SlideShare a Scribd company logo
1 of 22
Download to read offline
Kevin L. Lucier
8025 Interlaken Dr.
Colorado Springs, CO 80920 US
Mobile: 719-330-7941
Day Phone: 303-969-7120
DSN: 883-3612
Email: Kevin_Lucier@IOS.DOI.gov
Kevin.Lucier@US.Army.mil
Country of Citizenship:United States
Veterans' Preference: 10-point preference based on a compensable service connected disability of 30% or more (CPS)
Registered for
Selective Service:
I am a male born on or after January 1, 1960 & I have registered for the Selective Service.
Highest Grade: 15
ICTAP Eligible: No
Availability: Job Type: Permanent, Presidential Management Fellows
Work Schedule: Full-Time
Desired locations:
Profile:
United States - CO - Air Force Academy
United States - CO - Fort Carson
United States - CO - Peterson AFB
United States - CO - Schriever AFB
United States - CO - Colorado Springs
United States - CO - Denver
United States - CO – Lakewood
United States - MT
Germany
- Self-motivated
- Very dedicated, organized, systematic & prioritized
- Outgoing analytical leader
- Able to integrate & excel in changing environments
- Extremely meticulous to detail
- Maintain great pride in completing assignments proficiently
- Active Top Secret Security Clearance (previous TS SCI)
- Senior Executive Service Qualifications;
Leading Change, Leading People, Results Driven, Business Acumen, Building Coalitions
- Qualifications spanning 24 years with emphasis on hosting services, security, administration, project management
and leadership
 
