John Doyle is a highly experienced cybersecurity professional and project manager with over 30 years of experience. He has expertise in network infrastructure, security engineering, project management, and cybersecurity compliance. He is proficient in risk management frameworks and security standards from NIST and has led several large cybersecurity projects.
#Course description
Critical Infrastructure Protection (CIP) NERC training course will show you the CIP measures created by Federal Energy Regulatory Commission (FERC) and North American Electric Reliability Corporation (NERC) and will assist you with understanding the prerequisites for work force and training, physical security of Bulk Electric Systems (BES) cybersecurity and data protection.
NERC is resolved to ensure the BES against cybersecurity bargains prompting unsteadiness. Another progress started in 2014 with a specific end goal to move from CIP variant 3 guidelines to CIP rendition 5. The objective is to enhance the specialized security necessities for BES and desires for consistence and requirement.
#Audience
Critical Infrastructure Protection (CIP) NERC training is a 2-day course designed for:
IT and ICS cybersecurity personnel
Field support personnel and security operators
Auditors, vendors and team leaders
All individuals who need to understand the Critical Infrastructure Protection (CIP) NERC concepts
Electric utility engineers working in electric industry security
System personnel worried about NERC standard for system security
System operators and individuals in electric utility organizations
Independent system operator personnel working with utility companies
Electric utility personnel who recently started career involved with Critical Infrastructure Protection (CIP) NERC standards.
Technicians, operators, and maintenance personnel who are or will be working at electric utility companies.
Investors and contractors who plan to make investments in electric industry considering security standards.
Managers, accountants, and executives of electric industry.
#Training Objectives
Understand the new terms and revised definitions of CIP NERC standard
Learn about Cyber asset categories
Apply gap analysis with new standards applications
Recognize the role FERC and NERC on CIP
Determine the requirements to implement strategies for CIP
Apply CIP requirements to balance cybersecurity benefits and regulatory compliances
Understand how the electric sector regulatory structure fit into the reliability standards
Explore BES cyber asset identification to protect grids
Learn about common physical controls and monitoring schemes in CIP
Understand the system security management requirements and compliance challenges
Apply vulnerability assessment for ensuring the stable operation of system
Apply methods in order to identify, classify and response to each incident in CIP
Call us today at +1-972-665-9786. Learn more about this course audience, objectives, outlines, seminars, pricing , any other information. Visit our website link below.
Learn more about Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Integrating security into the development of an application or software is necessary to decrease its risk of susceptibility to attacks and exploits. Traditional methods of security testing were performed on a finished product. However, with the rise in the intensity and the number of attack vectors, it has become necessary for organizations to include it as a part of every phase of an SDLC.
Evolving technologies and business models have led to advanced network security threats that never existed a few years back. Moreover, enterprises are also relying on outdated security solutions to shut out such threats and this is leading to bigger and frequent data breaches. So if your company recognizes the need for a reliable IT security solution, then you should join our webinar to learn the following:
- An overview of the prevalent enterprise security threats
- The evolving security landscape and the obsolete security mechanisms
- What Seqrite does to ensure enterprise security and network compliance
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached Dell EMC World
"Advanced cyber threat actors are penetrating networks in ways that fly below the radar of existing information security technologies, creating hidden network threats.
Your IT and IT security personnel may not know if your organization has been compromised, and lack the specialized intelligence, tools and expertise required to determine the answer. No matter the industry, whether you are in banking, healthcare or even retail, compliance can be affected due to payment card breaches or from other sensitive data being leaked due to a compromised network.
Learn how and why the right hunting technology and threat intelligence can illuminate the complete threat context and determine next steps to help you engage and resist the adversary.
Building a World-Class Proactive Integrated Security and Network Ops CenterPriyanka Aash
The SNOC (Security & Network Operations Center) is a cost-effective, world-class, proactive integrated function that leverages and optimizes your current NOC members while hiring a minimal number of additional security professionals. Learn how to use the SNOC framework to transform your existing NOC into a single effective team that is responsible for both network and security functions.
