SlideShare a Scribd company logo
1 of 4
Vincent Boyd Bryant
                       4012 Bentwood Cove Drive, Apison, Tennessee 37302
                                          (423) 303-6135
                                      boyd@boydbryant.com
                      Active Top Secret - SCI Clearance as of 20 March 2010

Mr. Bryant possesses extensive project and policy development experience. He has a proven track
record that reflects solid tier one and tier two support for executive leadership in new initiatives, and
program enhancements. His expertise in investigative and research process has been leveraged
regularly to identify new efficiencies, and to create systems that boost productivity and personnel
performance while minimizing expense. He is well versed in security systems. CCTV systems and
access control systems. He has received national and military recognition for technical projects, and
liaison missions. He is a published author for best practices in media relations. He has always met or
exceeded expectations in all engagements, while producing significant savings in current operations
and implementation of organizational enhancements.


May 2011-Present Electronic Intelligence Specialist
Blue Cross Blue Shield of Tennessee                                     Chattanooga, Tennessee
   • Conducted Internal Audit of Investigative Performance reviewed 781 outstanding cases with
      recommendations for resolution
   • Developed workflow improvements
   • Developed Business Cases for Intelligence Analysis Budget
   • Designed Intelligence Analysis Workflow for Enterprise Investigative Services
   • Prototyped use of IBM Analytics Platform including I-2 Analysts Notebook for Investigators.
   • Developed Intelligence reporting system
   • Received multiple training courses in Analysts Notebook
   • Basic Data Forensics Training including SANS 408, Forensic Toolkit (FTK) EnCase
   • Advanced Insurance Investigations Course
   • Negotiated no cost Proof of Concept for IBM Intelligence Platform for BCBST at savings of
      $200,000.
   • Provided extensive investigative enhancement using link analysis, investigative leads, financial
      asset identification, and public as well as private records.
   • Supported highly sensitive internal investigations and high loss health care fraud investigations
   • Presenter 2012 International Claims Adjusters Conference


December 2008 to March 2011 Forensic Science Officer
Six 3 Systems Harding-Security Associates                               Charlottesville, Virginia
     Forensic Science Officer – USF-I J-35 Force Protection Biometrics - Iraq.
        Supported USF-I liaison missions to Government of Iraq Automated Fingerprint System
        Provided forensic advice and training to US Embassy Baghdad Security Staff.
        Conducted 11 Major Incident Video Forensic Investigations.
        Force Protection Liaison Missions to Bureau of International Law Enforcement US
           Embassy Baghdad.
        Serve with team that developed Forensic Capabilities Draw Down and Enduring
           Capabilities Plan United States Forces –Iraq for Operation New Dawn.
        Briefing support RDML Kovacych, Major General MacDonald.
   Exception to Policy Support USN CAPT Ted Burge.
        Missions to Baghdad Iraq, Tikrit Iraq, Balad Iraq, and Doha Qatar.
        Forensic Video Examination of Sensitive Incidents.
        Supported force protection reviews at ECPs of multiple military bases.
        Provided theater orientation to arriving military officers and dignitaries.
    Latent Fingerprint Examiner – US Army National Ground Intelligence Center, Combined
       Explosives Exploitation Cell Iraq Counter Improvised Explosives Device Missions.
        Expert Witness to Central Criminal Court Iraq.
    Presenter International Association of Chief’s of Police - Alexandria Virginia.
    Law Enforcement Vertical Market Development Proposal.
    Latent Print Examiner National Ground Intelligence Center – Iraqi Warrant Project 300 arrest
       warrant packets developed in three week time frame.
    Remote Examination Fingerprint Lab Team – Founding member of a 6 person founding team
       performing QOS audits of latent print exams. Ten additional suspects identified in initial two
       weeks of operations.
February 2008 to December 2008 Vice President
D Hurst and Associates Incorporated                                           Chattanooga, Tennessee
    Instructor Alabama Burglar and Fire Alarm Association.
    Systems and solutions development closed circuit TV systems and professional audio systems..
    Manufacturers Representative Eight Southern States.
    Consultant to Stanford Research Institute - AWARE incident command system.
    Consultant to Swisher International: Security Services QOS and site security audit.
    Increased business five-fold.
October 2006 to February 2008 Vice President
Emerson Russell Maintenance Company                                          Chattanooga, Tennessee
    Mr. Bryant served as Vice President of Technology of a 26 state service corporation.
    He oversaw the Information Technology Division, and Closed Circuit Television Division with
       camera systems in 13 states. Exceeded business projections by 3 fold.
    Developed and expanded the Southeastern US largest video surveillance central station
June 1998 to October 2006 Supervisor of Tech Services, Media Coordinator
City of Everett Police Department                                            Everett, Washington
    Senior Latent Fingerprint Manager – Program director for 10 years
    Mr. Bryant was a critical member of the executive staff assisting in critical sensitive
       investigations, supporting and developing technology projects and funding initiatives.
    Mr. Bryant fielded a large Cisco 3200 series Mobile Access Router project that extended the
       police network to the patrol fleet. He traveled and served as an advocate and consultant for
       Cisco Systems and Northrop Grumman.
    Mr. Bryant served as media coordinator for incidents involving media coverage of officer
       fatalities, the Nisqually earthquake, assorted hostage situations, and high profile public official
       incidents, as well as labor unrest, civil disturbances, and natural disasters.
    Trained in National Incident Management System and Joint Information Systems Operations
    Trained in FEMA CBRNE response and training
    Served as a focal communicator and lead on 3 high profile national disaster drills.
Education

