SlideShare a Scribd company logo
JOHN J. DOYLE
23 Latschar Lane
Spring City, Pa 19475
610-203-2488(c)
jjdoyle@comcast.net
SECURITY CLEARANCE:
Top Secret/SSBI
EDUCATION
• B.S., Criminal Justice, The College at Brockport State University of New York, 1984
• M.S., Information Science –The Pennsylvania State University 2013
CERTIFICATIONS
• Certified SCRUM Master (CSM) #000347666, 2014
• Project Management Professional (PMP)#1553509, 2012
• Certified ITIL Foundation V3 Training #4409260, EXIN 2012
• Certified Information Systems Security Professional (CISSP) #41053, 2004
• Certified Information Systems Auditor (CISA) #217841, 2005
• Cisco Certified Network Associate/Cisco Certified Design Associate (CCNA/CCDA), 2009
• Checkpoint Certified Security Administrator/Checkpoint Certified Security Engineer (CCSA/CCSE),
2004
• Nokia Security Administrator (NSA), 2002
• Microsoft Certified Systems Engineer (MCSE), 2002
• Compaq ASE, 2000
• System Center Configuration Management 2012, 12/2013
• CCSP training taken 12/16
SUMMARY OF QUALIFICATIONS
I am a high-performing cybersecurity professional and veteran project manager. I am able to manage
and understand the detail of network infrastructure and security issues, due to the fact I have worked
many years being a network and security engineer; I am a Project Manager first, and then a
Cybersecurity Expert.
Well versed in the Risk Management Framework and detail knowledge of SP 800-53 rev4, SP 800-53a, SP
800-37 which comes from several years of leading over 7 Certification and Accreditation audits.
As a Project Manager and as an engineer I have managed, monitored, analyzed, and minimized the
operational impact of dynamic threats to critical public and private sector IT infrastructures. Domain
knowledge of network design, routing protocol, incident handling, remediation, packet analysis, security
auditing, intrusion detection, and vulnerability assessment—coupled with team leadership, hands-on,
and financial management capabilities—enables me to deliver, redundant, efficient, secure, available
infrastructures and systems that defend against attacks and infiltration. I have credentials in industry-
leading security and management certifications (e.g. PMP, CISSP, CISA, ITIL, CSM, CCNA), expertise in
legal and regulatory compliance (e.g., FISMA, NIST, DIACAP, SOX, NERC), and additional experience in
current cyber technologies (e.g., Checkpoint, Cisco ASA/PIX Firewall, Blue Coat, ArcSight, SourceFire, and
Splunk.)
I have lead cross-functional teams to define scope, plan, execute and deliver exceptional business value
on time and within budget. The projects I managed ranged in size from large to small across a wide
range of technology platforms. All my projects have been very visible and hands-on project management
role where I was the spokesperson for the capabilities of the project across a variety of audiences, as
well as coordinate and lead project activities. I was always the single point of contact for all project
activities and responsible for each project success.
PROFESSIONAL EXPERIENCE
ManTech International (Port Authority of NY/NJ) 01/2016-Present
Network CyberSecurity SME/Project Manager
• Lead Cyber Security projects to completion. Develop requirements, milestones, tasks and activities,
and manages stakeholder’s expectations. Conduct risk analysis on security related issues as well as
project related issues.
• Conduct the scheduling, planning, design, engineering, deployment, operation, and maintenance of
the organizations security tools.
• Developed the Splunk design and install process.
• Wrote SEIM CONOPS, SOP and assisted in the USE Case development for potential malicious actors.
• Provided guidance to the SOC team on the process for Incident Management.
• Provided guidance on what logs and by what priority needed to be ingested by the Splunk SEIM.
• Reviewed the Port Authority’s technical infrastructure to support the security tools, and review
configurations and upgrades necessary to implement and maintain them.
• Develop milestones, progress reports, manage vendors and responsible for the standardize security
deployment and operating procedures with respect to the use of these tools.
• Reviewed and analyze marketplace technology to help develop the Cyber Security Program.
• Used National Institute of Standards and Technologies (NIST) SP 800 series (RMF) documents as the
security framework for securing the PANYNJ network.
• Manage and track activities related to the above efforts to ensure that its use of technologies – and
its policies, processes, and procedures – comply with the NIST standards and guidelines.
• Track and coordinate activities related to the Cyber Security Program to ensure that its industrial
control systems comply with NIST RMF security practices.
• Organize and consolidate risk assessments on different technologies used, to help determine and
prioritize remediation plans. Drafted policies and procedures related to cyber security.
• Based on the NIST Risk Management Framework (SP 800-53 Rev 4), consolidated several vendors’
security assessments and developed a rational and coherent summary for the Port Authority
Management to develop an Enterprise Security Enhancement Program.
• Project Manager for several medium to large size projects including; Splunk and Click design, pilot,
tuning, and deployment; EnCase design, pilot, tuning, and deployment; Evaluation of 18 security tools
that are in different stages of deployment and configuration; Pentest of an ICS; and Network
segmentation.
Horizon Industries (Defense Logistics Agency at New Cumberland, PA) 09/2013–01/2016
Infrastructure Project Manager
