Summary
Overview
Work History
Education
Skills
Timeline
Generic

Charles Washington

Fredericksburg,US

Summary

Effective Chief Technology Officer offering excellent skills in business continuity planning and analytics. Over 15 years of executive leadership of information technology support operations within the Federal Government. Executive team member dedicated to providing advanced system support, infrastructure and tools to corporate structure. Forward-thinking professional offering more than 25 years of experience working in fast-paced technology environments. History driving technology improvements while managing costs to meet budget limitations. Highly adaptable Chief Technology Officer simultaneously excelled at system-level architectural design and program-specific implementation. Information System Technology program development and accelerated schedule rollout while adhering to budget parameters. Maintained intimate familiarity with global technological trends. Strategic Chief Information Officer with 8 years of experience. Adept at large data analytics and data security. Committed to leading a team of efficient IT workers and keeping up to date on modern technologies. Chief Technology Officer with a well-established knowledge of implementing effective disaster recovery planning. Remains calm and focused even under pressure. Looking to bring further success to a progressive organization through a well-developed skill set and a proactive demeanor. Results-driven IT professional with notable success in planning, analysis and implementation of security initiatives. Strengths in providing comprehensive network design and security frameworks. Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.

Overview

19
19
years of professional experience

Work History

Chief Information Security Officer

U.S Access Board
Washington, D.C
08.2007 - Current
  • Serves as Chief Information Officer for U.S Access Board
  • Acts as primary advisor to the Director and senior U.S Access Board staff on all matters related to information technology oversight and is responsible for leading the analysis of technology requirements and managing the life cycle of technology at U.S Access Board
  • Manages the day-to-day operations of the Office of Technology and Information Management (OTIM) staff and contractors through subordinate managers
  • Oversees technology planning, management, and investments consistent with Federal Acquisition Regulations, OMB Circular A-11, the E-Government Act, OPM and OMB regulation/circulars and/or the Clinger-Cohen Act
  • Functional Roles and Responsibilities Directs and oversees the design, development, and maintenance of FHFA's computer systems
  • Provides leadership and direction to staff to ensure the planning, direction, and coordination of major information technology projects
  • Manages systems to support modeling efforts and provides information management support for economic, financial, and policy research and analysis involving GSE data
  • Directs proactive customer service and support, ensuring that critical issues and trends are identified, tracked, and resolved
  • Establishes key performance indicators for the unit's primary services that anticipate potential customer impact based on acceptable control limits
  • Directs the development of reporting on the status of key services and customer issues
  • Establishes appropriate service level agreements with customers for core services
  • Ensures the efficient and effective operation of U.S Access Board's production computing environment
  • Directs the development and operation of information technology and applications that support the U.S Access Board's regulatory responsibilities
  • Directs the annual review of all information systems to evaluate the efficiency and effectiveness of operations, ensuring the review of all hardware and software, the adequacy of system documentation, the design and architecture of the systems and databases
  • Serves as expert in the planning aspect of technology acquisitions, which includes advising and making recommendations to the Director and other policymakers for the selection, replacement and upgrading of hardware and software
  • Recommends and develops new or revised technologies, methods and procedures to resolve complex U.S Access Board business problems
  • Develops appropriate internal controls to ensure the security of data
  • Analyzes and monitors new technology to determine appropriateness for U.S Access Board
  • Directs the creation and maintenance of a future-focused enterprise technology architecture that clearly links business needs to technology solutions and enables the review of how new technologies might improve FHFA mission efficiency and effectiveness
  • Leads the development of multi-year technology investment strategies, consistent with federal capital planning investment and control (CPIC) models to ensure technology investments are well planned
  • Collaborates with executives throughout the agency to ensure emerging business requirements are well understood, resource needs are anticipated in advance, and resources are available to execute on time
  • Directs the development and maintenance of IT disaster recovery plans for continuity of critical applications in the event of a disaster or emergency
  • Oversees the development of responses to information technology-related inquiries from external entities, including the OIG, Congress, OMB, GSA, GAO, and the GSEs
  • Directs the design, development, and maintenance of all technology related training within the U.S Access Board
  • Represents U.S Access at technology-related meetings and conferences
  • Performs other responsibilities and assignments of a critical, urgent, and confidential nature as assigned by the Chief Operating Officer
  • Serves as the Chief Technology Officer (CTO) at the U.S Access Board reporting directly to the Chief Information Officer (CIO)
  • Oversees identification and evaluation of new and emerging cyber security and grants management technologies
  • Advises on business expertise to align technology-related decisions with the organization's goals
  • Supports U.S Access Board’s by making sound strategic decisions on cyber security and grants management solutions/investments
  • Serves as U.S Access Board’ s expert on oversight of national programs with precedent-setting issues
  • Serves as the principal advisor to the CIO on technical concepts and emerging technologies in support of business operations.
  • Managed security operations center activities including threat monitoring, analysis, investigation, and response.
  • Implemented multi-factor authentication solutions across multiple platforms and applications.
  • Assisted in developing strategies for responding to cyber threats such as malware attacks, phishing attempts, or distributed denial-of-service attacks.
  • Led investigations into potential breaches of confidential data or intellectual property theft.

