SlideShare a Scribd company logo
http://linkedin.com/in/boggsscott
19414 Babcock Road, Apartment # 2002 San Antonio, Texas 78255
C: 210-563-9663
E: scott.boggs@gmail.com
SCOTT A. BOGGS
OVERVIEW
SECURITY
CLEARANCE
Senior Information Assurance Engineer. 20+ year career, achieving results with
proven Information Technology Service experience. Demonstrated leader sought by
customers and peers for technical vision and support. Proven experience managing
multiple complex projects and support engineers. Demonstrable projects completed
within parameters of the tasking.
Presently holds a TOP SECRET/SBI security clearance
INFRASTRUCTURE
KNOWLEDGE
Certified Information Systems Professional (CISSP).
UNIX/Linux, Microsoft, Sun, Windows, TSOL and other operating systems.
Cisco IOS, Routers, Switches, TCP/IP, Asynchronous Transfer Mode; TCP/IP protocol
analysis.
Juniper, Cisco, Check Point, SNORT, Secure Net, Dragon and ASIM IDS/IPS
infrastructures.
Computer Network Operations (CNO) network security integration engineer.
Cross Domain Systems, Trusted Linux & Trusted Solaris engineer
Service Oriented Architecture Design and Processes
VMware vSphere, VMware Workstation; and other virtualization technologies
Network Area Storage/Storage Area Network, FreeNAS, Openfiler
Oracle/MySQL Database
PROFESSIONAL
EXPERIENCE
TASC Inc. / Engility Corporation, Test Engineer
August 2013 – Present
• Software Test Engineer responsible for developing and executing network warfare. Develop
Test and Evaluation (DT&E) highly classified, Information Operations (IO) mission capabilities,
in compliance with Air Force Instructions (AFIs), organizational procedures and best industry
practice.
• Develop DT&E Master Plans (TEMPs) for acquisition categories (ACAT) II & III programs.
• Perform functional testing of various IO systems, tools and networks.
• Design developmental and operational network test plans/procedures.
• Troubleshoot; resolve test deficiencies and hardware problems.
• Monitor performance of telecommunications and computer network products.
• Plan, conduct, validate and report results of developmental and operational tests.
• Perform interoperability and integration testing.
• Provide support to government milestone decision-making.
• Provide technical advisory and assistance support to government sponsors.
• Prepare final and supplemental reports.
Boggs, Page 2
Booz Allen Hamilton, Senior Information Assurance Engineer
March 2009 – July 2013
• Led team of highly skilled engineers ensuring state-of-the-art encryption technologies,
computer systems and network implementation adhere or surpass Information Assurance
standards within a large Department of Defense organization.
• Responsible for expansion and validation with research and development efforts; supported
technical involvement in Multi-Level Security environments, providing Service Oriented
Architecture designs, High Assurance Internet Protocol Encryption (Type 1) implementation
testing, Cyber Technology Testing and Supply Chain Risk Management.
• Accountable for the development of key testing concepts and processes that ensured the
successful stand-up of the Air Force's Supply Chain Risk Management (SCRM) Center of
Excellence (CoE) and its successful funding for its Technical Evaluation (T&E) pilot initiative
for Malware identification within the Air Force’s Information Communication Technology
(ICT).
Northrop Grumman Corporation, Senior Range Engineer
May 2007 – March 2009
• Node Manager and Senior Engineer responsible for over $2.5 million testing and training
infrastructure projects; Review requirements, design heterogeneous network test scenarios,
build and supervise supporting project requirements.
• Determine and manage robust TTI build-out schedules; provide cutting edge
strategic/technical vision; including the evaluation and recommendation of all technical
purchases.
• Designed first ever fiber optic network for multi-level testing of SONET network environment
consisting of hundreds of nodes; provided technical guidance for analogous results, providing
clarity aiding in successful test event.
• Successfully executed design and implemented new IDS environment, including 9 new
