David Smith is seeking a position with the Federal Government utilizing his Information Security skills and Top Secret SCI clearance. He has over 7 years of experience managing classified records and providing force protection as a US Air Force veteran. His experience includes evaluating captured foreign systems, safeguarding classified materials, and ensuring projects meet milestones. He is proficient in Windows, Office, and security protocols.
Amanda Flynn is seeking a position that allows growth. She has over 10 years of experience in office management, administration, and legal assistance. Her experience includes payroll, purchasing, safety coordination, and legal documentation preparation. She is well-organized, detail-oriented, and proficient in various software programs. Flynn holds an Associate's degree in Office Systems Technology and is certified in CPR and First Aid.
Joseph Porter is seeking a position in cyber networks or engineering. He has a Bachelor's degree in Applied Science and Computer Networking Systems from ITT Technical Institute and relevant work experience. His experience includes positions as a Test Engineer at Vencore, General Services worker at The Aerospace Corporation, Armed Security Guard, and Mechanic in the U.S. Army serving in Iraq. He has extensive technical skills in computer networking, cybersecurity, and operating systems.
The document discusses ethical hacking, which involves legally testing a system's security vulnerabilities to improve security. It outlines the ethical hacking process of preparation, footprinting, enumeration and fingerprinting, vulnerability identification, and controlled attacks to exploit vulnerabilities. The goal is to identify weaknesses without causing harm and then help organizations strengthen their defenses.
The document discusses ethical hacking, which involves legally testing a system's security vulnerabilities to improve security. It outlines the ethical hacking process of preparation, footprinting, enumeration and fingerprinting, vulnerability identification, and controlled attacks to exploit vulnerabilities. The goal is to identify weaknesses without causing harm and then help organizations strengthen their defenses.
The document discusses ethical hacking, which involves legally testing a system's security vulnerabilities to improve security. It outlines the ethical hacking process, including preparation, footprinting, enumeration and fingerprinting, vulnerability identification, and exploiting vulnerabilities. The goal is to find weaknesses without causing harm in order to help organizations strengthen their defenses.
This document provides a summary of Billy D. Hunt's professional experience and qualifications. It outlines his experience managing security programs and classified information for the U.S. Army over the past 15 years, including his current top secret clearance. It details positions he has held overseeing security operations and classified materials in South Korea and Texas. It also lists his educational background, including a Bachelor's degree in Applied Science, and experience as a machinist prior to his military and security career.
Computer forensics is the science of investigating digital devices and media for legal evidence. It began in the late 1980s with the creation of organizations like IACIS. Investigators use methods to detect and recover hidden, deleted, or encrypted data through techniques like disk analysis, steganalysis, and data carving. They must have expertise in operating systems, file systems, data storage, and encryption to properly handle electronic evidence for criminal and civil cases. While computer forensics allows thorough searches and analysis of large amounts of data, it also faces challenges such as ensuring evidence integrity and overcoming costs.
Amanda Flynn is seeking a position that allows growth. She has over 10 years of experience in office management, administration, and legal assistance. Her experience includes payroll, purchasing, safety coordination, and legal documentation preparation. She is well-organized, detail-oriented, and proficient in various software programs. Flynn holds an Associate's degree in Office Systems Technology and is certified in CPR and First Aid.
Joseph Porter is seeking a position in cyber networks or engineering. He has a Bachelor's degree in Applied Science and Computer Networking Systems from ITT Technical Institute and relevant work experience. His experience includes positions as a Test Engineer at Vencore, General Services worker at The Aerospace Corporation, Armed Security Guard, and Mechanic in the U.S. Army serving in Iraq. He has extensive technical skills in computer networking, cybersecurity, and operating systems.
The document discusses ethical hacking, which involves legally testing a system's security vulnerabilities to improve security. It outlines the ethical hacking process of preparation, footprinting, enumeration and fingerprinting, vulnerability identification, and controlled attacks to exploit vulnerabilities. The goal is to identify weaknesses without causing harm and then help organizations strengthen their defenses.