Work Experience: Department of the Interior, Office of the Chief Information Officer – OCIO
(transition from Interior Business Center position, listed below)
Service Delivery Division (SDD), Hosting Services Branch
7301 W. Mansfield Ave. Mail Stop D2130
Denver, CO 80235 United States
10/2013 - Present
Salary:
$119,922.00 USD Per Year
Hours per week: 60
Series: 2210 Pay Plan: GS
Grade: 14
Chief, Systems Administration (Supervisory IT Specialist - OS/SYSADMIN)
(This is a federal job)
Supervisor: Mr. Spencer Bessette (303-969-7205) -- previously Mr. Dennis Donovan (303-969-5033)
Okay to contact this Supervisor: Yes
- Position has increased in size, scope and intensity since transition from Interior Business Center, IT Directorate,
System Software Administration Branch position, listed after the recent temp promotion below. Organizational
transition and new organizational alignment, with same position description, expectations, and responsibilities.
- Effectively use a combination of leadership styles, prefer the Participative - "Lead by Example"
- Embodies "BE-KNOW-DO" Army leadership
- Experienced in advising senior executives on effective utilization of IT systems / solutions to meet business objectives
.
- Provide high-level technical expertise & supervision / leadership / motivation of a cross-functional staff
- Work with peers, to include the newly assigned dedicated Information System Security Officer (ISSO) for the OCIO to
ensure all security devices and architecture are in compliance with security regulations and risk management
framework. In coordination with the OCIO Information Security Compliance Team, review and lead the remediation of
Kevin L. Lucier Page 2 of 22 
vulnerability findings and audit recommendations before and after they become POA&M items.) (Cyber Security as
related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large,
geographically dispersed hosting/data center environment.)
- Serve as ISSO for the Denver Data Center General Support System - DDC GSS, with oversight of my staff
providing ISSO and SSO duties for their relevant portions of the environment until January, 2016 when we were
assigned dedicated ISSO staffing from IAD. Aviation Management Local Area Network - AM-LAN GSS, Interagency
Aviation System Local Area Network IAS-LAN GSS, and collaboration with peers and their direct report staff in
their roles over the Reston LAN and DC LAN GSS and the related FISMA children and major systems we host,
that inherit controls from the general support systems. (Experience in applying the Risk Management framework and
ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major
Applications, or systems with a focus on Continuous Monitoring according to NIST, OMB, and DHS guidance and framework)
- Supervise (direct & indirect) a geographically dispersed staff of 54 IT professionals; fourteen federal employees –
eight GS-2210-14s, four GS-2210-13s, two GS-2210-12 & oversee an additional 40 staff (equivalent to GS-2210-11-14)
from 3 labor contracts – the largest branch within hosting. (Manage multiple layers of staff including managers and their
subordinates and contractors.)
- I meet my goals, accomplish what is truly most important & empower staff to do the same.
- Manage the System Software Administration Branch (SSAB) to execute the full range of SSAB disciplines to include;
System Administration (Operating System Functions & Administration, Performance Monitoring & Tuning, Patch
Management, Security Compliance, Operating System Testing & Directory Services to include Active Directory, RAC-
F, and Enterprise Access Control Services)
- Security Compliance as one of the 5 defined Roles and Responsibilities of my position – demonstrate
compliance with applicable standards, and work to improve processes, and expand the breadth of the
environment covered by proactive and detective monitoring actions. Traditional Patch Management, and
audit of security controls have been improved through proactive monitoring for devices, system state, and
vulnerabilities to provide ever increasing levels of awareness of the risks within our hosted environments.
(Serve as a technical expert and consultant to agency personnel on Information Security Continuous
Monitoring as defined by NIST standards and guidance.)
We work collaboratively with IT Security to transition from C&A (Certification & Accreditation methodologies to
Continuous Monitoring, to replace point-in-time audits and compliance checks with a continuous monitoring
program to help prioritize controls and provide visibility into current threats. “Information security continuous
monitoring is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to
support organizational risk management decisions. The objective is to conduct ongoing monitoring of the
security of an organization’s networks, information, and systems, and respond by accepting, avoiding/rejecting,
transferring/sharing, or mitigating risk as situations change.” (NIST Special Publication 800-137 Draft
December 2010) Serve as technical expert / subject matter expert - SME (and manage a large team of SMEs
for their respective areas) on the four hosting related Operating Systems and the System Administration
actions to design, plan, implement and manage IT systems as a major component of an appropriate
operational security posture.
- Three of the four remaining Roles and Responsibilities of my position directly relate to Information
Security as well, with System Administration (Operating System Functions & Administration, Patch
Management, Security Compliance, Operating System Testing & Directory Services all requiring direct
and indirect expert level architecture design, operations & management that ensure compliance with
security regulations, guidance, policy and controls and active participation in maintaining and
improving the security posture of the hosted information systems. Examples include Access Management,
Patch Management, Change Management, Vulnerability Management and Information Systems architecture
and designs to ensure that the appropriate operational security posture is maintained for the information
system(s) and/or major application(s).
- Although we apply separation of duties / roles & responsibilities, and utilize these methods to ensure compliance, my
staff and I demonstrate the mindset that we are all security professionals, and apply the same requirements,
knowledge, skills and abilities toward our respective organizational roles and responsibilities. The training and
certification requirements of my CP-34 Individual Development Plan, and the additional duties assignment as an ISSO,
and an IAT and IAM prepared me to cross-train our new ISSO, from January through October, 2016 and to
transition roles and assist in responding to requests and projects assigned to ISSO, Dale Bogle.
(The primary purpose of this position is to research, evaluate, develop, and maintain the Information Assurance
Cybersecurity program.) (Provide expert technical, analytical, and managerial guidance for the planning, review,
evaluation, implementation, coordination, and integration of DOI's information technology and identifies plans to
maintain an effective information security program.) (Serve as a technical expert on the design and implementation
of security controls on both internal and cloud computing based environments as specified by the National Institute
of Standards and Technology (NIST) guidance.) (Serve as a technical expert and consultant to agency personnel
on Information Security Continuous Monitoring as defined by NIST standards and guidance.) (Ensure that the
appropriate operational security posture is maintained for the information system(s) and/or major application(s)
assigned to that position.) (Interpret government-wide information security guidance as a means to establish
standards, policies, guidelines, and procedures to ensure confidentiality, integrity, and availability of the
information system.)
- Provide technical, program and project management and functional expertise, complimenting the System
Administration staff technical IT expertise & fostering collaboration on solutions.
- Manage schedules, workloads, priorities, deadlines, and deliverables to achieve positive results.
Kevin L. Lucier Page 3 of 22 
- Provide essential 24x7 management with four Team Leads overseeing systems infrastructure across Windows Server,
Unix (Solaris & Linux) Server & Mainframe (z/OS) architectures, to include distributed systems, (x86 & SPARC),
virtualized x86 (VMware & HyperV) & System Z Enterprise Server / Mainframe (z/196) platforms
 developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against
unauthorized access to systems, networks, and data;
 conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and
protection needs;
 promoting awareness of security issues among management and ensuring sound security principles are reflected in
organizations’ visions and goals;
 conducting systems security evaluations, audits, and reviews;
 developing systems security contingency plans and disaster recovery procedures;
 developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere
to systems security policies and procedures;
 participating in network and systems design to ensure implementation of appropriate systems security policies;
 facilitating the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes;
 assessing security events to determine impact and implementing corrective actions; and/or
 ensuring the rigorous application of information security/ information assurance policies, principles, and practices in the delivery
of all IT services.
- Nominated by the Information Technology Directorate as the 2013 Interior Business Center Supervisor of the Year
(3rd nomination as IBC/NBC Supervisor of the Year since 2009), with some highlights provided below from nomination
by ITD staff and senior leadership:
- “Kevin has displayed all the attributes of an exceptional supervisor while leading this large, dispersed organization
which has contributed so significantly to the accomplishment of the NBC’s Strategic Goals.”
- “Made outstanding contributions to the continued improvement and success of the hosting business and overall IT
service mission.”
- “Kevin has worked to develop his branch into a high performing team. He emphasizes teamwork among the
functional silos of Mainframe, Windows and Unix administration.”
-“Continually makes program decisions and recommendations that are aligned with Departmental needs. Where
applicable, effectively reaches out throughout the Department to solicit needs, ideas and perspectives in order to
deliver cost effective, quality services. He clearly demonstrates a strong understanding of the Department’s needs
and culture, issues to be addressed, and goals and outcome expectations.”
- “Kevin proactively identifies opportunities to decrease costs and improve financial and performance transparency.
He holds self and others accountable for goal accomplishment in the four focus areas of Customer Service and
Service Delivery, Costs and Transparency, Internal Communication, and Employee Empowerment. Ensures that
projects within areas of specific responsibilities are completed in a timely, efficient and effective manner that meets or
exceeds objectives.”
- “Demonstrated an outstanding appreciation for the NBC's financial management goals. He continually makes
recommendations for improvements, and cost savings.”
- “Kevin provided extensive technical, project management, leadership and customer service improvements for the
OCIO Operational Improvement Project, the Data Center Consolidation – ESC to USGS Move, and the z/196
Mainframe Project, each of which were completed successfully according to detailed, aggressive project schedules,
with appreciation expressed from customers across multiple agencies.
- Ability to focus efforts and concentrate on details, even in the face of significant stresses and challenges has been
proven on an almost constant basis. Kevin’s high quality work, attention to detail, and quick delivery turnaround
times have contributed significantly to the IBC’s business relationships on a long term basis.”
- “Kevin’s technical expertise and his ability to train, mentor and oversee SSAB has been and will continue to add
significant value to the IBC workforce. His leadership has been exemplary as evidenced by the sustained high
performance and high morale of the SSAB. The total impact of his leadership, management and voluntary
contributions to the welfare of the employees of his branch and the IBC are without peer.”
- Worked collaboratively with peers to define new Hosting Services Offerings & provided significant input and
refinement to the Cost Model definitions, Requirement Definitions, and Service Agreements in support of solutions, to
include FMD’s Oracle Federal Financials (OFF) Virtualization, Governance Risk & Compliance (GRC), OFF for
Department of Homeland Security (DHS), Business Intelligence (BI), Sunflower and Shared Services Internal Disaster
Recovery (DR).
- Assigned as one of six Core Team members of the new Segmented Security Architecture Team on August
11th, 2015. Team has developed a high level architecture strategy to segment DOI Core services from DOI
Shared Service Hosting, and to provide for additional segmentation where required, whereby customers will
not share services with others. (Experience with the application of security principles to common structures, processes,
and techniques of IT system development, operations and maintenance) (participating in network and systems design to
ensure implementation of appropriate systems security policies)
- Chair the Change Management, weekly Change Advisory Board (CAB) when available, attend and give input to the
Pre-CAB and CAB, and emergency change requests. Review and approve Firewall Change Requests (FCR) bi-weekly
as a Hosting Services representative to a small FCR review team. (IT service frameworks (e.g. ITIL))
- Provided the underlying solution to ensure significant efficiency for OFF application and Oracle Database software
licensing, and the key justification for the cloud waiver to accommodate internal hosting solutions. Namely, the
utilization of Oracle Sparc server hardware to benefit from Oracle software license model benefits – a combination of
operating system, software and hardware not offered by cloud service providers on the OCIO Cloud Hosting IDIQ
contract, but a proven, efficient model offered by OCIO Internal Hosting. (Experience with the application of security
principles to common structures, processes, and techniques of IT system development, operations and maintenance)
- Further optimized the hosting operations through increased server virtualization, with the percentage of the 1768
hosted server environment raising from 23% to 64% virtualized since 2009 (my arrival at DOI), despite largely unfunded
Kevin L. Lucier Page 4 of 22 
lifecycle management plans. (Experience in applying the Risk Management framework and ability to ensure appropriate
operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on
Continuous Monitoring according to NIST, OMB, and DHS guidance and framework. ) (Mastery understanding of service
provider managed or cloud computing technologies and the application of security controls within them.)
- Coordinates systems operations, management & engineering activities (OCIO Service Delivery, Hosting Services --
Multi-tenancy, Shared Services Provider) infrastructure including approximately 1800 servers, 1700 desktop computers,
400 network printers, 400 databases & 900 TB of combined Tier I and Tier II enterprise storage) at two enterprise data
centers (Denver Data Center - DDC - Denver, CO & Reston Data Center - RDC - Reston, VA) & 10 smaller data
centers supporting customers within the DOI (to include 3 primary locations & 18 remote / satellite offices) as well as
150 external federal agencies throughout the country. (Conduct analysis and interpretation of IT security policies and
directives; and develop strategies, policies and procedures to ensure compliance and extensive knowledge of Department of
the Interior, vendor managed external systems, or similar systems)
- Ensure the customer's requirements are filled & kept Hosting Chief & OCIO senior leadership aware of all decisions
made & status of operations, to include any risks of impact to services.
- Combined Federal Campaign Board Member for the Denver metropolitan area since 2009
- Serve as Task Area Lead for the Systems Operation & Administration (SOA) staffing Contract, one of the Big 5
Contracts within IBC, and OCIO. Utilize delegated Team Lead model to collaboratively oversee the largest task area of
the SOA staffing – averaging 39 IT professionals since contract award.
- My staff performs highly technical tasks, manage critical projects & participate in every IT mission within OCIO, & the
OCIO’s Service Delivery Division’s consistently growing hosting mission in support of DOI and external federal
agencies. All while demonstrating some of the most effective customer support & teamwork within the organization.
- Serves as Acting Division Chief, Hosting Services, on a consistent basis, managing a staff of ~173 FTE's, to
accomplish the OCIO, Service Delivery, Hosting Services mission. Communicate technical & managerial guidance to
Branch Chiefs, Section Chiefs, Team Leads, employees & contract personnel.
- Manage ~55% (~$20M of the ~$36M) of the annual budget within Hosting Services. Provide efficient, cost-saving
focused fiscal oversight in support of personal philosophy to empower and expect every staff member to deliver the
most cost-effective, and appropriate shared services solution every time – as the civic duty to every tax payer.
Mastery of service provider managed or cloud computing technologies and the application of security controls
within them.
Department of the Interior, Office of the Chief Information Officer – OCIO
(detailed to a Special Project / Temp Promotion)
Service Delivery Division
7301 W. Mansfield Ave. Mail Stop D2130
Denver, CO 80235 United States
6/2015 – 10/2015
Salary:
$136,970.00+ USD Per Year
Hours per week: 60
Series: 0340 Pay Plan: GS
Grade: 15
Cyber Lead, Service Delivery, Office of the CIO (Supervisory Program Manager GS-0340-15)
(This is a federal job)
Supervisor: Bruce Downs, Deputy CIO (571-723-6073)
Okay to contact this Supervisor: Yes
- Effectively use a combination of leadership styles, in this case, utilized directive authority across organizational lines
- Experienced in advising senior executives – leveraged for efficient staffing, budgetary planning, and
recommendations for critical decisions at the departmental level in support of national security initiatives.
- Provide high-level technical expertise, program management and leadership / motivation of a cross-functional staff
- I meet my goals, accomplish what is truly most important & empower staff to do the same.
- Active Top Secret Security Clearance
- Much of the narrative provided was taken from nomination and award citation for the OCIO Cybersecurity
Award dated August 31, 2015:
- In response to an advanced persistent threat (APT) detected at a DOI data center, on April 17, 2015:
- As a key member of the initial incident response team (IRT), rallied swiftly and effectively to contain the threat
in collaboration with colleagues from the Department of Homeland Security (DHS), the Federal Bureau of
Investigations (FBI) and other interagency partners. We took immediate action to deploy the needed tools to
detect and respond to the adversary's activities.
- I transitioned roles, especially operational priorities, & focused even more granularly upon Incident Mitigation
- I was detailed to a Special Project / Temp Promotion to Supervisory Program Manager GS-0340-15/04 as the Cyber
Lead for Service Delivery from 06/14/2015 through 10/11/2015.
 promoting awareness of security issues among management and ensuring sound security principles are reflected in
organizations’ visions and goals;
 developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere
to systems security policies and procedures;
 participating in network and systems design to ensure implementation of appropriate systems security policies;
 facilitating the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes;
 assessing security events to determine impact and implementing corrective actions; and/or
 ensuring the rigorous application of information security/ information assurance policies, principles, and practices in the delivery
of all IT services.
 conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and
protection needs;
Kevin L. Lucier Page 5 of 22 
- Provided direct technical Systems Administration, project management, and cyber reporting as well as daily
implementation, incident response, and security control guidance to staff across OCIO Operations.
(Manage and host security devices in conjunction with Information Assurance. Work with peers, to include the newly
assigned dedicated Information System Security Officer (ISSO) for the OCIO to ensure all security devices and architecture
are in compliance with security regulations and risk management framework. In coordination with the OCIO Information
Security Compliance Team, review and lead the remediation of vulnerability findings and audit recommendations before and
after they become POA&M items.) (Cyber Security as related to hosting based on Federal laws, policies and procedures; and
handling cyber security incidents within a large, geographically dispersed hosting/data center environment.)
- I coordinated immediate remediation efforts on behalf of Hosting, in coordination with Hosting Services Managers, and
Team Leads, with direct assignments to staff where necessary. Once detailed, I tasked on behalf of Chief, Service
Delivery and expanded coordination of remediation efforts across Service Delivery.
- Coordinated, and ran a daily (became 2/week) SD Ops Meeting on Security Mitigation to collaboratively work
mitigation project plan assignments, and keep senior leadership informed over the past year.
- Coordinated and oversaw tactical actions taken, as well as the strategic and architectural decisions, and high level
projects/assignments and reporting that fell within this new Cyber Lead Role.
We developed a comprehensive lessons learned and used this to build and implement a remediation plan for the
immediate areas of compromise. Ultimately, we expanded remediation planning to all bureaus and offices and worked
with colleagues in Policy Management and Budget, the DOI Budget Office (POB), the Interior Business Center (IBC)
Acquisition Directorate (AQD) and the Office of the Solicitor (SOL) to prepare and prioritize urgent acquisitions and
respond to questions and inquiries from DOI leadership and oversight authorities about resource needs.
Many of the tactical actions taken are provided as bullets below, as well as the strategic and architectural actions, and
high level projects/assignments that fell within this new Cyber Lead role.
 I coordinated immediate remediation efforts on behalf of Hosting, in coordination with HSD Managers, and Team
Leads, with direct assignments to staff where necessary.
 Coordinated Position Designation Statements in support of others in HSD Management for receipt of classified
cyber threat, incident and situational awareness briefings.
 Began and continually improved upon Lessons Learned as input to other core data centers and bureaus
 Budget procurement needs/recommendations/prioritization, justification
(insure maximum use of personnel, materials and funds)
In May, I recommended and gained consensus and approval of a method of covering Operational roles across Systems
Administration in order to focus efforts toward Incident Mitigation for Hosting Services. I then began to transition roles,
especially operational focus according to this plan, and focused even more granularly upon the Incident Mitigation
efforts for Hosting Services. Soon after I was detailed / temp promoted NTE120 days and began to report to June
Hartley as Chief, Service Delivery (with periods under Bruce Downs as Acting Chief, Service Delivery).
Detail to Special Project / Temp Promotion to Supervisory Program Manager GS-0340-15/04 as the Cyber Lead for
Service Delivery from 06/14/2015 to 10/11/2015.
 Tasking delegated to me for Service Delivery by Chief of SD, and Deputy CIO.
 Collaborated with Office of Info Assurance then I coordinated for Service Delivery
 Coordinated further remediation efforts on behalf of Service Delivery (vs Hosting Services specific)
 Coordinated, and ran a daily (became 2/week) SD Ops Meeting on Security Mitigation (promoting awareness of
security issues among management and ensuring sound security principles are reflected in organizations’ visions
and goals; )
 Helped to prepare draft responses and provide input to preparatory questions then participated in practice
sessions with DOI CIO, Sylvia Burns in preparation for her hearing sessions with House Oversight and
Government Reform Committee. The DOI Cyber Security Strategic Plan, the Incident Mitigation Plan, and IRT
and US Cert Action Notes all informed these preparations.
 Collaborated with FCCO / NETCOM Network Enterprise Center (NEC) and G-4 POCs at Army and MDA for
Classified procurement strategy
 Provided direct technical Systems Administration, as well as implementation, incident response, and security
control guidance to staff across OCIO Operations.
 Collaborated with FCCO / NETCOM Network Enterprise Center (NEC), Public Affairs Officer and G-4 POCs at
Army and MDA for Incident Comm Plan examples to provide IRT POCs at DOI.
Kevin L. Lucier Page 6 of 22 
 Coordinated and met DHS / Whitehouse Binding Operational Directive (BOD) 15-01 prior to suspense for
Service Delivery:
DOICIRC Urgent Advisory ID #: 20150526-02
DOICIRC Incident Reference#: 00000000019476
Date Issued: May 26, 2015
Binding Operational Directive (BOD) 15-01, Critical vulnerability Mitigation Requirement for Federal Civilian
Executive Branch Departments’ and Agencies’ Internet-Accessible Systems (Expanded by DOI to apply
controls to all systems)
(Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber
security incidents within a large, geographically dispersed hosting/data center environment.)
The Large-Scale PII Breach Incidents Report (AR-15-20001B) updated on May 22, 2015. This product,
developed by the Department of Homeland Security (DHS) National Cybersecurity and Communications
Integration Center (NCCIC), contains Indicators of Compromise (IOCs) resulting from a number of recent
large-scale PII breach incidents. You are requested to have these IOCs deployed to your intrusion
detection/prevention systems (IDS/IPS), vulnerability scanning solutions (e.g., McAfee Vulnerability Manager
(MVM) & Tenable), hardware/software configuration scanning systems (e.g., SCCM & IEM) and other sensors
to the fullest extent and initiating detection, scanning and analysis of every workstation, server and other
information technology assets by close of business (COB) …
~55 Snort rules deployed. Any traffic -> malicious IPs, DNS request for malicious host names.
 Worked tirelessly to draft, review and edit the DOI Cyber Security Strategic Plan (requested by the
Secretary on June 23), in collaboration with the Cyber Advisory Group (CAG) formed in late June by
DOI CIO.
It has five goals:
1. Protect the Department’s critical assets and information;
2. Identify cyber security risks and vulnerabilities;
3. Continuously provide situational awareness and detect incidents;
4. Improve the Department’s ability to respond to and recover from cyber events; and
5. Improve cyber security and privacy awareness and develop a skilled information assurance cyber
workforce.
and is built around the NIST framework of five core functions, the cyber advisory group added a sixth "Learn"
as our commitment to continuous learning and improvement.
Identify: What assets need protection?
Protect: What safeguards are available?
Detect: What techniques can identify incidents?
Respond: What techniques can contain impacts of incidents?
Recover: What techniques can restore capabilities?
Learn: What have we learned and what can we do better?
(promoting awareness of security issues among management and ensuring sound security principles are reflected
in organizations’ visions and goals; )
 As a member of the Cyber Sprint team, undertook the challenge of meeting the goals defined in the Office of
Management and Budget's (OMB) 30-day Cyber Sprint. I provided SD response, reviewed input and finalized
for OS, IBC, OHA, DDC (Mansfield) and RDC. The Cyber Sprint team undertook the challenge of meeting the
goals defined in the Office of Management and Budget's (OMB) 30-day cyber sprint. Within one week of the
announcement of the cyber sprint, this group effectively engaged the bureaus and offices to achieve 100%
personal identity verification (PIV) compliance of privileged IT users throughout the Department. They helped
drive 94.5% PIV enforcement for unprivileged users to date, while also reducing the number of privileged users
by over 1000 from the initial target. They aggressively promoted cyber hygiene, which included scanning and
remediation of all critical and high vulnerability within 30 days. In addition, they helped ensure the bureaus and
offices deployed indicators of compromise provided by DHS to all publicly facing IT systems and created the
first inventory of DOI's high value data assets. As a result of this extraordinary work, DOI was proud to among
the top five federal agencies (and third amongst large cabinet level agencies) that met or exceeded the cyber
sprint goals. OMB punished the results publicly in August 2015. This took countless hours of hard work
including many long evenings and weekends over several months. The group unified and focused on
protecting and securing the Department's IT systems and network to ensure the continuity of DOI's vital
mission work. (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling
cyber security incidents within a large, geographically dispersed hosting/data center environment.)
Kevin L. Lucier Page 7 of 22 
 2017 Cybersecurity Budget Addendum for Department of Interior (DOI) bureau and offices.
Collaborated on the requirements, solutions, and budgetary estimates to provide the Cybersecurity
Budget Addendum worksheets. Collaborated, and edited the Cybersecurity Budget Addendum Submission
document that will go forward to OMB to request the estimated $88.1 million that builds on: (1) baseline
cybersecurity investments in the Department’s IT portfolio ($68.5 million); (2) the Department’s 2016
continuing resolution (CR) cybersecurity anomaly request of $89.4 million; (3) and the 2017 Office of the
Secretary request of $62.1 million (which includes recurring costs from actions in the 2016 CR anomaly
request).
 Cyber Sprint 2.0 internal Department reporting – coordinated, and consolidated data, and provided
submissions for OS, IBC, OHA, DDC (Mansfield) and RDC on 9 weekly datacalls (continued to 24 at Present).
Collaborated with OIA on questions, intent, and phrasing to ensure data collected across the department was
actionable, and clearly understood. Met suspense every week, and ensured green reports for our respective
areas by prior coordination and assignment of tasks to meet actions in advance of reporting.
(promoting awareness of security issues among management and ensuring sound security principles are reflected
in organizations’ visions and goals; )
 Assigned as one of six Core Team members of the new Segmented Security Architecture Team on
August 11th, 2015. Team has developed a high level architecture strategy to segment DOI Core
services from DOI Shared Service Hosting, and to provide for additional segmentation where required,
whereby customers will not share services with others. (Experience with the application of security
principles to common structures, processes, and techniques of IT system development, operations and
maintenance) (participating in network and systems design to ensure implementation of appropriate systems
security policies)
 Briefed DOI CIO on numerous occasions, provided data for briefings, and coordinated resources for
meetings, datacalls, and deliverables.
(promoting awareness of security issues among management and ensuring sound security principles are reflected
in organizations’ visions and goals; )
 Reviewed the final US-CERT report on incident with recommended mitigation tasks, to ensure all are
covered in the DOI Mitigation Plan or addressed/accepted
 Recommended and gathered support for staffing assistance
 Complied with Litigation Hold RE: preservation of documentation
Department of the Interior, Interior Business Center – IBC
(formerly National Business Center – NBC)
Information Technology Directorate - ITD
Infrastructure Operations Services Division - IOSD
7301 W. Mansfield Ave. Mail Stop D2130
Denver, CO 80235 United States
04/2009 – 10/2013
Salary:
$117,606.00 USD Per Year
Hours per week: 60
Series: 2210 Pay Plan: GS
Grade: 14
Chief, Systems Software Administration Branch (Supervisory IT Specialist - OS/SYSADMIN)
(This is a federal job)
Supervisor: Mr. Spencer Bessette (303-969-7205) -- previously Mr. Dennis Donovan (303-969-5033)
Okay to contact this Supervisor: Yes
- Effectively use a combination of leadership styles, prefer the Participative - "Lead by Example"
- Embodies "BE-KNOW-DO" Army leadership
- Provide high-level technical expertise & supervision / leadership / motivation of a cross functional staff
- Supervise (direct & indirect) a geographically dispersed staff of 51 IT professionals, twelve federal employees - six
GS-2210-14s, four GS-2210-13s, two GS-2210-12 & oversee an additional 39 staff (equivalent to GS-2210-11-14) from
7 labor contracts
- Serve as ISSO for the Denver Data Center General Support System - DDC GSS, with oversight of my staff
providing ISSO and SSO duties for their relevant portions of the environment. Aviation Management Local Area
Network - AM-LAN GSS, Interagency Aviation System Local Area Network IAS-LAN GSS, and collaboration with
peers and their direct report staff in their roles over the Reston LAN and DC LAN GSS and the related FISMA
children and major systems we host, that inherit controls from the general support systems.
- Experienced in advising senior executives on effective utilization of IT systems / solutions to meet business objectives.
- I meet my goals, accomplish what is truly most important & empower staff to do the same.
- Manage the System Software Administration Branch (SSAB) to execute the full range of SSAB disciplines to include;
System Administration (Operating System Functions & Administration, Performance Monitoring & Tuning, Patch
Management, Security Compliance, Operating System Testing & Directory Services to include Active Directory, RAC-
F, and Enterprise Access Control Services)
- Security Compliance as one of the 5 defined Roles and Responsibilities of my position – demonstrate
compliance with applicable standards, and work to improve processes, and expand the breadth of the
environment covered by proactive and detective monitoring actions. Traditional Patch Management, and
audit of security controls have been improved through proactive monitoring for devices, system state, and
vulnerabilities to provide ever increasing levels of awareness of the risks within our hosted environments.
(Serve as a technical expert and consultant to agency personnel on Information Security Continuous
Monitoring as defined by NIST standards and guidance.)
Kevin L. Lucier Page 8 of 22 
We work collaboratively with IT Security to transition from C&A (Certification & Accreditation methodologies to
Continuous Monitoring, to replace point-in-time audits and compliance checks with a continuous monitoring
program to help prioritize controls and provide visibility into current threats. “Information security continuous
monitoring is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to
support organizational risk management decisions. The objective is to conduct ongoing monitoring of the
security of an organization’s networks, information, and systems, and respond by accepting, avoiding/rejecting,
transferring/sharing, or mitigating risk as situations change.” (NIST Special Publication 800-137 Draft
December 2010) Serve as technical expert / subject matter expert - SME (and manage a large team of SMEs
for their respective areas) on the four hosting related Operating Systems and the System Administration
actions to design, plan, implement and manage IT systems as a major component of an appropriate
operational security posture.
- Three of the four remaining Roles and Responsibilities of my position directly relate to Information
Security as well, with System Administration (Operating System Functions & Administration, Patch
Management, Security Compliance, Operating System Testing & Directory Services all requiring direct
and indirect expert level architecture design, operations & management that ensure compliance with
security regulations, guidance, policy and controls and active participation in maintaining and improving
the security posture of the hosted information systems. (participating in network and systems design to ensure
implementation of appropriate systems security policies) Other examples include Access Management, Patch
Management, Change Management, Vulnerability Management and Information Systems architecture and
designs to ensure that the appropriate operational security posture is maintained for the information system(s)
and/or major application(s).
- Although we apply separation of duties / roles & responsibilities, and utilize these methods to ensure compliance, my
staff and I demonstrate the mindset that we are all security professionals, and apply the same requirements,
knowledge, skills and abilities toward our respective organizational roles and responsibilities. The training and
certification requirements of my CP-34 Individual Development Plan, and the additional duties assignment as an ISSO,
and an IAT and IAM prepared me to cross-train our new ISSO, from January through October, 2016 and to
transition roles and assist in responding to requests and projects assigned to ISSO, Dale Bogle.
(Provide expert technical, analytical, and managerial guidance for the planning, review, evaluation, implementation,
coordination, and integration of DOI's information technology and identifies plans to maintain an effective
information security program.) (Serve as a technical expert on the design and implementation of security controls
on both internal and cloud computing based environments as specified by the National Institute of Standards and
Technology (NIST) guidance.) (Serve as a technical expert and consultant to agency personnel on Information
Security Continuous Monitoring as defined by NIST standards and guidance.) (Ensure that the appropriate
operational security posture is maintained for the information system(s) and/or major application(s) assigned to
that position.) (Interpret government-wide information security guidance as a means to establish standards,
policies, guidelines, and procedures to ensure confidentiality, integrity, and availability of the information system.)
- Manage schedules, workloads, priorities, deadlines, and deliverables to achieve positive results.
- Provide essential 24x7 management with three Team Leads overseeing SSAB systems infrastructure across Windows
Server, Unix (Solaris, Linux & z/Linux) Server & Mainframe (z/OS & z/VM) architectures, to include distributed systems,
(x86 & SPARC), virtualized x86 (VMware & HyperV) & System Z / Mainframe (z/196- z/9 - z/10 , z/VM) platforms
- Nominated by the Information Technology Directorate as the 2012 Interior Business Center Professional Employee of
the Year, with some highlights provided below from my nomination by ITD senior leadership:
- “Kevin has demonstrated an outstanding appreciation for the NBC's financial management goals. He continually
makes recommendations for improvements, and cost savings. One of the finest examples of modernizing Financial
and Business Management Practices is Kevin's very successful z/9 to z/196 Mini-Mainframe Migration Project. This
follow-on to the project entails replacing the existing NBC IBM 2094- 604 z/9 Mainframe with an IBM 2817-506 z/196
(Mini) Mainframe for the purpose of "right-sizing" the z/OS operating system environment to fit current and anticipated
client resource demands, while providing advanced IBM System/ z architectural services in reliability, availability, and
serviceability. He was instrumental to the success of the production upgrade of the hosting environment for z/OS
based mainframe applications hosted by NBC. Kevin's technical, project management, and leadership approach have
helped make this project a success. This mission-critical, multi-line of business environment was required to quickly
upgrade processor hardware, while "right-sizing" capacity in order to decrease costs and remain a viable hosting
solution providing the NBC's Federal Personnel and Payroll system (FPPS), the Federal Financial System (FFS)
applications as well as other applications hosted for other DOI bureaus. The planning and quick implementation of
the new IBM z/196 mainframe, culminated in an extremely successful production implementation without impacting
the services provided to clients.” (executing implementation and conversion support to clients migrating from legacy
systems; coordinating the resolution of system issues arising from factors such as changes in legislation and agency
policies; and experience with strategic planning to analyze financial processes and execute policy development)
- “Responsible for the management of approximately 1700 servers, Operating System and Directory Services, the
largest portion of the Hosting Operation.”
- “Detail assignment providing Operation Management expertise for the OCIO ‘Operational Improvement’ Plan”
- Developed staffing plan projections, and gave significant input into the ITD VERA/VSIP planning.
- Met the FY12 and FY13 goals for SSAB staffing plan, decreasing staffing from 11 to 9 federal staff with the VSIP
retirement of SSAB staff. As planned the staffing model has incorporated a heavier reliance upon contract staffing, but
has taken advantage of existing federal staff on the team to cover necessary federal functions and oversight/reporting.
- Worked collaboratively with peers to define a new ITD Hosting Service Offering and provided significant input and
refinement to the Cost Model definition, with requirement definition, refinement and ROM presentation to EPA, & SBA.
Kevin has demonstrated an outstanding appreciation for the NBC’s financial management goals. He manages ~55%
(~$20M of the ~$36M) of the annual budget within Hosting Services. He was an integral contributor to the Virtualization
Platform Business Case which provided the analysis and recommendations leading to the strategic decision to retire the
zVM (mainframe based virtualized platform for Linux) environment and focus on x86 virtualization as the NBC’s
preferred virtualization platform.
Kevin L. Lucier Page 9 of 22 
- Data Center Consolidation – ESC to USGS Move
April 8th, 2013 marked the successfully completion of the colossal, three month project for the DOI’s Interior Business
Center’s (IBC) data center relocation for its’ Enterprise Service Center (ESC) in Herndon, VA to the USGS Powell
Center in Reston, VA. Obtained funding, and through consolidation by virtualization and decommissioning physical
servers, we achieved a 53% reduction in data center space (2,500 square feet, down from 5,300) in Virginia, to provide
efficiencies in power, cooling and hosting space requirements estimated at over $100K / year. Overall, IBC seized
upon the opportunity to transform its’ IT consolidation success, and significantly raise our server virtualization ratio (from
15% to 89% within the ESC), while contributing to the Department’s objective to consolidate data centers and reduce its
real estate footprint. This consolidation made possible the avoidance of a million dollar facility lease renewal, while
avoiding approximately $283K in unfunded customer lifecycle requirements for server infrastructure. This monumental
accomplishment demonstrates IBC’s commitment to reducing costs while maintaining high quality customer service,
and through teamwork was accomplished according to a very detailed project plan, within budget and through
coordination with over 100 federal stakeholders and vendors – with no unplanned outages / impacts to customers.
- Further optimized the hosting operations through increased server virtualization, with the percentage of the 1652
hosted server environment raising from 23% to 51% virtualized since my arrival at NBC, despite largely unfunded
lifecycle management plans.
- Worked extensively on documenting, reviewing, and finalizing ITIL Process Flows originally began as a follow-on
action for A-123 Audit, these processes have since been emulated by the DOI, OCIO (IT service frameworks (e.g. ITIL))
(Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security
incidents within a large, geographically dispersed hosting/data center environment.)
- Nominated by the IT Directorate and selected for the NBC Technical Employee of the Quarter (Q3 FY12)
- Conceived and led a cross-agency project to incorporate best-practice procedures and re-use of documentation, and
templates for the NBC ITD Engineering Review Board from the Department of the Army, Fort Carson Network
Enterprise Center. (Experience with the application of security principles to common structures, processes, and techniques
of IT system development, operations and maintenance)
- The following citations were taken from my nomination by ITD staff as the 2010 NBC Supervisor of the Year:
"Kevin has displayed all the attributes of an exceptional supervisor while leading this large, dispersed organization
which has contributed so significantly to the accomplishment of the NBC's Strategic Goals." "Kevin is a talented,
effective & compassionate supervisor & leads the largest branch in ITD." "The total impact of his leadership,
management & efforts extended for the welfare of the employees of his branch & the ITD are on par with the best
supervisor's I have worked in my career extending over 30+ years in the military & federal civilian service." "Mr.
Lucier continually displays an outstanding commitment to customer service." "Kevin's technical expertise & his ability
to train, mentor & oversee SSAB has been & will continue to add significant value to the NBC workforce." "Mr. Lucier
continually makes program decisions & recommendations that are aligned with Departmental needs." "His blending &
balancing of effective technical oversight with consistent attention to the administrative, morale & other needs of his
staff is exemplary." "Kevin made outstanding contributions to the continued improvement & success of the hosting
business & overall IT service mission."
- Change Agent - requested as detail assignment (temp promotion to 15) to the OCIO reporting to June Hartley under
Service Delivery as the new "Operations Manager" position. Rather than 100% detail, a part-time "Consultant" type role,
with about 10% of my time toward the OCIO "Operational Improvement" Plan was supported as better overall for the
organization. I provided my recommendations & then made these into a Continuous Service Improvement Plan & have
led efforts to complete action items. (IT service frameworks (e.g. ITIL))
- Requested as Subject Matter Expert (SME) for the Department's development of position descriptions for
management positions in support of service areas. My assignment was as primary SME (of 3 SMEs DOI-wide) for the
"Hosting" focus area. Developed draft PD & gave input to all relevant requests until assessment tool development was
requested, whereby I requested dismissal as SME to prevent Conflict of Interest with future application toward these
promotion potential positions. Verified concern of conflict of interest with NBC HR & NBC ADIR & completed all
assignments prior to requesting dismissal from team.
- Coordinates systems operations, management & engineering activities (NBC Infrastructure Operations Hosting
Services -- Multi-tenancy Shared Service Provider) infrastructure including approximately 1800 servers, 1700 desktop
computers, 400 network printers, 400 databases & 600 TB of enterprise storage) at two enterprise data centers (Denver
Data Center - DDC - Denver, CO & Enterprise Service Center - ESC - Herndon, VA) & 10 smaller data centers
supporting customers within the DOI (to include 3 primary locations & 18 remote / satellite offices) as well as 150
external federal agencies throughout the country. Ensure the customer's requirements are filled & kept IOSD Chief &
ADIR aware of all decisions made & status of operations, to include any risks of impact to services.
- Windows Server Administration - Windows 2003 / 2008 Servers, Active Directory Services for ~906 servers enterprise-
wide, currently ~7% virtualized.
- Unix / Linux Administration - Solaris 9/10 Servers (Solaris 10 Zones 120-340 VMs), RedHat Enterprise Linux (RHEL)
4 / 5.5 Servers ~ 932 Unix/Linux servers enterprise-wide, currently ~61% Virtualized
- Mainframe / Systems Software - z/9 & z/800 Mainframes in a parallel sysplex Enterprise-class Multi-OS partitioned
platform (z/OS 1.10/1.12) - DOI mainframe consolidated hosting, Federal Personnel & Payroll System (FPPS) support
to DOI bureaus & numerous other Federal agencies, servicing 240,000+ accounts, 102 third-part systems software
products supported
- Virtualization Platforms:
-- VMware (vSphere ESXi 4.1 Enterprise Plus) VM Platform Standard - preferred VM platform, Production &
Non- Production Clusters per data center with defined security zones & 3-tiered architecture – VMware
Administration ~ 200 VM Servers enterprise-wide, capacity for ~600 VMs
-- IBM z/VM – RHEL virtualized on z/9 & z/10 mainframes – z/Linux (200 VMs, scaling down to 25 remaining)
-- Oracle (Sun) Solaris Domains (physical hardware partitioning) & Zones/Containers (logical partitioning)
-- Application Virtualization - Increased utilization per physical server, with licensing benefits through multi-instance
per physical server / cluster
Kevin L. Lucier Page 10 of 22 
- Defined Patch Management Program integrates with Continuous Security & Compliance Monitoring & Change
Management Programs, Patching schedules, published STIGs & post-patch procedures work symbiotically to keep
servers within defined DOI standards, using published & exemplified procedures. Strengthened enterprise coordination
& procedures to improve patch management of 3rd party (non-Microsoft) products in the Windows environments. On
servers, this has resulted in Adobe Acrobat Reader, Flash & Java updates being released in accordance with defined
critical patch procedures/deadlines & on desktops, the additional coordination & delegation of roles has improved patch
management of these same products across the enterprise desktop environment.
- Change Advisory Board (CAB) – Attend & serve as delegate for the IOSD Chief to chair the board that is responsible
for coordination & consensus approval to changes of the IT infrastructure. Change Management (CM) is a related
function that allows for orderly implementation of continuous operational improvements. (IT service frameworks (e.g.
ITIL))
- Preparation, automation & training for Emergency Accountability of all SSAB staff w/ assistance for same within IOSD.
Demonstrated extremely efficient automated capabilities during core & after hours accountability exercises.
- Combined Federal Campaign Board Member for the Denver metropolitan area since 2009
- Volunteered & serve on Fort Carson’s Transition Assistance Program (TAP) Employer Panel 2010-13
- Conceived a plan to demonstrate the need for competition for the NBC VM architecture by developing & releasing a
VM RFI. Utilized market research in standardizing ITD Virtual Hosting service offering, & in negotiating the Enterprise
License Agreement / VMware Contract terms for cost effective current & projected requirements.
- Reviewed VM capabilities, verified licensing information & developed costing model to allow NBC to offer virtualized
servers that are more cost effective than the current virtual servers capitalizing on the DOI wide Microsoft volume
licensing agreement to offer Microsoft HyperV virtualization.
- NBC representative for the DOI Innovations & Efficiencies Team (DIET) Infrastructure Consolidation Servers &
Storage Group – cross bureau team of 7 key members establishing technical & planning recommendations for DOI –
continued involvement as the team integrated into DOI IT Transformation Team, recommendations & NBC datacall
responses in support of DOI / OCIO projects/initiatives to meet the Department needs. (Experience in applying the Risk
Management framework and ability to ensure appropriate operational security posture is maintained to large General Support
Systems, Major Applications, or systems with a focus on Continuous Monitoring according to NIST, OMB, and DHS guidance
and framework. ) (Mastery of service provider managed or cloud computing technologies and the application of security
controls within them.)
- Cloud Computing - Significant project contribution to the DOI / NBC Cloud implementation. Cloud computing is a pay-
per-use model for enabling available, convenient, on-demand network access to a shared pool of configurable
computing resources.
-- Significant priority & dedication toward the cloud service offering definition, design & implementation. I was part of
the technical design, implementation, testing & even marketing of NBC's Cloud Service offerings. (Experience with the
application of security principles to common structures, processes, and techniques of IT system development, operations
and maintenance) (Mastery of service provider managed or cloud computing technologies and the application of security
controls within them.) I provided demonstrations of capabilities for automated provisioning, monitoring & metering, on
numerous occasions I orchestrated & coordinated these customer presentations with little lead time & amidst continued
development & operations efforts. I was directly involved with technical implementation/administration though the
majority of the time I served collaboratively & in oversight of team tasks. I provided input into the strategic vision & high
level technical solutions & integration efforts. The automated provisioning of z/Linux guests within the Cloud Service
offering is certainly an enormous example of the optimization of operational performance. Even with the thoroughly
documented, efficient model that existed prior to this automation, the steps necessary to provision a virtual server were
benchmarked as taking 114 minutes to complete (vs 1.5 months for physical server procurement & provisioning) &
involved multiple staff. Through the efforts of the team & with near daily input from SSAB staff, the provisioning can be
completed by one staff member in less than 20 minutes.
-- Automated Provisioning: After manual administrator authorization is complete, self-service provisioning requests (via
public website & Remedy workflow integration) quickly provided z/Linux virtual server instances on the Denver z/9 & the
Herndon z/10 mainframes via automated provisioning, primarily using Tivoli Provisioning Manager (TPM), Tivoli Service
Automation Manager (TSAM), EACS (TIM/TAM) integration & Citrix Netscaler Access Gateways.
-- Monitoring System: Immediate, automated integration of newly provisioned virtual servers into the
performance/availability monitoring system provided a “single pane of glass” view of (OS, App, DB) system
performance & alerts, including select customer accessible dashboards & integration to enterprise monitoring & alert
processes, primarily using IBM Tivoli Monitoring (ITM), Tivoli Data Warehouse (TDW), Tivoli Enterprise Portal (TEP) &
numerous IBM Tivoli Composite Application Manager (ITCAM) agents (ITCAM for Server Management, ITCAM for
Applications, ITCAM for WebSphere Application Server – WAS).
-- Metering System: Immediate, automated integration of newly provisioned virtual servers into the utilization-centric
metering system provided the collection of usage data needed to develop a chargeback billing system. The utilization
for network bandwidth, memory, cpu & storage per virtual server & per customer were maintained utilizing IBM Tivoli
Usage & Accounting Manager (ITUAM).
-- Effective November 7, 2009, the first federal government cloud service offering was released – The NBC Cloud
Computing website was activated for registering, ordering & provisioning the NBC's Infrastructure as a Service (IaaS)
offering - NBC-GRID! Effective November 20, 2009, NBC’s Platform as a Service (PaaS) offering - NBC-STAGE was
successfully launched. NBC’s first cloud computing customer (Social Security Administration) began benefitting from
the capabilities this project has provided on January 4, 2010. On February 26, 2010 NBC launched Release 2 of our
Cloud Computing Services. This set of offerings included significant process improvements & included NBC’s
numerous Software as a Service (SaaS) offerings – NBC-APPS. A total of 384 IaaS offerings, 386 PaaS offerings & 12
SaaS offerings were available to customers for NBC Cloud Computing. Release 3 requirements were effectively
scoped & prioritized before a change in senior leadership & a decision for NBC to focus upon the requirements of the
DOI & the Department’s Innovations & Efficiencies Team (DIET) project. This change in focus & decision on
virtualization platform (with recommendation from the Virtualization Platform Business Case) led to decisions to
discontinue cloud release 3 & not to offer R1 & R2 services to additional customers outside DOI.
Kevin L. Lucier Page 11 of 22 
- Virtualization Platform Business Case - recommendation led to a decision to modify the NBC's virtualization platform
standard, in order to capitalize on performance benefits & ensure cost avoidance through use of the least cost solution.
Virtualization Platform Standard established utilizing VMware & stand-alone multi-instance DB Servers
- Microsoft SCCM Implementation, an enterprise-wide (7 geographically dispersed locales) SMS migration
- Implementation of initial hardware refresh, in conjunction with department mandated migration to Windows Server
2008 for all OS & BC Active Directory Domain Controllers, with newly developed NBC Windows 2008 Server STIGS
- Serve as Task Area Lead and evaluation team member for the Systems Operation & Administration (SOA) staffing
Contract, one of the Big 5 Contracts within NBC ITD.
- My staff performs highly technical tasks, manage critical projects & participate in every IT mission within NBC, all while
demonstrating some of the most effective customer support & teamwork within the organization
- Provided technical expertise, complimenting the technical IT expertise & fostering collaboration on solutions.
- Participated as member of the FPPS Business Case Team to evaluate options for FPPS with respect to FFS
replacement impacting FPPS without ability to share cost of the mainframe platform.
- I have taken the input of my staff & have begun steps toward establishing the Enterprise Capacity Management Team,
with re-utilization of existing federal & contract staff within the mainframe team, currently performing these functions on
the mainframe platform only, but trained & capable of initiating the effort & running the team with matrixed staffing from
each of the hosting services functional silos. Formed as a subset of the Mainframe Team & by blending in SSAB UNIX,
Windows & VMware staff as co-contributors to form a permanent functional capacity management group, I expect
improvements to Operational Service Levels & improvements in the life cycle management program.
We envision a panel of System Administrators meeting regularly with the Capacity Management Team to review
meaningful capacity & performance events & collectively work the issues proactively
- Serves as Acting Division Chief, Infrastructure Operations Services Division (IOSD), on a consistent basis, managing
a staff of ~173 FTE's, to accomplish the NBC Hosting Services mission. Communicate technical & managerial
guidance to Branch Chiefs, Team Leads, employees & contract personnel
Loose Wire, LLC
406 East Park Ave.
Anaconda, MT 59711 United States
09/1994 - Present
Salary:
~$17,500.00 USD Per Year
Hours per week: 1-5
Owner / Director of Technology
Supervisor: Self Employed (719-210-2687)
Okay to contact this Supervisor: Yes
- Owner / Director of Technology, Public relations, System Administrator, NOC / Network Administrator, Postmaster,
Listmaster, Webmaster & Hostmaster of a small Web Services company, providing customer focused services
specializing in personal & small-business Web Services development, management & hosting services
- Perform all levels of technical work (development, requirements definitions, administration, customer service,
consulting, design, presentation, solutions development & user acceptance) and have trained staff to succeed in each
area in my absence.
- Provide all functions of business operations (client relations, sales, requirements definitions, sales, negotiations,
licensing, procurement, logistics, financial, payroll, contract, scheduling, task assignment, staff supervision & contract
oversight) – from program development to cross-training and assignment of staff for daily operations.
- Application design & development in .NET-VB & C#, PHP, Python, Perl, C, C++, Java, Assembly, Basic, Visual Basic,
Lisp, uPascal, JavaScript, VBScript, PowerShell & various shell scripts, in both procedural & object oriented-OOP
methodologies, encompassing many different environments
- Interactive website design, development, e-mail & hosting services, interactive web application coding utilizing HTML /
DHTML, PHP, server side includes, css style sheets, Visual Basic & Java Scripting, Apache:ASP Active Server Pages,
CFML Coldfusion Markup, Active-X controls, client & server side Java solutions, Perl CGI scripts
- Maintain web servers & related TCP/IP network child processes; Apache, Bind DNS, ModPerl, Apache:ASP, Resin,
Perl, Majordomo, Sendmail, Samba, ProFTPD, WU-FTPD, NFS Mounts, Frontpage Server Extensions & Log Analysis
on all servers
- Maintain Sun / Oracle SPARC Solaris, x86 Redhat Linux & Microsoft Windows 2003/2008 servers, schedule downtime
to minimize user / customer impact, correct security vulnerabilities & train staff with user / customer requests
- Information Systems consulting services, custom & ready-made applications, web applications, UNIX/Linux system
security, administration & hosting services for local & national clients
   