appliances.
• Supervised, train, and guided technical staff in the aid and troubleshooting of complex
customer issues.
• Designed and managed 3G and CMDA infrastructure to support development and testing of
SMS/MMS implementations.
• Received three Northrop Grumman awards recognizing contributions in support of TTI and
process improvements (awards normally only received by 10 percent of Northrop
organization).
• Managed 300+ item inventory including; classified equipment; ensuring compliance of
oversight and handling.
Trusted Computer Solutions , Senior Systems Engineer
February 2004 – March 2007
• Lead Engineer designing multi-level security network, NetTop2. Provided technical vision to
diverse group of LINUX and UNIX programmers, resulting in successful implementation using
cutting-edge Secure Linux (SElinux) operating system. Managed project to fruition; including
several geographically dispersed teams globally.
• Developed Certification and Evaluation Test Plans ensuring products met DoD Information
Technology Security Certification and Accreditation Process (DITSCAP) and Cross Domain
Solutions (CDS). Provided support serving Secret and Below Interoperability (SABI)
community, including; Director of Central Intelligence Directive (DCID) 6/3 guidelines for Top
Secret SCI and Below Interoperability (TSABI) Certification and Accreditation (C&A) process.
Boggs, Page 3
General Dynamics Corporation, Network Security Integration Engineer
November 2002 – February 2004
• Senior Trusted Network Engineer designer, implemented multi-level security networks PL3
and PL4 interfaces.
• Developed and implemented methods for research and development tasks including; scanner
integration, diskless boot environments, modem integration, video teleconferencing and user
collaboration and integrating hardware and software.
• Technical Engineer responsible for the successful award of a National Level System contract in
support of the U.S. Navy.
• Lead Network Engineer working for the Air Force Computer Emergency Response Team
(AFCERT) responsible for over 300 network intrusion detection systems running Solaris and
FreeBSD.
• Designed Enterprise perimeter security solutions using Firewall, VPN, IDS and DMZ
technologies; administering VPN network over 150 systems using Time Step VPN package.
• Managed Local Area Network (LAN) design, operation, troubleshooting and implementation.
• Created application development, performed systems integration, system security intrusion
detection, database design, system administration, system test, proposal development,
software maintenance acceptance test support.
EDUCATION
CERTIFICATIONS
M.S INFORMATION TECHNOLOGY, CAPELLA UNIVERSITY
SPECIALIZATION IN INFORMATION ASSURANCE AND SECURITY / NETWORK SECURITY
B.S. COMPUTER INFORMATION SYSTEMS, PARK UNIVERSITY
ISC2 CERTIFIED INFORMATION SYSTEMS PROFESSIONAL (CISSP) - 345275
CISCO CERTIFIED NETWORK ASSOCIATE, CISCO ID - CSCO10238821
ISTQB CERTIFIED TESTER (CTFL)
ISTQB CERTIFIED TESTER, ADVANCED LEVEL (CTAL-TA)
Middle Enlisted Cryptologic Career Advancement Program (MECCAP), NSA/CSS
PUBLICATIONS
Boggs, S. (2010). Cross-Domain Solutions Policy Gap Analysis Report: National
Security Systems Information Assurance Security Controls Governance and Cross-
Domain Net-Centric Challenges. Fort Belvoir: Defense Technical Information Center.
Boggs, S. (2011). HAIPE Gap Assessment Report: The Potential of Implementing High
Assurance Internet Protocol Encryptor Bypass Functionality in the Air Force
Enterprise. Fort Belvoir: Defense Technical Information Center.
Boggs, S. (2010). IA Training and Awareness, Air Force Supply Chain Risk
Management. Fort Belvoir: Defense Technical Information Center.
Boggs, S. (2011). Information Assurance (IA) Emerging Technology Report: The Need
for a Consolidated Cyber Security Technology Portal. Fort Belvoir: Defense Technical
Information Center.
Boggs, Page 4
Boggs, S. (2010). The Air Force’s Supply Chain Risk Management Center of Excellence
Malware Tool Set Evaluation Event. Fort Belvoir: Defense Technical Information
Center.
References provided upon request

