Serve as the Federal cybersecurity risk advisor for CISA in the State of Arkansas and support preparation, response, and remediation efforts relating to cybersecurity risks and incidents
Develop and promote strategic public and private sector relationships with critical infrastructure owners and operators as well as State, Local, Tribal, and Territorial (SLTT) governments to reduce risk and threats to infrastructure, enterprise, communications, and control systems
Assess stakeholder cybersecurity posture, identify vulnerabilities, provide expert guidance on risk mitigation strategies, and assist in implementing security improvements to bolster national resilience against cyber threats
Act as a trusted security consultant for critical infrastructure entities, helping them build robust cybersecurity defenses
Build regional and local cybersecurity coalitions to foster information sharing and lessons learned promoting resilience of cyber infrastructure
Present at conferences, seminars, and on cybersecurity panels relating to cybersecurity best practices and risk management
Present workshops on topics such as Cyber Incident Management, Vulnerability Management, and Cyber Resiliency
Conduct advanced cybersecurity risk assessments for stakeholders across multiple critical infrastructure sectors based on industry best practices (NIST Cybersecurity Framework (CSF), CERT Resilience Management Model (CERT-RMM))
Plan, design, and facilitate Cybersecurity Tabletop Exercises (TTX) based on stakeholder scenario requirements to identify gaps in Incident Response (IR) Plans and expedite recovery of critical services from cybersecurity incidents, including ransomware
Assist in the development of Cyber Incident Response (IR) Plans
Assist in development of cybersecurity policies to safeguard stakeholders’ sensitive data and critical systems
Provide cybersecurity training for public and private sector stakeholders tailored to their needs
Advise senior management on cybersecurity trends and critical service dependencies
Tactical Specialist (GS-12)
Federal Bureau of Investigation
10.2010 - 10.2022
Developed and implemented a Dark Web investigations program
Interviewed cybercrime victims and subjects to gather information pertinent to investigations
Developed Incident Response guidelines to ensure relevant data was requested from victims (i.e., volatile data, system images, logs, NetFlow data, configuration files, email header data, and potential malicious files) to determine affected systems and additional victims
Analyzed data from a variety of sources associated with victim intrusions (i.e., various logs, email headers, domain registrations) to identify anomalous activity and perform event correlation and incident analysis
Developed tactical products and communicated the results to squad members, supervisors, and executive management to further on-going cyber investigations in both national security and criminal cases such as making recommendations for subpoenas and search warrants
Provided numerous cybersecurity presentations to the FBI and public/private sector organizations advising executive management and operational personnel on industry best practices
Created a Cyber Working Group that included public/private sector organizations in Northeast Arkansas due to a lack of visibility in this area to advise and share cybersecurity best practices
Advised executive management and supervisors on complex cybersecurity issues such as how to identify cyber threat actors to make informed decisions on cyber incidents likely to identify attackers for prosecution
Biometrics Enable Intelligence (BEI) Analyst
Six3Systems
11.2009 - 10.2010
Provided subject matter expertise on biometric capabilities
Developed and briefed presentations to supported units, planners, and current operations
Advised senior leadership and operational personnel on complex issues such methods of biometric data collection and analysis to identify threat actors and their likely locations
Performed additional duties as the Information Security Management Officer to include configuring, installing, troubleshooting, and maintaining taskforce IT systems
Client Delivery Analyst
Acxiom Corporation
07.2006 - 10.2009
Updated, maintained, and monitored client data warehouse in Oracle databases using SQL commands and Perl and Python scripts
Developed and executed processes to deliver information products to clients
Developed procedures to standardize job requirements to ensure processes executed correctly
Conducted system testing on client business rules and system specifications
Researched and resolved data anomalies in data using SQL queries and log files and communicated effects on processes to management
All-Source Intelligence Analyst
Arkansas Army National Guard
03.2001 - 10.2009
Attended basic training and the U.S
Army Military Intelligence School
All-Source Intelligence Analyst
US Army
03.2008 - 12.2008
Assigned to 1st Squadron 151st Cavalry Regiment, 39th Brigade Combat Team, 82nd Airborne Division as the Non-Commissioned Officer in Charge of the S-2 (Intelligence) section
Supervised all-source intelligence production supporting squadron and subordinate commanders
Analyzed attack pattern data determining best convoy travel times to protect US army personnel
Prepared and conducted daily convoy security briefings and intelligence products to squadron personnel, commanders, and higher echelon commanders such as 2-star generals
Mentored junior intelligence analysts in career development
Tax Associate
Stephens, Inc
08.2005 - 07.2006
Generated federal and state tax reports for payrolls based on IRS and state standards
Prepared monthly and quarterly tax withholdings
Reconciled general ledger for tax accounts
Credit Coordinator
Stephens, Inc
08.2003 - 08.2005
Prioritized collection activity of accounts
Coordinated with branch personnel to resolve delinquent accounts
All-Source Intelligence Analyst
US Army
04.2004 - 03.2005
Assigned to HHC, 39th Brigade Combat Team, 1st Cavalry Division
Performed duties within HUMINT (Human Intelligence)
Provided liaison between interrogators, counterintelligence, and brigade intelligence section
Provided targeting and collection plan recommendations
Produced intelligence briefings
Education
MS - Cybersecurity
DePaul University
03.2022
MS - Management Information Systems
University of Arkansas at Little Rock
08.2009
BBA - Finance, Economics
University of Arkansas At Little Rock
05.2003
Certification
(ISC)2, CISSP, 594850
ISACA, CISM, 242432391, CRISC, In progress
SANS Courses/Global Information Assurance Certifications (GIAC), SEC 460, Enterprise and Cloud Threat and Vulnerability Assessment, No Certification, MGT 516, Managing Security Vulnerabilities: Enterprise and Cloud, No Certification, GIAC Security Leadership Essentials for Managers, GSLC, GIAC Industrial Cyber Security Professional, GICSP, SEC 487, Open-Source Intelligence (OSINT) Gathering and Analysis, No Certification, GIAC Certified Forensic Examiner, GCFE, GIAC Penetration Tester, GPEN, GIAC Certified Incident Handler, GCIH, GIAC Certified Enterprise Defender, GCED, GIAC Security Essentials, GSEC
Security Clearance
Top Secret, Sensitive Compartmented Information (TS-SCI)
Lead Strategic Communications Specialist (Contract at Department of Homeland Security - Cybersecurity Infrastructure Security Agency (CISA)Lead Strategic Communications Specialist (Contract at Department of Homeland Security - Cybersecurity Infrastructure Security Agency (CISA)
IT Cybersecurity Specialist & Program Manager at Department of Homeland Security (DHS) | Cybersecurity and Infrastructure Security Agency (CISA) | Cybersecurity Division (CSD)IT Cybersecurity Specialist & Program Manager at Department of Homeland Security (DHS) | Cybersecurity and Infrastructure Security Agency (CISA) | Cybersecurity Division (CSD)
Branch Chief, Emergency Communications Division at Cybersecurity and Infrastructure Security Agency (CISA), U.S. Department of Homeland SecurityBranch Chief, Emergency Communications Division at Cybersecurity and Infrastructure Security Agency (CISA), U.S. Department of Homeland Security