1. CURRICULUM VITAE
PERSONAL INFORMATION
Date of Birth: 26 Jun 1970
Place of Birth: Odessa, TX
Marital Status: Married 28 years
Spouse's Name: Karla
Children: Kay’Lee (20)
Alexa (18)
Address: 28211 Sweet Oak Lane, Katy TX 77494
Phone: Cell - 254-289-8225
EMPLOYMENT HISTORY
Guidance Software Jun 2015 – Present
Senior Director of Training
1155 East Colorado Blvd
Pasadena, CA 91101
Guidance Software Mar 2013 – Jun 2015
Director of Distance Learning, Professional Development, and Training
1155 East Colorado Blvd
Pasadena, CA 91101
POC Charles Cobb, Sr Director of Training Phone 626-229-9191
Guidance Software Oct 2010 – Mar 2013
Training Manager, Professional Development and Training
215 North Morengo Ave
Pasadena, CA 91101
POC Charles Cobb, Sr Director of Training Phone 626-229-9191
Guidance Software 2000 – Oct 2010
Instructor III, Computer Forensics
215 North Morengo Ave
Pasadena, CA 91101
POC Charles Cobb, Sr Director of Training Phone 626-229-9191
2. United States Army Jul 1988 – Aug 2008
CID Warrant Officer Special Agent Apr 1997 – Aug 2008
CID Enlisted Special Agent, Apr 1993 – Apr 1997
Computer Crime Coordinator Jan 2000 – Aug 2008
Network Administrator/System Administrator Feb 1992 – Aug 2008
Physical Security Officer Oct 1998 – Aug 2008
EDUCATION
High School: Mansfield High School, Mansfield TX 1988
College: Central Texas College 1992 - 1993
City College of Chicago 1992
Cochise College 1995
Houston Community College 2010 - present
All formal education was attained while serving full time active duty in the military and in
lieu of continuing education in Criminal Justice; I focused on my formalized training in
the computer forensics field beginning in 1999. I currently have 135 credits toward my
Bachelors Degree, with a major in Criminal Justice.
Law Enforcement Related:
Apprentice CID Special Agent Course, January, 1994
Child Abuse Prevention and Investigative Techniques, October, 1994
Investigation of Fire Cause and Origin, July, 1994
Practical Homicide Investigations, November 1994
Protective Services Training, January, 1995
Investigation of Sexual Assault, March, 1995
Advanced Fraud Investigative Techniques Phase I, April,1995
Advanced Fraud Investigative Techniques Phase II, May, 1995
Hostage Negotiation, March,1996
Counterdrug Investigations, November, 1997
Combating Terrorism, October, 1998
US Customs, Customs Border Clearance Agent Course, January, 2003
Evidence Management and Certification Course, May, 2005
Computer Related:
US Army:
Mainframe Computer Repair, March,1989
Wide Area Network/System Administrator (Unix), February, 1992
System Administrator Security (Windows), July, 2000
Network Manager Security (Windows), August, 2000
Department of Defense Computer Investigative Training (DC3):
Computer Crimes Workshop, August, 1998
Introduction to Networks and Computer Hardware, April, 2000
Incident Response in a Networked Environment, October, 2001
3. Forensic Intrusions in a Windows Environment, December, 2005
Department of Justice:
Seized Computer Evidence Recovery Specialist, February, 2001
Cyber Counterterrorism Investigations Training Program, May 2004
Internet Crimes Against Children Investigative Techniques, March, 2005
Guidance Software:
Introduction to Computer Forensics, July 2002
Intermediate Computer Forensics, December, 1999
Advanced Computer Forensics
Incident Response, Forensic Analysis and Discovery, April, 2004
Advanced Internet and Email Examination, October, 2005
Network Intrusions Investigations Course Phase I, September, 2006
Network Intrusions Investigations Course Phase II, August, 2008
Field Intelligence Model, Live Forensic Investigations, September 2008
EnCase Enterprise Examinations, August 2008
Cyber Security Investigations, December 2010
New Technology File System, 2008
EnCase Portable Investigations and Training, June 2010
EnCase Macintosh and Linux Examinations
EnCase CyberSecurity Investigations Mar 2015
EC-Council:
Certified Ethical Hacker, October 2010
Certified EcCouncil Instructor December 2010
PROFESSIONAL QUALIFICATIONS
Certifications and Accreditations:
