SlideShare a Scribd company logo
1 of 1
Jeremiah Lanier
San Antonio, Texas 78233
443-240-6844
jeremiah.d.lanier@gmail.com
PROFESSIONAL SUMMARY
Enterprise Network Operations Technician/Systems Administrator and active duty military member possessing a
Top Secret/Sensitive Compartmented Information (TS/SCI) Security Clearance and Counter-Intelligence
Polygraph with over 5 years of proven experience supporting the ever-changing mission of the United States Air Force.
Realizes quantifiableresults while performing in a dynamic, high-tempo environment.
 Network Administration  Infrastructure Support  Network Auditing
 System Accreditation  Vulnerability Management  SSP
TECHNICAL COMPETENCIES:
Platforms: UNIX, Linux/Red Hat, Solaris, Windows XP/Vista/7/10, Windows Server 2008/2012
Tools: SCCM, ACAS/Security Center/Nessus, McAfee ePO, Red Hat Satellite, NetBackup, HP Network Node Manager,
VMware, Microsoft Active Directory
Networking: SSH, SSL, Digital Certificates, VPN, Putty, TCP/IP, LAN/WAN, DHCP
PROFESSIONAL EXPERIENCE:
UNITED STATES AIR FORCE – Kunsan Air Base, South Korea 2014-2015
Network Applications Technician
 Systems Administrator for 3,000+ localuser accounts
 Implemented, configured and managed network application monitoring tools for auditing and troubleshooting to
safeguard network functions spanning two separate DoD network environments
UNITED STATES AIR FORCE – Ft. George G. Meade, Maryland 2015-2018
Security Administrator
 Managed two Top Secret DoD enclaves supporting intel collection and cryptologic tasks
 Led vulnerability management team utilizing DoD security assessment tools to track, audit and harden enclaves
UNITED STATES AIR FORCE – Lackland AFB, Texas 2018-Present
Enterprise Network Operations Lead
 Monitors, responds to and reports all network outages within DoD impacting Unclassified, Secret and Top Secret
circuits across the enterprise
 Maintains and monitors physical/logicallines and error correction for secure JWICS channel logs and intel
EDUCATION/CERTIFICATIONS
CompTIA Security+ July 2014
The Pennsylvania StateUniversity, State College, PA August 2019
Master of Professional Studies in Information Sciences - Cybersecurity and
Information Assurance
The University of Southern Mississippi, Hattiesburg, MS May 2013
Bachelor of Interdisciplinary Studies – Information Technology and International Business
The Community College of the Air Force, Montgomery, AL Jan 2016
Associate in Applied Science in Information Systems Technology

More Related Content

What's hot

Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test ProfessionalsTechWell
 
Types Of Computer Security Attacks
Types Of Computer Security AttacksTypes Of Computer Security Attacks
Types Of Computer Security AttacksCentextech
 
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad AndrewsNorth Texas Chapter of the ISSA
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityDavid Zaizar
 
IT Specialist Luis A Santiago Rivera
IT Specialist Luis A Santiago RiveraIT Specialist Luis A Santiago Rivera
IT Specialist Luis A Santiago RiveraLUIS SANTIAGO
 
Alans Resume 2017
Alans Resume 2017Alans Resume 2017
Alans Resume 2017Alan Gray
 
Security Properties
Security PropertiesSecurity Properties
Security Propertieschauhankapil
 
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad AndrewsNorth Texas Chapter of the ISSA
 
Security Testing: 8 Key Roles in Healthcare Applications
Security Testing: 8 Key Roles in Healthcare ApplicationsSecurity Testing: 8 Key Roles in Healthcare Applications
Security Testing: 8 Key Roles in Healthcare ApplicationsQASource
 
laurie_reed_resume15.1
laurie_reed_resume15.1laurie_reed_resume15.1
laurie_reed_resume15.1Laurie Reed
 
New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howlandnado-web
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerabilityA. Shamel
 
