Cyber Security Accomplishments

Improved Essays
Served as the Agency’s Chief Information Security Officer (CISO), Senior Technical Advisor for Architecture and Technology, Chief Privacy Official, and Senior COOP planner. Primary functions was the CISO This position was very diverse and encompasses several IT disciplines such as Enterprise Management and operations, application development, information assurance; tactical systems and communication support and COOP. Some accomplishments are:
• Developed the agency’s IT risk management plan based on combatant requirements.
• Authored the agency’s cyber security manual which was used by the Army Cyber command as a foundational document
• Successfully redesigned the army’s enterprise management system for Communication Security Management
…show more content…
Developed enterprise-wide guidelines on how to best apply technology standards in creating business applications or best business practices. .
• Served as a senior expert in the field of cyber security, direct the day to day agency implementation of a government-wide cyber security defense strategy. Provide authoritative advice and guidance to top agency management officials on integrating cyber security initiatives with key mission-critical programs. Advise IT experts throughout the agency and its subcommands on a variety of cyber security issues that involve applying or adapting new theories, concepts, or standards.
• Successfully manage a cyber security effort with programmatic control over 400 personnel and 70,000 endpoints and servers; had the lowest intrusion rate or incident in the Army while having the largest base of computers in the Army. Successfully implemented a Deep Packet Inspection Firewall, hardware tokens, mobile data protection, converged desktop security, data at rest encryption and radio frequency identification for tracking and
…show more content…
Developed several applications (Logistics Situational Picture) that will allow the Army to track independent pieces of C4ISR equipment (5 million) as one system (this has Army Senior leadership visibility)
• Successfully implemented a SharePoint initiative for the command. Developed fielding strategy and customer support services. Developed training plan for SharePoint designers and power users
• Developed and implemented the Agency’s first Privacy Assurance program, appointed subordinate Privacy Officials, established PII training, developed command policy, developed incident tracking system, successfully increased staff to support evolving requirements and implemented several technical solutions.
• Successfully developed the agency’s COOP IT plan to support worldwide operations. Implementing hot backup site for command data and e-mail.
• Served as the senior representative to several General Officer Steering Groups on Army Information Technology and Architecture. Significant impact on the architecture and the Army’s enterprise approach in the implementation of my commands business model. Refining my commands position on Standard Service Agreements as the Army centralized IT

Related Documents

  • Decent Essays

    Is3350 Unit 1

    • 190 Words
    • 1 Pages

    1. Critically evaluate information gathered from multiple sources, reconcile conflicts, decompose high-level information into details, abstract up from low-level information to a general understanding, and distinguish user requests from the underlying true needs using tools such as Entity relationship diagram, Flow charts, workflow modelling. 2. Investigate and analyze business processes, organization & services. 3.…

    • 190 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Serves as the Plans Officer for the G5 section of the 416th Theater Engineer Command (TEC). Responsible for the planning and coordination of all GCC/ASCC engineer support request for assistance within the 416th TEC. Accountable for the development of the RFA SOP, monthly ARSOUTH status reports, sync meetings, and engagement support. Required to organize and manage the Request for Assistance (RFA) database; participates in boards, bureaus, and working group. Reviews issues regarding RFA support and assists in resolution of issues that impact the 416th TEC and subordinate units.…

    • 142 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    EXECUTIVE ORDER 13735 Executive Order 13735, “Providing an Order of Succession Within the Department of the Treasury,” was issued on August 12, 2016 by President Barrack Obama. This executive order lays out the order of succession should the Secretary of the Treasury be unable to perform his or her duties due to death, resignation, or is unable to fulfill their duties of the office. The Executive Order also describes the exceptions to the order.…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Rfp Task 5

