SlideShare a Scribd company logo
1 of 3
Leonard J. “Len” Vickrey
NUCLEAR CYBER SECURITY SPECIALIST
PROFESSIONAL BIOGRAPHY
HighlyaccomplishedTechnologyProfessional
withoversixteenyears’experienceexcelling
withdynamic, growingfirmsintheOil&Gas,
PetrochemicalandUtilitymarkets.
25+ yearsof InformationTechnology
experience including15+ yearsof Regulatory
Compliance proficiency.Successful leadership
of cross-functional teams usingContent
ManagementSystems toattainregulatory
compliance forthe implementationof NERC
CIP Standards.
CareerincorporatesresponsibilitiesinCyber
Securityfora large International Petroleum
Company,includingCyberSecuritynetwork
assessments,NetworkVisioDrawings,
Firewalls,ServersandDataflowServices.
Decommissioningof Citrix serversthroughout
the SouthwestUSand International
InformationTechnology Managementfora
mid-size longdistance telephone company.
EstablishedandmaintainedITsecurity
policiesaswell as proceduresforpersonnel
and systems.
Expertise in,the followingareas, network
security,vulnerability,patch management,
policies&procedures,threatmonitoring,risk
assessments,regulatorycomplianceand
documentation.
CERTIFICATIONS / EDUCATION / TRAINING
 CCNA – CertifiedCiscoInstructor
 MSCE - NT 4 Completedthe Training
Course at Rice University
 MCTIP - Server2008 R2 Completedthe
TrainingCourse at Milestone Technical
 MCP – Windows95, MicrosoftCertified
Professional
 Dell CertifiedTeamLead,CertID.702:
2014 - Dell
 Dell CertifiedWorkstationTech,Cert ID.
3076: 2014 – Dell
 Dell CertifiedLaptop TechCertID. 3124:
2014 – Dell
 Dell CertifiedServerTechCertID. 3065:
2014 - Dell
 Dell CertifiedPrinterTechCertID.3103:
2014 - Dell
 Dell CertifiedWindows8Tech CertID.
3386: 2014 – Dell
 Dell Pointof Sale TechCertID. 447:
2014 – Dell
 MCTIP/MCSE Program, Server2008 R2/
Server2012: 2013 - Milestone Technical
 CISCOCCNA CertifiedInstructor: 2002 -
WCJC
 MCSE NT 4.0 Program:2000 – Rice
University
 MCP MicrosoftWindows95: 2000 –
Rice University
 A+ NetworkingAdvancedComputer
Repairand Diagnostics:1998 – Houston
Community
Leonard J. “Len” Vickrey
Leidos Engineering, LLC | 2
PROJECT MANAGEMENT
 UST Management:1998 -TexasA&M
 Project Management:1989 - Georgia
Tech University
 Industrial Hygiene: 1990 - Universityof
Colorado
PROFESSIONAL EXPERIENCE
NuclearCyber SecuritySpecialist
Leidos Engineering,Houston, TX 2014 – Present
 SeniorTechnical WriterforNERCCIP
Version3to Version5, for a $ 74M,
Mutli-RegionLarge UtilityCompany
Project.
 Conductinterview withclientSME’sfor
GAP AnalysisandProcedure review.
 DevelopProceduresandProcessto
meetCIPStandardsCIP-002-5 through
CIP-014-5.
 OnboardingandTrainingof all
Technical Writers.
 Creationof MS Word Templatesfor
Procedure formatconsistency.
Information TechnologyConsultant/Microsoft
MCSE Instructor
Tel-Data Group,Richmond,TX 2014 – 2014
 Dell CertifiedTechnicalLead,Desktop&
Laptop TechnicianforVariousBanks,
Windows7 and Windows8
Deployments.
 Microsoft2008 R2/2012 Server
InstructorConductedstudent
assessmentandtestingand
educational/vocational goal settingto
assignedstudents.
 ConductedMicrosoftServer2008 R2,
trainingat CampLejeune,NCto
Marinesand DOD CyberSecurity
Officers.
 ConductedMicrosoftSQLServer2008
R2, trainingat Camp Lejeune,NCto
Marinesand DOD CyberSecurity
Officers.
 MicrosoftWindows7, trainingat
Newport,RINaval Base to Navyand
DOD CyberSecurityOfficers.
NERC CIP Analyst / Project Coordinator
