SlideShare a Scribd company logo
1 of 1
Download to read offline
Joshua B. Kellogg
3912 Sherman Oaks Ave, Virginia Beach, VA 23456  (757) 621-2089  josh.kellogg@cox.net
Objective
Obtain position with reputable contractor with a DoD client in the Hampton Roads area utilizing my 20 years of experience as an Information
Systems Technician in the U.S. Navy as well as my 3 years of recent civilian contractor experience as Command Cyber Readiness Inspection
Traditional Security Reviewer.
Certification
ISC2
- Certified Information Systems Security Professional (CISSP) (Apr 30, 2013) (renewed in 2016)
Security Clearance
Granted Top Secret clearance based on Single-Scope Background Investigation Periodic Review (March 18, 2014)
Experience
Mar 2016 – Present Booz Allen Hamilton Norfolk, VA
Navy Echelon II C&A Analyst
 Validated information security certification and accreditation (C&A) packages for applications, systems, and networks in accordance
with appropriate DoD policies and processes.
 Use eMASS to process and update C&A packages.
 Support all C&A efforts, document security plans, site assessment and security testing.
 Apply experience with DIACAP technical and functional capabilities to match testing to risk analysis and remediation (RAR) POAM.
 Recommend Cybersecurity requirements to be included in the design, installation, operation, upgrade, or replacement of information
systems.
Feb 2015 – Mar 2016 Booz Allen Hamilton Chambersburg, PA
Cyber Security Analyst (Traditional Security)
 Conducted over 30 Command Cyber Readiness Inspections, Site Assist Visits and Certification & Accreditation Visits at DoD military and
contractor installations, reviewing networks and facilities compliance and identifying existing and potential security risks.
 Provided written and verbal results to DISA and Command leadership
 Analyzed Information Security, Physical Security, Personnel Security and Industrial Security issues and provided recommendations for
resolution and/or mitigation.
 Assisted Risk Management Framework team with assessing compelling evidence for Certification & Accreditation packages being evaluated
by DISA.
Sep 2013 – Feb 2015 Honeywell Technology Solutions, Inc. Chesapeake, VA
IA Analyst (Traditional Security)
 Conducted 10 Cyber Security Inspections at Navy installations, both afloat and ashore.
 Spearheaded the effort to update the CSICP Phase 1 ISIC Admin Review checklist, bringing the product more in line with subsequent phases
of the inspection process as well as updating and validating all references.
Oct 2010 - May 2013 Commander, Carrier Strike Group TWO Norfolk, VA
Flag Information Assurance Manager (IAM)
 Established Information Assurance program for a staff of 75 personnel utilizing unclassified and classified networks both ashore &afloat.
 Responsible for establishing an effective CSICP ISIC Admin Review program leading to the first Carrier Strike Group completing the
all phases of the CSICP prior to deployment.
 Trained and instructed 6 IAMs to develop Information Assurance programs for 5 Guided Missile Cruisers and 1 aircraft carrier.
 Conducted 7 Cyber Security Admin Reviews using DISA CCRI and Navy CSICP standards.
 Provided ISIC representation for Carrier Strike Group Two units during CSICP Training & Assist Visits.
 Personally established the DoN Trusted Transfer program at the command and trained all personnel on requirements and procedures.
Education
Oct 2015 DISA Security Readiness Review Course, Assured Compliance Assessment Solution Chambersburg, PA
Dec 2014 DISA Security Readiness Review Course ,Windows Chambersburg, PA
Dec 2013 Defense Security Specialist Course Linthicum, MD
Oct 2013 & Sep 2015 DISA Security Readiness Review Course ,Traditional Security Chambersburg, PA
May 2004 Navy Information Systems Security Manager Course Virginia Beach, VA
Aug - Oct 2003 Navy Network Security & Vulnerability Technician Course Virginia Beach, VA
May - Jul 2002 Navy Information Systems Administrator Course Pensacola, FL
Jan - Mar 1999 Navy Information Systems Technician Course Great Lakes, IL
1989 - 1992 Floyd E. Kellam High School Virginia Beach, VA

More Related Content

What's hot

Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
OTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTOTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTshiriskumar
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by primePrime Infoserv
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningSecurityMetrics
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentMarcelo Silva
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Penetration Testing
Penetration TestingPenetration Testing
Penetration TestingMayank Singh
 
