SlideShare a Scribd company logo
1 of 1
Perri Nejib
Independent Consultant/former Sr Fellow
perri.nejib@icloud.co
Ms Nejib has over 30 years of system engineering and program protection experience and over
25 years of program technical leadership and DoD acquisition management experience. She
holds senior certifications in systems engineering/ESEP, defense acquisition processes/DAWIA,
cyber/info assurance/CISSP, privacy/CIPM and was named a Lockheed Martin Fellow in 2010
and Sr Fellow in 2013. She served as chair of the Cyber Fellows Action Team and co-chaired the
Security Engineering Community of Practice at Lockheed. Her focus has been strategic cyber
and IT technology planning, development and tech transition. She is the co-inventor of the
Secure Engineering Assurance Model (SEAM) TM which addresses building security in across
the entire lifecycle of a program and can be used across a business and successfully applied to
diverse customer organizations. She has implemented SEAM TM successfully and is currently
working with the International Council of System Engineering/INCOSE and the National
Defense Industry Association/NDIA to take concepts from SEAM TM and develop system
security engineering processes and tools that can be universally adopted. The goal is to help
advance complex systems and organizations by integrating security from the start and throughout
the system engineering lifecycle involving all levels of people, process and technology. Ms Nejib
is a subject matter expert in defense, intelligence and cybersecurity domains and has provided
consulting and technical leadership in civil and commercial domains as well. Through her
positions of increasing responsibility (Technical Lead, Technical Director, CTO & Fellow), she
has provided technical and management (across diverse and dispersed teams) support in the areas
of systems and security engineering. In these areas, she has concentrated on architecture
development and implementation to promote interoperability, connectivity, modernization and
cybersecurity between the tactical and national community. She has also supported
Transformation efforts and enterprise management towards developing and interfacing legacy
and future systems to the Global Information Grid.
Ms Nejib has been involved with directing and advancing cybersecurity research with the
University of Maryland and both Warwick and Oxford Universities in the UK. She also serves as
a cyber curriculum review industry member for Anne Arundel Community College’s Cyber and
Information Security Program as well as the Center for Applied Technology for the Anne
Arundel County Public Schools. Ms Nejib was recently named to the Advisory Board for the
Women in Cybersecurity/WiCyS organization.
Prior to becoming a contractor, she was employed by the U.S. Army Research Laboratory. She
held positions there as an electronics engineer, senior technical lead, project manager and Deputy
Science Advisor to the XVIII Airborne Corps. Extensive exposure to operational and field
support through successful execution of numerous quick reaction projects was accomplished.
Ms Nejib holds a Masters Degree in Electrical Engineering from Johns Hopkins University and
B.S.E.E. from Wilkes University. She is a senior member in the Society of Women Engineers,
IEEE, AOC, ISC2, IAPP, INCOSE, NDIA and AFCEA organizations and leads numerous
STEM activities in the Washington DC area, including chairing state Skills USA competitions in
computer security. Her outside interests include playing ice hockey and performing volunteer
work with the South River Federation.

More Related Content

What's hot

Supervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projectsSupervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projectsArun Singh
 
MatthewNelson2015Resume
MatthewNelson2015ResumeMatthewNelson2015Resume
MatthewNelson2015ResumeMatthew Nelson
 
SBS Internship - Presentation
SBS Internship - PresentationSBS Internship - Presentation
SBS Internship - PresentationChristian Ries
 
John Coleman resume 5.30.15
John Coleman resume 5.30.15John Coleman resume 5.30.15
John Coleman resume 5.30.15John Coleman
 
Recommendation_CurtisKoh
Recommendation_CurtisKohRecommendation_CurtisKoh
Recommendation_CurtisKohCurtis Koh
 
Scope of deep learning
Scope of deep learningScope of deep learning
Scope of deep learningPadmaSelvaraj4
 
Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...ijdpsjournal
 
Dang et al. (2013), "Contextual difference and intention to perform informati...
Dang et al. (2013), "Contextual difference and intention to perform informati...Dang et al. (2013), "Contextual difference and intention to perform informati...
Dang et al. (2013), "Contextual difference and intention to perform informati...tduy0506
 
Resume_TanPham
Resume_TanPhamResume_TanPham
Resume_TanPhamTan Pham
 
Cyber security innovation_imho v4
Cyber security innovation_imho v4Cyber security innovation_imho v4
Cyber security innovation_imho v4W Fred Seigneur
 
ITE-Journal-OpEd-April2015
ITE-Journal-OpEd-April2015ITE-Journal-OpEd-April2015
ITE-Journal-OpEd-April2015Vincent Mayeda
 
Teori 1 pengantar keamanan
Teori 1 pengantar keamananTeori 1 pengantar keamanan
Teori 1 pengantar keamananSyaiful Ahdan
 
Become a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsBecome a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsMetro Technology Centers
 

What's hot (20)

Supervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projectsSupervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projects
 
MatthewNelson2015Resume
MatthewNelson2015ResumeMatthewNelson2015Resume
MatthewNelson2015Resume
 
SBS Internship - Presentation
SBS Internship - PresentationSBS Internship - Presentation
SBS Internship - Presentation
 
John Coleman resume 5.30.15
John Coleman resume 5.30.15John Coleman resume 5.30.15
John Coleman resume 5.30.15
 
Recommendation_CurtisKoh
Recommendation_CurtisKohRecommendation_CurtisKoh
Recommendation_CurtisKoh
 
Staying
StayingStaying
Staying
 
CV
CVCV
CV
 
AAS Cybersecurity 2 pages
AAS Cybersecurity 2 pagesAAS Cybersecurity 2 pages
AAS Cybersecurity 2 pages
 
Resume
ResumeResume
Resume
 
Scope of deep learning
Scope of deep learningScope of deep learning
Scope of deep learning
 
Mohamed-Fathy
Mohamed-FathyMohamed-Fathy
Mohamed-Fathy
 
Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...
 
