy, design, and implementation of security systems that support security policy and business needs
  • Subject Matter Expert Technical lead in support of assessments, tests and designs or configurations that mitigated identified risks for the enterprise
  • Designed and supported the development, documentation, and maturation of the enterprise security architecture in support of customer and stakeholder mission, strategy, processes, and business needs
  • As Subject Matter Expert assessed enterprise current and proposed systems for compliance with applicable security policies, directives and standards identifies security architecture gaps, vulnerabilities, and risks and develops solutions to address security architecture gaps, and new or updated requirements
  • Collaborates closely with engineering and operations on all tasks in support of customer and stakeholders to control or reduce consequence and incident management
  • Orchestrated and managed all technical meetings such as change control boards and technical review boards
  • Extensive experience with ITIL concepts including Release Management, Change Management, Configuration Management, and Incident Management for Theater
  • The Subject Matter Expert for training of subordinate personnel in operational procedures, recognition of threats, ethical penetration techniques and anti-hacking procedures
  • Subject Matter Expert for all Theater Level Architecture security for networks establishing Accreditation for Approval to Connect to Department of Defense network for both SIPRNET and NIPRNET. Created and submitted DITSCAP and DIACAP Approval to Operate documents for submission to DISA for 184 organizations yearly
  • Manager for system keys, license and all system security accounts for all devices used on LAN/WAN. Established and maintained the Baseline configurations for all Configuration Management Operating Systems within the facility and outlying agencies in Area of Responsibility
  • Subject Matter Expert responsible for the Virus reporting procedures and Information Assurance Vulnerability Assessment IAVA program for 35th Signal Brigade, South-TNOSC and RCERT Team.
  • Hands-on experience with Log Analysis tools and Subject Matter Expert for SIEM Tools
  • Trainer and certifier for new military, government and contractors for both information and security measures for facility
  • Monitored area of responsibility, recommended corrective actions, provided input and trained 37 soldiers in threat analysis and triage procedures for network protection
  • Experience leading both projects and teams
  • Knowledge and understanding of FISMA, OMB A-130, and NIST Special Publications, specifically: 800-37 C A Process , 800-18 System Security Plans , 800-30 Risk Assessment , 800-53 and 800-53a Security Requirements , and FIPS 199 Security Categorization and other information security-related federal guidelines

Confidential

  • Lead on-site CCRI inspection preparation for IA mission areas. Prepared and conducted welcome/entrance briefings on behalf of the commander or designated representative
  • Ensured the commander is aware of policies and procedures to be used during the inspection
  • Prepared draft inspection findings, prepared final inspection report when performing duties, and participated in, or lead, critique session of all draft inspection findings. Upon completion of the on-site pre-inspection, prepares, presents, or participates in the briefing on the inspection results to the commander, and if required, to the 7th SC T /Commanding General and selected members of his staff.
  • Perform as a team leader in the conduct of Command Cyber Readiness Inspections CCRI pre-inspections, primarily focused on validating compliance with DOD and Army regulations and Computer Network Defense CND directives. Develops Assessment Test Plans, Assessment reports, and provides remediation or mitigation strategies. Performs vulnerability assessments as required by applicable security directives
  • Provides situational awareness of Command Cyber Readiness Inspections CCRI and identifies key issues and priorities affecting the operations and defense of Army networks, to include the classified and unclassified circuits
  • Performs analysis and prepares reports on IA assessment results and tracks the overall compliance of all open findings prepares weekly CCRI Compliance reports participates in weekly CCRI update briefs attends CCRI Compliance Monitor review meetings prepares VTC briefs and summaries and is resident subject matter expert with the DOD Vulnerability Management System VMS
  • Coordinates as a Computer Network Defense Service Providers CNDSPs concerning CCRI reporting within VMS and future DOD reporting systems coordinates with site personnel including System Administrators, Database Administrators, Information System Security Officers, Information System Security Managers, Information Assurance Managers, Information Assurance Officers and Executive Leadership that identifies root causes of failures in Information Assurance IA compliance within the DOD.

