SlideShare a Scribd company logo
1 of 6
CURRICULUM VITAE
PERSONAL INFORMATION
Date of Birth: 26 Jun 1970
Place of Birth: Odessa, TX
Marital Status: Married 28 years
Spouse's Name: Karla
Children: Kay’Lee (20)
Alexa (18)
Address: 28211 Sweet Oak Lane, Katy TX 77494
Phone: Cell - 254-289-8225
EMPLOYMENT HISTORY
Guidance Software Jun 2015 – Present
Senior Director of Training
1155 East Colorado Blvd
Pasadena, CA 91101
Guidance Software Mar 2013 – Jun 2015
Director of Distance Learning, Professional Development, and Training
1155 East Colorado Blvd
Pasadena, CA 91101
POC Charles Cobb, Sr Director of Training Phone 626-229-9191
Guidance Software Oct 2010 – Mar 2013
Training Manager, Professional Development and Training
215 North Morengo Ave
Pasadena, CA 91101
POC Charles Cobb, Sr Director of Training Phone 626-229-9191
Guidance Software 2000 – Oct 2010
Instructor III, Computer Forensics
215 North Morengo Ave
Pasadena, CA 91101
POC Charles Cobb, Sr Director of Training Phone 626-229-9191
United States Army Jul 1988 – Aug 2008
CID Warrant Officer Special Agent Apr 1997 – Aug 2008
CID Enlisted Special Agent, Apr 1993 – Apr 1997
Computer Crime Coordinator Jan 2000 – Aug 2008
Network Administrator/System Administrator Feb 1992 – Aug 2008
Physical Security Officer Oct 1998 – Aug 2008
EDUCATION
High School: Mansfield High School, Mansfield TX 1988
College: Central Texas College 1992 - 1993
City College of Chicago 1992
Cochise College 1995
Houston Community College 2010 - present
All formal education was attained while serving full time active duty in the military and in
lieu of continuing education in Criminal Justice; I focused on my formalized training in
the computer forensics field beginning in 1999. I currently have 135 credits toward my
Bachelors Degree, with a major in Criminal Justice.
Law Enforcement Related:
Apprentice CID Special Agent Course, January, 1994
Child Abuse Prevention and Investigative Techniques, October, 1994
Investigation of Fire Cause and Origin, July, 1994
Practical Homicide Investigations, November 1994
Protective Services Training, January, 1995
Investigation of Sexual Assault, March, 1995
Advanced Fraud Investigative Techniques Phase I, April,1995
Advanced Fraud Investigative Techniques Phase II, May, 1995
Hostage Negotiation, March,1996
Counterdrug Investigations, November, 1997
Combating Terrorism, October, 1998
US Customs, Customs Border Clearance Agent Course, January, 2003
Evidence Management and Certification Course, May, 2005
Computer Related:
US Army:
Mainframe Computer Repair, March,1989
Wide Area Network/System Administrator (Unix), February, 1992
System Administrator Security (Windows), July, 2000
Network Manager Security (Windows), August, 2000
Department of Defense Computer Investigative Training (DC3):
Computer Crimes Workshop, August, 1998
Introduction to Networks and Computer Hardware, April, 2000
Incident Response in a Networked Environment, October, 2001
Forensic Intrusions in a Windows Environment, December, 2005
Department of Justice:
Seized Computer Evidence Recovery Specialist, February, 2001
Cyber Counterterrorism Investigations Training Program, May 2004
Internet Crimes Against Children Investigative Techniques, March, 2005
Guidance Software:
Introduction to Computer Forensics, July 2002
Intermediate Computer Forensics, December, 1999
Advanced Computer Forensics
Incident Response, Forensic Analysis and Discovery, April, 2004
Advanced Internet and Email Examination, October, 2005
Network Intrusions Investigations Course Phase I, September, 2006
Network Intrusions Investigations Course Phase II, August, 2008
Field Intelligence Model, Live Forensic Investigations, September 2008
EnCase Enterprise Examinations, August 2008
Cyber Security Investigations, December 2010
New Technology File System, 2008
EnCase Portable Investigations and Training, June 2010
EnCase Macintosh and Linux Examinations
EnCase CyberSecurity Investigations Mar 2015
EC-Council:
Certified Ethical Hacker, October 2010
Certified EcCouncil Instructor December 2010
PROFESSIONAL QUALIFICATIONS
