SlideShare a Scribd company logo
1 of 3
SEP 2011 – SEP 2014
Supervisor: Murphy, Kevan P
During my tour with Commander Submarine Group Nine (CSG-9) I primarily held the positions
of Departmental Leading Petty Officer (LPO), Command Information Assurance Manager
(IAM), and Communications Watch Officer(CWO). Within these positions I gained the
experience to:
 Organize anddirectthe operation,administration,maintenance,and provisioningof network
systems.
 Protectand defendinformationandinformationsystemstoensure accessibility,confidentiality,
validity,integrity,authentication,availability,andnon-repudiation.
 Developpoliciesandprocedurestoensure secure information reliabilityandaccessibility.
 Performsystemssecurityevaluations,auditsandreviewsanddevelop AISsecuritycontingency
plans.
 Designandevaluate ITprogramsto ensure controlledaccessibilitytoAIS.
 Conductphysical securityassessmentstoensure compliancewithphysical securityconcepts,
principlesandpractices.
 Lead effortstoresolve conflictingsecuritystandardsandpractices.
 Make recommendationsontrainingneedstomanagementbasedonrequests.
 Independentlymaintaintrainingmanagementdatabasesasaregularpart of myjob (for
example,workedasthe commandGeneral MilitaryTrainingCoordinator).
 DelivertrainingbasedoncontentIhave developed(bothdivisionwideandCommandwide)
 Monitorcontrolledaccessprogramsto ensure implementationandviabilityof appropriate
systemssecuritypoliciesandthe acquisitionof ITsecuritytools.
 Recommendnew orrevisedsecuritymeasuresandcountermeasuresbasedonaccreditation
reviewresults.
 Review the workof othersand to be responsibleforentire,final documents
 Work withstaffingdatabases suchasthe DOD’s Total Workforce ManagementSystem, ensuring
accuracy of data.
 Review andrecommendedimprovementsinprogrampolicies,procedures,legislation,orother
complex documents.
 Gather statistical dataandnarrative information,performanalyses,summarize results,identify
problemareas,andpropose/implementsolutions.
 Calculate andinterpret descriptivestatistics(forexample,means,standarddeviations,and
frequencies) androutinelyuse theminmywork.
 Lead small,highlyfocusedprojectsthatrequire workingwithrepresentativesfromdifferent
unitsoutside myorganizationalunit.
 Provide assistance andguidance tointernal andexternal partiesinthe analysis,planning,and
securingof requiredapprovalsforacquisitionplans,contracts,andotherneeds.
 Independentlyresearchandinterpret informationgatheredfrom avarietyof sources,evaluate
the information,andmake specificrecommendationsbasedonmyfindings.
 Independentlyinterpret lawsandregulationsforworkprojects,inparticularhow theymight
affector come in conflictwith computernetworkoperationsandcomputernetworkresource
accessibility.
 I possessknowledge of:
o IT securityprinciples,methods,securityproductsandservicesusedtoevaluateand
recommendthe acquisition,implementationanddisseminationof securitytools,
policies,proceduresandpractices.
 Networkandsystemsdesigntoensure implementationof viable systemssecurity
policiesandprocedures.
 Securitycertificationandaccreditationrequirements,systemstestingandevaluation
and performance managementmethodsforsecurityaccreditationreviewsforsystems
and networks.
 Standardizedtelecommunicationsconcepts,principles,andpracticesregarding
deployablecommunicationsequipmentandsystems.
 Operatingcharacteristicsandinteroperabilityrequirementsfor specialized
communicationssystems.
 Informationsystemssecurityprinciples,methods,technologyconcepts,standardsand
methods.
 CurrentInformationTechnologysecuritypractices,threats,trendsandtechnologies.
 Making recommendationstoadoptnew technologiesinsoftware andinformation
management.
 Remainingaware of activitieswithentitiesexternal tothe organizationthatcouldaffect
operationsbyensuringproceduresare inplace toadequatelyinformmanagementof
projector operational status.
 Providinginputinstructuring,implementing,monitoringsafeguardstomaintainthe
security,andconfidentialityof ITsysteminformationanddatabases.
 Coordinatingprogrameffortswithotherinternal andexternal activities.
 Overseeinginformationtechnologyresponsibilitiestoinclude installationand
monitoringof software applicationsordatabasesusedtosupportand enhance
administrativefunctions.
 Identifyingneedsfortechnological solutionstonetworksecurityproblemsand
consultingwithcontractorsandGovernmentemployeestorefinesystemfunctional
requirementsandtranslate functional requirementsintotechnical specifications;
 Making verbal orwrittenrecommendationsandjustificationsconcerningthe resultsof
technical analysis.
 Analyzingandevaluatingproposedchangesinmission,operatingproceduresand
delegationsof authority.
During my tour with CSG-9