The document discusses ethical hacking, which involves legally testing a system's security vulnerabilities to improve security. It outlines the ethical hacking process of preparation, footprinting, enumeration and fingerprinting, vulnerability identification, and controlled attacks to exploit vulnerabilities. The goal is to identify weaknesses without causing harm and then help organizations strengthen their defenses.
The document discusses ethical hacking, which involves legally testing a system's security vulnerabilities to improve security. It outlines the ethical hacking process, including preparation, footprinting, enumeration and fingerprinting, vulnerability identification, and exploiting vulnerabilities. The goal is to find weaknesses without causing harm in order to help organizations strengthen their defenses.
This document provides a summary of Billy D. Hunt's professional experience and qualifications. It outlines his experience managing security programs and classified information for the U.S. Army over the past 15 years, including his current top secret clearance. It details positions he has held overseeing security operations and classified materials in South Korea and Texas. It also lists his educational background, including a Bachelor's degree in Applied Science, and experience as a machinist prior to his military and security career.
Computer forensics is the science of investigating digital devices and media for legal evidence. It began in the late 1980s with the creation of organizations like IACIS. Investigators use methods to detect and recover hidden, deleted, or encrypted data through techniques like disk analysis, steganalysis, and data carving. They must have expertise in operating systems, file systems, data storage, and encryption to properly handle electronic evidence for criminal and civil cases. While computer forensics allows thorough searches and analysis of large amounts of data, it also faces challenges such as ensuring evidence integrity and overcoming costs.
Raytheon IIS is holding a career fair to find top IT & Engineering professionals on Thursday, April 12th from 11:00 am to 7:00pm to discuss cleared opportunities in Aurora and in Colorado Springs.
Thursday, April 12th
Sheraton Denver Tech Center
7007 S Clinton St,
Greenwood Village, CO 80112
For more information or to drop off your resume visit @ http://tinyurl.com/ybw2dzrg
This document provides an introduction to searching and seizing computers for computer forensics. It discusses issues with digital evidence being volatile and massive in size. It explains that searching and seizing computers can be done with or without a warrant, depending on the country's constitution and exceptions like consent. Key aspects of searches include who conducted it, what was searched/seized, if it was a legal search/seizure, and if the search was reasonable with a warrant or under an exception. Probable cause and exceptions to warrants like emergencies, vehicles and borders are also outlined. Proper warrant preparation and seizing equipment on site are important parts of legally searching and seizing computer-related evidence.
05/08/18 Raytheon IIS Career Fair (Fort Worth) Toni Havlik
Raytheon IIS is holding a career fair to find top IT & Engineering professionals on Tuesday, May 8th from 11:00 am to 7:00pm to discuss cleared opportunities in Richardson, TX.
Sheraton Fort Worth Downtown Hotel
1701 Commerce Street
Fort Worth, TX 76102
For more information or to drop off your resume visit @ http://tinyurl.com/ydhejgsc
Fusing digital forensics, electronic discovery and incident responseDr. Richard Adams
The background to the dawn of the Forensic Discovery Tool - no longer requiring a human to be directly involved in the collection of potential evidence. Collections take place in parallel on the target machines without the need to install an agent. All files are reviewed rather than only those that are recognised. Email is processed on the target including all attachments. Scanned documents are identified and collected. Covert mode hides everything from the end user. Forensic artifacts collected (such as RAM, page files and registry) from running machines.
05/08/18 Raytheon IIS Career Fair (Fort Worth) Toni Havlik
Raytheon is holding a career fair on May 8th from 11am-7pm in Richardson, TX to interview and hire candidates for various IT & engineering roles. Positions include cybersecurity engineering, software engineering, systems engineering, and more. Raytheon offers benefits like paid time off, flexible schedules, parental leave, and adoption assistance. The career fair will have booths for different roles where candidates can learn about open positions and interview.