Certifications and Accreditations:
Top Secret Clearance with SCI
EnCase Certified Examiner (EnCE), Guidance Software
Certified Forensic Security Responder (CFSR), Guidance Software
Certified Information Systems Security Professional, CISSP, ISC2
Certified Ethical Hacker, EC-Council
Seized Computer Evidence Recovery Specialist, DOJ, FLETC
Certified Computer Crime Investigator, DOD Cyber Crime Center (DC3)
Airborne Parachutist
PADI Certified Scuba Diver
AWARDS
Bronze Star (x2)
Defense Meritorious Service Medal
Meritorious Service Medal (X3)
Army Commendation Medal (X3)
Army Achievement Medal (X5)
Armed Forces Expeditionary Medal
Iraq Campaign Medal
Global War on Terrorism Expeditionary Medal
Global War on Terrorism Service Medal
Kuwait Liberation Medal
Southwest Asia Service Medal (3 campaign stars)
Joint Meritorious Unit Award
NCO Professional Development Ribbon (X2)
National Defense Service Medal (X2)
Good Conduct Medal
Overseas Service Ribbon (x5)
Army Service Ribbon
While in the US Army as a CID Special Agent and the Senior Computer Forensic Examiner for
the US Army it was my responsibility to investigate felony crimes involving the use of a
computer, which ranged from identity theft, bribery, graft, economic crime, fraud, and network
intrusion of the Army and DOD network infrastructure.
As the Sr. Director of Professional Development and Training at Guidance Software it is my
responsibility to maintain the day-to-day operation of the 23 person team responsible for an
annual 8.8 million dollar business. During my tenure as the Director of Curriculum development
it was my responsibility to lead a team of highly qualified forensic examiners and instructors to
develop curriculum to be used in class. I personally designed and implemented the virtual
classroom (VClass) for Guidance Software, providing another delivery method for our
customers and making our training more consumable in a more economically responsible way.
As the Sr. Director, I oversaw the development of the Guidance Software’s new certification
CFSR.
During the 20 years and 18 days I served in the Army, I was Special Agent with the US Army
Criminal Investigation Command. I was qualified as an expert in computer forensics and
testified as such on many occasions in both Federal and Military court. The Army was a very
special place for me because I joined at 17 and retired at 37. The military developed me into
the person I am today. Growing up in the military I learned what competence, candor,
commitment, integrity, and loyalty really means. I believe in doing what is right even when no
one is looking. I believe in extreme leadership. As a leader, my attitude will almost always
determine whether my team succeeds or fails. I also believe that leaders who are more focused
on the mission and less on personal gain always accomplish it with a more effective and
efficient outcome. I believe leadership requires belief in the mission and unyielding
perseverance to achieve victory, particularly when doubters question whether it is even
possible. My style of leadership is dynamic in that I can change the style based on the
individual needing the leadership at that time and place.
I believe in getting my hands dirty as well and not just telling people what to do but leading them
from the front on how to do it and set the standards of excellence so they know the expectations
and know what it takes to achieve them.
For the last 9 years it has been my privilege to utilize 15 members of the training staff to setup
the EnFuse conference, (previously CEIC) networking environment and coordinate all speaker
materials, as well as instruct at the conference.
I believe my most valuable traits are integrity, loyalty, ethical, and grounded in morality.
For the last 9 years it has been my privilege to utilize 15 members of the training staff to setup
the EnFuse conference, (previously CEIC) networking environment and coordinate all speaker
materials, as well as instruct at the conference.
I believe my most valuable traits are integrity, loyalty, ethical, and grounded in morality.

