Summary
Overview
Work History
Education
Skills
Certification
Accomplishments
Miscellaneoustraining
Leadershipandmanagement
Security Clearance
References
Work Availability
Work Preference
Timeline
4c
Michaelle Lancaster

Michaelle Lancaster

Cyber Executive
Farnham,VA

Summary

Global-oriented Cyber Defense expert with over 20 years of experience leading successful teams of cyber professionals and programs. Leads organizations to secure resilient cyber postures while enabling cutting edge business solutions. Passionate about keeping our world secure in an ever changing and volatile global environment.

Overview

25
25
years of professional experience
2
2
Certification

Work History

ASSOCIATE VICE PRESIDENT SECURITY ENGINEERING AND ARCHITECT

Cognizant
07.2022 - Current
  • Manages over 9 million dollars of the CISO budget while leading 4 Cyber Defense towers ensuring secure solutions enabled across the Fortune 200 corporate enterprise
  • Engages with key business leaders to help guide them towards secure solutions such as the corporate wide deployment of Microsoft Defender for endpoint for over 500K users and servers
  • Guiding the Cognizant Global enterprise secure solutions resulting in secure defensible security postures by leading the transformation of the enterprise network security architecture
  • Leading the Cognizant organization in a Zero Trust and cyber mesh journey by planning foundational and modernization projects to help the organization achieve this goal
  • Leading the effort to ensure the Cognizant Generative AI (GAI) journey is accomplished in a secure, safe ethical manner by leading the team that developed the: Cognizant GAI Standard and subsequent security policies
  • Realized over 2 million in savings by implementing tool rationalization and modernization strategies
  • Leads a Global diverse team supporting and growing diversity at all levels within our organization.

SENIOR DIRECTOR CYBER DEFENSE

InvictusIC
02.2022 - 07.2022
  • Leading Intelligence Community (IC) Customer in their Zero Trust Journey
  • Guiding IC customers in building innovation roadmaps and technology strategies to take them to the next level and continue to stay ahead of the adversary.

DIRECTOR CYBER ENGINEERING DEFENSE

SAIC Office of the CISO
01.2018 - 02.2022
  • Leading the Cyber Engineer/ Architecture Team of 4 t Cyber Defense towers, directly supporting Corporate CISO
  • Responsible for the Cybersecurity Security Engineering budget of over 6 million dollars including assets, software and personnel
  • Leading the Network Security Engineers, initiated and led a firewall technology refresh and upgrade project that resulted in a 4-million-dollar savings for the SAIC Enterprise over a 4 year period maturing our edge security
  • Led a technology review and update of SAIC enterprise cyber mesh resulting in refresh of the enterprise endpoint cybersecurity solution to meet our zero-trust architecture strategy
  • Relied upon by the CISO and other senior leadership to guide the organizations cyber risk management journey
  • Maintaining the SAIC corporate Cyber Security tool set strategy and roadmap; conducted complete refresh of our cyber technology stack leading the organization to a zero-trust mindset and strategy
  • Led the Cyber engineering and Architecture team ensure all projects and programs have effective cyber security requirements, guidance and design
  • Instrumental ensuring the SAIC move to the cloud to include Microsoft, Oracle and AWS cloud projects remained secure
  • Directed Cyber inclusion into the SAIC ITO DEVSECOPS pipeline; ensured cyber involvement in all DEVSECOPS projects
  • Improved the Enterprise Threat Informed Defense by ensuring positive cyber hygiene and cyber threat informed defense of the SAIC network
  • Directed the Threat Informed Defense team’s increased the scanning and remediation visibility of the SAIC Enterprise by 80%.

SENIOR MANAGER CYBER ENGINEER / CYBER ARCHITECT

SAIC
05.2016 - 01.2018
  • Supporting the SAIC Information Technology Office (ITO) corporate Enterprise Architecture team in the role of lead cyber engineer and architect developing and implementing business aligned security and solutions and capabilities to address the current complicated threat environment
  • Cyber lead in support corporate wide efforts to include domain migration, data center migration, mobile device management and procurement modernization
  • Provided Cyber Security expert guidance to the corporate ITO team to ensure enterprise standards, goals, and requirements by developing security strategy plans and roadmaps for enterprise initiatives
  • Led corporate effort to meet upcoming Defense Federal Acquisition Requirements (DFARs) and implementation of requirements in NIST SP 800-171
  • Managed and led the Enterprise ITO Policy team in the development of many key cyber architecture principles and guidelines
  • Supports the Enterprise Architect, CISO, and Chief Privacy officer with identifying, documenting and recommending appropriate security controls such as encryption, multi-factor authentication, appropriate logging auditing strategies to support data protection in the enterprise
  • Managed and led the Enterprise ITO Policy team in the development of many key cyber policies
  • Managing the vulnerability management program.