Олексій Барановський “Vulnerability assessment as part software testing process”
Олексій Барановський “Vulnerability assessment as part software testing process”Олексій Барановський “Vulnerability assessment as part software testing process”
Олексій Барановський “Vulnerability assessment as part software testing process”Dakiry
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
Ethical Hacking & Penetration Testing
Ethical  Hacking &  Penetration  TestingEthical  Hacking &  Penetration  Testing
Ethical Hacking & Penetration TestingWon Ju Jub
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentationDerrick Hunter
 
Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing ServicesCyber 51 LLC
 
Monitoring threats for pci compliance
Monitoring threats for pci complianceMonitoring threats for pci compliance
Monitoring threats for pci complianceShiva Hullavarad
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Reportbtpsec
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases Nasir Bhutta
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 

What's hot (19)

VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
OTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTOTG - Practical Hands on VAPT
OTG - Practical Hands on VAPT
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability Scanning
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Penetration Testing
Penetration TestingPenetration Testing
Penetration Testing
 
Олексій Барановський “Vulnerability assessment as part software testing process”
Олексій Барановський “Vulnerability assessment as part software testing process”Олексій Барановський “Vulnerability assessment as part software testing process”
Олексій Барановський “Vulnerability assessment as part software testing process”
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
Ethical Hacking & Penetration Testing
Ethical  Hacking &  Penetration  TestingEthical  Hacking &  Penetration  Testing
Ethical Hacking & Penetration Testing
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
 
Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing Services
 
Monitoring threats for pci compliance
Monitoring threats for pci complianceMonitoring threats for pci compliance
Monitoring threats for pci compliance
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Report
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 

Similar to Resume_JKellogg_26Oct2016

Similar to Resume_JKellogg_26Oct2016 (20)

B Parker Resume rev 2
B Parker Resume rev 2B Parker Resume rev 2
B Parker Resume rev 2
 
SSBRadley Resume_June2015
SSBRadley Resume_June2015SSBRadley Resume_June2015
SSBRadley Resume_June2015
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber Elijah
 
Charity Winkler
Charity WinklerCharity Winkler
Charity Winkler
 
Jess Paul Dawson Resume 2
Jess Paul Dawson Resume 2Jess Paul Dawson Resume 2
Jess Paul Dawson Resume 2
 
Blakley Security Officer Resume 2017
Blakley Security Officer Resume 2017Blakley Security Officer Resume 2017
Blakley Security Officer Resume 2017
 
Resume - Timothy Lewis 20160313
Resume - Timothy Lewis 20160313Resume - Timothy Lewis 20160313
Resume - Timothy Lewis 20160313
 
mile2 about us presentation2
mile2 about us presentation2mile2 about us presentation2
mile2 about us presentation2
 
Nicholas O'Connor - Resume V3
Nicholas O'Connor -  Resume V3Nicholas O'Connor -  Resume V3
Nicholas O'Connor - Resume V3
 
Resume - Joshua R Clark
Resume - Joshua R ClarkResume - Joshua R Clark
Resume - Joshua R Clark
 
D. C. Behringer resume, v.13.2.1
D. C. Behringer resume, v.13.2.1D. C. Behringer resume, v.13.2.1
D. C. Behringer resume, v.13.2.1
 
Blakley - Security Professional Resume 2017
Blakley - Security Professional Resume 2017Blakley - Security Professional Resume 2017
Blakley - Security Professional Resume 2017
 
Sylvester Gardner Resume
Sylvester Gardner ResumeSylvester Gardner Resume
Sylvester Gardner Resume
 
BAH Glatter Resume (Format 1)
BAH Glatter Resume (Format 1)BAH Glatter Resume (Format 1)
BAH Glatter Resume (Format 1)
 
Holtzlander Resume1-23-16
Holtzlander Resume1-23-16Holtzlander Resume1-23-16
Holtzlander Resume1-23-16
 
CV Raul Alafa May 2016
CV Raul Alafa May 2016CV Raul Alafa May 2016
CV Raul Alafa May 2016
 
James mooney resume_current
James mooney resume_currentJames mooney resume_current
James mooney resume_current
 
