SlideShare a Scribd company logo
1 of 2
306 E Hickory Grove RD Timothy D. Lewis Mobile: 719-244-6462
Hartford City IN, 47348 Home: 765-347-8388
www.linkedin.com/in/timlewis2/ Email: brolou63@yahoo.com
Summary of Qualifications
More than 24 years successfully leading and mentoring military professionals in Communications Security,
Information Assurance,and military emergency management exercises. Network +, Security +, and ITIL V3 2011
certified. Top Secret security clearance since December 1986. Versatility includes military experience, Alaska
Labor Union Grants Administration, Senior Test Engineer, and Information Assurance Security Analyst for existing
computer projects and new hardware and software platforms designed specifically to meet the National Security
Agency’s national defense agenda. Projects include extensive support to customers of the US Air Force and US
Army for over 30 years.
Summary of Accomplishments
 Gained valuable experience as an IA Analyst using the Assured Compliance Assessment Solution (ACAS).
Performed weekly scans,filtered vulnerability data, and collaborated with teams to mitigate vulnerabilities.
 Maintained solution to track and report high risk Information Assurance Vulnerability Alerts (IAVA). Authored
the weekly report to military leadership regarding current status ofeach high risk IAVA. Provided summary
status and barriers to mitigation with planned mitigation dates.
 Developed test strategies for three Department of Defense projects involving spiral development, adhering to
process and procedures throughout the scope ofeach project.
 Managed five grants for the AK laborers union training schoolwith grant moneys totaling in excess of $5M.
 Conducted Information Assurance (IA) risk and vulnerability assessments
 Processed Certification & Accreditation packages before new systems were added to the domain.
 Established an F-22 platform specific EKMS COMSEC account for the Air Force. Enabled the deployment of
advanced fighter aircraft to the Pacific Rim.
 Air Force TEMPEST/EMSEC manager for three bases spanning more than 10 years’ experience.
Education
BSM - University of Phoenix Mar 2015
AA in Information Technology - Community College of the Air Force Nov 2004
Professional Accomplishments
Information Assurance Security Analyst – (STG Inc.) Jun 2014 – Nov 2015
Security Auditing, Certification and Accreditation
 Evaluated Information Systems for compliance in accordance with DoD 8500.2 Controls and Special Directives.
 Prepared artifacts associated with the audit to ensure a repository for all systemDIACAP and Certification &
Accreditation (C&A) documentation was kept current.
 Used automated security scanning tools (ACAS) to identify potential vulnerabilities. Analyzed and reported
findings to technical teams and leadership for appropriate tracking and mitigation.
 Assisted in the identification, tracking and remediation of security risks discovered on information systems.
Prepared and delivered detailed written reports and oral presentations to the Security Manger, Information
Assurance Managerand other senior leaders within the 2RCC-WH.
 Coordinated with both internal and external entities to improve established processes and procedures; ensured
efficient execution of all analysis, tracking, and mitigation and reporting requirements.
 Created, edited, and reviewed organization and team level documentation for clarity and accuracy. Assisted with
development of security related TTPs, SOPs, processes,plans,and diagrams.
Senior Test Engineer – (Ultra Electronics, Prologic, Inc.) Sept 2011 – Feb 2013
 Key team member on the design, configuration management and strategic future implementation of an entirely
new hardware/software device for the National Security Agency (NSA)
 Utilized two automated systems (PACE and MANTIS) for this system-level test strategy
 Authored two final test reports for customers with analysis on hardware and software solutions for the USAF.
Developed test plans, scenarios and expectation of system-level devices
 Completed two contracts with the USAF: Virtual Machine Analysis to replace existing Local Management
Device for the Electronic Key Management System, and the Data Management Device software upgrade
 Performed regression testing on the Data Management Device project using an USAF operational code which
resulted in a new software version correcting all the deficient code from the prior company
 Traveled to customer site for a hands-on demonstration and to conduct Formal Qualification Training
Grants Administrator – (Alaska Laborers Training School) Sept 2010 – Sept 2011
 Enrolled more than 375 students each schoolyear and applied Grant monies to qualifying members
 Managed all computer systems,audio, and visual systems for the training school
 Presented grant administration policies to each class,presented a formal introduction of training materials
 Coordinated extensively with the Alaska Department of Labor to secure additional grant opportunities
Manager – Communications Security/Information Assurance/TEMPEST-EMSEC Apr 1986 – Aug 2010
(United States Air Force)
 Worked as the Pilot Test Account manager for the Electronic Key Management System (EKMS); Data
Management Device (DMD) and Simple Key Loader (SKL)
 EKMS is a DoD wide network systemused for distribution of Cryptographic keying materials; up to and
including Top Secret; primary network between National Security Agency and military bases (Tier 0 to
Tier 2 communications)
 DMD is a networked computer systemto automated cryptographic keying of End Crypto Equipment
(ECU) (e.g. secure radios, network encryption devices and remote radar systems)
 SKL is a hand-held computer device that enables manual keying of ECU
 Provided guidance,assistance,training, and education to unit COMSEC Responsible Officers (CROs) and
Secure Telephone Unit III (STU-III)/Secure Telephone Equipment (STE) Responsible Officers (SROs), and
Fortezza Responsible Officers (FROs) on proper control, accountability, and destruction of COMSEC material.
Implemented, interpreted, and supplemented COMSEC policy and directives. Maintained documentation on user
accounts and ensured 100 percent accountability of tape-based and Electronic Key Management System keying
material. Conducted semiannual COMSEC audits and inventories on CRO/SRO/FRO accounts and reported
COMSEC incidents according to AF and DoD policy.
 Performed as a security manager, supervising COMSEC accounts during transition from physicalmaterial to
EKMS
 Ensured enterprise IA policies fully supported all legal and regulatory requirements and that IA policies were
applied with new and existing Information Technology infrastructure
 Identified IA weaknesses and provided recommendations for improvement
 Monitored network IA policy compliance and provided recommendations for effective implementation of IT
security controls
 Conducted security analysis of automated processing equipment to ensure conformity for classified information
processing
 Administered the full range of IA disciplines to include COMSEC, COMPUSEC, EMSEC, Network
Certification and Accreditation, Information Assurance Assessment and Telecommunications Monitoring and
Assessment Programs.