   •2012           Six Sigma Yellow Belt Training
   •2012           CEIC Conference, EnCase Basic Training
   •2012           SANS 408 Data ForensicsTraining Basic Forensic Toolkit and VMware Training
   •2012           IBM I-2 Analysts Notebook Level 2 Training
•2012           Infosec Conference
   •2011           FEMA OPVALTRA Operational Vulnerability Threat and Response Assessment
                        Course.
   •2011           IBM I-2 Analysts Notebook Level 1 Training
   •2011           Advanced Healthcare Fraud Investigations
   •2011           IACP Annual Conference Chicago Illinois
   •2010           Organizational Leadership and Management – Regent University
   •2009             International Association for Identification Latent and Palm Print Training
   •2007-2008      ICSC, IACP Tennessee and Georgia Alarm Conferences
   •2001-2008 Speaking and training curriculum development for various technology conferences.
   •1998-2003 FBI Basic and Advanced Latent and 10 Print Courses, NEC AFIS Training , Forensic
                        Crime Scene Courses, FBI Forensic Art and Photo Retouch Courses
   •1979-2006 Extensive Investigations training, including interview and interrogation and financial
                    crimes investigations through state, federal, and local agencies.
   •2001-2006 Multiple courses in disaster management through F.E.M.A. including Multiple
                        National Incident Management Systems compliance classes, transcripts available.
                            National Fire Academy Basic and Advanced Public Information and Disaster
                        Communications Training.
   •1980           Cleveland State Technical College: undergraduate criminal justice courses
   •1976-1977 William Jennings Bryan College: Dayton Tennessee 17 Semester Hours
   •1975-1976 University of Georgia: Athens, Georgia 45 Quarter Hours
Publications - Citations:
   •2005- Present Member International Association of Chief’s of Police Crime Prevention Committee
                        Developed national policy recommendations for crime prevention.
   •2005-2006       Cygnus Interactive Inc. www.officer.com 14 monthly technology
                        articles published.
   •2006            International Association of Chief’s of Police: Best Technology for Media Relations
   •2005-2005       Cisco Systems Packet Magazine and Cisco.com.
Recent Speaking Engagements:
   •2009             IACP Mid-Year Crime Prevention Conference Alexandria, Virginia
   •2008             Alabama Alarm Association                        Birmingham, Alabama
   •September 2006 Speaker for Cisco Systems                          Seattle, Washington
   •July 2006        Tennessee Association of Chief’s of Police       Johnson City, Tennessee
   •May 2006         Business Case for Public Safety Wireless         Bellevue, Washington
   •April 2006       Gartner Wireless Summit                          Detroit, Michigan
   •March 2006 International Association of Chief’s of Police Alexandria, Virginia
   •September 2005 International Association of Chief’s of Police              Miami, Florida
Awards:
   • 2010 Executive Officers Letter of Recognition for Exceptional Performance United States
       Forces Iraq J-35 Force Protection Biometrics.
   • 2004 IACP Technology Excellence Award – City of Everett Washington Wireless Network
   • 2003 Cisco Systems Connected Cities Featured Project
   • 2002 City of Everett Washington Medal of Merit – Media Relations Policy, Patrol Training
       Program
Publications:
   • International Association of Chief's of Police, Best Practices for Law Enforcement Technology
       and Media Relations: Future of Technology and Communications
   • Cygnus Publishing: 16 columns Officer.com
•   Cisco Systems: Packet Magazine