• The Defense Logistics Agency (DLA) provides logistical support for all branches of the US Military
worldwide. There is over 50,000 servers, desktops, laptops, and mobile devices that need software
maintain and configured securely.
• Responsible for all aspects of the development and implementation of software deployment for the
entire Defense Logistics Agency assigned projects and provide a single point of contact for those
projects that involve the distribution of software updates, security packages, images upgrades at the
enterprise level.
• Lead one major infrastructure of over $4 million and several smaller projects. I had 6 direct reports
and 24 additional individuals in a matrix environment working on all my projects.
• Take projects from original concept through final implementation. I Interfaces with all areas affected
by the project including; senior management, accounting, end users, computer services, vendors, and
client services.
• Develop detailed work plans, schedules, project estimates, resource plans, and financial and
operational status reports: utilizing SharePoint, MS Project, Scrum and EV.
• Conduct project meetings and is responsible for project tracking using several tools to include Earned
Value and Risk Analysis.
• Ensures adherence to quality standards and reviews project deliverables.
• Manages the integration of vendor tasks and tracks and reviews vendor deliverables.
• Provides technical and analytical guidance to all team members. Recommends and takes action to
direct the analysis and solutions of problems.
PJM Interconnect, Audubon, Pa 11/2012 06/2013
Security Analyst
• Assisted in conducting an internal audit using the NERC/CIP requirements
• Setup and conducted vulnerability scans using Nessus Security Center
Qinetiq North America 06/2011–11/2012
Team Lead/Manager
• Lead and managed the FEMA Support SOC Team supporting the 24/7/365 SOC that monitors intrusion
detection systems (IDSs) at the DHS SOC, working with SourceFire sensors through the Defense Center
Management Console and ArcSight Enterprise Management System
• Team consisted of 13 individuals; level I, level II analysts, and a forensics team. The level III analysts
were government employees who had the ability to reach individuals devices for remediation.
• Revamped SOP for the intrusion detection process and identified new metrics tied to key points in the
process, with the goal of reducing time of infection to time of remediation
• Created a weekly (sometimes every other day) “learning Briefing” that was designed to share new
insights into new malicious code, how to look for new or emerging attacks.
• Developed an out-of-band capability using a virtual machine for analysts to use by going to suspected
malicious sites and record the interaction, like registry changes, system call-backs, or downloading
software to confirm the event was positive and provide the evidence to the Level III analysts and the
forensics team
• Creates effective security event notifications through increased communication between the SOC
team and the FEMA security team at the Mount Weather Emergency Operations Center, ensuring
quick resolution to incidents
• Identified strong performers in the group and designated shift leads, assigning additional duties that
included monitoring and mentoring the performance of shift personnel
• Implemented a three-point program to reduce false positives: correctly defining the Home_Net for all
sensors; correctly identifying infrastructure devices; and creating an IP address process for unrecorded
networking devices, including rule changes.
George Mason University (evening Instructor) 11/2011-05/2012
AAI Corporation 10/2010–06/2011
Information Assurance System Engineer IV/Manager
• Managed the installing and securing of control platforms of Drone Aircraft being built for the US
Army
• Used Earned Value Management for reviewing project progress, enabling early forecasting and
resolution of cost and schedule issues.
• Provided technical and managerial support to Information Assurance Certification & Accreditation
activities, including analysis and evaluation of security concepts, designs, and tests; threat, risk, and
vulnerability assessments; security certification ST&E; and risk analysis in a software development
lifecycle
• Team assessed system vulnerabilities and determined the adequacy of security controls and the level
of residual risk in networking devices and software (custom and COTS)
• Managed multiple projects Used DIACAP to secure servers, networking devices, and software;
directed running Gold Disk and SRR scans; directed and performed Retina and Nmap scans; and
developed Plans of Action and Milestones (POA&Ms)—all leading to Authorization to Operate
Stanley Associates, Inc. 10/2009–06/2010
Senior Information Assurance Security Analyst
Working at DISA
• Analyzed requests for connection to the SIPRNet to ensure that they met government standards
based on the DoDI 8500 series and NIST Special Publication 800 series
• Reviewed network diagrams, scorecards, POA&Ms, and Designated Approving Authority Interim
Authorization to Communicate and Authorization to Communicate requests
AT&T Government Solutions 08/2005–08/2009
Project Manager/Lead Auditor
• Defined scope, gathered requirements, developed tasks and tasks sequence, developed
communications plan and risk matrix Managed projects from requirements gathering through closure.
Provided SME guidance and Project Manager over site to security audits, risk assessments, and system
T&E (ST&E); providing instruction on writing of System Security Plans in compliance with government
regulations (e.g., FISMA, NIST, DIACAP, SOX); reviewed, edited, and approved documentation to be
