SlideShare a Scribd company logo
1 of 4
CHRIS HEDGE
10226 Stratford Ave E-mail: ChrisHedge13@gmail.com
Fairfax, Virginia 22030 Cell: 757-876-6729
EXECUTIVE SUMMARY
OBJECTIVE: To solidify a long-term opportunity in a cybersecurity consulting, Cloud services integration, or continuous
diagnostics and mitigation (CDM) planning and operations position to leverage my diverse information technology
experience, resource management abilities, and leadership and management background in a challenging and
emerging cybersecurity environment.
Experienced management professional with an excellent record of sustained superior performance and a broad
range of key skills that include:
• Cyber Operations / Incident Response
• Continuous Monitoring (CM/CDM)
• FedRAMP and Cloud IT Integrations
• FISMA / TIC / MTIPS
• Federal Cybersecurity Policy/Oversight
• Audit and Inspection Oversight
• Budget Development and Execution
• Project Management
• Leadership and Management
• Change Management
• Knowledge Management
• Human Resources Management
EDUCATION & TRAINING
Master of Science in Interdisciplinary Management, University of Maryland, August 2004
Bachelor of Science in Management, University of Maryland, August 1998
Associates Degrees in Management, University of Maryland, May 1996; Saint Leo University, January 1993; and
Community College of the Air Force, June 1992
Honors and Professional Development:
 Possess current U.S. Government Top Secret/SCI security clearance
 Retired Chief Master Sergeant -- received 5 Meritorious Service Medals during distinguished 20-year Air Force career
 Air Force Squadron Officers’ School (SOS) & Advanced Communications Officer Training (ACOT) graduate
 Distinguished Graduate of Air Force Senior Noncommissioned Officer Academy, Noncommissioned Officer Academy,
and Airman Leadership School; Academic Excellence Honor at Noncommissioned Officer Academy
 Four times honored as Air Force Major Command Information Technology Manager of the Year
CAREER ACCOMPLISHMENTS
Completed a diverse and rewarding active duty Air Force and fulfilling a civil service career that is highlighted by
advancement to positions of increased challenges, authority, and responsibilities in support of operations as . . .
DEPARTMENT OF TRANSPORTATION (April 2013 – PRESENT); serves in key supervisory, leadership, management,
and cybersecurity policy oversight position).
Director, Cyber Security Operations / GS-15 – Currently serves as cybersecurity operational response authority for the
Department of Transportation working directly for the DOT CISO and CIO to manage all facets of cybersecurity.
Responsible for managing the 24x7x365 Security Operations Center (SOC) operated by 30 personnel; leads
Department’s cyber incident response activities; ensures DOT/FAA Cloud integrations meet FedRAMP and Trusted
Internet Connection (TIC) requirements; directs and interfaces w/DHS to implement CDM tool sets; and serves as the
Department’s TIC Program Manager for three geographically separated TICs and an MTIPS service. Manages
cybersecurity operations that collectively support more than 100K users and 150K+ IT assets / networked endpoints.
 Key member of DHS/FedRAMP Cloud-TIC Working Group – identified key integration and governance gaps that
generated development of this team -- initiated update to FedRAMP requirements that overlays w/TIC Capabilities.
 Knowledgeable federal expert for TIC-Cloud integration compliance -- briefed all federal agencies about TIC-Cloud
security weaknesses and integration risks; sought out to provide same briefing to US Senate Engineering Group.
 DHS CDM Task Order 2B Technical Evaluation Board (TEB) Member – reviewed BPA vendor bids and made
technical and operational recommendations to determine results of $186M federal continuous monitoring contract.
 Primary contributor to DHS’ CDM operational requirements document (ORD) development – solidified enhanced
vendor tool set standards for the Federal CDM dashboard and Phase 1 and Phase 2 enterprise capabilities.
 Within 1 year of arriving, improved DOT’s TIC compliance and DHS, FISMA, and CAP Goal scores from 61% to
