Summary
Overview
Work History
Education
Skills
Certification
Availability
Timeline
Generic

Mirabelle Pardinez Pagala

Port Orchard,United States

Summary

Experienced security engineer with expertise in implementing and managing robust security protocols. Proficient in conducting thorough threat analysis, risk assessment, and vulnerability management. Committed to fostering effective team collaboration and delivering tangible results. Known for adaptability and reliability in addressing evolving needs. Strong background in network security, encryption, and incident response.

Overview

24
24
years of professional experience
1
1
Certification

Work History

Information Systems Security Engineer (ISSE)/ISSO/Cybersecurity Lead

Department of the Navy
07.2022 - Current
  • Company Overview: Naval Undersea Warfare Center, Keyport, Enterprise Systems Engineering Division, In-Service Engineering Department, Code 412
  • Website: [Navy](https://www.navy.mil)
  • As the Advance Skills Management (ASM) Information Systems Security Engineer (ISSE)/ISSO/Cybersecurity Lead, I serve as the local Cybersecurity expert for the overall responsibility for the Cybersecurity Program
  • I am also responsible for the Risk Management Framework (RMF) for ASM, ensuring the system is compliant and all policies/documents meet Cybersecurity regulations
  • Successfully completing ASM’s reauthorization Authorization to Operate (ATO) package
  • Reviews and evaluates the security impact of system changes
  • Coordinates cybersecurity for database design, development and maintenance of all automated data systems
  • Completed a 100% RMF Security Control, Assessment Procedure testing
  • Revised RMF Security Control policies, in order to close out vulnerabilities
  • Manage ASM’s Plan of Action & Mitigations (POAMs) ensuring vulnerabilities are updated, mitigated and/or remediated
  • Also manages ASM’s DoD Information Technology Portfolio Repository (DITPR) and the Navy DON Applications and Database Management System (DADMS), ensuring ASM’s information and portfolio is current and updated
  • Reviews ASM’s quarterly Security Technical Implementation Guides (STIGs) and Assured Compliance Assessment Solution (ACAS) scans
  • When new vulnerabilities are identified, I make sure it is inputted in the Enterprise Mission Assurance Support Service (eMASS) system
  • Manage ASM’s Plan of Action & Mitigations (POAMs) ensuring vulnerabilities are updated, mitigated and/or remediated, through eMASS
  • Conduct Incident Response training with the ASM team
  • And facilitate COOP exercises
  • Naval Undersea Warfare Center, Keyport, Enterprise Systems Engineering Division, In-Service Engineering Department, Code 412
  • Website: [Navy](https://www.navy.mil)

Information Systems Security Officer (ISSO)

Landstuhl Regional Medical Center (LRMC)
05.2020 - 07.2022
  • Company Overview: Information Management Division, Cybersecurity Branch
  • Website: [LRMC](https://www.lrmc.health.mil)
  • As an Information Systems Security Officer (ISSO), serves as the focal point for all aspects of the cybersecurity program providing expert advice and guidance pertinent to cybersecurity program policies, guides and procedures during all stages of the automation process
  • I manage/review/analyze LRMC’s Information Assurance Vulnerability Management (IAVM) program by utilizing Assured Compliance Assessment Solution (ACAS) and Tanium, ensuring System Administrators (SA) and Information Management Officers (IMO) mitigate vulnerabilities within the Category (I, II, III) timeframe
  • Conducts in-depth analysis of the RMF accreditation packet through a comprehensive review of the POAM, Hardware/Software list, Topology, and Cost Estimate Tools and various artifacts related to medical systems
  • Manages LRMC’s Army Training and Certification Tracking System (ATCTS) to ensure users are compliant with cybersecurity training
  • Information Management Division, Cybersecurity Branch
  • Website: [LRMC](https://www.lrmc.health.mil)

