Summary
Overview
Work History
Education
Skills
Timeline
Generic

Michael Dowding

CISO
JESSUP,MD

Summary

Goal-oriented and collaborative IT professional with over 20+ years’ hands on experience as a Network Engineer, Administrator and Change Management, two advance graduate degrees in Networking and Information Systems, and two key graduate certificates in Information Security and Wireless Systems. Proven analytic and problem-solving skills with the keen ability to assess needs, define requirements, develop value-added solutions, and execute technical solutions that streamline and improve operating efficiencies. In-depth experience in Information Systems security including risk assessments, Information Assurance and Compliance, Security Test and Evaluations, Systems Security Engineering, Systems development, test and evaluation, and project management. Hands on experience in Cybersecurity risk assessments and compliance auditing in rapid development environments. Ability to communicate with technical and non-technical audience, develop system documentation and create policies to meet the needs of dynamic and continuously changing environments.

Overview

26
26
years of professional experience

Work History

Senior Risk Advisor, Cyber

Peraton
9 2023 - 4 2024
  • Develop roadmaps to implement cyber resilient techniques that subvert adversary attack vectors while allowing reliable delivery of C2, intel, and logistics data to warfighter. Understanding of advanced cyber threats targeting enterprises, along with tactics, and procedures used by those threats
  • Research artificial intelligence/machine learning to increase efficiency and effectiveness in the protection and defense of critical services to validate assumptions related to cyber security and cyber resiliency
  • Evaluate networking solutions that block, reroute, or deceive adversaries in a contested cyber domain
  • Research and evaluate using AI for automation of cyber defense actions with the goal of improving the ability to fight “at the speed of cyber”, leveraging MITRE Framework for predicative analytics
  • Demonstrated expertise in deploying and maintaining open-source network security monitoring and assessment tools
  • Experience developing and conducting detailed, technical, and hands on training
  • Assess complex capabilities, tactics, techniques and procedures, and requirements in support of the Army Cyber (ARCYBER) Program
  • Assisted in coordination, integration, and validation of new and emerging technologies that affect the Joint Forces Headquarters Department of Defense Information Network (JFHQ-DODIN) cyber environment
  • Work with Joint Forces Headquarters Department of Defense Information Network (JFHQ-DODIN) leadership and other organizations to ensure validated requirements are in line with cyber ARCYBER mission intent
  • Provide input into DODIN planning, validating, and programming efforts in cyber for development of Mission Assurance requirements
  • Identify areas of commonality, duplication of effort, and where appropriate, provide input to establish joint efforts to resolve redundancies
  • Monitor performance of programs and equipment to ensure operational performance meets mission requirements
  • Review operational, test and evaluation data and results to confirm the technological approach and affirm material effectiveness in solving identified requirements
  • Define dynamic techniques that rearrange the cyber battle space based on indicators and warnings of adversary activities

Network Engineer, Lead

Bluewater
06.2021 - 05.2023
  • Develop, submit, and maintain requirements documentation in support of all programs supported
  • Meet with stakeholders to gather initial requirements, performing requirements analysis to refine technical requirements, documenting requirements analysis and requirements traceability
  • Ensure the requirements align with the DISA and DoD strategic directives
  • Provide expertise, knowledge, and understanding of the DISA Strategic Plan, as well as current and emerging technologies, to include: the Joint Information Environment, Joint Regional Security Stack, Combined Communications Electronics Board initiatives, Secure Cloud Computing Architecture, and the Mission Partner Environment Information Systems that shall directly impact the architecture design, configurations and implementation of the programs supported
  • Provides network engineering support as it relates to all phases of the systems development life cycle process
  • Compliant with DISA’s Systems Engineering and Acquisition processes for all tasks related to programs supported in this PWS
  • Produce a project schedule to document the timeline for correcting any deficiencies identified through the Systems Engineering and Acquisition process along with accompanying documentation to include System Sustainment Plans, Concept Proposals, Comprehensive Operational Analysis and SRF documentation as identified by the COR /ACOR
  • Provide support to include participation and facilitation of meetings and conferences to include: the DMZ, NFG, Whitelist/FLM-NG, Initial/Mid/Final Planning Conferences and Cyber Security Working Groups
  • Support operational requirements and assure system and network availability for mission partners, by providing Tier III expertise, knowledge, and facilitation of activities with Tier II and the mission partners to ensure timely remediation of operational issues.

