SAIC - Colorado since Oct 2008
Infrastructure Defense & SOC/CSIRC Manager
GE Oil & Gas 2012 - 2013
Industrial Control System Cyber Security
DHS 2009 - 2012
ICE SOC/CSIRC & Infrastructure Defense Manager
Emergency Management Academy 2011 - 2011
SOC/CSIRC Manager
Petter Jamision Consulting, Inc Oct 2008 - Jun 2009
Security Consultant / C&A Program Manager
Education:
George Mason University 1992 - 1995
B.A, Philosophy
Emergency Management Academy
Skills:
Critical Infrastructure Immigration Law Ibm Technical Reviews Traits Iso Cost Veritas Penetration Testing Frameworks Blueprint Reading Site Specific Security Awareness Cia Pda Ssh Secret Replication Siem Microsoft Certified Systems Engineer Categorization Design Vulnerability Assessment Impact Assessment Fixtures Technical Team Odbc Sms Slip Routers Transparent Correlation Gap Cissp Swimming Incident Response Discrete Isolation Troubleshooting System Security Operations Center Staff Management Dmz Essentials Map Dlp Removing Complexity Information Security Policy Strategies Wireless Networking Active Top Secret Serial Security+ Disk Policy Sla Security Design Government Experience Scripting Mission Critical Eprise Vpn Documentation Project Management Commercial Real Estate Hardware Cisco Vpn Information Technology Packet Equip Test Planning Disruption Perspective Coordination Security Analysis Business Development Communication Greenwood Village Active Privacy Law Delay Symantec Dams Marketing Change Management Security Management Business Case Metadata Paths Philosophy Data Logging Facilities Management Family Medicine Responsibility Usa Firewalls Fips Policies and Procedures Obtain New Services Information Server Active Directory Itil Trust Fax Server Physical Security Reclamation Defects Ipsec Guidelines Corporate Headquarters Compliance Addressing Customer Experience Management Proposal Writing Owa Capturing Logging Enterprise Security Mason Vulnerability Scanning Writing Air Force Patch Management Help Desk Support Ids Sound Screening Infrastructure Import Acting Vulnerability Seats Ras Novell Finance Nids Access Control Wins Proxy Ipx Failure Temporary Placement Sme Wan Calls Organizational Leadership Miis Information Assurance Private Ip Checking Crm Redundant Indesign Atm Networks Auditing Alerts Hosting Sharepoint Accounting Linux Methodology Data Center Radius Disaster Response Guidance Networking Local Area Network Mcafee Switches Engineering Reports Red Hat Linux Extensions Testing Disaster Recovery Ssl Solution Nsf Teamwork Wep Mitigation High Availability System Monitoring Microsoft Security Policy Promoting Advertising Agency Dhs Sap Cip Layers Backup Exec Brewing Usps Configurations High Voltage Fix Protocol Risk Frameworks Specs Business Expansion Advertising Energy Restoration Bia Logic Programming Risk Assessment Executive Leadership Emergency Management Security Audits Project Planning Security Clearance Power Control Servers Identity Media Technical Solutions Log Analysis Websites Ipx/Spx Digital Certificates Shell Cisco Technologies Nsa Efficient Portals Intrusion Detection Nt 4.0 Microsoft Sql Server Process Improvement Performance Reviews Outlook Boundaries Privacy Network Communications Corporate Security Internal Controls Libraries Announcements Vault Arranging Enterprise Vault Config Nec Architecture Schema Novell Netware Databases Top Secret Windows Server Verisign Security Implementation Voyager Radar Checkpoint Drops Big Picture Vendors Third Parties Beos Sales Versed Jump Assessment Tools Translation Digital Preservation Security Controls Web Hosting San Executive Positions Cism Adoption Network Security Clearances Windows Xp Incident Command Password Resets Detection Https Nokia Security Continuous Improvement Hp Enterprise Solutions Scenario Cyberguard Integration Sop Pki Rules Wap Publications Defense Source Algorithms Philadelphia Wiring Remote Infrastructure Management Manuals Tests Cornerstone Security Tools Strategy New Process Internet Protocols Nat Raid Cooperative Network Technologies Encryption Strategic Leadership Mtd Soc Customs Regulations Solaris Virus Identity Management Emerging Technologies Remote Access File Sharing Data Retention Boundary Pix Nmap Vmware Lutron Rivers Analysis Surveillance Business Continuity Planning Power Systems Master Data Visionary Transmission Web Servers Ditscap Gas Rfp Dns Operating Systems Dos Virginia Accountability Applications Hipaa New Business Opportunities Mechanical File Servers Detail Security Assessments Workshops Suite Visibility Electricians Industrial Control Omb Broomfield Network Administration Remediation Project Sarbanes Oxley Act Contractual Agreements Ftp Fisma Destination Tape Unix Change Requests Counters Internal Audit Postal Iron Means Smo Netbackup Purchasing Code Open Source 3Des Fault Technical Leadership Reviews Computer Security Legal Advice Emergency Operations Organizational Behavior Alarm Systems C&A Platforms Contingency Wireless Disaster Iss Ssp Gaps Positioning Critical Infrastructure Protection Consulting Ice Cvss Netbios Windows Situational Awareness Giac Authentication Network Diagrams Word of Mouth Hubs Change Control Programming Netscape Enterprise Server Cyber Security Riskwatch Legal Law Enforcement Php Information Security Management Assessment Drinking Discovery Accelerator Management Cyber Hardening Contractors Lan Wan Data Backup Routing Nerc Data Storage Ldap Hyena Public Speaking Security Operations It Audit Justification Doi Recovery Strategies Searches