(Source: RSA USA 2016-San Francisco)
DevSecOps is a recent offshoot of the DevOps movement, which doubles down on the importance of security. As security continues to be downplayed or ignored even as the threat landscape explodes, DevSecOps promotes a set of well-developed design principles and engineering patterns which involve security owners and product designers much earlier. DevSecOps lays out a robust and practical blueprint for building security features into the design process, leveraging new engineering tools and patterns and creating a secure, defensible software right from the start.
Join Chris Knotts, Innovation Product Director at Cprime, to:
- Learn how the concept of "shifting left" applies to application security and how to prioritize security requirements earlier in the design process
- Get an introduction to a few of the most effective engineering tools for implementing DevSecOps, including popular code scanners, dependency checkers, and free open-source products
- Understand how progress with DevSecOps depends on roles and stakeholders outside of just security staff
Mr. Nagle is currently the Vice President of Program Operations and the Director of Management Services Division at GCC Technologies LLC. Mr. Nagle is a seasoned project and program management professional with expertise in information technology consulting services which include strategic planning and deployment, business process optimization, program management office, acquisition management, systems development, operations management and information technology expertise. Mr. Nagle is an innovative problem-solver and decision-maker.
Areas of expertise include:
• Acquisition Strategies and Management
• Budget/Financial/Cost Management
• Business Case development
• Business Process Reengineering (BPR)
• Capital Planning and Investment Control
• Change Management
• Client Relationship Management (CRM)
• Communications Management
• Demand Management
• Earned Value Management (EVM)
• Executive level communications
• Federal Government IT Acquisition Management
• Financial Management
• Issue Management
• Release and Deployment Management
• Life Cycle Cost (LCCE) Estimations
• Operations Management
• Organizational Change Management (OCM)
• Performance Measures
• Performance Metrics
• Project and Program Management
• IT Governance
• Project plans and Integrated Master Schedules (IMS)
• Resource Management
• Return on Investment (ROI)
• Risk Management
• Schedule Management
• Scope Management
• Systems Development Life Cycle
• Stakeholder Management
• Strategic Planning
• Time Management
• Total Cost of Ownership (TCO)
• Software Release and Version Control
• Work Breakdown Structures (WBS)
#Course description
Critical Infrastructure Protection (CIP) NERC training course will show you the CIP measures created by Federal Energy Regulatory Commission (FERC) and North American Electric Reliability Corporation (NERC) and will assist you with understanding the prerequisites for work force and training, physical security of Bulk Electric Systems (BES) cybersecurity and data protection.
NERC is resolved to ensure the BES against cybersecurity bargains prompting unsteadiness. Another progress started in 2014 with a specific end goal to move from CIP variant 3 guidelines to CIP rendition 5. The objective is to enhance the specialized security necessities for BES and desires for consistence and requirement.
#Audience
Critical Infrastructure Protection (CIP) NERC training is a 2-day course designed for:
IT and ICS cybersecurity personnel
Field support personnel and security operators
Auditors, vendors and team leaders
All individuals who need to understand the Critical Infrastructure Protection (CIP) NERC concepts
Electric utility engineers working in electric industry security
System personnel worried about NERC standard for system security
System operators and individuals in electric utility organizations
Independent system operator personnel working with utility companies
Electric utility personnel who recently started career involved with Critical Infrastructure Protection (CIP) NERC standards.
Technicians, operators, and maintenance personnel who are or will be working at electric utility companies.
Investors and contractors who plan to make investments in electric industry considering security standards.
Managers, accountants, and executives of electric industry.