85% -- all DOT TICs scored 92%+ or higher with 99% of network traffic integrated through a TIC or MTIPS service.
 Authored the first-ever DOT Incident Response Plan that was lauded by US-CERT and OIG and GAO inspectors.
 Established the DOT Security Compliance Authorization Board to review and provide security requirements and
integration decisions for all DOT cloud integrations – only federal agency routing Cloud circuits through TICs.
DEPARTMENT OF HOMELAND SECURITY (2010–2013); served in diverse leadership and management, cybersecurity
policy oversight, and Division budget, acquisition, and human resources management positions).
DHS FEDERAL NETWORK RESILIENCE (FNR) DIVISION SENIOR CYBERSECURITY CAPABILITY VALIDATION
(CCV) TEAM LEAD / GS-14 (April 11 – April 2013) – Served as a Cybersecurity Capability Validation (CCV) Team
Leader for the FNR Division Operational Assurance Program (OAP). As part of the CCV Team Lead role, led and
conducted government agency cybersecurity assessments representing the Department of Homeland Security to validate
and report compliance with federal cybersecurity program, FISMA requirements and associated Presedential
Comprehensive National Cybersecurity Initiative (CNCI) and Trusted Internet Connection (TIC) Working Group criteria.
 Assessed operational readiness and cybersecurity risk across the Federal government using a risk-based approach;
measured Federal agency compliance with information system security laws and policies.
 Delivered an enterprise view of the Federal cybersecurity posture, enabling sound security and risk mitigation
strategies -- provided agencies w/information to mitigate cyber risks in federal agencies and service providers.
 Conducted annual cybersecurity compliance assessments -- certified agency network/security operational standards
and best practices to comply w/established national cybersecurity and FISMA standards and policies.
 Integrated vital White House FY12 Cross-Agency Priorities into DHS CCV assessments -- solidified processes to
evaluate high-level Capabilities w/in TIC assessment scope; OMB is now routinely informed of agency compliance.
 Improved federal internet connection/consolidation and network traffic flow reporting w/enhanced education to
agencies -- robust initiatives enabled agencies to pinpoint bandwidth and network traffic routed through TICs.
 Generated 1-week training for CCV team members -- developed curriculum, briefings, and agenda; briefed process
changes and guided Team Leads/members through visionary/rigid incident response plan exercise requirements.
 Authored objective evaluation reports/feedback to validate and support ongoing improvements by federal agencies --
increased confidence that agencies are complying with federal/published cybersecurity requirements.
DHS NATIONAL CYBER SECURITY DIVISION (NCSD) CHIEF OF STAFF / GS-14 (March 2010 – Apr 2011) –
Supervised activities of 33 personnel, 25 contractors and 6 critical functions that make up the National Cyber Security
Division's (NCSD) Front Office that includes Acquisitions, Budget, Human Capital, Information Security, Strategic
Planning, and Administration. Directly supported the NCSD Director and Deputy w/critical front office functions, advised
them on key IT issues, and directed Front Office workload to respond to various internal/external federal requirements.
 Guided largest-ever increase to CS&C/NCSD budget activities and projections for FY12 and FY13-17. Effective
leadership, in-depth budgetary document analysis reviews, and sound guidance to branches enabled 33% increase in
NCSD funding for FY12 and an additional 92 positions to support and enable cybersecurity operations.
 Led/supported 5 diverse IT/Cybersecurity Branches that make up NCSD, to include the US-CERT operational arm
that services the Federal government w/cybersecurity alert notification and warning and incident response program.
 Directly supported NCSD Director/Deputy through turbulent challenges, leadership rotations, and critical Division
hiring actions – established first-rate team that effectively supported more than 700 federal employees/contractors.
 Managed $400M Division budget and liaisoned with NPPD activities to effectively account and project for critical