Confidential

  • Achieved Excellence ratings on 13 consecutive CCRI inspections
  • Sited by the inspection team during the FY 2011 and 2012 inspections as having the best Traditional Security program the inspector former Marine Master Gunnery Sergeant had ever seen in 30 years of service, resulted in, No Faults Noted

Confidential

  • IA Manager and Subject Matter Expert for the 93rd and 35th Signal Brigade performed duties as the AMHS account holder, responsible for review, receipt and sending of message traffic to HQDA, SOUTHCOM, Army South and Army North for Operational and Fragmental orders in support of our Area of Responsibility AOR
  • Subject Matter Expert, supporting Army Korea and USAF missions in South America worked with analysts on ArcGIS maps and geographical , Google Earth, RemoteView NGA to support the Drug Task Force in the Southern Command Theater and Demilitarized Zone over-watch in Korea
  • As a member of G2, 4th Infantry Division, S-2, 704th MSB was Subject Matter Expert utilizing Analyst Notebook's analytical tools to identify trends, and patterns for operations in support of Desert Storm and Desert Shield
  • Security Manager and IA Manger for SOUTHCOM support to 12th and 18th AF using DCGS-A tool for collection and analytical review of imagery from aircraft for Drug Suppression. Not an expert but very familiar with its use and capabilities to support the War Fighter. Function as an analyst to validate the operational functionality of the DCGS-A system and other intelligence collection, including All Source, HUMINT, and SIGINT activities
  • Experience with EnCase, FTK, BackTrack 5, ILook, Sleuth Kit/Autopsy, MANDIANT First Response, Security Onion, and other computer forensic tools and techniques in support of DoD and US Army for 15 years, aided or acted as the Subject Matter Expert and lead forensics analyst on 150 cases in support of Army Criminal Investigations or Intrusions within DoD networks or their associated devices
  • Computer Network Defense lead for the South TNOSC loaded and administrated the instance of Renoir to support knowledge management and tool correlation within the TNOSC and local RCERT
  • Provided functional support to the Army C4ISR DCGS-A System Integration Lab SIL , allocated resources for 100 user/analysts. Support the analysis of military functional areas, including doctrine, organization, training, and material
  • Recognized as Subject Matter Expert with solid experience with multiple Internet Protocol IP technologies the Open Systems Interconnection OSI model along with protocols associated with it. Having the ability to apply it to mapping of physical links in a logical format. SIGNIT Terminal Guidance
  • Ability to develop defensive countermeasures and mitigation strategies, developed queries and reviewed data from Yellowstone within the IC community, INTELINK -SIPR and utilized TAC-N/S/JWICS to correlate data to develop reports on local and Theater threats and Intelligence summaries
  • Subject Matter Expert with Volatile Memory Acquisition and analysis knowledge this research was motivated by two key factors. The emergence of kernel level rootkits and subversion techniques which has led to a granular erosion of trust in the integrity of the OS kernel. Malware generally ran exclusively in the user level domain, now has developed the kernel root-kit. As a University researcher prepared a Thesis paper on the Windows versus-Linux Kernel stepping processes and security to validate and compare the security controls
  • Demonstrated expertise in analyzing intelligence information and technical data, analyzing exploitation opportunities, documenting information and processes, gathering intelligence information, interpreting analytical results, performing Internet research and writing and editing skills at a technical/professional level
  • Subject Matter Expert Analytic expertise to perform technical and overall analysis of unknown, suspicious or exploitation activity identified, and communications skills that include the ability to provide formal documentation of analysis and/or research results