#Training Objectives
Understand the new terms and revised definitions of CIP NERC standard
Learn about Cyber asset categories
Apply gap analysis with new standards applications
Recognize the role FERC and NERC on CIP
Determine the requirements to implement strategies for CIP
Apply CIP requirements to balance cybersecurity benefits and regulatory compliances
Understand how the electric sector regulatory structure fit into the reliability standards
Explore BES cyber asset identification to protect grids
Learn about common physical controls and monitoring schemes in CIP
Understand the system security management requirements and compliance challenges
Apply vulnerability assessment for ensuring the stable operation of system
Apply methods in order to identify, classify and response to each incident in CIP
Call us today at +1-972-665-9786. Learn more about this course audience, objectives, outlines, seminars, pricing , any other information. Visit our website link below.
Learn more about Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Integrating security into the development of an application or software is necessary to decrease its risk of susceptibility to attacks and exploits. Traditional methods of security testing were performed on a finished product. However, with the rise in the intensity and the number of attack vectors, it has become necessary for organizations to include it as a part of every phase of an SDLC.
Evolving technologies and business models have led to advanced network security threats that never existed a few years back. Moreover, enterprises are also relying on outdated security solutions to shut out such threats and this is leading to bigger and frequent data breaches. So if your company recognizes the need for a reliable IT security solution, then you should join our webinar to learn the following:
- An overview of the prevalent enterprise security threats
- The evolving security landscape and the obsolete security mechanisms
- What Seqrite does to ensure enterprise security and network compliance
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached Dell EMC World
"Advanced cyber threat actors are penetrating networks in ways that fly below the radar of existing information security technologies, creating hidden network threats.
Your IT and IT security personnel may not know if your organization has been compromised, and lack the specialized intelligence, tools and expertise required to determine the answer. No matter the industry, whether you are in banking, healthcare or even retail, compliance can be affected due to payment card breaches or from other sensitive data being leaked due to a compromised network.
Learn how and why the right hunting technology and threat intelligence can illuminate the complete threat context and determine next steps to help you engage and resist the adversary.
Building a World-Class Proactive Integrated Security and Network Ops CenterPriyanka Aash
The SNOC (Security & Network Operations Center) is a cost-effective, world-class, proactive integrated function that leverages and optimizes your current NOC members while hiring a minimal number of additional security professionals. Learn how to use the SNOC framework to transform your existing NOC into a single effective team that is responsible for both network and security functions.
(Source: RSA USA 2016-San Francisco)
DevSecOps is a recent offshoot of the DevOps movement, which doubles down on the importance of security. As security continues to be downplayed or ignored even as the threat landscape explodes, DevSecOps promotes a set of well-developed design principles and engineering patterns which involve security owners and product designers much earlier. DevSecOps lays out a robust and practical blueprint for building security features into the design process, leveraging new engineering tools and patterns and creating a secure, defensible software right from the start.
Join Chris Knotts, Innovation Product Director at Cprime, to:
- Learn how the concept of "shifting left" applies to application security and how to prioritize security requirements earlier in the design process
- Get an introduction to a few of the most effective engineering tools for implementing DevSecOps, including popular code scanners, dependency checkers, and free open-source products
- Understand how progress with DevSecOps depends on roles and stakeholders outside of just security staff
Mr. Nagle is currently the Vice President of Program Operations and the Director of Management Services Division at GCC Technologies LLC. Mr. Nagle is a seasoned project and program management professional with expertise in information technology consulting services which include strategic planning and deployment, business process optimization, program management office, acquisition management, systems development, operations management and information technology expertise. Mr. Nagle is an innovative problem-solver and decision-maker.
Areas of expertise include:
• Acquisition Strategies and Management
• Budget/Financial/Cost Management
• Business Case development
• Business Process Reengineering (BPR)
• Capital Planning and Investment Control
• Change Management
• Client Relationship Management (CRM)
• Communications Management
• Demand Management
• Earned Value Management (EVM)
• Executive level communications
• Federal Government IT Acquisition Management
• Financial Management
• Issue Management
• Release and Deployment Management
• Life Cycle Cost (LCCE) Estimations
• Operations Management
• Organizational Change Management (OCM)
• Performance Measures
• Performance Metrics
• Project and Program Management
• IT Governance
• Project plans and Integrated Master Schedules (IMS)
• Resource Management
• Return on Investment (ROI)
• Risk Management
• Schedule Management
• Scope Management
• Systems Development Life Cycle
• Stakeholder Management
• Strategic Planning
• Time Management
• Total Cost of Ownership (TCO)
• Software Release and Version Control
• Work Breakdown Structures (WBS)
01Introduction to Information Security.pptit160320737038
A distributed system is a collection of computer programs that utilize computational resources across multiple, separate computation nodes to achieve a common, shared goal. Distributed systems aim to remove bottlenecks or central points of failure from a system.