funding and assets to support government-wide cybersecurity missions.
 Implemented strategies and goals that elevated NCSD contingency of operations (COOP) processes to become one
of NPPD’s most credible programs - instituted emergency notification processes that were effectively executed.
`
UNITED STATES AIR FORCE (Active Duty Oct ‘85 – Nov ‘05; AF civil servant through Mar ‘10)
PLANS AND RESOURCES FLIGHT COMMANDER / GG-13 (June 2007 – March 2010) – Managed a Flight of 47 active
duty Airmen/67 contractor technicians who oversee diverse IT programs to train/equip 250 resources for Government War
on Terrorism (GWOT) operations at home/abroad. Oversees IT & intelligence, surveillance, reconnaissance (ISR)
systems planning, integration, maintenance, sustainment, and training for a global $750M net-centric ISR weapon system.
 Directed 7 vital communications-logistics functions (IT Planning, Cybersecurity, Client Services IT Help Desk,
Readiness/Deployments, IT Training, Quality Assurance (QA), and Logistics) to enable global ISR capability 24x7.
 Modernized ISR baseline weapon system infrastructure to support emerging theater wartime requirements and
leveraged $150M of new commercial capabilities to quadruple intelligence exploitation capability/capacity in 2 years.
 Planned/executed $100M weapon system upgrades that included software, hardware, and spare parts to enable
weapon system configuration management/modernization to enable/support next-generation ISR strategies.
 Deployed 1st-ever MC-12 joint ISR/full motion video capability—made Secretary of Defense’s #2 priority a success.
 Steered unit and Plans/Resources Flight thru AF ISR Agency Unit Compliance Inspection – largely responsible for
unparalleled 96% Wing compliance rate – 7 Wing/Group “Outstanding Performers” / 2 “Outstanding Team” Awards.
 Lead unit planner for $50M MILCON; identified technical requirements/issues—primed $750M weapon system, 700+
personnel, 1K+ IT systems/peripherals housed within 7 existing facilities for comprehensive ISR relocations.
 Precisely planned/led IT initiatives; fueled 1.5K U-2/UAV missions—131K ISR targets/13K joint reports to warfighter.
 Guided 700+ resources to achieve/support unparalleled ISR upgrades that increased global ISR capability by 400%.
 Enabled MC-12 Project Liberty data feed thru DISA--successful ISR data flow piped 1st full-motion ISR video to site.
 Prepared deploying Airmen for expeditionary mobility/deployments – led teams to support COCOM imagery
exploitation/signals Intelligence requirements for GWOT ISR ops supporting Operation Iraqi and Enduring Freedom.
REFERENCE SHEET
Andrew Orndorff
Associate CIO for Cybersecurity and Chief Information Security Officer (CISO)
Department of Transportation
1200 New Jersey N.W., Washington, D.C. 20590
Work Phone: (202) 366-7111; Mobile Phone: (202) 437-9727
E-Mail: Andrew.Orndorff@dot.gov
Richard McKinney
Chief Information Officer (CIO)
Department of Transportation
1200 New Jersey N.W., Washington, D.C. 20590
Work Phone: (202) 366-9201; E-Mail: richard.mckinney@dot.gov
William Black, GS-15
Deputy Chief, Plans and Resources Division, Langley Air Force Base
HQ Air Combat Command Directorate of Communications and Information Systems
302 Ludow Drive, Seaford, VA 23692
Work Phone: (757) 764-3027; Home Phone: (757) 872-4475
E-mail: william.black@langley.af.mil
Lt Col Jed S. Cohen
Commander, 10th
Intelligence Squadron, Langley Air Force Base
210 Blevins Run, Yorktown, VA 23693
Work Phone: (757) 225-3932; Home Phone: (757) 867-8014
E-mail: jed.cohen@langley.af.mil
Lieutenant Colonel Joanne Sechrest
Communications Officer
Department of Homeland Security, Washington D.C.
Home Phone: (443) 610-2882 / E-mail: joanne_sechrest@yahoo.com
Major Joanne Frank
Communications Officer
Defense Information Systems Agency, Washington D.C.
Home Phone: (757) 310-4500 / E-mail: joanne.frank@disa.mil
Curt Gibson, GS-13
Chief Plans and Resources Branch, Langley Air Force Base
HQ Air Combat Command Directorate of Communications and Information Systems
105 Terrance Circle, Yorktown, VA 23693
Work Phone: (757) 764-9967; Home Phone: (757) 591-0334

