More Related Content
Similar to During my tour with CSG-9 (20)
During my tour with CSG-9
- 1. SEP 2011 – SEP 2014
Supervisor: Murphy, Kevan P
During my tour with Commander Submarine Group Nine (CSG-9) I primarily held the positions
of Departmental Leading Petty Officer (LPO), Command Information Assurance Manager
(IAM), and Communications Watch Officer(CWO). Within these positions I gained the
experience to:
Organize anddirectthe operation,administration,maintenance,and provisioningof network
systems.
Protectand defendinformationandinformationsystemstoensure accessibility,confidentiality,
validity,integrity,authentication,availability,andnon-repudiation.
Developpoliciesandprocedurestoensure secure information reliabilityandaccessibility.
Performsystemssecurityevaluations,auditsandreviewsanddevelop AISsecuritycontingency
plans.
Designandevaluate ITprogramsto ensure controlledaccessibilitytoAIS.
Conductphysical securityassessmentstoensure compliancewithphysical securityconcepts,
principlesandpractices.
Lead effortstoresolve conflictingsecuritystandardsandpractices.
Make recommendationsontrainingneedstomanagementbasedonrequests.
Independentlymaintaintrainingmanagementdatabasesasaregularpart of myjob (for
example,workedasthe commandGeneral MilitaryTrainingCoordinator).
DelivertrainingbasedoncontentIhave developed(bothdivisionwideandCommandwide)
Monitorcontrolledaccessprogramsto ensure implementationandviabilityof appropriate
systemssecuritypoliciesandthe acquisitionof ITsecuritytools.
Recommendnew orrevisedsecuritymeasuresandcountermeasuresbasedonaccreditation
reviewresults.
Review the workof othersand to be responsibleforentire,final documents
Work withstaffingdatabases suchasthe DOD’s Total Workforce ManagementSystem, ensuring
accuracy of data.
Review andrecommendedimprovementsinprogrampolicies,procedures,legislation,orother
complex documents.
Gather statistical dataandnarrative information,performanalyses,summarize results,identify
problemareas,andpropose/implementsolutions.
Calculate andinterpret descriptivestatistics(forexample,means,standarddeviations,and
frequencies) androutinelyuse theminmywork.
Lead small,highlyfocusedprojectsthatrequire workingwithrepresentativesfromdifferent
unitsoutside myorganizationalunit.
Provide assistance andguidance tointernal andexternal partiesinthe analysis,planning,and
securingof requiredapprovalsforacquisitionplans,contracts,andotherneeds.
- 2. Independentlyresearchandinterpret informationgatheredfrom avarietyof sources,evaluate
the information,andmake specificrecommendationsbasedonmyfindings.
Independentlyinterpret lawsandregulationsforworkprojects,inparticularhow theymight
affector come in conflictwith computernetworkoperationsandcomputernetworkresource
accessibility.
I possessknowledge of:
o IT securityprinciples,methods,securityproductsandservicesusedtoevaluateand
recommendthe acquisition,implementationanddisseminationof securitytools,
policies,proceduresandpractices.
Networkandsystemsdesigntoensure implementationof viable systemssecurity
policiesandprocedures.
Securitycertificationandaccreditationrequirements,systemstestingandevaluation
and performance managementmethodsforsecurityaccreditationreviewsforsystems
and networks.
Standardizedtelecommunicationsconcepts,principles,andpracticesregarding
deployablecommunicationsequipmentandsystems.
Operatingcharacteristicsandinteroperabilityrequirementsfor specialized
communicationssystems.
Informationsystemssecurityprinciples,methods,technologyconcepts,standardsand
methods.
CurrentInformationTechnologysecuritypractices,threats,trendsandtechnologies.
Making recommendationstoadoptnew technologiesinsoftware andinformation
management.
Remainingaware of activitieswithentitiesexternal tothe organizationthatcouldaffect
operationsbyensuringproceduresare inplace toadequatelyinformmanagementof
projector operational status.
Providinginputinstructuring,implementing,monitoringsafeguardstomaintainthe
security,andconfidentialityof ITsysteminformationanddatabases.
Coordinatingprogrameffortswithotherinternal andexternal activities.
Overseeinginformationtechnologyresponsibilitiestoinclude installationand
monitoringof software applicationsordatabasesusedtosupportand enhance
administrativefunctions.
Identifyingneedsfortechnological solutionstonetworksecurityproblemsand
consultingwithcontractorsandGovernmentemployeestorefinesystemfunctional
requirementsandtranslate functional requirementsintotechnical specifications;
Making verbal orwrittenrecommendationsandjustificationsconcerningthe resultsof
technical analysis.
Analyzingandevaluatingproposedchangesinmission,operatingproceduresand
delegationsof authority.