1. JOHN J. DOYLE
23 Latschar Lane
Spring City, Pa 19475
610-203-2488(c)
jjdoyle@comcast.net
SECURITY CLEARANCE:
Top Secret/SSBI
EDUCATION
• B.S., Criminal Justice, The College at Brockport State University of New York, 1984
• M.S., Information Science –The Pennsylvania State University 2013
CERTIFICATIONS
• Certified SCRUM Master (CSM) #000347666, 2014
• Project Management Professional (PMP)#1553509, 2012
• Certified ITIL Foundation V3 Training #4409260, EXIN 2012
• Certified Information Systems Security Professional (CISSP) #41053, 2004
• Certified Information Systems Auditor (CISA) #217841, 2005
• Cisco Certified Network Associate/Cisco Certified Design Associate (CCNA/CCDA), 2009
• Checkpoint Certified Security Administrator/Checkpoint Certified Security Engineer (CCSA/CCSE),
2004
• Nokia Security Administrator (NSA), 2002
• Microsoft Certified Systems Engineer (MCSE), 2002
• Compaq ASE, 2000
• System Center Configuration Management 2012, 12/2013
• CCSP training taken 12/16
SUMMARY OF QUALIFICATIONS
I am a high-performing cybersecurity professional and veteran project manager. I am able to manage
and understand the detail of network infrastructure and security issues, due to the fact I have worked
many years being a network and security engineer; I am a Project Manager first, and then a
Cybersecurity Expert.
Well versed in the Risk Management Framework and detail knowledge of SP 800-53 rev4, SP 800-53a, SP
800-37 which comes from several years of leading over 7 Certification and Accreditation audits.
As a Project Manager and as an engineer I have managed, monitored, analyzed, and minimized the
operational impact of dynamic threats to critical public and private sector IT infrastructures. Domain
knowledge of network design, routing protocol, incident handling, remediation, packet analysis, security
auditing, intrusion detection, and vulnerability assessment—coupled with team leadership, hands-on,
and financial management capabilities—enables me to deliver, redundant, efficient, secure, available
infrastructures and systems that defend against attacks and infiltration. I have credentials in industry-
leading security and management certifications (e.g. PMP, CISSP, CISA, ITIL, CSM, CCNA), expertise in
2. legal and regulatory compliance (e.g., FISMA, NIST, DIACAP, SOX, NERC), and additional experience in
current cyber technologies (e.g., Checkpoint, Cisco ASA/PIX Firewall, Blue Coat, ArcSight, SourceFire, and
Splunk.)
I have lead cross-functional teams to define scope, plan, execute and deliver exceptional business value
on time and within budget. The projects I managed ranged in size from large to small across a wide
range of technology platforms. All my projects have been very visible and hands-on project management
role where I was the spokesperson for the capabilities of the project across a variety of audiences, as
well as coordinate and lead project activities. I was always the single point of contact for all project
activities and responsible for each project success.
PROFESSIONAL EXPERIENCE
ManTech International (Port Authority of NY/NJ) 01/2016-Present
Network CyberSecurity SME/Project Manager
• Lead Cyber Security projects to completion. Develop requirements, milestones, tasks and activities,
and manages stakeholder’s expectations. Conduct risk analysis on security related issues as well as
project related issues.
• Conduct the scheduling, planning, design, engineering, deployment, operation, and maintenance of
the organizations security tools.