More Related Content

What's hot

Robert Freeman Resume Aug15
Robert Freeman Resume Aug15Robert Freeman Resume Aug15
Robert Freeman Resume Aug15Robert Freeman
 
Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]Peter Smith
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDIDavid Sweigert
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program AssessmentsJohn Anderson
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk ManagementTudor Damian
 
Joshua_Pruitt_Revised (003)
Joshua_Pruitt_Revised (003)Joshua_Pruitt_Revised (003)
Joshua_Pruitt_Revised (003)Joshua Pruitt
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuillermo Remache
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security GuidanceMeg Weber
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS GuidelinesMeg Weber
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 

What's hot (17)

Robert Freeman Resume Aug15
Robert Freeman Resume Aug15Robert Freeman Resume Aug15
Robert Freeman Resume Aug15
 
Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]Data_Systems_Specialist_Role_Description[1]
Data_Systems_Specialist_Role_Description[1]
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
2 Day MOSTI Workshop
2 Day MOSTI Workshop2 Day MOSTI Workshop
2 Day MOSTI Workshop
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program Assessments
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Joshua_Pruitt_Revised (003)
Joshua_Pruitt_Revised (003)Joshua_Pruitt_Revised (003)
Joshua_Pruitt_Revised (003)
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security Guidance
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS Guidelines
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Ch3 cism 2014
Ch3 cism 2014Ch3 cism 2014
Ch3 cism 2014
 
B Parker Resume rev 2
B Parker Resume rev 2B Parker Resume rev 2
B Parker Resume rev 2
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 

Similar to Formal Resume Final - Chris Hedge

Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins ResumePaul Mullins
 
Merkle,_William-Professional_Resume
Merkle,_William-Professional_ResumeMerkle,_William-Professional_Resume
Merkle,_William-Professional_ResumeWilliam Merkle
 
Supplemental.PDF
Supplemental.PDFSupplemental.PDF
Supplemental.PDFJohn S.
 
1_Baskins_Monroe_J Resume 28 June 2015
1_Baskins_Monroe_J Resume 28 June 20151_Baskins_Monroe_J Resume 28 June 2015
1_Baskins_Monroe_J Resume 28 June 2015James Baskins
 
IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesOmar Toor
 
JD Taylor - Resume w dates
JD Taylor - Resume w datesJD Taylor - Resume w dates
JD Taylor - Resume w datesJD Taylor
 
James Mindek Resume
James Mindek ResumeJames Mindek Resume
James Mindek ResumeJames Mindek
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resumeBryan Davila
 
it--jamestoddyoung-
it--jamestoddyoung-it--jamestoddyoung-
it--jamestoddyoung-James Young
 
Boston, Jonathan RESUME 05 2016_2
Boston, Jonathan RESUME 05 2016_2Boston, Jonathan RESUME 05 2016_2
Boston, Jonathan RESUME 05 2016_2Jonathan Boston
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resumeBryan Davila
 

Similar to Formal Resume Final - Chris Hedge (20)

Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
lydick_richard_resume
lydick_richard_resumelydick_richard_resume
lydick_richard_resume
 
Cyber Lead
Cyber LeadCyber Lead
Cyber Lead
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
Merkle,_William-Professional_Resume
Merkle,_William-Professional_ResumeMerkle,_William-Professional_Resume
Merkle,_William-Professional_Resume
 
Dossier 2008 V3
Dossier 2008 V3Dossier 2008 V3
Dossier 2008 V3
 
Supplemental.PDF
Supplemental.PDFSupplemental.PDF
Supplemental.PDF
 
Harris_Resume_2016_ITS_gmail
Harris_Resume_2016_ITS_gmailHarris_Resume_2016_ITS_gmail
Harris_Resume_2016_ITS_gmail
 
Resume - Timothy Lewis 20160313
Resume - Timothy Lewis 20160313Resume - Timothy Lewis 20160313
Resume - Timothy Lewis 20160313
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
IT WORK SAMPLES
IT WORK SAMPLESIT WORK SAMPLES
IT WORK SAMPLES
 
McBee 8-28-2015
McBee 8-28-2015McBee 8-28-2015
McBee 8-28-2015
 
1_Baskins_Monroe_J Resume 28 June 2015
1_Baskins_Monroe_J Resume 28 June 20151_Baskins_Monroe_J Resume 28 June 2015
1_Baskins_Monroe_J Resume 28 June 2015
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
JD Taylor - Resume w dates
JD Taylor - Resume w datesJD Taylor - Resume w dates
JD Taylor - Resume w dates
 