More Related Content

What's hot

08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1jjdoylecomcast
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NetLockSmith
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability AssesmentDedi Dwianto
 
Christopher Scott Pina Resume word
Christopher Scott Pina Resume wordChristopher Scott Pina Resume word
Christopher Scott Pina Resume wordChristopher Pina
 
Guy-Crumpley-Resume-June-29-2015
Guy-Crumpley-Resume-June-29-2015Guy-Crumpley-Resume-June-29-2015
Guy-Crumpley-Resume-June-29-2015Guy Crumpley
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringaizazhussain234
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy Menezes
 
Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Vincenzo De Florio
 
Best vulnerability assessment training
Best vulnerability assessment trainingBest vulnerability assessment training
Best vulnerability assessment trainingAdarshMathuri
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsNetwork Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsPivotPointSecurity
 
Incident Handler Certification
Incident Handler CertificationIncident Handler Certification
Incident Handler CertificationSagarNegi10
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJames W. De Rienzo
 
Certified SOC Analyst
Certified SOC AnalystCertified SOC Analyst
Certified SOC AnalystSagarNegi10
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report exampleIhor Uzhvenko
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
Critical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC TrainingCritical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC TrainingTonex
 

What's hot (20)

Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
 
Holtzlander Resume1-23-16
Holtzlander Resume1-23-16Holtzlander Resume1-23-16
Holtzlander Resume1-23-16
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
Christopher Scott Pina Resume word
Christopher Scott Pina Resume wordChristopher Scott Pina Resume word
Christopher Scott Pina Resume word
 