Alitek Consulting,Houston,TX 2011 - Dec.
2013
 Completedall required tasksforthe
designand implementationof the
OpenTextLivelink EnterpriseContent
Management(ECM) for the NERC CIP
Program on-time andunderbudgetas
ProjectManagement.
 DevelopedandimplementedNERCCIP
Policies,Procedures,Workflows,
NetworkDiagrams,andBuiltNetwork
Design.
 NERC CIPMatrix’swithFunctional
SegmentationsandDocumentationof
the SCADA Networkasthe onsite
consultanttoEDPR NA,a large Wind
Energypowercompany.
Cyber SecurityConsultant/ Documentation
Specialist
 Assembled, reviewedandprovided
appropriate CyberSecurity.
 DocumentationforOXYGlobal Network
Secure Network.
 Performedandcoordinatedremoteand
onsite networkdiscovery,Visio
Drawingsof Network,Firewalls,Servers
and Dataflow Services,inadditionto
installationof firewallsand
decommissioningof Citrix servers,in
Texas,New Mexico,Colorado,California
and Qatar.
SeniorNetwork & Systems Consultant
Tel-Data Group,Richmond,TX 2005 – 2011
Leonard J. “Len” Vickrey
Leidos Engineering, LLC | 3
 Sales/ConsultedandinstalledMicrosoft
Exchange 2000, 2003, 2007, Microsoft
Server2000, 2003, 2008, MicrosoftSQL
2005, TrendMicro SMB Server
Antivirus,VERITASBackup,Cisco
Firewalls,Dell Servers,LinksysNAS
Servers,VOIPsystemsandnetworks.
 Installed,configuredandprovided
hands-ontrainingforclients’
accountingsystemsinPeachtree and
QuickbooksEnterprise.Clientsincluded
Real Estate Companies,Construction
Companies,Oil FieldServices,Insurance
Agents,TransportationCompaniesand
Doctor’sOffices.
 IT Administrationof MicrosoftServer
2000 through2008 R2, includingActive
Directory,site replication,diskimaging,
anti-virus,backup/restorefunctions,
VPN connections,MPLSCircuit, PBX
Systems,CiscoRouters,Firewallsand
Switches.
InformationTechnology Manager
TransTech Solutions,Houston,TX 2002 -2005 2002 -2005
 ProvidednetworkadministrationforNT
4.0, 2000 & 2003 servers,Exchange 5.5
and 2000 servers,SQL2000
Administration,Veritas9.1backup,
Nortonand TrendMicro Server
Antivirussuites,2000, XPworkstations,
Office 2000, XP,2003, setup PocketPC,
withExchange ActivSync,andwireless
access points.
 Managed all IT projectstoinclude the
interface withall longdistance
telephone,internetproviders,DSLand
T-1 service,telephoneservicevendors,
SQL database consultants,hardware
and software reviewsandpurchases.
 Managed andresolvedall technical
issueswiththe clientPeachtree and
QuickBooks accountprograms,
includingyear-endclosing.
Cisco CCNAInstructor
WhartonCountyCommunityCollege,
Richmond,TX 2001- 2002
 Completedandtaughtthe Cisco
Certified NetworkAssociate course asa
CertifiedCisco Network Instructor.
 Course material includeddesign,
installation,cabling,protocol,and
routerconfiguration,TCP/IP,LAN,
WAN,the use of securityfeaturesand
the managementof networksystems.
Project Manager / Network Administrator Law
Engineering,Houston,TX 1998 - 2000
 Installed,configuredandprovided
hands-ontrainingforall Network
administration,NTservers,NT
workstationsandWindows95 and98
workstationsasthe onsite Project
Managementforvariouscommercial
projects.
 Installed,configuredandprovided
hands-ontrainingforclientExchange
email administrationandOutlookmail.
 As the IT Administratordevelopedand
installedServerbackups,monitored
performance,andperformednetwork
diagnostics.
 Installed,maintainedandprovided
troubleshootingforall desktop
hardware,software,colorprinters,
laserprinters,Ciscorouters,and
switches.