Cybersecurity Manager

598th Transportation Brigade
08.2017 - 05.2020
  • Company Overview: Unit 6713
  • Website: [Army](https://www.army.mil)
  • As the Brigade's Information Systems Security Manager, I serve as the local technical expert for the overall responsibility for the Cybersecurity program which includes Vulnerability Management, hardware and software security, procedural security, data communications security, and AIS media security
  • Manages Army Training and Certification Tracking System (ATCTS) to ensure users are compliant with cybersecurity training
  • Plans, develops, implements and maintains Brigade programs, policies and procedures to protect the integrity and confidentiality of automated systems, networks and data
  • Conducted, reviews and maintains the Brigade’s cybersecurity posture, utilizing USAREUR’s Cybersecurity Assessment Readiness Tracker (CART) to ensure the Brigade is compliant at the 15 functional areas in the Risk Management Framework (RMF) that provides Confidentiality, Integrity, and Availability (CIA) to Army in Europe Networks
  • Appoints, manages, reviews and audits the technical work of Brigade cybersecurity security officers (IASOs) and other personnel assigned in any of the Brigade's organizations and involved in information system security including system administrators (SAs) and network managers
  • Ensures automated system design and developments involving both in-house and contractual efforts, comply with department of defense (DOD) and Army cybersecurity requirements and participates in system changes and modifications to insure the development of related system security policies and measures
  • Develops systems security contingency plans and data recovery procedures
  • Reviews and evaluates the security impact of system changes including interfaces with other systems
  • Coordinates cybersecurity for database design, development and maintenance of all automated data systems
  • Developed, coordinated and maintained the Brigade’s Plans of Action and Milestones (POAM) to ensure the Brigade was compliant will all 15 functional areas in the Risk Management Framework
  • Reviewed and evaluated accreditation documentation, received from the Brigade’s higher Headquarter, before submission to USAREUR G6 Cybersecurity Branch, in order to receive an Authority to Connect, for systems specific to SDDC, on the EUR Domain
  • Serves as the focal point for all aspects of the cybersecurity program providing expert advice and guidance pertinent to cybersecurity program policies, guides and procedures during all stages of the automation process
  • Enforces security policies and safeguards for Brigade/Battalions systems including stopping system operation if warranted by the seriousness of security violations
  • Develops information management security plans, local policy guidance, regulations and procedures, and standard operating procedures to ensure cybersecurity regulatory requirements are followed
  • Provides oversight for cybersecurity programs ensuring compliance with overall Brigade plans and higher authority policies and guidance
  • Conducts and participates in various cybersecurity security meetings with Brigade organizational elements and representatives of other Brigades to plan, evaluate, and determine appropriate measures needed to ensure security requirements are met
  • Gives presentations, in regards to the Brigade’s security posture, at meetings with Brigade and battalion level officials
  • Unit 6713
  • Website: [Army](https://www.army.mil)

Information Technology Specialist (INFOSEC)

Department of the Army, HQ 7th Signal Command (Theater)
09.2010 - 08.2017
  • Company Overview: 423 22nd Street, Bldg 21715, Augusta, GA 30905
  • Website: [Army](https://www.army.mil)
  • Served as a Cybersecurity Specialist for the 7th Signal Command Theater (7th SC (T))
  • Responsible for providing 7th SC (T) Cyber Security oversight for 217 circuits within 3 brigades, 2RCC, and 88 NECs
  • Conducts in-depth analysis of the RMF accreditation packet through a comprehensive review of the POAM, Hardware/Software list, Topology, Various Artifacts related to circuit accreditation
  • Perform risk assessments for the 7th SC (T) Authorizing Official (AO) regarding technical and administrative compliance with DoD, DA, DISA Security Technical Implementation Guides (STIGs) and NETCOM IA regulatory requirements and policies over existing IT resources within CONUS
  • Establish and maintain SCA Validation schedule for the 7th SC (T) Area of Responsibility (AOR)
  • Coordinated with U.S
  • Cyber Command, Defense Information Systems Agency, Headquarters, NETCOM, Department of the Army, Army Commands and subordinate Army organizations and commands to ensure assessments yield meaningful, measurable data that advance the overall operational security of the organization
  • Developed policies and tactics, techniques and procedures (TTPs) for capabilities impacting information systems for unclassified, classified and SCI information
  • Assessed and analyzed VTC, CX-I, ISP, PPS and VPN connections for compliancy before recommending approval for the AO signature
  • Established vulnerability reporting criteria, to enable the AO to assess risk during accreditation activities across programs and systems for all types of vulnerabilities
  • Review, evaluate and implement new security policies
  • 423 22nd Street, Bldg 21715, Augusta, GA 30905
  • Website: [Army](https://www.army.mil)

