SlideShare a Scribd company logo
David A. Santoro – CISSP
dasantoro@outlook.com
Information Systems Security Officer - RF-ITV -Radio Frequency In-Transit Visibility
LEIDOS -Manassas, VA - February 2015 to Present
 Provide for the application and enforcement of IA policies, procedures, and workforce structure
to develop, implement, and maintain a secure operational environment
 Prepare and review the documentation for of IA Assessment and Authorization (A&A) for the Risk
Management Framework (RMF) process, manage IA performance standards, participate in an IS
risk assessment during the A&A process. Received 2 ATOs for RF-ITV under Risk Management
Framework
 Manage the test results for A&A activities using eMass - Enterprise Mission Assurance Support
Service, developing security plans and other supporting documents
 Evaluate and approve development efforts to ensure that baseline security safeguards are
appropriately installed, and to monitor and evaluate the effectiveness of the RF-ITV
environment’s IA security procedures and safeguards to ensure they provide the intended level
of protection to include management of the IAV process, security training, Host Based Security
System (HBSS) and security scanning (ACAS) and remediation including conducting and analyzing
vulnerability security scans of both systems and networks
Information Assurance Manager - Defense Treat Reduction Agency (DTRA)
Lockheed Martin -Fort Belvoir, VA - March 2014 to February 2015
 Coordinated and managed program's security activities ensuring the information system is
operated, used, maintained, and disposed of in accordance with DoD security policies and
practices. Performed as Government Information Assurance Manager for the Defense Integration
and Management of Nuclear Data Services (DIAMONDS) program
 Completed documentation for Certification and Accreditation activities for a MAC I program per
DIACAP and RMF
 Provided Security, Test and Evaluation (ST&E) activities for the agency. Ensured all agencies'
assets are compliant to the current security requirements
 Used various tools, processes and applications such as VMS, ACAS, eMass, STIG Viewer and others
to analyze and evaluate systems for compliance
Information Assurance Engineer – DISA Defense Messaging System
Lockheed Martin -Manassas, VA -September 2006 to March 2014
 Lead for Host Based Security System (HBSS) implementation for Defense Message System (DMS).
Providing extensive guidance, implementation and integration of HBSS/ePO server - Installed and
managed multiple HBSS servers providing support for Windows and UNIX OS. Troubleshooting
agent issues and developed custom queries and reports
 Product Lead for operating systems and security applications, Windows and UNIX (HP UX, SUN)
operating systems, Tripwire security auditing program, VMware virtualization software
 Evaluated technical content of artifacts required for Certification and Accreditation. Works with
systems engineering to integrate/embed/assess security design throughout the lifecycle Performs
security analysis using risk assessment tools (DISA Gold Disk, Retina, McAfee ePolicy Auditor and
others) and risk management methodologies for the Defense Messaging System
 Analyzed and briefed DoD personnel on recommendations regarding current and future
hardware/software and security requirements for the DMS program
David A. Santoro – CISSP
dasantoro@outlook.com
Information Assurance Engineer - Protection of Vital Data Program (POVD)
Lockheed Martin -Manassas, VA -September 1999 to September 2006
 Security Engineer for in support of The Protection of Vital Data Program, a National Security
Agency (NSA)-sponsored implementation and development program focused on commercial-off-
the-shelf (COTS) technologies to improve the security of computer networks in the US
Government and in our country's industrial base
 Provided support for IA technologies, such as IDS, IPS and HIDS, for the establishment of a national
Attack Sensing, Warning and Response (ASW&R) technology evaluation laboratory
 Supported the beta testing program that was designed to establish a technical relationship with
market leaders of ASW&R technologies through participation in vendor Beta test programs - The
relationships that developed with vendors provided a path enabling the POVD Program to
recommend future enhancements according to the needs of the Defensive Information
Operations (DIO) Warfighter
 Key member in the development of the IDCCL - Intrusion Detection Comprehensive Capabilities
List - The IDCCL is a comprehensive list of capabilities for Intrusion Detection Systems (IDS) –a
precursor to the DISA STIGS
Security Consultant
AXENT Technologies -Reston, VA -February 1999 to September 1999
 Provided Security Consulting and Integration services to various clients concerning AXENT
Products - (Merged with Symantec)
 Developed security policies and applied these policies to firewall configuration
 Provided testing support for AXENT security products to include Y2K testing for DoD
Systems Engineer – Pentagon Renovation
Global Management Systems Inc. -Reston, VA -July 1997 to February 1999
 Installed, evaluated and configured Raptor Firewall for UNIX and NT environments
 Analyzed network traffic and services for creating and applying appropriate firewall rules
 Installed, managed and administered all facets of HPUX 10.20 on various HP devices
Administration/Personnel/Infantry - Sergeant First Class
United States Army -July 1975 to July 1995
EDUCATION
Bachelor of Science – Strayer University - 1999
Master's in Information Technology/Information Security
Cappella University - Minneapolis, MN - 2005
CERTIFICATIONS
CISSP since 2001
Top Secret Clearance