More Related Content

What's hot

Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Cloud Native Day Tel Aviv
 
jtsec Arqus Alliance presentation
jtsec Arqus Alliance presentationjtsec Arqus Alliance presentation
jtsec Arqus Alliance presentationJavier Tallón
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps WorldCA Technologies
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinZivaro Inc
 
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production EnvironmentDevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production EnvironmentAdhitya Hartowo
 
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018Adhitya Hartowo
 
Integrate Security into DevOps
Integrate Security into DevOpsIntegrate Security into DevOps
Integrate Security into DevOpsTechWell
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital SecurityShawn Wells
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsDeborah Schalm
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceTej Luthra
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateInfosec
 
ONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsNetcetera
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersDevOps.com
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryTim Mackey
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyDerek E. Weeks
 

What's hot (20)

Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
 
jtsec Arqus Alliance presentation
jtsec Arqus Alliance presentationjtsec Arqus Alliance presentation
jtsec Arqus Alliance presentation
 
File1
File1File1
File1
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production EnvironmentDevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production Environment
 
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Integrate Security into DevOps
Integrate Security into DevOpsIntegrate Security into DevOps
Integrate Security into DevOps
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management Teams
 
SDN-Security
SDN-SecuritySDN-Security
SDN-Security
 
Resume
ResumeResume
Resume
 
The Future of DevSecOps
The Future of DevSecOpsThe Future of DevSecOps
The Future of DevSecOps
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
 
ONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web Applications
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 

Viewers also liked

Retail reusable infographic v3 ppt
Retail reusable infographic v3 pptRetail reusable infographic v3 ppt
Retail reusable infographic v3 pptearthwisebags
 
More than a feeling second draft (1)
More than a feeling second draft (1)More than a feeling second draft (1)
More than a feeling second draft (1)danhops888
 
Actividades para el proyecto tictindeando
Actividades para  el proyecto tictindeandoActividades para  el proyecto tictindeando
Actividades para el proyecto tictindeandodiegohenry2015
 
“¿Cómo diseñar y elaborar proyectos?” Subsecretaría General de Gobierno. Gobi...
“¿Cómo diseñar y elaborar proyectos?” Subsecretaría General de Gobierno. Gobi...“¿Cómo diseñar y elaborar proyectos?” Subsecretaría General de Gobierno. Gobi...
“¿Cómo diseñar y elaborar proyectos?” Subsecretaría General de Gobierno. Gobi...Fútbol Formativo
 

Viewers also liked (10)

Grupo 3
Grupo 3Grupo 3
Grupo 3
 
Retail reusable infographic v3 ppt
Retail reusable infographic v3 pptRetail reusable infographic v3 ppt
Retail reusable infographic v3 ppt
 
Virus informaticos
Virus informaticosVirus informaticos
Virus informaticos
 
More than a feeling second draft (1)
More than a feeling second draft (1)More than a feeling second draft (1)
More than a feeling second draft (1)
 
Ana lucia alvarez a. actividad 1 2 mapc
Ana lucia alvarez a. actividad 1 2 mapcAna lucia alvarez a. actividad 1 2 mapc
Ana lucia alvarez a. actividad 1 2 mapc
 
Actividades para el proyecto tictindeando
Actividades para  el proyecto tictindeandoActividades para  el proyecto tictindeando
Actividades para el proyecto tictindeando
 
REMAX DWELL Truth
REMAX DWELL TruthREMAX DWELL Truth
REMAX DWELL Truth
 
Deniarley respostas
Deniarley respostasDeniarley respostas
Deniarley respostas
 
“¿Cómo diseñar y elaborar proyectos?” Subsecretaría General de Gobierno. Gobi...
“¿Cómo diseñar y elaborar proyectos?” Subsecretaría General de Gobierno. Gobi...“¿Cómo diseñar y elaborar proyectos?” Subsecretaría General de Gobierno. Gobi...
“¿Cómo diseñar y elaborar proyectos?” Subsecretaría General de Gobierno. Gobi...
 