More Related Content

What's hot

Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton Resume
Jesse Hinton
 
William H Cooke resume 1
William H Cooke resume 1William H Cooke resume 1
William H Cooke resume 1
William Cooke
 
Kevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer Chronological
Kevin Farmer Chronological
Kevin Farmer
 
Minal Wankhede
Minal WankhedeMinal Wankhede
Minal Wankhede
mpatke
 
Cybersecurity R&D briefing
Cybersecurity R&D briefingCybersecurity R&D briefing
Cybersecurity R&D briefing
Naba Barkakati
 
Will_Grayson_Full_201502
Will_Grayson_Full_201502Will_Grayson_Full_201502
Will_Grayson_Full_201502
Will Grayson
 
Will_Grayson_Full_201504
Will_Grayson_Full_201504Will_Grayson_Full_201504
Will_Grayson_Full_201504
Will Grayson
 

What's hot (20)

Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton Resume
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
William H Cooke resume 1
William H Cooke resume 1William H Cooke resume 1
William H Cooke resume 1
 
The Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial SecurityThe Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial Security
 
Kevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer Chronological
Kevin Farmer Chronological
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Infosec resume-duckworth
Infosec resume-duckworthInfosec resume-duckworth
Infosec resume-duckworth
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Minal Wankhede
Minal WankhedeMinal Wankhede
Minal Wankhede
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
Security sdn
Security sdnSecurity sdn
Security sdn
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
Cybersecurity R&D briefing
Cybersecurity R&D briefingCybersecurity R&D briefing
Cybersecurity R&D briefing
 
Will_Grayson_Full_201502
Will_Grayson_Full_201502Will_Grayson_Full_201502
Will_Grayson_Full_201502
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
Will_Grayson_Full_201504
Will_Grayson_Full_201504Will_Grayson_Full_201504
Will_Grayson_Full_201504
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APT
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security Analytics
 

Similar to Scott A Boggs (20)

Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Presnell David_2017 - Resume
Presnell David_2017 - ResumePresnell David_2017 - Resume
Presnell David_2017 - Resume
 
TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Security
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
CLARK ROBERT FINAL
CLARK ROBERT FINALCLARK ROBERT FINAL
CLARK ROBERT FINAL
 
Jamison2 Resume
Jamison2 ResumeJamison2 Resume
Jamison2 Resume
 
Willard_Grayson_2015
Willard_Grayson_2015Willard_Grayson_2015
Willard_Grayson_2015
 
Robert clarkresumefd
Robert clarkresumefdRobert clarkresumefd
Robert clarkresumefd
 