More Related Content

Viewers also liked

Hongos en la microbiología sanitaria
Hongos en la microbiología sanitariaHongos en la microbiología sanitaria
Hongos en la microbiología sanitariacarmen Marquez
 
Water purification methods
Water purification methodsWater purification methods
Water purification methodsfrank jc
 
Pulsed Electric Field For Food Processing Technology
Pulsed Electric Field For Food Processing TechnologyPulsed Electric Field For Food Processing Technology
Pulsed Electric Field For Food Processing TechnologyDinindu Madhuka
 
Future Sat Africa - Crisis Connectivity Charter
Future Sat Africa - Crisis Connectivity CharterFuture Sat Africa - Crisis Connectivity Charter
Future Sat Africa - Crisis Connectivity CharterMyles Freedman
 
IAD Summit 2017 Concept Notes
IAD Summit 2017 Concept NotesIAD Summit 2017 Concept Notes
IAD Summit 2017 Concept NotesMyles Freedman
 
Service core benefits
Service core benefitsService core benefits
Service core benefitsIdea Elan
 
How precious could diamond be for men as well
How precious could diamond be for men as wellHow precious could diamond be for men as well
How precious could diamond be for men as wellItshot.com Reviews
 

Viewers also liked (10)

Hongos en la microbiología sanitaria
Hongos en la microbiología sanitariaHongos en la microbiología sanitaria
Hongos en la microbiología sanitaria
 
Water purification methods
Water purification methodsWater purification methods
Water purification methods
 
Admisión Al Usuario
Admisión Al Usuario Admisión Al Usuario
Admisión Al Usuario
 
Pulsed Electric Field For Food Processing Technology
Pulsed Electric Field For Food Processing TechnologyPulsed Electric Field For Food Processing Technology
Pulsed Electric Field For Food Processing Technology
 
Future Sat Africa - Crisis Connectivity Charter
Future Sat Africa - Crisis Connectivity CharterFuture Sat Africa - Crisis Connectivity Charter
Future Sat Africa - Crisis Connectivity Charter
 
IAD Summit 2017 Concept Notes
IAD Summit 2017 Concept NotesIAD Summit 2017 Concept Notes
IAD Summit 2017 Concept Notes
 
RESUMEN
RESUMENRESUMEN
RESUMEN
 
Service core benefits
Service core benefitsService core benefits
Service core benefits
 
записки солдата вавилова
записки солдата вавиловазаписки солдата вавилова
записки солдата вавилова
 
How precious could diamond be for men as well
How precious could diamond be for men as wellHow precious could diamond be for men as well
How precious could diamond be for men as well
 

Similar to Tubbs CURRICULUM VITAE

CV a 11-2010 revision 05dec2016
CV a 11-2010 revision 05dec2016CV a 11-2010 revision 05dec2016
CV a 11-2010 revision 05dec2016Dennis Chevalier
 
Responses to Additional Prehearing Questions; General David H. Petraeus
Responses to Additional Prehearing Questions; General David H. PetraeusResponses to Additional Prehearing Questions; General David H. Petraeus
Responses to Additional Prehearing Questions; General David H. PetraeusMilitary Matters
 
Wireless crime and forensic investigation g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation   g. kipper (auerbach, 2007) wwWireless crime and forensic investigation   g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation g. kipper (auerbach, 2007) wwyesumanitvr
 
Wireless crime and forensic investigation g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation   g. kipper (auerbach, 2007) wwWireless crime and forensic investigation   g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation g. kipper (auerbach, 2007) wwyesumanitvr
 
Evidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayEvidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayJessica Howard
 
Abdul Salam Portfolio
Abdul Salam PortfolioAbdul Salam Portfolio
Abdul Salam PortfolioAbdul Salam
 
Dr. Mike Beshears - CV 2016
Dr. Mike Beshears - CV 2016Dr. Mike Beshears - CV 2016
Dr. Mike Beshears - CV 2016mlbeshears
 
Over The Rainbow
Over The RainbowOver The Rainbow
Over The RainbowEbony Bates
 
Master-Monster142ndrev
Master-Monster142ndrevMaster-Monster142ndrev
Master-Monster142ndrevPat Garrett
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt ResumeDonna Robeck
 
Measuring security culture is different from counting employees
Measuring security culture is different from counting employeesMeasuring security culture is different from counting employees
Measuring security culture is different from counting employeesKai Roer
 

Similar to Tubbs CURRICULUM VITAE (20)

CV a 11-2010 revision 05dec2016
CV a 11-2010 revision 05dec2016CV a 11-2010 revision 05dec2016
CV a 11-2010 revision 05dec2016
 
Responses to Additional Prehearing Questions; General David H. Petraeus
Responses to Additional Prehearing Questions; General David H. PetraeusResponses to Additional Prehearing Questions; General David H. Petraeus
Responses to Additional Prehearing Questions; General David H. Petraeus
 
OCallaghan Resume 2016
OCallaghan Resume 2016OCallaghan Resume 2016
OCallaghan Resume 2016
 
Resume16
Resume16Resume16
Resume16
 
Wireless crime and forensic investigation g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation   g. kipper (auerbach, 2007) wwWireless crime and forensic investigation   g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation g. kipper (auerbach, 2007) ww
 
Wireless crime and forensic investigation g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation   g. kipper (auerbach, 2007) wwWireless crime and forensic investigation   g. kipper (auerbach, 2007) ww
Wireless crime and forensic investigation g. kipper (auerbach, 2007) ww
 
Evidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayEvidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity Essay
 
