Overview
Work History
Education
Skills
References
Summary
Work Preference
Alphas; Always lead proudly with humility and accountability.
Timeline
Generic

Thomas M. Gilmore

IT Specialist (Infosec)
Loganville,GA

Overview

14
14
years of professional experience

Work History

Guide, IT Specialist

Performance
- 03.2018
  • 53, NERC, NEI 08-09, Regulatory, 5.71, FISMA, CoBIT, SOX 1 and SOX 2, and ISO2007, Trusted Agent, Archer, Service Now and HP Service Manager
  • Awards:
  • Civilian of the Quarter 08/05/2020
  • Superior Performance Award 03/15/2020
  • Time off Award 04/22/2019
  • Annual Performance Award 03/12/2019
  • Annual

Office of Chief Information Officer

PLNS
11.2017 - Current
  • Center for Disease Control
  • Served as the Alternate Team lead for a period of 4 months during the absence of the team lead, providing solutions and recommendations with regards to Security Accreditation Assessments
  • Consistently involved in strategic planning to resolve or aide in system development and minimize system vulnerabilities
  • Reviews or evaluates the organizations risk based decisions, working with various internal security organizations, such as the Firewall Team, Engineering and Technologies Branch, Forensics and Third Party Web Applications
  • Conducts risk-based evaluations, such as exceptions to policy, end of life Waivers and alternate settings request and advise Senior Leadership on risk
  • Consistently works in collaboration with various entities including Information Systems Security Officers, Operations, Firewall and Engineering Technologies Branch Teams
  • Diligently called upon to create, develop, or modify SOP’s or User Guides for various software tools, within the organization
  • Thoroughly examine Architectural designs and compare against security frameworks
  • Successfully managed a team of seven contractors in support of the organizations objective to meet Government Accountability Office (GAO) compliance requirement for Standard Operating Procedures and User Guides
  • Fostered the idea of Technology Day and assisted with the development; receiving numerous accolades and a direct request from the CIO to make it a larger event.

Cyber Security Specialist

TEKsystems | V.C
11.2016 - 06.2017
  • Developed processes and procedures in support of organizations Cyber Security Program
  • Facilitated meetings with various vendors to determine if the technology should be considered for procurement
  • Conducted weekly briefing with Senior Leadership to discuss tools technologies and capabilities
  • Reviewed federal and state revised guidelines and provide recommendations to management for changes to protect integrity of the organizations program
  • Reviewed information pertaining to cyber security assessments of Critical Digital Assets and advise program on mitigation strategies
  • Lead the technical system plans, though provoking engagements with Key stakeholders, including the CISO, shared information and idea’s in planning design, development, security testing, and implementation of new technologies to either detect, block, or mitigate system security risk and vulnerabilities.

Cyber Security Specialist

TEKsystems | Ameren
09.2014 - 05.2016
  • Provided cyber security, cyber vulnerability assessments and mitigation strategies for industrial control systems
  • Authoring reports, facilitating, and hosting meetings, data gathering and data analysis
  • Conducted inspections and audits of system functions within the scope of the Cyber Security Program
  • Facilitated meetings with Design and System Engineers to discuss industrial systems and operational requirements; reviewed drawings, manuals, and configuration plans to determine system vulnerabilities and provide mitigation strategies
  • Employed measures to prevent viruses or other malicious or unwanted programs from propagating information between security levels
  • Assisted with the development of the organization incident response program, through documentation review, commentary, and feedback.

IT Security Compliance and Risk Management Team Lead

McKesson-Health & Information Technology
Alpharetta, GA
08.2013 - 02.2014
  • Assisted with the developmental processes and protocols improve efficiency and performance of computer network defense responses
  • Communicated objectives with management team and team members in order to improve organizations security posture
  • Provide technical analysis, near real-time auditing, analysis, reporting, and tracking of security-related activities
  • Aided in the development of Information Security Risk Management standards, practices, and other related guidance within ISRM team
  • Communicated concerns with management and change management review board members, to determine appropriate methodologies for system integration.

