Post Job Free

Resume

Sign in

Quality Assurance Security

Location:
Portland, TX, 78221
Posted:
February 05, 2013

Contact this candidate

Resume:

G LENN A. MARTIN

**** *** ***** ********, **, ***74

361-***-**** ab83os@r.postjobfree.com

I T D I R E C T O R / I N F O R M AT I O N A S S U R AN C E S P E C I AL I S T

Security Management • Network Management • Systems/Security Analysis

Dedicated and versatile IT professional with a strong background in developing and maintaining complex

Government / DoD LAN, WAN, and enterprise network solutions. Expertise in overseeing technology

improvement initiatives and implementing proven IT security policies and practices. Experience in

establishing short- and long-range IT development goals, objectives, policies, and operating procedures.

Keen ability to interpret end-user needs, manage technical staff to translate requirements into solutions,

and coordinate efforts of internal and external technology resources to realize deliverables. Bold, energetic,

and hardworking team leader able to forge strategic partnerships while building consensus across multiple

organizational levels to achieve project goals. Hold an active Top Secret security clearance with a

counter intelligence polygraph and a Certified Information Systems Security Professional (CISSP).

CORE COMPETENCIES INCLUDE:

Strategic Project Management Planning IT Security Project Management

• •

IT Infrastructure Design / Development Web Application Design & Production Support

• •

Management IT Security / Operational Policy Development

Network Vulnerability Assessment / Intrusion Database Design and Management

• •

Scanning Team Building and Leadership

Quality Assurance & Application Testing

PROFESSIONAL EXPERIENCE

Information Assurance Specialist, DS INFORMATION SYSTEMS – Camp Zama, Japan 2009 to 2012

Recruited to perform a wide range of functions to analyze, ensure, and improve the overall security,

confidentiality, integrity, and availability of all information systems on the Pacific LandWarNet (PLWN) in

mainland Japan. Involved in a wide range of DoD / Army information system security issues including

Information Assurance (IA) program management, IA vulnerability management (IAVM), policy review and

compliance, certification & accreditation (C&A), exercise support, protected distribution system (PDS), IA

and security training, and command inspections. Provided strategic planning, authoring numerous IT

security standard operating procedures (SOPs), quick response checklists (QRCs), and information

assurance procedures (IAPs). Provided input and guidance on projects, operations, and exercises to

ensure actions were carried out in accordance with DoD and Army information security policies, standards,

and best business practices. Regularly briefed the 78 th Signal Battalion Commander regarding the security

status of the PLWN, and presented recommendations to improve operations and security.

Key Achievements:

Successfully managed all the pre and post inspection actions for DoD, DISA, and other vulnerability

assessments including the DoD Information Assurance Certification and Accreditation Process

(DIACAP), Cyber Command Readiness Inspection (CCRI), and Command Inspection Program

(CIP). Direct tasks included artifact collection and review, facility inspection, interview and

documentation preparation, vulnerability mitigation, Plan of Action & Milestones (POA&M) updates

and maintenance, and briefing the United States Army Pacific (USARPAC) Designated Approving

Authority (DAA) about the inspection results and post inspection activities. Inspectable areas

include business continuity, disaster recovery, incident response, vulnerability management,

security training, and various other administrative and technical controls.

Primary adviser for the IAVM program for all Army information systems in Mainland Japan.

Performed analysis of raw vulnerability data and recommended courses of action to the 78th Signal

Battalion Commander, Information Assurance Manager (IAM), and Information Assurance team

that substantially improved the security of the network, and the efficiency of the vulnerability and

patch management process.

Responsible for all aspects of the DIACAP C&A process for all Army units in mainland Japan.

Reviewed, processed, and tracked subordinate and tenant unit Authority to Connect (ATC) and

Authority to Operate (ATO) request packages to ensure regulatory compliance and obtain approval

from the USARPAC DAA.

Implemented formal procedures for conducting in-depth investigation into potential network

intrusions, unauthorized computer use, and classified data spills for entire area of responsibility

(AOR).

Served as the primary point of contact for 100+ Information Management Officers (IMOs) and

Information Assurance Support Officers (IASOs) to provide guidance on IA issues. Organized and

briefed at monthly meetings between tenant unit IMOs and the 78 th Sig Bn Command and IA team

to exchange ideas, provide training, and discuss other items of interest.