More Related Content

What's hot

Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Donald E. Hester
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault
 
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableWhy Medical Devices Are So Vulnerable
Why Medical Devices Are So Vulnerable
Medigate
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Donald E. Hester
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
William McBorrough
 
What is a cybersecurity assessment 20210813
What is a cybersecurity assessment  20210813What is a cybersecurity assessment  20210813
What is a cybersecurity assessment 20210813
Kinetic Potential
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Tripwire
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
newbie2019
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
Tuan Phan
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
MHumaamAl
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
Digital Bond
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
Donald E. Hester
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability Management
Tuan Phan
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Donald E. Hester
 
Sample network vulnerability analysis proposal
Sample network vulnerability analysis proposalSample network vulnerability analysis proposal
Sample network vulnerability analysis proposal
David Sweigert
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
Nick Krym
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeUnderstanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Donald E. Hester
 
NIST CSF Overview
NIST CSF OverviewNIST CSF Overview
NIST CSF Overview
Priyanka Aash
 

What's hot (20)

Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableWhy Medical Devices Are So Vulnerable
Why Medical Devices Are So Vulnerable
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
What is a cybersecurity assessment 20210813
What is a cybersecurity assessment  20210813What is a cybersecurity assessment  20210813
What is a cybersecurity assessment 20210813
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability Management
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
 
Network security
Network securityNetwork security
Network security
 
Sample network vulnerability analysis proposal
Sample network vulnerability analysis proposalSample network vulnerability analysis proposal
Sample network vulnerability analysis proposal
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeUnderstanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
 
JAMiller_Pro
JAMiller_ProJAMiller_Pro
JAMiller_Pro
 
NIST CSF Overview
NIST CSF OverviewNIST CSF Overview
NIST CSF Overview
 

Similar to Resume_Santoro_Aug_2016

Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016
Tom Reinheimer
 
Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark Koehler
 
William H Cooke resume 1
William H Cooke resume 1William H Cooke resume 1
William H Cooke resume 1William Cooke
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy Menezes
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
John Kingsley
 
Web Application Security.pdf
Web Application Security.pdfWeb Application Security.pdf
Web Application Security.pdf
Briskinfosec Technology and Consulting
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505Will Grayson
 
Resume justin kelso 2017
Resume justin kelso 2017Resume justin kelso 2017
Resume justin kelso 2017
Justin Kelso
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Resume_Michael_Baker_0424016
Resume_Michael_Baker_0424016Resume_Michael_Baker_0424016
Resume_Michael_Baker_0424016Michael Baker
 
Arun_Rai_Resume
Arun_Rai_ResumeArun_Rai_Resume
Arun_Rai_ResumeArun Rai
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISAIshita Kundu
 

Similar to Resume_Santoro_Aug_2016 (20)

Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Terrance A. 10.20.15
Terrance A. 10.20.15Terrance A. 10.20.15
Terrance A. 10.20.15
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016
 
Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1
 
William H Cooke resume 1
William H Cooke resume 1William H Cooke resume 1
William H Cooke resume 1
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Web Application Security.pdf
Web Application Security.pdfWeb Application Security.pdf
Web Application Security.pdf
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505
 
Resume justin kelso 2017
Resume justin kelso 2017Resume justin kelso 2017
Resume justin kelso 2017
 
Jason Allred Resume
Jason Allred ResumeJason Allred Resume
Jason Allred Resume
 
Resume 01-21-16
Resume 01-21-16Resume 01-21-16
Resume 01-21-16
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Resume_Michael_Baker_0424016
Resume_Michael_Baker_0424016Resume_Michael_Baker_0424016
Resume_Michael_Baker_0424016
 
Arun_Rai_Resume
Arun_Rai_ResumeArun_Rai_Resume
Arun_Rai_Resume
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISA
 