James Mindek Resume
James Mindek ResumeJames Mindek Resume
James Mindek Resume
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resume
 
it--jamestoddyoung-
it--jamestoddyoung-it--jamestoddyoung-
it--jamestoddyoung-
 
Boston, Jonathan RESUME 05 2016_2
Boston, Jonathan RESUME 05 2016_2Boston, Jonathan RESUME 05 2016_2
Boston, Jonathan RESUME 05 2016_2
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resume
 

Formal Resume Final - Chris Hedge

  • 1. CHRIS HEDGE 10226 Stratford Ave E-mail: ChrisHedge13@gmail.com Fairfax, Virginia 22030 Cell: 757-876-6729 EXECUTIVE SUMMARY OBJECTIVE: To solidify a long-term opportunity in a cybersecurity consulting, Cloud services integration, or continuous diagnostics and mitigation (CDM) planning and operations position to leverage my diverse information technology experience, resource management abilities, and leadership and management background in a challenging and emerging cybersecurity environment. Experienced management professional with an excellent record of sustained superior performance and a broad range of key skills that include: • Cyber Operations / Incident Response • Continuous Monitoring (CM/CDM) • FedRAMP and Cloud IT Integrations • FISMA / TIC / MTIPS • Federal Cybersecurity Policy/Oversight • Audit and Inspection Oversight • Budget Development and Execution • Project Management • Leadership and Management • Change Management • Knowledge Management • Human Resources Management EDUCATION & TRAINING Master of Science in Interdisciplinary Management, University of Maryland, August 2004 Bachelor of Science in Management, University of Maryland, August 1998 Associates Degrees in Management, University of Maryland, May 1996; Saint Leo University, January 1993; and Community College of the Air Force, June 1992 Honors and Professional Development:  Possess current U.S. Government Top Secret/SCI security clearance  Retired Chief Master Sergeant -- received 5 Meritorious Service Medals during distinguished 20-year Air Force career  Air Force Squadron Officers’ School (SOS) & Advanced Communications Officer Training (ACOT) graduate  Distinguished Graduate of Air Force Senior Noncommissioned Officer Academy, Noncommissioned Officer Academy, and Airman Leadership School; Academic Excellence Honor at Noncommissioned Officer Academy  Four times honored as Air Force Major Command Information Technology Manager of the Year CAREER ACCOMPLISHMENTS Completed a diverse and rewarding active duty Air Force and fulfilling a civil service career that is highlighted by advancement to positions of increased challenges, authority, and responsibilities in support of operations as . . . DEPARTMENT OF TRANSPORTATION (April 2013 – PRESENT); serves in key supervisory, leadership, management, and cybersecurity policy oversight position). Director, Cyber Security Operations / GS-15 – Currently serves as cybersecurity operational response authority for the Department of Transportation working directly for the DOT CISO and CIO to manage all facets of cybersecurity. Responsible for managing the 24x7x365 Security Operations Center (SOC) operated by 30 personnel; leads Department’s cyber incident response activities; ensures DOT/FAA Cloud integrations meet FedRAMP and Trusted Internet Connection (TIC) requirements; directs and interfaces w/DHS to implement CDM tool sets; and serves as the Department’s TIC Program Manager for three geographically separated TICs and an MTIPS service. Manages cybersecurity operations that collectively support more than 100K users and 150K+ IT assets / networked endpoints.  Key member of DHS/FedRAMP Cloud-TIC Working Group – identified key integration and governance gaps that generated development of this team -- initiated update to FedRAMP requirements that overlays w/TIC Capabilities.  Knowledgeable federal expert for TIC-Cloud integration compliance -- briefed all federal agencies about TIC-Cloud security weaknesses and integration risks; sought out to provide same briefing to US Senate Engineering Group.  DHS CDM Task Order 2B Technical Evaluation Board (TEB) Member – reviewed BPA vendor bids and made technical and operational recommendations to determine results of $186M federal continuous monitoring contract.
