Summary
Overview
Work History
Education
Skills
Certification
Accomplishments
Timeline
Hi, I’m

Dr. Howard Cornelius Price

CISSP, CISM, CEH, SecX, AWS Cloud Security
Panama City Beach,Florida
Dr. Howard Cornelius Price

Summary

Senior Cybersecurity Practitioner with over 25 yrs. of Planning, implementing, upgrading, and monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. Cybersecurity professional with rich blend of technical and analytical skills, adept at preemptively identifying and neutralizing security threats. Known for fostering collaborative environments and driving results, ensuring team cohesion and adaptability to evolving cybersecurity challenges. Proficient in risk management, intrusion detection, and security protocol development.

Overview

25
years of professional experience

Work History

Innovative Professional Solutions

IT Cyber Security Specialist
08.2023 - Current

Job overview

  • Worked on naval cruise missiles and under-water mines weapon systems while closely monitoring any IAVMs/ICVMs
  • Created and mitigated Plan of Action and Milestones (POA&Ms) in a rapid fashion, in accordance with U.S
  • Navy instructions/directives
  • Review all POA&MS with the Program Office Manager as needed or at least on a quarterly basis and update the POA&Ms accordingly
  • Created security assessment plans for system needing an ATO, or just assess only package
  • Created cybersecurity strategies and program protection plans for the naval warfare center
  • Provide defense in depth principles and technology in security engineering designs and implementation, maintain and provided administration in eMass to analyze existing and future systems
  • Reviewed and mitigating security controls for compliance and developing engineering solutions that integrate information security requirements to proactively manage information protection while applying security risk assessment methodology to system development, including assessing and auditing network by penetration testing, antivirus deployment, and risk analysis
  • Vulnerability scanning and SCAP scanning with Nessus vulnerability tools to monitor system weakness to report and mitigate those vulnerabilities
  • Implementing, and manage a defense in depth for the total network and/or enclaves within the network to include such items as: scanning, remediation, host and network intrusion detection/prevention, firewalls, proxy servers, web cache, virus programs, vulnerability scanning, content filtering, remote dial in protection
  • Conducted Computer Incident Response Team (CIRT) activities
  • Host Based Security Services, Directory Services, and Certification and Accreditation, DoD Instruction 5200.40, accreditation guidance and advice IAW AR 25-2 and IA Best Business Practices (BBPs)
  • Plan, respond, investigate, and report undisclosed classified incident remediation

SIM&S Inc.

Cybersecurity Engineer
03.2023 - 06.2023

Job overview

  • Assess and mitigate system security threats/risks throughout the program life cycle
  • Validate system security requirements definition and analysis and review/approve System Security Plans for enterprise-wide architectures
  • Maintained Agency public key infrastructure system
  • Implement security designs in hardware, software, data, and procedures
  • Provide support for the Department of Defense (DoD) Public Key Infrastructure (PKI) service
  • Maintained customer compliance requirements revolving around NIST, ISO, and CNSSI
  • Responsible for requesting, receiving, installing, and accountability of system (server) PKI certificates and providing technical support for PKI
  • Conducted regular audits of IT infrastructure to ensure adherence to established cybersecurity policies and best practices.
  • Ensured compliance with relevant regulations such as GDPR and HIPAA by implementing comprehensive privacy safeguards.
  • Optimized firewall configurations to provide maximum protection without inhibiting productivity or performance.
  • Spearheaded cybersecurity audits, identifying gaps and recommending actionable improvements.
  • Crafted security policies and procedures that became backbone of organization's cybersecurity framework.
  • Collaborated with IT teams to integrate cybersecurity measures into development lifecycle of software and applications.

Hull IT Solutions

Cyber Security Engineer
01.2021 - 08.2022

Job overview

  • Worked as senior cybersecurity engineer led to collaborate with system owners and shareholders to conduct vulnerability assessments requirements and the needs of the customer
  • Once requirements of customer are understood I’ll will conduct a team meeting with cyber engineers to determine which methods and techniques we will employ to help with our tasking efforts
  • Ie Cyber Kill Chain and the MITRE ATT&CK Framework
  • Use Nessus scanning tools Nmap and Splunk SIEM tools to evaluate the vulnerability posture of the organization network, machines, and applications
  • After receiving scan results, we categorized vulnerabilities from high to low threats
  • Then we create a Plan of Actions and Milestones (POA&Ms) in a rapid fashion to express what path and timeframe we will take to remediate the vulnerability, in accordance with DoD instructions/directive
  • Reviewed all POA&MS with the Program Manager on a weekly basis and update the POA&Ms accordingly
  • Performed Pen testing on government system using scanning tools like NMAP for scanning the organization network
  • We also us SIEM tools to collect data from different pieces of network for status of the network, Desktops, Routers/Switches, and application code
  • Maintained CyberArk for unified security solutions
  • Created Excel spreadsheet for data analytics to create graphics, charts, and spreadsheets presentations for analysis and correlation of data in more understanding format
  • Use OSINT in the recon phase 1 to gather information from Username search engines, social media sites, business records, public records, dating sites, organization website and job postings, court documents and much more etc