Kevin L. Lucier Page 12 of 22 
Department of the Army
Network Enterprise Center (NEC)
(formerly Directorate of Information Management - DOIM)
Information Systems Division (ISD)
6151 Specker Ave. Bldg 1550
Fort Carson, CO 80913 United States
11/2006 - 04/2009
Salary: $76,981.00 USD Per
Year
Hours per week: 60
Series: 2210 Pay Plan: GS
Grade:13
Chief, Systems Management Branch (Supervisory IT Specialist - SYSADMIN/NETWORK)
(This is a federal job)
Supervisor: Mr. Frank J. Davis (719-232-1197)
Okay to contact this Supervisor: Yes
- GS-13 equivalent, YC-2 position (pay setting 5% above permanent GS-12 position when reassigned)
- Provide the full spectrum of Systems Management (Hosting Services); oversee Systems Administration, Data Center
Management, Database / Storage / Enterprise Applications, Network Operations, Web Services, Executive Support,
Desktop Management, Video Teleconferencing (VTC) & Tactical Operations
- Supervise (direct & indirect) forty-six employees engaged in 24X7 information technology (IT) work; 2 GS-2210-12s,
19 GS-2210-11s, 1 YA-2210-02, 4 GS-2210-09s, 1 GS-1001-09 & 19 contractors equivalent to GS-2210-11s
- My staff performs at an amazing level & have been exemplified & recognized (DOIM of the Year & Innovative IA
Project) throughout the Army for their achievements with the DIACAP (Department of Defense Information Assurance
Certification & Accreditation) process
- Act as Contract Task Monitor & serve as Project Manager for multiple high-profile, critical IT projects on three
Command & Control (C2) Networks (NIPRNet, SIPRNet, JWICS - the Army network environments dedicated to
Unclassified, Secret Classified & Top Secret Classified data, respectively
- Provide a vision & advocate for the future of the Ft Carson DOIM
- Effectively use a combination of leadership styles, embodies "BE-KNOW-DO" Army leadership
- Provide high-level technical expertise
- As an early step in preparation for Continuous Monitoring to replace the DIACAP (Department of Defense
Information Assurance Certification & Accreditation process, Department of the Army began to integrate
similar requirements for training and certifications for Systems Administration and Network Administration
specialties (later expanded across numerous parenthetical specialties to the Information Technology Specialist
/ 2210 series positions) that had previously been in place for GS and GG 2210(InfoSec) – Information Security
specialists. The intent being to integrate the INFOSEC knowledge and experience into the Plans / Engineering
and Integration, architecture and design of IT Systems, as well as into the Programs / Operations &
Management (O&M) of Information Systems. Our successful history of DIACAP accreditations and tight
collaboration with Information Assurance (IA) combined with additional training for my staff and I toward credentials
ensured improvements to the security posture of Army Command & Control (C2) Networks (NIPRNet, SIPRNet,
JWICS). Relevant development and certification requirements were to prepare the ITM civilian workforce to meet the
demands of the Army of the 21st century, fostering mutual respect between fields / specialties to include higher
headquarter accreditation teams, and led the way to consolidation and centralization of many continuous monitoring
functions to NETCOM regional capabilities. Although we continued to apply separation of duties / roles &
responsibilities, and utilize these methods to ensure compliance, my staff and I have developed within Department of
the Army, Training and Doctrine Command (TRADOC), Career Program - CP-34, with the training, development and
application of the mindset that we are all security professionals, and apply the same requirements, knowledge, skills
and abilities toward our respective organizational roles and responsibilities. The training and certification requirements
of my CP-34 Individual Development Plan (Please see Training section of resume below for CP-34 and DoD IA
Workforce Management Objectives) applied to Systems Administration Roles, and the Chief of Systems position –
ensuring the application of the NIST Risk Management Framework (RMF) to all of my responsibilities. This led to
training, & credential testing for Certified Information Systems Security Professional (CISSP) and award of Associate of
the (ISC)2 for CISSP – February 2009
- Through Department of Defense guidance, my position, and those of the majority of my staff were marked as
required to comply with DoD 8570 IA Workforce Management , and designated with
Information Assurance Technical (IAT) and Managerial (IAM) categories I, II, or III. The IAT category’s functions
are cumulative. Thus, an IAT Level II or III position requires mastery of the functions of the preceding levels. We
determined the identification and categorization of positions and certification of personnel conducting Information
Assurance (IA) functions within the DoD workforce supporting the DoD Global Information Grid (GIG) per DoD
Instruction 8500.2 8500.01. Starting in 2005, the referenced policy was in place, in 2007 interpretation and clarifications
occurred that informed decisions and planning on position designations across the Fort Carson DOIM. In January,
2008, we had certification goals in place, and by Year Three (CY-09), 70 percent of the IA positions were filled with
certified personnel.
My position is designated as both an Information Assurance Technical (IAT) category III – IAT III, and
Information Assurance Managerial (IAM) category II – IAM II. My CP-34 IDP included these goals toward DoD-
approved information assurance workforce certifications appropriate for each category and level and appropriate
operating system certification for information assurance technical positions. With the program intentions and
requirements listed below, I was required to obtain and hold CISSP or Associate, and Security+ training, and
certification. (Please see additional details under Training section of resume)
- Team efforts were exemplified & recognized (DOIM of the Year & Innovative IA Project) throughout the Army
for their achievements with the DIACAP (Department of Defense Information Assurance Certification &
Accreditation) process
Kevin L. Lucier Page 13 of 22 
- One of five members of the Fort Carson IT Engineering Review Board (ERB)
(Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is
maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring
according to NIST, OMB, and DHS guidance and framework. ) (Mastery of service provider managed technologies and the
application of security controls within them.)
- One of eleven voting members of the Fort Carson IT Configuration Control Board (CCB)
- Provide technical input & requisite data on Collaborative Information Environment (CIE) to the adopted Army CONUS-
wide implementation plan of Office Communications Server (OCS) framework
- Effectively & efficiently manage resources; responsible for the management of the Fort Carson IT Infrastructure &
Operations. Manage the 100% accountability of the Data Center hand-receipt consisting of 6439 items (327 LIN), worth
79 million dollars, with no compensatory material loss.
- Lean Six Sigma (LSS) Project Sponsor: Identified & developed project charters for DMAIC & JDI projects
- Oversaw consolidation methodology for installation datacenter operations, including servers, network, storage &
physical datacenter infrastructure. After installation consolidation, performed regional consolidation & began enterprise
consolidation.
- Evaluate the nature & scope of work to automate to determine the need for system development, mods or redesign
- Execute the full range of human resources (including performance management) & fiscal responsibilities
- Manage schedules, workloads, priorities, deadlines & deliverables to achieve positive results
- Serve as a technical expert performing feasibility studies, which involve application of emerging computer technology
to resolve unique information management requirements
- Ensure the highest levels of availability & functionality of the data center / IT systems and services
(Conduct analysis and interpretation of IT security policies and directives; and develop strategies, policies and procedures
to ensure compliance and extensive knowledge of Department of the Interior, vendor managed external systems, or similar
systems.)
- Deputy / Alternate Division Chief, Information Systems Division (ISD), managing a staff of 70 FTE's, to accomplish the
DOIM operations mission. Communicated both technical & managerial guidance to Branch Chiefs, Leads & employees
Department of the Army
Directorate of Information Management (DOIM)
System Management Branch (SMB)
6151 Specker Ave. Bldg 1550
Fort Carson, CO 80913 United States
07/2005 - 11/2006
Salary: $62,557.00 USD Per
Year
Hours per week: 60
Series: 2210 Pay Plan: GS
Grade: 12
Lead, Web Services / Web Architect (Information Technology Specialist-INET/SYSADMIN)
(This is a federal job)
Supervisor: Mr. Frank J. Davis (719-232-1197)
Okay to contact this Supervisor: Yes
- Web Services Lead, supervise & coordinate staffing for Web Services, a highly qualified team of six full time
employees/contractors, act as Contract Task Monitor & Project Lead for multiple high profile, critical IT projects for both
NIPRNet & SIPRNet
- Serve as Programmer/Analyst
- Resolves problems, coordinates work with others & makes technical decisions
- Conduct needs analysis to define opportunities for new or improved applications, consult with users to identify
requirements, conduct feasibility studies & trade-off analysis, define systems scope & objectives, develop overall
functional & technical requirements & specifications, evaluate & recommend sources for systems components
- Coordinate efforts between staff elements at all levels of the Ft Carson DOIM Interacts closely with Public Affairs
Officer & PAO staff to ensure timely, interactive content with appropriate review & clearance for public dissemination via
the web. Works closely with customers.
- Engineered, tested & deployed a robust Collaboration Information Environment-CIE; utilizing Live Communication
Server-LCS, a paired deployment of SIP (Session Initialization Protocol) enabled clients, Windows Messenger 5.1 with
Office Communicator 2005, multiple hierarchal SharePoint 2003 portals/WSS sites with desktop
integration/authentication & presence/awareness integration to LCS & all Office 2003 applications. Successfully lobbied
to extend the CONUS Active Directory Schema for LCS. Administer CIE servers (Windows Server 2003) on VMware &
serve as backup SA for VMware ESX / VMware Virtual Environment.
- Designed & deployed Federated LCS Architecture. Piloted with FORSCOM & 1st Army HQ. Permitted IM,
Audio/Visual & Presence & Awareness outside of the Fort Carson enclave
- Administered Collaboration Information Enterprise servers on VMWare & served as SA for Web Services servers.
Monitors server performance using performance monitoring tools, installs server upgrades.
- Designed & implemented "Meet with the Commanding General" utilizing services from SPS 2003, LCS 2005 & Office
Live Meeting. Enabled the Commanding General of Ft Carson to host real-time chat & visual presentations with up to
200 individuals from the Ft Carson & Colorado Springs community via the Internet.
- Completed the dynamic web redesign per requirements of the Commanding General, to include use of SharePoint
Portal Server for content delivery, enhancing the design of the public web presence. Decreased time-to-live & allowed
for delegation of content edits for select portions of the web presence to PAO & Installation Emergency Ops Center
- Garrison & Tactical SIPRNet Portal deployments in failover configurations utilizing IDM-T (Information Dissemination
Management-Tactical) SharePoint Portal 2003, to provide Army Battle Command Systems (ABCS)
- Attended & briefed the DA Collaboration Best of Breed Working Group to present & influence FORSCOM & III Corps
best business practices on collaboration efforts within tactical environments
- Alternate Branch Chief, System Management Branch – oversee a staff of forty employees.
Kevin L. Lucier Page 14 of 22 
Department of the Army
Directorate of Information Management (DOIM)
Engineering & Integration ( E&I)
6151 Specker Ave. Bldg 1550
Fort Carson, CO 80913 United States
10/2004 - 07/2005
Salary: $56,320.00 USD Per
Year
Hours per week: 50
Series: 2210 Pay Plan: GS
Grade: 11
Systems Analyst (Information Technology Specialist-SYSANALYSIS/APPSW/INET/SYSADMIN)
(This is a federal job)
Supervisor: Mr. George Jessen (719-526-1300)
Okay to contact this Supervisor: Yes
- Selected for and served as Subject Matter Expert (SME), and Team Lead within a small (6 staff), dedicated
Engineering and Integration (E&I) unit for the Fort Carson DOIM. (Experience in applying the Risk Management
framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems,
Major Applications, or systems with a focus on Continuous Monitoring according to DISA, NIST, OMB, and DHS guidance
and framework. )
- Sole provider of Tier III Web Services, expert web technical advisor/trainer & on-call INET
- Internet Specialist/Web Services Programmer-technical planning, designing, developing, testing, implementing &
managing Internet, intranet & extranet components & applications development
- Development of policies, procedures, training & guidelines related to web services
- Project Lead to multiple Engineering Review Boards (SharePoint 2003 migration / SQL Architecture / Taxonomy / Live
Communication Server-LCS / Web Services)
- Project Coordinator / Integrator - provides direction & technical guidance on the integration & acquisition /
development of Information Technology-IT solutions
- Provide high-level technical expertise to accomplish analysis of options & development of the design for advanced
systems, software & complex programming specifications
- Engineered, tested & deployed a robust Collaboration Information Environment-CIE; utilizing Live Communication
Server-LCS, a paired deployment of SIP (Session Initialization Protocol) enabled clients, Windows Messenger 5.1 with
Office Communicator 2005, multiple (Internet/Public & IntraNet/ExtraNet) hierarchal SharePoint 2003 portals/WSS sites
with desktop integration (NTLM/kerberos authentication) & presence/awareness integration to LCS & all Office 2003
applications. Successfully lobbied the CIO G6 & Tech CCB to extend the CONUS Active Directory Schema for LCS.
Administer CIE servers (Windows Server 2003) on VMWare & serve as backup SA for ESX/VmWare environment
- Systems Analyst - applies analytical processes to the planning, design & implementation of information systems for
both SIPRNet & NIPRNet environments
- Programmer Analyst-analyzes & refines requirements, planning & designing application architectures, developing,
modifying & debugging code, documenting, testing, implementing & supporting applications software; "writes code"
- Work with Web Services operations team to develop a scalable server architecture to support regional DOIM web
services & provide for network, hardware & data failover
- UNIX/Windows Systems Administrator, planning & coordinating the installation, testing, operation, troubleshooting &
maintenance of hardware, operating systems & applications software (Problem Solving)
- Defined & conducted engineering & testing on IT systems
- Maintained awareness of new Research & Development (R&D) & advanced techniques in the INET specialty
Department of the Army
Directorate of Information Management (DOIM)
Information Dissemination Branch (IDB) – Web Services
6151 Specker Ave. Bldg 1550
Fort Carson, CO 80913 United States
08/2003 - 10/2004
Salary: $47,421.00 USD Per
Year
Hours per week: 45
Series: 2210 Pay Plan: GS
Grade: 09
Web Services Programmer / Web System Admin (Information Technology Specialist-INET/SYSADMIN)
(This is a federal job)
Supervisor: Ms. Vicki Craig (719-526-1008)
Okay to contact this Supervisor: Yes
- Served as Web Services Programmer/Analyst (non-supervisory)
- Worked to develop, adopt, train & implement adherence to policies of standardization & design
- Creates complex scripts or code; Responsible for analyzing, managing, or performing work necessary to plan, design,
develop, acquire, document, test, implement, integrate, maintain, or modify systems that provide web services
Develops & implements new applications & scripts
- Primary Web Services Systems Administrator - Adapt & implement systems diagnostic & maintenance tools to ensure
availability & functionality of all systems
- Ensured compliance with Section 508 ADA, Public Affairs, Legal, OPSEC, Information Security, statutory & regulatory
guidance at all levels of DOD
- Provide Internet / Intranet / Extranet services for the greater Fort Carson area
- Utilized DBA experience (Oracle, DB2, Microsoft SQL Server, MySQL) & web security expertise to scan, identify &
correct SQL injection concerns in existing code, trained staff to prevent exploits
Kevin L. Lucier Page 15 of 22 
- Provided custom software solutions for the web environment, featuring Java Server Pages-JSP, Java Portlets /
Servlets, Flash/Swish, DHTML, XHTML, css style sheets, VB & Java Scripting, Active Server Pages-ASP, SQL stored
procedures, Coldfusion-CFML & Perl CGI scripts
- Developed action plan for regional consolidation of hosting services specific to enterprise application / web services -
planning, design, development, implementation & management
- Coordinate efforts between staff elements at all levels of the Ft Carson DOIM Interacts closely with Public Affairs
Officer & PAO staff to ensure timely, interactive content with appropriate review & clearance for public dissemination
- Domain Admin - Served as System Administrator of IDB servers, advised & upgraded to blade infrastructure
- Served as IBM WebSphere Administrator - designed, developed & deployed custom web portal solutions with
WebSphere Portal (4.2 & 5.01) on WebSphere Application Server, Single Sign On-SSO & collaborative features
(Quickplace & Sametime)
- Integrated / implemented a redundant single source authentication via LDAP - SunOne Directory Server
National Center for Appropriate Technology (NCAT) & NHT, Inc
3040 Continental Dr.
Butte, MT 59701 United States
05/1999 - 08/2003
Salary: $41,384.00 USD Per
Year
Hours per week: 45
Web Technical Specialist II
Supervisor: Ms. Mary Anne Skuletich (406-494-8649)
Okay to contact this Supervisor: Yes
- Oversaw Web Services, provided guidance, training & assistance to a team-10 web developers, 2 system
administrators
- Interactive Internet application design & Internet Services management for 23 federal & state funded websites,
including domain spaces of 5 federal government agencies
- Managed interactive Internet application design & Web Services for 23 internationally acclaimed federal & state
funded websites, including domain spaces of The U.S. Departments of Energy, Housing & Urban Development,
Department of Agriculture & Health & Human Services, as well as many State & Federal funded project domains.
- Utilized SSI, css style sheets, CGI scripting in Perl or C, Active Server Pages, PHP, VBScript, JavaScript, CFML &
server/client side Java to meet all webpage & application requirements Ensured functional, easily navigable, accessible
(Section 508 compliant) webpages
- Filled roles of System Administrator, NOC/Network Administrator & Systems Security Specialist Expertise with web, e-
mail, DNS, telnet, SSH & FTP daemons
- Proposed & developed formal telework program, then demonstrated success from CO home office (2002-03)
Graduate School Office, Montana Tech of The University of Montana
1300 West Park
Butte, MT 59701-8997 United States
03/1998 - 05/1999
Salary:
~$15,000.00 USD Per Year
Hours per week: 25
Database Administrator-DBA / Information System Support Specialist
Supervisor: John Brower, PhD (406-496-4128)
Okay to contact this Supervisor: Yes
- Oracle Database Administration Development of custom VB interface to SCT Banner tables via ODBC & SQL
- Record-oriented, flat file & relational DB development, data querying & optimization, Oracle 8i for Unix
- Lead for website & FTP server - Worked with content developers & other server admins to meet webpage &
application requirements / design standards
US ARMY
Fort Carson, CO 80913 United States
05/1992 - 04/1997
Salary:
~$26,000.00 USD Per Year
Hours per week: 50
Automated Logistics Supervisor, CPL(P) 92A20
Supervisor: MAJ Mark Vande Hei (719-282-0481)
Okay to contact this Supervisor: Yes
- Supervised & trained a seven member Information Systems (IS) staff to work as a team, organize workload & prioritize
tasks to exceed section goals
- System Administrator of a critical STAMIS logistics system, exceed down time goals & ensure data integrity
- Systems Analyst-applies analytical processes to the planning, design & implementation of information systems
- Recognized for leadership, excelled at Non-Commissioned Officer / Sergeant promotion board -SPC(P).
- Earned recommendation to Warrant Officer Candidate School.
- Conceived & implemented an information system to lessen strain on the Army's supply system that ultimately led to
savings of over $750,000 in fiscal year 1995.
- Granted first security clearance & served as Section Supervisor, responsible for maintaining sensitive & pilferage
items with 100% accountability rate.
- Automated Inventory Database Management Clerk – responsible for cost savings effort that automated distribution of
$195,000,000 in class IX repair parts back into the supply system
- Field-tested, evaluated & implemented a new government inventory management database / logistics data
communication program in a mission essential logistical environment.
- Special Qualification ID: A-Technical Intelligence
Kevin L. Lucier Page 16 of 22 
 