Information Technology Specialist

Department of the Army, HHC, 21st Theater Sustainment Command (TSC)
08.2006 - 09.2010
  • Company Overview: G6, Operations Division, Panzer Kaserne, Kaiserslautern, Rheinland-Pfalz, Germany
  • Website: [Army](https://www.army.mil)
  • Provide policy guidance and assists users in defining requirements
  • Initiate corrective actions on telecommunications deficiencies to ensure adequacy and reliability for accomplishment of command goals and objectives
  • Assist incoming personnel in meeting all required IA training to ensure compliance with installation security policy and to obtain computer security accounts
  • Interpret policy and guidelines based on DOD and Army directives, regulations, and operational and technical manuals pertaining to command and control (C2) and telecommunications systems and programs
  • Apply resourcefulness, initiative, and judgment based on knowledge and experience in interpreting, adapting, and applying guidelines and in developing solutions to problems where precedents are not applicable and in developing guidelines for use by others
  • Manage and implement the Command's operational Cybersecurity (IA) program by ensuring all government computer users are compliant with mandatory IA training on a yearly basis
  • Project Lead on Data-At-Rest (DAR) implementation/sustainment for the 21st Theater Sustainment Command and subordinate Brigades
  • Conducted DAR Train-the-Trainer courses to properly train the S6 personnel on the installation of DAR and resolution to most DAR issues that they may encounter
  • Serve as the Alternate Smart Card Logon (ASCL) Trusted Agent for the Command, ensuring System Administrators' ASCL are issued and revoked in a timely matter
  • Administer and maintain the Command and subordinate brigades' Army Training and Certification Tracking System (ATCTS)
  • Ensure personnel are compliant with the Cybersecurity (IA) mandatory training and documents, to include the DOD IA Awareness Training, Acceptable Use Policy and other mandatory training within the Theater
  • Project lead on the installation of Intrusion Detection Systems (IDS) for classified storages
  • This involves coordination with the Provost Marshall's Office (PMO), G2, DPW & Comptroller on the survey and approval for open storage
  • Assist in monthly Command Inspections within the entire 21st TSC
  • Ensure Brigades/Units/Sections are in compliance with the IA program and users meet the personnel security requirements for gaining access to the Army information systems
  • Assist in scanning government workstations/laptops for any vulnerability using the Retina software
  • Ensure the systems are updated/baseline according to regulations, if any vulnerabilities are found
  • Serve as the Command's COMSEC (Communication Security) Manager, accountable for 52 COMSEC Hand Receipt Holders providing guidance, policies and procedures on the process and storage of sensitive/classified information/materials
  • Successfully passed 2 DA CSLA COMSEC Audits (2007 & 2010)
  • Served as a Project Manager in telecommunications and assisted in the planning and administration of the organization's Information Systems Security Management Program (ISSMP)
  • G6, Operations Division, Panzer Kaserne, Kaiserslautern, Rheinland-Pfalz, Germany
  • Website: [Army](https://www.army.mil)

Information Technology Specialist (Customer Support)