Dang et al. (2013), "Contextual difference and intention to perform informati...
Dang et al. (2013), "Contextual difference and intention to perform informati...Dang et al. (2013), "Contextual difference and intention to perform informati...
Dang et al. (2013), "Contextual difference and intention to perform informati...
 
Resume_TanPham
Resume_TanPhamResume_TanPham
Resume_TanPham
 
MotivLetter
MotivLetterMotivLetter
MotivLetter
 
Cyber security innovation_imho v4
Cyber security innovation_imho v4Cyber security innovation_imho v4
Cyber security innovation_imho v4
 
ITE-Journal-OpEd-April2015
ITE-Journal-OpEd-April2015ITE-Journal-OpEd-April2015
ITE-Journal-OpEd-April2015
 
Teori 1 pengantar keamanan
Teori 1 pengantar keamananTeori 1 pengantar keamanan
Teori 1 pengantar keamanan
 
Become a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsBecome a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade Schools
 
IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016
 

Similar to Perri Nejib_bio_March_6

CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day ProgramTroy Thompson
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...DETER-Project
 
Project Management Skills.pdf
Project Management Skills.pdfProject Management Skills.pdf
Project Management Skills.pdfMostafahosny39
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
veeresh__ - __Network security - chennai (1).pptx
veeresh__ - __Network security - chennai (1).pptxveeresh__ - __Network security - chennai (1).pptx
veeresh__ - __Network security - chennai (1).pptxVeeresh703264
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computingacijjournal
 
Cyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itCyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itSKIPS University
 
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...cscpconf
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...acijjournal
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityDarwish Ahmad
 

Similar to Perri Nejib_bio_March_6 (20)

Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Web profile
Web profileWeb profile
Web profile
 
UMUC Cyber Day Program
UMUC Cyber Day  ProgramUMUC Cyber Day  Program
UMUC Cyber Day Program
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...
 
Project Management Skills.pdf
Project Management Skills.pdfProject Management Skills.pdf
Project Management Skills.pdf
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
veeresh__ - __Network security - chennai (1).pptx
veeresh__ - __Network security - chennai (1).pptxveeresh__ - __Network security - chennai (1).pptx
veeresh__ - __Network security - chennai (1).pptx
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
Cyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itCyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.it
 
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network Security
 

Perri Nejib_bio_March_6

  • 1. Perri Nejib Independent Consultant/former Sr Fellow perri.nejib@icloud.co Ms Nejib has over 30 years of system engineering and program protection experience and over 25 years of program technical leadership and DoD acquisition management experience. She holds senior certifications in systems engineering/ESEP, defense acquisition processes/DAWIA, cyber/info assurance/CISSP, privacy/CIPM and was named a Lockheed Martin Fellow in 2010 and Sr Fellow in 2013. She served as chair of the Cyber Fellows Action Team and co-chaired the Security Engineering Community of Practice at Lockheed. Her focus has been strategic cyber and IT technology planning, development and tech transition. She is the co-inventor of the Secure Engineering Assurance Model (SEAM) TM which addresses building security in across the entire lifecycle of a program and can be used across a business and successfully applied to diverse customer organizations. She has implemented SEAM TM successfully and is currently working with the International Council of System Engineering/INCOSE and the National Defense Industry Association/NDIA to take concepts from SEAM TM and develop system security engineering processes and tools that can be universally adopted. The goal is to help advance complex systems and organizations by integrating security from the start and throughout the system engineering lifecycle involving all levels of people, process and technology. Ms Nejib is a subject matter expert in defense, intelligence and cybersecurity domains and has provided consulting and technical leadership in civil and commercial domains as well. Through her positions of increasing responsibility (Technical Lead, Technical Director, CTO & Fellow), she has provided technical and management (across diverse and dispersed teams) support in the areas of systems and security engineering. In these areas, she has concentrated on architecture development and implementation to promote interoperability, connectivity, modernization and cybersecurity between the tactical and national community. She has also supported Transformation efforts and enterprise management towards developing and interfacing legacy and future systems to the Global Information Grid. Ms Nejib has been involved with directing and advancing cybersecurity research with the University of Maryland and both Warwick and Oxford Universities in the UK. She also serves as a cyber curriculum review industry member for Anne Arundel Community College’s Cyber and Information Security Program as well as the Center for Applied Technology for the Anne Arundel County Public Schools. Ms Nejib was recently named to the Advisory Board for the Women in Cybersecurity/WiCyS organization. Prior to becoming a contractor, she was employed by the U.S. Army Research Laboratory. She held positions there as an electronics engineer, senior technical lead, project manager and Deputy Science Advisor to the XVIII Airborne Corps. Extensive exposure to operational and field support through successful execution of numerous quick reaction projects was accomplished. Ms Nejib holds a Masters Degree in Electrical Engineering from Johns Hopkins University and B.S.E.E. from Wilkes University. She is a senior member in the Society of Women Engineers, IEEE, AOC, ISC2, IAPP, INCOSE, NDIA and AFCEA organizations and leads numerous STEM activities in the Washington DC area, including chairing state Skills USA competitions in computer security. Her outside interests include playing ice hockey and performing volunteer work with the South River Federation.