Supervisory IT Specialist

CSTSPT, Defense
Fort Leavenworth, Kansas
01.2011 - 09.2013
  • Provided solutions and recommendations within scope to the Network Enterprise Center on IT security related concerns
  • Created/Deleted/Transferred user accounts within Active Directory Enterprise Domain, Organizational Units
  • Reviewed metrics to verify vulnerability remediation strategy was effective, recommended changes whenever necessary
  • Benchmark, analyzed, reported, and made recommendations for the improvement of the IT infrastructure and IT systems and Patch Management Program
  • Establish and maintain regular written and in-person communications with the organization’s executives, department heads, and end users regarding pertinent IT activities.

Supervisory IT Specialist

PLC, Department of Defense
Wiesbaden
02.2010 - 01.2011
  • Spearheaded the establishment of Europe’s First Regional Cyber Command center, created at the hand of 5th Signal Commands Commanding General
  • Managed 12 Helpdesk employees providing customer service and support to over 2300 employees within the European region: including multiple servers, laptops, and various OS’s
  • Organized the implementation of User Awareness Training Program and maintained training records
  • Developed and implemented cross training program to minimize shortages of personnel
  • Performed duties as Senior Security Watch and Information Systems Security Officer during two intrusion prevention exercises.

Education

Master of Science - Information Technology Manager w/Information Assurance and Cybersecurity Management

Trident University

Bachelor of Science - Business Administration, Project Management

Trident University

Leadership Training OCOO Leadership Academy, Cohort III Senior Leaders Course Advanced Leaders Course Equal Opportunity Leaders Course Basic Non-Commissioned Officer Leaders Course Primary Leadership Development Course Certifications and Trainings Certified Information Security Manager (CISM) Project Management Professional Certified Cloud Security Professional (CCSP) Certified Ethical Hacker (CEH) Certified Information System Security Professional CompTIA Security - undefined

Skills

  • Summary of Skills
  • Program Leadership
  • Train Employees
  • Team Leadership
  • Budgeting and Resource Management
  • Control of Expenses
  • Customer Service
  • Policy and Procedure Improvement
  • Change Management
  • Information Confidentiality
  • Business Management Principles
  • Strategic Direction
  • Critical Thinking
  • Verbal and Written Communication
  • Process Improvement
  • Strategic Planning
  • Business Continuity
  • Recruitment and Hiring
  • Data Privacy
  • Remote Team Management
  • Cybersecurity

References

References available upon request

Summary

IT professional with {33] years of experience developing and implementing security solutions in fast-paced environments. Skilled in solving complex IT problems and Customer Service and Resolution with a proven history of delivering exceptional risk management support and collaboration with various engineers, developers, auditors, and assessors.

Work Preference

Important To Me

Company CultureWork-life balanceCareer advancementWork from home optionPaid time off401k matchPaid sick leavePersonal development programsStock Options / Equity / Profit Sharing

Alphas; Always lead proudly with humility and accountability.

I do not consider myself and Alpha, but it is the title that many have given me, so I created this mantra for myself, that I will always lead proudly with humility and accountability. It is important to be the type of leader that others are inspired to follow. It is my belief that leaders should have a high moral compass and support their team in getting the job done right.

Timeline

Office of Chief Information Officer

PLNS
11.2017 - Current

Cyber Security Specialist

TEKsystems | V.C
11.2016 - 06.2017

Cyber Security Specialist

TEKsystems | Ameren
09.2014 - 05.2016

IT Security Compliance and Risk Management Team Lead

McKesson-Health & Information Technology
08.2013 - 02.2014

Supervisory IT Specialist

CSTSPT, Defense
01.2011 - 09.2013

Supervisory IT Specialist

PLC, Department of Defense
02.2010 - 01.2011

Guide, IT Specialist

Performance
- 03.2018

Master of Science - Information Technology Manager w/Information Assurance and Cybersecurity Management

Trident University

Bachelor of Science - Business Administration, Project Management

Trident University

Leadership Training OCOO Leadership Academy, Cohort III Senior Leaders Course Advanced Leaders Course Equal Opportunity Leaders Course Basic Non-Commissioned Officer Leaders Course Primary Leadership Development Course Certifications and Trainings Certified Information Security Manager (CISM) Project Management Professional Certified Cloud Security Professional (CCSP) Certified Ethical Hacker (CEH) Certified Information System Security Professional CompTIA Security - undefined

Thomas M. GilmoreIT Specialist (Infosec)