Guy-Crumpley-Resume-June-29-2015
Guy-Crumpley-Resume-June-29-2015Guy-Crumpley-Resume-June-29-2015
Guy-Crumpley-Resume-June-29-2015
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
 
Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013
 
Best vulnerability assessment training
Best vulnerability assessment trainingBest vulnerability assessment training
Best vulnerability assessment training
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsNetwork Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
 
Incident Handler Certification
Incident Handler CertificationIncident Handler Certification
Incident Handler Certification
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
 
Certified SOC Analyst
Certified SOC AnalystCertified SOC Analyst
Certified SOC Analyst
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Critical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC TrainingCritical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC Training
 

Viewers also liked

APS abstract BrennanCull
APS abstract BrennanCullAPS abstract BrennanCull
APS abstract BrennanCullBrennan Cull
 
1 determinación de la humedad en los alimentos.
1 determinación de la humedad en los alimentos.1 determinación de la humedad en los alimentos.
1 determinación de la humedad en los alimentos.Miguel Cordoba
 
Guía 6 comprensión lectora noveno
Guía 6 comprensión lectora novenoGuía 6 comprensión lectora noveno
Guía 6 comprensión lectora novenowilmer ibañez
 
Social media student outline
Social media student outlineSocial media student outline
Social media student outlineJace Decker
 
ильницкая т.в ош;6 школа наш второй дом . права и обязанности школьника
ильницкая т.в ош;6 школа наш второй дом . права и обязанности школьника ильницкая т.в ош;6 школа наш второй дом . права и обязанности школьника
ильницкая т.в ош;6 школа наш второй дом . права и обязанности школьника Аня Иванова
 
ильницкая т.в ош№6 школа наш второй дом. права и обязанности школьника
ильницкая т.в ош№6 школа наш второй дом. права и обязанности школьника ильницкая т.в ош№6 школа наш второй дом. права и обязанности школьника
ильницкая т.в ош№6 школа наш второй дом. права и обязанности школьника Аня Иванова
 
mis expectativas
mis expectativasmis expectativas
mis expectativas1Paolaku
 
Trabajo Final Cepa Web 2.0
Trabajo Final Cepa Web 2.0Trabajo Final Cepa Web 2.0
Trabajo Final Cepa Web 2.0Sol Canteros
 
Destination Australia & New Zealand 2015-2016 - Aspire Downunder USA
Destination Australia & New Zealand 2015-2016 - Aspire Downunder USADestination Australia & New Zealand 2015-2016 - Aspire Downunder USA
Destination Australia & New Zealand 2015-2016 - Aspire Downunder USAGlenn Fawcett
 
Presentación educación emocional
Presentación educación emocionalPresentación educación emocional
Presentación educación emocionalMyriam Sotelo
 

Viewers also liked (20)

APS abstract BrennanCull
APS abstract BrennanCullAPS abstract BrennanCull
APS abstract BrennanCull
 
Herramientas digitales 2 semestre
Herramientas digitales 2 semestreHerramientas digitales 2 semestre
Herramientas digitales 2 semestre
 
1 determinación de la humedad en los alimentos.
1 determinación de la humedad en los alimentos.1 determinación de la humedad en los alimentos.
1 determinación de la humedad en los alimentos.
 
Guía 6 comprensión lectora noveno
Guía 6 comprensión lectora novenoGuía 6 comprensión lectora noveno
Guía 6 comprensión lectora noveno
 
Social media student outline
Social media student outlineSocial media student outline
Social media student outline
 
Resolución de Conflictos
Resolución de Conflictos Resolución de Conflictos
Resolución de Conflictos
 
ильницкая т.в ош;6 школа наш второй дом . права и обязанности школьника
ильницкая т.в ош;6 школа наш второй дом . права и обязанности школьника ильницкая т.в ош;6 школа наш второй дом . права и обязанности школьника
ильницкая т.в ош;6 школа наш второй дом . права и обязанности школьника
 