Cyber SME, Sr. Incident

Science Application Technology, SA-TECH, PwC
08.2020 - 01.2021
  • Cybersecurity functional expert and team leader in support of DOT&E missions pertaining to operational assessments of DoD warfighter platforms and networks
  • Supports Cybersecurity and Electromagnetic Activities (CEMA) and develop cyber threat mitigation strategies and countermeasures, procedures, methodologies, capabilities that required research and development
  • Provides subject matter expertise to Cybersecurity Assessment Program (CAP) evaluations being executed during Joint and Service Training exercises
  • Analysis and heavy data mining relative to cyber threat TTP identification and employment during platform assessment missions
  • Support cyber resiliency of signals intelligence analysis (specifically electronic intelligence), cybersecurity principles, Information Assurance policy, compliance requirements, and related network security measures, including but not limited to Protect, Detect, React, Restore and Resilience metrics
  • Evaluate Cybersecurity T&E Guidebook procedures to all network, C4ISR, weapons platforms, etc
  • From Sensor to Shooter
  • Applies the six phases of the Guidebook to operational assessments on warfighting platforms and network, (both closed and open)
  • Assess the Cybersecurity Requirements, Characterize the Attack Surface, Cooperative Vulnerability Identification, Adversarial Cybersecurity DT&E and TTPs, Cooperative Vulnerability and Penetration Assessment, Adversarial Assessments
  • Knowledge of Blue, Grey, and Red Threat and Network environment
  • Supports weapon system requirements to CEMA and cyber resiliency operational assessment plans and measures
  • Evaluate cybersecurity technologies into multiple systems, penetration testing, cyber forensics, system security engineering, and vulnerability mitigation strategies to reduce advanced persistent cyber-attack risk
  • Evaluate Threat Actor Tactics, Techniques and Procedures (TTPs) Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency
  • Provides Cyber Kill Chain and applicable analytic models
  • Diamond Model Data mining that supports threat assessment development for analytical products
  • Report Network and Internetwork Routing - Domain Name System protocol and architecture
  • Evaluate how an Antivirus program, and Intrusion Detection System works
  • Develop and evaluate exploitation, implants, and beacons
  • Build effective communications to explain complex technical information
  • Provides leadership and supervisory duties in a Cyber Threat environment Basic coding in scripting languages such as Python, R, or Ruby Calculating statistical significance and principal component analyses Basic Scripting for the GHOSTMACHINE environment Leveraging LABBENCH + Jupiter to interface with GMAE - TCP/IP: three-way handshake
  • Guidehouse

05.2019 - 08.2020
  • Analyze malicious code by conducting reverse engineering techniques and employing tools and scripting languages as well as virtual machine and networking software
  • Identify the methodology of hackers posing a potential threat to customer networks and systems
  • Documented results in time-sensitive reports, presentations and analyst exchanges
  • Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools
  • Conducted analysis of dynamic and static factors, and reverse engineering operations
  • Prepared reports to record findings in Malware software analysis and related incident analysis and response
  • Performed computer forensics including detailed technical analysis and reverse engineering of malware, malicious code and media such as hard drives and USB drives of compromised systems in support of Army Computer Network Operations (CNO) and Computer Network Defense (CND) efforts
  • Drafted technical reports detailing analysis results to US Army staff and leadership
  • Monitor the security of critical systems (e.g., e-mail servers, database servers, web servers, App-server) and changes to highly sensitive computer security controls to ensure appropriate system administrative actions, investigate and report on noted irregularities
  • Performed advanced computer and network tests relating to various forms of malware analysis, computer intrusion, theft of information, denial of service, multi-national organized criminal groups, and Advanced Persistent Threats (APT) - C, C++, Python, JavaScript, Fortran, X86 Assembly
  • Deep working knowledge of networking concepts and protocols: TCP/IP, HTTP, HTTPS, DNS, RPC
  • Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools
  • Conducted analysis of dynamic and static factors, and reverse engineering operations
  • Prepared reports to record findings in Malware software analysis and related incident analysis and response.