CONITUOUS MONITORING LEAD; DEPUTY PROGRAM SUPPORT TEAM LEAD

SAIC
06.2014 - 05.2016
  • Managed the Vanguard 2.2.1 IA Program Support team; managing 9 personnel and tasks within the program to include processing documentation associated with the DOS RMF authorization process, help desk tier one support activities, and support continuous monitoring activities
  • Ensured the daily operations remained on track and within Vanguard 2.2.1 and Customer standards
  • Team lead for the Vanguard 2.2.1 Department of State (DOS) Continuous Monitoring (CM) team; managed the staff and developed the Information Systems Continuous Monitoring Program (ISCM) for Vanguard 2.2.1 DOS systems, validated for reference architectures for documented security requirements recommended changes to enhance security and reduce risk
  • Led the ISCM team in performance of federally mandated standards
  • Directly facilitated the documentation and improvement of the RMF support processes across the DOS Information Resource Management (IRM) Information Assurance A&A branch.

CYBER SECURITY LEAD; PORTFOLIO MANAGER

SAIC
09.2011 - 06.2014
  • Team Lead of the SAIC Joint Staff (JS) J6 Cyber Security team; CA Representative for JS Enterprise systems hosted at DoD Data Centers; ensured Systems Security compliance for Enclaves, Networks, Systems and applications within the Joint Staff Enterprise
  • Led DOD JS Cyber Security transition from DIACAP C&A processes to Risk Management Framework (RMF)
  • Represented the JS J6 Cyber Security Office at DOD level collaboration meetings for DIACAP, RMF, DITPR and FISMA
  • Provided Support to JS Government Information Assurance Manager for development of the JS Joint Directorate Information System Security Management (ISSM) Program
  • Worked with the Joint Staff J6 Portfolio Management (PfM) team to implement the mandated DOD Portfolio management process
  • Lead Analyst assigned to manage and monitor the Joint Staff DITPR and SNaP-IT records ensuring that the DITPR records are accurate and complete and ensuring the Joint Staff accurately reports their IT spending to OMB via the SNaP-IT exhibits 53 and 300.

LEAD INFORMATION SECURITY ANALYST

SAIC
09.2008 - 08.2011
  • Lead Information Assurance Manager (IAM) for Navy SPAWAR Atlantic and DISA on the FORGE.mil open-source community source development environment and managed every aspect of the Security process for the Forge.mil family of systems from development through production
  • Led the incorporation of DoD Information Security into the AGILE development process
  • Followed the Agile development process and worked with the Forge.mil team to plan, develop and implement the Teamforge.mil and Community.Forge.mil systems
  • Instrumental in the program achieving full Authority to Connect (ATO) for Teamforge within 180 days from the start of development from DISA and accomplished the unheard of task of achieving an Interim Authority to Operate (IATO) for the Community Forge system within 90 Days from start of development
  • Managed program risks and vulnerabilities while increasing compliance to the proposed Continuous Monitoring Standards to meet or exceed official DoD Compliance deadlines
  • Coordinated with the Forge.mil program manager advocating for and ensuring secure coding practices.

Information Assurance Architect / INFORMATION SECURITY ANALYST

SAIC
12.2006 - 09.2008
  • Instrumental in the development of the Enterprise Information Assurance Architecture for the Office of the Air Force Surgeon General
  • Supported Air Force Medical Service Surgeon General’ Information Assurance branch as SME for AFSG modernization towards a Service Oriented Computing Platform
  • Conducted detailed information assurance architecture evaluations of GOTS and COTS products as well as systems being developed for the AF/SG and Military Health systems (MHS) ensured selected products and services met with AFSG business strategies
  • Validated security configurations and access to security infrastructure tools
  • Reviewed network segmentation to ensure least privilege and secure network design
  • As the primary Subject Matter Expert (SME), exceptional advice and analysis pertaining to various Joint Medical Service working groups was provided on behalf of the AFSG to include the MHS Secure Remote Access Working Group and the MHS/Veterans Affairs trusted partnership working group.

SENIOR INFORMATION SECURITY ENGINEER

SAIC
09.2006 - 12.2006
  • Security Test & Evaluation Engineer DIA Certifier, Global Command and Control Systems – Joint (GCCS-J)
  • Led security test plan and test procedure development task
  • Supported GCCS-J certification and accreditation efforts as a DIA certifier.

