Education and Certifications
Bachelor of Arts in Organizational Communications (added Artificial Intelligence and Cybersecurity), Thomas Edison State University, New Jersey 06/2018
Certifications
License
Initial Certified (Date)
Expire Date
(ISC)2 CISSP
842501 (Re-Exam 7/2023)
September 2020
September 2027
EC-Council CEH
ECC9653820174
February 2020
Google Associate Cloud Engineer
211147435
July 2020
July 2022
Comp TIA Linux+
July 9, 2022
Splunk Core User
N/A
Courses
Deep Learning with TensorFlow and PyTorch, 08/2020
Open Data Science Conference
Cloud Engineering with Google Cloud Specialization, 06/2020
Credential ID: ETB9APEKPV86 Coursera
2020 AWS Sagemaker, AI, Machine Learning Specialty, 05/20/2020 Udemy
Network Security Expert Levels 1 & 4, 02/2020
FortiNet
Autopsy Basics and Hands On (8 hours), 02/2020
Autopsy Digital Forensics
Deep Learning and NLP – A-Z, 10/2019
Udemy
Machine Learning A-Z: Hands on Python & R in Data Science, 09/2019 Udemy
Amazon Web Services Certified – 4 in 1, 3/3/2019 Udemy
In-Work Certifications
EC-Council Certified Penetration Tester (C PENT) v 10
Offensive Security OCSP (25% complete)
Work Experience
Infrastructure Developer Programmer 3, 8/2022 – Present
The Applied Research Laboratory at Penn State University – Contracted to San Diego, California
Supporting Modeling and Simulation programs between San Diego, Hawaii, and other US sites, specializing in air gapped environments and 'Dark Cloud'. Skilled in bringing modern applications / application development processes to air gapped environments with automation, datacenter clusters, and server/rack design.
Specialization in automated hardware and operating systems installation
Network Design and Deployment, including MLAG/LACP
Network test development
Mixed classification environments, multiple operating systems and controls
Cybersecurity Engineer / RMF, 6/2021 - 8/2022
Forward Slope On Contract to Naval Information Warfare Command - Pacific
Cybersecurity analyst providing Risk Management Framework (RMF) assessment and authorization (A&A) support for the Department of Defense (DoD) and the Naval Information Warfare Center (NIWC)
Developed and managed policies within the NIST 800-53 series and supporting libraries, including documentation DISA STIG management against more than 600 controls for application security and development across five different software applications, at the same time.
Collected various artifact related to cybersecurity and information assurance (IA) compliance programs to ensure rapid application authorization, including STIGs, ACAS, CWE, CVE, and HBSS outcomes.
Work against a distributed team spanning multiple level of developers, government counterparts and subcontractors to communicate risk management and lessons learned to reduce manhours as possible.
Created new RMF toolkit into a virtual machine environment that improved Rapid Assess and Incorporate Software Engineering process to include building out 449 controls into a "STIG-like" checklist.
Helped develop Model-Based System Engineering documentation and diagrams, contributing two weeks to create software architecture complexity.
Worked with systems owners, government managers, and other stakeholders to manage cybersecurity requirements.
Created network information flow and authorization boundary diagrams to document system interactions from application source to host wide-area networks and enclaves.
Chief Mass Communication Specialist (Main Role), June 1994 – July 2021 (Highlights from 8 years)
With Defense Media Activity (Maryland).
Assisted in organization-wide security training development and configuration management using Federal Risk and Authorization Management Program at Defense Media Activity (Maryland).
Experience in building code for 13 HR projects, including $2.1M inventory control system for shipboard supplies, multimedia department, and information technology systems.
Professional graphic designer, photographer and journalist, who also led teams into and deployed to high-sensitivity areas / missions, including combat tours.
Experience in a broad collection of information security
Global Operations and Policy Chief. Wrote two Department of Defense-level instructions for American Forces Radio and Television Services operations
Risk Management Framework (RMF) Documentation. Part of a group of systems security team to successful award of an Authority to Operate (ATO) for new archival and broadcast system for the DoD. Authored updates for numerous RMF artifacts to include AAR, POAM, RAR, and SCTM. Reviewed STIGs for compliance and modification for global broadcast media and information systems, network appliances and multiple clearance segmented LANs.
Leadership and Security Compliance. Lead numerous systems security teams specific efforts to ensure security compliance with International Security Assistance Force – Afghanistan while deployed into combat with Naval Special Warfare, providing execution of information security and development of information warfare / non-kinetic operations
With United States 3rd Fleet (San Diego)
Database Development. Developed real-time Access database solution for the world's largest, 26-country maritime exercise, supporting a true-to- life wartime training environment. Led a three-person team to create front-end UX and database architecture.
