SlideShare a Scribd company logo
1 of 3
13320 YARLAND LANE
BOWIE, MD 20175
Bjacks92@outlook.com
301-814-2182
SUMMARY
A seasoned IT professional with nearly 20 years of experience in the management and administration of a
broad range of technical services,strategically and cost effectively conforming to corporate goals.
Successfully maintains high standards, utilizing resources,and centralizing technologies to minimize
downtime while maintaining systems security. Over 7 years of IT security compliance experience
supporting the Department of Homeland Security (DHS) in security testing, plan of action and milestones
(POA&M) management,Information Systems Security Officer (ISSO) support, and policy and security
configuration compliance. Program Management experience managing multiple projects simultaneously.
SECURITY CLEARANCES
Top Secret Clearance, 2014
CERTIFICATIONS
Certified Ethical Hacker (CEH), 2013; ITIL v3, 2010; CompTIA Security+, 2010
EDUCATION
Virginia State University, Petersburg, VA – 1993; Bachelor of Science, Business Administration
Management
PROFESSIONAL EXPERIENCE
Richard S. Carson & Associates, Inc. Apr 2012 – Present
Bethesda, MD
Program Manager
 Managing information security contracts and task orders across several federal agencies and
corporate clients, including management of up to 20 staff and independent contacts
distributed across multiple locations
 Providing IT security consultation including FISMA, information assurance, PCI, and
operational security to federal (Office of Personnel Management (OPM), National Institutes
of Health (NIH), and corporate clients while managing security projects and related staff
 Managing the FISMA, Annual Assessment & Authorization (A&A), and continuous
monitoring efforts for OPM, NIH, and corporate clients.
 Managing cloud hosted systems, including FedRAMP approved hosting providers.
 Maintaining project schedules and budget tracking for each managed project and proposing
project structure, methodology, and execution strategy
 Establishing IT security program integration into client software development SDLC (where
security was previously not considered), identifying numerous security issues and
subsequently decreasing existing issues by 80% while introducing pre-production release
security testing
Byron E. Jackson
1
Overseeing staff work assignments, job performance, periodic reviews, and career
development.
 Conducted security audits for NIH and OPM systems, identified several significant risks
previously unknown and worked with each organization to mitigate these issues prior to
exploitation
 Implementing corporate monthly training sessions and seminars for career development and
knowledge transfer
 Leading and assisting on proposal management efforts for government and corporate
contracts
ALON, Inc. Jan 2011 – Mar 2012
Washington, DC
Information Systems Security Officer
 Implemented security controls and conducted ST&E for multiple Federal information systems in
accordance with NIST 800-53 and 53A requirements for the Department of Homeland Security
(DHS) Immigration and Customs Enforcement (ICE) and prepared SA&A packages according to
NIST standards for GSS and major applications.
 Responsibilities included: Conducted monthly FISMA self-assessments,technical and firewall
assessments,vulnerability scanning using Nessus and analysis (i.e., FDCC), penetration testing, and
risk assessments,and monitoring and deployment of Intrusion Detection Systems (IDS). Performed
physical security control assessments and system inventory management at various locations using
BigFix.
 Developed, implemented, and managed POA&Ms
US Customs and Border Protection Aug 2010 – Feb 2011
Washington, DC
INFOSEC Specialist
 Served as an INFOSEC Specialist providing technical guidance to the operational area of Information
Assurance (IA) Policy and Subject Matter Expert support to DHS to assist with the implementation of
IA activities.
 Performed vulnerability assessment scans using Nessus in support of penetration analyses and
provided first level of customer contact for the IASE Information Desk.
Bolling Air Force Base Nov 2009 - Aug 2010
Washington, DC
Windows System Administrator
 Supported the Air Force District, Washington, DC, and their enterprise Windows 2003 and Exchange
2007 environment.
 Duties included providing day-to-day Systems Administration support managing 12 Exchange 2007
servers supporting 13,000+ mailboxes and Symantec Mail Security for Exchange servers.
 Performed routine analysis of IT systems to identify areas where potential threats may be evident.
QinetiQ, NA US Customs and Border Protection/Fort McNair Sep 2002 - Nov 2009
Washington, DC
Team Lead
 Responsible managing staff of 4 network engineers and system administrators.
 Implemented security policies, plans, and architecture and enforced Group Policy with Access
Control List (ACL) Security Technical Implementation Guides (STIG) requirements and encryption
for VPN.
 Coordinated weekly Windows Server patch management maintenance using Windows Server Update
Services (WSUS) to ensure all systems have the most up-to-date security patches.