Education: Montana Tech of The University of Montana Butte, MT United States
Bachelor's Degree 01/1998 - 05/2002
GPA: 2.74 of a maximum 4.0
Program GPA: 3.68 of a maximum 4.0
Credits Earned: 109 Semester hours
Major: Computer Science, Business Process Development
Relevant Coursework, Licenses & Certifications:
Credits Course Title
3 CS-142 MIL Credit - Operating Systems
3 CS-242 MIL Credit - Data Communications & Networks
3 CS-141 Microcomputer Software
3 CS-210 Intro to Computer Science I
3 ENGL-104 English Composition
3 ES-321 Scientific & Tech Writing
3 HSS-174 Intro to Sociology
2 HSS-121 Principles of Speaking
3 CS-211 Intro to Computer Science II
2 CS-298 Internship in Computer Science
sub for CS-491 (Internship in C.S.)
3 CS-215 Assembly Language Programming
3 CS-298 Internship in Computer Science
sub for CS-491 (Internship in C.S.)
5 CS-301 Web-based Accelerated Intro Comp. Science I
sub for CS-326 (Software Engineering II)
3 STS-139 Introduction to Logic
1 CS-250 Advanced Webpage Design
5 CS-302 Web-based Accelerated Intro Comp. Science II
sub for CS-326 (Software Engineering II)
3 CS-354 UNIX, C & C++
3 MATH-152 Calculus I
3 BS-120T Keyboarding I
4 CS-350 Independent Study in Computer Science
sub for CS-365 (Database Management)
3 HSS-337 Professional Ethics
3 CS-331 Data Structures & Algorithms
3 CS-3166 Discrete Structures
3 CS-3326 Data Structures & Algorithms II
3 BUS-3616 Management
3 CS-3256 Software Engineering I
3 MATH-1530 Calculus II
3 CS-4016 Programming Languages
3 CS-4406 Computer Architecture
3 CS-4556 Artificial Intelligence
4 MATH-2510 Calculus III
3 MATH-3256 Matrices & Linear Algebra
Montana State University Bozeman, MT United States
Some College Coursework Completed 08/1991 - 05/1992
Major: General Studies
Job Related Training: Course, Location / dL (Distance Learning) - Date Completed (# Hours)
- FY 2017 Transit Benefit Integrity Awareness Training - 10/3/2016 1)
- DEO 2016 Annual Ethics Training - 8/31/2016 (1)
- IBC Personnel Security Branch Annual Security Awareness Training - 7/7/2016 (2)
- Ethics Sweepstakes - 6/28/2016 (1)
- Uniformed Services Employment and Reemployment Rights Act (USERRA) - 2016 Completed 6/27/2016 (1)
- Veteran Employment Training for Hiring Managers - 2016 - 6/26/2016 (1)
- 2016 Role Based Security Training (RBST) Self Certification - 6/26/2016
- Computer Security Incident Response Team (CSIRT) Overview 2016 - 6/26/2016
- Computer Security Incident Response Team (CSIRT) 2016 - 6/26/2016
- 2016 Role Based Security Training (RBST) Certification for SUPERVISORS ONLY - 6/26/2016
- DOI Introduction to Counterintelligence Self-Certification - 6/26/2016
- DOI Introduction to Counterintelligence 2016 - 6/26/2016 (1)
Kevin L. Lucier Page 17 of 22 
- VMware Certified Professional 5 - Data Center Virtualization (VCP5-DCV) certification qualifying exam with exam code
VCP550. Certification of prior training for Professional Learning Credits - 6/10/2015
- 2016 Federal Information Systems Security Awareness+ Privacy and Records Management (FISSA+) -
5/31/2016 (3)
- Floor monitor and first aid / CPR training
- 2015 Federal Information Systems Security Awareness + Privacy and Records Management (FISSA+) -
6/3/2015
- 2015 Role Based Security Training (RBST) Self Certification - 6/3/2015
- DOI Introduction to Counterintelligence Self-Certification - 3/4/2015
- Purchase Card Annual Agreement of Responsibility 2015
- Implementing and Supporting Active Directory Infrastructure - in progress
- .NET Remoting - dL via Skillport - in progress
- Remoting with Visual Basic 2005 - dL via Skillport - in progress
- Remoting with C# 2005 - dL via Skillport - in progress
- Veteran Employment Training for Hiring Managers - 2015 - dL - 2/3/2015
- Uniformed Services Employment and Re-employment Rights Act (USERRA) - 2015 - dL - 2/3/2015
- Transit Benefit Integrity Training - FY 2015 - dL - 11/10/2014
- Thrift Savings Plan (TSP) at a Glance Training - 10/31/2014
- 2014 Role Based Security Training (RBST) - dL - 8/10/2014
- Identity, Presence, and Privacy - dL - 8/10/2014
- Providing Cloud Security - dL - 8/8/2014
- Social Engineering and Sniffing - dL - 3/31/14
- 2014 Federal Information Systems Security Awareness + Privacy and Records Management (FISSA+) - dL -
3/31/14
- Transit Benefit Integrity Training - FY 14 - dL -11/8/13
- FEMA Emergency Preparedness for Federal Employees - dL -10/3/13
- GSA SmartPay® Purchase Card Training (Cardholders & Approving Officials) - dL -10/3/13
- GSA SmartPay® Travel Card Training (Cardholders & Approving Officials) - dL -10/3/13
- The No FEAR Act - dL -10/3/13
- Veteran Employment Training for Hiring Managers - dL -10/3/13
- Purchase Card Annual Agreement of Responsibility 2013 - dL -10/3/13
- Charge Card Annual Agreement of Responsibility 2013 - dL -10/2/13
- DOI Charge Card Refresher Course - dL -10/2/13
- Role Based Security Training (RBST) Self Certification (2013) - dL - 7/30/13
- Cloud Computing Basics - dL - 7/30/13
- Computer Security Incident Response Training (CSIRT) - dL - 7/30/13
- 2013 Federal Information Systems Security Awareness + Privacy and Records Management (FISSA+) - dL -
7/30/13
- Uniformed Services Employment and Re-employment Rights Act (USERRA) - dL - 2/20/13
- Researched, prepared & submit (and resubmit / tracked) a request for constructive credit of the Advanced
Course of Civilian Education System (CES) from The Army Management Staff College. The intent was to validate &
document equivalence for training prerequisites for the Senior Executive Service (SES) Executive Core Qualifications
(ECQ) - specifically in preparation for attendance at a future course offering of Continuing Education for Senior Leaders.
Consideration after 2008 completion of CES Intermediate Course 09-1, Army Management Staff College, Processed
through HQDA, G-37 for determination. Ft. Belvoir, VA - 12/7/12 (140)
- Veteran Employment Training for Hiring Managers - dL - 10/16/12
- Managing Shared Calendars in Google Apps - dL - 10/16/12
- Google Email and Calendar Essentials Training for DOI - dL - 10/16/12
- Transit Benefit Integrity Training - FY 2013 - dL - 9/17/12
- VMware VMWorld 2012, San Francisco, CA - 8/30/12 (50)
- Effective Performance Workshop - DOI University - 8/2/12
- Applying the Risk Management Framework to Federal Information Systems - dL - 7/20/12
- Computer Security Incident Response Training (CSIRT) - dL - 7/20/12
- VMware Power CLI, dL - 6/22/12 (16)
- VMware Security / Network custom course, Denver, CO - 6/15/12 (40)
- VMware vSphere Optimize & Scale vSphere 5, New York, NY - 6/8/12 (40)
- VMware vCenter Site Recovery Manager: Install Configure Manage [V5.0], Wash, DC - 6/1/12 (16)
- VMware vSphere Troubleshooting, dL - 5/25/12 (40)
- VMware vSphere 5 Fastrack, Denver, CO - 5/18/12 (50)
- FBMS Basic Reporting Course - dL - 4/13/12 (1)
- Federal Information Systems Security Awareness + Privacy & Records Management FISSA+, dL - 4/13/12 (1)
- 2011 Discrimination & Whistleblowing in the Workplace (No FEAR Act) - dL - 1/20/12 (1)
- Charge Card Approving Official Refresher Training - dL - 1/11/12 (1)
- FBMS Acquisition Receiver Course - dL - 11/7/11 (2)
- FBMS Basic Navigation Course - dL - 11/7/11 (1)
- VMworld -Completed 2 technical lab training sessions in preparation for Technical certifications,
Las Vegas, NV - 10/21/11 (8)
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

More Related Content

What's hot

cardiac output.pptx
cardiac output.pptxcardiac output.pptx
cardiac output.pptxSudeepUppar
 
Signs of respiratory distress
Signs of respiratory distressSigns of respiratory distress
Signs of respiratory distressOsama Arafa
 
Pediatric Intussusception - An Overview
Pediatric Intussusception - An OverviewPediatric Intussusception - An Overview
Pediatric Intussusception - An OverviewSelvaraj Balasubramani
 
Hydrocephalus - Dr. D. Gunasekaran, Professor of Pediatrics, MGMCRI
Hydrocephalus   - Dr. D. Gunasekaran, Professor of Pediatrics, MGMCRIHydrocephalus   - Dr. D. Gunasekaran, Professor of Pediatrics, MGMCRI
Hydrocephalus - Dr. D. Gunasekaran, Professor of Pediatrics, MGMCRIpediatricsmgmcri
 
Pediatric intubation
Pediatric intubationPediatric intubation
Pediatric intubationRobert Parker
 
femoral triangle.pptx
femoral triangle.pptxfemoral triangle.pptx
femoral triangle.pptxRahul Sharma
 
2013 Pediatric Subspecialty Boot Camp_SHOCK
2013 Pediatric Subspecialty Boot Camp_SHOCK2013 Pediatric Subspecialty Boot Camp_SHOCK
2013 Pediatric Subspecialty Boot Camp_SHOCKDanny Castro
 
Lateral View And Maxilla Of The Skull Anatomy
Lateral View And Maxilla Of The Skull Anatomy Lateral View And Maxilla Of The Skull Anatomy
Lateral View And Maxilla Of The Skull Anatomy Stephanie Chahrouk
 
Practical pediatric quiz - Kaun Banega Winner
Practical pediatric quiz - Kaun Banega WinnerPractical pediatric quiz - Kaun Banega Winner
Practical pediatric quiz - Kaun Banega WinnerGaurav Gupta
 
Chronic diarrhea in children
Chronic diarrhea in childrenChronic diarrhea in children
Chronic diarrhea in childrenMohammed Ayad
 
Anatomy of scalp and face
Anatomy of scalp and faceAnatomy of scalp and face
Anatomy of scalp and faceMohamed El Fiky
 
Development of midgut and pancreas
Development of midgut  and pancreas Development of midgut  and pancreas
Development of midgut and pancreas Sahar Hafeez
 

What's hot (20)

Hepatospleenomegaly in children
Hepatospleenomegaly in childrenHepatospleenomegaly in children
Hepatospleenomegaly in children
 
Palatine Tonsils
Palatine TonsilsPalatine Tonsils
Palatine Tonsils
 
cardiac output.pptx
cardiac output.pptxcardiac output.pptx
cardiac output.pptx
 
DKA in children
DKA in childrenDKA in children
DKA in children
 
Signs of respiratory distress
Signs of respiratory distressSigns of respiratory distress
Signs of respiratory distress
 
Pediatric Intussusception - An Overview
Pediatric Intussusception - An OverviewPediatric Intussusception - An Overview
Pediatric Intussusception - An Overview
 
Hydrocephalus - Dr. D. Gunasekaran, Professor of Pediatrics, MGMCRI
Hydrocephalus   - Dr. D. Gunasekaran, Professor of Pediatrics, MGMCRIHydrocephalus   - Dr. D. Gunasekaran, Professor of Pediatrics, MGMCRI
Hydrocephalus - Dr. D. Gunasekaran, Professor of Pediatrics, MGMCRI
 
Pediatric intubation
Pediatric intubationPediatric intubation
Pediatric intubation
 
femoral triangle.pptx
femoral triangle.pptxfemoral triangle.pptx
femoral triangle.pptx
 
2013 Pediatric Subspecialty Boot Camp_SHOCK
2013 Pediatric Subspecialty Boot Camp_SHOCK2013 Pediatric Subspecialty Boot Camp_SHOCK
2013 Pediatric Subspecialty Boot Camp_SHOCK
 
Shock in pediatric
Shock in pediatric Shock in pediatric
Shock in pediatric
 
Lateral View And Maxilla Of The Skull Anatomy
Lateral View And Maxilla Of The Skull Anatomy Lateral View And Maxilla Of The Skull Anatomy
Lateral View And Maxilla Of The Skull Anatomy
 
Infantile colic
Infantile colicInfantile colic
Infantile colic
 
BREAST CANCER
BREAST CANCER BREAST CANCER
BREAST CANCER
 
Practical pediatric quiz - Kaun Banega Winner
Practical pediatric quiz - Kaun Banega WinnerPractical pediatric quiz - Kaun Banega Winner
Practical pediatric quiz - Kaun Banega Winner
 
Chronic diarrhea in children
Chronic diarrhea in childrenChronic diarrhea in children
Chronic diarrhea in children
 
Neonatal Cholestasis
Neonatal CholestasisNeonatal Cholestasis
Neonatal Cholestasis
 
Anatomy of scalp and face
Anatomy of scalp and faceAnatomy of scalp and face
Anatomy of scalp and face
 
Approach to arhritis in children
Approach to arhritis in childrenApproach to arhritis in children
Approach to arhritis in children
 
Development of midgut and pancreas
Development of midgut  and pancreas Development of midgut  and pancreas
Development of midgut and pancreas
 

Viewers also liked

Maria Lantz Frontera Resume - Professional Profile 2016
Maria Lantz Frontera Resume  - Professional Profile 2016 Maria Lantz Frontera Resume  - Professional Profile 2016
Maria Lantz Frontera Resume - Professional Profile 2016 Maria Frontera
 
Nathan A. Chine - Resume & Qualifications Matrix
Nathan A. Chine - Resume & Qualifications MatrixNathan A. Chine - Resume & Qualifications Matrix
Nathan A. Chine - Resume & Qualifications MatrixNathan Chine
 
Resume, delwar hossain, 2016 07-26
Resume, delwar hossain, 2016 07-26Resume, delwar hossain, 2016 07-26
Resume, delwar hossain, 2016 07-26MD Delwar Hossain
 
DA Ross Resume July 2015 DOI
DA Ross  Resume July 2015 DOIDA Ross  Resume July 2015 DOI
DA Ross Resume July 2015 DOIDavid Ross
 
Proteomics Analysis of Three Different Strains of Mycobacterium tuberculosis...
 Proteomics Analysis of Three Different Strains of Mycobacterium tuberculosis... Proteomics Analysis of Three Different Strains of Mycobacterium tuberculosis...
Proteomics Analysis of Three Different Strains of Mycobacterium tuberculosis...Santhi Devasundaram
 
Andrew Cohen Resume
Andrew Cohen ResumeAndrew Cohen Resume
Andrew Cohen ResumeAndrew Cohen
 
Kenyon Kluge Inboard -- Driving Production Innovation Through Race Technology...
Kenyon Kluge Inboard -- Driving Production Innovation Through Race Technology...Kenyon Kluge Inboard -- Driving Production Innovation Through Race Technology...
Kenyon Kluge Inboard -- Driving Production Innovation Through Race Technology...Kenyon Kluge
 
John C Caulkins Jr Resume 2016
John C Caulkins Jr Resume 2016John C Caulkins Jr Resume 2016
John C Caulkins Jr Resume 2016John Caulkins Jr.
 