INFORMATION SECURITY ENGINEER

SAIC
02.2005 - 09.2006
  • Security Test and Evaluation Engineer (Lead, Horizontal Fusion (HF), DIA)
  • Prepared for, and chair the HF security test procedures working group; Led the effort to create Service Oriented Architecture (SOA) related security tests and security verification methods; Subject Matter Expert in Information Security concepts as related to SOA related technology and concepts such as WS-Security
  • Researched and evaluated Security tools such as Watchfire for the purpose of developing SOA related security testing
  • Participated in various HF working groups; ensured C&A team was aware of any security related developments
  • Evaluated submitted change proposals and problem reports for security impact.

Information Security Engineer (System Security Expert, DEA)

SAIC
07.2004 - 02.2005
  • Promoted to Certification and Accreditation task lead after minimal time in position
  • Instrumental in beginning the Certification and Accreditation process transition from a NIACAP based process to the NIST based approach
  • Primary Security Engineer assigned from the DEA certification team to monitor and evaluate all changes proposed for the DEA classified intranet infrastructure
  • Primary certification team leader for several high-profile certification efforts that included the evaluation of Internet based Virtual Private Network (VPN) application and hardware; responsible for the entire certification process to include Risk and threat Analysis, Security Test and Evaluation, and documentation of the results
  • Assisted in the evaluation of changes made to the DEA unclassified intranet.

Systems Engineer (Security Engineer, FBI Trilogy)

SAIC
07.2003 - 07.2004
  • Worked with a team of engineers to provide technical solutions for security related issues within the Virtual Case File (VCF) developmental system
  • Ensured DOJ and FBI Security requirements were met; tracked Software Problem Reports (SPR); ensured proper implementation of system security design to include system interconnections
  • Created and designed test scenarios for security related requirements
  • Worked with test engineering; ensured that applicable security test scenarios satisfied DOJ Certification and Accreditation (C&A) requirements
  • Conducted trade studies; compared Security Information Management tools
  • Supported security-engineering effort through the analysis of the VCF application security design and implementation; evaluated software such as firewall and virus protection recommended security software solutions for the FBI classified virtual Case File system
  • Reviewed FBI specific C&A documents in support of the C&A effort.

Systems Engineer

SAIC (Europe)
06.2002 - 07.2003
  • Ensured seamless access to C2 classified information through the engineering and management of the Theater Battle Management Core System’s Unit-Level Command and Control (C2) System
  • Administered and maintained Secret Internet Protocol Router Network (SIPRNET) for the 52nd Fighter Wing
  • As a Senior Level Systems Administrator, performed systems and software configuration, administration, and maintenance within a Windows NT/2000 and UNIX cluster server SIPRNET environment for the Base Communications Squadron
  • Utilized NT User Manager, Trusted Enterprise Manager (TEM), and Directory Resource Administrator (DRA) to maintain and troubleshoot user accounts and applied Symantec Ghost Imaging, Image Cast stand-alone and multicast procedures
  • Managed and maintained TACLANE and FASTLANE cryptographic equipment; enabled uninterrupted data flow for the 52nd Fighter Wing SIPRNET
  • Planned and implemented upgrade of Science Applications International Corporation’s Theater Battle Management Control System cluster-server ORACLE 9i database
  • Administered training to 52nd Fighter Wing personnel while serving as systems engineer of Science Applications International Corporation, ensuring access to critical command and control information during operations and deployments.

52ND MEDICAL GROUP (USAF Europe)

03.2001 - 06.2002
  • Technical and Customer Support Engineer
  • Prepared and researched DITSCAP security documentation
  • Maintained the computer security program, ensuring compliance with Air Force and Department of Defense regulations, recognized as the best small computer security program in USAFE for 2001; Information System Security Officer (ISSO) for the 52nd Medical Group
  • Performed security analysis and advised on security issues relative to both the medical group Intranet and Non-secure Internet Protocol Router Network (NIPRNET) Investigated security incidents and recommended and implemented corrective action
  • Terminal Area Security Officer (TASO) for the 52nd Medical Group TBMCS equipment
  • Analyzed hardware and software applications issues and tested solutions
  • Selected as the 52nd Medical Group, 52nd Fighter Wing Mid-Level Civilian of the Year
  • Provided expert computer systems support in the form of technical and administrative support for 52nd Medical group systems that consisted of 380 personal computers, medical systems, networks, Databases and devices
  • Administered analysis, testing and evaluation, installation, and troubleshooting for network systems, including Windows 2000, Composite Health Care Systems (CHCS), the Aero Medical Services Information Management System (ASIMS) Oracle database, the Command Core database, and the Special Needs Program Management Information System (SNPMS) database
  • Performed computer and information security functions; Implemented information assurance programs within Windows NT/2000, Oracle, and UNIX environments for medical systems.

