Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Marque T. Jones Sr.

Severn,MD

Summary

Driven and collaborative, bringing deep understanding of market research and product lifecycle management paired with technical proficiency in data analysis and agile methodologies. Adept at identifying market needs and translating them into actionable product strategies to ensure successful launches. Focused on delivering innovative solutions that drive customer satisfaction and business growth.

Overview

23
23
years of professional experience
3
3
Certification

Work History

PRODUCT MANAGER-TECH LEAD FOR DATA SCIENCE (GS-15)

CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA)-DHS
07.2023 - Current
  • Providing product management and technical guidance for Data Science efforts to support Cybersecurity, Threat Detection, Threat-Hunt, Cyber-Discovery and Cyber-Defense missions in an agile environment
  • Steering Data Science projects across the agency, simultaneously managing multiple priorities, setting achievable timelines to deliver projects in a timely manner
  • Utilizing experience in advanced analytics development and technologies, including ML, AI and predictive modelling, and cloud-based tools and technology (AWS, Azure and Google), to support the identification of trends, data correlation and gathering information from unstructured data sources, to provide recommendations to automate data-driven analytic solutions for cyber related missions
  • Managing needs to define/redefine and utilize applicable processes to maximize efforts data science that impact mission
  • Advancing the Data Science discipline at CISA, driving data best practices (research, analysis, and goals), to improve analytical processes, scaling knowledge and tools, and mentoring data scientists
  • Driving product success by collaborating with cross-functional teams and managing product lifecycle to ensure accurate and timely deliverables.
  • Developing hypotheses and employing a diverse toolkit of rigorous analytical approaches and diverse methodologies, frameworks, and technical approaches to advance data science.
  • Conducting research to identify customer needs and trends that enhance data science product offerings for cybersecurity.

SYSTEM ADMIN III

OMNYON
08.2022 - Current
  • Built, maintained, monitored, and upgraded production systems using Linux and Windows OS software and hardware architecture.
  • Installing RedHat Linux manually or using kickstart and applying security policies to harden the server based on the company policies.
  • Creating Linux Virtual Machines using VMware Center Creating and managing users and group using Active Directory. Maintains SSPs to ensure STE compliant requirements.
  • Providing solution engineering such as systems administration, systems and network engineering, software and hardware architecture support. Providing system security support, and innovate support.
  • Using various Linux operating systems to manage virtual machines in and out of defined cloud spaces. Installed and configured various new hardware and software technology.
  • Working closely with configuration management tools within secure infrastructure. Configuring network settings client/server. Troubleshooting customer issues in a timely manner.
  • Managing security groups via Active Directory and managing Active directory and workflow via local ticketing system. Monitoring real time status displays.
  • Troubleshooting and resolving outages that affected workflow for various end users
  • Building, maintaining, monitoring and upgrading production systems using Linux and Windows OS software and hardware architecture.
  • Installing RedHat Linux manually or using kickstart and applying security policies to harden the server based on the company policies.
  • Creating Linux Virtual Machines using VMware Center Creating and managing users and group using Active Directory. Maintains SSPs to ensure STE compliant requirements.
  • Providing solution engineering such as systems administration, systems and network engineering, software and hardware architecture support.
  • Providing system security support, and innovate support. Using various Linux operating systems to manage virtual machines in and out of defined cloud spaces.
  • Installing and configuring new hardware and software technology. Working closely with configuration management tools within secure infrastructure. Troubleshoot customer issues in a timely manner.
  • Configuring network settings client/server. Managing security groups via Active Directory and managing Active directory.
  • Managing workflow via local ticketing system. Monitoring real time status displays. Troubleshooting and resolving outages that affected workflow for various end users

CYBERSECURITY OPS LEAD (CND, CNO & CNE) (GS-14)