• Developed the Splunk design and install process.
• Wrote SEIM CONOPS, SOP and assisted in the USE Case development for potential malicious actors.
• Provided guidance to the SOC team on the process for Incident Management.
• Provided guidance on what logs and by what priority needed to be ingested by the Splunk SEIM.
• Reviewed the Port Authority’s technical infrastructure to support the security tools, and review
configurations and upgrades necessary to implement and maintain them.
• Develop milestones, progress reports, manage vendors and responsible for the standardize security
deployment and operating procedures with respect to the use of these tools.
• Reviewed and analyze marketplace technology to help develop the Cyber Security Program.
• Used National Institute of Standards and Technologies (NIST) SP 800 series (RMF) documents as the
security framework for securing the PANYNJ network.
• Manage and track activities related to the above efforts to ensure that its use of technologies – and
its policies, processes, and procedures – comply with the NIST standards and guidelines.
• Track and coordinate activities related to the Cyber Security Program to ensure that its industrial
control systems comply with NIST RMF security practices.
• Organize and consolidate risk assessments on different technologies used, to help determine and
prioritize remediation plans. Drafted policies and procedures related to cyber security.
• Based on the NIST Risk Management Framework (SP 800-53 Rev 4), consolidated several vendors’
security assessments and developed a rational and coherent summary for the Port Authority
Management to develop an Enterprise Security Enhancement Program.
• Project Manager for several medium to large size projects including; Splunk and Click design, pilot,
tuning, and deployment; EnCase design, pilot, tuning, and deployment; Evaluation of 18 security tools
that are in different stages of deployment and configuration; Pentest of an ICS; and Network
segmentation.
3. Horizon Industries (Defense Logistics Agency at New Cumberland, PA) 09/2013–01/2016
Infrastructure Project Manager
• The Defense Logistics Agency (DLA) provides logistical support for all branches of the US Military
worldwide. There is over 50,000 servers, desktops, laptops, and mobile devices that need software
maintain and configured securely.
• Responsible for all aspects of the development and implementation of software deployment for the
entire Defense Logistics Agency assigned projects and provide a single point of contact for those
projects that involve the distribution of software updates, security packages, images upgrades at the
enterprise level.
• Lead one major infrastructure of over $4 million and several smaller projects. I had 6 direct reports
and 24 additional individuals in a matrix environment working on all my projects.
• Take projects from original concept through final implementation. I Interfaces with all areas affected
by the project including; senior management, accounting, end users, computer services, vendors, and
client services.
• Develop detailed work plans, schedules, project estimates, resource plans, and financial and
operational status reports: utilizing SharePoint, MS Project, Scrum and EV.
• Conduct project meetings and is responsible for project tracking using several tools to include Earned
Value and Risk Analysis.
• Ensures adherence to quality standards and reviews project deliverables.
• Manages the integration of vendor tasks and tracks and reviews vendor deliverables.
• Provides technical and analytical guidance to all team members. Recommends and takes action to
direct the analysis and solutions of problems.
PJM Interconnect, Audubon, Pa 11/2012 06/2013
Security Analyst
• Assisted in conducting an internal audit using the NERC/CIP requirements
• Setup and conducted vulnerability scans using Nessus Security Center
Qinetiq North America 06/2011–11/2012
Team Lead/Manager
• Lead and managed the FEMA Support SOC Team supporting the 24/7/365 SOC that monitors intrusion
detection systems (IDSs) at the DHS SOC, working with SourceFire sensors through the Defense Center
Management Console and ArcSight Enterprise Management System
• Team consisted of 13 individuals; level I, level II analysts, and a forensics team. The level III analysts
were government employees who had the ability to reach individuals devices for remediation.
• Revamped SOP for the intrusion detection process and identified new metrics tied to key points in the
process, with the goal of reducing time of infection to time of remediation
• Created a weekly (sometimes every other day) “learning Briefing” that was designed to share new
insights into new malicious code, how to look for new or emerging attacks.
• Developed an out-of-band capability using a virtual machine for analysts to use by going to suspected
malicious sites and record the interaction, like registry changes, system call-backs, or downloading
4. software to confirm the event was positive and provide the evidence to the Level III analysts and the
forensics team
• Creates effective security event notifications through increased communication between the SOC
team and the FEMA security team at the Mount Weather Emergency Operations Center, ensuring
quick resolution to incidents
• Identified strong performers in the group and designated shift leads, assigning additional duties that
included monitoring and mentoring the performance of shift personnel
• Implemented a three-point program to reduce false positives: correctly defining the Home_Net for all
sensors; correctly identifying infrastructure devices; and creating an IP address process for unrecorded
networking devices, including rule changes.
George Mason University (evening Instructor) 11/2011-05/2012
AAI Corporation 10/2010–06/2011
Information Assurance System Engineer IV/Manager
• Managed the installing and securing of control platforms of Drone Aircraft being built for the US
Army
• Used Earned Value Management for reviewing project progress, enabling early forecasting and
resolution of cost and schedule issues.
• Provided technical and managerial support to Information Assurance Certification & Accreditation
activities, including analysis and evaluation of security concepts, designs, and tests; threat, risk, and
vulnerability assessments; security certification ST&E; and risk analysis in a software development
lifecycle
• Team assessed system vulnerabilities and determined the adequacy of security controls and the level
of residual risk in networking devices and software (custom and COTS)
• Managed multiple projects Used DIACAP to secure servers, networking devices, and software;
directed running Gold Disk and SRR scans; directed and performed Retina and Nmap scans; and
developed Plans of Action and Milestones (POA&Ms)—all leading to Authorization to Operate
Stanley Associates, Inc. 10/2009–06/2010
Senior Information Assurance Security Analyst
Working at DISA
• Analyzed requests for connection to the SIPRNet to ensure that they met government standards
based on the DoDI 8500 series and NIST Special Publication 800 series
• Reviewed network diagrams, scorecards, POA&Ms, and Designated Approving Authority Interim
Authorization to Communicate and Authorization to Communicate requests
AT&T Government Solutions 08/2005–08/2009
Project Manager/Lead Auditor
• Defined scope, gathered requirements, developed tasks and tasks sequence, developed
5. communications plan and risk matrix Managed projects from requirements gathering through closure.
Provided SME guidance and Project Manager over site to security audits, risk assessments, and system
T&E (ST&E); providing instruction on writing of System Security Plans in compliance with government
regulations (e.g., FISMA, NIST, DIACAP, SOX); reviewed, edited, and approved documentation to be
given to the customer. Assisted clients write Disaster Recovery Plans and Business Continuity Plans
• Advised team members on conducting ST&E and the execution of scans using Foundstone Enterprise,
Nessus, ISS, Retina, and Burp Suite scanners, also on proper document results and updating earlier
documents
• Performed a NIST VOIP audit hearing to NIST’s SP 800-58 requirement.
ITT Corporation 08/2004-08/2005
Network Administrator in Iraq
Camp Basrah Iraq: Performing network support operations for the US Army. I was responsible for
maintaining 25 routers, 30 switches and 4 Cisco Pix Firewalls.
I have implemented all networking devices to send their logs to a syslog server and enabled SSH on
several networking devices. Have made several changes to the routers and Pix firewalls on both the
NIPR and SIPR networks. Enabled switch port security throughout the network and implemented a new
process for attaching new computers to the network. I implemented Websense for web filtering and
“WhatsUp Gold” for network monitoring. Performed troubleshooting on several non-working Dell Edge
Servers, identified the problem and order replacement parts, when parts arrived (mother boards)
installed them. Eventually these servers were the servers I used for Web Sense and “WhatsUp Gold”
servers.