Sr. Security Engineer/Cloud & Enterprise

BrainGU
08.2018 - 05.2019
  • Provided subject matter expert in area of information security risk management methodology and practice
  • Supports BrainGU Structsure SaaS enablement while securing various FedRAMP Moderate Security Controls, AWS cloud services and DOD and NIST 800-54r4 Risk Management Framework process
  • Formulate security program frameworks to assess impacts and security risks associated with cloud infrastructure technology
  • Expertise knowledge on enterprise security solution design and implementation skills covering identity and access management, infrastructure security (network & endpoint), privacy and data security as well as application security
  • Deep Technical knowledge in routing, firewall policy, Anti-DDoS, WAF, IPS, SIEM, secure credential management, virtualization, service-oriented architecture, development practices, operational practices, micro services architecture and database design
  • Assesses known information security weaknesses and the adequacy of associated remediation activities
  • Configuration hardening, assessment, and forensics experience with Linux servers
  • Solid knowledge and understanding of security regulations and best practices such as PCI, SOX, HIPAA, NIST or the ISO 27000 family of standards
  • Evaluate and identifies the key information security risk scenarios and supports the identification of the critical controls required
  • Identifying risk by reviewing current policies and processes, identifying areas of potential risk to the organization, and partnering on the development of solutions to mitigate business exposure by leveraging strong analytical and process
  • Work with network, platform, engineering and dev-ops teams in architecture design and review session
  • Expert knowledge of security frameworks such as Cloud Security Alliance (CSA), Internal Organization for Standardization (ISO), and National Institute of Standards and Technology (NIST)
  • Assesses known information security weaknesses and the adequacy of associated remediation activities
  • Configuration hardening, assessment, and forensics experience with Linux servers
  • Solid knowledge and understanding of security regulations and best practices such as PCI, SOX, HIPAA, NIST or the ISO 27000 family of standards
  • Evaluate and identifies the key information security risk scenarios and supports the identification of the critical controls required
  • Identifying risk by reviewing current policies and processes, identifying areas of potential risk to the organization, and partnering on the development of solutions to mitigate business exposure by leveraging strong analytical and process
  • Work with network, platform, engineering and dev-ops teams in architecture design and review session
  • Expert knowledge of security frameworks such as Cloud Security Alliance (CSA), Internal Organization for Standardization (ISO), and National Institute of Standards and Technology (NIST).

Information Security Engineer

Comtech Mobile Datacom, United States Army
07.2015 - 11.2018
  • Assurance Cyber Division
  • Lead and coordinate cyber incident response activities
  • Analyze and evaluate hardware, software and operational practices for cyber security impact
  • Provide knowledge in software, applications and database STIGs review and application security testing
  • Provide technical expertise and participate in projects to implement new cyber security tools
  • Coordinate security events monitoring using McAfee Nitro, Science Logic EM7, syslog and other tools
  • Evaluate potential threat and issues reports
  • Work with IT team to mitigate security events
  • Perform users’ management and activity monitoring, as well as configuration change monitoring
  • Perform periodic penetration testing
  • Coordinate periodic security patching activities on Windows, Linux servers and network devices
  • Check, identify, and verify installation of all pertinent patches based on IAVA, vulnerability alerts and vendor’s recommendations
  • Operate, maintain and provide reports on various security monitoring tools: FireEye web, e-mail and host-based (Mandiant) protection systems BlueCoat web proxy McAfee Nitro, SNORT and other intrusion detection systems (signatures and updates)
  • DoD HBSS system (McAfee ePolicy Orchestrator and host-based components) Various IT security software (McAfee Antivirus, Malware Bytes) Syslog’s, SEIM and other event management tools
  • Network analyzers (NI Observer, Wireshark) and other packet analysis tools
  • Perform regular security scans, risk and vulnerability assessments to verify compliance with the following regulations: DoD 8500.2 IA controls, AR25-2 Army Regulations, DIACAP accreditation framework, NIST standards and Risk Management Framework, Sarbanes-Oxley Act, Corporate internal standards and policies
  • Perform periodic monitors, control and develop IA policies for: Network access control (NAC) devices, Host-based and network-based IDS/IPS systems, Firewall rules and access lists, Linux and Windows servers and workstations, User access controls
  • Maintain DoD ATO accreditations and IA security posture on Government networks: In collaboration with IT team, ensure compliance of network and computing environment with current STIGs and DoD regulations
  • Perform periodic security audit and coordinate findings remediation
  • Perform and provide support for Government DIACAP inspections and scans
  • Create and maintain accreditation documentation and POA&Ms
  • Support system security evaluation and validation by independent third party
  • Perform periodic IA training and for the operations and administration personnel
  • Conduct periodic DR and redundancy testing.