03/27/18 Raytheon IIS Career Fair - Richardson, TXToni Havlik
Raytheon IIS is holding a career fair to find top IT & Engineering professionals on Tuesday, March 27th from 11:00 am to 7:00pm to discuss cleared opportunities in Richardson, TX.
Tuesday, March 27th
Hyatt Regency North Dallas
701 E Campbell Rd
Richardson, TX 75081
For more information or to drop off your resume visit @ http://tinyurl.com/ycktd89s
College educated student with work background experiences interested in obtaining a legal job opportunity, or paid legal internship. Fluent in Spanish and English languages, critical thinking skills, computer/research skills along with background in law, and medical work experiences. To gain a prospective industry experience, and to help for a positive outcome for the employer. Please review resume, and do not hesitate to call for interview(s).
Thank you.
Hello,
I am currently looking for career not just a job. My degree has given me knowledge and skill along with work experience to accept a more challenging career and a chance to utilize my knowledge to advance to the next level. My focus is to use my new talents .
This document provides an overview of computer forensics investigation methodology. It discusses determining if a computer crime has occurred, finding and interpreting clues, conducting a preliminary assessment to search for evidence, and searching and seizing computer equipment to collect evidence that can be presented in court. It emphasizes the importance of having workstations, building an investigating team, acquiring authorization, and assessing risks before an investigation. The core methodology includes identification, collection, analysis, and presentation of evidence, with preservation also being important. Key areas that are evaluated and secured include the scene itself as well as volatile and non-volatile data sources that could contain evidence. Principles for electronic evidence include relevance, reliability, sufficiency, and admissibility.
Ray L. Shatto is seeking an IT helpdesk or cyber security position and has over 25 years of leadership experience in the US Army as well as education including a Bachelor's degree in IT from Colorado Technical University. He has experience in areas such as IT helpdesk procedures, technical support, software installation, network administration, and security practices from both work experience and education. Shatto is looking to utilize his qualifications and skills in an information technology or cyber security role.
Sylvester Gardner is seeking a career position applying his extensive knowledge in information technology and cyber security. He has a Bachelor's Degree in Information Systems and Cyber Security from ITT Technical Institute. His experience includes positions in production, youth care, audio/visual equipment, mail handling, and the U.S. Army where he served as a Fire Direction Specialist. He has skills in networking, hardware/software installation, troubleshooting, and Microsoft applications.
The document provides a resume for Keir A. Huery, an intelligence analyst with over 15 years of experience conducting all-source intelligence operations and analysis directly supporting military missions. Huery has extensive experience working with the US Air National Guard and US Army, including over 1000 flight hours as an MQ-1 Predator Mission Intelligence Coordinator. Huery has a top secret security clearance and proficiency in intelligence disciplines, systems, and analysis to support military operations.
Sandra Justice has over 15 years of experience in security management in industrial, manufacturing, office, and military settings. She has extensive training and certifications in areas such as hazardous materials handling, emergency response, and access control systems. She holds a Bachelor's degree in Private Security Management with a focus on criminal justice, industrial safety, and human services. Her military experience includes serving as a Combat Arms Instructor Supervisor in the Air Force. Most recently, she worked as the Site Security Manager for Avago Technologies, where she oversaw security operations, compliance, emergency preparedness, and a staff of 12 employees.
Kevin Porter has over 24 years of experience in the military and private sector, including roles as a data manager, training administrator, cyber manager, task manager, and human resources assistant. He has a track record of successfully managing teams and projects. Currently, he works as a data manager at NAVSTAR where he is responsible for managing the data lifecycle process, including acquisition, distribution, and archiving of data.
Gregory Witcher is seeking a career in cyber security. He currently works as an Information Systems Security Officer for the Defense Intelligence Agency, where he implements security standards and procedures. He has a bachelor's degree in interdisciplinary humanities and over 5 years of experience as an all-source intelligence analyst for the U.S. Air Force. He has several cyber security certifications, including pending CISSP certification, and is proficient in risk management frameworks and security controls required by FISMA.