SMA_CV2
SMA_CV2SMA_CV2
SMA_CV2
 
Valedictory_1.docx
Valedictory_1.docxValedictory_1.docx
Valedictory_1.docx
 
resume_dallasSwathwood
resume_dallasSwathwoodresume_dallasSwathwood
resume_dallasSwathwood
 
Short CV of Kala(1) (1)
Short CV of Kala(1) (1)Short CV of Kala(1) (1)
Short CV of Kala(1) (1)
 
Abdul Salam Portfolio
Abdul Salam PortfolioAbdul Salam Portfolio
Abdul Salam Portfolio
 
Dr. Mike Beshears - CV 2016
Dr. Mike Beshears - CV 2016Dr. Mike Beshears - CV 2016
Dr. Mike Beshears - CV 2016
 
S bailey resume
S bailey resumeS bailey resume
S bailey resume
 
Over The Rainbow
Over The RainbowOver The Rainbow
Over The Rainbow
 
Master-Monster142ndrev
Master-Monster142ndrevMaster-Monster142ndrev
Master-Monster142ndrev
 
Sherry d bailey resume
Sherry d bailey resumeSherry d bailey resume
Sherry d bailey resume
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt Resume
 
Measuring security culture is different from counting employees
Measuring security culture is different from counting employeesMeasuring security culture is different from counting employees
Measuring security culture is different from counting employees
 
