Summary
Overview
Work History
Education
Skills
Websites
Notable Projects
Timeline
Generic

Joseph Passkiewicz

Detroit,MI

Summary

Rational Technology Manager with 6 years of experience enhancing operations for organizations through information systems solutions. Proven track record of transforming specific business goals related to growth and efficiency improvements into new system designs. Knowledgeable innovator known for recommending new technologies to enhance existing systems and introduce new systems.

Overview

5
5
years of professional experience

Work History

Security Technology Management

Rock Security
11.2022 - Current
  • Designed technology enablement plans for third-party clients, collaborating with development and design team to integrate available intelligence.
  • Collaborated with staff from other departments to evaluate technology needs and provide appropriate support for tenants in buildings supported by Rock Security and Bedrock.
  • Understood key product management roadmap objectives and requirements to develop product technology strategy. In this, I conducted and lead pipeline meetings and technology huddle meetings.
  • Installed and configured network security solutions such as VPNs, Firewalls and intrusion detections and mitigation tools.
  • Oversaw distribution of patches and new software releases to support network security and integrity.
  • Conducted regular system tests and continuously monitored network security. Utilized tools like Splunk, Boring Toolbox, Wireshark, Cyclance Security, Canopy Alerting, Monitor Cloud, Mesh Controller, Power BI and few more minor softwares.
  • Integrated new devices into managed networks while maintaining assigned security protocols and protections. Tested and documented new server options and camera options such as BDI Video, Hanwha recorder, Ironlink and some cameras such as Hanwha, AXIS, Pelco, Verkada, Sony, Bosch, and more.
  • Verified Cisco network security program functionality and made adjustments to address emerging threats.
  • Managed and administered load balancing tasks for Razberi, Meraki Switches, AWS, Rekor networks, routing and shaping traffic to reduce service interruptions and network strain.
  • Completed daily tasks such as security admin tasks, managing roles for new users, updating network settings, completing tickets in our ticket database Cherwell, completed company wide requests in ServiceNow.

Software Development Team Manager

NiX Development
04.2020 - 11.2022
  • As a software development team manager, my role revolves around orchestrating and optimizing the efforts of our talented engineers
  • In this role it was required of me to have a wealth of the technical knowledge that engineers used in order to optimize support
  • Drawing on my expertise in coding languages such as Python, Java, and JavaScript, I provide guidance and direction to ensure the successful delivery of projects
  • On a day-to-day basis, I oversee the organization of data within the team, utilizing collaborative tools like Jira or Trello to track project progress, assign tasks, and manage timelines
  • Additionally, I foster an environment of continuous learning and growth, facilitating knowledge sharing sessions and providing resources to support the team's development
  • During my time I was responsible for 11 engineers and their team leader.

Team Leader for Communications

US Army National Guard
07.2019 - 08.2024
  • My role is critical in ensuring seamless communication within our battalion, particularly in dynamic and challenging environments
  • Utilizing advanced radar and radio communication technologies, I oversee the establishment and maintenance of secure and reliable communication channels
  • This involves configuring and operating radar systems to monitor airspace and detect potential threats, as well as managing radio frequencies to facilitate real-time communication between units
  • During my deployment in Jordan, my team played a pivotal role in enhancing the operational efficiency of our infantry patrols and supply line convoys
  • Leveraging our expertise in data analysis and interpretation, we supplied the battalion with key information and insights about the region
  • This included intelligence on terrain conditions, potential threats, and logistical challenges, allowing our forces to make informed decisions and adapt their strategies accordingly
  • By providing timely and accurate information, we optimized the deployment of resources and improved the overall effectiveness of our mission in the region.