William Wright Resume1216
William Wright Resume1216William Wright Resume1216
William Wright Resume1216Billy Wright
 
japanese chef resume - Copy
japanese chef resume - Copyjapanese chef resume - Copy
japanese chef resume - Copybenjamin prades
 

Viewers also liked (14)

KO RESUME
KO RESUMEKO RESUME
KO RESUME
 
Maria Lantz Frontera Resume - Professional Profile 2016
Maria Lantz Frontera Resume  - Professional Profile 2016 Maria Lantz Frontera Resume  - Professional Profile 2016
Maria Lantz Frontera Resume - Professional Profile 2016
 
Nathan A. Chine - Resume & Qualifications Matrix
Nathan A. Chine - Resume & Qualifications MatrixNathan A. Chine - Resume & Qualifications Matrix
Nathan A. Chine - Resume & Qualifications Matrix
 
Resume, delwar hossain, 2016 07-26
Resume, delwar hossain, 2016 07-26Resume, delwar hossain, 2016 07-26
Resume, delwar hossain, 2016 07-26
 
DA Ross Resume July 2015 DOI
DA Ross  Resume July 2015 DOIDA Ross  Resume July 2015 DOI
DA Ross Resume July 2015 DOI
 
Proteomics Analysis of Three Different Strains of Mycobacterium tuberculosis...
 Proteomics Analysis of Three Different Strains of Mycobacterium tuberculosis... Proteomics Analysis of Three Different Strains of Mycobacterium tuberculosis...
Proteomics Analysis of Three Different Strains of Mycobacterium tuberculosis...
 
Andrew Cohen Resume
Andrew Cohen ResumeAndrew Cohen Resume
Andrew Cohen Resume
 
Kenyon Kluge Inboard -- Driving Production Innovation Through Race Technology...
Kenyon Kluge Inboard -- Driving Production Innovation Through Race Technology...Kenyon Kluge Inboard -- Driving Production Innovation Through Race Technology...
Kenyon Kluge Inboard -- Driving Production Innovation Through Race Technology...
 
Work Resume
Work ResumeWork Resume
Work Resume
 
John C Caulkins Jr Resume 2016
John C Caulkins Jr Resume 2016John C Caulkins Jr Resume 2016
John C Caulkins Jr Resume 2016
 
Secular Employment LI
Secular Employment LISecular Employment LI
Secular Employment LI
 
Sandra Rivera - Professional Resume
Sandra Rivera - Professional ResumeSandra Rivera - Professional Resume
Sandra Rivera - Professional Resume
 
William Wright Resume1216
William Wright Resume1216William Wright Resume1216
William Wright Resume1216
 
japanese chef resume - Copy
japanese chef resume - Copyjapanese chef resume - Copy
japanese chef resume - Copy
 

Similar to Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxcuddietheresa
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
It director medimmune
It director medimmuneIt director medimmune
It director medimmunemarckraus
 
Formal Resume Final - Chris Hedge
Formal Resume Final - Chris HedgeFormal Resume Final - Chris Hedge
Formal Resume Final - Chris HedgeChris Hedge
 
Secure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingSecure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingCCI Training Center
 
JSThurston Resume 12102015
JSThurston Resume 12102015JSThurston Resume 12102015
JSThurston Resume 12102015Jon Thurston
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016Ronald (RON) Ray Harris
 
PSY 636 Short Paper Guidelines and Rubric Assignment instructi.docx
PSY 636 Short Paper Guidelines and Rubric Assignment instructi.docxPSY 636 Short Paper Guidelines and Rubric Assignment instructi.docx
PSY 636 Short Paper Guidelines and Rubric Assignment instructi.docxpotmanandrea
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solutionVivek Maurya
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
 
Network Security Expert and Risk Analyst
Network Security Expert and Risk AnalystNetwork Security Expert and Risk Analyst
Network Security Expert and Risk AnalystAshok K DL
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resumeAlbert Gonzales
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 

Similar to Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4 (20)

Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
It resume
It resumeIt resume
It resume
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
It director medimmune
It director medimmuneIt director medimmune
It director medimmune
 
TyroneResume[1]
TyroneResume[1]TyroneResume[1]
TyroneResume[1]
 
Formal Resume Final - Chris Hedge
Formal Resume Final - Chris HedgeFormal Resume Final - Chris Hedge
Formal Resume Final - Chris Hedge
 
McBee 8-28-2015
McBee 8-28-2015McBee 8-28-2015
McBee 8-28-2015
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 
Secure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security TrainingSecure Your Career Shift With Computer-Security Training
Secure Your Career Shift With Computer-Security Training
 
PolleiP-ComRes
PolleiP-ComResPolleiP-ComRes
PolleiP-ComRes
 
JSThurston Resume 12102015
JSThurston Resume 12102015JSThurston Resume 12102015
JSThurston Resume 12102015
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016
 
PSY 636 Short Paper Guidelines and Rubric Assignment instructi.docx
PSY 636 Short Paper Guidelines and Rubric Assignment instructi.docxPSY 636 Short Paper Guidelines and Rubric Assignment instructi.docx
PSY 636 Short Paper Guidelines and Rubric Assignment instructi.docx
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
Network Security Expert and Risk Analyst
Network Security Expert and Risk AnalystNetwork Security Expert and Risk Analyst
Network Security Expert and Risk Analyst
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 

Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

  • 1. Kevin L. Lucier 8025 Interlaken Dr. Colorado Springs, CO 80920 US Mobile: 719-330-7941 Day Phone: 303-969-7120 DSN: 883-3612 Email: Kevin_Lucier@IOS.DOI.gov Kevin.Lucier@US.Army.mil Country of Citizenship:United States Veterans' Preference: 10-point preference based on a compensable service connected disability of 30% or more (CPS) Registered for Selective Service: I am a male born on or after January 1, 1960 & I have registered for the Selective Service. Highest Grade: 15 ICTAP Eligible: No Availability: Job Type: Permanent, Presidential Management Fellows Work Schedule: Full-Time Desired locations: Profile: United States - CO - Air Force Academy United States - CO - Fort Carson United States - CO - Peterson AFB United States - CO - Schriever AFB United States - CO - Colorado Springs United States - CO - Denver United States - CO – Lakewood United States - MT Germany - Self-motivated - Very dedicated, organized, systematic & prioritized - Outgoing analytical leader - Able to integrate & excel in changing environments - Extremely meticulous to detail - Maintain great pride in completing assignments proficiently - Active Top Secret Security Clearance (previous TS SCI) - Senior Executive Service Qualifications; Leading Change, Leading People, Results Driven, Business Acumen, Building Coalitions - Qualifications spanning 24 years with emphasis on hosting services, security, administration, project management and leadership   Work Experience: Department of the Interior, Office of the Chief Information Officer – OCIO (transition from Interior Business Center position, listed below) Service Delivery Division (SDD), Hosting Services Branch 7301 W. Mansfield Ave. Mail Stop D2130 Denver, CO 80235 United States 10/2013 - Present Salary: $119,922.00 USD Per Year Hours per week: 60 Series: 2210 Pay Plan: GS Grade: 14 Chief, Systems Administration (Supervisory IT Specialist - OS/SYSADMIN) (This is a federal job) Supervisor: Mr. Spencer Bessette (303-969-7205) -- previously Mr. Dennis Donovan (303-969-5033) Okay to contact this Supervisor: Yes - Position has increased in size, scope and intensity since transition from Interior Business Center, IT Directorate, System Software Administration Branch position, listed after the recent temp promotion below. Organizational transition and new organizational alignment, with same position description, expectations, and responsibilities. - Effectively use a combination of leadership styles, prefer the Participative - "Lead by Example" - Embodies "BE-KNOW-DO" Army leadership - Experienced in advising senior executives on effective utilization of IT systems / solutions to meet business objectives . - Provide high-level technical expertise & supervision / leadership / motivation of a cross-functional staff - Work with peers, to include the newly assigned dedicated Information System Security Officer (ISSO) for the OCIO to ensure all security devices and architecture are in compliance with security regulations and risk management framework. In coordination with the OCIO Information Security Compliance Team, review and lead the remediation of
  • 2. Kevin L. Lucier Page 2 of 22  vulnerability findings and audit recommendations before and after they become POA&M items.) (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large, geographically dispersed hosting/data center environment.) - Serve as ISSO for the Denver Data Center General Support System - DDC GSS, with oversight of my staff providing ISSO and SSO duties for their relevant portions of the environment until January, 2016 when we were assigned dedicated ISSO staffing from IAD. Aviation Management Local Area Network - AM-LAN GSS, Interagency Aviation System Local Area Network IAS-LAN GSS, and collaboration with peers and their direct report staff in their roles over the Reston LAN and DC LAN GSS and the related FISMA children and major systems we host, that inherit controls from the general support systems. (Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring according to NIST, OMB, and DHS guidance and framework) - Supervise (direct & indirect) a geographically dispersed staff of 54 IT professionals; fourteen federal employees – eight GS-2210-14s, four GS-2210-13s, two GS-2210-12 & oversee an additional 40 staff (equivalent to GS-2210-11-14) from 3 labor contracts – the largest branch within hosting. (Manage multiple layers of staff including managers and their subordinates and contractors.) - I meet my goals, accomplish what is truly most important & empower staff to do the same. - Manage the System Software Administration Branch (SSAB) to execute the full range of SSAB disciplines to include; System Administration (Operating System Functions & Administration, Performance Monitoring & Tuning, Patch Management, Security Compliance, Operating System Testing & Directory Services to include Active Directory, RAC- F, and Enterprise Access Control Services) - Security Compliance as one of the 5 defined Roles and Responsibilities of my position – demonstrate compliance with applicable standards, and work to improve processes, and expand the breadth of the environment covered by proactive and detective monitoring actions. Traditional Patch Management, and audit of security controls have been improved through proactive monitoring for devices, system state, and vulnerabilities to provide ever increasing levels of awareness of the risks within our hosted environments. (Serve as a technical expert and consultant to agency personnel on Information Security Continuous Monitoring as defined by NIST standards and guidance.) We work collaboratively with IT Security to transition from C&A (Certification & Accreditation methodologies to Continuous Monitoring, to replace point-in-time audits and compliance checks with a continuous monitoring program to help prioritize controls and provide visibility into current threats. “Information security continuous monitoring is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. The objective is to conduct ongoing monitoring of the security of an organization’s networks, information, and systems, and respond by accepting, avoiding/rejecting, transferring/sharing, or mitigating risk as situations change.” (NIST Special Publication 800-137 Draft December 2010) Serve as technical expert / subject matter expert - SME (and manage a large team of SMEs for their respective areas) on the four hosting related Operating Systems and the System Administration actions to design, plan, implement and manage IT systems as a major component of an appropriate operational security posture. - Three of the four remaining Roles and Responsibilities of my position directly relate to Information Security as well, with System Administration (Operating System Functions & Administration, Patch Management, Security Compliance, Operating System Testing & Directory Services all requiring direct and indirect expert level architecture design, operations & management that ensure compliance with security regulations, guidance, policy and controls and active participation in maintaining and improving the security posture of the hosted information systems. Examples include Access Management, Patch Management, Change Management, Vulnerability Management and Information Systems architecture and designs to ensure that the appropriate operational security posture is maintained for the information system(s) and/or major application(s). - Although we apply separation of duties / roles & responsibilities, and utilize these methods to ensure compliance, my staff and I demonstrate the mindset that we are all security professionals, and apply the same requirements, knowledge, skills and abilities toward our respective organizational roles and responsibilities. The training and certification requirements of my CP-34 Individual Development Plan, and the additional duties assignment as an ISSO, and an IAT and IAM prepared me to cross-train our new ISSO, from January through October, 2016 and to transition roles and assist in responding to requests and projects assigned to ISSO, Dale Bogle. (The primary purpose of this position is to research, evaluate, develop, and maintain the Information Assurance Cybersecurity program.) (Provide expert technical, analytical, and managerial guidance for the planning, review, evaluation, implementation, coordination, and integration of DOI's information technology and identifies plans to maintain an effective information security program.) (Serve as a technical expert on the design and implementation of security controls on both internal and cloud computing based environments as specified by the National Institute of Standards and Technology (NIST) guidance.) (Serve as a technical expert and consultant to agency personnel on Information Security Continuous Monitoring as defined by NIST standards and guidance.) (Ensure that the appropriate operational security posture is maintained for the information system(s) and/or major application(s) assigned to that position.) (Interpret government-wide information security guidance as a means to establish standards, policies, guidelines, and procedures to ensure confidentiality, integrity, and availability of the information system.) - Provide technical, program and project management and functional expertise, complimenting the System Administration staff technical IT expertise & fostering collaboration on solutions. - Manage schedules, workloads, priorities, deadlines, and deliverables to achieve positive results.
  • 3. Kevin L. Lucier Page 3 of 22  - Provide essential 24x7 management with four Team Leads overseeing systems infrastructure across Windows Server, Unix (Solaris & Linux) Server & Mainframe (z/OS) architectures, to include distributed systems, (x86 & SPARC), virtualized x86 (VMware & HyperV) & System Z Enterprise Server / Mainframe (z/196) platforms  developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data;  conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs;  promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals;  conducting systems security evaluations, audits, and reviews;  developing systems security contingency plans and disaster recovery procedures;  developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures;  participating in network and systems design to ensure implementation of appropriate systems security policies;  facilitating the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes;  assessing security events to determine impact and implementing corrective actions; and/or  ensuring the rigorous application of information security/ information assurance policies, principles, and practices in the delivery of all IT services. - Nominated by the Information Technology Directorate as the 2013 Interior Business Center Supervisor of the Year (3rd nomination as IBC/NBC Supervisor of the Year since 2009), with some highlights provided below from nomination by ITD staff and senior leadership: - “Kevin has displayed all the attributes of an exceptional supervisor while leading this large, dispersed organization which has contributed so significantly to the accomplishment of the NBC’s Strategic Goals.” - “Made outstanding contributions to the continued improvement and success of the hosting business and overall IT service mission.” - “Kevin has worked to develop his branch into a high performing team. He emphasizes teamwork among the functional silos of Mainframe, Windows and Unix administration.” -“Continually makes program decisions and recommendations that are aligned with Departmental needs. Where applicable, effectively reaches out throughout the Department to solicit needs, ideas and perspectives in order to deliver cost effective, quality services. He clearly demonstrates a strong understanding of the Department’s needs and culture, issues to be addressed, and goals and outcome expectations.” - “Kevin proactively identifies opportunities to decrease costs and improve financial and performance transparency. He holds self and others accountable for goal accomplishment in the four focus areas of Customer Service and Service Delivery, Costs and Transparency, Internal Communication, and Employee Empowerment. Ensures that projects within areas of specific responsibilities are completed in a timely, efficient and effective manner that meets or exceeds objectives.” - “Demonstrated an outstanding appreciation for the NBC's financial management goals. He continually makes recommendations for improvements, and cost savings.” - “Kevin provided extensive technical, project management, leadership and customer service improvements for the OCIO Operational Improvement Project, the Data Center Consolidation – ESC to USGS Move, and the z/196 Mainframe Project, each of which were completed successfully according to detailed, aggressive project schedules, with appreciation expressed from customers across multiple agencies. - Ability to focus efforts and concentrate on details, even in the face of significant stresses and challenges has been proven on an almost constant basis. Kevin’s high quality work, attention to detail, and quick delivery turnaround times have contributed significantly to the IBC’s business relationships on a long term basis.” - “Kevin’s technical expertise and his ability to train, mentor and oversee SSAB has been and will continue to add significant value to the IBC workforce. His leadership has been exemplary as evidenced by the sustained high performance and high morale of the SSAB. The total impact of his leadership, management and voluntary contributions to the welfare of the employees of his branch and the IBC are without peer.” - Worked collaboratively with peers to define new Hosting Services Offerings & provided significant input and refinement to the Cost Model definitions, Requirement Definitions, and Service Agreements in support of solutions, to include FMD’s Oracle Federal Financials (OFF) Virtualization, Governance Risk & Compliance (GRC), OFF for Department of Homeland Security (DHS), Business Intelligence (BI), Sunflower and Shared Services Internal Disaster Recovery (DR). - Assigned as one of six Core Team members of the new Segmented Security Architecture Team on August 11th, 2015. Team has developed a high level architecture strategy to segment DOI Core services from DOI Shared Service Hosting, and to provide for additional segmentation where required, whereby customers will not share services with others. (Experience with the application of security principles to common structures, processes, and techniques of IT system development, operations and maintenance) (participating in network and systems design to ensure implementation of appropriate systems security policies) - Chair the Change Management, weekly Change Advisory Board (CAB) when available, attend and give input to the Pre-CAB and CAB, and emergency change requests. Review and approve Firewall Change Requests (FCR) bi-weekly as a Hosting Services representative to a small FCR review team. (IT service frameworks (e.g. ITIL)) - Provided the underlying solution to ensure significant efficiency for OFF application and Oracle Database software licensing, and the key justification for the cloud waiver to accommodate internal hosting solutions. Namely, the utilization of Oracle Sparc server hardware to benefit from Oracle software license model benefits – a combination of operating system, software and hardware not offered by cloud service providers on the OCIO Cloud Hosting IDIQ contract, but a proven, efficient model offered by OCIO Internal Hosting. (Experience with the application of security principles to common structures, processes, and techniques of IT system development, operations and maintenance) - Further optimized the hosting operations through increased server virtualization, with the percentage of the 1768 hosted server environment raising from 23% to 64% virtualized since 2009 (my arrival at DOI), despite largely unfunded
  • 4. Kevin L. Lucier Page 4 of 22  lifecycle management plans. (Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring according to NIST, OMB, and DHS guidance and framework. ) (Mastery understanding of service provider managed or cloud computing technologies and the application of security controls within them.) - Coordinates systems operations, management & engineering activities (OCIO Service Delivery, Hosting Services -- Multi-tenancy, Shared Services Provider) infrastructure including approximately 1800 servers, 1700 desktop computers, 400 network printers, 400 databases & 900 TB of combined Tier I and Tier II enterprise storage) at two enterprise data centers (Denver Data Center - DDC - Denver, CO & Reston Data Center - RDC - Reston, VA) & 10 smaller data centers supporting customers within the DOI (to include 3 primary locations & 18 remote / satellite offices) as well as 150 external federal agencies throughout the country. (Conduct analysis and interpretation of IT security policies and directives; and develop strategies, policies and procedures to ensure compliance and extensive knowledge of Department of the Interior, vendor managed external systems, or similar systems) - Ensure the customer's requirements are filled & kept Hosting Chief & OCIO senior leadership aware of all decisions made & status of operations, to include any risks of impact to services. - Combined Federal Campaign Board Member for the Denver metropolitan area since 2009 - Serve as Task Area Lead for the Systems Operation & Administration (SOA) staffing Contract, one of the Big 5 Contracts within IBC, and OCIO. Utilize delegated Team Lead model to collaboratively oversee the largest task area of the SOA staffing – averaging 39 IT professionals since contract award. - My staff performs highly technical tasks, manage critical projects & participate in every IT mission within OCIO, & the OCIO’s Service Delivery Division’s consistently growing hosting mission in support of DOI and external federal agencies. All while demonstrating some of the most effective customer support & teamwork within the organization. - Serves as Acting Division Chief, Hosting Services, on a consistent basis, managing a staff of ~173 FTE's, to accomplish the OCIO, Service Delivery, Hosting Services mission. Communicate technical & managerial guidance to Branch Chiefs, Section Chiefs, Team Leads, employees & contract personnel. - Manage ~55% (~$20M of the ~$36M) of the annual budget within Hosting Services. Provide efficient, cost-saving focused fiscal oversight in support of personal philosophy to empower and expect every staff member to deliver the most cost-effective, and appropriate shared services solution every time – as the civic duty to every tax payer. Mastery of service provider managed or cloud computing technologies and the application of security controls within them. Department of the Interior, Office of the Chief Information Officer – OCIO (detailed to a Special Project / Temp Promotion) Service Delivery Division 7301 W. Mansfield Ave. Mail Stop D2130 Denver, CO 80235 United States 6/2015 – 10/2015 Salary: $136,970.00+ USD Per Year Hours per week: 60 Series: 0340 Pay Plan: GS Grade: 15 Cyber Lead, Service Delivery, Office of the CIO (Supervisory Program Manager GS-0340-15) (This is a federal job) Supervisor: Bruce Downs, Deputy CIO (571-723-6073) Okay to contact this Supervisor: Yes - Effectively use a combination of leadership styles, in this case, utilized directive authority across organizational lines - Experienced in advising senior executives – leveraged for efficient staffing, budgetary planning, and recommendations for critical decisions at the departmental level in support of national security initiatives. - Provide high-level technical expertise, program management and leadership / motivation of a cross-functional staff - I meet my goals, accomplish what is truly most important & empower staff to do the same. - Active Top Secret Security Clearance - Much of the narrative provided was taken from nomination and award citation for the OCIO Cybersecurity Award dated August 31, 2015: - In response to an advanced persistent threat (APT) detected at a DOI data center, on April 17, 2015: - As a key member of the initial incident response team (IRT), rallied swiftly and effectively to contain the threat in collaboration with colleagues from the Department of Homeland Security (DHS), the Federal Bureau of Investigations (FBI) and other interagency partners. We took immediate action to deploy the needed tools to detect and respond to the adversary's activities. - I transitioned roles, especially operational priorities, & focused even more granularly upon Incident Mitigation - I was detailed to a Special Project / Temp Promotion to Supervisory Program Manager GS-0340-15/04 as the Cyber Lead for Service Delivery from 06/14/2015 through 10/11/2015.  promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals;  developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures;  participating in network and systems design to ensure implementation of appropriate systems security policies;  facilitating the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes;  assessing security events to determine impact and implementing corrective actions; and/or  ensuring the rigorous application of information security/ information assurance policies, principles, and practices in the delivery of all IT services.  conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs;
  • 5. Kevin L. Lucier Page 5 of 22  - Provided direct technical Systems Administration, project management, and cyber reporting as well as daily implementation, incident response, and security control guidance to staff across OCIO Operations. (Manage and host security devices in conjunction with Information Assurance. Work with peers, to include the newly assigned dedicated Information System Security Officer (ISSO) for the OCIO to ensure all security devices and architecture are in compliance with security regulations and risk management framework. In coordination with the OCIO Information Security Compliance Team, review and lead the remediation of vulnerability findings and audit recommendations before and after they become POA&M items.) (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large, geographically dispersed hosting/data center environment.) - I coordinated immediate remediation efforts on behalf of Hosting, in coordination with Hosting Services Managers, and Team Leads, with direct assignments to staff where necessary. Once detailed, I tasked on behalf of Chief, Service Delivery and expanded coordination of remediation efforts across Service Delivery. - Coordinated, and ran a daily (became 2/week) SD Ops Meeting on Security Mitigation to collaboratively work mitigation project plan assignments, and keep senior leadership informed over the past year. - Coordinated and oversaw tactical actions taken, as well as the strategic and architectural decisions, and high level projects/assignments and reporting that fell within this new Cyber Lead Role. We developed a comprehensive lessons learned and used this to build and implement a remediation plan for the immediate areas of compromise. Ultimately, we expanded remediation planning to all bureaus and offices and worked with colleagues in Policy Management and Budget, the DOI Budget Office (POB), the Interior Business Center (IBC) Acquisition Directorate (AQD) and the Office of the Solicitor (SOL) to prepare and prioritize urgent acquisitions and respond to questions and inquiries from DOI leadership and oversight authorities about resource needs. Many of the tactical actions taken are provided as bullets below, as well as the strategic and architectural actions, and high level projects/assignments that fell within this new Cyber Lead role.  I coordinated immediate remediation efforts on behalf of Hosting, in coordination with HSD Managers, and Team Leads, with direct assignments to staff where necessary.  Coordinated Position Designation Statements in support of others in HSD Management for receipt of classified cyber threat, incident and situational awareness briefings.  Began and continually improved upon Lessons Learned as input to other core data centers and bureaus  Budget procurement needs/recommendations/prioritization, justification (insure maximum use of personnel, materials and funds) In May, I recommended and gained consensus and approval of a method of covering Operational roles across Systems Administration in order to focus efforts toward Incident Mitigation for Hosting Services. I then began to transition roles, especially operational focus according to this plan, and focused even more granularly upon the Incident Mitigation efforts for Hosting Services. Soon after I was detailed / temp promoted NTE120 days and began to report to June Hartley as Chief, Service Delivery (with periods under Bruce Downs as Acting Chief, Service Delivery). Detail to Special Project / Temp Promotion to Supervisory Program Manager GS-0340-15/04 as the Cyber Lead for Service Delivery from 06/14/2015 to 10/11/2015.  Tasking delegated to me for Service Delivery by Chief of SD, and Deputy CIO.  Collaborated with Office of Info Assurance then I coordinated for Service Delivery  Coordinated further remediation efforts on behalf of Service Delivery (vs Hosting Services specific)  Coordinated, and ran a daily (became 2/week) SD Ops Meeting on Security Mitigation (promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals; )  Helped to prepare draft responses and provide input to preparatory questions then participated in practice sessions with DOI CIO, Sylvia Burns in preparation for her hearing sessions with House Oversight and Government Reform Committee. The DOI Cyber Security Strategic Plan, the Incident Mitigation Plan, and IRT and US Cert Action Notes all informed these preparations.  Collaborated with FCCO / NETCOM Network Enterprise Center (NEC) and G-4 POCs at Army and MDA for Classified procurement strategy  Provided direct technical Systems Administration, as well as implementation, incident response, and security control guidance to staff across OCIO Operations.  Collaborated with FCCO / NETCOM Network Enterprise Center (NEC), Public Affairs Officer and G-4 POCs at Army and MDA for Incident Comm Plan examples to provide IRT POCs at DOI.
  • 6. Kevin L. Lucier Page 6 of 22   Coordinated and met DHS / Whitehouse Binding Operational Directive (BOD) 15-01 prior to suspense for Service Delivery: DOICIRC Urgent Advisory ID #: 20150526-02 DOICIRC Incident Reference#: 00000000019476 Date Issued: May 26, 2015 Binding Operational Directive (BOD) 15-01, Critical vulnerability Mitigation Requirement for Federal Civilian Executive Branch Departments’ and Agencies’ Internet-Accessible Systems (Expanded by DOI to apply controls to all systems) (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large, geographically dispersed hosting/data center environment.) The Large-Scale PII Breach Incidents Report (AR-15-20001B) updated on May 22, 2015. This product, developed by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC), contains Indicators of Compromise (IOCs) resulting from a number of recent large-scale PII breach incidents. You are requested to have these IOCs deployed to your intrusion detection/prevention systems (IDS/IPS), vulnerability scanning solutions (e.g., McAfee Vulnerability Manager (MVM) & Tenable), hardware/software configuration scanning systems (e.g., SCCM & IEM) and other sensors to the fullest extent and initiating detection, scanning and analysis of every workstation, server and other information technology assets by close of business (COB) … ~55 Snort rules deployed. Any traffic -> malicious IPs, DNS request for malicious host names.  Worked tirelessly to draft, review and edit the DOI Cyber Security Strategic Plan (requested by the Secretary on June 23), in collaboration with the Cyber Advisory Group (CAG) formed in late June by DOI CIO. It has five goals: 1. Protect the Department’s critical assets and information; 2. Identify cyber security risks and vulnerabilities; 3. Continuously provide situational awareness and detect incidents; 4. Improve the Department’s ability to respond to and recover from cyber events; and 5. Improve cyber security and privacy awareness and develop a skilled information assurance cyber workforce. and is built around the NIST framework of five core functions, the cyber advisory group added a sixth "Learn" as our commitment to continuous learning and improvement. Identify: What assets need protection? Protect: What safeguards are available? Detect: What techniques can identify incidents? Respond: What techniques can contain impacts of incidents? Recover: What techniques can restore capabilities? Learn: What have we learned and what can we do better? (promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals; )  As a member of the Cyber Sprint team, undertook the challenge of meeting the goals defined in the Office of Management and Budget's (OMB) 30-day Cyber Sprint. I provided SD response, reviewed input and finalized for OS, IBC, OHA, DDC (Mansfield) and RDC. The Cyber Sprint team undertook the challenge of meeting the goals defined in the Office of Management and Budget's (OMB) 30-day cyber sprint. Within one week of the announcement of the cyber sprint, this group effectively engaged the bureaus and offices to achieve 100% personal identity verification (PIV) compliance of privileged IT users throughout the Department. They helped drive 94.5% PIV enforcement for unprivileged users to date, while also reducing the number of privileged users by over 1000 from the initial target. They aggressively promoted cyber hygiene, which included scanning and remediation of all critical and high vulnerability within 30 days. In addition, they helped ensure the bureaus and offices deployed indicators of compromise provided by DHS to all publicly facing IT systems and created the first inventory of DOI's high value data assets. As a result of this extraordinary work, DOI was proud to among the top five federal agencies (and third amongst large cabinet level agencies) that met or exceeded the cyber sprint goals. OMB punished the results publicly in August 2015. This took countless hours of hard work including many long evenings and weekends over several months. The group unified and focused on protecting and securing the Department's IT systems and network to ensure the continuity of DOI's vital mission work. (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large, geographically dispersed hosting/data center environment.)
