SlideShare a Scribd company logo
1 of 2
218 Liberty Sq. Rd.; Boxborough MA 01719 Cell (978)760-2492 Jeffrey Miller015@msn.com
Jeffrey A. Miller
Objective Sr Position in CyberSecurity/Information Assurance
Experience SUMMARY-
Over 40 years’ experience in Systems Analysis, Systems Engineering
and Cyber Security as a Department of Defense Contractor. Major
systems include Global Command and Control System- Air Force, and
the Joint Surveillance Target Attack Radar System (JSTARS). Activities
include secure implementation, certification and accreditation, and
support to major electronic systems.
Clearance: SECRET DoD 8750 Certification: CISSP [current]
SPECIFICS-
IA Engineer II (Cyber Security Liaison) May 2008 – Present
Jacobs Technology, ETASS Group – Lincoln, MA
• Responsible for Information Assurance/Security Liaison for the
GCCS-AF Program Management Office (PMO). Primary
information/cybersecurity point of contact for the GCCS-AF
PMO and related projects. Lead for Policy, Boundary Protection
and Circuit Enclave issues.
• Work with team members to develop information and gain
approvals for system certification and accreditation packages in the
enterprise Mission Assurance Support System (eMASS). Modify
internal processes to support the DoD Risk Management
Framework (RMF)
• Led effort to accredit the Air Force GCCS Program Support
Facility (AFGPSF, a classified enclave).
• Develop, support and implement security program for GCCS-
AF PMO.
• Develop Ports/Protocols/Services documents for GCCS-AF
baselines; coordinate AF wide changes to boundary protection
mechanisms.
• Provide information assurance services to GCCS-AF users,
including test and assessment, problem analysis and resolution,
and liaison activities with Joint and other programs. Work with
DoD Agencies, Combatant Commands (CoCOMS), GCCS
system owner (JS/J3), User representative (ACC A589/A5), the
AF Certifying organization (AFSPC/A6), and the AF DAA
office (AFSPC)
• Coordinate implementation of CyberCom directives, including
Assured Compliance Assessment Solution (ACAS) monitoring
and reporting.
• Maintain GIG Connection Approval Process (GIAP) and
Enterprise Information Technology Data Repository (EITDR)
information for program management.
Staff Computer Analyst (Security Liaison), April 1982 – May 2008
Dynamics Research Corporation (TEMS) – Andover/Wilmington,
MA
• Senior member of team that developed Defense Information
Assurance Certification and Accreditation Process (DIACAP)
packages in support of GCCS-AF V 4.1 and earlier
• Developed process document and System Identification Profile
to augment the team developed DIACAP Transition Plan.
• Provided support, documentation, and analysis for GCCS-AF
Security Certification Test and Evaluation leading to Defense
Information Technology Security Certification and
Accreditation Process (DITSCAP) Accreditation for versions 4.0
through 4.0.3.
• Developed modifications to operating configuration and
procedures for eight critical computer security deficiencies to
permit continued operations. Documented results for next
certification cycle.
• Previous accomplishments
o 12/94 to 05/95Supported Business Process
Reengineering (BPR) efforts for Air Force customers
using IDEF0 and IDEF1X (with E/R Win tool) to model
processes and data used at eight AF sites. Tasks
included data collection, interviews, meeting facilitation,
technical support and production, and quality assurance.
o 6/91 to 12/94, Analyzed data and interface requirements
for Air Mobility Command (AMC) Common Command
and Control Interface and other systems and developed
interface control documents. Applied reverse
engineering to provide AF standard data element
definitions. Upgraded and revised user documentation
for AF and Coast Guard data dictionary systems.
Modeled base level processes and data requirements as
part of Engineering Tiger Team at Travis AFB using
DRC TRACE methodology.
Additional information provided on request.
Education Certified Information System Security Professional (2010-Present)
Master of Business Administration, Northeastern University, (1981)
Master of Science, Engineering, Brown University (1975)
Bachelor of Science, Engineering, Brown University (1973)
Interests Sports, Chess, Family, Fitness.

More Related Content

What's hot

Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: RolesUnderstanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: RolesDonald E. Hester
 
Linda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez
 
Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813Kinetic Potential
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanBill Ross
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuillermo Remache
 
TrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTuan Phan
 
Analyzing Your Government Contract Cybersecurity Compliance
Analyzing Your Government Contract Cybersecurity ComplianceAnalyzing Your Government Contract Cybersecurity Compliance
Analyzing Your Government Contract Cybersecurity ComplianceRobert E Jones
 
Analyzing Your GovCon Cybersecurity Compliance
Analyzing Your GovCon Cybersecurity ComplianceAnalyzing Your GovCon Cybersecurity Compliance
Analyzing Your GovCon Cybersecurity ComplianceRobert E Jones
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Donald E. Hester
 
Security Framework
Security FrameworkSecurity Framework
Security FrameworkMarcel Dera
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeUnderstanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeDonald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: IntroductionUnderstanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: IntroductionDonald E. Hester
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...Donald E. Hester
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologiesgenetics
 
Compliance in Virtualized Environments
Compliance in Virtualized EnvironmentsCompliance in Virtualized Environments
Compliance in Virtualized EnvironmentsSeccuris Inc.
 