ильницкая т.в ош№6 школа наш второй дом. права и обязанности школьника
ильницкая т.в ош№6 школа наш второй дом. права и обязанности школьника ильницкая т.в ош№6 школа наш второй дом. права и обязанности школьника
ильницкая т.в ош№6 школа наш второй дом. права и обязанности школьника
 
mis expectativas
mis expectativasmis expectativas
mis expectativas
 
Community Pack
Community PackCommunity Pack
Community Pack
 
El software y el hardware del computador
El software y el hardware del computadorEl software y el hardware del computador
El software y el hardware del computador
 
Trabajo Final Cepa Web 2.0
Trabajo Final Cepa Web 2.0Trabajo Final Cepa Web 2.0
Trabajo Final Cepa Web 2.0
 
Contrato de arrendamiento
Contrato   de   arrendamientoContrato   de   arrendamiento
Contrato de arrendamiento
 
Destination Australia & New Zealand 2015-2016 - Aspire Downunder USA
Destination Australia & New Zealand 2015-2016 - Aspire Downunder USADestination Australia & New Zealand 2015-2016 - Aspire Downunder USA
Destination Australia & New Zealand 2015-2016 - Aspire Downunder USA
 
proyecto
proyectoproyecto
proyecto
 
Presentación educación emocional
Presentación educación emocionalPresentación educación emocional
Presentación educación emocional
 
El viaje del Beagle
El viaje del BeagleEl viaje del Beagle
El viaje del Beagle
 
Cepa tp final
Cepa tp finalCepa tp final
Cepa tp final
 
Adictions
AdictionsAdictions
Adictions
 
Visual basic cbtis
Visual basic cbtisVisual basic cbtis
Visual basic cbtis
 

Similar to Resume - Timothy Lewis 20160313

Charles F Lupico CV 2015
Charles F Lupico CV 2015Charles F Lupico CV 2015
Charles F Lupico CV 2015Chuck Lupico
 
Kevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer
 
Viera HR and IT Resume (2)
Viera HR and IT Resume (2)Viera HR and IT Resume (2)
Viera HR and IT Resume (2)EJaz VI
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSECMike Sawall
 
Resume_Mr Herbert A Thompson 10_16_2015
Resume_Mr  Herbert A Thompson 10_16_2015Resume_Mr  Herbert A Thompson 10_16_2015
Resume_Mr Herbert A Thompson 10_16_2015Herbert Thompson
 
Long Witt resume 27 Jan 2017
Long Witt resume 27 Jan 2017Long Witt resume 27 Jan 2017
Long Witt resume 27 Jan 2017Gerald Witt
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2david dunkle
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
MASTER APPLICATION WORKSHEET
MASTER APPLICATION WORKSHEETMASTER APPLICATION WORKSHEET
MASTER APPLICATION WORKSHEETTrevor Cummins
 
Jess Paul Dawson Resume 2
Jess Paul Dawson Resume 2Jess Paul Dawson Resume 2
Jess Paul Dawson Resume 2Jess Dawson
 
Max Rogers T-Resume
Max Rogers T-Resume Max Rogers T-Resume
Max Rogers T-Resume Max Rogers
 
William H Cooke resume 1
William H Cooke resume 1William H Cooke resume 1
William H Cooke resume 1William Cooke
 
DavidHoltResume2015.docx
DavidHoltResume2015.docxDavidHoltResume2015.docx
DavidHoltResume2015.docxDavid Holt
 

Similar to Resume - Timothy Lewis 20160313 (20)

Charles F Lupico CV 2015
Charles F Lupico CV 2015Charles F Lupico CV 2015
Charles F Lupico CV 2015
 
Kevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer Chronological
Kevin Farmer Chronological
 
Viera HR and IT Resume (2)
Viera HR and IT Resume (2)Viera HR and IT Resume (2)
Viera HR and IT Resume (2)
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
 