Chris Dabo Resume 20160915
Chris Dabo Resume 20160915Chris Dabo Resume 20160915
Chris Dabo Resume 20160915
 
ConklinResume2
ConklinResume2ConklinResume2
ConklinResume2
 
NTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John WhitedNTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John Whited
 

Resume_JKellogg_26Oct2016

  • 1. Joshua B. Kellogg 3912 Sherman Oaks Ave, Virginia Beach, VA 23456  (757) 621-2089  josh.kellogg@cox.net Objective Obtain position with reputable contractor with a DoD client in the Hampton Roads area utilizing my 20 years of experience as an Information Systems Technician in the U.S. Navy as well as my 3 years of recent civilian contractor experience as Command Cyber Readiness Inspection Traditional Security Reviewer. Certification ISC2 - Certified Information Systems Security Professional (CISSP) (Apr 30, 2013) (renewed in 2016) Security Clearance Granted Top Secret clearance based on Single-Scope Background Investigation Periodic Review (March 18, 2014) Experience Mar 2016 – Present Booz Allen Hamilton Norfolk, VA Navy Echelon II C&A Analyst  Validated information security certification and accreditation (C&A) packages for applications, systems, and networks in accordance with appropriate DoD policies and processes.  Use eMASS to process and update C&A packages.  Support all C&A efforts, document security plans, site assessment and security testing.  Apply experience with DIACAP technical and functional capabilities to match testing to risk analysis and remediation (RAR) POAM.  Recommend Cybersecurity requirements to be included in the design, installation, operation, upgrade, or replacement of information systems. Feb 2015 – Mar 2016 Booz Allen Hamilton Chambersburg, PA Cyber Security Analyst (Traditional Security)  Conducted over 30 Command Cyber Readiness Inspections, Site Assist Visits and Certification & Accreditation Visits at DoD military and contractor installations, reviewing networks and facilities compliance and identifying existing and potential security risks.  Provided written and verbal results to DISA and Command leadership  Analyzed Information Security, Physical Security, Personnel Security and Industrial Security issues and provided recommendations for resolution and/or mitigation.  Assisted Risk Management Framework team with assessing compelling evidence for Certification & Accreditation packages being evaluated by DISA. Sep 2013 – Feb 2015 Honeywell Technology Solutions, Inc. Chesapeake, VA IA Analyst (Traditional Security)  Conducted 10 Cyber Security Inspections at Navy installations, both afloat and ashore.  Spearheaded the effort to update the CSICP Phase 1 ISIC Admin Review checklist, bringing the product more in line with subsequent phases of the inspection process as well as updating and validating all references. Oct 2010 - May 2013 Commander, Carrier Strike Group TWO Norfolk, VA Flag Information Assurance Manager (IAM)  Established Information Assurance program for a staff of 75 personnel utilizing unclassified and classified networks both ashore &afloat.  Responsible for establishing an effective CSICP ISIC Admin Review program leading to the first Carrier Strike Group completing the all phases of the CSICP prior to deployment.  Trained and instructed 6 IAMs to develop Information Assurance programs for 5 Guided Missile Cruisers and 1 aircraft carrier.  Conducted 7 Cyber Security Admin Reviews using DISA CCRI and Navy CSICP standards.  Provided ISIC representation for Carrier Strike Group Two units during CSICP Training & Assist Visits.  Personally established the DoN Trusted Transfer program at the command and trained all personnel on requirements and procedures. Education Oct 2015 DISA Security Readiness Review Course, Assured Compliance Assessment Solution Chambersburg, PA Dec 2014 DISA Security Readiness Review Course ,Windows Chambersburg, PA Dec 2013 Defense Security Specialist Course Linthicum, MD Oct 2013 & Sep 2015 DISA Security Readiness Review Course ,Traditional Security Chambersburg, PA May 2004 Navy Information Systems Security Manager Course Virginia Beach, VA Aug - Oct 2003 Navy Network Security & Vulnerability Technician Course Virginia Beach, VA May - Jul 2002 Navy Information Systems Administrator Course Pensacola, FL Jan - Mar 1999 Navy Information Systems Technician Course Great Lakes, IL 1989 - 1992 Floyd E. Kellam High School Virginia Beach, VA