nabeel resume
nabeel resumenabeel resume
nabeel resume
 

Tubbs CURRICULUM VITAE

  • 1. CURRICULUM VITAE PERSONAL INFORMATION Date of Birth: 26 Jun 1970 Place of Birth: Odessa, TX Marital Status: Married 28 years Spouse's Name: Karla Children: Kay’Lee (20) Alexa (18) Address: 28211 Sweet Oak Lane, Katy TX 77494 Phone: Cell - 254-289-8225 EMPLOYMENT HISTORY Guidance Software Jun 2015 – Present Senior Director of Training 1155 East Colorado Blvd Pasadena, CA 91101 Guidance Software Mar 2013 – Jun 2015 Director of Distance Learning, Professional Development, and Training 1155 East Colorado Blvd Pasadena, CA 91101 POC Charles Cobb, Sr Director of Training Phone 626-229-9191 Guidance Software Oct 2010 – Mar 2013 Training Manager, Professional Development and Training 215 North Morengo Ave Pasadena, CA 91101 POC Charles Cobb, Sr Director of Training Phone 626-229-9191 Guidance Software 2000 – Oct 2010 Instructor III, Computer Forensics 215 North Morengo Ave Pasadena, CA 91101 POC Charles Cobb, Sr Director of Training Phone 626-229-9191
  • 2. United States Army Jul 1988 – Aug 2008 CID Warrant Officer Special Agent Apr 1997 – Aug 2008 CID Enlisted Special Agent, Apr 1993 – Apr 1997 Computer Crime Coordinator Jan 2000 – Aug 2008 Network Administrator/System Administrator Feb 1992 – Aug 2008 Physical Security Officer Oct 1998 – Aug 2008 EDUCATION High School: Mansfield High School, Mansfield TX 1988 College: Central Texas College 1992 - 1993 City College of Chicago 1992 Cochise College 1995 Houston Community College 2010 - present All formal education was attained while serving full time active duty in the military and in lieu of continuing education in Criminal Justice; I focused on my formalized training in the computer forensics field beginning in 1999. I currently have 135 credits toward my Bachelors Degree, with a major in Criminal Justice. Law Enforcement Related: Apprentice CID Special Agent Course, January, 1994 Child Abuse Prevention and Investigative Techniques, October, 1994 Investigation of Fire Cause and Origin, July, 1994 Practical Homicide Investigations, November 1994 Protective Services Training, January, 1995 Investigation of Sexual Assault, March, 1995 Advanced Fraud Investigative Techniques Phase I, April,1995 Advanced Fraud Investigative Techniques Phase II, May, 1995 Hostage Negotiation, March,1996 Counterdrug Investigations, November, 1997 Combating Terrorism, October, 1998 US Customs, Customs Border Clearance Agent Course, January, 2003 Evidence Management and Certification Course, May, 2005 Computer Related: US Army: Mainframe Computer Repair, March,1989 Wide Area Network/System Administrator (Unix), February, 1992 System Administrator Security (Windows), July, 2000 Network Manager Security (Windows), August, 2000 Department of Defense Computer Investigative Training (DC3): Computer Crimes Workshop, August, 1998 Introduction to Networks and Computer Hardware, April, 2000 Incident Response in a Networked Environment, October, 2001
  • 3. Forensic Intrusions in a Windows Environment, December, 2005 Department of Justice: Seized Computer Evidence Recovery Specialist, February, 2001 Cyber Counterterrorism Investigations Training Program, May 2004 Internet Crimes Against Children Investigative Techniques, March, 2005 Guidance Software: Introduction to Computer Forensics, July 2002 Intermediate Computer Forensics, December, 1999 Advanced Computer Forensics Incident Response, Forensic Analysis and Discovery, April, 2004 Advanced Internet and Email Examination, October, 2005 Network Intrusions Investigations Course Phase I, September, 2006 Network Intrusions Investigations Course Phase II, August, 2008 Field Intelligence Model, Live Forensic Investigations, September 2008 EnCase Enterprise Examinations, August 2008 Cyber Security Investigations, December 2010 New Technology File System, 2008 EnCase Portable Investigations and Training, June 2010 EnCase Macintosh and Linux Examinations EnCase CyberSecurity Investigations Mar 2015 EC-Council: Certified Ethical Hacker, October 2010 Certified EcCouncil Instructor December 2010 PROFESSIONAL QUALIFICATIONS Certifications and Accreditations: Top Secret Clearance with SCI EnCase Certified Examiner (EnCE), Guidance Software Certified Forensic Security Responder (CFSR), Guidance Software Certified Information Systems Security Professional, CISSP, ISC2 Certified Ethical Hacker, EC-Council Seized Computer Evidence Recovery Specialist, DOJ, FLETC Certified Computer Crime Investigator, DOD Cyber Crime Center (DC3) Airborne Parachutist PADI Certified Scuba Diver AWARDS Bronze Star (x2) Defense Meritorious Service Medal Meritorious Service Medal (X3) Army Commendation Medal (X3)
  • 4. Army Achievement Medal (X5) Armed Forces Expeditionary Medal Iraq Campaign Medal Global War on Terrorism Expeditionary Medal Global War on Terrorism Service Medal Kuwait Liberation Medal Southwest Asia Service Medal (3 campaign stars) Joint Meritorious Unit Award NCO Professional Development Ribbon (X2) National Defense Service Medal (X2) Good Conduct Medal Overseas Service Ribbon (x5) Army Service Ribbon While in the US Army as a CID Special Agent and the Senior Computer Forensic Examiner for the US Army it was my responsibility to investigate felony crimes involving the use of a computer, which ranged from identity theft, bribery, graft, economic crime, fraud, and network intrusion of the Army and DOD network infrastructure. As the Sr. Director of Professional Development and Training at Guidance Software it is my responsibility to maintain the day-to-day operation of the 23 person team responsible for an annual 8.8 million dollar business. During my tenure as the Director of Curriculum development it was my responsibility to lead a team of highly qualified forensic examiners and instructors to develop curriculum to be used in class. I personally designed and implemented the virtual classroom (VClass) for Guidance Software, providing another delivery method for our customers and making our training more consumable in a more economically responsible way. As the Sr. Director, I oversaw the development of the Guidance Software’s new certification CFSR. During the 20 years and 18 days I served in the Army, I was Special Agent with the US Army Criminal Investigation Command. I was qualified as an expert in computer forensics and testified as such on many occasions in both Federal and Military court. The Army was a very special place for me because I joined at 17 and retired at 37. The military developed me into the person I am today. Growing up in the military I learned what competence, candor, commitment, integrity, and loyalty really means. I believe in doing what is right even when no one is looking. I believe in extreme leadership. As a leader, my attitude will almost always determine whether my team succeeds or fails. I also believe that leaders who are more focused on the mission and less on personal gain always accomplish it with a more effective and efficient outcome. I believe leadership requires belief in the mission and unyielding perseverance to achieve victory, particularly when doubters question whether it is even possible. My style of leadership is dynamic in that I can change the style based on the individual needing the leadership at that time and place. I believe in getting my hands dirty as well and not just telling people what to do but leading them from the front on how to do it and set the standards of excellence so they know the expectations and know what it takes to achieve them.
  • 5. For the last 9 years it has been my privilege to utilize 15 members of the training staff to setup the EnFuse conference, (previously CEIC) networking environment and coordinate all speaker materials, as well as instruct at the conference. I believe my most valuable traits are integrity, loyalty, ethical, and grounded in morality.
  • 6. For the last 9 years it has been my privilege to utilize 15 members of the training staff to setup the EnFuse conference, (previously CEIC) networking environment and coordinate all speaker materials, as well as instruct at the conference. I believe my most valuable traits are integrity, loyalty, ethical, and grounded in morality.