B Technology

Senior Cyber Security Engineer/IA
01.2019 - 01.2021

Job overview

  • Conduct Computer Incident Response Team (CIRT) activities, including forensic analysis
  • Plan, implement, and manage a Defense in Depth for the total network and/or enclaves within the network to include such items as scanning, remediation, host and network intrusion detection/prevention
  • Pen tested on regular intervals we investigated and probed firewalls, proxy servers, web cache, virus programs, vulnerability scanning, content filtering, and remote dial-in protection, Host Based Security Services, Directory Services, IAM, and PAM along with application source code
  • Assess and mitigate system security threats/risks throughout the program life cycle
  • Validate system security requirements definition and analysis and review/approve System Security Plans for enterprise-wide architectures
  • Maintained agency public key infrastructure system
  • Implement security designs in hardware, software, data, and procedures
  • Provide support for the Department of Defense (DoD) Public Key Infrastructure (PKI) service
  • Maintained customer compliance requirements revolving around NIST, ISO, and CNSSI
  • Responsible for requesting, receiving, installing, and accountability of system (server) PKI certificates and providing technical support for PKI
  • Provide communications security (COMSEC) rekeying support within normal business hours or on-call, as required
  • Prepare and maintain secure communications devices and crypto keys
  • Provider Certification and Accreditation, as well as provide Automated Information System Accreditation support
  • Assist the Security Sr
  • Management with maintaining the Cyber Security Roadmap
  • Provide Security Risk Assessment
  • Perform risk analysis of resources, controls, vulnerabilities, and impact

Randstad Technologies

Systems Analyst
01.2016 - 01.2018

Job overview

  • Administered Microsoft Windows 10 and environment along with Lightweight Directory Service And Windows Server 2012 R2 domain services and later
  • Administered Microsoft 365 Suite, Azure, and Skype for business build and deployed VMware Virtualization VDI
  • Supported Tier 2/3 Support tickets through Remedy Ticketing System
  • Provide critical input from a security standpoint that achieved organizational goals per’ directive of senior management
  • Assist in Penetration Test using Nessus for Vulnerability Scanning to test for weaknesses in Systems security designs correcting weak systems controls and un-patched systems to correlate report for senior management using SEIM Security Monitoring
  • Assist with SDLC and Change management controls and facilitated hands-on training to other analysts, as well as on basic malware and forensic analysis of network activity, disks, and memory usage
  • Took charge of verifying threat and vulnerability alerts, identifying current impacts, and implementing remediation actions as necessary
  • Install and configure wireless 802.11 security settings

AT&T
Austin, TX

Network Engineer | Help Desk Support
01.2011 - 01.2012

Job overview

  • Established networking environment by designing system configuration, directing system installation, and documentation
  • Maximized 802.11 a/b/g networks, administered computer networks and related computing environments: systems software, applications software, hardware, and configurations
  • Coordinated, planned, and implemented network security measures to protect data, software, and hardware
  • Maintained, configured, and monitored virus protection software and email applications; performed disaster recovery operations and data backups when required
  • Discovered, diagnosed, and resolved hardware, software, and other network and system problems; replaced faulty components when required
  • Monitored network performance, made required adjustments, and conferred with network users about solving existing system problems through the ticketing system

United States Army
Fort Hood

Chemical Operations Specialist
01.2000 - 01.2010

Job overview

  • Supervised over 110,000 employees in the establishment of chemical operation defense measures
  • Trained military and civilian personnel on chemical emergency response and directed the use of specialized equipment for chemical operations
  • Operated and maintained chemical detection and decontamination equipment and served on Biological Integrated Detection Teams
  • Performed troubleshooting tasks on chemical processes, resolving issues quickly to maintain productivity levels.
  • Authored and submitted monthly reports.
  • Reduced production costs with effective resource management and streamlined processes.
  • Implemented waste reduction strategies, contributing to environmental sustainability efforts within the company.
  • Presented technical findings to stakeholders, effectively communicating complex information in a clear and concise manner.
  • Coordinated with suppliers to negotiate contracts, securing high-quality materials at competitive prices.
  • Trained new employees on chemical operations, increasing overall team productivity and performance.
  • Managed inventory levels, maintaining an optimal balance between production needs and cost control.
  • Improved product quality by conducting thorough testing and analysis of samples.
  • Restocked inventory and coordinated supply needs.

Education

California Institute of Arts And Technology
San Diego, CA

Bachelor of Science from Cybersecurity
03.2025

California Institute of Arts And Technology
San Diego, CA

Associate of Applied Science from Computer Information Systems
06.2023

Skills

  • Penetration testing
  • Network security
  • Firewall management
  • Endpoint protection
  • Security auditing
  • Operating system security
  • Identity management
  • Public key infrastructure
  • Compliance management
  • Patch management
  • Wireless security
  • Vulnerability assessment
  • Security policy development
  • Security architecture
  • Secure network design
  • Data loss prevention

Certification

ISC2 |Certified Information System Security Professional (CISSP)
ISACA |Certified Information Security Manager (CISM)
CompTIA |Certified Advanced Security Practitioner (CASP+)
CISCO| Certified Ethical Hacker (CEH)
AWS Cloud Security
CompTIA | Network+ CE | Security+ CE
Certified Computer Forensics Examiner (CCFE)
Microsoft Office 365 Admin

Accomplishments

Information Security Hall of fame Inductee (INFOSEC Hall of Fame}

Timeline

IT Cyber Security Specialist

Innovative Professional Solutions
08.2023 - Current

Cybersecurity Engineer

SIM&S Inc.
03.2023 - 06.2023

Cyber Security Engineer

Hull IT Solutions
01.2021 - 08.2022

Senior Cyber Security Engineer/IA

B Technology
01.2019 - 01.2021

Systems Analyst

Randstad Technologies
01.2016 - 01.2018

Network Engineer | Help Desk Support

AT&T
01.2011 - 01.2012

Chemical Operations Specialist

United States Army
01.2000 - 01.2010

California Institute of Arts And Technology

Bachelor of Science from Cybersecurity

California Institute of Arts And Technology

Associate of Applied Science from Computer Information Systems
Dr. Howard Cornelius PriceCISSP, CISM, CEH, SecX, AWS Cloud Security