More Related Content

What's hot

Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking Nasir Bhutta
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersEnergySec
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatMotorola Solutions
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with securityStephen Cobb
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Cybersecurity Education and Research Centre
 
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...Larissa Shapiro
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber SecurityJiří Napravnik
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptMohit Rampal
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT SecutiryGranthamEdu
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 

What's hot (20)

Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
BCC 2006 - NSTC
BCC 2006 - NSTCBCC 2006 - NSTC
BCC 2006 - NSTC
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
The red book
The red book  The red book
The red book
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for Beginners
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
 
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber Security
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-pptCyber Security for Critical Infrastrucutre-ppt
Cyber Security for Critical Infrastrucutre-ppt
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT Secutiry
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 

Similar to Boyd Bryant Resume July2012

Neil Bailey Resume 2016 (1)
Neil Bailey Resume 2016 (1)Neil Bailey Resume 2016 (1)
Neil Bailey Resume 2016 (1)Neil K. Bailey
 
The Present and the Future ISAC in Taiwan
The Present and the Future ISAC in TaiwanThe Present and the Future ISAC in Taiwan
The Present and the Future ISAC in TaiwanAPNIC
 
070614F-ISOAPresentation.ppt
070614F-ISOAPresentation.ppt070614F-ISOAPresentation.ppt
070614F-ISOAPresentation.pptvikramjeet57
 
Conrad PDES Spring 2006
Conrad PDES Spring 2006Conrad PDES Spring 2006
Conrad PDES Spring 2006Mark Conrad
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
HaleResume28June2016
HaleResume28June2016HaleResume28June2016
HaleResume28June2016David Hale
 
JohnHarveyResume
JohnHarveyResumeJohnHarveyResume
JohnHarveyResumeJohn Harvey
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Joshua L. Davis
 
Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1jjdoylecomcast
 
McElvy Resume 2015
McElvy Resume 2015McElvy Resume 2015
McElvy Resume 2015Debra McElvy
 
Aceds 2015 wie nycpa final oct panel slides
Aceds 2015 wie nycpa   final oct panel slidesAceds 2015 wie nycpa   final oct panel slides
Aceds 2015 wie nycpa final oct panel slidesJoe Bartolo
 
IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesOmar Toor
 
Rey Ferdin's Resume
Rey Ferdin's ResumeRey Ferdin's Resume
Rey Ferdin's ResumeRey Ferdin
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 

Similar to Boyd Bryant Resume July2012 (20)

Neil Bailey Resume 2016 (1)
Neil Bailey Resume 2016 (1)Neil Bailey Resume 2016 (1)
Neil Bailey Resume 2016 (1)
 
The Present and the Future ISAC in Taiwan
The Present and the Future ISAC in TaiwanThe Present and the Future ISAC in Taiwan
The Present and the Future ISAC in Taiwan
 
070614F-ISOAPresentation.ppt
070614F-ISOAPresentation.ppt070614F-ISOAPresentation.ppt
070614F-ISOAPresentation.ppt
 
Conrad PDES Spring 2006
Conrad PDES Spring 2006Conrad PDES Spring 2006
Conrad PDES Spring 2006
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
HaleResume28June2016
HaleResume28June2016HaleResume28June2016
HaleResume28June2016
 
JohnHarveyResume
JohnHarveyResumeJohnHarveyResume
JohnHarveyResume
 
Jason Allred Resume
Jason Allred ResumeJason Allred Resume
Jason Allred Resume
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
 
Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014
 
BiometricsMAIN13
BiometricsMAIN13BiometricsMAIN13
BiometricsMAIN13
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
 
McElvy Resume 2015
McElvy Resume 2015McElvy Resume 2015
McElvy Resume 2015
 
Aceds 2015 wie nycpa final oct panel slides
Aceds 2015 wie nycpa   final oct panel slidesAceds 2015 wie nycpa   final oct panel slides
Aceds 2015 wie nycpa final oct panel slides
 