United States Air Force SIGNALS INTELLIGENCE ANALYST

08.1991 - 02.1998
  • Mission Support Specialist
  • Directed a cryptographic program of a classified U.S
  • National-level intelligence mission
  • Collaborated with computer specialists to manage a classified squadron Local Area Network (LAN) utilizing Windows NT, Transmission Control Protocol (TCP), and Internet Protocol (IP) in support of C4I missions
  • Collaborated with senior engineers regarding system requirements, analyses, testing, and evaluation of a critical intelligence system
  • Administered Tactical Information Broadcast System (TIBS) reporting systems as UNIX-based Silicon Graphics terminals and servers for national intelligence missions
  • Lead Ground Mission Analyst for National Level Intelligence Mission
  • Managed the Quality Assurance Program resulting in 100% accuracy rating of all intelligence mission reports
  • Managed TIBS system support, coordinating functions with major command and intelligence agency sources to ensure proper integration and maintenance
  • Administered training to users
  • Analyzed data and created technical reports for national-level consumers and NATO allies
  • Charlie flight Computer Security Administrator for the TIBS system
  • Highly skilled Intelligence Signals Analyst; conducted briefings and produced reports for national-level intelligence missions
  • Ensured the safety and security of critical operational data by implementing disaster and recovery schemes
  • Managed computer and cryptographic security programs, enforcing compliance with Air Intelligence Agency, Air Force, DOD, and NATO security regulations
  • Interfaced with the Information Warfare Center’s security and accreditation section, compiling accreditation packages for the Air Intelligence Agency
  • Supported Air Force Information Warfare C4I databases
  • Coordinated the conversion to a standard query language (SQL) relational database
  • Resolved database issues, performing database extractions and queries using standard SQL.

United States Air Force SUPPLY

10.1987 - 08.1991
  • Combat Supply System Administrator
  • As System Administrator for the Combat Supply System deployable supply system, maintained availability of supply system for the 437th Supply Squadron Charleston AFB South Carolina
  • As Supply Technician, volunteered to manage backup and recovery procedures for the combat supply system as well as help manage the Local Purchase Receiving Supply Database.

Education

MS - Management Information Systems

Bowie State University
12.2002

BS - Information Systems Management

University of Maryland University College
08.2000

Associate - Communications Applications Technology

Community College of the Air Force
03.1998

Skills

  • Cybersecurity Leadership and Management
  • Risk Management
  • Business Communication
  • Cyber Resilience and Defense
  • Zero Trust
  • Cloud Transformation
  • Cyber Architecture and Strategy
  • Cybersecurity Technology Roadmap
  • Enterprise-wide Cybersecurity Recommendations
  • Cyber Defense Operations
  • Incident Response and Remediation
  • Infrastructure and Application Security
  • Security Strategies
  • Authentic and Honest Leadership
  • Leading and Managing Teams
  • Budget Management
  • Cyber Risk Decisions
  • Cybersecurity Expertise
  • Cybersecurity Leadership
  • Cybersecurity Transformation
  • AI Security
  • Tool Rationalization and Modernization
  • Global Enterprise Security Solutions
  • Diversity and Inclusion Leadership
  • Technology Strategies
  • Security Compliance
  • Security Design and Implementation
  • Security Test and Evaluation
  • Security Policies and Guidelines
  • Information Assurance
  • Risk and Threat Analysis
  • Security Incident Management
  • Database Management
  • Disaster Recovery
  • Supply Chain Management
  • Cloud and Virtual Computing Environments
  • SOA Architect and Security
  • Information Systems Analyst Certificate
  • TA-103 Basis Traffic Analysis
  • IS-70 Electronic Signals Analysis
  • IS-80 Basic Intelligence Reporting

Certification

CISSP, 88410

Accomplishments

Cybersecurity expert across all areas of cyber resilience and defense, managing cyber risk across the enterprise. Excels at leading and ensuring enterprise cyber digital transformations and solving difficult problems through cutting edge concepts and technologies such as Zero Trust and Cloud transformation. Change agent focused on creating top performing, fiscally conscious Cyber organizations while enabling the business and leading the way in the secure AI journey. Offers over 30 years of experience delivering dynamic, relevant, cybersecurity leadership with a risk management perspective meeting the needs of the business implementing security strategies ensuring the environment remains resilient and defensible. Excels at solving the difficult problems and leading organizations, programs, and project teams into the cutting edge of cyber defense by delivering well thought out solutions and strategies. Authentic and honest leadership respected by leaders, peers, staff, and competitors. Provide positive, supportive leadership to highly skilled, diverse cyber professionals in corporate and government organizations. Ensures a zero-trust mindset within our organization and ensures our organization makes decisions to move us toward that goal.