Ivan Serranos Resume 6 2011
Ivan Serranos Resume 6 2011Ivan Serranos Resume 6 2011
Ivan Serranos Resume 6 2011cllsoftball
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) MiajackB
 
Matt Harlow Resume Government 2-2
Matt Harlow Resume Government 2-2Matt Harlow Resume Government 2-2
Matt Harlow Resume Government 2-2Matthew Harlow
 

What's hot (19)

Security communication
Security communicationSecurity communication
Security communication
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
Types Of Computer Security Attacks
Types Of Computer Security AttacksTypes Of Computer Security Attacks
Types Of Computer Security Attacks
 
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
Data Protection
Data ProtectionData Protection
Data Protection
 
IT Specialist Luis A Santiago Rivera
IT Specialist Luis A Santiago RiveraIT Specialist Luis A Santiago Rivera
IT Specialist Luis A Santiago Rivera
 
Alans Resume 2017
Alans Resume 2017Alans Resume 2017
Alans Resume 2017
 
Security Properties
Security PropertiesSecurity Properties
Security Properties
 
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
 
Security Testing: 8 Key Roles in Healthcare Applications
Security Testing: 8 Key Roles in Healthcare ApplicationsSecurity Testing: 8 Key Roles in Healthcare Applications
Security Testing: 8 Key Roles in Healthcare Applications
 
laurie_reed_resume15.1
laurie_reed_resume15.1laurie_reed_resume15.1
laurie_reed_resume15.1
 
New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howland
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Ivan Serranos Resume 6 2011
Ivan Serranos Resume 6 2011Ivan Serranos Resume 6 2011
Ivan Serranos Resume 6 2011
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Ijseea
IjseeaIjseea
Ijseea
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 
Matt Harlow Resume Government 2-2
Matt Harlow Resume Government 2-2Matt Harlow Resume Government 2-2
Matt Harlow Resume Government 2-2
 

Similar to 2019resume

Coles Resume Corporate 2016
Coles Resume Corporate 2016Coles Resume Corporate 2016
Coles Resume Corporate 2016Brian Coles
 
Jamie Schroeder's Resume
Jamie Schroeder's ResumeJamie Schroeder's Resume
Jamie Schroeder's ResumeJamie Schroeder
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSECMike Sawall
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber ElijahElijah Weber
 
Corporate_Resume-Felisha_Wade
Corporate_Resume-Felisha_WadeCorporate_Resume-Felisha_Wade
Corporate_Resume-Felisha_WadeFelisha Wade
 
August_James_Young_Resume
August_James_Young_ResumeAugust_James_Young_Resume
August_James_Young_ResumeAugust Young
 
Chad_Eastep Resume
Chad_Eastep ResumeChad_Eastep Resume
Chad_Eastep ResumeChad Eastep
 
Ashley Faciane Resume 2016 IT (No Photo)
Ashley Faciane Resume 2016 IT (No Photo)Ashley Faciane Resume 2016 IT (No Photo)
Ashley Faciane Resume 2016 IT (No Photo)Ashley Faciane
 
Davila Bryan resume
Davila Bryan resumeDavila Bryan resume
Davila Bryan resumeBryan Davila
 

Similar to 2019resume (20)

Terrance A. 10.20.15
Terrance A. 10.20.15Terrance A. 10.20.15
Terrance A. 10.20.15
 
IT Specialist
IT SpecialistIT Specialist
IT Specialist
 
Llewellyn Link Resume
Llewellyn Link ResumeLlewellyn Link Resume
Llewellyn Link Resume
 
Coles Resume Corporate 2016
Coles Resume Corporate 2016Coles Resume Corporate 2016
Coles Resume Corporate 2016
 