given to the customer. Assisted clients write Disaster Recovery Plans and Business Continuity Plans
• Advised team members on conducting ST&E and the execution of scans using Foundstone Enterprise,
Nessus, ISS, Retina, and Burp Suite scanners, also on proper document results and updating earlier
documents
• Performed a NIST VOIP audit hearing to NIST’s SP 800-58 requirement.
ITT Corporation 08/2004-08/2005
Network Administrator in Iraq
Camp Basrah Iraq: Performing network support operations for the US Army. I was responsible for
maintaining 25 routers, 30 switches and 4 Cisco Pix Firewalls.
I have implemented all networking devices to send their logs to a syslog server and enabled SSH on
several networking devices. Have made several changes to the routers and Pix firewalls on both the
NIPR and SIPR networks. Enabled switch port security throughout the network and implemented a new
process for attaching new computers to the network. I implemented Websense for web filtering and
“WhatsUp Gold” for network monitoring. Performed troubleshooting on several non-working Dell Edge
Servers, identified the problem and order replacement parts, when parts arrived (mother boards)
installed them. Eventually these servers were the servers I used for Web Sense and “WhatsUp Gold”
servers.
AssetTRADE.com 03/2000–06/2003
Data Center and Security Manager
• Managed data center operations, leading the design/implementation of WAN connectivity for secure
VPN tunneling and for monitoring critical/noncritical systems worldwide
• Designed and implemented a companywide infrastructure plan using VPN and consolidating three
companies/networks, including three major sites and 15 remote sites
• Planned and implemented a Windows Active Directory network merger/upgrade and developed and
implemented a companywide end-user support process plan
Information Technology Project Manager
• Oversaw the design, implementation, and management of infrastructure-related projects in corporate
and regional offices––including an IPSEC VPN implementation using Cisco 3640, 2600, and 1700 series
routers and Checkpoint FW1 that connected three locations
• Migrated newly purchased companies to Windows 2000/Exchange from Novell NDS-based networks
and performed security analysis of remote offices and main data center
Senior Network Engineer (Lead Technician)
• Oversaw data center security and networking design/installation; implemented Checkpoint
RealSecure IDS; and performed monitoring and packet analysis
• Monitored network health by installing CiscoWorks, BigBrother, and IPSentry to provide real-time
alert notifications to pagers/cell phones for network outages, security breaches, etc.
Deloitte & Touché Consulting Group 08/1998–5/2000
Senior Network Engineer/Architect
Responsible for the research and development of new network operating systems implementations
and upgrades for the North American network.
I performed troubleshooting, maintaining and instruction on existing systems, and making
recommendations for improvements in standard operating procedures. Designed and implemented
the upgrade of the corporation North American network and implementing NDS, DNS, and UNIX print
services, FTP, and DHCP. This included the hardware redesign and upgrade. Managed a small team
that integrated with construction elements for 5 new office “build-outs”. This included placements of
electrical outlets and cable drops for workstations to switching closets. Designed and installed
Deloitte Consulting European Remote Access Center, which included infrastructure design
(Corebuilder 3500), Compaq servers, and Windows workstations.
ADDITIONAL PROFESSIONAL EXPERIENCE
GR Group (Now Grant Thornton) 2005
Information Assurance Security Engineer:
AT&T Government Solutions 2004
Information Assurance Security Engineer
Bell Atlantic Network Integration (Now Verizon), Malvern, Pa: 1/97 - 09/98
Security Engineer/Consultant: 12/97-09/98
Manager/Senior Network Engineer: 1/97 - 12/97
Vinnell Arabia, Riyadh, Saudi Arabia 1992–1996
Network Manager/Operations Project Manager
U.S. Army 1984–1992
Infantry Officer
• Monitored network health by installing CiscoWorks, BigBrother, and IPSentry to provide real-time
alert notifications to pagers/cell phones for network outages, security breaches, etc.
Deloitte & Touché Consulting Group 08/1998–5/2000
Senior Network Engineer/Architect
Responsible for the research and development of new network operating systems implementations
and upgrades for the North American network.
I performed troubleshooting, maintaining and instruction on existing systems, and making
recommendations for improvements in standard operating procedures. Designed and implemented
the upgrade of the corporation North American network and implementing NDS, DNS, and UNIX print
services, FTP, and DHCP. This included the hardware redesign and upgrade. Managed a small team
that integrated with construction elements for 5 new office “build-outs”. This included placements of
electrical outlets and cable drops for workstations to switching closets. Designed and installed
Deloitte Consulting European Remote Access Center, which included infrastructure design
(Corebuilder 3500), Compaq servers, and Windows workstations.
ADDITIONAL PROFESSIONAL EXPERIENCE
GR Group (Now Grant Thornton) 2005
Information Assurance Security Engineer:
AT&T Government Solutions 2004
Information Assurance Security Engineer
Bell Atlantic Network Integration (Now Verizon), Malvern, Pa: 1/97 - 09/98
Security Engineer/Consultant: 12/97-09/98
Manager/Senior Network Engineer: 1/97 - 12/97
Vinnell Arabia, Riyadh, Saudi Arabia 1992–1996
Network Manager/Operations Project Manager
U.S. Army 1984–1992
Infantry Officer