Jessica Pruitt is seeking a job in a comfortable environment with opportunities for advancement. She has over 7 years of experience in cryptology, intelligence analysis, and cyber security. Her background includes roles as an IT service desk technician, help desk technician, data analyst, and cryptologic technician in the Navy. She is proficient in Microsoft Office, various operating systems, and has experience with inventory management and customer service.
Timothy D. Lewis has over 24 years of experience in communications security, information assurance, and military emergency management. He holds security+ and network+ certifications and has a top secret security clearance. His experience includes roles as an information assurance analyst, senior test engineer, and manager of communications security and information assurance for the US Air Force.
Dilli Phuyal is an up-and-coming IT professional pursuing multiple CompTIA, Microsoft, and Linux certifications through hands-on training. He has a history of customer service roles and is bilingual in Nepali and English. He has experience in security, interpreting, and logistics roles and seeks to apply his technical and customer service skills in the IT industry. He has an education in IT and certifications in Linux Essentials, Microsoft Server Fundamentals, and others in progress.
Brittany Lescallett is seeking an administrative assistant position and has over 10 years of experience in intelligence gathering, analysis, and administrative work. She currently works as an executive assistant but has past experience as a human intelligence collector in the U.S. Army Reserve and has held various roles including teacher and security guard. She has a secret security clearance and is proficient in Microsoft Office, intelligence databases, and security/administrative systems.
Leslie Williams has over 15 years of experience in IT, network engineering, and logistics roles for both the private sector and United States Marine Corps, including positions at Apex Systems, SRA International, and Legal Assistance Office, with skills in Linux, Windows, databases, monitoring tools, and troubleshooting; she holds a Bachelor's degree in Information Technology Security and an inactive Secret security clearance. Williams seeks a position that utilizes her technical abilities and experience supporting IT infrastructure.
Christopher Paul Holley is seeking a help desk position and has experience providing customer service and technical support. He has over a decade of experience in the United States Air Force and Louisiana National Guard working on communications equipment, fiber cabling, and radio frequency systems. Holley has an Associate of Science degree in network administration in progress from ITT Technical Institute with an anticipated graduation date of September 2017. He has strong technical skills in Windows operating systems, hardware installation and troubleshooting, networking protocols, and software applications like Microsoft Office.
Raytheon IIS is holding a career fair to find top IT & Engineering professionals on Thursday, April 12th from 11:00 am to 7:00pm to discuss cleared opportunities in Aurora and in Colorado Springs.
Thursday, April 12th
Sheraton Denver Tech Center
7007 S Clinton St,
Greenwood Village, CO 80112
For more information or to drop off your resume visit @ http://tinyurl.com/ybw2dzrg
This document provides an introduction to searching and seizing computers for computer forensics. It discusses issues with digital evidence being volatile and massive in size. It explains that searching and seizing computers can be done with or without a warrant, depending on the country's constitution and exceptions like consent. Key aspects of searches include who conducted it, what was searched/seized, if it was a legal search/seizure, and if the search was reasonable with a warrant or under an exception. Probable cause and exceptions to warrants like emergencies, vehicles and borders are also outlined. Proper warrant preparation and seizing equipment on site are important parts of legally searching and seizing computer-related evidence.
05/08/18 Raytheon IIS Career Fair (Fort Worth) Toni Havlik
Raytheon IIS is holding a career fair to find top IT & Engineering professionals on Tuesday, May 8th from 11:00 am to 7:00pm to discuss cleared opportunities in Richardson, TX.
Sheraton Fort Worth Downtown Hotel
1701 Commerce Street
Fort Worth, TX 76102
For more information or to drop off your resume visit @ http://tinyurl.com/ydhejgsc
Fusing digital forensics, electronic discovery and incident responseDr. Richard Adams
The background to the dawn of the Forensic Discovery Tool - no longer requiring a human to be directly involved in the collection of potential evidence. Collections take place in parallel on the target machines without the need to install an agent. All files are reviewed rather than only those that are recognised. Email is processed on the target including all attachments. Scanned documents are identified and collected. Covert mode hides everything from the end user. Forensic artifacts collected (such as RAM, page files and registry) from running machines.