Implemented data controls and smart coding in compliance with Federal information regulations
Developed qualifications tracker in spreadsheet ingestion for a 256-person duty shift, across 14 watch stations, improving training completion rates. Hailed as a shipboard standard and adopted across seven sections, reducing training times by 33%
With Naval Special Warfare Group One (San Diego) – Information Operations
Performed mobile and network penetration tests against adversarial cell phones and networks in U.S. Central Command combat region.
Developed processes and techniques to perform ongoing security assessments to draws operational intelligence and conclusions for targeted missions. Communicated technical vulnerabilities and remediation steps to operational teams to better defend tactical centers.
Perform mobile and network penetration tests against adversarial cell phone and networks
Develop process and implement tools and techniques to perform ongoing security assessments
Analyze security tests results, draw conclusions, and developed targeted testing as deemed necessary
Communicate technical vulnerabilities and remediation steps to operational teams
Implemented 36 radio station network for information dissemination and anti-propaganda efforts
Instructor Experience
Cybersecurity Teaching Assistant, 07/2019 to 10/2022
University of California – San Diego / Trilogy Education Services
Teaching Assistant 134 students through four (4) six-month boot camps in cybersecurity certification prep.
Influenced and developed technical solutions and course curriculum, e.g., Kali Linux, Python and scripting, server hardening, cloud security, penetration testing, and digital forensics.
Administered virtual labs and projects packet analysis, vulnerability assessments and information security operations, cloud architecture, and threat modeling.
Performed grading, class admin, and remediation tutoring.
Created nine custom virtual machines to challenge students in the penetration training module.
The curriculum provides a breadth as well as depth of knowledge into the key areas of cybersecurity
Networking, Packet Analysis / Wireshark
Systems:
Windows and Linux Administration / Windows and Linux Security Hardening
Cybersecurity
Secure Network Design and Architecture
Risk Management
Cryptography
Vulnerability Assessment, Identity and Access Management
Cloud Security
Nessus / Splunk / ELK installation and operations
Ethical Hacking and Penetration
Metasploit, Hashcat, Burp Suite, Web Vulnerabilities and Security
Programming and Scripting
- Bash
- PowerShell
- Python
Chief Petty Officer, 09/2007 to 7/2021
United States Navy
Led many multi-disciplinary teams to accomplish missions throughout the world. Notably, I have led four teams of four into live combat. Additionally, I have trained more than 520 Sailors in firefighting, anti-terrorism warfare, cybersecurity, and mass communications.
Built a solid understanding of cybersecurity practices, operations risk and strategies while working for American Forces Radio and Television Services, deploying technology from Alaska to Antarctica.
Helped ensure commands understood and followed NIST 800 series, as well as international laws and agreements for deployed bases.
Strategic communicator with demonstrated success in helping an Afghan governor rebuild his cabinet.
Comfortable with fast-paced, results obtained attitude. Can function independently without supervision.
Project Experience
Lead Data Engineer – Omdena, 08/2020 to 11/2020
Lead an international team to create a natural language processing data pipeline from more than 800,000 messages. I led this data team to code, structure and successfully create a chatbot with the ability to detect sentiment. This project has been published.
Lead Data Engineer/Advisor – SavetheChildren.org, 11/2020 to 2/2021
Creation of a grooming-safe chatbot using Natural Language Processing techniques to protect children online. Published two research papers in developing new and improved machine learning.
My involvement in developing a chatbot aimed at protecting children online from predators. This project focused on leveraging machine learning and data science to create virtual assistant capable of providing sentimental support of conversations to guide children while they communicated online.
I worked closely with worldwide team of data engineers, data scientists and specialists, including child psychologists and online safety specialists. We aimed to build a chatbot that would be both informative and provide consideration, allowing children to feel comfortable seeking advice when facing potential online risks. I was lead data engineer and machine learning developer.
To ensure effectiveness, we built a new curated corpus for it. The chatbot was programmed to recognize and respond to common online safety concerns, such as inappropriate content and online predators. It provided age-appropriate warnings to children. I focused on was making the chatbot's responses support sentiment or conversational meaning. I worked on training it to understand and respond appropriately through machine learning text analysis to help provide feedback to the child. I was primarily focused on machine learning system for data processing and study, resulting in published two papers on the system’s creation.