A motivated IT professional with an active TS/SCI clearance with 20 years of technical professional and educational hands on progressive training and experience with a long-term goal for a senior management position managing personnel. Experienced in leading and directing employees, with a proven record of accomplishment with problem resolution through data analytics to present findings and issue recommendations at an executive level. Exemplary customers service skills and etiquette at various. Exceptional team building traits fostering superb management skills with a passion for mission accomplishment and customer satisfaction. Organized and dependable candidate successful at managing multiple priorities with a positive attitude. Willingness to take on added responsibilities to meet team goals. Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.
Overview
25
25
years of professional experience
Work History
Information Systems Security Officer
US State Department Bureau of Consular Affairs
03.2014 - Current
Assist over 33 contractors in guidance of applications, patches and database systems for security enhancement to enable deployment for production to consulates and embassies around the world.
Address Plans of Actions & Milestones that exist concerning findings and how it affects the ATO's of systems.
Monitor systems with detection tools that categorize anomalies and vulnerabilities detected within the organization's workstations, servers, applications and data systems within the network.
Track patches, antivirus updates, SMS, SCR aspects of vulnerability and remediation concepts
Collectively assist GTMs and Sys Admins as over site concerning security issues on any project that effects the Consular of Affairs mission.
Advise best security practices and research innovative technology for the agency to prevent hackers, viruses and anomalies of all kinds in efforts to minimize the possibilities of infiltrating the network.
Investigate instances in which policies and guidelines are not followed by the user(s) and report and remediate such instances to ensure proper protocol is followed on a case by case criteria.
Monitor iPost anomalies and vulnerabilities for CA domestic sites for Passport agencies,contractor sites and applications.
Approve and Disapprove requests for all type of admin accounts: DMZ/DOMAIN ADMIN/ CA ADMIN/ Cyber Ark and service accounts.
Monitor badging access requests and assist when complications arise for access.
Developed comprehensive security policies, procedures, and training materials to strengthen organizational security posture.
Ensured business continuity by developing disaster recovery plans and conducting regular testing exercises.
Reduced exposure to cyber threats by proactively monitoring the threat landscape for new risks or changes in tactics from adversaries.
Streamlined vulnerability management by automating scanning, reporting, and remediation tasks.
Designed secure networks by applying defense-in-depth principles that minimized attack surfaces while maintaining usability requirements for end users.
Collaborated with IT teams to integrate security best practices into system development and operations.
Conducted regular risk assessments for proactive identification and mitigation of potential vulnerabilities.
Managed incident response processes, ensuring timely resolution and minimal business impact.
Contributed towards reducing overall enterprise risk by consistently analyzing and refining the organization''s risk appetite and tolerance levels.
Increased user awareness through targeted cybersecurity training programs tailored to employee roles.
Enhanced network security by implementing robust threat detection and prevention systems.
Established effective communication channels between cross-functional departments to facilitate prompt exchange of relevant cybersecurity information.
Evaluated emerging technologies and made recommendations for strategic investments in information security tools and resources.
Performed forensic investigations following incidents to identify root causes, assess damage, and recommend appropriate mitigations or improvements in processes or tools.
Conducted security audits to identify vulnerabilities.
Performed risk analyses to identify appropriate security countermeasures.
Recommend improvements in security systems and procedures.
Developed plans to safeguard computer files against modification, destruction, or disclosure.
Reviewed violations of computer security procedures and developed mitigation plans.
Encrypted data and erected firewalls to protect confidential information.
Inspect Sites and ensure awareness of Policies and Procedures that are being followed according to NIST/FAM and FAH guidelines and regulations
Update Contingency Plans and Disaster Recovery Procedures
Issue out Locks and ensure SF 700/701 and 702's are completed with security compliance/ end of day check and safe opening and closure checks.
Responsible for new installation and training for implementation of 100 CAC readers and software for over 300 personnel onboard ship
Obtained an additional 200 CAC readers to install allowing all personnel access to vital websites with no additional cost to the command through utilization of resources, networking and effective communication
Upgraded Unclassified and Classified computers throughout the command to include 8 servers -for equipment valued up to Over $400,000 and maintained quality assurance and coordination of upgrade
Created a customer help desk tracking log that increased customer service productivity by over 45 percent which decreased customer support delays by over 80 percent and assisted with detecting trends that effected the system health of servers which circumvented server degradation and allowed technicians to become proactive in system maintenance and analysis
Monitored VERITAS backups for Microsoft Exchange Server(s)
Developed hardware, software applications and maintained licenses
Created design architecture of the network topology
Implement and monitored all levels of classification for systems in accordance with DoD guidelines
Establish IA policies and guideline consistent with DoD directives concerning ports, protocol management, vulnerability management, biometrics, security management, IA education and training, mobile code and interconnection between domains
Provide IA support to DoD components as required to assess the threats and vulnerabilities of components of Information technologies.
Work Center Supervisor Information Technician
US Navy - CTF57 (Command Task Force Unit)
12.2009 - 03.2010
Maintained Video Teleconferences and establish the communications through loading the crypto for top officials on a Globally level- with pertinent time stamps with 98 percent effect communications 2 percent disreputability/100 percent efficient trouble shooting techniques and re-connectivity
Secure Voice Over IP Phones - Administrator for troubleshooting discrepancies with connectivity
Monitored and maintained surveillance and communications on the watch floor with other units in the field abroad
Messaging Center Administrator- helped maintain successful message traffic for command which is essential in assisting in carrying out the command's mission
24/7 message processing
Create the command's watch schedule and ensure all personnel adhere to their assigned watches for CTF57 Command Task Force Unit in Bahrain with special operations.