05/08/18 Raytheon IIS Career Fair (Fort Worth) Toni Havlik
Raytheon is holding a career fair on May 8th from 11am-7pm in Richardson, TX to interview and hire candidates for various IT & engineering roles. Positions include cybersecurity engineering, software engineering, systems engineering, and more. Raytheon offers benefits like paid time off, flexible schedules, parental leave, and adoption assistance. The career fair will have booths for different roles where candidates can learn about open positions and interview.
03/27/18 Raytheon IIS Career Fair - Richardson, TXToni Havlik
Raytheon IIS is holding a career fair to find top IT & Engineering professionals on Tuesday, March 27th from 11:00 am to 7:00pm to discuss cleared opportunities in Richardson, TX.
Tuesday, March 27th
Hyatt Regency North Dallas
701 E Campbell Rd
Richardson, TX 75081
For more information or to drop off your resume visit @ http://tinyurl.com/ycktd89s
College educated student with work background experiences interested in obtaining a legal job opportunity, or paid legal internship. Fluent in Spanish and English languages, critical thinking skills, computer/research skills along with background in law, and medical work experiences. To gain a prospective industry experience, and to help for a positive outcome for the employer. Please review resume, and do not hesitate to call for interview(s).
Thank you.
Hello,
I am currently looking for career not just a job. My degree has given me knowledge and skill along with work experience to accept a more challenging career and a chance to utilize my knowledge to advance to the next level. My focus is to use my new talents .
This document provides an overview of computer forensics investigation methodology. It discusses determining if a computer crime has occurred, finding and interpreting clues, conducting a preliminary assessment to search for evidence, and searching and seizing computer equipment to collect evidence that can be presented in court. It emphasizes the importance of having workstations, building an investigating team, acquiring authorization, and assessing risks before an investigation. The core methodology includes identification, collection, analysis, and presentation of evidence, with preservation also being important. Key areas that are evaluated and secured include the scene itself as well as volatile and non-volatile data sources that could contain evidence. Principles for electronic evidence include relevance, reliability, sufficiency, and admissibility.
Ray L. Shatto is seeking an IT helpdesk or cyber security position and has over 25 years of leadership experience in the US Army as well as education including a Bachelor's degree in IT from Colorado Technical University. He has experience in areas such as IT helpdesk procedures, technical support, software installation, network administration, and security practices from both work experience and education. Shatto is looking to utilize his qualifications and skills in an information technology or cyber security role.
Sylvester Gardner is seeking a career position applying his extensive knowledge in information technology and cyber security. He has a Bachelor's Degree in Information Systems and Cyber Security from ITT Technical Institute. His experience includes positions in production, youth care, audio/visual equipment, mail handling, and the U.S. Army where he served as a Fire Direction Specialist. He has skills in networking, hardware/software installation, troubleshooting, and Microsoft applications.
The document provides a resume for Keir A. Huery, an intelligence analyst with over 15 years of experience conducting all-source intelligence operations and analysis directly supporting military missions. Huery has extensive experience working with the US Air National Guard and US Army, including over 1000 flight hours as an MQ-1 Predator Mission Intelligence Coordinator. Huery has a top secret security clearance and proficiency in intelligence disciplines, systems, and analysis to support military operations.
Sandra Justice has over 15 years of experience in security management in industrial, manufacturing, office, and military settings. She has extensive training and certifications in areas such as hazardous materials handling, emergency response, and access control systems. She holds a Bachelor's degree in Private Security Management with a focus on criminal justice, industrial safety, and human services. Her military experience includes serving as a Combat Arms Instructor Supervisor in the Air Force. Most recently, she worked as the Site Security Manager for Avago Technologies, where she oversaw security operations, compliance, emergency preparedness, and a staff of 12 employees.