What's hot (20)

Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: RolesUnderstanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
 
Linda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT Security
 
Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813Nist 800 53 deep dive 20210813
Nist 800 53 deep dive 20210813
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition Plan
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
 
TrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security AuthorizationTrustedAgent FedRAMP Security Authorization
TrustedAgent FedRAMP Security Authorization
 
Doug Strickland
Doug StricklandDoug Strickland
Doug Strickland
 
Analyzing Your Government Contract Cybersecurity Compliance
Analyzing Your Government Contract Cybersecurity ComplianceAnalyzing Your Government Contract Cybersecurity Compliance
Analyzing Your Government Contract Cybersecurity Compliance
 
Analyzing Your GovCon Cybersecurity Compliance
Analyzing Your GovCon Cybersecurity ComplianceAnalyzing Your GovCon Cybersecurity Compliance
Analyzing Your GovCon Cybersecurity Compliance
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Security Framework
Security FrameworkSecurity Framework
Security Framework
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeUnderstanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: IntroductionUnderstanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Who Owns What? ISMS 27001:2013
Who Owns What? ISMS 27001:2013Who Owns What? ISMS 27001:2013
Who Owns What? ISMS 27001:2013
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
 
Resume-Ckelley1
Resume-Ckelley1Resume-Ckelley1
Resume-Ckelley1
 
fsp_22Sep15
fsp_22Sep15fsp_22Sep15
fsp_22Sep15
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
Compliance in Virtualized Environments
Compliance in Virtualized EnvironmentsCompliance in Virtualized Environments
Compliance in Virtualized Environments
 

Similar to JAMiller_Pro

Resume IT Officer Sample
Resume IT Officer SampleResume IT Officer Sample
Resume IT Officer SamplePatrice Green
 
Adam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam Moore
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...David Adams
 
James Craft_May_2016
James Craft_May_2016James Craft_May_2016
James Craft_May_2016Craft James
 
Adam R. Moore Universal Resume
Adam R. Moore Universal ResumeAdam R. Moore Universal Resume
Adam R. Moore Universal ResumeAdam Moore
 
Ken Brown's Resume.20160706
Ken Brown's Resume.20160706Ken Brown's Resume.20160706
Ken Brown's Resume.20160706Ken Brown
 
RGB_Resume_09_16
RGB_Resume_09_16RGB_Resume_09_16
RGB_Resume_09_16Rick Bailey
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsIgnyte Assurance Platform
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2david dunkle
 
ADAM R. MOORE OFFICE 365 RESUME
ADAM R. MOORE OFFICE 365 RESUMEADAM R. MOORE OFFICE 365 RESUME
ADAM R. MOORE OFFICE 365 RESUMEAdam Moore
 
Resume_Michael_Baker_0424016
Resume_Michael_Baker_0424016Resume_Michael_Baker_0424016
Resume_Michael_Baker_0424016Michael Baker
 
O%22Grady Resume V4
O%22Grady Resume V4O%22Grady Resume V4
O%22Grady Resume V4Bob O'Grady
 
Priscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBSPriscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBSPriscilla Thakurdas
 

Similar to JAMiller_Pro (20)

Resume IT Officer Sample
Resume IT Officer SampleResume IT Officer Sample
Resume IT Officer Sample
 
Adam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam R. Moore Security Architect Resume
Adam R. Moore Security Architect Resume
 
Corporate Cyber Program
Corporate Cyber ProgramCorporate Cyber Program
Corporate Cyber Program
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
 
Wayne_Resume
Wayne_ResumeWayne_Resume
Wayne_Resume
 
James Craft_May_2016
James Craft_May_2016James Craft_May_2016
James Craft_May_2016
 
Adam R. Moore Universal Resume
Adam R. Moore Universal ResumeAdam R. Moore Universal Resume
Adam R. Moore Universal Resume
 
Ken Brown's Resume.20160706
Ken Brown's Resume.20160706Ken Brown's Resume.20160706
Ken Brown's Resume.20160706
 