Crypto Management
System Administrator/Network Tech/DoDIIS Instructor
US Navy - European Service Command/DIA
02.2005 - 12.2009
Joint Duty Assignment at DoD level providing intelligence products and services to US War fighters, senior military leaders and civilian defense lead in support of military operations
Trained 300 personnel on a new system, DoDIIS, increased productivity by 400% with a 100% effective training rate and reduced account creation process for customers by 60%
Worked cohesively with contractor engineers with weekend scheduled maintenance of all systems Windows and Oracle based
Responsible for successfully installing 30 new required Linux based systems
Assist with world-wide global help desk
Conduct daily system administrative tasks on the network through active directory and respond to trouble calls and requests.
System Administrator/Assistant Squadron Duty Officer
US Navy- VS22 Squadron
01.2001 - 11.2009
HetDeveloped and maintained computer hardware, software applications and licenses
Create design architecture of the network topology as it exists in the environment in the command. Implement and monitor levels of classification for all systems in accordance with D0D guidelines
Design mitigation plan for possible degradation of system services
Validate appropriate documents through Designated Approving Authority to ensure the command receives Authority to Operate - maintain IATO while procedure is in process of being established
Inspection and validation process takes approximately 6 months- licenses are good for approximately 2 years
Administrative procedural documentation and paperwork is maintained, managed and updated to the Information Systems Security Officer and the Network Security Officer
Develop command presentations and training instruction for all personnel entering the command on policies and procedures concerning network security and Information Security
Additionally, periodically re-iterate command wide training of information assurance awareness
Provide everyday guidance and assistance with user(s) questions concerning emails, spam, computer phishing and anti-virus malware concerns- providing solutions and answers to technical computer issues
Utilize manpower by training, appointing and initiated designation in writing of 15 command TASO's (Terminal Areas Security Officers) to assist with minor administrative duties to minimize trouble calls and directly assist with departmental computer task and technical issues
Increased command productivity by 50% to help maintain command readiness for mission critical evolutions
Provide information assurance support to DoD components as required to assess the threats to the vulnerabilities of components of information technologies
Generated a web based resource that accesses current D0D and Federal IA and IA related policy guidance and guidelines
Conduct monitoring and develop risk assessments to detect, isolate and react to active penetration and testing to isolate intrusions and disruption of service
Establish IA policies and guidelines consistent with DoD directives concerning ports, protocol management, vulnerability management, biometrics, security management, IA education and training, mobile code and interconnection between domains
Maintained digital forensics investigations by monitoring and scanning all personal drives on the network and the network share drive
Utilized the Internet Security Acceleration Server to can for unauthorized use of un-prohibited web sites as documented by command policy and DoD guidelines as advised by the "Black List"
Evidence is researched and validated as being un-authorized and sent to the Network Security Officer to block from the firewall
Evidence is maintained in a secure location
Information is passed up the chain to higher authorities to decide punishment and prosecution as applicable
Utilization of Host Based Security System and secure Configuration Compliance Validation Initiative VRAM Retina to conduct scans on the network and validate patching
Scans to detect USB, IPOD, IPAD, MP3 or attachment of unauthorized cameras or electronic devices to government computers.
MESSAGE CENTER TECHNICIAN/TECH CONTROL OPERATOR
NAVAL OCEAN PROCESSING FACILITY (NOPF)
01.1999 - 02.2001
Maintain 12 hour watches on the watch floor consistent with 24/7 message traffic monitoring
Maintain crypto feeds and VTC
Continuous ship to shore communications through GCCS
OTAT and OTAR communications
Maintain consistent Radioman duties/ LAN administrative duties and capabilities
Watch of all communications
Message traffic Load Crypto CMS
Maintained a safe work environment by strictly adhering to established safety protocols and guidelines.
Theodore Jackson |(Bureau Security Officer) | 202-970-0036 | JacksonT3@State.Gov
Timeline
Information Systems Security Officer
US State Department Bureau of Consular Affairs
03.2014 - Current
Information Systems Security Officer
US Navy "Mesa Verde Ship -LPD 19"
02.2010 - 03.2013
Work Center Supervisor Information Technician
US Navy - CTF57 (Command Task Force Unit)
12.2009 - 03.2010
System Administrator/Network Tech/DoDIIS Instructor
US Navy - European Service Command/DIA
02.2005 - 12.2009
System Administrator/Assistant Squadron Duty Officer
US Navy- VS22 Squadron
01.2001 - 11.2009
MESSAGE CENTER TECHNICIAN/TECH CONTROL OPERATOR
NAVAL OCEAN PROCESSING FACILITY (NOPF)
01.1999 - 02.2001
Bachelor's Degree of Science - Communications
WINGATE UNIVERSITY
Similar Profiles
IVY MEADSIVY MEADS
Passport Specialist Adjudicator/Project Assistant - Remote at Department Of State/Consular Affairs/Passport AgencyPassport Specialist Adjudicator/Project Assistant - Remote at Department Of State/Consular Affairs/Passport Agency
<p>Foreign Assistance Program Officer</p>
<p></p> at Bureau of Europe and Eurasian Affairs, U.S. Department of State<p>Foreign Assistance Program Officer</p>
<p></p> at Bureau of Europe and Eurasian Affairs, U.S. Department of State