Strategic leader with 30 years of IT experience. Proven leader in directing operations, maintenance, and support of complex systems. Practiced at maintaining, analyzing and troubleshooting computers and peripherals. Highly motivated and results-driven when resolving IT issues and interacting with staff and customers.
· Trained 9 person information assurance office enforcing cybersecurity for critical operations in high stress, dynamic situations, sustaining availability of network to support operations.
· Mentored project teams to resolve customer business problems on time and budget. Led, engineering (developed statements of work, project plans/architecture designs), coordination (detailed implementation plans, deployment plans) and integration of IT projects valued in excess of $54M.
· Collaborated with business partners and IT staff. Implemented cybersecurity strategies to meet business goals and enforced security governance dictated by industry and DoD policies securing classified/unclassified desktops/servers.
· Conducted risk assessments using Risk Management Framework, integral to accreditation of two networks and “Approval to Operate”/“Approval to Connect” authorization of 54 servers.
· Performed validation and testing of complex technical security directives, policies, standards, plans, and procedures related to overall enterprise security posture.
· Generated technical reports/formal briefings for executive leaders on network vulnerability status/corrective action recommendations to prevent potential cybersecurity events and ensure a secure environment.
· Tested and validated procedures IAW NIST SP 800-53 revision 4, ensured Cyber Security policies enforced and required controls implemented to meet regulatory requirements.
· Created configuration management board, enhanced requirements processing and cross-functional communication among departments easing network integration and sustainment.
· Impacted network security, analyzed 6K server security logs annually. Investigated/triaged incidents and escalated actual/potential cybersecurity events for corrective actions.
· Reduced cryptographic key creation from 2 days to 10 minutes. Upgraded key management infrastructure server and established high speed communication link.