Robert F. Jackson is seeking a stimulating and challenging position where he can advance his career. He has over 15 years of experience in information security, networking, and systems administration. His qualifications include security clearances, certifications in ethical hacking and security+, and skills in Windows, Linux, Active Directory, and security tools like McAfee and ArcSight. He is currently a lead security engineer developing projects, implementing security plans, and managing vulnerability scanning and firewall rules. Previously he has held roles as a senior network security engineer and lead network administrator.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jacksons Resume_21March16
1. Robert F. Jackson
8648 Beck Ln
Manassas, VA., 20110
Mobile: (757) 651-7256
Jackson.robert.f@gmail.com
OBJECTIVE
I want to succeed in a stimulating and challenging environment, building the success of the company
while I experience advancement opportunities.
QUALIFICATIONS SUMMARY
Active TS/SCI Security Clearance with Poly
Excellent problem solving skills
Excellent leadership and team building skills
Skilled in MS Server 2008 R2 and MS Server 2012 R2
Skilled in the Microsoft Office Suite including Word, Access, PowerPoint and Excel
Skilled in the Windows Vista, WIN7 and Windows 8 Operating Systems.
Skilled in Eye Retina Software and Nessus Tenable Suite
Skilled with Active Directory
Familiar with Unix and Linux OS
Use Wireshark regularly
Have performed IP Packet Analysis/trace
Have used Port Query
EDUCATION
Bachelor’s Degree in Networking and Communications Management July 2013
DeVry University (Graduated Magna Cum Laude GPA 3.85)
Associates Degree in Business Administration July 2007
American InterContinental University
Certifications
EC-Council Certified Ethical Hacker (v8) July 2013
CompTIA Security + February 2009
Certificates
Nessus Tenable ACAS July 2013
HP Logger Administrative and Operations (ArcSight 4.5) July 2013
McAfee HBSS Advanced (301) Certificate November 2012
McAfee HBSS Certificate February 2012
EXPERIENCE
GDIT Defense and Military Intelligence Sector September 2015 – Present
Lead System Security Engineer
Develop project plans and designs for new software or hardware to be updated or deployed.
Develop the cost estimates for the projects if hardware and software is needed.
Develop and manage McAfee ATO for DIA and use XACTA IA Manager to develop and
document the ATO.
Implement new plans for new information systems and plan with other teams.
Implement, manage, plan and task CYBERCOM directed projects and non-directed projects.
2. Provide technical leadership to the enterprise for the information security program.
Mentor and train others in information security in additions to training for other technical groups.
Manage and oversee implementation of McAfee ePO 4.6.x and 5.1.x.
Direct weekly team meetings for updates on projects and to give updates on what new projects
and tasks are coming.
Attend weekly meetings to go over current vulnerabilities and risks to come up with the best way
to mitigate them with patching or disabling features or ports as needed.
Create POA&Ms as needed for vulnerabilities that cannot be patched our updated due to lack of
a patch or the updated affects current operations.
Plan and Develop SOPs and task other to write SOPs then review for being published to
SharePoint to be use by the team and government view.
Manage and monitor the support team tickets and queue and assign them to the HBSS support
team.
DGS Inc. December 2011 – September 2015
Senior Network Security Engineer Arlington, Virginia
Attend weekly Validation Approval Board and Change and Configuration Management meetings
as one of the decision maker for the network, software and system deployments.
Implemented and configured Virtual Windows 2012 R2 servers on VMware server for McAfee
ePO 5.1.
Implemented and configured Virtual Windows 2008 R2 servers on an EXSI server for McAfee
ePO 4.6.6 suite.
Implemented split configuration for McAfee ePO 4.6.6 suite.
Manage and update McAfee HBSS security suite.
Versions of McAfee ePO that I have worked on 4.5, 4.6, 5.1 and 5.2.
Managed HP ArcSight 4.5 for log collection (SIEM)
Coordinate network failover/failback to alternate sites for the Army Operations Center by
contacting the teams responsible for managing the F5 and ACE load balancers.
Developed security SOPs and insure that the information is up-to-date.
Work closely with other teams to identify potential McAfee HIPS and AV blocks.
Have gained knowledge of evidence control best practices and legal concepts as a security
engineer.
I have knowledge of forensic tools and techniques used in the process of computer intrusion
analysis, network forensics.