Miscellaneoustraining

  • SAFE AGILE Leadership training
  • CCSP boot Camp
  • ACAS / HBSS training
  • SANS GCIH – Incident handling and Ethical Hacking
  • Aquia DRUPAL in a day and DRUPAL for developers
  • EMASS, XACTA – NIST 800-37 Training, Oct 2004
  • SOA Schools SOA Architect and Security Courses
  • Information Systems Analyst Certificate – Bowie State University, Oct 2002
  • MP-110 UNIX based systems; TA-103 Basis Traffic Analysis; IS-70 Electronic Signals Analysis; IS-80 Basic Intelligence Reporting – National Cryptologic School, 1994
  • Signals Intelligence Analysis and Reporting Technical Training – Goodfellow AFB, Aug 1991 – Jan 1992

Leadershipandmanagement

  • Managing Cybersecurity Defense team of skilled individuals across 4 Cyber Engineering towers
  • Supporting the CISO with responsibility of 6 million dollars of the overall cyber budget
  • Advise the organization with enterprise-wide people, process, and technology cybersecurity recommendations.
  • Responsible for successfully leading the Cyber towers through 4 major M&A events
  • Entrusted with CISO level cyber risk decisions
  • Works closely with security leadership to help guide cyber defense operations, incident response and remediation, and infrastructure and application security across the environment
  • Developed and led implementation of the Zero Trust strategy for a Fortune 500 company
  • Leads the Cyber Architecture and Strategy for large complex IT enterprise
  • Responsible for planning the Cyber Security Technology Roadmap ensuring the team meets current and future cyber challenges while supporting the needs of the business

Security Clearance

Active Top Secret SCI with CI Polygraph

References

  • Nick Anderson
  • Jim Kelly
  • Alicia Lynch
  • Aaron Helfer

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Work Preference

Work Type

Full Time

Work Location

RemoteHybrid

Important To Me

Company CultureHealthcare benefitsWork-life balanceStock Options / Equity / Profit Sharing

Timeline

ASSOCIATE VICE PRESIDENT SECURITY ENGINEERING AND ARCHITECT

Cognizant
07.2022 - Current

SENIOR DIRECTOR CYBER DEFENSE

InvictusIC
02.2022 - 07.2022

DIRECTOR CYBER ENGINEERING DEFENSE

SAIC Office of the CISO
01.2018 - 02.2022

SENIOR MANAGER CYBER ENGINEER / CYBER ARCHITECT

SAIC
05.2016 - 01.2018

CONITUOUS MONITORING LEAD; DEPUTY PROGRAM SUPPORT TEAM LEAD

SAIC
06.2014 - 05.2016

CYBER SECURITY LEAD; PORTFOLIO MANAGER

SAIC
09.2011 - 06.2014

LEAD INFORMATION SECURITY ANALYST

SAIC
09.2008 - 08.2011

Information Assurance Architect / INFORMATION SECURITY ANALYST

SAIC
12.2006 - 09.2008

SENIOR INFORMATION SECURITY ENGINEER

SAIC
09.2006 - 12.2006

INFORMATION SECURITY ENGINEER

SAIC
02.2005 - 09.2006

Information Security Engineer (System Security Expert, DEA)

SAIC
07.2004 - 02.2005

Systems Engineer (Security Engineer, FBI Trilogy)

SAIC
07.2003 - 07.2004

Systems Engineer

SAIC (Europe)
06.2002 - 07.2003

52ND MEDICAL GROUP (USAF Europe)

03.2001 - 06.2002

United States Air Force SIGNALS INTELLIGENCE ANALYST

08.1991 - 02.1998

United States Air Force SUPPLY

10.1987 - 08.1991

MS - Management Information Systems

Bowie State University

BS - Information Systems Management

University of Maryland University College

Associate - Communications Applications Technology

Community College of the Air Force
Michaelle LancasterCyber Executive