DEPARTMENT OF DEFENSE-NSA
07.2023 - 07.2023


  • Supported critical cybersecurity operations for the NSA, USCC and IC partners in defending against threats.
  • Led the Ops team in analyzing critical information collected from various sources (i.e. intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities and respond to cyber events.
  • Led in developing mitigation strategies to strengthen network defenses and protect against cyber-attack.
  • Served as the primary POC for multiple clients regarding security concerns, ensuring that their requirements are understood and addressed effectively within the NSOC structure.
  • Identified opportunities for process automation, leading to increased efficiency and reduced manual workload for staff members.
  • Managed daily operations, ensuring smooth workflow and optimal resource allocation across departments.
  • Enhanced employee performance with focused training programs, coaching, and mentoring initiatives.
  • Balanced competing priorities in a dynamic environment, ensuring timely completion of tasks while maintaining high standards for quality and safety.
  • Guided the Ops team in conducting preventative cyber-discovery efforts to detect and prevent early exploitation of adversary activity and computer networks.
  • Provided leadership and oversight for 24/7 CND operations and treat intelligence team.
  • Managed day-to-day cybersecurity operations and assists in implementing new cybersecurity technologies and practices used by the Cybersecurity Operational teams using industry best practices and manages cyber risk to protect the DODIN.
  • Led collaborative efforts with other organizational entitles to enable end-to-end approach for optimal cyber solutions

TECHNICAL LEAD-PROJECT MANAGER FOR CYBERDISCOVERY

DEPARTMENT OF DEFENSE-NSA
09.2016 - 07.2022
  • As Technical Lead for Cyber-Discovery steered the development of innovative analytics, tradecraft and data enrichment to support end-to-end cyber missions for the Intelligence Community (IC).
  • Spearheaded the development of the Streaming Analytic Framework (SAF) and Data as a Service (DaaS) cloud services for the DoD Intelligence Community (IC); these services provided CND and CNO support to external IC partners for their respective mission.
  • Collaborated with stakeholders across the IC to identify gaps in cybersecurity missions, to aid in producing analytic trade-crafts to address mission needs. Cultivated analytic and data requirements from a “prove it” state to operational.
  • Led a data science team to produce innovative techniques and capabilities for cyber analytics and data enrichment and data discovery.
  • As Project Manager for Cyber Situational Awareness Tradecraft, Technology and Analytics (CSA T2A), oversaw a team of developers supporting various cyber projects for the NSA and its IC customers.
  • Utilized expertise in analytics to drive innovative analytic development to support cyber-discovery, cyber-defense, and cyber operations missions.
  • Engaged with DoD partners to bridge technical expertise and capabilities to resolve gaps in cyber-discovery, cyber-defense and cyber-operation mission spaces.
  • Planned and scheduled activities to track tasks, cost, and performance objectives, to ensure systematic and coherent schedule management practices are enforced to complete projects.
  • Developed IMS to trace the Work Breakdown Structure (WBS) and corresponding project Statement of Work (SOW) related to the contract.
  • Utilized leadership skills and management techniques to administrate, plan, organize, direct, control, and evaluate various activities for projects supporting cyber mission and operations.
  • Managed and motivated employees to be productive and engaged in work.

TECHNICAL CONTRACTOR OFFICER REPRESENTATIVE (GS-14

DEPARTMENT OF DEFENSE-NSA
08.2014 - 07.2022
  • Provided technical and supervisory leadership to government contractors supporting various government Technical Task Orders (TTO), in accordance with the contract Statement of Work (SOW).
  • Utilized technical and management expertise to provide sound direction and translating high-level government requirements into functional technical requirements for tasking.
  • Managed budgeting, performance evaluations and collaborated with stakeholders in preparing the SOW and other terms and conditions of a solicitation.
  • Used IMS (MS Project) to track all programs, projects and tasks related to each TTO.
  • Assigned tasks and other responsibilities, to ensure the contractor team are performing duties related to the contract mission(s) and SOW.