Kevin Porter has over 24 years of experience in the military and private sector, including roles as a data manager, training administrator, cyber manager, task manager, and human resources assistant. He has a track record of successfully managing teams and projects. Currently, he works as a data manager at NAVSTAR where he is responsible for managing the data lifecycle process, including acquisition, distribution, and archiving of data.
Gregory Witcher is seeking a career in cyber security. He currently works as an Information Systems Security Officer for the Defense Intelligence Agency, where he implements security standards and procedures. He has a bachelor's degree in interdisciplinary humanities and over 5 years of experience as an all-source intelligence analyst for the U.S. Air Force. He has several cyber security certifications, including pending CISSP certification, and is proficient in risk management frameworks and security controls required by FISMA.
Jessica Pruitt is seeking a job in a comfortable environment with opportunities for advancement. She has over 7 years of experience in cryptology, intelligence analysis, and cyber security. Her background includes roles as an IT service desk technician, help desk technician, data analyst, and cryptologic technician in the Navy. She is proficient in Microsoft Office, various operating systems, and has experience with inventory management and customer service.
Timothy D. Lewis has over 24 years of experience in communications security, information assurance, and military emergency management. He holds security+ and network+ certifications and has a top secret security clearance. His experience includes roles as an information assurance analyst, senior test engineer, and manager of communications security and information assurance for the US Air Force.
Dilli Phuyal is an up-and-coming IT professional pursuing multiple CompTIA, Microsoft, and Linux certifications through hands-on training. He has a history of customer service roles and is bilingual in Nepali and English. He has experience in security, interpreting, and logistics roles and seeks to apply his technical and customer service skills in the IT industry. He has an education in IT and certifications in Linux Essentials, Microsoft Server Fundamentals, and others in progress.
Brittany Lescallett is seeking an administrative assistant position and has over 10 years of experience in intelligence gathering, analysis, and administrative work. She currently works as an executive assistant but has past experience as a human intelligence collector in the U.S. Army Reserve and has held various roles including teacher and security guard. She has a secret security clearance and is proficient in Microsoft Office, intelligence databases, and security/administrative systems.
Leslie Williams has over 15 years of experience in IT, network engineering, and logistics roles for both the private sector and United States Marine Corps, including positions at Apex Systems, SRA International, and Legal Assistance Office, with skills in Linux, Windows, databases, monitoring tools, and troubleshooting; she holds a Bachelor's degree in Information Technology Security and an inactive Secret security clearance. Williams seeks a position that utilizes her technical abilities and experience supporting IT infrastructure.
Christopher Paul Holley is seeking a help desk position and has experience providing customer service and technical support. He has over a decade of experience in the United States Air Force and Louisiana National Guard working on communications equipment, fiber cabling, and radio frequency systems. Holley has an Associate of Science degree in network administration in progress from ITT Technical Institute with an anticipated graduation date of September 2017. He has strong technical skills in Windows operating systems, hardware installation and troubleshooting, networking protocols, and software applications like Microsoft Office.
Tristan Thompson has over 7 years of experience in information technology and management. He has managed networks of up to 5,500 users, troubleshooting a variety of issues. Thompson also maintained standardized desktop environments and was responsible for software configuration, security patches, and laptop management. He holds Network+ and Security+ certifications and held a secret security clearance during his time in the Army.
Patricia Baugh has over 15 years of experience in technical and budgetary roles requiring client and team interaction. She has strong analytical skills, is detail-oriented, and excels at problem solving and communication. Her background includes experience in program management, security compliance, and linguistics support to the Department of Defense.