La otra cara de la moneda, la inmigración
La otra cara de la moneda, la inmigraciónLa otra cara de la moneda, la inmigración
La otra cara de la moneda, la inmigración
 

Similar to Nuclear cyber security specialist Leonard J. Vickrey's extensive IT experience

Cyber security course in Kerala , Kochi
Cyber security course in Kerala ,  KochiCyber security course in Kerala ,  Kochi
Cyber security course in Kerala , Kochiamallblitz0
 
Rodger+Berlins+Resume+1.15
Rodger+Berlins+Resume+1.15Rodger+Berlins+Resume+1.15
Rodger+Berlins+Resume+1.15Rodger Berlin
 
Lerman, gerald 1
Lerman, gerald 1Lerman, gerald 1
Lerman, gerald 1JerryLerman
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdfarjunnegi34
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resumeGreg Yee
 
Minal Wankhede
Minal WankhedeMinal Wankhede
Minal Wankhedempatke
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResumeNadia Pryadko
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Training
 
NOC Engineer Skills and Responsibilities to Be a NOC Expert
NOC Engineer Skills and Responsibilities to Be a NOC ExpertNOC Engineer Skills and Responsibilities to Be a NOC Expert
NOC Engineer Skills and Responsibilities to Be a NOC ExpertInfrassist NOC Services
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 

Similar to Nuclear cyber security specialist Leonard J. Vickrey's extensive IT experience (20)

Cyber security course in Kerala , Kochi
Cyber security course in Kerala ,  KochiCyber security course in Kerala ,  Kochi
Cyber security course in Kerala , Kochi
 
Rodger+Berlins+Resume+1.15
Rodger+Berlins+Resume+1.15Rodger+Berlins+Resume+1.15
Rodger+Berlins+Resume+1.15
 
Profile-Dharmesh Prajapati
Profile-Dharmesh PrajapatiProfile-Dharmesh Prajapati
Profile-Dharmesh Prajapati
 
Lerman, gerald 1
Lerman, gerald 1Lerman, gerald 1
Lerman, gerald 1
 
Resume_Jaison
Resume_JaisonResume_Jaison
Resume_Jaison
 
Dinesh_Resume
Dinesh_ResumeDinesh_Resume
Dinesh_Resume
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdf
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resume
 
Minal Wankhede
Minal WankhedeMinal Wankhede
Minal Wankhede
 
IT Network
IT NetworkIT Network
IT Network
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResume
 
Waldo Durán
Waldo DuránWaldo Durán
Waldo Durán
 
Waldo DuráN
Waldo DuráNWaldo DuráN
Waldo DuráN
 
Waldo Duran
Waldo DuranWaldo Duran
Waldo Duran
 
IT system and network administrator
IT system and network administratorIT system and network administrator
IT system and network administrator
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 
NOC Engineer Skills and Responsibilities to Be a NOC Expert
NOC Engineer Skills and Responsibilities to Be a NOC ExpertNOC Engineer Skills and Responsibilities to Be a NOC Expert
NOC Engineer Skills and Responsibilities to Be a NOC Expert
 
Luc resume
Luc resumeLuc resume
Luc resume
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Torben Verdich Resume TS-SCI
Torben Verdich Resume TS-SCITorben Verdich Resume TS-SCI
Torben Verdich Resume TS-SCI
 