Resume_Santoro_Aug_2016

  • 1. David A. Santoro – CISSP dasantoro@outlook.com Information Systems Security Officer - RF-ITV -Radio Frequency In-Transit Visibility LEIDOS -Manassas, VA - February 2015 to Present  Provide for the application and enforcement of IA policies, procedures, and workforce structure to develop, implement, and maintain a secure operational environment  Prepare and review the documentation for of IA Assessment and Authorization (A&A) for the Risk Management Framework (RMF) process, manage IA performance standards, participate in an IS risk assessment during the A&A process. Received 2 ATOs for RF-ITV under Risk Management Framework  Manage the test results for A&A activities using eMass - Enterprise Mission Assurance Support Service, developing security plans and other supporting documents  Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed, and to monitor and evaluate the effectiveness of the RF-ITV environment’s IA security procedures and safeguards to ensure they provide the intended level of protection to include management of the IAV process, security training, Host Based Security System (HBSS) and security scanning (ACAS) and remediation including conducting and analyzing vulnerability security scans of both systems and networks Information Assurance Manager - Defense Treat Reduction Agency (DTRA) Lockheed Martin -Fort Belvoir, VA - March 2014 to February 2015  Coordinated and managed program's security activities ensuring the information system is operated, used, maintained, and disposed of in accordance with DoD security policies and practices. Performed as Government Information Assurance Manager for the Defense Integration and Management of Nuclear Data Services (DIAMONDS) program  Completed documentation for Certification and Accreditation activities for a MAC I program per DIACAP and RMF  Provided Security, Test and Evaluation (ST&E) activities for the agency. Ensured all agencies' assets are compliant to the current security requirements  Used various tools, processes and applications such as VMS, ACAS, eMass, STIG Viewer and others to analyze and evaluate systems for compliance Information Assurance Engineer – DISA Defense Messaging System Lockheed Martin -Manassas, VA -September 2006 to March 2014  Lead for Host Based Security System (HBSS) implementation for Defense Message System (DMS). Providing extensive guidance, implementation and integration of HBSS/ePO server - Installed and managed multiple HBSS servers providing support for Windows and UNIX OS. Troubleshooting agent issues and developed custom queries and reports  Product Lead for operating systems and security applications, Windows and UNIX (HP UX, SUN) operating systems, Tripwire security auditing program, VMware virtualization software  Evaluated technical content of artifacts required for Certification and Accreditation. Works with systems engineering to integrate/embed/assess security design throughout the lifecycle Performs security analysis using risk assessment tools (DISA Gold Disk, Retina, McAfee ePolicy Auditor and others) and risk management methodologies for the Defense Messaging System  Analyzed and briefed DoD personnel on recommendations regarding current and future hardware/software and security requirements for the DMS program
  • 2. David A. Santoro – CISSP dasantoro@outlook.com Information Assurance Engineer - Protection of Vital Data Program (POVD) Lockheed Martin -Manassas, VA -September 1999 to September 2006  Security Engineer for in support of The Protection of Vital Data Program, a National Security Agency (NSA)-sponsored implementation and development program focused on commercial-off- the-shelf (COTS) technologies to improve the security of computer networks in the US Government and in our country's industrial base  Provided support for IA technologies, such as IDS, IPS and HIDS, for the establishment of a national Attack Sensing, Warning and Response (ASW&R) technology evaluation laboratory  Supported the beta testing program that was designed to establish a technical relationship with market leaders of ASW&R technologies through participation in vendor Beta test programs - The relationships that developed with vendors provided a path enabling the POVD Program to recommend future enhancements according to the needs of the Defensive Information Operations (DIO) Warfighter  Key member in the development of the IDCCL - Intrusion Detection Comprehensive Capabilities List - The IDCCL is a comprehensive list of capabilities for Intrusion Detection Systems (IDS) –a precursor to the DISA STIGS Security Consultant AXENT Technologies -Reston, VA -February 1999 to September 1999  Provided Security Consulting and Integration services to various clients concerning AXENT Products - (Merged with Symantec)  Developed security policies and applied these policies to firewall configuration  Provided testing support for AXENT security products to include Y2K testing for DoD Systems Engineer – Pentagon Renovation Global Management Systems Inc. -Reston, VA -July 1997 to February 1999  Installed, evaluated and configured Raptor Firewall for UNIX and NT environments  Analyzed network traffic and services for creating and applying appropriate firewall rules  Installed, managed and administered all facets of HPUX 10.20 on various HP devices Administration/Personnel/Infantry - Sergeant First Class United States Army -July 1975 to July 1995 EDUCATION Bachelor of Science – Strayer University - 1999 Master's in Information Technology/Information Security Cappella University - Minneapolis, MN - 2005 CERTIFICATIONS CISSP since 2001 Top Secret Clearance