LEAD CYBERSECURITY INCIDENT AND RESONSE TEAM

Jacobs Engineering Group, Inc.
09.2014 - 05.2017
  • Responded to computer security incidents in compliance with NSA IR policies and procedures.
  • Used extensive knowledge and analysis experience to provide security related recommendations as threat events unfold.
  • Performed host and network security analysis in support of Intrusion detection operations including the development and enrichment of indicators used to enhance the network security posture.
  • Contributed to a team of information security professionals analyzing threat data, writing reports, briefing event details to leadership, and coordinating remediation’s against DoD systems.
  • Monitored NSA networks to find/identify anomalous or malicious activity using various analytical methods and Security Event and Incident Monitoring (SEIM) tools in a high paced operational environment.
  • Analyzed the potential impact of new threats and exploits and communicated risks to management.

CYBER DEFENSE (CD) MISSION LEAD FOR CLOUD ANALYTIC

DEPARTMENT OF DEFENSE-NSA
12.2012 - 09.2016
  • Oversaw all cloud analytic development efforts related to the NSA Information Assurance (IA) and Intel/SIGINT mission spaces.
  • Led various programs in developing innovative analytics to parse, analyze and produce accurate results against collected cyber data sets, in support of IA and SIGINT missions.
  • Oversaw development and resolution of cloud-based analytics essential to performing the critical analysis to support mission.
  • Collaborated with developers and analytic end-users to create fully functional and operational requirements for analytic development.
  • Teamed with internal and external organizations supports mission requirements for analytics.
  • Spearheaded other analytic efforts for generating tradecraft and use-cases to develop innovate cloud-based analytic tools.
  • Developed and wrote requirements, procedures, and processes for analytic development

LEAD COMPUTER NETWORK DEFENSE (CND) ANALIST (GS-13

DEPARTMENT OF DEFENSE-NSA
02.2011 - 12.2013
  • Evaluated emerging threats, ensuring the timely implementation of appropriate countermeasures.
  • Conducted thorough risk assessments, prioritizing remediation efforts based on potential impact to business operations.
  • Implemented multi-factor authentication protocols, significantly reducing unauthorized access attempts across the organization''s networks.
  • Executed and managed information systems' incident response and administrative inquiries and investigations in collaboration with investigations department.
  • Performed network and host/end-point analysis for vulnerability detection against raw unfiltered network and host/end-point metadata. Analyzed network and host metadata to detect and determine the impact of malicious activity against DoD networked systems.
  • Performed short and long-term analysis against large complex data sets for trending to identify tactics, techniques, and procedures (TTP’s), advanced persistent threats (APT’s), identify anomalous attack vectors and data enrichment purposes.
  • Provided timely detection and alerting of attacks, abnormal activity and distinguishing such events from normal or benign activity.
  • Utilized cyber defense tools for continual monitoring and analysis to identify malicious activity.
  • Performed analysis to aide Information Assurance (IA) Mitigations to produce and deliver mitigations for the IC/DoD community.
  • Performed on-site assessments and backend analysis during various network attacks across the DoD and IC.

SYSTEMS ENGINEERING TEST AND EVALUATION - GS-12

DEPARTMENT OF DEFENSE-NSA
02.2009 - 02.2011
  • Oversaw testing and integration for multiple government systems. Planned, installed, configured, tested, implemented, and managed SIGINT and IT systems in support of mission.
  • Coordinated the installation, testing, operation, troubleshooting, and maintenance of hardware/software for the SIGINT and IT systems.
  • Conducted performance and functionality verification testing on system infrastructure.
  • Conducted analysis on raw network and telephony metadata.
  • Performed test analysis to include performance, functionality and data validation.
  • Conducted Design, Testing and Evaluation (DT&E), Critical Test and Evaluation (CTE) and Vulnerability Assessment and Penetration Test (VAPT) efforts for systems and construction of the Requirements Verification Traceability Matrix (RVTM) for program testing.
  • Wrote documentation for test and integration efforts to include: Test Plans,
  • Tested Procedures and Test Reports.
  • Ensured government systems meet all security requirements and specifications.