PROJECT MANAGEMENT

  • Facilitated communication between staff, management, vendors, and other technology resources within the organization. Managed and negotiate vendor relationships and contracts.
  • Communicated with organization leaders to determine technology requirements and improvement opportunities
  • Subject Matter Expert knowledge of industry, especially in commercial lines, best practice, and impact of IT on a company's internal operation and external customers
  • Subject Matter Expert of all aspects of IT operations, including business requirement analysis and design, systems and database development, systems operations and life-cycle management
  • Demonstrated successful Subject Matter Expert as a senior level leader with project management skills, managing multiple high-performance teams including application development and infrastructure operations
  • Successful track of record of successful major project implementations, such as legacy system replacement, tactical fielding, strategic communication package development and war fighter locations
  • Responsible for the management of multiple information and communications systems and projects. As Subject Matter Expert managed large development efforts and worked with various external and internal stakeholders across the organization globally to successfully complete projects within afforded timeline and budget
  • Ensured the performance, reliability and scalability of the company's technology infrastructure, providing essential computer-based tools and performed as the Subject Matter Expert for all IA tools within the Theater
  • As Subject Matter Expert researched and remained abreast of new and emerging technologies and trends and translate them into our business accordingly. Identify and oversee the implementation of new IT applications to improve the organization processes and operations while enhancing company performance yield value and ROI
  • Attracted, developed, coached, and retained high-performance team members, empowering them to elevate their level of responsibility, span of control, and performance
  • Provided leadership in development of inter-team communication and cohesiveness, sustaining culture and supporting staff during organizational growth, recognized by DISA CCRI team for 3 consecutive assessments
  • Developed and implemented user-training programs, maintained 100 DOD 8570 and FISMA compliance for organization training and certification programs
  • As Subject Matter Expert oversaw and evaluated system security and backup procedures. Advocated, educated and enforced all internal and external security and privacy policies. Recognized as only site to be 100 compliant/NO Deficiencies found during multiple external audits and inspections
  • Lead the prioritization of company technology initiatives
  • Served as a senior leader in special projects as directed

CYBERMISSION

  • Subject Matter Expert for two High Schools, 9th Grade as an eCybermission Ambassador for both Evans and Greenbrier High School's
  • Conducted multiple visits with both schools and working closely with them on a school Robotics competition at the National Level, resulting in a position 20 and 37 out of 715 schools.
  • The local schools received a Grant of 5,000 dollars and I was Awarded a Certificate of Commendation from the Program Manager for Department of the Army for their accomplishments.
  • Encouraged the students at both schools after hours and during multiple Saturdays to encourage participation and a chance to earn savings bonds for their students 20 total awarded
  • Reaching out to STEM or like-minded organizations to help promote the program and future participation

Security

  • Serves as the Chief Information Security Officer CISO on all matters relating to security vulnerabilities and threats to Cyber Protection Brigade computer systems
  • Develops corresponding security countermeasures necessary to protect technical, complex, sensitive and classified information processed on CMU computer equipment. Provides technical support and assists in preparing and implementing policy guidance to CMU
  • Evaluates adequacy and/or develops new or revised information on security policies, standards, and procedural guidance and support for the protection of information technology systems
  • Keeps abreast of the latest developments and initiatives in the computer security arena
  • Researches security hardware/software and when appropriate, arranges vendor presentation guidance papers on security policy issues affecting the organization
  • Works with CPB, Cyber Protection Teams, Agent of the Certification Authority ACA , Command Compliance Readiness Inspection teams and the C2 element of the Cyber Mission Unit Command to identify the need for data and computer security, outlines the parameters and characteristics of the systems, and ensures that the resulting system meets the needs of the user s
  • As Subject Matter Expert developed and oversaw implementation of command security policy evaluated existing security programs for adequacy and efficiency and recommend necessary changes
  • Conducted required reviews and inspections. Represented command at meetings and symposia involving development and refinement of technical security policies
  • Served as the security authority in interpreting new policies, procedures, standards, training and methods to ensure compliance relating to preventing, identifying and protecting information, personnel, property, facilities, operations or material from unauthorized disclosure, misuse, theft, sabotage, or loss
  • Served as Subject Matter Expert and was responsible for development, coordination, direction and assessment for the following programs: personnel security, physical security, intelligence oversight, information security, emergency management, force protection, freedom of information act, HIPAA, and safety
  • Served as the Subject Matter Expert for Continuity of Operations COOP with responsibility for creating, maintaining, and publishing directly or in coordination with other Army locations, such as Army Cyber Command and NETCOM assets viable and executable contingency plans for COOP that facilitated Army's operations during all emergency or situations that disrupted normal operations
  • Conducted, oversaw the conduct and coordinated participation in Army and Joint national level COOP exercises and assessments. Including the use of all Classified and unclassified communication technologies
  • As Subject Matter Expert wrote and reviewed all contracts performance work statements and contract specification, DD 254s, involving access to classified national security information to ensure they meet applicable Army and DoD security requirements
  • The Subject Matter Expert representative on installation boards and working groups formed to develop industrial security policies and procedures
  • Represent command in the development of policy in the assigned areas of expertise
  • As Security Manger provided personnel and information security PSI and INFOSEC service and staff oversight to the HQs and subordinate commands. Perform all departmental functions, ensuring security requirements were implemented into all system network designs, securely configuring systems and networks, validated and verified integration of security into systems, ensured configuration management program was in place that recognized security
  • The Subject Matter Expert for SOR's, Derogatory Reports, eQIP Investigations and PSIP requests for security management processes for the organization
  • As Anti-Terrorism Officer ATO and Force Protection Officer the Subject Matter Expert worked closely with the Installation AT/FP office, Federal Bureau of Information, Local Police, and Department of Homeland Security, provided input to and reviewed TIDE information to develop Installation Threat Working papers to support local and federal training initiatives and requirements. Supported enhancement to the local DoD community Rapid Response requirements and procedures plans to support times of elevated threats