More Related Content

What's hot

The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
Ashley Deuble
 
McElvy Resume 2015
McElvy Resume 2015McElvy Resume 2015
McElvy Resume 2015Debra McElvy
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2
SIMONTHOMAS S
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
John Gilligan
 
Critical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC TrainingCritical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC Training
Tonex
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
Satish Chavan
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume todayNana Owusu
 
Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy
John Gilligan
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC Phases
Ishrath Sultana
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project Robert D. Williams
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
Dell EMC World
 
Building a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops CenterBuilding a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops Center
Priyanka Aash
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResumeNadia Pryadko
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
Cprime
 

What's hot (19)

The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
 
McElvy Resume 2015
McElvy Resume 2015McElvy Resume 2015
McElvy Resume 2015
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
Critical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC TrainingCritical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC Training
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume today
 
Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC Phases
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 
Martin_Leroux_2014
Martin_Leroux_2014Martin_Leroux_2014
Martin_Leroux_2014
 
Building a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops CenterBuilding a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops Center
 
Network Operations Center Processes- Isaac Mwesigwa
Network Operations Center Processes- Isaac MwesigwaNetwork Operations Center Processes- Isaac Mwesigwa
Network Operations Center Processes- Isaac Mwesigwa
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResume
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 

Viewers also liked

Rushin shah resume
Rushin shah resumeRushin shah resume
Rushin shah resume
Rushin Shah
 
WILLIAM W.Wagner resume R-3
WILLIAM W.Wagner resume R-3WILLIAM W.Wagner resume R-3
WILLIAM W.Wagner resume R-3William Wagner
 
Resume of Robert Nagle
Resume of Robert NagleResume of Robert Nagle
Resume of Robert Nagle
rnagle
 
Shannon K Watson Resume 9-08-2016
Shannon K Watson Resume 9-08-2016Shannon K Watson Resume 9-08-2016
Shannon K Watson Resume 9-08-2016Shannon Watson
 
Resume _ IT Manager
Resume _ IT ManagerResume _ IT Manager
Resume _ IT Manager
Greta R. Schneider
 
Resume - K Voos May 2016
Resume - K Voos May 2016Resume - K Voos May 2016
Resume - K Voos May 2016Kitty Voos
 
Resume
ResumeResume
Resume
David Ford
 
Clay Alvin Resume 4-15
Clay Alvin Resume 4-15Clay Alvin Resume 4-15
Clay Alvin Resume 4-15Alvin Clay
 
2016 Bob resume (003)
2016 Bob resume (003)2016 Bob resume (003)
2016 Bob resume (003)Robert Palac
 
Briam Moser -- resume
Briam Moser -- resume Briam Moser -- resume
Briam Moser -- resume Briam Moser
 
Cv dr abdiweli m ali gaas
Cv   dr abdiweli m ali gaasCv   dr abdiweli m ali gaas
Cv dr abdiweli m ali gaasHorseed Mediaa
 