Department of the Army, 69th Signal Battalion
05.2004 - 07.2006
  • Company Overview: Network Service Center Wurzburg, Wurzburg, Bayern, Germany
  • Website: [Army](https://www.army.mil)
  • Served as the NSC (Network Service Center) Help desk Manager/ASIPR Network Manager Assistant/Systems Administrator
  • Managed the NSC Help Desk, including diagnosing and resolving problems in response to customer reported incidents and providing service in a timely manner
  • Researched, evaluated and provided feedback on problematic trends and patterns in customer reported incidents
  • Installed, configured, troubleshot, and maintained customer hardware and software
  • Developed and maintained problem tracking and resolution databases, customer service performance requirements, customer support policies, procedures and standards
  • Provided formal and informal training ensuring user understanding of the relationship of the system as well as the ability to utilize the system without undue interruption
  • Consulted with customers to identify and specify network/system requirements
  • Involved in the planning of system implementations and performed needs analysis to define opportunities for new and improved business process solutions between the NSC Help desk and its customers
  • Managed accounts, network rights and access to systems and equipment and systems resources which included the following: performance, capacity, availability, serviceability and recoverability
  • Worked with Windows NT Server, Windows NT Workstation, Exchange Server 2003, Windows XP and other network operating systems environment to support full range of local and corporate information systems
  • Analyzed exchange server log files, performed system and data backup procedures and monitored server performance
  • Developed and documented system administration standard operating procedures (SOP)
  • Implemented security procedures and tools and managed the installation and integration of systems fixes, updates and enhancements
  • Duties also involved: diagnosing and resolving network problems; installing, testing, maintaining and upgrading network operating systems software and hardware; defining and maintaining network architecture and infrastructure; configuring and optimizing network servers, routers, hubs, and switches; analyzing and defining network requirements and workload
  • Ensured the strict application of security/cybersecurity policies, principles, and practices in the delivery of data management services
  • Network Service Center Wurzburg, Wurzburg, Bayern, Germany
  • Website: [Army](https://www.army.mil)

Computer Assistant

Department of the Army, 30th Signal Battalion
07.2001 - 04.2004
  • Company Overview: SIPRNet Management Group, Honolulu, HI 96818, United States
  • Website: [Army](https://www.army.mil)
  • Maintained continuous surveillance over the operation of the network and its gateways, switches, terminal servers, communication circuits, attached computers and interfaces to the DISA facility or DDN network
  • Received network, communications, and related operating systems from various sources
  • Trouble-shot network and application server hardware, operating system software, and peripheral network equipment such as routers, bridges, cabling system, MDF/IDF distribution frames, patch and test facilities, network interface cards, modems, multiplexers and concentrators
  • Upon identification of a network disruption, assessed the extent and operational impact of the disruption and initiated service restoral actions; isolated source of the disruption and coordinated/advised/directed the local network analyst/system administrator in the troubleshooting efforts; isolated contributing factors to complex trans-network disruptions and initiated/directed concurrent multiple location corrective actions
  • Conducted testing to insure operability, efficiency, and compliance with existing published standards and directives
  • Monitored operation of the network and ensured that hardware and software were functioning properly and that operation standards were met
  • Reviewed, evaluated, and fine-tuned components to achieve peak efficiency within the overall network connectivity
  • Partnered with user support personnel to train organizational personnel and functional end users on use of classified/unclassified office automation computers, local and wide area networks, and other automated tools
  • Performed repairs and corrections to enhance or restore connectivity or function to the network/system
  • SIPRNet Management Group, Honolulu, HI 96818, United States
  • Website: [Army](https://www.army.mil)

Education

Bachelor's Degree - Computer Information Science

University of Phoenix
Honolulu, HI
06.1998

Skills

  • Security Vulnerability Assessment
  • Access Control Management
  • Vulnerability Assessment Skills
  • System Security Hardening
  • Regulatory Compliance Auditing
  • Cybersecurity Architecture Planning
  • Security Policy Formulation
  • Secure Application Development
  • Security Incident Monitoring
  • System Patch Management
  • Threat Prevention Strategies
  • Incident Management
  • Disaster Recovery Strategy

Certification

Certified Information Security Manager, CISM, 2013

Availability

Permanent, Full-Time

Timeline

Information Systems Security Engineer (ISSE)/ISSO/Cybersecurity Lead

Department of the Navy
07.2022 - Current

Information Systems Security Officer (ISSO)

Landstuhl Regional Medical Center (LRMC)
05.2020 - 07.2022

Cybersecurity Manager

598th Transportation Brigade
08.2017 - 05.2020

Information Technology Specialist (INFOSEC)

Department of the Army, HQ 7th Signal Command (Theater)
09.2010 - 08.2017

Information Technology Specialist

Department of the Army, HHC, 21st Theater Sustainment Command (TSC)
08.2006 - 09.2010

Information Technology Specialist (Customer Support)

Department of the Army, 69th Signal Battalion
05.2004 - 07.2006

Computer Assistant

Department of the Army, 30th Signal Battalion
07.2001 - 04.2004

Bachelor's Degree - Computer Information Science

University of Phoenix
Mirabelle Pardinez Pagala