IT Project Manager

L3 Communications
Washington, D.C
02.2005 - 07.2007
  • Streamlined project delivery by implementing Agile methodologies and improving collaboration among team members
  • Managed cross-functional teams to ensure efficient allocation of resources and successful project completion
  • Coordinated with stakeholders to gather requirements and provide updates on progress throughout projects lifecycles
  • Implemented risk mitigation strategies to minimize potential issues impacting project deadlines or budgets
  • Facilitated communication among team members to solve complex technical challenges efficiently and effectively
  • Managed budgets for multiple projects concurrently, tracking expenses and reallocating resources as needed to stay within budget constraints
  • Championed change management initiatives by incorporating feedback from end-users into future project plans and improvements
  • Ensured smooth adoption of new technology systems through comprehensive employee training programs tailored to individual learning styles
  • Negotiated contracts with vendors that led to cost savings while maintaining a high level of service quality
  • Led and assisted technical upgrade projects for clients by working and coordinating with consultants and developers for integrations.
  • Managed large-scale IT projects from conception to completion, ensuring all deadlines were met.
  • Developed project plans that included timelines and deliverables, identified resources needed, and estimated costs for each project.
  • Coordinated with stakeholders, customers, vendors, and team members to ensure successful implementation of projects.
  • Identified opportunities for automation within existing processes in order to improve efficiency.
  • Oversaw budgets for project, tracked expenses and timelines and communicated with key stakeholders on milestones.
  • Created status reports detailing progress against timeline milestones and budget constraints.

Education

Cybersecurity Training, Managing Human Risk, Mature Security Awareness Programs Leading Cybersecurity Change, Building A Security-Based Culture, Law of Data Security And Investigations, SANS Training Program For CISSP Security Leadership, Essentials For Managers Security Strategic Planning, Policy, And Leadership, IT Project Management And Effective Communication, Critical Security Controls: Planning, Implementing, And Auditing, Cybersecurity - Cybersecurity

The SANS Technology Institute
Bethesda, MD
01.2023

(ISC)² Official CAP Boot Camp, (ISC)² Official CCSP Boot Camp, Official ISACA CGEIT Boot Camp, (ISC)² Official CISSP Boot Camp -

Training Camp
Fairfax, VA
02.2020

Information Technology - Information Technology

Strayer University
Fredericksburg, VA

Skills

  • Strategic Planning
  • Managing Multiple Projects
  • Scrum Methodology
  • Leading Projects
  • Information Technology Management
  • NIST Security Standards and Risk Management Framework
  • Cyber Security Strategy
  • Roadmap Planning and Prioritization
  • Leadership and collaborative partnership
  • Cloud Technologies
  • Analytics and problem resolution
  • Oral and written communications
  • Compliance and regulations
  • Project management
  • Cybersecurity analysis
  • Vulnerability Assessment
  • Risk management expertise
  • Patch management
  • Network Security
  • Compliance Management
  • Firewall configuration
  • Problem-solving aptitude
  • Continuous Improvement
  • Security Needs Assessment
  • Risk Assessment
  • Analytical Thinking
  • Effective Communication

Timeline

Chief Information Security Officer

U.S Access Board
08.2007 - Current

IT Project Manager

L3 Communications
02.2005 - 07.2007

Cybersecurity Training, Managing Human Risk, Mature Security Awareness Programs Leading Cybersecurity Change, Building A Security-Based Culture, Law of Data Security And Investigations, SANS Training Program For CISSP Security Leadership, Essentials For Managers Security Strategic Planning, Policy, And Leadership, IT Project Management And Effective Communication, Critical Security Controls: Planning, Implementing, And Auditing, Cybersecurity - Cybersecurity

The SANS Technology Institute

(ISC)² Official CAP Boot Camp, (ISC)² Official CCSP Boot Camp, Official ISACA CGEIT Boot Camp, (ISC)² Official CISSP Boot Camp -

Training Camp

Information Technology - Information Technology

Strayer University
Charles Washington