Viewers also liked (15)

Rushin shah resume
Rushin shah resumeRushin shah resume
Rushin shah resume
 
WILLIAM W.Wagner resume R-3
WILLIAM W.Wagner resume R-3WILLIAM W.Wagner resume R-3
WILLIAM W.Wagner resume R-3
 
Resume of Robert Nagle
Resume of Robert NagleResume of Robert Nagle
Resume of Robert Nagle
 
Philip Morganti Resume 1
Philip Morganti Resume 1Philip Morganti Resume 1
Philip Morganti Resume 1
 
Shannon K Watson Resume 9-08-2016
Shannon K Watson Resume 9-08-2016Shannon K Watson Resume 9-08-2016
Shannon K Watson Resume 9-08-2016
 
Resume _ IT Manager
Resume _ IT ManagerResume _ IT Manager
Resume _ IT Manager
 
Resume - K Voos May 2016
Resume - K Voos May 2016Resume - K Voos May 2016
Resume - K Voos May 2016
 
Resume
ResumeResume
Resume
 
Clay Alvin Resume 4-15
Clay Alvin Resume 4-15Clay Alvin Resume 4-15
Clay Alvin Resume 4-15
 
Rgb resume 2016
Rgb resume 2016Rgb resume 2016
Rgb resume 2016
 
Howards resume 2014
Howards resume 2014Howards resume 2014
Howards resume 2014
 
2016 Bob resume (003)
2016 Bob resume (003)2016 Bob resume (003)
2016 Bob resume (003)
 
D J Gawera Resume
D J Gawera  ResumeD J Gawera  Resume
D J Gawera Resume
 
Briam Moser -- resume
Briam Moser -- resume Briam Moser -- resume
Briam Moser -- resume
 
Cv dr abdiweli m ali gaas
Cv   dr abdiweli m ali gaasCv   dr abdiweli m ali gaas
Cv dr abdiweli m ali gaas
 

Similar to 08252016 John D Resume ITIL PMP CISSP CSM CISA1

Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resumeAlbert Gonzales
 
C_COHEN_RESUME
C_COHEN_RESUMEC_COHEN_RESUME
C_COHEN_RESUMECarl Cohen
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek Mezack
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
O%22Grady Resume V4
O%22Grady Resume V4O%22Grady Resume V4
O%22Grady Resume V4Bob O'Grady
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
Frances Coronel
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resume
Greg Yee
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
it160320737038
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)Abhishek Sa
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey Smith
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 

Similar to 08252016 John D Resume ITIL PMP CISSP CSM CISA1 (20)

Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
 
C_COHEN_RESUME
C_COHEN_RESUMEC_COHEN_RESUME
C_COHEN_RESUME
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Harris_Resume_2016_ITS_gmail
Harris_Resume_2016_ITS_gmailHarris_Resume_2016_ITS_gmail
Harris_Resume_2016_ITS_gmail
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_k
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
O%22Grady Resume V4
O%22Grady Resume V4O%22Grady Resume V4
O%22Grady Resume V4
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resume
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Jason Allred Resume
Jason Allred ResumeJason Allred Resume
Jason Allred Resume
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Holtzlander Resume1-23-16
Holtzlander Resume1-23-16Holtzlander Resume1-23-16
Holtzlander Resume1-23-16
 