  • 7. Kevin L. Lucier Page 7 of 22   2017 Cybersecurity Budget Addendum for Department of Interior (DOI) bureau and offices. Collaborated on the requirements, solutions, and budgetary estimates to provide the Cybersecurity Budget Addendum worksheets. Collaborated, and edited the Cybersecurity Budget Addendum Submission document that will go forward to OMB to request the estimated $88.1 million that builds on: (1) baseline cybersecurity investments in the Department’s IT portfolio ($68.5 million); (2) the Department’s 2016 continuing resolution (CR) cybersecurity anomaly request of $89.4 million; (3) and the 2017 Office of the Secretary request of $62.1 million (which includes recurring costs from actions in the 2016 CR anomaly request).  Cyber Sprint 2.0 internal Department reporting – coordinated, and consolidated data, and provided submissions for OS, IBC, OHA, DDC (Mansfield) and RDC on 9 weekly datacalls (continued to 24 at Present). Collaborated with OIA on questions, intent, and phrasing to ensure data collected across the department was actionable, and clearly understood. Met suspense every week, and ensured green reports for our respective areas by prior coordination and assignment of tasks to meet actions in advance of reporting. (promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals; )  Assigned as one of six Core Team members of the new Segmented Security Architecture Team on August 11th, 2015. Team has developed a high level architecture strategy to segment DOI Core services from DOI Shared Service Hosting, and to provide for additional segmentation where required, whereby customers will not share services with others. (Experience with the application of security principles to common structures, processes, and techniques of IT system development, operations and maintenance) (participating in network and systems design to ensure implementation of appropriate systems security policies)  Briefed DOI CIO on numerous occasions, provided data for briefings, and coordinated resources for meetings, datacalls, and deliverables. (promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals; )  Reviewed the final US-CERT report on incident with recommended mitigation tasks, to ensure all are covered in the DOI Mitigation Plan or addressed/accepted  Recommended and gathered support for staffing assistance  Complied with Litigation Hold RE: preservation of documentation Department of the Interior, Interior Business Center – IBC (formerly National Business Center – NBC) Information Technology Directorate - ITD Infrastructure Operations Services Division - IOSD 7301 W. Mansfield Ave. Mail Stop D2130 Denver, CO 80235 United States 04/2009 – 10/2013 Salary: $117,606.00 USD Per Year Hours per week: 60 Series: 2210 Pay Plan: GS Grade: 14 Chief, Systems Software Administration Branch (Supervisory IT Specialist - OS/SYSADMIN) (This is a federal job) Supervisor: Mr. Spencer Bessette (303-969-7205) -- previously Mr. Dennis Donovan (303-969-5033) Okay to contact this Supervisor: Yes - Effectively use a combination of leadership styles, prefer the Participative - "Lead by Example" - Embodies "BE-KNOW-DO" Army leadership - Provide high-level technical expertise & supervision / leadership / motivation of a cross functional staff - Supervise (direct & indirect) a geographically dispersed staff of 51 IT professionals, twelve federal employees - six GS-2210-14s, four GS-2210-13s, two GS-2210-12 & oversee an additional 39 staff (equivalent to GS-2210-11-14) from 7 labor contracts - Serve as ISSO for the Denver Data Center General Support System - DDC GSS, with oversight of my staff providing ISSO and SSO duties for their relevant portions of the environment. Aviation Management Local Area Network - AM-LAN GSS, Interagency Aviation System Local Area Network IAS-LAN GSS, and collaboration with peers and their direct report staff in their roles over the Reston LAN and DC LAN GSS and the related FISMA children and major systems we host, that inherit controls from the general support systems. - Experienced in advising senior executives on effective utilization of IT systems / solutions to meet business objectives. - I meet my goals, accomplish what is truly most important & empower staff to do the same. - Manage the System Software Administration Branch (SSAB) to execute the full range of SSAB disciplines to include; System Administration (Operating System Functions & Administration, Performance Monitoring & Tuning, Patch Management, Security Compliance, Operating System Testing & Directory Services to include Active Directory, RAC- F, and Enterprise Access Control Services) - Security Compliance as one of the 5 defined Roles and Responsibilities of my position – demonstrate compliance with applicable standards, and work to improve processes, and expand the breadth of the environment covered by proactive and detective monitoring actions. Traditional Patch Management, and audit of security controls have been improved through proactive monitoring for devices, system state, and vulnerabilities to provide ever increasing levels of awareness of the risks within our hosted environments. (Serve as a technical expert and consultant to agency personnel on Information Security Continuous Monitoring as defined by NIST standards and guidance.)
  • 8. Kevin L. Lucier Page 8 of 22  We work collaboratively with IT Security to transition from C&A (Certification & Accreditation methodologies to Continuous Monitoring, to replace point-in-time audits and compliance checks with a continuous monitoring program to help prioritize controls and provide visibility into current threats. “Information security continuous monitoring is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. The objective is to conduct ongoing monitoring of the security of an organization’s networks, information, and systems, and respond by accepting, avoiding/rejecting, transferring/sharing, or mitigating risk as situations change.” (NIST Special Publication 800-137 Draft December 2010) Serve as technical expert / subject matter expert - SME (and manage a large team of SMEs for their respective areas) on the four hosting related Operating Systems and the System Administration actions to design, plan, implement and manage IT systems as a major component of an appropriate operational security posture. - Three of the four remaining Roles and Responsibilities of my position directly relate to Information Security as well, with System Administration (Operating System Functions & Administration, Patch Management, Security Compliance, Operating System Testing & Directory Services all requiring direct and indirect expert level architecture design, operations & management that ensure compliance with security regulations, guidance, policy and controls and active participation in maintaining and improving the security posture of the hosted information systems. (participating in network and systems design to ensure implementation of appropriate systems security policies) Other examples include Access Management, Patch Management, Change Management, Vulnerability Management and Information Systems architecture and designs to ensure that the appropriate operational security posture is maintained for the information system(s) and/or major application(s). - Although we apply separation of duties / roles & responsibilities, and utilize these methods to ensure compliance, my staff and I demonstrate the mindset that we are all security professionals, and apply the same requirements, knowledge, skills and abilities toward our respective organizational roles and responsibilities. The training and certification requirements of my CP-34 Individual Development Plan, and the additional duties assignment as an ISSO, and an IAT and IAM prepared me to cross-train our new ISSO, from January through October, 2016 and to transition roles and assist in responding to requests and projects assigned to ISSO, Dale Bogle. (Provide expert technical, analytical, and managerial guidance for the planning, review, evaluation, implementation, coordination, and integration of DOI's information technology and identifies plans to maintain an effective information security program.) (Serve as a technical expert on the design and implementation of security controls on both internal and cloud computing based environments as specified by the National Institute of Standards and Technology (NIST) guidance.) (Serve as a technical expert and consultant to agency personnel on Information Security Continuous Monitoring as defined by NIST standards and guidance.) (Ensure that the appropriate operational security posture is maintained for the information system(s) and/or major application(s) assigned to that position.) (Interpret government-wide information security guidance as a means to establish standards, policies, guidelines, and procedures to ensure confidentiality, integrity, and availability of the information system.) - Manage schedules, workloads, priorities, deadlines, and deliverables to achieve positive results. - Provide essential 24x7 management with three Team Leads overseeing SSAB systems infrastructure across Windows Server, Unix (Solaris, Linux & z/Linux) Server & Mainframe (z/OS & z/VM) architectures, to include distributed systems, (x86 & SPARC), virtualized x86 (VMware & HyperV) & System Z / Mainframe (z/196- z/9 - z/10 , z/VM) platforms - Nominated by the Information Technology Directorate as the 2012 Interior Business Center Professional Employee of the Year, with some highlights provided below from my nomination by ITD senior leadership: - “Kevin has demonstrated an outstanding appreciation for the NBC's financial management goals. He continually makes recommendations for improvements, and cost savings. One of the finest examples of modernizing Financial and Business Management Practices is Kevin's very successful z/9 to z/196 Mini-Mainframe Migration Project. This follow-on to the project entails replacing the existing NBC IBM 2094- 604 z/9 Mainframe with an IBM 2817-506 z/196 (Mini) Mainframe for the purpose of "right-sizing" the z/OS operating system environment to fit current and anticipated client resource demands, while providing advanced IBM System/ z architectural services in reliability, availability, and serviceability. He was instrumental to the success of the production upgrade of the hosting environment for z/OS based mainframe applications hosted by NBC. Kevin's technical, project management, and leadership approach have helped make this project a success. This mission-critical, multi-line of business environment was required to quickly upgrade processor hardware, while "right-sizing" capacity in order to decrease costs and remain a viable hosting solution providing the NBC's Federal Personnel and Payroll system (FPPS), the Federal Financial System (FFS) applications as well as other applications hosted for other DOI bureaus. The planning and quick implementation of the new IBM z/196 mainframe, culminated in an extremely successful production implementation without impacting the services provided to clients.” (executing implementation and conversion support to clients migrating from legacy systems; coordinating the resolution of system issues arising from factors such as changes in legislation and agency policies; and experience with strategic planning to analyze financial processes and execute policy development) - “Responsible for the management of approximately 1700 servers, Operating System and Directory Services, the largest portion of the Hosting Operation.” - “Detail assignment providing Operation Management expertise for the OCIO ‘Operational Improvement’ Plan” - Developed staffing plan projections, and gave significant input into the ITD VERA/VSIP planning. - Met the FY12 and FY13 goals for SSAB staffing plan, decreasing staffing from 11 to 9 federal staff with the VSIP retirement of SSAB staff. As planned the staffing model has incorporated a heavier reliance upon contract staffing, but has taken advantage of existing federal staff on the team to cover necessary federal functions and oversight/reporting. - Worked collaboratively with peers to define a new ITD Hosting Service Offering and provided significant input and refinement to the Cost Model definition, with requirement definition, refinement and ROM presentation to EPA, & SBA. Kevin has demonstrated an outstanding appreciation for the NBC’s financial management goals. He manages ~55% (~$20M of the ~$36M) of the annual budget within Hosting Services. He was an integral contributor to the Virtualization Platform Business Case which provided the analysis and recommendations leading to the strategic decision to retire the zVM (mainframe based virtualized platform for Linux) environment and focus on x86 virtualization as the NBC’s preferred virtualization platform.
  • 9. Kevin L. Lucier Page 9 of 22  - Data Center Consolidation – ESC to USGS Move April 8th, 2013 marked the successfully completion of the colossal, three month project for the DOI’s Interior Business Center’s (IBC) data center relocation for its’ Enterprise Service Center (ESC) in Herndon, VA to the USGS Powell Center in Reston, VA. Obtained funding, and through consolidation by virtualization and decommissioning physical servers, we achieved a 53% reduction in data center space (2,500 square feet, down from 5,300) in Virginia, to provide efficiencies in power, cooling and hosting space requirements estimated at over $100K / year. Overall, IBC seized upon the opportunity to transform its’ IT consolidation success, and significantly raise our server virtualization ratio (from 15% to 89% within the ESC), while contributing to the Department’s objective to consolidate data centers and reduce its real estate footprint. This consolidation made possible the avoidance of a million dollar facility lease renewal, while avoiding approximately $283K in unfunded customer lifecycle requirements for server infrastructure. This monumental accomplishment demonstrates IBC’s commitment to reducing costs while maintaining high quality customer service, and through teamwork was accomplished according to a very detailed project plan, within budget and through coordination with over 100 federal stakeholders and vendors – with no unplanned outages / impacts to customers. - Further optimized the hosting operations through increased server virtualization, with the percentage of the 1652 hosted server environment raising from 23% to 51% virtualized since my arrival at NBC, despite largely unfunded lifecycle management plans. - Worked extensively on documenting, reviewing, and finalizing ITIL Process Flows originally began as a follow-on action for A-123 Audit, these processes have since been emulated by the DOI, OCIO (IT service frameworks (e.g. ITIL)) (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large, geographically dispersed hosting/data center environment.) - Nominated by the IT Directorate and selected for the NBC Technical Employee of the Quarter (Q3 FY12) - Conceived and led a cross-agency project to incorporate best-practice procedures and re-use of documentation, and templates for the NBC ITD Engineering Review Board from the Department of the Army, Fort Carson Network Enterprise Center. (Experience with the application of security principles to common structures, processes, and techniques of IT system development, operations and maintenance) - The following citations were taken from my nomination by ITD staff as the 2010 NBC Supervisor of the Year: "Kevin has displayed all the attributes of an exceptional supervisor while leading this large, dispersed organization which has contributed so significantly to the accomplishment of the NBC's Strategic Goals." "Kevin is a talented, effective & compassionate supervisor & leads the largest branch in ITD." "The total impact of his leadership, management & efforts extended for the welfare of the employees of his branch & the ITD are on par with the best supervisor's I have worked in my career extending over 30+ years in the military & federal civilian service." "Mr. Lucier continually displays an outstanding commitment to customer service." "Kevin's technical expertise & his ability to train, mentor & oversee SSAB has been & will continue to add significant value to the NBC workforce." "Mr. Lucier continually makes program decisions & recommendations that are aligned with Departmental needs." "His blending & balancing of effective technical oversight with consistent attention to the administrative, morale & other needs of his staff is exemplary." "Kevin made outstanding contributions to the continued improvement & success of the hosting business & overall IT service mission." - Change Agent - requested as detail assignment (temp promotion to 15) to the OCIO reporting to June Hartley under Service Delivery as the new "Operations Manager" position. Rather than 100% detail, a part-time "Consultant" type role, with about 10% of my time toward the OCIO "Operational Improvement" Plan was supported as better overall for the organization. I provided my recommendations & then made these into a Continuous Service Improvement Plan & have led efforts to complete action items. (IT service frameworks (e.g. ITIL)) - Requested as Subject Matter Expert (SME) for the Department's development of position descriptions for management positions in support of service areas. My assignment was as primary SME (of 3 SMEs DOI-wide) for the "Hosting" focus area. Developed draft PD & gave input to all relevant requests until assessment tool development was requested, whereby I requested dismissal as SME to prevent Conflict of Interest with future application toward these promotion potential positions. Verified concern of conflict of interest with NBC HR & NBC ADIR & completed all assignments prior to requesting dismissal from team. - Coordinates systems operations, management & engineering activities (NBC Infrastructure Operations Hosting Services -- Multi-tenancy Shared Service Provider) infrastructure including approximately 1800 servers, 1700 desktop computers, 400 network printers, 400 databases & 600 TB of enterprise storage) at two enterprise data centers (Denver Data Center - DDC - Denver, CO & Enterprise Service Center - ESC - Herndon, VA) & 10 smaller data centers supporting customers within the DOI (to include 3 primary locations & 18 remote / satellite offices) as well as 150 external federal agencies throughout the country. Ensure the customer's requirements are filled & kept IOSD Chief & ADIR aware of all decisions made & status of operations, to include any risks of impact to services. - Windows Server Administration - Windows 2003 / 2008 Servers, Active Directory Services for ~906 servers enterprise- wide, currently ~7% virtualized. - Unix / Linux Administration - Solaris 9/10 Servers (Solaris 10 Zones 120-340 VMs), RedHat Enterprise Linux (RHEL) 4 / 5.5 Servers ~ 932 Unix/Linux servers enterprise-wide, currently ~61% Virtualized - Mainframe / Systems Software - z/9 & z/800 Mainframes in a parallel sysplex Enterprise-class Multi-OS partitioned platform (z/OS 1.10/1.12) - DOI mainframe consolidated hosting, Federal Personnel & Payroll System (FPPS) support to DOI bureaus & numerous other Federal agencies, servicing 240,000+ accounts, 102 third-part systems software products supported - Virtualization Platforms: -- VMware (vSphere ESXi 4.1 Enterprise Plus) VM Platform Standard - preferred VM platform, Production & Non- Production Clusters per data center with defined security zones & 3-tiered architecture – VMware Administration ~ 200 VM Servers enterprise-wide, capacity for ~600 VMs -- IBM z/VM – RHEL virtualized on z/9 & z/10 mainframes – z/Linux (200 VMs, scaling down to 25 remaining) -- Oracle (Sun) Solaris Domains (physical hardware partitioning) & Zones/Containers (logical partitioning) -- Application Virtualization - Increased utilization per physical server, with licensing benefits through multi-instance per physical server / cluster
  • 10. Kevin L. Lucier Page 10 of 22  - Defined Patch Management Program integrates with Continuous Security & Compliance Monitoring & Change Management Programs, Patching schedules, published STIGs & post-patch procedures work symbiotically to keep servers within defined DOI standards, using published & exemplified procedures. Strengthened enterprise coordination & procedures to improve patch management of 3rd party (non-Microsoft) products in the Windows environments. On servers, this has resulted in Adobe Acrobat Reader, Flash & Java updates being released in accordance with defined critical patch procedures/deadlines & on desktops, the additional coordination & delegation of roles has improved patch management of these same products across the enterprise desktop environment. - Change Advisory Board (CAB) – Attend & serve as delegate for the IOSD Chief to chair the board that is responsible for coordination & consensus approval to changes of the IT infrastructure. Change Management (CM) is a related function that allows for orderly implementation of continuous operational improvements. (IT service frameworks (e.g. ITIL)) - Preparation, automation & training for Emergency Accountability of all SSAB staff w/ assistance for same within IOSD. Demonstrated extremely efficient automated capabilities during core & after hours accountability exercises. - Combined Federal Campaign Board Member for the Denver metropolitan area since 2009 - Volunteered & serve on Fort Carson’s Transition Assistance Program (TAP) Employer Panel 2010-13 - Conceived a plan to demonstrate the need for competition for the NBC VM architecture by developing & releasing a VM RFI. Utilized market research in standardizing ITD Virtual Hosting service offering, & in negotiating the Enterprise License Agreement / VMware Contract terms for cost effective current & projected requirements. - Reviewed VM capabilities, verified licensing information & developed costing model to allow NBC to offer virtualized servers that are more cost effective than the current virtual servers capitalizing on the DOI wide Microsoft volume licensing agreement to offer Microsoft HyperV virtualization. - NBC representative for the DOI Innovations & Efficiencies Team (DIET) Infrastructure Consolidation Servers & Storage Group – cross bureau team of 7 key members establishing technical & planning recommendations for DOI – continued involvement as the team integrated into DOI IT Transformation Team, recommendations & NBC datacall responses in support of DOI / OCIO projects/initiatives to meet the Department needs. (Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring according to NIST, OMB, and DHS guidance and framework. ) (Mastery of service provider managed or cloud computing technologies and the application of security controls within them.) - Cloud Computing - Significant project contribution to the DOI / NBC Cloud implementation. Cloud computing is a pay- per-use model for enabling available, convenient, on-demand network access to a shared pool of configurable computing resources. -- Significant priority & dedication toward the cloud service offering definition, design & implementation. I was part of the technical design, implementation, testing & even marketing of NBC's Cloud Service offerings. (Experience with the application of security principles to common structures, processes, and techniques of IT system development, operations and maintenance) (Mastery of service provider managed or cloud computing technologies and the application of security controls within them.) I provided demonstrations of capabilities for automated provisioning, monitoring & metering, on numerous occasions I orchestrated & coordinated these customer presentations with little lead time & amidst continued development & operations efforts. I was directly involved with technical implementation/administration though the majority of the time I served collaboratively & in oversight of team tasks. I provided input into the strategic vision & high level technical solutions & integration efforts. The automated provisioning of z/Linux guests within the Cloud Service offering is certainly an enormous example of the optimization of operational performance. Even with the thoroughly documented, efficient model that existed prior to this automation, the steps necessary to provision a virtual server were benchmarked as taking 114 minutes to complete (vs 1.5 months for physical server procurement & provisioning) & involved multiple staff. Through the efforts of the team & with near daily input from SSAB staff, the provisioning can be completed by one staff member in less than 20 minutes. -- Automated Provisioning: After manual administrator authorization is complete, self-service provisioning requests (via public website & Remedy workflow integration) quickly provided z/Linux virtual server instances on the Denver z/9 & the Herndon z/10 mainframes via automated provisioning, primarily using Tivoli Provisioning Manager (TPM), Tivoli Service Automation Manager (TSAM), EACS (TIM/TAM) integration & Citrix Netscaler Access Gateways. -- Monitoring System: Immediate, automated integration of newly provisioned virtual servers into the performance/availability monitoring system provided a “single pane of glass” view of (OS, App, DB) system performance & alerts, including select customer accessible dashboards & integration to enterprise monitoring & alert processes, primarily using IBM Tivoli Monitoring (ITM), Tivoli Data Warehouse (TDW), Tivoli Enterprise Portal (TEP) & numerous IBM Tivoli Composite Application Manager (ITCAM) agents (ITCAM for Server Management, ITCAM for Applications, ITCAM for WebSphere Application Server – WAS). -- Metering System: Immediate, automated integration of newly provisioned virtual servers into the utilization-centric metering system provided the collection of usage data needed to develop a chargeback billing system. The utilization for network bandwidth, memory, cpu & storage per virtual server & per customer were maintained utilizing IBM Tivoli Usage & Accounting Manager (ITUAM). -- Effective November 7, 2009, the first federal government cloud service offering was released – The NBC Cloud Computing website was activated for registering, ordering & provisioning the NBC's Infrastructure as a Service (IaaS) offering - NBC-GRID! Effective November 20, 2009, NBC’s Platform as a Service (PaaS) offering - NBC-STAGE was successfully launched. NBC’s first cloud computing customer (Social Security Administration) began benefitting from the capabilities this project has provided on January 4, 2010. On February 26, 2010 NBC launched Release 2 of our Cloud Computing Services. This set of offerings included significant process improvements & included NBC’s numerous Software as a Service (SaaS) offerings – NBC-APPS. A total of 384 IaaS offerings, 386 PaaS offerings & 12 SaaS offerings were available to customers for NBC Cloud Computing. Release 3 requirements were effectively scoped & prioritized before a change in senior leadership & a decision for NBC to focus upon the requirements of the DOI & the Department’s Innovations & Efficiencies Team (DIET) project. This change in focus & decision on virtualization platform (with recommendation from the Virtualization Platform Business Case) led to decisions to discontinue cloud release 3 & not to offer R1 & R2 services to additional customers outside DOI.
  • 11. Kevin L. Lucier Page 11 of 22  - Virtualization Platform Business Case - recommendation led to a decision to modify the NBC's virtualization platform standard, in order to capitalize on performance benefits & ensure cost avoidance through use of the least cost solution. Virtualization Platform Standard established utilizing VMware & stand-alone multi-instance DB Servers - Microsoft SCCM Implementation, an enterprise-wide (7 geographically dispersed locales) SMS migration - Implementation of initial hardware refresh, in conjunction with department mandated migration to Windows Server 2008 for all OS & BC Active Directory Domain Controllers, with newly developed NBC Windows 2008 Server STIGS - Serve as Task Area Lead and evaluation team member for the Systems Operation & Administration (SOA) staffing Contract, one of the Big 5 Contracts within NBC ITD. - My staff performs highly technical tasks, manage critical projects & participate in every IT mission within NBC, all while demonstrating some of the most effective customer support & teamwork within the organization - Provided technical expertise, complimenting the technical IT expertise & fostering collaboration on solutions. - Participated as member of the FPPS Business Case Team to evaluate options for FPPS with respect to FFS replacement impacting FPPS without ability to share cost of the mainframe platform. - I have taken the input of my staff & have begun steps toward establishing the Enterprise Capacity Management Team, with re-utilization of existing federal & contract staff within the mainframe team, currently performing these functions on the mainframe platform only, but trained & capable of initiating the effort & running the team with matrixed staffing from each of the hosting services functional silos. Formed as a subset of the Mainframe Team & by blending in SSAB UNIX, Windows & VMware staff as co-contributors to form a permanent functional capacity management group, I expect improvements to Operational Service Levels & improvements in the life cycle management program. We envision a panel of System Administrators meeting regularly with the Capacity Management Team to review meaningful capacity & performance events & collectively work the issues proactively - Serves as Acting Division Chief, Infrastructure Operations Services Division (IOSD), on a consistent basis, managing a staff of ~173 FTE's, to accomplish the NBC Hosting Services mission. Communicate technical & managerial guidance to Branch Chiefs, Team Leads, employees & contract personnel Loose Wire, LLC 406 East Park Ave. Anaconda, MT 59711 United States 09/1994 - Present Salary: ~$17,500.00 USD Per Year Hours per week: 1-5 Owner / Director of Technology Supervisor: Self Employed (719-210-2687) Okay to contact this Supervisor: Yes - Owner / Director of Technology, Public relations, System Administrator, NOC / Network Administrator, Postmaster, Listmaster, Webmaster & Hostmaster of a small Web Services company, providing customer focused services specializing in personal & small-business Web Services development, management & hosting services - Perform all levels of technical work (development, requirements definitions, administration, customer service, consulting, design, presentation, solutions development & user acceptance) and have trained staff to succeed in each area in my absence. - Provide all functions of business operations (client relations, sales, requirements definitions, sales, negotiations, licensing, procurement, logistics, financial, payroll, contract, scheduling, task assignment, staff supervision & contract oversight) – from program development to cross-training and assignment of staff for daily operations. - Application design & development in .NET-VB & C#, PHP, Python, Perl, C, C++, Java, Assembly, Basic, Visual Basic, Lisp, uPascal, JavaScript, VBScript, PowerShell & various shell scripts, in both procedural & object oriented-OOP methodologies, encompassing many different environments - Interactive website design, development, e-mail & hosting services, interactive web application coding utilizing HTML / DHTML, PHP, server side includes, css style sheets, Visual Basic & Java Scripting, Apache:ASP Active Server Pages, CFML Coldfusion Markup, Active-X controls, client & server side Java solutions, Perl CGI scripts - Maintain web servers & related TCP/IP network child processes; Apache, Bind DNS, ModPerl, Apache:ASP, Resin, Perl, Majordomo, Sendmail, Samba, ProFTPD, WU-FTPD, NFS Mounts, Frontpage Server Extensions & Log Analysis on all servers - Maintain Sun / Oracle SPARC Solaris, x86 Redhat Linux & Microsoft Windows 2003/2008 servers, schedule downtime to minimize user / customer impact, correct security vulnerabilities & train staff with user / customer requests - Information Systems consulting services, custom & ready-made applications, web applications, UNIX/Linux system security, administration & hosting services for local & national clients    