  • 2.  Primary contributor to DHS’ CDM operational requirements document (ORD) development – solidified enhanced vendor tool set standards for the Federal CDM dashboard and Phase 1 and Phase 2 enterprise capabilities.  Within 1 year of arriving, improved DOT’s TIC compliance and DHS, FISMA, and CAP Goal scores from 61% to 85% -- all DOT TICs scored 92%+ or higher with 99% of network traffic integrated through a TIC or MTIPS service.  Authored the first-ever DOT Incident Response Plan that was lauded by US-CERT and OIG and GAO inspectors.  Established the DOT Security Compliance Authorization Board to review and provide security requirements and integration decisions for all DOT cloud integrations – only federal agency routing Cloud circuits through TICs. DEPARTMENT OF HOMELAND SECURITY (2010–2013); served in diverse leadership and management, cybersecurity policy oversight, and Division budget, acquisition, and human resources management positions). DHS FEDERAL NETWORK RESILIENCE (FNR) DIVISION SENIOR CYBERSECURITY CAPABILITY VALIDATION (CCV) TEAM LEAD / GS-14 (April 11 – April 2013) – Served as a Cybersecurity Capability Validation (CCV) Team Leader for the FNR Division Operational Assurance Program (OAP). As part of the CCV Team Lead role, led and conducted government agency cybersecurity assessments representing the Department of Homeland Security to validate and report compliance with federal cybersecurity program, FISMA requirements and associated Presedential Comprehensive National Cybersecurity Initiative (CNCI) and Trusted Internet Connection (TIC) Working Group criteria.  Assessed operational readiness and cybersecurity risk across the Federal government using a risk-based approach; measured Federal agency compliance with information system security laws and policies.  Delivered an enterprise view of the Federal cybersecurity posture, enabling sound security and risk mitigation strategies -- provided agencies w/information to mitigate cyber risks in federal agencies and service providers.  Conducted annual cybersecurity compliance assessments -- certified agency network/security operational standards and best practices to comply w/established national cybersecurity and FISMA standards and policies.  Integrated vital White House FY12 Cross-Agency Priorities into DHS CCV assessments -- solidified processes to evaluate high-level Capabilities w/in TIC assessment scope; OMB is now routinely informed of agency compliance.  Improved federal internet connection/consolidation and network traffic flow reporting w/enhanced education to agencies -- robust initiatives enabled agencies to pinpoint bandwidth and network traffic routed through TICs.  Generated 1-week training for CCV team members -- developed curriculum, briefings, and agenda; briefed process changes and guided Team Leads/members through visionary/rigid incident response plan exercise requirements.  Authored objective evaluation reports/feedback to validate and support ongoing improvements by federal agencies -- increased confidence that agencies are complying with federal/published cybersecurity requirements. DHS NATIONAL CYBER SECURITY DIVISION (NCSD) CHIEF OF STAFF / GS-14 (March 2010 – Apr 2011) – Supervised activities of 33 personnel, 25 contractors and 6 critical functions that make up the National Cyber Security Division's (NCSD) Front Office that includes Acquisitions, Budget, Human Capital, Information Security, Strategic Planning, and Administration. Directly supported the NCSD Director and Deputy w/critical front office functions, advised them on key IT issues, and directed Front Office workload to respond to various internal/external federal requirements.  Guided largest-ever increase to CS&C/NCSD budget activities and projections for FY12 and FY13-17. Effective leadership, in-depth budgetary document analysis reviews, and sound guidance to branches enabled 33% increase in NCSD funding for FY12 and an additional 92 positions to support and enable cybersecurity operations.  Led/supported 5 diverse IT/Cybersecurity Branches that make up NCSD, to include the US-CERT operational arm that services the Federal government w/cybersecurity alert notification and warning and incident response program.  Directly supported NCSD Director/Deputy through turbulent challenges, leadership rotations, and critical Division hiring actions – established first-rate team that effectively supported more than 700 federal employees/contractors.  