AssetTRADE.com 03/2000–06/2003
Data Center and Security Manager
• Managed data center operations, leading the design/implementation of WAN connectivity for secure
VPN tunneling and for monitoring critical/noncritical systems worldwide
• Designed and implemented a companywide infrastructure plan using VPN and consolidating three
companies/networks, including three major sites and 15 remote sites
• Planned and implemented a Windows Active Directory network merger/upgrade and developed and
implemented a companywide end-user support process plan
Information Technology Project Manager
• Oversaw the design, implementation, and management of infrastructure-related projects in corporate
and regional offices––including an IPSEC VPN implementation using Cisco 3640, 2600, and 1700 series
routers and Checkpoint FW1 that connected three locations
• Migrated newly purchased companies to Windows 2000/Exchange from Novell NDS-based networks
and performed security analysis of remote offices and main data center
Senior Network Engineer (Lead Technician)
• Oversaw data center security and networking design/installation; implemented Checkpoint
RealSecure IDS; and performed monitoring and packet analysis
6. • Monitored network health by installing CiscoWorks, BigBrother, and IPSentry to provide real-time
alert notifications to pagers/cell phones for network outages, security breaches, etc.
Deloitte & Touché Consulting Group 08/1998–5/2000
Senior Network Engineer/Architect
Responsible for the research and development of new network operating systems implementations
and upgrades for the North American network.
I performed troubleshooting, maintaining and instruction on existing systems, and making
recommendations for improvements in standard operating procedures. Designed and implemented
the upgrade of the corporation North American network and implementing NDS, DNS, and UNIX print
services, FTP, and DHCP. This included the hardware redesign and upgrade. Managed a small team
that integrated with construction elements for 5 new office “build-outs”. This included placements of
electrical outlets and cable drops for workstations to switching closets. Designed and installed
Deloitte Consulting European Remote Access Center, which included infrastructure design
(Corebuilder 3500), Compaq servers, and Windows workstations.
ADDITIONAL PROFESSIONAL EXPERIENCE
GR Group (Now Grant Thornton) 2005
Information Assurance Security Engineer:
AT&T Government Solutions 2004
Information Assurance Security Engineer
Bell Atlantic Network Integration (Now Verizon), Malvern, Pa: 1/97 - 09/98
Security Engineer/Consultant: 12/97-09/98
Manager/Senior Network Engineer: 1/97 - 12/97
Vinnell Arabia, Riyadh, Saudi Arabia 1992–1996
Network Manager/Operations Project Manager
U.S. Army 1984–1992
Infantry Officer
7. • Monitored network health by installing CiscoWorks, BigBrother, and IPSentry to provide real-time
alert notifications to pagers/cell phones for network outages, security breaches, etc.
Deloitte & Touché Consulting Group 08/1998–5/2000
Senior Network Engineer/Architect
Responsible for the research and development of new network operating systems implementations
and upgrades for the North American network.
I performed troubleshooting, maintaining and instruction on existing systems, and making
recommendations for improvements in standard operating procedures. Designed and implemented
the upgrade of the corporation North American network and implementing NDS, DNS, and UNIX print
services, FTP, and DHCP. This included the hardware redesign and upgrade. Managed a small team
that integrated with construction elements for 5 new office “build-outs”. This included placements of
electrical outlets and cable drops for workstations to switching closets. Designed and installed
Deloitte Consulting European Remote Access Center, which included infrastructure design
(Corebuilder 3500), Compaq servers, and Windows workstations.
ADDITIONAL PROFESSIONAL EXPERIENCE
GR Group (Now Grant Thornton) 2005
Information Assurance Security Engineer:
AT&T Government Solutions 2004
Information Assurance Security Engineer
Bell Atlantic Network Integration (Now Verizon), Malvern, Pa: 1/97 - 09/98
Security Engineer/Consultant: 12/97-09/98
Manager/Senior Network Engineer: 1/97 - 12/97
Vinnell Arabia, Riyadh, Saudi Arabia 1992–1996
Network Manager/Operations Project Manager
U.S. Army 1984–1992
Infantry Officer