DISCHEStevenCV
DISCHEStevenCVDISCHEStevenCV
DISCHEStevenCV
 
Asdourian, Jon
Asdourian, Jon Asdourian, Jon
Asdourian, Jon
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
Rey Ferdin's Resume
Rey Ferdin's ResumeRey Ferdin's Resume
Rey Ferdin's Resume
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 

Boyd Bryant Resume July2012

  • 1. Vincent Boyd Bryant 4012 Bentwood Cove Drive, Apison, Tennessee 37302 (423) 303-6135 boyd@boydbryant.com Active Top Secret - SCI Clearance as of 20 March 2010 Mr. Bryant possesses extensive project and policy development experience. He has a proven track record that reflects solid tier one and tier two support for executive leadership in new initiatives, and program enhancements. His expertise in investigative and research process has been leveraged regularly to identify new efficiencies, and to create systems that boost productivity and personnel performance while minimizing expense. He is well versed in security systems. CCTV systems and access control systems. He has received national and military recognition for technical projects, and liaison missions. He is a published author for best practices in media relations. He has always met or exceeded expectations in all engagements, while producing significant savings in current operations and implementation of organizational enhancements. May 2011-Present Electronic Intelligence Specialist Blue Cross Blue Shield of Tennessee Chattanooga, Tennessee • Conducted Internal Audit of Investigative Performance reviewed 781 outstanding cases with recommendations for resolution • Developed workflow improvements • Developed Business Cases for Intelligence Analysis Budget • Designed Intelligence Analysis Workflow for Enterprise Investigative Services • Prototyped use of IBM Analytics Platform including I-2 Analysts Notebook for Investigators. • Developed Intelligence reporting system • Received multiple training courses in Analysts Notebook • Basic Data Forensics Training including SANS 408, Forensic Toolkit (FTK) EnCase • Advanced Insurance Investigations Course • Negotiated no cost Proof of Concept for IBM Intelligence Platform for BCBST at savings of $200,000. • Provided extensive investigative enhancement using link analysis, investigative leads, financial asset identification, and public as well as private records. • Supported highly sensitive internal investigations and high loss health care fraud investigations • Presenter 2012 International Claims Adjusters Conference December 2008 to March 2011 Forensic Science Officer Six 3 Systems Harding-Security Associates Charlottesville, Virginia  Forensic Science Officer – USF-I J-35 Force Protection Biometrics - Iraq.  Supported USF-I liaison missions to Government of Iraq Automated Fingerprint System  Provided forensic advice and training to US Embassy Baghdad Security Staff.  Conducted 11 Major Incident Video Forensic Investigations.  Force Protection Liaison Missions to Bureau of International Law Enforcement US Embassy Baghdad.  Serve with team that developed Forensic Capabilities Draw Down and Enduring Capabilities Plan United States Forces –Iraq for Operation New Dawn.  Briefing support RDML Kovacych, Major General MacDonald.
  • 2. Exception to Policy Support USN CAPT Ted Burge.  Missions to Baghdad Iraq, Tikrit Iraq, Balad Iraq, and Doha Qatar.  Forensic Video Examination of Sensitive Incidents.  Supported force protection reviews at ECPs of multiple military bases.  Provided theater orientation to arriving military officers and dignitaries.  Latent Fingerprint Examiner – US Army National Ground Intelligence Center, Combined Explosives Exploitation Cell Iraq Counter Improvised Explosives Device Missions.  Expert Witness to Central Criminal Court Iraq.  Presenter International Association of Chief’s of Police - Alexandria Virginia.  Law Enforcement Vertical Market Development Proposal.  Latent Print Examiner National Ground Intelligence Center – Iraqi Warrant Project 300 arrest warrant packets developed in three week time frame.  Remote Examination Fingerprint Lab Team – Founding member of a 6 person founding team performing QOS audits of latent print exams. Ten additional suspects identified in initial two weeks of operations. February 2008 to December 2008 Vice President D Hurst and Associates Incorporated Chattanooga, Tennessee  Instructor Alabama Burglar and Fire Alarm Association.  Systems and solutions development closed circuit TV systems and professional audio systems..  Manufacturers Representative Eight Southern States.  Consultant to Stanford Research Institute - AWARE incident command system.  Consultant to Swisher International: Security Services QOS and site security audit.  