Nuclear cyber security specialist Leonard J. Vickrey's extensive IT experience

  • 1. Leonard J. “Len” Vickrey NUCLEAR CYBER SECURITY SPECIALIST PROFESSIONAL BIOGRAPHY HighlyaccomplishedTechnologyProfessional withoversixteenyears’experienceexcelling withdynamic, growingfirmsintheOil&Gas, PetrochemicalandUtilitymarkets. 25+ yearsof InformationTechnology experience including15+ yearsof Regulatory Compliance proficiency.Successful leadership of cross-functional teams usingContent ManagementSystems toattainregulatory compliance forthe implementationof NERC CIP Standards. CareerincorporatesresponsibilitiesinCyber Securityfora large International Petroleum Company,includingCyberSecuritynetwork assessments,NetworkVisioDrawings, Firewalls,ServersandDataflowServices. Decommissioningof Citrix serversthroughout the SouthwestUSand International InformationTechnology Managementfora mid-size longdistance telephone company. EstablishedandmaintainedITsecurity policiesaswell as proceduresforpersonnel and systems. Expertise in,the followingareas, network security,vulnerability,patch management, policies&procedures,threatmonitoring,risk assessments,regulatorycomplianceand documentation. CERTIFICATIONS / EDUCATION / TRAINING  CCNA – CertifiedCiscoInstructor  MSCE - NT 4 Completedthe Training Course at Rice University  MCTIP - Server2008 R2 Completedthe TrainingCourse at Milestone Technical  MCP – Windows95, MicrosoftCertified Professional  Dell CertifiedTeamLead,CertID.702: 2014 - Dell  Dell CertifiedWorkstationTech,Cert ID. 3076: 2014 – Dell  Dell CertifiedLaptop TechCertID. 3124: 2014 – Dell  Dell CertifiedServerTechCertID. 3065: 2014 - Dell  Dell CertifiedPrinterTechCertID.3103: 2014 - Dell  Dell CertifiedWindows8Tech CertID. 3386: 2014 – Dell  Dell Pointof Sale TechCertID. 447: 2014 – Dell  MCTIP/MCSE Program, Server2008 R2/ Server2012: 2013 - Milestone Technical  CISCOCCNA CertifiedInstructor: 2002 - WCJC  MCSE NT 4.0 Program:2000 – Rice University  MCP MicrosoftWindows95: 2000 – Rice University  A+ NetworkingAdvancedComputer Repairand Diagnostics:1998 – Houston Community
  • 2. Leonard J. “Len” Vickrey Leidos Engineering, LLC | 2 PROJECT MANAGEMENT  UST Management:1998 -TexasA&M  Project Management:1989 - Georgia Tech University  Industrial Hygiene: 1990 - Universityof Colorado PROFESSIONAL EXPERIENCE NuclearCyber SecuritySpecialist Leidos Engineering,Houston, TX 2014 – Present  SeniorTechnical WriterforNERCCIP Version3to Version5, for a $ 74M, Mutli-RegionLarge UtilityCompany Project.  Conductinterview withclientSME’sfor GAP AnalysisandProcedure review.  DevelopProceduresandProcessto meetCIPStandardsCIP-002-5 through CIP-014-5.  OnboardingandTrainingof all Technical Writers.  Creationof MS Word Templatesfor Procedure formatconsistency. Information TechnologyConsultant/Microsoft MCSE Instructor Tel-Data Group,Richmond,TX 2014 – 2014  Dell CertifiedTechnicalLead,Desktop& Laptop TechnicianforVariousBanks, Windows7 and Windows8 Deployments.  Microsoft2008 R2/2012 Server InstructorConductedstudent assessmentandtestingand educational/vocational goal settingto assignedstudents.  ConductedMicrosoftServer2008 R2, trainingat CampLejeune,NCto Marinesand DOD CyberSecurity Officers.  ConductedMicrosoftSQLServer2008 R2, trainingat Camp Lejeune,NCto Marinesand DOD CyberSecurity Officers.  