08252016 John D Resume ITIL PMP CISSP CSM CISA1

  • 1. JOHN J. DOYLE 23 Latschar Lane Spring City, Pa 19475 610-203-2488(c) jjdoyle@comcast.net SECURITY CLEARANCE: Top Secret/SSBI EDUCATION • B.S., Criminal Justice, The College at Brockport State University of New York, 1984 • M.S., Information Science –The Pennsylvania State University 2013 CERTIFICATIONS • Certified SCRUM Master (CSM) #000347666, 2014 • Project Management Professional (PMP)#1553509, 2012 • Certified ITIL Foundation V3 Training #4409260, EXIN 2012 • Certified Information Systems Security Professional (CISSP) #41053, 2004 • Certified Information Systems Auditor (CISA) #217841, 2005 • Cisco Certified Network Associate/Cisco Certified Design Associate (CCNA/CCDA), 2009 • Checkpoint Certified Security Administrator/Checkpoint Certified Security Engineer (CCSA/CCSE), 2004 • Nokia Security Administrator (NSA), 2002 • Microsoft Certified Systems Engineer (MCSE), 2002 • Compaq ASE, 2000 • System Center Configuration Management 2012, 12/2013 • CCSP training taken 12/16 SUMMARY OF QUALIFICATIONS I am a high-performing cybersecurity professional and veteran project manager. I am able to manage and understand the detail of network infrastructure and security issues, due to the fact I have worked many years being a network and security engineer; I am a Project Manager first, and then a Cybersecurity Expert. Well versed in the Risk Management Framework and detail knowledge of SP 800-53 rev4, SP 800-53a, SP 800-37 which comes from several years of leading over 7 Certification and Accreditation audits. As a Project Manager and as an engineer I have managed, monitored, analyzed, and minimized the operational impact of dynamic threats to critical public and private sector IT infrastructures. Domain knowledge of network design, routing protocol, incident handling, remediation, packet analysis, security auditing, intrusion detection, and vulnerability assessment—coupled with team leadership, hands-on, and financial management capabilities—enables me to deliver, redundant, efficient, secure, available infrastructures and systems that defend against attacks and infiltration. I have credentials in industry- leading security and management certifications (e.g. PMP, CISSP, CISA, ITIL, CSM, CCNA), expertise in
  • 2. legal and regulatory compliance (e.g., FISMA, NIST, DIACAP, SOX, NERC), and additional experience in current cyber technologies (e.g., Checkpoint, Cisco ASA/PIX Firewall, Blue Coat, ArcSight, SourceFire, and Splunk.) I have lead cross-functional teams to define scope, plan, execute and deliver exceptional business value on time and within budget. The projects I managed ranged in size from large to small across a wide range of technology platforms. All my projects have been very visible and hands-on project management role where I was the spokesperson for the capabilities of the project across a variety of audiences, as well as coordinate and lead project activities. I was always the single point of contact for all project activities and responsible for each project success. PROFESSIONAL EXPERIENCE ManTech International (Port Authority of NY/NJ) 01/2016-Present Network CyberSecurity SME/Project Manager • Lead Cyber Security projects to completion. Develop requirements, milestones, tasks and activities, and manages stakeholder’s expectations. Conduct risk analysis on security related issues as well as project related issues. • Conduct the scheduling, planning, design, engineering, deployment, operation, and maintenance of the organizations security tools. • Developed the Splunk design and install process. • Wrote SEIM CONOPS, SOP and assisted in the USE Case development for potential malicious actors. • Provided guidance to the SOC team on the process for Incident Management. • Provided guidance on what logs and by what priority needed to be ingested by the Splunk SEIM. • Reviewed the Port Authority’s technical infrastructure to support the security tools, and review configurations and upgrades necessary to implement and maintain them. • Develop milestones, progress reports, manage vendors and responsible for the standardize security deployment and operating procedures with respect to the use of these tools. • Reviewed and analyze marketplace technology to help develop the Cyber Security Program. • Used National Institute of Standards and Technologies (NIST) SP 800 series (RMF) documents as the security framework for securing the PANYNJ network. • Manage and track activities related to the above efforts to ensure that its use of technologies – and its policies, processes, and procedures – comply with the NIST standards and guidelines. • Track and coordinate activities related to the Cyber Security Program to ensure that its industrial control systems comply with NIST RMF security practices. • Organize and consolidate risk assessments on different technologies used, to help determine and prioritize remediation plans. Drafted policies and procedures related to cyber security. • Based on the NIST Risk Management Framework (SP 800-53 Rev 4), consolidated several vendors’ security assessments and developed a rational and coherent summary for the Port Authority Management to develop an Enterprise Security Enhancement Program. • Project Manager for several medium to large size projects including; Splunk and Click design, pilot, tuning, and deployment; EnCase design, pilot, tuning, and deployment; Evaluation of 18 security tools that are in different stages of deployment and configuration; Pentest of an ICS; and Network segmentation.