Information System Security Officer

Acro Service Corporation, Northrop Grumman Corp
11.2017 - 08.2018
  • JINTACCS Missile Defense & Protective Systems Division
  • Develop, implement and maintain security controls and supporting documentation as required for risk management framework (RMF)
  • Support security incident reporting, vulnerability assessments, and information assurance compliance scans
  • Develop and maintain SA&A documentation for the system policy and Federal guidance SA&A documentation may include, but is not limited to, System Security Plans (SSP), Risk Assessment Reports, Security Assessment Reports, Contingency Plans, Authorization to Operate (ATO) documents, etc
  • Maintain system for risk management and SA&A documentation
  • Conduct testing of proposed security configuration settings to ensure that these settings meet system requirements
  • Document security configurations as implemented on all IT assets and update this documentation as configuration changes are made
  • Analyze systems, audited security logs and provide security control recommendations in accordance with policy, NIST SP 800-53, and DoD directives
  • Support establishing and ensure that all IT assets are configured to system specifications, security configuration baselines and in accordance with DoD directives, NIST, and applicable governing requirements
  • Conduct continuous monitoring, and addressing any deviations from, the applicable security configuration baselines
  • Define system boundaries, system hardware/software inventories, system interconnections, system responsible officials, and system users
  • Develop and maintain information system security documentation
  • Performed security risk assessments using tools (ACAS, SCAP, Splunk) and STIGs requirements to enhance security posture of the severity of weaknesses or deficiencies discovered in the IS
  • Perform review new security solutions designs and specifications to validate they are ready for existing security operations environment
  • Conduct technical policy and contract reviews as requested and advise the Senior Management accordingly
  • Perform reviews of existing and future technologies and standards, and advise the Senior Management of the implications that such technologies and standard may have on Customer IT security
  • Enforce SIPRNet security guidance policies as provided by DISA, DSS, USCYBERCOM, Department of the Air Force, and other relevant regulations
  • Work with the Configuration Control Board (CCB) for approval of all patches and major updates/changes
  • Provide required Information Assurance Vulnerability Management (IAVM) scanning and vulnerability assessments with DoD approved software
  • Manage and support Active Directory, WSUS and RADIUS
  • Implement and test IS and data backup procedures for integrity
  • Prepare for a CCRI or other government inspections and conduct self-assessments in advance of inspection to ensure all applicable CND Directives and applicable IA policies for the IS
  • Provide an accounting of hardware and support life-cycle to both Senior Management and the Customer of the existing IT infrastructure
  • This includes the following list of technologies: Devices: Firewalls, NIDS, and Proxy Applications: Antivirus, Content Filtering, HIDS, and Logging.

Infrastructure Engineer

Elevate Technology Solutions, Wireless
10.2014 - 01.2015
  • States Agency for International Development (USAID), M/CIO/IT/Engineering Management
  • Lead team of 3 IT professionals in design, implementation, configuration, and management of enterprise wireless hardware, software, and management systems (NMS)
  • Draft technical manuals Concept of Operations (CONOPS), installation manuals, installation progress updates, and incident response plans in order to enhance system security documentation; create required system compliance reports and information requests
  • Plan and coordinate system utilization and capacity, involving configuration and testing with vendor
  • Responsible for advanced enterprise wireless LAN administration and design, mesh networks, and point-to-point and point-to-multipoint topologies
  • Monitor, document, and control infrastructure performance for response, throughput, and availability
  • Resolve escalated hardware and software issues related to LAN/WAN
  • Identify opportunities and solutions for improving efficiencies with emerging technologies, including Cisco routers/switches and wireless systems
  • Conducted client consultations for wireless LAN/WAN hardware and software, including networks, routers, and servers
  • Analyzed business needs and recommended solutions
  • Identified technical problems and debugged hardware and software related to LANs/WANs
  • Helped develop and implement system verification and vulnerabilities tests, assess mission assurance factors, and construct risk mitigation plans
  • Architecture included quality of service configurations, router/switch configuration, capacity planning, and modernization of supporting systems
  • Installed Wireless Intrusion Detection and Prevention sensors, monitored performance of wired and wireless networks to maximize operations
  • Conducted testing of new wireless devices, their features, advantages and benefits compared to existing products available in the market, to validate speed, range, signal strength, ease of use and manageability.