Have used eIQ SecureVue for log consolidation, threat correlation, incident management and
forensic analysis.
Managed vulnerability scans on Servers, Workstations, Printers and Tandberg systems.
Ability to analyze a large volume of security events while maintaining a high quality of analysis.
Identify data in firewall events to assist in troubleshooting.
Identify vulnerabilities on servers and computers and submit it to the proper groups for patching.
Manage the Firewall ACL and rules.
Perform security log management of network and system events by reviewing logs daily
Proficient in hardening a server or computer to secure and STIG per DISA and NIST guidelines.
Provide excellent customer service and always receive positive feedback from management.
Worked out of Remedy on a daily basis to manage ticket, customer accounts, and device
inventory.
Proficient in handling multiple work queues in priority and escalated matters when appropriate.
Strong documentation and report creation skills
Review/Evaluate the operating practices to determine adequate security measures.
Have performed duties as a system administrator.
3. CACI Inc. January 2010 – 2011
Lead Network System Administrator Arlington, Virginia
Tier 1 (Service Desk) and Tier 2 (Desk Side) manager
In Active Directory I have created user accounts and assigned needed permissions for the roles
and responsibilities the users needed to complete their duties.
Responsible for managing weekly/monthly schedule.
Planned and wrote SOPs and training documentation.
Scheduled and held weekly meetings with the team.
Lead person on the Windows 7 deployment and planned the deployment.
Conducted interviews for the Tier 1 and 2 positions.
Worked closely with the Assistant PM and PM on projects.
Planned and performed projects as they were requested.
Added devices and users to the network using Active Directory.
Responsible for maintaining printer security.
Conducted employee evaluations for raises and planning future goals.
CACI Inc. October 2008 – 2010
Tier 2 Deskside Technical Support Arlington, Virginia
Receive positive feedback from clients regarding services provided.
Ability to assist users quickly and accurately correct their issues in a timely manner
Assist users with their software and hardware needs
Use Remedy to track and maintain user’s hardware and software issues.
Ability of multitasking in a fast-paced environment, while maintaining and emphasis on quality.
Contribution in training or orienting other staff on office policies and procedures
Consistent presentation of a professional image, both on the phone and in person.
Contribute on special projects
Maintaining any customer database to improve tracking, reporting and customer service.
Have gained hardware and software knowledge while in the position of IT Service Desk
Coordinator.
Personnel Management Associate March 2004 – September 2008
Transtecs Deskside Support Washington, D.C.
Setup user’s workstations as they moved into the company or to new locations.
Assist new employees by setting up their email and mapping printers for their workstations.
Created a database using Microsoft Access for equipment inventories.
Maintained office equipment by repairing or changing parts within Copiers and facsimile
machines.
Attended regular staff meeting and gave insight on new technology and updates that needed to
be completed.
Have trained personnel on Polycom telecommunication equipment, as well as; maintaining the
equipment and software updates.
Experience with Remedy and Troubleshooting Hardware and Software
Customer Service Skills and Administrative Aptitude
Complete document reproduction, mailings, faxing official contract documents, and create Excel
inventory information documents.
Provide department help desk support for computer and peripheral software and hardware
problems.
Responding to employee complaints and concerns
Maintain inventory for computer supplies
Process the entire staffs’ time and attendance database entries using the governments Financial
Management System (FMS) database software.
4. Supervisor and Team Leader April 2002 – August 2008
United States Army Virginia National Guard West Point, Virginia
As the Unit Equal Opportunity Sergeant, provided insight and counsel for various equal
opportunity issues.
Operated and trained personnel on the sophisticated Talon Robot system used for Improvised
Explosive Devise (IED) operations.
Produced DA Form 2166-8 which is a scale that rates Sergeants under my command.
Produced DA Form 4856 that is a developmental counseling form for enlisted soldier who need to
better them selves.
Attended regular meetings for scheduling and provided input for placement of personnel for
missions and non-mission tasks.
Member of the Virginia National Guard Combat Engineer Battalion as a squad leader and
supervisor of unit personnel assigned the task of providing guidance and protection of soldiers
and citizens for two tours in Iraq.
As a combat engineer, applied complex math and science skills in the building and demolition of
obstacles while assigned in Iraq as well as in providing assistance to U.S. citizens in the
aftermath of hurricane Katrina.