Debra Burgess
Debra BurgessDebra Burgess
Debra Burgess
 
Frank Gu - Resume
Frank Gu - ResumeFrank Gu - Resume
Frank Gu - Resume
 
01-15a
01-15a01-15a
01-15a
 
Mohan_resume
Mohan_resumeMohan_resume
Mohan_resume
 
resume IT security
resume IT securityresume IT security
resume IT security
 
Shawn McKennon
Shawn McKennonShawn McKennon
Shawn McKennon
 
Vinoth babu b new
Vinoth babu b newVinoth babu b new
Vinoth babu b new
 
Vinoth Babu B-New
Vinoth Babu B-NewVinoth Babu B-New
Vinoth Babu B-New
 
Vinoth babu b new
Vinoth babu b newVinoth babu b new
Vinoth babu b new
 
CV_almurdh A
CV_almurdh  A CV_almurdh  A
CV_almurdh A
 
Voip Eddie Jan2010
Voip Eddie Jan2010Voip Eddie Jan2010
Voip Eddie Jan2010
 
O%22Grady Resume V4
O%22Grady Resume V4O%22Grady Resume V4
O%22Grady Resume V4
 

Scott A Boggs

  • 1. http://linkedin.com/in/boggsscott 19414 Babcock Road, Apartment # 2002 San Antonio, Texas 78255 C: 210-563-9663 E: scott.boggs@gmail.com SCOTT A. BOGGS OVERVIEW SECURITY CLEARANCE Senior Information Assurance Engineer. 20+ year career, achieving results with proven Information Technology Service experience. Demonstrated leader sought by customers and peers for technical vision and support. Proven experience managing multiple complex projects and support engineers. Demonstrable projects completed within parameters of the tasking. Presently holds a TOP SECRET/SBI security clearance INFRASTRUCTURE KNOWLEDGE Certified Information Systems Professional (CISSP). UNIX/Linux, Microsoft, Sun, Windows, TSOL and other operating systems. Cisco IOS, Routers, Switches, TCP/IP, Asynchronous Transfer Mode; TCP/IP protocol analysis. Juniper, Cisco, Check Point, SNORT, Secure Net, Dragon and ASIM IDS/IPS infrastructures. Computer Network Operations (CNO) network security integration engineer. Cross Domain Systems, Trusted Linux & Trusted Solaris engineer Service Oriented Architecture Design and Processes VMware vSphere, VMware Workstation; and other virtualization technologies Network Area Storage/Storage Area Network, FreeNAS, Openfiler Oracle/MySQL Database PROFESSIONAL EXPERIENCE TASC Inc. / Engility Corporation, Test Engineer August 2013 – Present • Software Test Engineer responsible for developing and executing network warfare. Develop Test and Evaluation (DT&E) highly classified, Information Operations (IO) mission capabilities, in compliance with Air Force Instructions (AFIs), organizational procedures and best industry practice. • Develop DT&E Master Plans (TEMPs) for acquisition categories (ACAT) II & III programs. • Perform functional testing of various IO systems, tools and networks. • Design developmental and operational network test plans/procedures. • Troubleshoot; resolve test deficiencies and hardware problems. • Monitor performance of telecommunications and computer network products. • Plan, conduct, validate and report results of developmental and operational tests. • Perform interoperability and integration testing. • Provide support to government milestone decision-making. • Provide technical advisory and assistance support to government sponsors. • Prepare final and supplemental reports.
  • 2. Boggs, Page 2 Booz Allen Hamilton, Senior Information Assurance Engineer March 2009 – July 2013 • Led team of highly skilled engineers ensuring state-of-the-art encryption technologies, computer systems and network implementation adhere or surpass Information Assurance standards within a large Department of Defense organization. • Responsible for expansion and validation with research and development efforts; supported technical involvement in Multi-Level Security environments, providing Service Oriented Architecture designs, High Assurance Internet Protocol Encryption (Type 1) implementation testing, Cyber Technology Testing and Supply Chain Risk Management. • Accountable for the development of key testing concepts and processes that ensured the successful stand-up of the Air Force's Supply Chain Risk Management (SCRM) Center of Excellence (CoE) and its successful funding for its Technical Evaluation (T&E) pilot initiative for Malware identification within the Air Force’s Information Communication Technology (ICT). Northrop Grumman Corporation, Senior Range Engineer May 2007 – March 2009 • Node Manager and Senior Engineer responsible for over $2.5 million testing and training infrastructure projects; Review requirements, design heterogeneous network test scenarios, build and supervise supporting project requirements. • Determine and manage robust TTI build-out schedules; provide