Project Manager

Computer World Services Corp, Falls Church
02.2011 - 10.2014
  • Defense Health Quarter (DHHQ), United States Air Force/AFMSA SG6I
  • Managed and Interfaces with, the DHA Cybersecurity Division, and in some cases, other agencies with AF, DHA and DoD C&A
  • Include, tasking’s such as: cybersecurity risk assessments (RA), tests and evaluations, technology evaluation and integration, network design, network security applications (Public Key Infrastructure [PKI], Virtual Private Networks [VPN], firewalls, Intrusion Detection Systems, etc.)
  • Managed IA web site information, research and evaluation on Cybersecurity matters, incident response and reporting, AFMS, MHS, RMF, DIACAP/Command, Control, Communications, and Computer Intelligence Support Plan (C4ISP) security documentation, technical papers, white papers, military staff package preparation, evaluation of applicable standards of The Joint Commission, Health Insurance Portability and Accountability Act (HIPAA), wireless technologies, and privacy issues
  • Provided and conducted Independent Verification and Validation (IV&V) of medical devices from various vendors and Original Equipment Manufacturers (OEMs)
  • This includes interpreting results, ensuring proper implementation of controls, ensuring proper configurations, etc
  • These efforts are all based on Department of Defense Instructions (DoDI), AFIs, DHA Administrative Instructions, Federal Drug Administration (FDA) Guidelines, and current industry standards
  • Served as SME in the development of multiple vendor C&A (RMF, DIACAP, PIT, etc.) artifact documentation to be used in the accreditation process
  • Upload C&A artifact documentation/notes into appropriate tracking tool
  • (Tracking tool template to be provided to the contractor by the MDIS PMO after contract award)
  • Consulted with equipment manufacturers and other DoD agencies to obtain information they can use to advise and assist the CE and PMO Leadership in producing sound engineering solutions to enhance the security posture of the medical device systems being deployed
  • Design, develop, implement, and integrate information assurance architecture within system application
  • Coordinate with program engineers, developers, information system security officers and managers, system administrators including stakeholders to ensure acceptable application system risk levels
  • Provide documentation of compelling evidence artifacts including system security plans, system security design, policies and standard operating procedures
  • Evaluated system architecture and design alternatives to meet user requirements
  • Conduct lectures and speeches, established and maintain technical to show project progress to management
  • Develop articles, white papers, talking papers, bullet background papers, staff summary sheets, project briefings, evaluation reports, business cases analysis, meeting agendas/minutes, and spreadsheets
  • Ensured that all monitored systems comply with the DoD Gold disk, STIGs, IAVA, IAVB, IAV-TA, Security Control procedures in addition to FISMA requirements
  • Report on all security, IA, and C&A compliance requirements
  • Updated security documentation related to reaccreditations, annual reviews, accreditation updates, and when configuration changes are made to the device/systems and upload into the Medical Device IA tracking tool and Enterprise Mission Assurance Support Service (EMASS) web-based application, no later than (NLT) three (3) business days after updates are received from the vendor, MTF, DHA or other AF agencies.

Lead Network Engineer

Innovative Management Concepts Inc, Silver Spring
09.2011 - 02.2012
  • For WRAIR –NMRC, Walter Reed Army Institute of Research, and Navy Medical Institute of Research
  • Engineered, Implemented, and simulated two networks in a lab environment for the purpose of GRE Tunnel with VRF Configuration and performance analysis using Cisco routers and switches, 3750, 6513, and 3560
  • Deployed Windows 2008 servers to simulate two live networks hosting, AD, SFTP, DHCP, DNS, RAS, Web, and Exchange
  • Management and operation of including supervising a staff of four Network Engineers, coordinating LAN / WAN maintenance, testing, evaluating and procuring new technologies for Intranet / Internet applications
  • Manage and configure a defense in de-depth security-framework Supported VLANS, vulnerability assessment, data forensics, firewall anomalies, false positives and disaster recovery
  • Managed various operating systems, review various logs for ingress and egress
  • Deployed and configured various IDS/IPS
  • Managed log servers, handled incident response and provided risk assessment analysis
  • Supported computer forensics, analyze data, through Security Information and Event Management (SIEM)
  • Provided threat assessment, using packet capturing software tools, Nessus, AppDetective, and Fortify
  • Provided traffic analysis and scripting for various firewalls
  • Ensure compliance with existing Army Security Policies and Architectural standards, including RSA Secure ID technology, SMS client management
  • Test Lab, using dynamic routing protocols OSPF, EIGRP as well as policy routing, implemented total router, VPN tunnel and firewall redundancy of all sites
  • Manage and Maintain Cisco PALO-ALTO/MacAfee/ASA-5500 series firewalls and Juniper SSG5400 firewall adding ACL and NAT as an additional layer of security
  • Set up PPTP VPN using MS Windows NT RAS for the remote users
  • Designed, implemented and managed LAN/WAN Networks/PC network system supporting, US Army, and US Navy infrastructure and customer support departments
  • Developed and supported software applications that facilitated business decision making and financial auditing
  • Conducted user training, subcontractor management and contract negotiations with vendors
  • Engaged in daily analysis, design, documentation, change management, implementation, and support of client’s network infrastructures
  • Performed vulnerability security test of the network utilizing visual inspection of router and switch configurations files, port scanners, access lists, and other methods to determine security weaknesses.

