Technology Officer Resume
2.00/5 (Submit Your Rating)
PROFESSIONAL EXPERIENCE
Technology Officer
Confidential
Responsibilities:
- Multi - faceted security professional that supports three different organizations: Technology, Mission Assurance, and Assessments branch. Works with team members and stakeholders in resolving issues and providing solutions.
- Make tactical decisions in the implementation of the Risk and Controls Assessment process. Communicate moderate IT risk assessment information to non-technical senior leaders to ensure they comprehend the risk being assigned to them. Effectively communicate evaluation of risk remediation plans to action plan owners to ensure that mitigation activities are appropriately addressed.
- Support the design and implementation of security solutions, including policies, programs, processes, software, and hardware. Ensuring support to mission functions, technical architecture and infrastructure of U.S. installations and Partner Nations in the Middle East. Protect U.S. and coalition interest from both internal and external threats. Work closely with the client and technical architects to design protections, security, access policies, monitoring and remediation programs into the architecture from the outset.
- Support the development of intelligence capabilities to anticipate threats to U.S. and coalition forces. Analyze and recommend programs, and policies to protect against complex security, technical, architectural, and operational problems.
- Provide advice regarding current information security threats and recommendations to address those risks. Work well in a coalition environment with collaborative, dynamic, and cross-functional teams. Work effectively with people of all levels of information technology expertise with a wide range of constituencies, experience, and organizational relationships. Monitors and reviews strategies, doctrine, policies, directives, and instructions from higher echelon headquarters and makes recommendations to ensure compliance and/or consideration in security planning efforts. Develops plans and orders through the application of operational design, by using the six-phased Joint Operational Planning Process (JOPP).
- Develops briefings, transitioning concepts to execution, and assisting in the coordination of joint operational planning in support of training, exercises, combat, and contingency plans and operations in force protection and cyber issues. Develops and integrates cyberspace capabilities into deliberate, contingency, operation, and crisis action planning. Develops Tactics, Techniques and Procedures, (CONOPs), Courses Of Actions, and other related documents related to force protection security, Offense & Defense Cyber Ops (OCO/DCO), and the securing, operating, and defending U.S. and Coalition forces.. Address shortfalls, prioritizes and validates requirements, and capable by modifying development planning efforts based on the changing security and cyberspace environment.
- Contributes to the development of exercise scenarios, exercise operational plans, and other required documentation to support planning and execution to accomplish CENTCOM training priorities. Conducts research of current and emerging threats to U.S. Critical Infrastructure and Key Resources. Acts a full participant and provides technical assistance to Joint Planning Groups, Operational Planning Groups/Teams developing and integrating security & cyber capabilities into plans, and in support of CENTCOM Combatant Commander planning efforts. Knowledgeable of force protection and cyberspace operations planning activities coordination through the Integrated Joint Special Technical Operations, to include Evaluation Request and Response Messages, Special Access Programs procedures, and the review and approval process for Cyberspace Operations. Possesses a complete understanding of all planning methodologies and applications in all phases of Confidential operations. Able to support the development of security & cyberspace operations plans, contingency plans, CONOPs, and orders. Assists with the coordination of joint operation planning in support of combat and contingency operations. Knowledgeable of and participates in all phases and steps of the JOPP activities. Expert in USCENTCOMs Lines of Operation to secure, operate, and defend security and cyber solutions the Department Of Defense Information Network, plan and conduct DCO, and plan and conduct OCO when authorized.
Cyber Officer
Confidential
Responsibilities:
- Coordinate the sharing of biometrics; associated biographic, contextual, and intelligence information with 56 foreign partners in accordance with U.S. and International Laws. Added input to U.S. and Confidential Identity Operations documentation with Coalition Caveats. Works with professional peers to identity and resolve scheduling and planning issues for joint efforts.
- Evaluates national agencies and Confidential services capabilities, assigning requirements and mission priorities/objects to those organizations for action in order to meet the Commander’s intent. Exercised authority to participate in negotiation and makes commitment on behalf of the J5-CCC in Operational Planning Team and Joint planning groups. Provides other government agencies, professionals, businesses, scientific and acquisition agencies, and coalition partners support, exchange ideas, participants in studies and coordinate Biometrics, Forensics and Intelligence support.
- Provide policy and responsibilities for, Biometrics, Cyber Security and supports the Computer Network Defense. Deliver assessments with phase(s) and timeline of completion of identity operations (biometric & Intel) information. Advised the J5 Coalition Coordination Center (J5-CCC) Commander on cyber-related issues impacting U.S. Coalition warfighting operations.
- Assist in investigation of all reported information security incidents including cross domain violations and discharge of classified information. Works with professional peers to identity and resolve scheduling and planning issues for joint efforts. Evaluates national agencies and Confidential services capabilities, assigning requirements and mission priorities/objects to those organizations for action in order to meet the Commander’s intent. Provide policy and responsibilities for Cyber Security and support the Computer Network Defense. Deliver assessments with phase(s) and timeline of completion of identity operations information. Assist in investigation of all reported information security incidents including cross domain violations and discharge of classified information. Coordinate the sharing of biometrics; associated biographic and contextual information with 56 foreign partners in accordance with U.S. and International Laws and added input to U.S. and Confidential Identity Operations documentation with Coalition Caveats