    • 1162 Words
    • 5 Pages

    • Copies of relevant configuration, network and system topology documentation. • Access to relevant internal and external systems as needed. TASK 2: BES CYBER ASSET, BES CYBER SYSTEM, SECURE ARCHITECTURE DESIGN (CYBER) & PHYSICAL SECURITY DRAWING The Supplier will develop the NERC CIP project BCA List based upon the NextEra NERC CIPFPL CIP-002-6 procedures defining the NextEra BES Assets, the proposed Electronic Security Perimeter (ESP) design, the IM Corporate Controls Network design and the OEM system designs. Developing the BCA List may include the following activities (as required): 1.…

    • 1162 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Data security in the healthcare sector must be persistent and sufficient in ensuring the privacy and protection of patient’s information. The developing threat postured by malicious coding, such as viruses and worms, and unethical hackers can by reduced by the utilization of government standardize security controls. For instance, the Health Insurance Portability and Accountability Act has established security necessities regulations to ensure the protection of health information. However, organization must address the potential risk existing an internal and external networks to tackle threats effectively. Developing an effective network infrastructure by using resource hardware components as switches and routers to boost network security can reduces business operations interruption from attacks.…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    9/11 Core Competencies

    • 372 Words
    • 2 Pages

    Thesis: The 9/11 Commission (2004) discovered flaws with the Intelligence Community concerning information sharing, integrating intelligence, and following through on potential intelligence leads. This led to organizational changes with the establishment of the Director of National Intelligence (DNI), the Department of Homeland Security (DHS), and the National Counterterrorism Center (NCTC). The Intelligence Community consists of 16 organizations, led by the DNI. Each organization works within the DNI’s policy framework. The DNI established IC policy to advance the IC mission objectives to meet national security needs.…

    • 372 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    I must understand all the activities associated with the Commanders Activities. I will understand the intent; I will need to understand the commander’s visualization, bridge the gap between the staff and higher headquarters. I must learn to collaborate with other partners, and assist in the validation process, provide feedback during the operational art and the operational approach development. As the CSM, I will ensure that we are utilizing all the tools within the Army Design Methodology and or Military Decision Making Process (MDMP) so that we can better facilitate to the staff during the planning process. I will help describe the process to the staff and subordinates so that they have a shared understanding what the Commanders activities entail and assist in this process.…

    • 674 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    There are five major management systems addressed by ICS: command, operations, planning, logistics, and finance. Command encompasses developing, directing, and maintaining communication and collaboration with multiple agencies on site. Operations handles the tactical portions, coordination with command objectives, and organizes and directs all resources. Planning provides the information required to develop the plan of action and evaluates information as it is collected. Logistics provides personnel, equipment, and support.…

    • 998 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Profession In The Army

    • 531 Words
    • 3 Pages

    I will strive to integrate personnel services that best support my Commander's operation at every stage of execution. I will provide continuous personnel service support operations during build-up, surge, and combat operations. I will provide rapid and responsive support in all situations. I will be innovative and resourceful. I will improvise new systems of support when standard systems fail.”…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Millions of Americans depend on the Department of Homeland Security to protect their information including addresses, phone numbers, and other online information that is stored on the DHS’s network. Although cyber attacks can happen at any time, the Department of Homeland Security has many agencies to stop these attacks. The National Cybersecurity and Communications Integration Center (NCCIC) is one of the many agencies that works to stop and address cyber attacks. It is a 24/7 cyber awareness management center. It addresses threats and other incidents affecting our cyber infrastructure to the public to warn citizens about keeping their information…

    • 883 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Advancement In Military

    • 533 Words
    • 3 Pages

    The advancements in information technology within the United States Army changed the battlefield. Through the identification of improvement that I have seen in my eighteen year military career, I will show changes on the battlefield in the areas of surveillance, communication and planning. Surveillance is a key part to the planning of any military operation. In the beginning of my career I would have sat in a two to four man Reconnaissance and Surveillance position and passed information about what I had seen back to my higher element, but once I left that position I could no longer verify that what I had reported had not changed.…

    • 533 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays