Security Scenarios

Decent Essays
Our team is well versed in the Security Operations and has the expertise to provide the required functional and administrative security support to NSWCDD as well as fleet support to DNA through the use of dedicated clerical and administrative support staff. With over twenty years of experience Zenetex continues to provide an extensive variety of complex security services in accordance with, and in support of, applicable local and national security policies and directives across numerous active contracts. This experience which spans across a wide spectrum of security levels and accesses which would be adapted and used to develop and maintain requisite operating procedures beyond and inclusive of those provided with the POA&M.

Section C.4.1.1
…show more content…
To support of this security posture the security team will integrate itself into the currently established security infrastructure by participating in command security team meetings and reporting directly to the Command Security Director (CSD) and appointed security investigators any security incidents or events that may occur. Additionally our security team will assist the CSD and Security Investigators queries regarding security concerns by providing requisite documentation and statements as necessary. Our security team will additionally support command operations by establishing direct communications with key personnel both within and external to the command to directly address security questions and concerns. Our security specialists will additionally develop a comprehensive set of procedures for establishing and maintaining accounts for SIPR and Joint Worldwide Intelligence Communications (JWICs) networks for command employees. These procedures will be documented in Standard Operating Procedures (SOP) which will be developed, maintained and regularly reviewed by our security team to ensure that it remains complete and relevant to command operations and will be published to the CSD, Security and resident staff as updates are integrated to ensure that they are cognizant of latest security processes, procedures, and documentation

Related Documents

  • Improved Essays

    MISSION AND VISION The mission of the 90th Security Support Squadron [SSPTS] is to “Protect F.E. Warren AFB and defend America with the world’s premier ICBM force” (F.E. Warren Air Force Base Fact Sheet, n.d.). The vision of the 90th SSPTS is “Ready to fight ... Anytime, Anywhere” (F.E. Warren Air Force Base Fact Sheet, n.d.) .…

    • 622 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    SSG Alvarado served as the primary Anti-Terrorism Level II officer from April 2015 to Aug 2016 for the 2-30 IN BN. His knowledge and expertise led to the implementation of the first Anti-Terrorism Plan for the BN. SSG Alvarado offered multiple briefings to CMD Teams concerning AT awareness, terrorist group operations, terrorist use of weapons of mass destruction, active shooter threat, and insider threat. SSG Alvarado took his knowledge forward to implement TB-Gamberi's first AT Plan IOT comply with CENTCOM's OPORD…

    • 82 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    The Criminal Individual Division, who duties include CSI has one SAC (Special Agent in Charge) and three active duty SA’s Redstone CID Office 502nd Military Police Battalion (CID) Redstone Arsenal, AL 35898-7240 E-mail: usarmy.redstone.3-mp-gp.list.redstone-arsenal-cid-office@mail.mil Phone: 256-876-2037 DSN: 746 http://www.cid.army.mil/units-by-state.html Any information from this paper cannot be printed. It is not the intent of the author or researcher for it to be released or printed publicly. An official request for information for authorized print must be requested through the following url below: The Public Affairs Officer serves as the single point of contact for Public Information by facilitating news media queries, coordinating and disseminating news releases and media advisories, coordinating and executing media events, supporting Command Information and Community Relations, managing the Public Release Approval System, and processing Freedom of Information Act requests.…

    • 1767 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Exercise Marlinspike II

    • 1058 Words
    • 5 Pages

    Over 30 organizations have joined together for one exercise at the Combat Readiness Center, Gulfport, Mississippi, from April 3-6, 2017. Exercise Marlinspike II is an interagency training designed for a unified response to weapons of mass destruction (WMD) threats. The exercise was hosted by Mississippi Army National Guard’s 47th Civil Support Team (CST) based in Flowood, Mississippi. Exercise Marlinspike was done in April of 2015 with numerous organizations participating.…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    CPT Hartman Case Summary

    • 293 Words
    • 2 Pages

    CPT Hartman served as a Contract Packet Manager and the interim OIC, for the Kuwait Base Operations and Security Support Services (K-BOSSS) contract. She successfully processed 25 K-BOSSS packet valued at $5.2M. Her meticulous attention to detail and contractual expertise attributed to the essential life-support and services for 100K+plus personnel traveling, forward. Ultimately, the OCSC successfully accomplished the mission without sacrificing quality or compromising CENTCOM contractual policies or standards throughout the AOR. CPT Hartman served as the ASG-Commander liaison with the Army Contracting Command (ACC) for the K-BOSSS 64 appointed Contracting Officer Representatives (CORs). CPT Hartman successfully integrated the contractual line of efforts, supporting the down trace tenant organizations, 1TSC, CJTF and USARCENT by the implementation of critical logistical solutions.…