More Related Content

Similar to During my tour with CSG-9

Nicholas O'Connor - Resume V3
Nicholas O'Connor -  Resume V3Nicholas O'Connor -  Resume V3
Nicholas O'Connor - Resume V3
Nicholas O'Connor
 
Dennis Hueston New Resume 2016
Dennis Hueston  New Resume 2016Dennis Hueston  New Resume 2016
Dennis Hueston New Resume 2016
Dennis Hueston
 
William Raney 2016 (2)
William Raney 2016 (2)William Raney 2016 (2)
William Raney 2016 (2)
Bill Raney
 
Behavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesBehavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmes
Muthurv Venkatachalam
 
Linda Meoli resume 2016
Linda Meoli resume 2016Linda Meoli resume 2016
Linda Meoli resume 2016
Linda Meoli
 
ANSInformation securitysometimes shortened to InfoSec, is the .pdf
ANSInformation securitysometimes shortened to InfoSec, is the .pdfANSInformation securitysometimes shortened to InfoSec, is the .pdf
ANSInformation securitysometimes shortened to InfoSec, is the .pdf
amaresh6333
 
James Steffen_Revised (1)
James Steffen_Revised (1)James Steffen_Revised (1)
James Steffen_Revised (1)
James Steffen
 

Similar to During my tour with CSG-9 (20)

CollyerSESwRank
CollyerSESwRankCollyerSESwRank
CollyerSESwRank
 
Majors_Resume_2016
Majors_Resume_2016Majors_Resume_2016
Majors_Resume_2016
 
PB CV v0.4
PB CV v0.4PB CV v0.4
PB CV v0.4
 
How self mastery training for supervisors improved mining safety
How self mastery training for supervisors improved mining safetyHow self mastery training for supervisors improved mining safety
How self mastery training for supervisors improved mining safety
 
Nicholas O'Connor - Resume V3
Nicholas O'Connor -  Resume V3Nicholas O'Connor -  Resume V3
Nicholas O'Connor - Resume V3
 
Dennis Hueston New Resume 2016
Dennis Hueston  New Resume 2016Dennis Hueston  New Resume 2016
Dennis Hueston New Resume 2016
 
lydick_richard_resume
lydick_richard_resumelydick_richard_resume
lydick_richard_resume
 
B Parker Resume rev 2
B Parker Resume rev 2B Parker Resume rev 2
B Parker Resume rev 2
 
Manning Information Security Strategy
Manning Information Security StrategyManning Information Security Strategy
Manning Information Security Strategy
 
William Raney 2016 (2)
William Raney 2016 (2)William Raney 2016 (2)
William Raney 2016 (2)
 
Sean Butterfield Resume
Sean Butterfield ResumeSean Butterfield Resume
Sean Butterfield Resume
 
Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management Overview
 
Behavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmesBehavioural safety program_by_simon_holmes
Behavioural safety program_by_simon_holmes
 
Albert res
Albert resAlbert res
Albert res
 
Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016
 
NTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John WhitedNTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John Whited
 
Step Change Safety Culture Strategy.pdf
Step Change Safety Culture Strategy.pdfStep Change Safety Culture Strategy.pdf
Step Change Safety Culture Strategy.pdf
 
Linda Meoli resume 2016
Linda Meoli resume 2016Linda Meoli resume 2016
Linda Meoli resume 2016
 
ANSInformation securitysometimes shortened to InfoSec, is the .pdf
ANSInformation securitysometimes shortened to InfoSec, is the .pdfANSInformation securitysometimes shortened to InfoSec, is the .pdf
ANSInformation securitysometimes shortened to InfoSec, is the .pdf
 
James Steffen_Revised (1)
James Steffen_Revised (1)James Steffen_Revised (1)
James Steffen_Revised (1)
 