Confidential

Systems Engineer

  • As Project Manager, orchestrated a multi-state regional system upgrade for WAN to include all Servers, workstations, Hubs, Routers and all communication equipment at 43 under projection cost savings of 1 Million, for the physical year
  • As Subject Matter Expert developed and implemented Corporate HIPAA program, privacy policy enforcement, and standards training plan for tri-state area. Managed the EDI, FTP and HTTPs transfer and receipt on a daily basis using multiple COTS software packages
  • As Subject Matter Expert researched security needs for in-house developed systems and applied security rules protecting all corporate data. Produced and maintained an enterprise wide business security procedures and handbooks, providing assistance in development of corporate HIPAA security policies and solutions. Established and performed duties as the first Privacy Protection Officer for 1,275,000 patients and 37000 partner companies within the CSRA region
  • Established license management program for enterprise excess of 12,000 devices and software applications. Developed complex layered security management architecture encompassing all Intrusion detection, Syslog, windows audits, and Netware devices for enterprise
  • Implemented and managed Global Disaster recovery plan, procedures, and configuration plan for all information systems
  • As Subject Matter Expert performed all areas of Information and systems engineering for the Communication and Wide Area Network for a multiple 5 state enterprise with 24 sites interface topologies included PP, RACF, NT 4.0, NT 3.5, Staff Soft, People Soft, Delta CAD 4.0, Lotus Notes, CCMail, Abbra Suite, Vista, Mumps, CHCMS, SMS 2.0, Novell, Unisys, and Citrix
  • Implemented remote authentication, intrusion detection and strong encryption for a RAS interface
  • As Subject Matter Expert ensured enterprise security concepts were implemented into the system network design securely configuring systems and networks, validating and verifying integration of security into system, ensuring configuration management program is in place that recognized security
  • Administered and maintained enterprise HP9000, Unisys and RACF Mainframe security protocols across a five state region. Supervises and directs the work of subordinate Security Analysts
  • Oversaw conversion and migration of Unisys system database to a Windows NT platform running a Progress RDBMS conversion of raw data with no loss
  • Installed, configured and maintained enterprise PBX, CSU, DSU, Fractional T1s, Router, Hub Cisco and 3Com , and Voice mail, Server/Thin Client systems for multi-state area