Foundation Business Services Data Recovery Team Leadership Windows 2000 Baltimore Homeland Security Tcp/Ip Vulnerability Management Agreement Sold Norton Ghost Technical Documentation 24 Hours Training Intelligent Agents Enterprise Software Printers Virtual Business Impact Analysis Reporting Incident Ppp Information Security Workstations Accreditation Nessus Appliances Configuration Management Schedules New Clients Ips Business Operations Cost Savings Protection Systems Architectural Design Surprise Glba Electricity Indexing Technical Support Microsoft Certified Professional House Business Process Mapping Data Migration Laptops Dod Dhcp Art Intelligence Classification Sprint Microsoft Exchange Electronics Government Nist Connectivity It Risk Iis Windows Vista Ports Gsec Software Windows Nt Charter Mac Sungard Business Continuity Topic Systems Management Decision Making Fairfax Cve Scanners Financial Transactions Credit Scoring Knowledge Management Wikis Inclusion Mock Security Policy Development
Interests:
Science and Technology Health
Certifications:
Sans Global Industrial Cyber Security Professional (Gicsp) License 46026 Lean Six Sigma Green Belt License 00672 Scada Security Architect (Cssa) Sans Institute (Isc)², License 46026 Ge Oil & Gas Federal It Security Institute, License 00672 Infosec Institute Cissp Federal It Security Professional Designer (Fitsp)
Writing Critical Infrastructure Air Force Sql Server Critical Infrastructure Protection Patch Management Windows Server Consulting Specifications Ids Noc Ice Screening Infrastructure Scada Service Desk Cap Vendors Compressor Ctq Sales Iso Ato Situational Awareness Authentication Commercialization Vulnerability Veritas Hubs Novell Customer Presentations Nids Information System Proxy Ipx Protocol Iaas Law Enforcement Clearances Ssh Assessment Epo Wan Microsoft Certified Systems Engineer Procurement Design Vulnerability Assessment Impact Assessment Cyber Hardening Science Contractors Security Miis Odbc Information Assurance Auditor Integration Sop Routers Pki Hiring Keys System Architecture Nerc Correlation Leadership Iec Ldap Gap Splunk Publications Security Incident Response Sharepoint Linux Cissp Defense Isa Incident Response Daily Operations Radius Networking Enterprise Operations Manuals Mcafee Security Operations Center Education Switches Wireshark Map Homeland Security Tcp/Ip Engineering Strategy Vulnerability Management Nat Extensions Inventory Raid Ownership Norton Ghost Wind Power Distribution Risk Management Readiness Training Soc Policy Disaster Recovery Mission Critical Vpn Documentation Identity Management Mitigation Server Administration Complexity Theory Pptp Project Management Nmap Boundary Interconnection Pix Vmware Options Ppp Hardware Business Continuity Planning Encase Security Policy Steam Emergency Information Technology Notification Dhs Information Security Sap Cip Accreditation Gas Production Operations Power Generation Rfp Security Analysis Brewing Dns Controllers Nessus Accountability Business Development Communication Ips Lan Bia Operations Mason Security Training Marketing Omb Industrial Control Change Management Security Management Glba Emergency Management Steps Metadata Technical Support Forest Philosophy Remediation Paas Fisma Latin America Dod Cloud Computing Sarbanesoxley Act Small Group Internal Audit Fips Firewalls Rsa Envision Nuclear Pressure Nsa Information Server Active Directory Intrusion Detection Open Source Reviews Reclamation Government Nist Ipsec Green Belt Iis Eoc Visio Materials Software Performance Reviews Solarwinds Video Field Operations Boundaries Algorithm Design Business Continuity Proposal Writing Analytical Skill C&A Announcements Contingency Cve Protection Epa Enterprise Vault Liaison Appraisals Lists Government Officials Iss Architecture Schema White Papers
Jun 2009 to 2000 Manager Infrastructure Defense Group (IDG) Security Operations Center/Computer Security Incident Response Center (SOC/CSIRC) Immigration & Customs Enforcement; Dept of Homeland SecurityMODIS Broomfiled, CO Jun 2009 to Dec 2009 Security Operations Center (SOC) Security Consultant
Education:
Emergency Management Academy New York, NY Jan 2011 to Jan 2011 Felowship in Emergency ManagementGeorge Mason University Fairfax, VA Jan 1995 Bachelor of Arts in Philosophy
Skills:
Management, Security Management, Information Security Incident Response & Handling, Emergency Management, Vulnerability Management, Business Continuity, Information Assurance, Strategic Advisor, Business Development, Proposal writing, Cloud Computing Security, IR&H, Management, Project Management, Defense in Depth, Business Impact Assessment (BIA), Disaster Recovery/Business Continuity, Security Policy, Assessments, Boundary Protection, Network/Server Administration; Public Speaking, Consulting & Technical Support.
Youtube
05 First interest in audio recording
Edward (Ted) Marshall has been at the forefront of classical music rec...
Duration:
4m 51s
My Girlfriend & I SCAM MEN (With Carly Incont...
Today Carly Incontro & Erin Gilfoy (whom you may recognize from the vl...
Duration:
1h 18m 39s
Ep. 439 - Chadd Wright - White House Winter P...
439. Andy, Chadd Wright & DJ CTI: White House Winter Plan, State Depar...
Duration:
2h 1m 57s
Immigrant Mother statue in Cleveland Croatian...
The statue of the Immigrant Mother was placed in the Croatian Cultural...
Duration:
1m 58s
Dennis Kucinich and John Borkowski at rededic...
Polish American Congress President John Borkowski introduces Polish VI...