    • 293 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    Issues that pose risk to missions are: “providing sufficient enabling capabilities, building partnership capacity, and securing DoD systems in cyberspace.” In example, an ally or partner’s lack of ability or willingness to support common goals may present an operational risk. When it comes to cyberspace, a failure to secure systems would pose a major risk to operations, personnel, and mission accomplishment. In such cases operational risk may be mitigated through the development of bilateral and multilateral capacity to improve interoperability to protect common interests through security cooperation, agreements, and…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    As the Authorized Service Interruption (ASI) Manager, I will manage the life cycle and daily operational requirements of the Authorized Service Interruption management process for all requested maintenance actions in accordance with procedures, instructions and established deadlines barring any unforeseen circumstances. I will conduct one audit of the ASI process to ensure it is fit for purpose. Document and report issues, concerns, and risks that impact the success of the ASI, CM, and RDM process's. I will act as an escalation point for Echelon CTR cocerns, ensuring the timely notification of ASI, and timely Situational Awareness to leadership. I will monitor the assessment of DISA, third party, and DXC ASIs for impact to Navy customers…

    • 214 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Redland Negotiation Paper

    • 532 Words
    • 3 Pages

    Therefore, this mandate will create a security force compromised of international and local parties. The security force will be organized to be as diverse as possible. The force will be recruited as follows (1) Each task security force will be composed of security advisors from the nations of Oakland, the United States, and the United Kingdom. (2) Each Security advisor is there to train, monitor, and evaluate every individual in that task force.…

    • 532 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Arms Room Soop Analysis

    • 239 Words
    • 1 Pages

    a. AR 190-11, Security of AA&E b. AR 190-45 c. AR 380-5, Army Information Security Program d. AR 710-2 e. DA Pam 710-2-1 f. DA Pam 190-51 3. RESPONSIBILITIES. a. Company Commander: (1) Responsibility. Have overall responsibility for the control and accountability of arms, ammunition and explosives (AA&E) and sensitive items within their unit. (2) Ensure SOP Compliance.…

    • 239 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The Department of Homeland Security (DHS) describes ethics as, “especially high standards of honesty, impartiality, character, and conduct” (DHS, 2003). Ethics are an integral part to any government agency. Government employees who are entrusted with intelligence and sensitive information must possess a high level of ethics, due to the risk of exploitation of this information. In my position as a Coordination Center Officer (CCO), I deal with situations and information that are sensitive.…

    • 289 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Today the agency’s investigative mission has evolved from enforcing counterfeiting laws to safeguarding the payment and financial systems of the United States from a wide range of financial and computer-based crimes. To combat these crimes, the Secret Service has adopted a proactive approach, using advanced technologies and capitalizing on the power of task force partnerships. The U.S. Secret Service has a vital role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance. Other directives address the need to combat worldwide organized crime that targets the citizens and financial institutions of the United States.…

    • 866 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Security Works, Inc. has just been awarded a high priority, high visibility contract/project that will require us to develop and maintain a proper DoD security policy that is required to meet DoD standards for delivery of the technology services. Upon winning this high demand contract with the DoD, Security Works, Inc. is now obligated to meet all government standards that the U.S. Air Force Cyber Security Center or AFCSC enforces. Other guidelines within this contract that have to be followed in order for Security Works, Inc. to stay compliant to all laws and security measures falls under the Federal Information Security Management Act (FISMA). FISMA is United States legislation that defines a comprehensive framework to protect government…

    • 1874 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    FBI Role In The US

    • 1788 Words
    • 8 Pages

    Another member of the United States Intelligence Community that has a notable role in the protection of the United States interests is the Federal Bureau of Investigations or for short, FBI. Unlike the CIA, the FBI does not directly involve itself in foreign intelligence. The FBI operates under the Department of Justice with a primary focus on federal criminal investigation and domestic intelligence but sometimes there is a cross over and the FBI finds itself involved in terrorist and foreign intelligence. Although the FBI’s headquarters are in Washington, DC, it also has over fifty field offices across the country and also has diplomats stationed in U.S. embassies and consulates. With the FBI as a part of the United States Intelligence Community,…

    • 1788 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Army Recommendations

    • 846 Words
    • 4 Pages

    When deployed on foreign soil at a United States military installation as the most senior EOD Technician, my responsibility included serving on a Homeland Security committee for the base. One important skill set to have had is to interpret the criteria as established in the EOD Technician’s Logic Tree, and incorporate knowledge of standard threats for the installation, as identified by the base commander. The challenge that the senior EOD technician, who is acting as an Anti-Terrorism Officer faces is to maintain Operational Security with a civilian population of workers who need to know about base aircraft activities and troop movements. Additionally, the manner in which an EOD Technician functions depends on the operations speed related to the current quantity of threats from groups and local citizens. During my deployment to Kyrgyzstan (2008-2009), my objective was to make the base safe within the parameters set forth by the host nation, and the United States, gathering intelligence and consulting with the Office of Special…

    • 846 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Operations security or OPSEC is the process of protecting unclassified information that can be used against us. According to the Operations Security Professional’s Association, Operations security presents us with challenge of putting ourselves in the shoes of our threats from individuals, groups, other countries, foreign espionages, or organizations (Operations Security Professional’s Association). Operation security is primarily related to the military, but operations security can be related to the government or police stations as well as preventing home break-ins or preventing fraud. Operations security is important within a government or police station because it creates the mindset of thinking like your enemy or opposition in order to…

    • 1133 Words
    • 5 Pages
    Improved Essays