RGB_Resume_09_16
RGB_Resume_09_16RGB_Resume_09_16
RGB_Resume_09_16
 
JBlair_Resume
JBlair_ResumeJBlair_Resume
JBlair_Resume
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
ADAM R. MOORE OFFICE 365 RESUME
ADAM R. MOORE OFFICE 365 RESUMEADAM R. MOORE OFFICE 365 RESUME
ADAM R. MOORE OFFICE 365 RESUME
 
Resume_Michael_Baker_0424016
Resume_Michael_Baker_0424016Resume_Michael_Baker_0424016
Resume_Michael_Baker_0424016
 
Christian baki resume
Christian baki resumeChristian baki resume
Christian baki resume
 
O%22Grady Resume V4
O%22Grady Resume V4O%22Grady Resume V4
O%22Grady Resume V4
 
Priscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBSPriscilla_Y_Thankudas Resume USAJOBS
Priscilla_Y_Thankudas Resume USAJOBS
 

JAMiller_Pro

  • 1. 218 Liberty Sq. Rd.; Boxborough MA 01719 Cell (978)760-2492 Jeffrey Miller015@msn.com Jeffrey A. Miller Objective Sr Position in CyberSecurity/Information Assurance Experience SUMMARY- Over 40 years’ experience in Systems Analysis, Systems Engineering and Cyber Security as a Department of Defense Contractor. Major systems include Global Command and Control System- Air Force, and the Joint Surveillance Target Attack Radar System (JSTARS). Activities include secure implementation, certification and accreditation, and support to major electronic systems. Clearance: SECRET DoD 8750 Certification: CISSP [current] SPECIFICS- IA Engineer II (Cyber Security Liaison) May 2008 – Present Jacobs Technology, ETASS Group – Lincoln, MA • Responsible for Information Assurance/Security Liaison for the GCCS-AF Program Management Office (PMO). Primary information/cybersecurity point of contact for the GCCS-AF PMO and related projects. Lead for Policy, Boundary Protection and Circuit Enclave issues. • Work with team members to develop information and gain approvals for system certification and accreditation packages in the enterprise Mission Assurance Support System (eMASS). Modify internal processes to support the DoD Risk Management Framework (RMF) • Led effort to accredit the Air Force GCCS Program Support Facility (AFGPSF, a classified enclave). • Develop, support and implement security program for GCCS- AF PMO. • Develop Ports/Protocols/Services documents for GCCS-AF baselines; coordinate AF wide changes to boundary protection mechanisms. • Provide information assurance services to GCCS-AF users, including test and assessment, problem analysis and resolution, and liaison activities with Joint and other programs. Work with DoD Agencies, Combatant Commands (CoCOMS), GCCS system owner (JS/J3), User representative (ACC A589/A5), the AF Certifying organization (AFSPC/A6), and the AF DAA office (AFSPC) • Coordinate implementation of CyberCom directives, including Assured Compliance Assessment Solution (ACAS) monitoring and reporting. • Maintain GIG Connection Approval Process (GIAP) and Enterprise Information Technology Data Repository (EITDR)
  • 2. information for program management. Staff Computer Analyst (Security Liaison), April 1982 – May 2008 Dynamics Research Corporation (TEMS) – Andover/Wilmington, MA • Senior member of team that developed Defense Information Assurance Certification and Accreditation Process (DIACAP) packages in support of GCCS-AF V 4.1 and earlier • Developed process document and System Identification Profile to augment the team developed DIACAP Transition Plan. • Provided support, documentation, and analysis for GCCS-AF Security Certification Test and Evaluation leading to Defense Information Technology Security Certification and Accreditation Process (DITSCAP) Accreditation for versions 4.0 through 4.0.3. • Developed modifications to operating configuration and procedures for eight critical computer security deficiencies to permit continued operations. Documented results for next certification cycle. • Previous accomplishments o 12/94 to 05/95Supported Business Process Reengineering (BPR) efforts for Air Force customers using IDEF0 and IDEF1X (with E/R Win tool) to model processes and data used at eight AF sites. Tasks included data collection, interviews, meeting facilitation, technical support and production, and quality assurance. o 6/91 to 12/94, Analyzed data and interface requirements for Air Mobility Command (AMC) Common Command and Control Interface and other systems and developed interface control documents. Applied reverse engineering to provide AF standard data element definitions. Upgraded and revised user documentation for AF and Coast Guard data dictionary systems. Modeled base level processes and data requirements as part of Engineering Tiger Team at Travis AFB using DRC TRACE methodology. Additional information provided on request. Education Certified Information System Security Professional (2010-Present) Master of Business Administration, Northeastern University, (1981) Master of Science, Engineering, Brown University (1975) Bachelor of Science, Engineering, Brown University (1973) Interests Sports, Chess, Family, Fitness.