  • 3. Horizon Industries (Defense Logistics Agency at New Cumberland, PA) 09/2013–01/2016 Infrastructure Project Manager • The Defense Logistics Agency (DLA) provides logistical support for all branches of the US Military worldwide. There is over 50,000 servers, desktops, laptops, and mobile devices that need software maintain and configured securely. • Responsible for all aspects of the development and implementation of software deployment for the entire Defense Logistics Agency assigned projects and provide a single point of contact for those projects that involve the distribution of software updates, security packages, images upgrades at the enterprise level. • Lead one major infrastructure of over $4 million and several smaller projects. I had 6 direct reports and 24 additional individuals in a matrix environment working on all my projects. • Take projects from original concept through final implementation. I Interfaces with all areas affected by the project including; senior management, accounting, end users, computer services, vendors, and client services. • Develop detailed work plans, schedules, project estimates, resource plans, and financial and operational status reports: utilizing SharePoint, MS Project, Scrum and EV. • Conduct project meetings and is responsible for project tracking using several tools to include Earned Value and Risk Analysis. • Ensures adherence to quality standards and reviews project deliverables. • Manages the integration of vendor tasks and tracks and reviews vendor deliverables. • Provides technical and analytical guidance to all team members. Recommends and takes action to direct the analysis and solutions of problems. PJM Interconnect, Audubon, Pa 11/2012 06/2013 Security Analyst • Assisted in conducting an internal audit using the NERC/CIP requirements • Setup and conducted vulnerability scans using Nessus Security Center Qinetiq North America 06/2011–11/2012 Team Lead/Manager • Lead and managed the FEMA Support SOC Team supporting the 24/7/365 SOC that monitors intrusion detection systems (IDSs) at the DHS SOC, working with SourceFire sensors through the Defense Center Management Console and ArcSight Enterprise Management System • Team consisted of 13 individuals; level I, level II analysts, and a forensics team. The level III analysts were government employees who had the ability to reach individuals devices for remediation. • Revamped SOP for the intrusion detection process and identified new metrics tied to key points in the process, with the goal of reducing time of infection to time of remediation • Created a weekly (sometimes every other day) “learning Briefing” that was designed to share new insights into new malicious code, how to look for new or emerging attacks. • Developed an out-of-band capability using a virtual machine for analysts to use by going to suspected malicious sites and record the interaction, like registry changes, system call-backs, or downloading
  • 4. software to confirm the event was positive and provide the evidence to the Level III analysts and the forensics team • Creates effective security event notifications through increased communication between the SOC team and the FEMA security team at the Mount Weather Emergency Operations Center, ensuring quick resolution to incidents • Identified strong performers in the group and designated shift leads, assigning additional duties that included monitoring and mentoring the performance of shift personnel • Implemented a three-point program to reduce false positives: correctly defining the Home_Net for all sensors; correctly identifying infrastructure devices; and creating an IP address process for unrecorded networking devices, including rule changes. George Mason University (evening Instructor) 11/2011-05/2012 AAI Corporation 10/2010–06/2011 Information Assurance System Engineer IV/Manager • Managed the installing and securing of control platforms of Drone Aircraft being built for the US Army • Used Earned Value Management for reviewing project progress, enabling early forecasting and resolution of cost and schedule issues. • Provided technical and managerial support to Information Assurance Certification & Accreditation activities, including analysis and evaluation of security concepts, designs, and tests; threat, risk, and vulnerability assessments; security certification ST&E; and risk analysis in a software development lifecycle • Team assessed system vulnerabilities and determined the adequacy of security controls and the level of residual risk in networking devices and software (custom and COTS) • Managed multiple projects Used DIACAP to secure servers, networking devices, and software; directed running Gold Disk and SRR scans; directed and performed Retina and Nmap scans; and developed Plans of Action and Milestones (POA&Ms)—all leading to Authorization to Operate Stanley Associates, Inc. 10/2009–06/2010 Senior Information Assurance Security Analyst Working at DISA • Analyzed requests for connection to the SIPRNet to ensure that they met government standards based on the DoDI 8500 series and NIST Special Publication 800 series • Reviewed network diagrams, scorecards, POA&Ms, and Designated Approving Authority Interim Authorization to Communicate and Authorization to Communicate requests AT&T Government Solutions 08/2005–08/2009 Project Manager/Lead Auditor • Defined scope, gathered requirements, developed tasks and tasks sequence, developed