Resume-Ckelley1
Resume-Ckelley1Resume-Ckelley1
Resume-Ckelley1
 
Resume_Mr Herbert A Thompson 10_16_2015
Resume_Mr  Herbert A Thompson 10_16_2015Resume_Mr  Herbert A Thompson 10_16_2015
Resume_Mr Herbert A Thompson 10_16_2015
 
Long Witt resume 27 Jan 2017
Long Witt resume 27 Jan 2017Long Witt resume 27 Jan 2017
Long Witt resume 27 Jan 2017
 
Terrance A. 10.20.15
Terrance A. 10.20.15Terrance A. 10.20.15
Terrance A. 10.20.15
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Jason Allred Resume
Jason Allred ResumeJason Allred Resume
Jason Allred Resume
 
MASTER APPLICATION WORKSHEET
MASTER APPLICATION WORKSHEETMASTER APPLICATION WORKSHEET
MASTER APPLICATION WORKSHEET
 
Jess Paul Dawson Resume 2
Jess Paul Dawson Resume 2Jess Paul Dawson Resume 2
Jess Paul Dawson Resume 2
 
Max Rogers T-Resume
Max Rogers T-Resume Max Rogers T-Resume
Max Rogers T-Resume
 
William H Cooke resume 1
William H Cooke resume 1William H Cooke resume 1
William H Cooke resume 1
 
Williams_L_
Williams_L_Williams_L_
Williams_L_
 
B Parker Resume rev 2
B Parker Resume rev 2B Parker Resume rev 2
B Parker Resume rev 2
 
DavidHoltResume2015.docx
DavidHoltResume2015.docxDavidHoltResume2015.docx
DavidHoltResume2015.docx
 