More Related Content

What's hot

NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNorth Texas Chapter of the ISSA
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdfMing Man Chan
 
Information Security
Information SecurityInformation Security
Information Securityvadapav123
 
Open group spc rosenthal v3
Open group   spc rosenthal v3Open group   spc rosenthal v3
Open group spc rosenthal v3City of Toronto
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKATHEESKUMAR S
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseShivamSharma909
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
Overview capabilities
Overview   capabilitiesOverview   capabilities
Overview capabilitiesChris Ammann
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowkCura_Relativity
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Skills that make network security training easy
Skills that make network security training easySkills that make network security training easy
Skills that make network security training easyEC-Council
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 

What's hot (20)

NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 
Information Security
Information SecurityInformation Security
Information Security
 
Open group spc rosenthal v3
Open group   spc rosenthal v3Open group   spc rosenthal v3
Open group spc rosenthal v3
 
Data security
Data securityData security
Data security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident response
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
IT security
IT securityIT security
IT security
 
Overview capabilities
Overview   capabilitiesOverview   capabilities
Overview capabilities
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber Security Companies
Cyber Security CompaniesCyber Security Companies
Cyber Security Companies
 
Skills that make network security training easy
Skills that make network security training easySkills that make network security training easy
Skills that make network security training easy
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
 

Similar to Byron Jackson Resume - 2016

Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Tom Reinheimer
 
Adam R. Moore Universal Resume
Adam R. Moore Universal ResumeAdam R. Moore Universal Resume
Adam R. Moore Universal ResumeAdam Moore
 
Resume IT Officer Sample
Resume IT Officer SampleResume IT Officer Sample
Resume IT Officer SamplePatrice Green
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
Terence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupportTerence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupportTerence Mcleod
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216William Linder
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame caSteve Alameda
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216William Linder
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016Ronald (RON) Ray Harris
 

Similar to Byron Jackson Resume - 2016 (20)

Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Terrance A. 10.20.15
Terrance A. 10.20.15Terrance A. 10.20.15
Terrance A. 10.20.15
 
Gregory C. Witcher Full CV
Gregory C. Witcher Full CV Gregory C. Witcher Full CV
Gregory C. Witcher Full CV
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016
 
Adam R. Moore Universal Resume
Adam R. Moore Universal ResumeAdam R. Moore Universal Resume
Adam R. Moore Universal Resume
 
Resume IT Officer Sample
Resume IT Officer SampleResume IT Officer Sample
Resume IT Officer Sample
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
Michael Bowers Resume
Michael Bowers ResumeMichael Bowers Resume
Michael Bowers Resume
 
Terence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupportTerence_McLeod_ResumeupdateITandnetworksupport
Terence_McLeod_ResumeupdateITandnetworksupport
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216
 
TyroneResume[1]
TyroneResume[1]TyroneResume[1]
TyroneResume[1]
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame ca
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016
 
Brian Voorhees Resume(4)
Brian Voorhees Resume(4)Brian Voorhees Resume(4)
Brian Voorhees Resume(4)
 