Managed the certification and training program for all IMOs, IASOs, and 2700+ end users. Tracked

and maintained records to ensure IMOs and IASOs met and maintained certification requirements

for their positions in accordance with DoD and Army regulations. Enforced annual end user training

requirements and provided guidance in the areas of IA awareness, secure portable electronic

devices and removable storage media handling, personally identifiable information (PII) protection,

Phishing awareness, and social media and operations security training.

Architect of multiple software solutions utilized to manage hardware, software, meet inspection

requirements, and improve the vulnerability, patch, change management processes.

System Analyst, MACAULAY-BROWN INC. – San Antonio, TX 2004 to 2006 / 2008 to 2009

Recruited to provide technical expertise, innovative ideas, and leadership in order to meet and surpass

client expectations, develop intellectual property, and grow and acquire new and existing contracts.

Primary tasks focused on areas including reverse engineering, red teaming, intellectual property and tool

development, network mapping and traffic analysis, and technical writing. Served as the lead reverse

engineer on a red team charged with reverse engineering protected software applications in order to meet

customer objectives. Coordinated with customers to gather project requirements and deliver bimonthly

project status reports. Guided team members in understanding project objectives, and reverse engineering

techniques, methodologies, and reporting. Proposed and/or developed numerous pieces of intellectual

property.

Key Achievements:

• Demonstrated superior knowledge, skill, and professionalism by achieving a 100% success rate for

all Red Team projects.

• Designed the concept and model for a reverse engineering environment, which directly resulted in

contract expansion and significant revenue growth.

• Led the testing and analysis team that performed quality assurance tests on software developed in-

house. Instructed and provided guidance to team members on testing and analysis methodologies

to identify software bugs or other issues and formal reporting procedures.

• Authored and developed a progressive reverse engineering training program. The program was

used to train all new or inexperienced employees in beginning to advanced reverse engineering

techniques, tools, and methodologies.

• Created numerous unique custom tools, utilities, and scripts that streamlined the analysis of various

reverse engineering projects by automating different steps in the analysis process.

• Significantly contributed to proposal writing process including writing, editing, and doing graphic

design for portions of multiple proposals including the largest client contract to date.

• Developed a proprietary passive and transparent network analysis tool that allowed users to

automatically process network traffic payloads of interest in real-time.

• Created GUI-based forensic tool to find and create signatures for various network devices.

• Interfaced directly with key clients as a primary representative responsible for conducting technical

presentations and delivering high profile report findings.

Created a suite of reverse engineering tool set including PE editor, de-obfuscator, and reverse

engineering notebook in Java using Eclipse.

Teaching/Research Assistant, THE UNIVERSITY OF TEXAS AT SAN ANTONIO – San Antonio, TX 2004

Assisted professor in teaching C++ programming course. Graded tests, quizzes, and programming

assignments. Provided instruction in helping students find solutions to problems with applications written in

C++.

Key Achievement:

• Surpassed objectives in researching both academic and trade journals to aid professor in gathering

information on various research topics.

• Assisted many students greatly improve their knowledge of programming concepts and the C++

language.

Additional experience gained as a Foreign Teaching Staff member for AEON (2006-2008), Assistant

Manager for Roger Soler's Sports (2002-04) and as Systems Administrator for Super S Foods (2002).

EDUCATIONAL BACKGROUND

THE UNIVERSITY OF TEXAS AT SAN ANTONIO a National Security Agency Center of Excellence in San

Antonio, TX.

• MS in Information Technology with a concentration in Information Assurance

• BBA in Information Systems

Professional Development:

Formal Training:

Protected Distribution Systems (PDS) – United States Army

Holocom PDS inspector - Holocom

DIACAP Training – United States Army

Hardware Hacking and Reverse Engineering Techniques – Black Hat

Intermediate Reverse Engineering of Malicious Code – Black Hat

Certifications:

CISSP – ISC2

Security+ - CompTIA

Windows 7 Configuration - Microsoft

Technical Proficiencies:

Platforms: Windows XP / Vista / 7, Linux, Mac OS X

Software: Alteris, Active Directory, SoftICE Debugger,

IDA Pro Disassembler, Eclipse, JBuilder, Trac,

MS Office (Word, Excel, PowerPoint, Access,

Outlook) Visio, VMware, mySQL, Sharepoint

Security Tools: eEye Retina vulnerability scanner, QTIP

vulnerability scanner, Nessus, NMap, netcat

Languages: HTML, PHP, Python, Java, C, C++, XML,

ASP, IDC script, GTK, SQL



Contact this candidate