Top Secret Clearance with SCI
EnCase Certified Examiner (EnCE), Guidance Software
Certified Forensic Security Responder (CFSR), Guidance Software
Certified Information Systems Security Professional, CISSP, ISC2
Certified Ethical Hacker, EC-Council
Seized Computer Evidence Recovery Specialist, DOJ, FLETC
Certified Computer Crime Investigator, DOD Cyber Crime Center (DC3)
Airborne Parachutist
PADI Certified Scuba Diver
AWARDS
Bronze Star (x2)
Defense Meritorious Service Medal
Meritorious Service Medal (X3)
Army Commendation Medal (X3)
4. Army Achievement Medal (X5)
Armed Forces Expeditionary Medal
Iraq Campaign Medal
Global War on Terrorism Expeditionary Medal
Global War on Terrorism Service Medal
Kuwait Liberation Medal
Southwest Asia Service Medal (3 campaign stars)
Joint Meritorious Unit Award
NCO Professional Development Ribbon (X2)
National Defense Service Medal (X2)
Good Conduct Medal
Overseas Service Ribbon (x5)
Army Service Ribbon
While in the US Army as a CID Special Agent and the Senior Computer Forensic Examiner for
the US Army it was my responsibility to investigate felony crimes involving the use of a
computer, which ranged from identity theft, bribery, graft, economic crime, fraud, and network
intrusion of the Army and DOD network infrastructure.
As the Sr. Director of Professional Development and Training at Guidance Software it is my
responsibility to maintain the day-to-day operation of the 23 person team responsible for an
annual 8.8 million dollar business. During my tenure as the Director of Curriculum development
it was my responsibility to lead a team of highly qualified forensic examiners and instructors to
develop curriculum to be used in class. I personally designed and implemented the virtual
classroom (VClass) for Guidance Software, providing another delivery method for our
customers and making our training more consumable in a more economically responsible way.
As the Sr. Director, I oversaw the development of the Guidance Software’s new certification
CFSR.
During the 20 years and 18 days I served in the Army, I was Special Agent with the US Army
Criminal Investigation Command. I was qualified as an expert in computer forensics and
testified as such on many occasions in both Federal and Military court. The Army was a very
special place for me because I joined at 17 and retired at 37. The military developed me into
the person I am today. Growing up in the military I learned what competence, candor,
commitment, integrity, and loyalty really means. I believe in doing what is right even when no
one is looking. I believe in extreme leadership. As a leader, my attitude will almost always
determine whether my team succeeds or fails. I also believe that leaders who are more focused
on the mission and less on personal gain always accomplish it with a more effective and
efficient outcome. I believe leadership requires belief in the mission and unyielding
perseverance to achieve victory, particularly when doubters question whether it is even
possible. My style of leadership is dynamic in that I can change the style based on the
individual needing the leadership at that time and place.
I believe in getting my hands dirty as well and not just telling people what to do but leading them
from the front on how to do it and set the standards of excellence so they know the expectations
and know what it takes to achieve them.
5. For the last 9 years it has been my privilege to utilize 15 members of the training staff to setup
the EnFuse conference, (previously CEIC) networking environment and coordinate all speaker
materials, as well as instruct at the conference.
I believe my most valuable traits are integrity, loyalty, ethical, and grounded in morality.
6. For the last 9 years it has been my privilege to utilize 15 members of the training staff to setup
the EnFuse conference, (previously CEIC) networking environment and coordinate all speaker
materials, as well as instruct at the conference.
I believe my most valuable traits are integrity, loyalty, ethical, and grounded in morality.