Increased business five-fold. October 2006 to February 2008 Vice President Emerson Russell Maintenance Company Chattanooga, Tennessee  Mr. Bryant served as Vice President of Technology of a 26 state service corporation.  He oversaw the Information Technology Division, and Closed Circuit Television Division with camera systems in 13 states. Exceeded business projections by 3 fold.  Developed and expanded the Southeastern US largest video surveillance central station June 1998 to October 2006 Supervisor of Tech Services, Media Coordinator City of Everett Police Department Everett, Washington  Senior Latent Fingerprint Manager – Program director for 10 years  Mr. Bryant was a critical member of the executive staff assisting in critical sensitive investigations, supporting and developing technology projects and funding initiatives.  Mr. Bryant fielded a large Cisco 3200 series Mobile Access Router project that extended the police network to the patrol fleet. He traveled and served as an advocate and consultant for Cisco Systems and Northrop Grumman.  Mr. Bryant served as media coordinator for incidents involving media coverage of officer fatalities, the Nisqually earthquake, assorted hostage situations, and high profile public official incidents, as well as labor unrest, civil disturbances, and natural disasters.  Trained in National Incident Management System and Joint Information Systems Operations  Trained in FEMA CBRNE response and training  Served as a focal communicator and lead on 3 high profile national disaster drills. Education •2012 Six Sigma Yellow Belt Training •2012 CEIC Conference, EnCase Basic Training •2012 SANS 408 Data ForensicsTraining Basic Forensic Toolkit and VMware Training •2012 IBM I-2 Analysts Notebook Level 2 Training
  • 3. •2012 Infosec Conference •2011 FEMA OPVALTRA Operational Vulnerability Threat and Response Assessment Course. •2011 IBM I-2 Analysts Notebook Level 1 Training •2011 Advanced Healthcare Fraud Investigations •2011 IACP Annual Conference Chicago Illinois •2010 Organizational Leadership and Management – Regent University •2009 International Association for Identification Latent and Palm Print Training •2007-2008 ICSC, IACP Tennessee and Georgia Alarm Conferences •2001-2008 Speaking and training curriculum development for various technology conferences. •1998-2003 FBI Basic and Advanced Latent and 10 Print Courses, NEC AFIS Training , Forensic Crime Scene Courses, FBI Forensic Art and Photo Retouch Courses •1979-2006 Extensive Investigations training, including interview and interrogation and financial crimes investigations through state, federal, and local agencies. •2001-2006 Multiple courses in disaster management through F.E.M.A. including Multiple National Incident Management Systems compliance classes, transcripts available. National Fire Academy Basic and Advanced Public Information and Disaster Communications Training. •1980 Cleveland State Technical College: undergraduate criminal justice courses •1976-1977 William Jennings Bryan College: Dayton Tennessee 17 Semester Hours •1975-1976 University of Georgia: Athens, Georgia 45 Quarter Hours Publications - Citations: •2005- Present Member International Association of Chief’s of Police Crime Prevention Committee Developed national policy recommendations for crime prevention. •2005-2006 Cygnus Interactive Inc. www.officer.com 14 monthly technology articles published. •2006 International Association of Chief’s of Police: Best Technology for Media Relations •2005-2005 Cisco Systems Packet Magazine and Cisco.com. Recent Speaking Engagements: •2009 IACP Mid-Year Crime Prevention Conference Alexandria, Virginia •2008 Alabama Alarm Association Birmingham, Alabama •September 2006 Speaker for Cisco Systems Seattle, Washington •July 2006 Tennessee Association of Chief’s of Police Johnson City, Tennessee •May 2006 Business Case for Public Safety Wireless Bellevue, Washington •April 2006 Gartner Wireless Summit Detroit, Michigan •March 2006 International Association of Chief’s of Police Alexandria, Virginia •September 2005 International Association of Chief’s of Police Miami, Florida Awards: • 2010 Executive Officers Letter of Recognition for Exceptional Performance United States Forces Iraq J-35 Force Protection Biometrics. • 2004 IACP Technology Excellence Award – City of Everett Washington Wireless Network • 2003 Cisco Systems Connected Cities Featured Project • 2002 City of Everett Washington Medal of Merit – Media Relations Policy, Patrol Training Program Publications: • International Association of Chief's of Police, Best Practices for Law Enforcement Technology and Media Relations: Future of Technology and Communications • Cygnus Publishing: 16 columns Officer.com
  • 4. Cisco Systems: Packet Magazine