  • 12. Kevin L. Lucier Page 12 of 22  Department of the Army Network Enterprise Center (NEC) (formerly Directorate of Information Management - DOIM) Information Systems Division (ISD) 6151 Specker Ave. Bldg 1550 Fort Carson, CO 80913 United States 11/2006 - 04/2009 Salary: $76,981.00 USD Per Year Hours per week: 60 Series: 2210 Pay Plan: GS Grade:13 Chief, Systems Management Branch (Supervisory IT Specialist - SYSADMIN/NETWORK) (This is a federal job) Supervisor: Mr. Frank J. Davis (719-232-1197) Okay to contact this Supervisor: Yes - GS-13 equivalent, YC-2 position (pay setting 5% above permanent GS-12 position when reassigned) - Provide the full spectrum of Systems Management (Hosting Services); oversee Systems Administration, Data Center Management, Database / Storage / Enterprise Applications, Network Operations, Web Services, Executive Support, Desktop Management, Video Teleconferencing (VTC) & Tactical Operations - Supervise (direct & indirect) forty-six employees engaged in 24X7 information technology (IT) work; 2 GS-2210-12s, 19 GS-2210-11s, 1 YA-2210-02, 4 GS-2210-09s, 1 GS-1001-09 & 19 contractors equivalent to GS-2210-11s - My staff performs at an amazing level & have been exemplified & recognized (DOIM of the Year & Innovative IA Project) throughout the Army for their achievements with the DIACAP (Department of Defense Information Assurance Certification & Accreditation) process - Act as Contract Task Monitor & serve as Project Manager for multiple high-profile, critical IT projects on three Command & Control (C2) Networks (NIPRNet, SIPRNet, JWICS - the Army network environments dedicated to Unclassified, Secret Classified & Top Secret Classified data, respectively - Provide a vision & advocate for the future of the Ft Carson DOIM - Effectively use a combination of leadership styles, embodies "BE-KNOW-DO" Army leadership - Provide high-level technical expertise - As an early step in preparation for Continuous Monitoring to replace the DIACAP (Department of Defense Information Assurance Certification & Accreditation process, Department of the Army began to integrate similar requirements for training and certifications for Systems Administration and Network Administration specialties (later expanded across numerous parenthetical specialties to the Information Technology Specialist / 2210 series positions) that had previously been in place for GS and GG 2210(InfoSec) – Information Security specialists. The intent being to integrate the INFOSEC knowledge and experience into the Plans / Engineering and Integration, architecture and design of IT Systems, as well as into the Programs / Operations & Management (O&M) of Information Systems. Our successful history of DIACAP accreditations and tight collaboration with Information Assurance (IA) combined with additional training for my staff and I toward credentials ensured improvements to the security posture of Army Command & Control (C2) Networks (NIPRNet, SIPRNet, JWICS). Relevant development and certification requirements were to prepare the ITM civilian workforce to meet the demands of the Army of the 21st century, fostering mutual respect between fields / specialties to include higher headquarter accreditation teams, and led the way to consolidation and centralization of many continuous monitoring functions to NETCOM regional capabilities. Although we continued to apply separation of duties / roles & responsibilities, and utilize these methods to ensure compliance, my staff and I have developed within Department of the Army, Training and Doctrine Command (TRADOC), Career Program - CP-34, with the training, development and application of the mindset that we are all security professionals, and apply the same requirements, knowledge, skills and abilities toward our respective organizational roles and responsibilities. The training and certification requirements of my CP-34 Individual Development Plan (Please see Training section of resume below for CP-34 and DoD IA Workforce Management Objectives) applied to Systems Administration Roles, and the Chief of Systems position – ensuring the application of the NIST Risk Management Framework (RMF) to all of my responsibilities. This led to training, & credential testing for Certified Information Systems Security Professional (CISSP) and award of Associate of the (ISC)2 for CISSP – February 2009 - Through Department of Defense guidance, my position, and those of the majority of my staff were marked as required to comply with DoD 8570 IA Workforce Management , and designated with Information Assurance Technical (IAT) and Managerial (IAM) categories I, II, or III. The IAT category’s functions are cumulative. Thus, an IAT Level II or III position requires mastery of the functions of the preceding levels. We determined the identification and categorization of positions and certification of personnel conducting Information Assurance (IA) functions within the DoD workforce supporting the DoD Global Information Grid (GIG) per DoD Instruction 8500.2 8500.01. Starting in 2005, the referenced policy was in place, in 2007 interpretation and clarifications occurred that informed decisions and planning on position designations across the Fort Carson DOIM. In January, 2008, we had certification goals in place, and by Year Three (CY-09), 70 percent of the IA positions were filled with certified personnel. My position is designated as both an Information Assurance Technical (IAT) category III – IAT III, and Information Assurance Managerial (IAM) category II – IAM II. My CP-34 IDP included these goals toward DoD- approved information assurance workforce certifications appropriate for each category and level and appropriate operating system certification for information assurance technical positions. With the program intentions and requirements listed below, I was required to obtain and hold CISSP or Associate, and Security+ training, and certification. (Please see additional details under Training section of resume) - Team efforts were exemplified & recognized (DOIM of the Year & Innovative IA Project) throughout the Army for their achievements with the DIACAP (Department of Defense Information Assurance Certification & Accreditation) process
  • 13. Kevin L. Lucier Page 13 of 22  - One of five members of the Fort Carson IT Engineering Review Board (ERB) (Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring according to NIST, OMB, and DHS guidance and framework. ) (Mastery of service provider managed technologies and the application of security controls within them.) - One of eleven voting members of the Fort Carson IT Configuration Control Board (CCB) - Provide technical input & requisite data on Collaborative Information Environment (CIE) to the adopted Army CONUS- wide implementation plan of Office Communications Server (OCS) framework - Effectively & efficiently manage resources; responsible for the management of the Fort Carson IT Infrastructure & Operations. Manage the 100% accountability of the Data Center hand-receipt consisting of 6439 items (327 LIN), worth 79 million dollars, with no compensatory material loss. - Lean Six Sigma (LSS) Project Sponsor: Identified & developed project charters for DMAIC & JDI projects - Oversaw consolidation methodology for installation datacenter operations, including servers, network, storage & physical datacenter infrastructure. After installation consolidation, performed regional consolidation & began enterprise consolidation. - Evaluate the nature & scope of work to automate to determine the need for system development, mods or redesign - Execute the full range of human resources (including performance management) & fiscal responsibilities - Manage schedules, workloads, priorities, deadlines & deliverables to achieve positive results - Serve as a technical expert performing feasibility studies, which involve application of emerging computer technology to resolve unique information management requirements - Ensure the highest levels of availability & functionality of the data center / IT systems and services (Conduct analysis and interpretation of IT security policies and directives; and develop strategies, policies and procedures to ensure compliance and extensive knowledge of Department of the Interior, vendor managed external systems, or similar systems.) - Deputy / Alternate Division Chief, Information Systems Division (ISD), managing a staff of 70 FTE's, to accomplish the DOIM operations mission. Communicated both technical & managerial guidance to Branch Chiefs, Leads & employees Department of the Army Directorate of Information Management (DOIM) System Management Branch (SMB) 6151 Specker Ave. Bldg 1550 Fort Carson, CO 80913 United States 07/2005 - 11/2006 Salary: $62,557.00 USD Per Year Hours per week: 60 Series: 2210 Pay Plan: GS Grade: 12 Lead, Web Services / Web Architect (Information Technology Specialist-INET/SYSADMIN) (This is a federal job) Supervisor: Mr. Frank J. Davis (719-232-1197) Okay to contact this Supervisor: Yes - Web Services Lead, supervise & coordinate staffing for Web Services, a highly qualified team of six full time employees/contractors, act as Contract Task Monitor & Project Lead for multiple high profile, critical IT projects for both NIPRNet & SIPRNet - Serve as Programmer/Analyst - Resolves problems, coordinates work with others & makes technical decisions - Conduct needs analysis to define opportunities for new or improved applications, consult with users to identify requirements, conduct feasibility studies & trade-off analysis, define systems scope & objectives, develop overall functional & technical requirements & specifications, evaluate & recommend sources for systems components - Coordinate efforts between staff elements at all levels of the Ft Carson DOIM Interacts closely with Public Affairs Officer & PAO staff to ensure timely, interactive content with appropriate review & clearance for public dissemination via the web. Works closely with customers. - Engineered, tested & deployed a robust Collaboration Information Environment-CIE; utilizing Live Communication Server-LCS, a paired deployment of SIP (Session Initialization Protocol) enabled clients, Windows Messenger 5.1 with Office Communicator 2005, multiple hierarchal SharePoint 2003 portals/WSS sites with desktop integration/authentication & presence/awareness integration to LCS & all Office 2003 applications. Successfully lobbied to extend the CONUS Active Directory Schema for LCS. Administer CIE servers (Windows Server 2003) on VMware & serve as backup SA for VMware ESX / VMware Virtual Environment. - Designed & deployed Federated LCS Architecture. Piloted with FORSCOM & 1st Army HQ. Permitted IM, Audio/Visual & Presence & Awareness outside of the Fort Carson enclave - Administered Collaboration Information Enterprise servers on VMWare & served as SA for Web Services servers. Monitors server performance using performance monitoring tools, installs server upgrades. - Designed & implemented "Meet with the Commanding General" utilizing services from SPS 2003, LCS 2005 & Office Live Meeting. Enabled the Commanding General of Ft Carson to host real-time chat & visual presentations with up to 200 individuals from the Ft Carson & Colorado Springs community via the Internet. - Completed the dynamic web redesign per requirements of the Commanding General, to include use of SharePoint Portal Server for content delivery, enhancing the design of the public web presence. Decreased time-to-live & allowed for delegation of content edits for select portions of the web presence to PAO & Installation Emergency Ops Center - Garrison & Tactical SIPRNet Portal deployments in failover configurations utilizing IDM-T (Information Dissemination Management-Tactical) SharePoint Portal 2003, to provide Army Battle Command Systems (ABCS) - Attended & briefed the DA Collaboration Best of Breed Working Group to present & influence FORSCOM & III Corps best business practices on collaboration efforts within tactical environments - Alternate Branch Chief, System Management Branch – oversee a staff of forty employees.
  • 14. Kevin L. Lucier Page 14 of 22  Department of the Army Directorate of Information Management (DOIM) Engineering & Integration ( E&I) 6151 Specker Ave. Bldg 1550 Fort Carson, CO 80913 United States 10/2004 - 07/2005 Salary: $56,320.00 USD Per Year Hours per week: 50 Series: 2210 Pay Plan: GS Grade: 11 Systems Analyst (Information Technology Specialist-SYSANALYSIS/APPSW/INET/SYSADMIN) (This is a federal job) Supervisor: Mr. George Jessen (719-526-1300) Okay to contact this Supervisor: Yes - Selected for and served as Subject Matter Expert (SME), and Team Lead within a small (6 staff), dedicated Engineering and Integration (E&I) unit for the Fort Carson DOIM. (Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring according to DISA, NIST, OMB, and DHS guidance and framework. ) - Sole provider of Tier III Web Services, expert web technical advisor/trainer & on-call INET - Internet Specialist/Web Services Programmer-technical planning, designing, developing, testing, implementing & managing Internet, intranet & extranet components & applications development - Development of policies, procedures, training & guidelines related to web services - Project Lead to multiple Engineering Review Boards (SharePoint 2003 migration / SQL Architecture / Taxonomy / Live Communication Server-LCS / Web Services) - Project Coordinator / Integrator - provides direction & technical guidance on the integration & acquisition / development of Information Technology-IT solutions - Provide high-level technical expertise to accomplish analysis of options & development of the design for advanced systems, software & complex programming specifications - Engineered, tested & deployed a robust Collaboration Information Environment-CIE; utilizing Live Communication Server-LCS, a paired deployment of SIP (Session Initialization Protocol) enabled clients, Windows Messenger 5.1 with Office Communicator 2005, multiple (Internet/Public & IntraNet/ExtraNet) hierarchal SharePoint 2003 portals/WSS sites with desktop integration (NTLM/kerberos authentication) & presence/awareness integration to LCS & all Office 2003 applications. Successfully lobbied the CIO G6 & Tech CCB to extend the CONUS Active Directory Schema for LCS. Administer CIE servers (Windows Server 2003) on VMWare & serve as backup SA for ESX/VmWare environment - Systems Analyst - applies analytical processes to the planning, design & implementation of information systems for both SIPRNet & NIPRNet environments - Programmer Analyst-analyzes & refines requirements, planning & designing application architectures, developing, modifying & debugging code, documenting, testing, implementing & supporting applications software; "writes code" - Work with Web Services operations team to develop a scalable server architecture to support regional DOIM web services & provide for network, hardware & data failover - UNIX/Windows Systems Administrator, planning & coordinating the installation, testing, operation, troubleshooting & maintenance of hardware, operating systems & applications software (Problem Solving) - Defined & conducted engineering & testing on IT systems - Maintained awareness of new Research & Development (R&D) & advanced techniques in the INET specialty Department of the Army Directorate of Information Management (DOIM) Information Dissemination Branch (IDB) – Web Services 6151 Specker Ave. Bldg 1550 Fort Carson, CO 80913 United States 08/2003 - 10/2004 Salary: $47,421.00 USD Per Year Hours per week: 45 Series: 2210 Pay Plan: GS Grade: 09 Web Services Programmer / Web System Admin (Information Technology Specialist-INET/SYSADMIN) (This is a federal job) Supervisor: Ms. Vicki Craig (719-526-1008) Okay to contact this Supervisor: Yes - Served as Web Services Programmer/Analyst (non-supervisory) - Worked to develop, adopt, train & implement adherence to policies of standardization & design - Creates complex scripts or code; Responsible for analyzing, managing, or performing work necessary to plan, design, develop, acquire, document, test, implement, integrate, maintain, or modify systems that provide web services Develops & implements new applications & scripts - Primary Web Services Systems Administrator - Adapt & implement systems diagnostic & maintenance tools to ensure availability & functionality of all systems - Ensured compliance with Section 508 ADA, Public Affairs, Legal, OPSEC, Information Security, statutory & regulatory guidance at all levels of DOD - Provide Internet / Intranet / Extranet services for the greater Fort Carson area - Utilized DBA experience (Oracle, DB2, Microsoft SQL Server, MySQL) & web security expertise to scan, identify & correct SQL injection concerns in existing code, trained staff to prevent exploits
  • 15. Kevin L. Lucier Page 15 of 22  - Provided custom software solutions for the web environment, featuring Java Server Pages-JSP, Java Portlets / Servlets, Flash/Swish, DHTML, XHTML, css style sheets, VB & Java Scripting, Active Server Pages-ASP, SQL stored procedures, Coldfusion-CFML & Perl CGI scripts - Developed action plan for regional consolidation of hosting services specific to enterprise application / web services - planning, design, development, implementation & management - Coordinate efforts between staff elements at all levels of the Ft Carson DOIM Interacts closely with Public Affairs Officer & PAO staff to ensure timely, interactive content with appropriate review & clearance for public dissemination - Domain Admin - Served as System Administrator of IDB servers, advised & upgraded to blade infrastructure - Served as IBM WebSphere Administrator - designed, developed & deployed custom web portal solutions with WebSphere Portal (4.2 & 5.01) on WebSphere Application Server, Single Sign On-SSO & collaborative features (Quickplace & Sametime) - Integrated / implemented a redundant single source authentication via LDAP - SunOne Directory Server National Center for Appropriate Technology (NCAT) & NHT, Inc 3040 Continental Dr. Butte, MT 59701 United States 05/1999 - 08/2003 Salary: $41,384.00 USD Per Year Hours per week: 45 Web Technical Specialist II Supervisor: Ms. Mary Anne Skuletich (406-494-8649) Okay to contact this Supervisor: Yes - Oversaw Web Services, provided guidance, training & assistance to a team-10 web developers, 2 system administrators - Interactive Internet application design & Internet Services management for 23 federal & state funded websites, including domain spaces of 5 federal government agencies - Managed interactive Internet application design & Web Services for 23 internationally acclaimed federal & state funded websites, including domain spaces of The U.S. Departments of Energy, Housing & Urban Development, Department of Agriculture & Health & Human Services, as well as many State & Federal funded project domains. - Utilized SSI, css style sheets, CGI scripting in Perl or C, Active Server Pages, PHP, VBScript, JavaScript, CFML & server/client side Java to meet all webpage & application requirements Ensured functional, easily navigable, accessible (Section 508 compliant) webpages - Filled roles of System Administrator, NOC/Network Administrator & Systems Security Specialist Expertise with web, e- mail, DNS, telnet, SSH & FTP daemons - Proposed & developed formal telework program, then demonstrated success from CO home office (2002-03) Graduate School Office, Montana Tech of The University of Montana 1300 West Park Butte, MT 59701-8997 United States 03/1998 - 05/1999 Salary: ~$15,000.00 USD Per Year Hours per week: 25 Database Administrator-DBA / Information System Support Specialist Supervisor: John Brower, PhD (406-496-4128) Okay to contact this Supervisor: Yes - Oracle Database Administration Development of custom VB interface to SCT Banner tables via ODBC & SQL - Record-oriented, flat file & relational DB development, data querying & optimization, Oracle 8i for Unix - Lead for website & FTP server - Worked with content developers & other server admins to meet webpage & application requirements / design standards US ARMY Fort Carson, CO 80913 United States 05/1992 - 04/1997 Salary: ~$26,000.00 USD Per Year Hours per week: 50 Automated Logistics Supervisor, CPL(P) 92A20 Supervisor: MAJ Mark Vande Hei (719-282-0481) Okay to contact this Supervisor: Yes - Supervised & trained a seven member Information Systems (IS) staff to work as a team, organize workload & prioritize tasks to exceed section goals - System Administrator of a critical STAMIS logistics system, exceed down time goals & ensure data integrity - Systems Analyst-applies analytical processes to the planning, design & implementation of information systems - Recognized for leadership, excelled at Non-Commissioned Officer / Sergeant promotion board -SPC(P). - Earned recommendation to Warrant Officer Candidate School. - Conceived & implemented an information system to lessen strain on the Army's supply system that ultimately led to savings of over $750,000 in fiscal year 1995. - Granted first security clearance & served as Section Supervisor, responsible for maintaining sensitive & pilferage items with 100% accountability rate. - Automated Inventory Database Management Clerk – responsible for cost savings effort that automated distribution of $195,000,000 in class IX repair parts back into the supply system - Field-tested, evaluated & implemented a new government inventory management database / logistics data communication program in a mission essential logistical environment. - Special Qualification ID: A-Technical Intelligence
  • 16. Kevin L. Lucier Page 16 of 22    Education: Montana Tech of The University of Montana Butte, MT United States Bachelor's Degree 01/1998 - 05/2002 GPA: 2.74 of a maximum 4.0 Program GPA: 3.68 of a maximum 4.0 Credits Earned: 109 Semester hours Major: Computer Science, Business Process Development Relevant Coursework, Licenses & Certifications: Credits Course Title 3 CS-142 MIL Credit - Operating Systems 3 CS-242 MIL Credit - Data Communications & Networks 3 CS-141 Microcomputer Software 3 CS-210 Intro to Computer Science I 3 ENGL-104 English Composition 3 ES-321 Scientific & Tech Writing 3 HSS-174 Intro to Sociology 2 HSS-121 Principles of Speaking 3 CS-211 Intro to Computer Science II 2 CS-298 Internship in Computer Science sub for CS-491 (Internship in C.S.) 3 CS-215 Assembly Language Programming 3 CS-298 Internship in Computer Science sub for CS-491 (Internship in C.S.) 5 CS-301 Web-based Accelerated Intro Comp. Science I sub for CS-326 (Software Engineering II) 3 STS-139 Introduction to Logic 1 CS-250 Advanced Webpage Design 5 CS-302 Web-based Accelerated Intro Comp. Science II sub for CS-326 (Software Engineering II) 3 CS-354 UNIX, C & C++ 3 MATH-152 Calculus I 3 BS-120T Keyboarding I 4 CS-350 Independent Study in Computer Science sub for CS-365 (Database Management) 3 HSS-337 Professional Ethics 3 CS-331 Data Structures & Algorithms 3 CS-3166 Discrete Structures 3 CS-3326 Data Structures & Algorithms II 3 BUS-3616 Management 3 CS-3256 Software Engineering I 3 MATH-1530 Calculus II 3 CS-4016 Programming Languages 3 CS-4406 Computer Architecture 3 CS-4556 Artificial Intelligence 4 MATH-2510 Calculus III 3 MATH-3256 Matrices & Linear Algebra Montana State University Bozeman, MT United States Some College Coursework Completed 08/1991 - 05/1992 Major: General Studies Job Related Training: Course, Location / dL (Distance Learning) - Date Completed (# Hours) - FY 2017 Transit Benefit Integrity Awareness Training - 10/3/2016 1) - DEO 2016 Annual Ethics Training - 8/31/2016 (1) - IBC Personnel Security Branch Annual Security Awareness Training - 7/7/2016 (2) - Ethics Sweepstakes - 6/28/2016 (1) - Uniformed Services Employment and Reemployment Rights Act (USERRA) - 2016 Completed 6/27/2016 (1) - Veteran Employment Training for Hiring Managers - 2016 - 6/26/2016 (1) - 2016 Role Based Security Training (RBST) Self Certification - 6/26/2016 - Computer Security Incident Response Team (CSIRT) Overview 2016 - 6/26/2016 - Computer Security Incident Response Team (CSIRT) 2016 - 6/26/2016 - 2016 Role Based Security Training (RBST) Certification for SUPERVISORS ONLY - 6/26/2016 - DOI Introduction to Counterintelligence Self-Certification - 6/26/2016 - DOI Introduction to Counterintelligence 2016 - 6/26/2016 (1)
  • 17. Kevin L. Lucier Page 17 of 22  - VMware Certified Professional 5 - Data Center Virtualization (VCP5-DCV) certification qualifying exam with exam code VCP550. Certification of prior training for Professional Learning Credits - 6/10/2015 - 2016 Federal Information Systems Security Awareness+ Privacy and Records Management (FISSA+) - 5/31/2016 (3) - Floor monitor and first aid / CPR training - 2015 Federal Information Systems Security Awareness + Privacy and Records Management (FISSA+) - 6/3/2015 - 2015 Role Based Security Training (RBST) Self Certification - 6/3/2015 - DOI Introduction to Counterintelligence Self-Certification - 3/4/2015 - Purchase Card Annual Agreement of Responsibility 2015 - Implementing and Supporting Active Directory Infrastructure - in progress - .NET Remoting - dL via Skillport - in progress - Remoting with Visual Basic 2005 - dL via Skillport - in progress - Remoting with C# 2005 - dL via Skillport - in progress - Veteran Employment Training for Hiring Managers - 2015 - dL - 2/3/2015 - Uniformed Services Employment and Re-employment Rights Act (USERRA) - 2015 - dL - 2/3/2015 - Transit Benefit Integrity Training - FY 2015 - dL - 11/10/2014 - Thrift Savings Plan (TSP) at a Glance Training - 10/31/2014 - 2014 Role Based Security Training (RBST) - dL - 8/10/2014 - Identity, Presence, and Privacy - dL - 8/10/2014 - Providing Cloud Security - dL - 8/8/2014 - Social Engineering and Sniffing - dL - 3/31/14 - 2014 Federal Information Systems Security Awareness + Privacy and Records Management (FISSA+) - dL - 3/31/14 - Transit Benefit Integrity Training - FY 14 - dL -11/8/13 - FEMA Emergency Preparedness for Federal Employees - dL -10/3/13 - GSA SmartPay® Purchase Card Training (Cardholders & Approving Officials) - dL -10/3/13 - GSA SmartPay® Travel Card Training (Cardholders & Approving Officials) - dL -10/3/13 - The No FEAR Act - dL -10/3/13 - Veteran Employment Training for Hiring Managers - dL -10/3/13 - Purchase Card Annual Agreement of Responsibility 2013 - dL -10/3/13 - Charge Card Annual Agreement of Responsibility 2013 - dL -10/2/13 - DOI Charge Card Refresher Course - dL -10/2/13 - Role Based Security Training (RBST) Self Certification (2013) - dL - 7/30/13 - Cloud Computing Basics - dL - 7/30/13 - Computer Security Incident Response Training (CSIRT) - dL - 7/30/13 - 2013 Federal Information Systems Security Awareness + Privacy and Records Management (FISSA+) - dL - 7/30/13 - Uniformed Services Employment and Re-employment Rights Act (USERRA) - dL - 2/20/13 - Researched, prepared & submit (and resubmit / tracked) a request for constructive credit of the Advanced Course of Civilian Education System (CES) from The Army Management Staff College. The intent was to validate & document equivalence for training prerequisites for the Senior Executive Service (SES) Executive Core Qualifications (ECQ) - specifically in preparation for attendance at a future course offering of Continuing Education for Senior Leaders. Consideration after 2008 completion of CES Intermediate Course 09-1, Army Management Staff College, Processed through HQDA, G-37 for determination. Ft. Belvoir, VA - 12/7/12 (140) - Veteran Employment Training for Hiring Managers - dL - 10/16/12 - Managing Shared Calendars in Google Apps - dL - 10/16/12 - Google Email and Calendar Essentials Training for DOI - dL - 10/16/12 - Transit Benefit Integrity Training - FY 2013 - dL - 9/17/12 - VMware VMWorld 2012, San Francisco, CA - 8/30/12 (50) - Effective Performance Workshop - DOI University - 8/2/12 - Applying the Risk Management Framework to Federal Information Systems - dL - 7/20/12 - Computer Security Incident Response Training (CSIRT) - dL - 7/20/12 - VMware Power CLI, dL - 6/22/12 (16) - VMware Security / Network custom course, Denver, CO - 6/15/12 (40) - VMware vSphere Optimize & Scale vSphere 5, New York, NY - 6/8/12 (40) - VMware vCenter Site Recovery Manager: Install Configure Manage [V5.0], Wash, DC - 6/1/12 (16) - VMware vSphere Troubleshooting, dL - 5/25/12 (40) - VMware vSphere 5 Fastrack, Denver, CO - 5/18/12 (50) - FBMS Basic Reporting Course - dL - 4/13/12 (1) - Federal Information Systems Security Awareness + Privacy & Records Management FISSA+, dL - 4/13/12 (1) - 2011 Discrimination & Whistleblowing in the Workplace (No FEAR Act) - dL - 1/20/12 (1) - Charge Card Approving Official Refresher Training - dL - 1/11/12 (1) - FBMS Acquisition Receiver Course - dL - 11/7/11 (2) - FBMS Basic Navigation Course - dL - 11/7/11 (1) - VMworld -Completed 2 technical lab training sessions in preparation for Technical certifications, Las Vegas, NV - 10/21/11 (8)