During my tour with CSG-9

  • 1. SEP 2011 – SEP 2014 Supervisor: Murphy, Kevan P During my tour with Commander Submarine Group Nine (CSG-9) I primarily held the positions of Departmental Leading Petty Officer (LPO), Command Information Assurance Manager (IAM), and Communications Watch Officer(CWO). Within these positions I gained the experience to:  Organize anddirectthe operation,administration,maintenance,and provisioningof network systems.  Protectand defendinformationandinformationsystemstoensure accessibility,confidentiality, validity,integrity,authentication,availability,andnon-repudiation.  Developpoliciesandprocedurestoensure secure information reliabilityandaccessibility.  Performsystemssecurityevaluations,auditsandreviewsanddevelop AISsecuritycontingency plans.  Designandevaluate ITprogramsto ensure controlledaccessibilitytoAIS.  Conductphysical securityassessmentstoensure compliancewithphysical securityconcepts, principlesandpractices.  Lead effortstoresolve conflictingsecuritystandardsandpractices.  Make recommendationsontrainingneedstomanagementbasedonrequests.  Independentlymaintaintrainingmanagementdatabasesasaregularpart of myjob (for example,workedasthe commandGeneral MilitaryTrainingCoordinator).  DelivertrainingbasedoncontentIhave developed(bothdivisionwideandCommandwide)  Monitorcontrolledaccessprogramsto ensure implementationandviabilityof appropriate systemssecuritypoliciesandthe acquisitionof ITsecuritytools.  Recommendnew orrevisedsecuritymeasuresandcountermeasuresbasedonaccreditation reviewresults.  Review the workof othersand to be responsibleforentire,final documents  Work withstaffingdatabases suchasthe DOD’s Total Workforce ManagementSystem, ensuring accuracy of data.  Review andrecommendedimprovementsinprogrampolicies,procedures,legislation,orother complex documents.  Gather statistical dataandnarrative information,performanalyses,summarize results,identify problemareas,andpropose/implementsolutions.  Calculate andinterpret descriptivestatistics(forexample,means,standarddeviations,and frequencies) androutinelyuse theminmywork.  Lead small,highlyfocusedprojectsthatrequire workingwithrepresentativesfromdifferent unitsoutside myorganizationalunit.  Provide assistance andguidance tointernal andexternal partiesinthe analysis,planning,and securingof requiredapprovalsforacquisitionplans,contracts,andotherneeds.
  • 2.  Independentlyresearchandinterpret informationgatheredfrom avarietyof sources,evaluate the information,andmake specificrecommendationsbasedonmyfindings.  Independentlyinterpret lawsandregulationsforworkprojects,inparticularhow theymight affector come in conflictwith computernetworkoperationsandcomputernetworkresource accessibility.  I possessknowledge of: o IT securityprinciples,methods,securityproductsandservicesusedtoevaluateand recommendthe acquisition,implementationanddisseminationof securitytools, policies,proceduresandpractices.  Networkandsystemsdesigntoensure implementationof viable systemssecurity policiesandprocedures.  Securitycertificationandaccreditationrequirements,systemstestingandevaluation and performance managementmethodsforsecurityaccreditationreviewsforsystems and networks.  Standardizedtelecommunicationsconcepts,principles,andpracticesregarding deployablecommunicationsequipmentandsystems.  Operatingcharacteristicsandinteroperabilityrequirementsfor specialized communicationssystems.  Informationsystemssecurityprinciples,methods,technologyconcepts,standardsand methods.  CurrentInformationTechnologysecuritypractices,threats,trendsandtechnologies.  Making recommendationstoadoptnew technologiesinsoftware andinformation management.  Remainingaware of activitieswithentitiesexternal tothe organizationthatcouldaffect operationsbyensuringproceduresare inplace toadequatelyinformmanagementof projector operational status.  Providinginputinstructuring,implementing,monitoringsafeguardstomaintainthe security,andconfidentialityof ITsysteminformationanddatabases.  Coordinatingprogrameffortswithotherinternal andexternal activities.  Overseeinginformationtechnologyresponsibilitiestoinclude installationand monitoringof software applicationsordatabasesusedtosupportand enhance administrativefunctions.  Identifyingneedsfortechnological solutionstonetworksecurityproblemsand consultingwithcontractorsandGovernmentemployeestorefinesystemfunctional requirementsandtranslate functional requirementsintotechnical specifications;  Making verbal orwrittenrecommendationsandjustificationsconcerningthe resultsof technical analysis.  Analyzingandevaluatingproposedchangesinmission,operatingproceduresand delegationsof authority.