Chris Holley resume
Chris Holley resumeChris Holley resume
Chris Holley resume
 
R Thomas resume
R Thomas resumeR Thomas resume
R Thomas resume
 
B Parker Resume rev 2
B Parker Resume rev 2B Parker Resume rev 2
B Parker Resume rev 2
 
resume
resumeresume
resume
 
Updated Resume
Updated ResumeUpdated Resume
Updated Resume
 
Jamie Schroeder's Resume
Jamie Schroeder's ResumeJamie Schroeder's Resume
Jamie Schroeder's Resume
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
 
Jamison2 Resume
Jamison2 ResumeJamison2 Resume
Jamison2 Resume
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber Elijah
 
Corporate_Resume-Felisha_Wade
Corporate_Resume-Felisha_WadeCorporate_Resume-Felisha_Wade
Corporate_Resume-Felisha_Wade
 
August_James_Young_Resume
August_James_Young_ResumeAugust_James_Young_Resume
August_James_Young_Resume
 
Chad_Eastep Resume
Chad_Eastep ResumeChad_Eastep Resume
Chad_Eastep Resume
 
Ashley Faciane Resume 2016 IT (No Photo)
Ashley Faciane Resume 2016 IT (No Photo)Ashley Faciane Resume 2016 IT (No Photo)
Ashley Faciane Resume 2016 IT (No Photo)
 
Resume 071019
Resume 071019Resume 071019
Resume 071019
 
It professional resume
It professional resumeIt professional resume
It professional resume
 
Davila Bryan resume
Davila Bryan resumeDavila Bryan resume
Davila Bryan resume
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

2019resume

  • 1. Jeremiah Lanier San Antonio, Texas 78233 443-240-6844 jeremiah.d.lanier@gmail.com PROFESSIONAL SUMMARY Enterprise Network Operations Technician/Systems Administrator and active duty military member possessing a Top Secret/Sensitive Compartmented Information (TS/SCI) Security Clearance and Counter-Intelligence Polygraph with over 5 years of proven experience supporting the ever-changing mission of the United States Air Force. Realizes quantifiableresults while performing in a dynamic, high-tempo environment.  Network Administration  Infrastructure Support  Network Auditing  System Accreditation  Vulnerability Management  SSP TECHNICAL COMPETENCIES: Platforms: UNIX, Linux/Red Hat, Solaris, Windows XP/Vista/7/10, Windows Server 2008/2012 Tools: SCCM, ACAS/Security Center/Nessus, McAfee ePO, Red Hat Satellite, NetBackup, HP Network Node Manager, VMware, Microsoft Active Directory Networking: SSH, SSL, Digital Certificates, VPN, Putty, TCP/IP, LAN/WAN, DHCP PROFESSIONAL EXPERIENCE: UNITED STATES AIR FORCE – Kunsan Air Base, South Korea 2014-2015 Network Applications Technician  Systems Administrator for 3,000+ localuser accounts  Implemented, configured and managed network application monitoring tools for auditing and troubleshooting to safeguard network functions spanning two separate DoD network environments UNITED STATES AIR FORCE – Ft. George G. Meade, Maryland 2015-2018 Security Administrator  Managed two Top Secret DoD enclaves supporting intel collection and cryptologic tasks  Led vulnerability management team utilizing DoD security assessment tools to track, audit and harden enclaves UNITED STATES AIR FORCE – Lackland AFB, Texas 2018-Present Enterprise Network Operations Lead  Monitors, responds to and reports all network outages within DoD impacting Unclassified, Secret and Top Secret circuits across the enterprise  Maintains and monitors physical/logicallines and error correction for secure JWICS channel logs and intel EDUCATION/CERTIFICATIONS CompTIA Security+ July 2014 The Pennsylvania StateUniversity, State College, PA August 2019 Master of Professional Studies in Information Sciences - Cybersecurity and Information Assurance The University of Southern Mississippi, Hattiesburg, MS May 2013 Bachelor of Interdisciplinary Studies – Information Technology and International Business The Community College of the Air Force, Montgomery, AL Jan 2016 Associate in Applied Science in Information Systems Technology