Byron Jackson Resume - 2016

  • 1. 13320 YARLAND LANE BOWIE, MD 20175 Bjacks92@outlook.com 301-814-2182 SUMMARY A seasoned IT professional with nearly 20 years of experience in the management and administration of a broad range of technical services,strategically and cost effectively conforming to corporate goals. Successfully maintains high standards, utilizing resources,and centralizing technologies to minimize downtime while maintaining systems security. Over 7 years of IT security compliance experience supporting the Department of Homeland Security (DHS) in security testing, plan of action and milestones (POA&M) management,Information Systems Security Officer (ISSO) support, and policy and security configuration compliance. Program Management experience managing multiple projects simultaneously. SECURITY CLEARANCES Top Secret Clearance, 2014 CERTIFICATIONS Certified Ethical Hacker (CEH), 2013; ITIL v3, 2010; CompTIA Security+, 2010 EDUCATION Virginia State University, Petersburg, VA – 1993; Bachelor of Science, Business Administration Management PROFESSIONAL EXPERIENCE Richard S. Carson & Associates, Inc. Apr 2012 – Present Bethesda, MD Program Manager  Managing information security contracts and task orders across several federal agencies and corporate clients, including management of up to 20 staff and independent contacts distributed across multiple locations  Providing IT security consultation including FISMA, information assurance, PCI, and operational security to federal (Office of Personnel Management (OPM), National Institutes of Health (NIH), and corporate clients while managing security projects and related staff  Managing the FISMA, Annual Assessment & Authorization (A&A), and continuous monitoring efforts for OPM, NIH, and corporate clients.  Managing cloud hosted systems, including FedRAMP approved hosting providers.  Maintaining project schedules and budget tracking for each managed project and proposing project structure, methodology, and execution strategy  Establishing IT security program integration into client software development SDLC (where security was previously not considered), identifying numerous security issues and subsequently decreasing existing issues by 80% while introducing pre-production release security testing Byron E. Jackson 1
  • 2. Overseeing staff work assignments, job performance, periodic reviews, and career development.  Conducted security audits for NIH and OPM systems, identified several significant risks previously unknown and worked with each organization to mitigate these issues prior to exploitation  Implementing corporate monthly training sessions and seminars for career development and knowledge transfer  Leading and assisting on proposal management efforts for government and corporate contracts ALON, Inc. Jan 2011 – Mar 2012 Washington, DC Information Systems Security Officer  Implemented security controls and conducted ST&E for multiple Federal information systems in accordance with NIST 800-53 and 53A requirements for the Department of Homeland Security (DHS) Immigration and Customs Enforcement (ICE) and prepared SA&A packages according to NIST standards for GSS and major applications.  Responsibilities included: Conducted monthly FISMA self-assessments,technical and firewall assessments,vulnerability scanning using Nessus and analysis (i.e., FDCC), penetration testing, and risk assessments,and monitoring and deployment of Intrusion Detection Systems (IDS). Performed physical security control assessments and system inventory management at various locations using BigFix.  Developed, implemented, and managed POA&Ms US Customs and Border Protection Aug 2010 – Feb 2011 Washington, DC INFOSEC Specialist  Served as an INFOSEC Specialist providing technical guidance to the operational area of Information Assurance (IA) Policy and Subject Matter Expert support to DHS to assist with the implementation of IA activities.  Performed vulnerability assessment scans using Nessus in support of penetration analyses and provided first level of customer contact for the IASE Information Desk. Bolling Air Force Base Nov 2009 - Aug 2010 Washington, DC Windows System Administrator  Supported the Air Force District, Washington, DC, and their enterprise Windows 2003 and Exchange 2007 environment.  Duties included providing day-to-day Systems Administration support managing 12 Exchange 2007 servers supporting 13,000+ mailboxes and Symantec Mail Security for Exchange servers.  Performed routine analysis of IT systems to identify areas where potential threats may be evident. QinetiQ, NA US Customs and Border Protection/Fort McNair Sep 2002 - Nov 2009 Washington, DC Team Lead  Responsible managing staff of 4 network engineers and system administrators.
  • 3.  Implemented security policies, plans, and architecture and enforced Group Policy with Access Control List (ACL) Security Technical Implementation Guides (STIG) requirements and encryption for VPN.  Coordinated weekly Windows Server patch management maintenance using Windows Server Update Services (WSUS) to ensure all systems have the most up-to-date security patches.