cutting edge strategic/technical vision; including the evaluation and recommendation of all technical purchases. • Designed first ever fiber optic network for multi-level testing of SONET network environment consisting of hundreds of nodes; provided technical guidance for analogous results, providing clarity aiding in successful test event. • Successfully executed design and implemented new IDS environment, including 9 new appliances. • Supervised, train, and guided technical staff in the aid and troubleshooting of complex customer issues. • Designed and managed 3G and CMDA infrastructure to support development and testing of SMS/MMS implementations. • Received three Northrop Grumman awards recognizing contributions in support of TTI and process improvements (awards normally only received by 10 percent of Northrop organization). • Managed 300+ item inventory including; classified equipment; ensuring compliance of oversight and handling. Trusted Computer Solutions , Senior Systems Engineer February 2004 – March 2007 • Lead Engineer designing multi-level security network, NetTop2. Provided technical vision to diverse group of LINUX and UNIX programmers, resulting in successful implementation using cutting-edge Secure Linux (SElinux) operating system. Managed project to fruition; including several geographically dispersed teams globally. • Developed Certification and Evaluation Test Plans ensuring products met DoD Information Technology Security Certification and Accreditation Process (DITSCAP) and Cross Domain Solutions (CDS). Provided support serving Secret and Below Interoperability (SABI) community, including; Director of Central Intelligence Directive (DCID) 6/3 guidelines for Top Secret SCI and Below Interoperability (TSABI) Certification and Accreditation (C&A) process.
  • 3. Boggs, Page 3 General Dynamics Corporation, Network Security Integration Engineer November 2002 – February 2004 • Senior Trusted Network Engineer designer, implemented multi-level security networks PL3 and PL4 interfaces. • Developed and implemented methods for research and development tasks including; scanner integration, diskless boot environments, modem integration, video teleconferencing and user collaboration and integrating hardware and software. • Technical Engineer responsible for the successful award of a National Level System contract in support of the U.S. Navy. • Lead Network Engineer working for the Air Force Computer Emergency Response Team (AFCERT) responsible for over 300 network intrusion detection systems running Solaris and FreeBSD. • Designed Enterprise perimeter security solutions using Firewall, VPN, IDS and DMZ technologies; administering VPN network over 150 systems using Time Step VPN package. • Managed Local Area Network (LAN) design, operation, troubleshooting and implementation. • Created application development, performed systems integration, system security intrusion detection, database design, system administration, system test, proposal development, software maintenance acceptance test support. EDUCATION CERTIFICATIONS M.S INFORMATION TECHNOLOGY, CAPELLA UNIVERSITY SPECIALIZATION IN INFORMATION ASSURANCE AND SECURITY / NETWORK SECURITY B.S. COMPUTER INFORMATION SYSTEMS, PARK UNIVERSITY ISC2 CERTIFIED INFORMATION SYSTEMS PROFESSIONAL (CISSP) - 345275 CISCO CERTIFIED NETWORK ASSOCIATE, CISCO ID - CSCO10238821 ISTQB CERTIFIED TESTER (CTFL) ISTQB CERTIFIED TESTER, ADVANCED LEVEL (CTAL-TA) Middle Enlisted Cryptologic Career Advancement Program (MECCAP), NSA/CSS PUBLICATIONS Boggs, S. (2010). Cross-Domain Solutions Policy Gap Analysis Report: National Security Systems Information Assurance Security Controls Governance and Cross- Domain Net-Centric Challenges. Fort Belvoir: Defense Technical Information Center. Boggs, S. (2011). HAIPE Gap Assessment Report: The Potential of Implementing High Assurance Internet Protocol Encryptor Bypass Functionality in the Air Force Enterprise. Fort Belvoir: Defense Technical Information Center. Boggs, S. (2010). IA Training and Awareness, Air Force Supply Chain Risk Management. Fort Belvoir: Defense Technical Information Center. Boggs, S. (2011). Information Assurance (IA) Emerging Technology Report: The Need for a Consolidated Cyber Security Technology Portal. Fort Belvoir: Defense Technical Information Center.
  • 4. Boggs, Page 4 Boggs, S. (2010). The Air Force’s Supply Chain Risk Management Center of Excellence Malware Tool Set Evaluation Event. Fort Belvoir: Defense Technical Information Center. References provided upon request