  • 5. communications plan and risk matrix Managed projects from requirements gathering through closure. Provided SME guidance and Project Manager over site to security audits, risk assessments, and system T&E (ST&E); providing instruction on writing of System Security Plans in compliance with government regulations (e.g., FISMA, NIST, DIACAP, SOX); reviewed, edited, and approved documentation to be given to the customer. Assisted clients write Disaster Recovery Plans and Business Continuity Plans • Advised team members on conducting ST&E and the execution of scans using Foundstone Enterprise, Nessus, ISS, Retina, and Burp Suite scanners, also on proper document results and updating earlier documents • Performed a NIST VOIP audit hearing to NIST’s SP 800-58 requirement. ITT Corporation 08/2004-08/2005 Network Administrator in Iraq Camp Basrah Iraq: Performing network support operations for the US Army. I was responsible for maintaining 25 routers, 30 switches and 4 Cisco Pix Firewalls. I have implemented all networking devices to send their logs to a syslog server and enabled SSH on several networking devices. Have made several changes to the routers and Pix firewalls on both the NIPR and SIPR networks. Enabled switch port security throughout the network and implemented a new process for attaching new computers to the network. I implemented Websense for web filtering and “WhatsUp Gold” for network monitoring. Performed troubleshooting on several non-working Dell Edge Servers, identified the problem and order replacement parts, when parts arrived (mother boards) installed them. Eventually these servers were the servers I used for Web Sense and “WhatsUp Gold” servers. AssetTRADE.com 03/2000–06/2003 Data Center and Security Manager • Managed data center operations, leading the design/implementation of WAN connectivity for secure VPN tunneling and for monitoring critical/noncritical systems worldwide • Designed and implemented a companywide infrastructure plan using VPN and consolidating three companies/networks, including three major sites and 15 remote sites • Planned and implemented a Windows Active Directory network merger/upgrade and developed and implemented a companywide end-user support process plan Information Technology Project Manager • Oversaw the design, implementation, and management of infrastructure-related projects in corporate and regional offices––including an IPSEC VPN implementation using Cisco 3640, 2600, and 1700 series routers and Checkpoint FW1 that connected three locations • Migrated newly purchased companies to Windows 2000/Exchange from Novell NDS-based networks and performed security analysis of remote offices and main data center Senior Network Engineer (Lead Technician) • Oversaw data center security and networking design/installation; implemented Checkpoint RealSecure IDS; and performed monitoring and packet analysis
  • 6. • Monitored network health by installing CiscoWorks, BigBrother, and IPSentry to provide real-time alert notifications to pagers/cell phones for network outages, security breaches, etc. Deloitte & Touché Consulting Group 08/1998–5/2000 Senior Network Engineer/Architect Responsible for the research and development of new network operating systems implementations and upgrades for the North American network. I performed troubleshooting, maintaining and instruction on existing systems, and making recommendations for improvements in standard operating procedures. Designed and implemented the upgrade of the corporation North American network and implementing NDS, DNS, and UNIX print services, FTP, and DHCP. This included the hardware redesign and upgrade. Managed a small team that integrated with construction elements for 5 new office “build-outs”. This included placements of electrical outlets and cable drops for workstations to switching closets. Designed and installed Deloitte Consulting European Remote Access Center, which included infrastructure design (Corebuilder 3500), Compaq servers, and Windows workstations. ADDITIONAL PROFESSIONAL EXPERIENCE GR Group (Now Grant Thornton) 2005 Information Assurance Security Engineer: AT&T Government Solutions 2004 Information Assurance Security Engineer Bell Atlantic Network Integration (Now Verizon), Malvern, Pa: 1/97 - 09/98 Security Engineer/Consultant: 12/97-09/98 Manager/Senior Network Engineer: 1/97 - 12/97 Vinnell Arabia, Riyadh, Saudi Arabia 1992–1996 Network Manager/Operations Project Manager U.S. Army 1984–1992 Infantry Officer
  • 7. • Monitored network health by installing CiscoWorks, BigBrother, and IPSentry to provide real-time alert notifications to pagers/cell phones for network outages, security breaches, etc. Deloitte & Touché Consulting Group 08/1998–5/2000 Senior Network Engineer/Architect Responsible for the research and development of new network operating systems implementations and upgrades for the North American network. I performed troubleshooting, maintaining and instruction on existing systems, and making recommendations for improvements in standard operating procedures. Designed and implemented the upgrade of the corporation North American network and implementing NDS, DNS, and UNIX print services, FTP, and DHCP. This included the hardware redesign and upgrade. Managed a small team that integrated with construction elements for 5 new office “build-outs”. This included placements of electrical outlets and cable drops for workstations to switching closets. Designed and installed Deloitte Consulting European Remote Access Center, which included infrastructure design (Corebuilder 3500), Compaq servers, and Windows workstations. ADDITIONAL PROFESSIONAL EXPERIENCE GR Group (Now Grant Thornton) 2005 Information Assurance Security Engineer: AT&T Government Solutions 2004 Information Assurance Security Engineer Bell Atlantic Network Integration (Now Verizon), Malvern, Pa: 1/97 - 09/98 Security Engineer/Consultant: 12/97-09/98 Manager/Senior Network Engineer: 1/97 - 12/97 Vinnell Arabia, Riyadh, Saudi Arabia 1992–1996 Network Manager/Operations Project Manager U.S. Army 1984–1992 Infantry Officer