Seattle area Administrative Assistant ResumeTerri Frey
Terri Frey has over 15 years of experience in administrative support roles, including as an administrative assistant at Benaroya Research Institute and a litigation paralegal at Friedman Rubin Trial Lawyers. She has strong skills in coordinating meetings and travel, managing documents and databases, and providing general administrative support. Frey is results-oriented, able to multitask and prioritize in fast-paced environments, and takes initiative to assume responsibility.
James E. Tully is seeking an IT security position where he can utilize his extensive experience in management, information assurance, risk management, and systems engineering. He has over 20 years of experience in program management, information assurance, and risk management for both government and commercial clients. He holds an MS in Information Assurance and an MS in Systems Management.
This document provides a summary of an IT professional's experience, education, skills, and credentials. They have nearly 20 years of experience managing IT security programs and projects for federal agencies such as DHS, OPM, and NIH. Their experience includes managing security compliance, audits, staff, and budgets. They hold a Bachelor's degree in Business Administration and certifications in ethical hacking, ITIL, and CompTIA Security+.
Stephan Lescallett has over 20 years of experience in security operations, military intelligence, and federal law enforcement. He maintains a Top Secret SCI clearance and has held leadership roles analyzing intelligence to support watchlisting of known or suspected terrorists. Currently he works as a mid-level analyst assisting with research and reporting at Axom Technologies in Ft Meade, MD.
The document provides a summary of Getahun Mhiretie's professional background, including 6 years of active duty service in the U.S. Air Force where he excelled and earned 4 promotions. It details his experience in information management, medical administrative duties, and deployment to East Africa to support security cooperation programs. The summary highlights his skills in areas such as records management, system administration, leadership, and language abilities in English and Amharic.
Thomas Driscoll is seeking a full-time position in corporate security, government security, or law enforcement. He has a Bachelor's degree in Global Security and Intelligence Studies from Embry-Riddle Aeronautical University with a 3.38 GPA. His experience includes working as a Specialist for the Department of Child Safety investigating reports of alleged child abuse, as a Security Supervisor for Whelan Security ensuring personnel goals were met, and as a Sales Coach for Convergys educating coworkers about sales techniques. He is proficient in Spanish and has completed 15 FEMA emergency management courses.
1. David A. Smith
2383 Barnard Dr.
Fairborn, OH, 45324
(937) 620-5265
Email: David.Smith_196@yahoo.com
Personal Objective: A position with the Federal Government that will allow me to utilize my solid Information
Security skills while maintaining a Top Secret Sensitive Compartmented Information (SCI) security clearance
Summary of Qualifications:
United States Air Force and Afghanistan war veteran with over 7 years of experience as a Classified Records
Information Manager and Force Protection Security Specialist including Information Technology (IT) experience
Active Top Secret (SCI) Security Clearance
WORK EXPERIENCE
Nov 11 - Present
Knowledge Operator/Information Manager
Foreign Materiel Exploitation Squadron (Global Exploitations Intel Group)
National Air and Space Intelligence Center, Wright Patterson AFB, OH
Assigned as an Exploitations Operator charged with duties of evaluating captured foreign country wartime systems
Systematically reverse-engineers prototype interfaces to develop successfultechnical countermeasures
Protects documents from unauthorized access to provide confidentiality, integrity, and availability of information
Safeguards classified material to include magnetic storage media in GSA-approved facilities and containers
Maintains secured documents in staging areas for accountability until permanent destruction deadlines are met
Utilizes the two-person rule to ensure all classified information intended for destruction is verified as destroyed
Conducts inspections to detect deficiencies, policy violations, and ensure risks and controls are in balance
Facilitates the development and review of operating procedures to achieve process uniformity throughout the unit
Performs inventory audits to confirm all material is available and undisturbed,or on valid hand receipts
Identifies and reports any suspected security breaches to the squadron security office for action
Ensures projects move forward appropriately to make certain established milestones are met
Performs secure/classified data transfer duties using multi-media services and external media devices