Education

BS in Cybersecurity -

Michigan State University
East Lansing, MI

Security+ SYO 601 - undefined

CompTIA

undefined

DOD Cyber Awareness lvl 1 and 2
Detroit, MI

undefined

Army Infantry School
Fort Benning, Georgia

undefined

Army Re-Class for Military Intelligence
Fort Huachuca, Arizona

Skills

  • Encryption
  • Firewall
  • Intrusion Detection System (IDS)
  • Malware
  • Phishing
  • Ransomware
  • Vulnerability
  • Patch
  • Authentication
  • Authorization
  • Cyberattack
  • Data Breach
  • Cybersecurity Framework
  • Penetration Testing
  • Incident Response
  • Threat Intelligence
  • Zero-Day Exploit
  • Multi-factor Authentication (MFA)
  • Social Engineering
  • Endpoint Security
  • Azure DevOps
  • Cherwell
  • ServiceNow
  • PowerBI
  • Milestone
  • IMMIX
  • Windows
  • Mac
  • Linux
  • Kali
  • Ubuntu
  • RDP
  • SSH
  • Rekor
  • Autopsy
  • Office or 365
  • Splunk
  • Jira
  • Meraki
  • Razberi
  • Axis Device Manager
  • Red Canary Analytics
  • Process St
  • Knowledge is Power
  • Powershell
  • CMD
  • PagerDuty
  • Wireshark
  • Nmap
  • Scrum Framework
  • Business Intelligence
  • API Development
  • Software Development
  • Network Administration
  • Information Security
  • Network Security
  • Network Management
  • Customer Support
  • Canopy
  • AXIS
  • Hanwha
  • Bosch
  • Pelco
  • Verakda
  • Canva
  • User Acceptance Testing
  • Debugging
  • Functional Testing
  • Automation scripting
  • Integration Testing

Notable Projects

Overhaul of 30,000 Cameras, Conducted an overhaul for over 30,000 cameras across the country that involved recreating the network settings for the camera. Some of the things changed were upgrading TLS to 1.3, switching off HTTP and only utilize HTTPS, configure user rights to these cameras by setting new authorization rules for who can use and who cannot use, disabling DHCP to create our own IP naming environment, using an updated SSL template for how our cameras communicate with the recording servers on the open internet, tracked the rollout of firmware, recycled legacy devices and upgrade hardware. 


Onboarding and Imaging of New Servers, Onboarded new servers and imaged the OS on each one. This was for the Hudson Site in Detroit and involved 8 new servers. Updated the BIOS settings, Network IP address, U1 and U2 settings, configuring Cylance security settings instead of using Windows Firewall, Configured RAID 10 settings, updated NTP settings to our preferred NTP server, configured the recording server settings to create compatibility for the cameras. Metasploit, Nessus, MeshCentral, Cylance.


Ran a huge sweep of our internal code and run data c&cs to find coding deficiencies and successes within our team. This helped us weed out whether we were having issues with certain coding languages (IE Java would work better for our web application as opposed to Python) or if there was a software tool we were programming that would not respond to certain inputs. 


Conducted a research project for NiX and its relationship with drone software and mapping technology. Researched the possibilities of integration between the two technologies, the cost, the pros, the cons, the overall usage, and the efficiency of the technology. 


Managed an overhaul of vulnerabilities found within the company's source code and appointed team members to various areas of remediation. This vulnerability left open XML vulnerabilities, Code Injection, Remote Code and botnet possibilities. I was responsible for pointing our team members in the right direction of priority during the pipeline of the remediation. This took over 3 months to finalize and during which we found there could be a list of even more vulnerabilities that could have happened. 


During our deployment in Jordan, I headed the analysis of satellite imagery, alongside my squad, to identify potential ambush points along our supply routes, allowing us to reroute convoys and avoid hostile areas. Additionally, I coordinated with local informants to gather intelligence on enemy movements and intentions, providing our patrols with actionable insights to mitigate risks and enhance their safety during operations. Through these efforts, we were able to maintain secure supply lines and keep our soldiers on patrol protected from potential threats in the region. We used radio equipment and taught classes on the encryption standards of the equipment we use and taught local units how our radar technology worked when we supplied intel and data to it.

Timeline

Security Technology Management

Rock Security
11.2022 - Current

Software Development Team Manager

NiX Development
04.2020 - 11.2022

Team Leader for Communications

US Army National Guard
07.2019 - 08.2024

BS in Cybersecurity -

Michigan State University

Security+ SYO 601 - undefined

CompTIA

undefined

DOD Cyber Awareness lvl 1 and 2

undefined

Army Infantry School

undefined

Army Re-Class for Military Intelligence
Joseph Passkiewicz