Network Engineer

Future Technologies Inc
07.2011 - 09.2011
  • For the AFMES – Arm Forces Medical Examiner, US Army:
  • Network Assessment and Documentation (including technical, operational, and economic assessment
  • Configured Cisco 3750, 4507 and 6513 VTP-VLAN configurations, IP-Subnetting
  • Implementation of TCP/IP & related Services-DHCP/DNS/WINS, and Kerberos authentication protocol for client/server
  • Manage and configure a defense in de-depth security-framework t
  • Supported VLANS, vulnerability assessment, data forensics, firewall anomalies, false positives and disaster recovery
  • Managed various operating systems, review various logs for ingress and egress
  • Ensured information assurance by transmitting secure data between classified systems; perform ethical hacking, malware reverse engineering, penetration testing, and Certification and Accreditation (C&A) within Security Operations Center (SOC) environment
  • Deployed and configured various IDS/IPS
  • Managed log servers, handled incident response and provided risk assessment analysis
  • Supported computer forensics, analyze data, through Security Information and Event Management (SIEM)
  • Supported Linux base OS systems
  • Provided threat assessment, using packet capturing software tools
  • Provided traffic analysis and scripting for various firewalls
  • Manage complex operations that involve two or more additional functions such as, but not limited to, network operations, systems security, systems software support, and production support activities
  • Managed Cisco PALO-ALTO/MacAfee/ASA-5500 series firewalls and Juniper SSG5400 IDS
  • Design and implement security policies using ACL
  • Perform system-level design and configuration of products including determination of hardware, OS, and other platform specifications Managing User accounts using Active Directory Server 2008, configured Link Aggregation Control Protocol (LACP)/ Port aggregation protocol (PAgP) to form Ether-channel between 10-Gigabit Ethernet ports
  • Implement storage migration using Dell EMC-SAN CX4-240 hardware
  • Provide technical direction and engineering knowledge for communications activities including planning, designing, developing, testing, installing and maintaining LAN/WAN and large communications networks
  • Recently consulted with vendor on Metro-E and T-1 Circuit DEMARC- point
  • Provide logical and physical network design layout
  • Build and maintain Visio documentation database of network topology
  • Design the layout for cable Installations
  • Help establish guidelines and standards for Change Procedures
  • Configure, install and maintain software and hardware in accordance with Security Technical Implementation Guide (STIG)
  • Hardware includes Cisco switches and routers, 6513, 4507, 3725, 3750
  • Develop System Security Plan (SSP), documentation and provide POA&M
  • Provide risk assessment using NIST standard security framework
  • Upgrade Cisco Routers, Switches and Firewall IOS using TFTP
  • Configured Cisco Routers (3725, 4507, and 3750) using RIP, OSPF, and EIGRP
  • Troubleshoot Windows 2003 Servers and streamlining the user policy.

IT- IT Ops Support Analyst III

World IT Solutions, Washington
03.2011 - 07.2011
  • For NSWC- Naval Surface Warfare Center, US Navy, Indian Head Division
  • Provided support and maintenance of infrastructure and information systems
  • 2007 Exchange mail server, Server 2008R2 Active Directory user supports
  • Participated in architecture reviews to ensure that solutions comply with standards, user Policy Agreements and other documentation
  • Analyzed business requirements and 3rd party configuration software implementation of infrastructure solutions
  • Configured Guardian for data back-up and software- encryption
  • Maintained Dell PC’s and HP notebooks and perform Desktop management
  • Created documentation, testing and maintenance of applications, Microsoft Office Suite
  • Analyzed and corrected network troubles and performance issues
  • Help Desk, end-user Local Area Network Hardware and Software support
  • Configuration, and IOS updates (Cisco routers, switches)
  • Provided HP Desktop migration end user support and troubleshooting
  • Provided imaging/installation and software configuration Management
  • Platforms/Software included Dell, 2000/XP, MS Office Suite
  • Protecting Network data, monitoring network performance management and optimization
  • Provided desktop support for both software and hardware
  • Configured and installed application services