Provides on-call support at primary and satellite offices during alarm activations or priority access requests
Apr 11 – Nov 12
Unit Deployment Manager/Executive Assistant Plans and Programs
Deployments and Readiness Section (Plans and Programs Directorate)
National Air and Space Intelligence Center, Wright Patterson AFB, OH
Selected to perform special duty assignment function as Unit Deployment Manager
Responsible for the accounting and deployment of logistical items and equipment for Air Force operations
Primary focal point in determining the most qualified personnel,with the least negative impact to the local mission
Acted as liaison between otherAir Force units that had mobility designations to support deployment requirements
Maintained health assessment records and medical readiness databases to ensure deployment readiness
Steadily ensured personnelwere trained in weapons proficiency, CPR and self-aid buddy care, nuclear, biological
and chemical warfare training prior to scheduled departure dates
Utilized SharePoint Designer to create organizational web pages providing employees real-time unit information
Maintained website functionality and appearance; optimized exposure by analyzing search engine patterns
2. Sep 10 – Mar 11
Security Forces/Information Protection Specialist/IT Support
Provost Marshall’s Office (Combined Joint Task Force 101)
455th Air Expeditionary Wing/101st Airborne Division, Bagram Air Field, Afghanistan
Temporary duty assignment in support of Operation Enduring Freedom and Operation New Dawn
Determined the nature, locations, and priorities of emergencies and dispatched Security Forces teams
Maintained contact with all units on assignment to determine situational awareness and request support if needed
Apprehended and detained suspects,secured crime scenes, searched persons and property, and provided testimony
during investigations
Trained in the use of deadly force to protect base weapon systems,personnel,and resources from hostile forces
Operated in a variety of field environments and performed air base defense functions
Contributed to the force protection mission by controlling and securing terrain inside and outside of the facility
Performed individual and team patrol movements using both mounted and dismounted methods
Conducted antiterrorism duties,tactical drills, battle procedures, perimeter defense,and other special duties
Operated a variety of fixed and mobile communications equipment, vehicles, and intrusion detection systems
Configured stand-alone laptops with up to date anti-virus and software patches to detect malicious attacks
Rendered desktop support to confine computer hardware failures to the defective sub assembly or component
Subject matter expert (SME) for desktop hardware, peripherals, laptops, and commercial software applications
Employed technical troubleshooting and analysis to resolve NIPRNET/SIPRNET architecture service interruptions
Apr 09 – Sep 10
Publications and Forms Specialist
Space and Communications Directorate/National Air and Space Intelligence Center
Wright Patterson AFB, OH
Controlled and governed the organization’s most important records throughout theirlife-cycle
Utilized established guidelines to determine documentation value and whether to retain or dispose of records
Preserved publications identified as current and valuable to the organization as evidence of transactions
Maintained documents in approved containers with appropriate access,temperature, and humidity controls
Archived documents that exceeded serviceable limits, yet deemed valuable commodities
Feb 08 – Apr 09
Mailroom Clerk/Records Technician
Space and Communications Directorate/National Air and Space Intelligence Center
Wright Patterson AFB, OH
Received, organized, and filed records either created or obtained by the organization to comply with legal
obligations, or utilized for business transactions
Oversaw various types of records including, but not limited to, paper documents, digital information, such as
electronic office documents, data in application databases, web site content,and electronic mail (email)
Performed mailroom duties for the organization’s incoming and outgoing mail
Prepared packaged goods and othermail for shipping by the local post office or independent shipping service
Specialized Skills
Strong oral and written communications experience
Skilled in the use of safety equipment as required by federal, state, local, and company regulations
Unwavering respect for authority and adheres to all established policies and safety procedures
Outstanding customer service, analytical, and problem solving skills
Windows based operating systems,Office 2010, Adobe Acrobat, SharePoint Designer
Ability to work extended or non-standard hours with little notice and to travel to all locations
Awards/Achievements
2 Good Conduct Medals; 2 Afghanistan Campaign Medals; Army Achievement Medal; Expeditionary Global War
on Terrorism Medal with Gold Border; M-16 and M-4 Marksman