Managed $400M Division budget and liaisoned with NPPD activities to effectively account and project for critical funding and assets to support government-wide cybersecurity missions.  Implemented strategies and goals that elevated NCSD contingency of operations (COOP) processes to become one of NPPD’s most credible programs - instituted emergency notification processes that were effectively executed. ` UNITED STATES AIR FORCE (Active Duty Oct ‘85 – Nov ‘05; AF civil servant through Mar ‘10) PLANS AND RESOURCES FLIGHT COMMANDER / GG-13 (June 2007 – March 2010) – Managed a Flight of 47 active duty Airmen/67 contractor technicians who oversee diverse IT programs to train/equip 250 resources for Government War on Terrorism (GWOT) operations at home/abroad. Oversees IT & intelligence, surveillance, reconnaissance (ISR) systems planning, integration, maintenance, sustainment, and training for a global $750M net-centric ISR weapon system.  Directed 7 vital communications-logistics functions (IT Planning, Cybersecurity, Client Services IT Help Desk, Readiness/Deployments, IT Training, Quality Assurance (QA), and Logistics) to enable global ISR capability 24x7.  Modernized ISR baseline weapon system infrastructure to support emerging theater wartime requirements and leveraged $150M of new commercial capabilities to quadruple intelligence exploitation capability/capacity in 2 years.
  • 3.  Planned/executed $100M weapon system upgrades that included software, hardware, and spare parts to enable weapon system configuration management/modernization to enable/support next-generation ISR strategies.  Deployed 1st-ever MC-12 joint ISR/full motion video capability—made Secretary of Defense’s #2 priority a success.  Steered unit and Plans/Resources Flight thru AF ISR Agency Unit Compliance Inspection – largely responsible for unparalleled 96% Wing compliance rate – 7 Wing/Group “Outstanding Performers” / 2 “Outstanding Team” Awards.  Lead unit planner for $50M MILCON; identified technical requirements/issues—primed $750M weapon system, 700+ personnel, 1K+ IT systems/peripherals housed within 7 existing facilities for comprehensive ISR relocations.  Precisely planned/led IT initiatives; fueled 1.5K U-2/UAV missions—131K ISR targets/13K joint reports to warfighter.  Guided 700+ resources to achieve/support unparalleled ISR upgrades that increased global ISR capability by 400%.  Enabled MC-12 Project Liberty data feed thru DISA--successful ISR data flow piped 1st full-motion ISR video to site.  Prepared deploying Airmen for expeditionary mobility/deployments – led teams to support COCOM imagery exploitation/signals Intelligence requirements for GWOT ISR ops supporting Operation Iraqi and Enduring Freedom. REFERENCE SHEET Andrew Orndorff Associate CIO for Cybersecurity and Chief Information Security Officer (CISO) Department of Transportation 1200 New Jersey N.W., Washington, D.C. 20590 Work Phone: (202) 366-7111; Mobile Phone: (202) 437-9727 E-Mail: Andrew.Orndorff@dot.gov Richard McKinney Chief Information Officer (CIO) Department of Transportation 1200 New Jersey N.W., Washington, D.C. 20590 Work Phone: (202) 366-9201; E-Mail: richard.mckinney@dot.gov William Black, GS-15 Deputy Chief, Plans and Resources Division, Langley Air Force Base HQ Air Combat Command Directorate of Communications and Information Systems 302 Ludow Drive, Seaford, VA 23692 Work Phone: (757) 764-3027; Home Phone: (757) 872-4475 E-mail: william.black@langley.af.mil Lt Col Jed S. Cohen Commander, 10th Intelligence Squadron, Langley Air Force Base 210 Blevins Run, Yorktown, VA 23693 Work Phone: (757) 225-3932; Home Phone: (757) 867-8014 E-mail: jed.cohen@langley.af.mil Lieutenant Colonel Joanne Sechrest Communications Officer Department of Homeland Security, Washington D.C. Home Phone: (443) 610-2882 / E-mail: joanne_sechrest@yahoo.com Major Joanne Frank Communications Officer Defense Information Systems Agency, Washington D.C. Home Phone: (757) 310-4500 / E-mail: joanne.frank@disa.mil Curt Gibson, GS-13 Chief Plans and Resources Branch, Langley Air Force Base HQ Air Combat Command Directorate of Communications and Information Systems
  • 4. 105 Terrance Circle, Yorktown, VA 23693 Work Phone: (757) 764-9967; Home Phone: (757) 591-0334