Network Administrator

Keller Graduate School of Management, DeVry University
02.2007 - 06.2010
  • Help negotiate hardware, HP, DELL, Gateway, software- Microsoft and Verizon circuit contracts for client
  • Designed customer’s office with fiber-optic cable for scalability and robustness to manage 500+ users
  • Installed various hardware and software operating systems, Linux, Windows NT, XP, Server 03, Oracle
  • Provided software and hardware, Exchange 2007 mail server, and Cisco 3600 router support
  • Installed and configured DHCP Client/Server and troubleshoot DNS queries
  • Serviced and Troubleshoot printers (HP laser, inkjet, and fax machine)
  • Enforced network SOP’s, login and user access restrictions, virus protection, OS updates, user rights and security policy requirements with campus sites
  • Coordinated with vendors such as Verizon on SLA and evaluated network statistics
  • Delegated to open incidents with vendors, Verizon T-1, PBX and T-1 PRI circuit failures

Junior Network Administrator

DeVry Institute of Technology
01.2004 - 02.2007
  • Provided Help Desk / End-user support for hardware, software and Windows operating systems
  • Maintained and created user accounts and policies within Active Directory
  • Imaged and prepared PC’s and laptops for distribution to the end-users
  • Developed problem solving and optimum trouble shooting abilities
  • Perform Troubleshooting end-to-end between the two sites
  • Managed routers (3600), switches (3550, 2950), wireless networks
  • Planned and designed the organization's LAN network expansion for multiple locations
  • Worked with local and long distance carriers to isolate and restore service to PBX
  • Provide blackberry mail end user support and troubleshooting
  • Built effective working relationships with clients to provide technical support and guidance as warranted.

logistic support

UNITED STATES NAVY Quartermaster
01.1997 - 08.2002
  • To all six-fleet surface and submarine
  • Responsible for the safe navigation of a ship crew of 3,000
  • Conducted special operations throughout the Mediterranean Sea
  • Supervised trained junior personnel on leadership and responsibility
  • Perform Satellite, radar, GPS, communications across all platforms

Education

BS - Networking and Telecommunications Management

DeVry Institute of Technology
Long Island City, NY

MBA, Master of Business Administration - undefined

Keller Graduate School of Management at DeVry University
New York, NY

Graduate Certificate - Information Security

MISM

Master of Science - Information Systems Management

Graduate Certificate - Wireless

Skills

Technical Troubleshooting

undefined

Timeline

Network Engineer, Lead

Bluewater
06.2021 - 05.2023

Cyber SME, Sr. Incident

Science Application Technology, SA-TECH, PwC
08.2020 - 01.2021

05.2019 - 08.2020

Sr. Security Engineer/Cloud & Enterprise

BrainGU
08.2018 - 05.2019

Information System Security Officer

Acro Service Corporation, Northrop Grumman Corp
11.2017 - 08.2018

Information Security Engineer

Comtech Mobile Datacom, United States Army
07.2015 - 11.2018

Infrastructure Engineer

Elevate Technology Solutions, Wireless
10.2014 - 01.2015

Lead Network Engineer

Innovative Management Concepts Inc, Silver Spring
09.2011 - 02.2012

Network Engineer

Future Technologies Inc
07.2011 - 09.2011

IT- IT Ops Support Analyst III

World IT Solutions, Washington
03.2011 - 07.2011

Project Manager

Computer World Services Corp, Falls Church
02.2011 - 10.2014

Network Administrator

Keller Graduate School of Management, DeVry University
02.2007 - 06.2010

Junior Network Administrator

DeVry Institute of Technology
01.2004 - 02.2007

logistic support

UNITED STATES NAVY Quartermaster
01.1997 - 08.2002

Senior Risk Advisor, Cyber

Peraton
9 2023 - 4 2024

BS - Networking and Telecommunications Management

DeVry Institute of Technology

MBA, Master of Business Administration - undefined

Keller Graduate School of Management at DeVry University

Graduate Certificate - Information Security

MISM

Master of Science - Information Systems Management

Graduate Certificate - Wireless

Michael DowdingCISO