Cyber Security Accomplishments

Decent Essays
Served as the Agency’s Chief Information Security Officer (CISO), Senior Technical Advisor for Architecture and Technology, Chief Privacy Official, and Senior COOP planner. Primary functions was the CISO This position was very diverse and encompasses several IT disciplines such as Enterprise Management and operations, application development, information assurance; tactical systems and communication support and COOP. Some accomplishments are:
• Developed the agency’s IT risk management plan based on combatant requirements.
• Authored the agency’s cyber security manual which was used by the Army Cyber command as a foundational document
• Successfully redesigned the army’s enterprise management system for Communication Security Management
…show more content…
Developed enterprise-wide guidelines on how to best apply technology standards in creating business applications or best business practices. .
• Served as a senior expert in the field of cyber security, direct the day to day agency implementation of a government-wide cyber security defense strategy. Provide authoritative advice and guidance to top agency management officials on integrating cyber security initiatives with key mission-critical programs. Advise IT experts throughout the agency and its subcommands on a variety of cyber security issues that involve applying or adapting new theories, concepts, or standards.
• Successfully manage a cyber security effort with programmatic control over 400 personnel and 70,000 endpoints and servers; had the lowest intrusion rate or incident in the Army while having the largest base of computers in the Army. Successfully implemented a Deep Packet Inspection Firewall, hardware tokens, mobile data protection, converged desktop security, data at rest encryption and radio frequency identification for tracking and
…show more content…
Developed several applications (Logistics Situational Picture) that will allow the Army to track independent pieces of C4ISR equipment (5 million) as one system (this has Army Senior leadership visibility)
• Successfully implemented a SharePoint initiative for the command. Developed fielding strategy and customer support services. Developed training plan for SharePoint designers and power users
• Developed and implemented the Agency’s first Privacy Assurance program, appointed subordinate Privacy Officials, established PII training, developed command policy, developed incident tracking system, successfully increased staff to support evolving requirements and implemented several technical solutions.
• Successfully developed the agency’s COOP IT plan to support worldwide operations. Implementing hot backup site for command data and e-mail.
• Served as the senior representative to several General Officer Steering Groups on Army Information Technology and Architecture. Significant impact on the architecture and the Army’s enterprise approach in the implementation of my commands business model. Refining my commands position on Standard Service Agreements as the Army centralized IT

Related Documents

  • Decent Essays

    The next tier would be with PBUSE and Standard Army Maintenance System Enhanced or SAMS-E. The detailed services that are very intimate with the conversion process involves deployment management, organizational change of management, data cleansing, migration, user access management, GCSS-Army communications, establishment of users/super users, reengineering of business processes and data management, scope of training, deliveries and development, job aid creations, training materials for deploying epilogue, audit compliance, and operations of help desk…

    • 1874 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Unified land operation is the Army operating concept which is executed through decisive actions and guided by mission command. The Army’s framework for exercising mission command is operations process (plan, prepare, execute, and assess). Embedded by the philosophy and principles of mission command, the commander, supported by his staff, drives the operation process to execute conceptual planning or detailed planning necessary for him to understand, visualize, describe, direct, lead, and continuously assess the operation. The purpose of this paper is to reflect the knowledge I have gained on the philosophy of mission command, warfighting functions and operation process, and cogitate how can I apply it in my future assignment to effectively…

    • 1164 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    The commander may request various areas of study such as: hostile, friendly force composition, operational environment or the structure of civilian population. These activities are completed at the strategic, operational and tactical levels of war. Strategic intelligence has the broadest scope focusing on the environment, geo-political and enemy intentions. Operational intelligence involves fundamental decisions about when and where to fight. Its concentration is on the adversary’s centers of gravity.…

    • 1102 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Identifying assets for review is done by the managers of the environment under review. They will also work wit the security project manager. Asset identification and values related to it is the crucial to the business. In this part assets need to be identified especially one critical for the business operations. Assets can be physical or logical like datacenters, desktops, remote systems, network devices, systems that process, manage, and store personal information.…

    • 980 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    I want to be sincere, in my opinion our families are a very important and crucial part of our career and more importantly our lives. Therefore, they were a key consideration in developing both my long term and short term goals. My long term goal is to achieve a senior logistician position in a Theater Sustainment Command (TSC) that support forward operations while simultaneously supporting large army formations at home station. One of my highest aspirations is to be a key individual in establishes, or significantly advancing a logistics system, such as Global Combat Support System – Army (GCSS-A) which is currently replacing several logistics systems. Therefore, developed my short-term and near term goals within this…

    • 2370 Words
    • 10 Pages
    Decent Essays
  • Decent Essays

    Maj Williamson frequently conducts meetings in which the Unit Safety Representatives brief current safety items such as unit mishaps and open discrepancies. B. Unit Safety Representative (USR) Involvement: Occupational Safety: Complies: 2d Lt Bryant and TSgt Crochet was appointed the USR for the 35 Logistic Readiness Squadron (35 LRS) and were IAW 91-202, The US Air Force Mishap Prevention Program. 2d Lt Bryant and…

    • 823 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    The Department has created a four year Analytical Agenda as a way of meeting the challenges of “Big Data” and supporting analytically informed decision making throughout the DHS (“Strategic Plan”, n.d.). In efforts to improve its analytical understanding of the DHS mission, the Department implemented various helpful techniques. They developed and fostered a risk community of interest that involves gathering risk management experts from across the department to share risk data and best practices for risk assessment (“Strategic Plan”, n.d.). In addition, DHS continuously strives to acquire, develop, and utilize basic tools for data-driven management of it mission such as the ability to constantly access strategic/external risk (“Strategic Plan”, n.d.). The Analytical Agenda may also include extensive empirical modeling; estimation of the impacts of social, technological, economic, environmental, or political variables; and dashboards and support tools for strategic –level decision making (“Strategic Plan”, n.d.).…

    • 1255 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Strategy 2. Technology 3. Business Operations 4. Risk and Compliance Strategy refers to having an established plan on how businesses should handle any cyber incident they may come in contact with. There should be an established plan on how to communicate with customers when an incident occurs as well as how an internal situation should be handled. Technology refers to how the organization’s information systems and malware operate.…

    • 768 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Cyber Security Essay

    • 1297 Words
    • 6 Pages

    This document is a result of the comprehensive review of the US policies, directed at protection of the cyber space security (The White House, 2009). Among the major conclusions of the review there are the involvement of the private sector, attraction of the international attention to this issue, and enhancement of the national interest and the Department of Homeland Security’s role in the problem of the cybersecurity as one of…

    • 1297 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 5

    • 1218 Words
    • 5 Pages

    In conclusion, based on the recommendations I have listed above and the utilization of Project Management Techniques, I believe this project reasonably able to achieving its intended goals. These same techniques can be developed into the organizations culture for future projects and employed to make current processes more efficient. Should it become necessary to employ a project manager on future projects, I recommend hiring a PM who has worked previously on the type of project under consideration. This project manager will bring their unique skill set to the organization. Furthermore, I recommend the following tools should be utilized, by Amazing Software, for all future projects in order to maintain the integrity of their business model.…

    • 1218 Words
    • 5 Pages
    Decent Essays