SYSTEMS ENGINEER III - TEST AND EVALUATION

Northrop Grumman
01.2004 - 02.2009
  • Collaborated with EE’s and ME’s to design, build and test Antenna Apertures and Radar Systems for the military (government) and private sectors. Interpreted specific program needs into antenna tests and/or execute defined test plans and procedures as detailed in the test documentation or as instructed by lead engineer.
  • Assisted with the collection of data and technical information used in the development of RF antennas using Design Verification Test (DVT) and Design Test Operations (DTO).
  • Performed phase and amplitude measurements on diverse antenna product line to include spiral, log periodic, horns, and dipole and notch antennas.
  • Provided analysis of measured complex data including various pass/fail antenna parameters using FR959 software, Excel, Data Pro and Matlab. Responsible for RF range setup, calibration and Troubleshooting of Antenna Apertures and Radar Systems.

SYSTEMS ENGINEER II – RF TESTING

NORTHROP GRUMMAN
01.2002 - 12.2004
  • Improved system performance by integrating efficient algorithms and innovative solutions.
  • Designed system architectures to enhance operational efficiency and scalability.
  • Developed automated scripts to streamline maintenance processes and minimize errors.
  • Enhanced system security with implementation of advanced encryption protocols.
  • Performed VSWR and Phase testing on various microwave cables, components and active/passive devices.
  • Supplied program support on multiple production and prototype programs. RF microwave testing and troubleshooting on MMIC’s and multiple RF modules.
  • Provided manufacturing troubleshooting support on board level programs.

Education

Master of Science - CYBERSECURITY

UNIVERSITY OF MARYLAND
College Park, MD
05-2014

Bachelor of Science - Computer Information Systems

Johns Hopkins University
Baltimore, MD
05-2009

Skills

  • Product strategy
  • Project management
  • Cross-functional collaboration
  • Agile methodology
  • Stakeholder engagement
  • Product lifecycle
  • Risk management

Certification

  • Certified Information Security Manager (CISM) – EH: 490883
  • CompTIA Advanced Security Practitioner (CASP+) – ID: COMP001021610796
  • Certified Ethical Hacker (CEH) – ECC6714950283

Timeline

CYBERSECURITY OPS LEAD (CND, CNO & CNE) (GS-14)

DEPARTMENT OF DEFENSE-NSA
07.2023 - 07.2023

PRODUCT MANAGER-TECH LEAD FOR DATA SCIENCE (GS-15)

CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA)-DHS
07.2023 - Current

SYSTEM ADMIN III

OMNYON
08.2022 - Current

TECHNICAL LEAD-PROJECT MANAGER FOR CYBERDISCOVERY

DEPARTMENT OF DEFENSE-NSA
09.2016 - 07.2022

LEAD CYBERSECURITY INCIDENT AND RESONSE TEAM

Jacobs Engineering Group, Inc.
09.2014 - 05.2017

TECHNICAL CONTRACTOR OFFICER REPRESENTATIVE (GS-14

DEPARTMENT OF DEFENSE-NSA
08.2014 - 07.2022

CYBER DEFENSE (CD) MISSION LEAD FOR CLOUD ANALYTIC

DEPARTMENT OF DEFENSE-NSA
12.2012 - 09.2016

LEAD COMPUTER NETWORK DEFENSE (CND) ANALIST (GS-13

DEPARTMENT OF DEFENSE-NSA
02.2011 - 12.2013

SYSTEMS ENGINEERING TEST AND EVALUATION - GS-12

DEPARTMENT OF DEFENSE-NSA
02.2009 - 02.2011

SYSTEMS ENGINEER III - TEST AND EVALUATION

Northrop Grumman
01.2004 - 02.2009

SYSTEMS ENGINEER II – RF TESTING

NORTHROP GRUMMAN
01.2002 - 12.2004
  • Certified Information Security Manager (CISM) – EH: 490883
  • CompTIA Advanced Security Practitioner (CASP+) – ID: COMP001021610796
  • Certified Ethical Hacker (CEH) – ECC6714950283

Master of Science - CYBERSECURITY

UNIVERSITY OF MARYLAND

Bachelor of Science - Computer Information Systems

Johns Hopkins University
Marque T. Jones Sr.