MicrosoftWindows7, trainingat Newport,RINaval Base to Navyand DOD CyberSecurityOfficers. NERC CIP Analyst / Project Coordinator Alitek Consulting,Houston,TX 2011 - Dec. 2013  Completedall required tasksforthe designand implementationof the OpenTextLivelink EnterpriseContent Management(ECM) for the NERC CIP Program on-time andunderbudgetas ProjectManagement.  DevelopedandimplementedNERCCIP Policies,Procedures,Workflows, NetworkDiagrams,andBuiltNetwork Design.  NERC CIPMatrix’swithFunctional SegmentationsandDocumentationof the SCADA Networkasthe onsite consultanttoEDPR NA,a large Wind Energypowercompany. Cyber SecurityConsultant/ Documentation Specialist  Assembled, reviewedandprovided appropriate CyberSecurity.  DocumentationforOXYGlobal Network Secure Network.  Performedandcoordinatedremoteand onsite networkdiscovery,Visio Drawingsof Network,Firewalls,Servers and Dataflow Services,inadditionto installationof firewallsand decommissioningof Citrix servers,in Texas,New Mexico,Colorado,California and Qatar. SeniorNetwork & Systems Consultant Tel-Data Group,Richmond,TX 2005 – 2011
  • 3. Leonard J. “Len” Vickrey Leidos Engineering, LLC | 3  Sales/ConsultedandinstalledMicrosoft Exchange 2000, 2003, 2007, Microsoft Server2000, 2003, 2008, MicrosoftSQL 2005, TrendMicro SMB Server Antivirus,VERITASBackup,Cisco Firewalls,Dell Servers,LinksysNAS Servers,VOIPsystemsandnetworks.  Installed,configuredandprovided hands-ontrainingforclients’ accountingsystemsinPeachtree and QuickbooksEnterprise.Clientsincluded Real Estate Companies,Construction Companies,Oil FieldServices,Insurance Agents,TransportationCompaniesand Doctor’sOffices.  IT Administrationof MicrosoftServer 2000 through2008 R2, includingActive Directory,site replication,diskimaging, anti-virus,backup/restorefunctions, VPN connections,MPLSCircuit, PBX Systems,CiscoRouters,Firewallsand Switches. InformationTechnology Manager TransTech Solutions,Houston,TX 2002 -2005 2002 -2005  ProvidednetworkadministrationforNT 4.0, 2000 & 2003 servers,Exchange 5.5 and 2000 servers,SQL2000 Administration,Veritas9.1backup, Nortonand TrendMicro Server Antivirussuites,2000, XPworkstations, Office 2000, XP,2003, setup PocketPC, withExchange ActivSync,andwireless access points.  Managed all IT projectstoinclude the interface withall longdistance telephone,internetproviders,DSLand T-1 service,telephoneservicevendors, SQL database consultants,hardware and software reviewsandpurchases.  Managed andresolvedall technical issueswiththe clientPeachtree and QuickBooks accountprograms, includingyear-endclosing. Cisco CCNAInstructor WhartonCountyCommunityCollege, Richmond,TX 2001- 2002  Completedandtaughtthe Cisco Certified NetworkAssociate course asa CertifiedCisco Network Instructor.  Course material includeddesign, installation,cabling,protocol,and routerconfiguration,TCP/IP,LAN, WAN,the use of securityfeaturesand the managementof networksystems. Project Manager / Network Administrator Law Engineering,Houston,TX 1998 - 2000  Installed,configuredandprovided hands-ontrainingforall Network administration,NTservers,NT workstationsandWindows95 and98 workstationsasthe onsite Project Managementforvariouscommercial projects.  Installed,configuredandprovided hands-ontrainingforclientExchange email administrationandOutlookmail.  As the IT Administratordevelopedand installedServerbackups,monitored performance,andperformednetwork diagnostics.  Installed,maintainedandprovided troubleshootingforall desktop hardware,software,colorprinters, laserprinters,Ciscorouters,and switches.