Confidential

  • Responsible for providing Technical and Project Management Leadership to multiple project teams of up to 100 people
  • Built the Application Security and Integration Practices for Criminal Investigations Command
  • Responsible for the Full Project Lifecycle i.e. Working with the client to define Requirements, ROI definition, Project Implementation, Change Control and ROI verification.
  • Budgetary Responsibility up to 26 m per year
  • As a member of G2, 4th Infantry Division, S-2, 704th MSB was Subject Matter Expert utilizing Analyst Notebook's analytical tools to identify trends, and patterns for operations in support of Desert Storm and Desert Shield
  • Security Manager and IA Manger for SOUTHCOM support to 12th and 18th AF using DCGS-A tool for collection and analytical review of imagery from aircraft for Drug Suppression. Not an expert but very familiar with its use and capabilities to support the War Fighter. Function as an analyst to validate the operational functionality of the DCGS-A system and other intelligence collection, including All Source, HUMINT, and SIGINT activities
  • Defined and implemented the Executive Information Systems EIS and all financial metrics
  • Assessed the SDLC process that was being used from a quality perspective and defined a new processes together with a migration plan that could meet the quality objectives of the enterprise
  • Subject Matter Expert with Volatile Memory Acquisition and analysis knowledge this research was motivated by two key factors. The emergence of kernel level rootkits and subversion techniques which has led to a granular erosion of trust in the integrity of the OS kernel. Malware generally ran exclusively in the user level domain, now has developed the kernel root-kit. As a University researcher prepared a Thesis paper on the Windows versus-Linux Kernel stepping processes and security to validate and compare the security controls
  • Ability to develop defensive countermeasures and mitigation strategies, developed queries and reviewed data from Yellowstone within the IC community, INTELINK -SIPR and utilized TAC-N/S/JWICS to correlate data to develop reports on local and Theater threats and Intelligence summaries
  • Recognized as Subject Matter Expert with solid experience with multiple Internet Protocol IP technologies the Open Systems Interconnection OSI model along with protocols associated with it. Having the ability to apply it to mapping of physical links in a logical format. SIGNIT Terminal Guidance
  • Provided functional support to the Army C4ISR DCGS-A System Integration Lab SIL , allocated resources for 100 user/analysts. Support the analysis of military functional areas, including doctrine, organization, training, and material
  • Experience with EnCase, FTK, ILook, Sleuth Kit/Autopsy, MANDIANT First Response, and other computer forensic tools and techniques in support of DoD and US Army for 15 years, aided or acted as the Subject Matter Expert and lead forensics analyst on 150 cases in support of Army Criminal Investigations or Intrusions within DoD networks or their associated devices
  • Established the Program Management Office to provide senior management with visibility into the portfolio of enterprise projects, where resources were being utilized and how projects were tracking to plan
  • Assessed and made recommendations to changes in operational procedures, tools etc. to meet the operational quality and security objectives identified by management
  • Identified the need for an Enterprise Application Integration Architecture that could meet the internal application integration needs, the trading partner integration needs and the ongoing operational needs. Evaluated the various options and made recommendations together with a migration plan and risk mitigation strategy
  • Responsible for providing Technical and Project Management Leadership to multiple project teams of up to 150 people
  • Field Service Automation - 900 laptops, digital cameras etc. rolled out to the field sites and agents
  • The project team received a special award for the on time and on budget delivery of this project
  • ROI - this project paid for itself in the first year. Staffing requirements reduced by 1,200 people
  • Major project deliverables included:
  • The location, design, build out and setup of a new consolidated operations center
  • Setup and installation of an on line legal archive
  • Selection of the operations center software and re-engineering and streamlining of the entire processing workflows
  • The modification of the software packages to meet the businesses needs
  • Development and Implementation of the Enterprise Wide Executive Information System EIS
  • Complete Security Architecture for all systems involved in the re-engineering process
  • Disaster Recovery Business Continuity Planning to ensure that all the vital components of the process could meet their recovery time objectives
  • Utilized a highly redundant n Tier architecture to build the sites. This ensured uninterrupted 7 x 24 operations
  • Designed and implemented the required security architecture to ensure that all transactions and the applicant's data were protected in a highly secure manner
  • Led the development and the implementation of the integration architecture that allowed the data engine to collect all the data it needed to deny or approve input validation within 2 minutes of data being submitte

We'd love your feedback!