ConklinResume2
ConklinResume2ConklinResume2
ConklinResume2
 

Resume - Timothy Lewis 20160313

  • 1. 306 E Hickory Grove RD Timothy D. Lewis Mobile: 719-244-6462 Hartford City IN, 47348 Home: 765-347-8388 www.linkedin.com/in/timlewis2/ Email: brolou63@yahoo.com Summary of Qualifications More than 24 years successfully leading and mentoring military professionals in Communications Security, Information Assurance,and military emergency management exercises. Network +, Security +, and ITIL V3 2011 certified. Top Secret security clearance since December 1986. Versatility includes military experience, Alaska Labor Union Grants Administration, Senior Test Engineer, and Information Assurance Security Analyst for existing computer projects and new hardware and software platforms designed specifically to meet the National Security Agency’s national defense agenda. Projects include extensive support to customers of the US Air Force and US Army for over 30 years. Summary of Accomplishments  Gained valuable experience as an IA Analyst using the Assured Compliance Assessment Solution (ACAS). Performed weekly scans,filtered vulnerability data, and collaborated with teams to mitigate vulnerabilities.  Maintained solution to track and report high risk Information Assurance Vulnerability Alerts (IAVA). Authored the weekly report to military leadership regarding current status ofeach high risk IAVA. Provided summary status and barriers to mitigation with planned mitigation dates.  Developed test strategies for three Department of Defense projects involving spiral development, adhering to process and procedures throughout the scope ofeach project.  Managed five grants for the AK laborers union training schoolwith grant moneys totaling in excess of $5M.  Conducted Information Assurance (IA) risk and vulnerability assessments  Processed Certification & Accreditation packages before new systems were added to the domain.  Established an F-22 platform specific EKMS COMSEC account for the Air Force. Enabled the deployment of advanced fighter aircraft to the Pacific Rim.  Air Force TEMPEST/EMSEC manager for three bases spanning more than 10 years’ experience. Education BSM - University of Phoenix Mar 2015 AA in Information Technology - Community College of the Air Force Nov 2004 Professional Accomplishments Information Assurance Security Analyst – (STG Inc.) Jun 2014 – Nov 2015 Security Auditing, Certification and Accreditation  Evaluated Information Systems for compliance in accordance with DoD 8500.2 Controls and Special Directives.  Prepared artifacts associated with the audit to ensure a repository for all systemDIACAP and Certification & Accreditation (C&A) documentation was kept current.  Used automated security scanning tools (ACAS) to identify potential vulnerabilities. Analyzed and reported findings to technical teams and leadership for appropriate tracking and mitigation.  Assisted in the identification, tracking and remediation of security risks discovered on information systems. Prepared and delivered detailed written reports and oral presentations to the Security Manger, Information Assurance Managerand other senior leaders within the 2RCC-WH.  Coordinated with both internal and external entities to improve established processes and procedures; ensured efficient execution of all analysis, tracking, and mitigation and reporting requirements.  Created, edited, and reviewed organization and team level documentation for clarity and accuracy. Assisted with development of security related TTPs, SOPs, processes,plans,and diagrams. Senior Test Engineer – (Ultra Electronics, Prologic, Inc.) Sept 2011 – Feb 2013  Key team member on the design, configuration management and strategic future implementation of an entirely new hardware/software device for the National Security Agency (NSA)  Utilized two automated systems (PACE and MANTIS) for this system-level test strategy  Authored two final test reports for customers with analysis on hardware and software solutions for the USAF. Developed test plans, scenarios and expectation of system-level devices  Completed two contracts with the USAF: Virtual Machine Analysis to replace existing Local Management Device for the Electronic Key Management System, and the Data Management Device software upgrade  Performed regression testing on the Data Management Device project using an USAF operational code which resulted in a new software version correcting all the deficient code from the prior company
  • 2.  Traveled to customer site for a hands-on demonstration and to conduct Formal Qualification Training Grants Administrator – (Alaska Laborers Training School) Sept 2010 – Sept 2011  Enrolled more than 375 students each schoolyear and applied Grant monies to qualifying members  Managed all computer systems,audio, and visual systems for the training school  Presented grant administration policies to each class,presented a formal introduction of training materials  Coordinated extensively with the Alaska Department of Labor to secure additional grant opportunities Manager – Communications Security/Information Assurance/TEMPEST-EMSEC Apr 1986 – Aug 2010 (United States Air Force)  Worked as the Pilot Test Account manager for the Electronic Key Management System (EKMS); Data Management Device (DMD) and Simple Key Loader (SKL)  EKMS is a DoD wide network systemused for distribution of Cryptographic keying materials; up to and including Top Secret; primary network between National Security Agency and military bases (Tier 0 to Tier 2 communications)  DMD is a networked computer systemto automated cryptographic keying of End Crypto Equipment (ECU) (e.g. secure radios, network encryption devices and remote radar systems)  SKL is a hand-held computer device that enables manual keying of ECU  Provided guidance,assistance,training, and education to unit COMSEC Responsible Officers (CROs) and Secure Telephone Unit III (STU-III)/Secure Telephone Equipment (STE) Responsible Officers (SROs), and Fortezza Responsible Officers (FROs) on proper control, accountability, and destruction of COMSEC material. Implemented, interpreted, and supplemented COMSEC policy and directives. Maintained documentation on user accounts and ensured 100 percent accountability of tape-based and Electronic Key Management System keying material. Conducted semiannual COMSEC audits and inventories on CRO/SRO/FRO accounts and reported COMSEC incidents according to AF and DoD policy.  Performed as a security manager, supervising COMSEC accounts during transition from physicalmaterial to EKMS  Ensured enterprise IA policies fully supported all legal and regulatory requirements and that IA policies were applied with new and existing Information Technology infrastructure  Identified IA weaknesses and provided recommendations for improvement  Monitored network IA policy compliance and provided recommendations for effective implementation of IT security controls  Conducted security analysis of automated processing equipment to ensure conformity for classified information processing  Administered the full range of IA disciplines to include COMSEC, COMPUSEC, EMSEC, Network Certification and Accreditation, Information Assurance Assessment and Telecommunications Monitoring and Assessment Programs.