G LENN A. MARTIN
**** *** ***** ********, **, ***74
361-***-**** ab83os@r.postjobfree.com
I T D I R E C T O R / I N F O R M AT I O N A S S U R AN C E S P E C I AL I S T
Security Management • Network Management • Systems/Security Analysis
Dedicated and versatile IT professional with a strong background in developing and maintaining complex
Government / DoD LAN, WAN, and enterprise network solutions. Expertise in overseeing technology
improvement initiatives and implementing proven IT security policies and practices. Experience in
establishing short- and long-range IT development goals, objectives, policies, and operating procedures.
Keen ability to interpret end-user needs, manage technical staff to translate requirements into solutions,
and coordinate efforts of internal and external technology resources to realize deliverables. Bold, energetic,
and hardworking team leader able to forge strategic partnerships while building consensus across multiple
organizational levels to achieve project goals. Hold an active Top Secret security clearance with a
counter intelligence polygraph and a Certified Information Systems Security Professional (CISSP).
CORE COMPETENCIES INCLUDE:
Strategic Project Management Planning IT Security Project Management
• •
IT Infrastructure Design / Development Web Application Design & Production Support
• •
Management IT Security / Operational Policy Development
•
Network Vulnerability Assessment / Intrusion Database Design and Management
• •
Scanning Team Building and Leadership
•
Quality Assurance & Application Testing
•
PROFESSIONAL EXPERIENCE
Information Assurance Specialist, DS INFORMATION SYSTEMS – Camp Zama, Japan 2009 to 2012
Recruited to perform a wide range of functions to analyze, ensure, and improve the overall security,
confidentiality, integrity, and availability of all information systems on the Pacific LandWarNet (PLWN) in
mainland Japan. Involved in a wide range of DoD / Army information system security issues including
Information Assurance (IA) program management, IA vulnerability management (IAVM), policy review and
compliance, certification & accreditation (C&A), exercise support, protected distribution system (PDS), IA
and security training, and command inspections. Provided strategic planning, authoring numerous IT
security standard operating procedures (SOPs), quick response checklists (QRCs), and information
assurance procedures (IAPs). Provided input and guidance on projects, operations, and exercises to
ensure actions were carried out in accordance with DoD and Army information security policies, standards,
and best business practices. Regularly briefed the 78 th Signal Battalion Commander regarding the security
status of the PLWN, and presented recommendations to improve operations and security.
Key Achievements:
Successfully managed all the pre and post inspection actions for DoD, DISA, and other vulnerability
•
assessments including the DoD Information Assurance Certification and Accreditation Process
(DIACAP), Cyber Command Readiness Inspection (CCRI), and Command Inspection Program
(CIP). Direct tasks included artifact collection and review, facility inspection, interview and
documentation preparation, vulnerability mitigation, Plan of Action & Milestones (POA&M) updates
and maintenance, and briefing the United States Army Pacific (USARPAC) Designated Approving
Authority (DAA) about the inspection results and post inspection activities. Inspectable areas
include business continuity, disaster recovery, incident response, vulnerability management,
security training, and various other administrative and technical controls.
Primary adviser for the IAVM program for all Army information systems in Mainland Japan.
•
Performed analysis of raw vulnerability data and recommended courses of action to the 78th Signal
Battalion Commander, Information Assurance Manager (IAM), and Information Assurance team
that substantially improved the security of the network, and the efficiency of the vulnerability and
patch management process.
Responsible for all aspects of the DIACAP C&A process for all Army units in mainland Japan.
•
Reviewed, processed, and tracked subordinate and tenant unit Authority to Connect (ATC) and
Authority to Operate (ATO) request packages to ensure regulatory compliance and obtain approval
from the USARPAC DAA.
Implemented formal procedures for conducting in-depth investigation into potential network
•
intrusions, unauthorized computer use, and classified data spills for entire area of responsibility
(AOR).
Served as the primary point of contact for 100+ Information Management Officers (IMOs) and
•
Information Assurance Support Officers (IASOs) to provide guidance on IA issues. Organized and
briefed at monthly meetings between tenant unit IMOs and the 78 th Sig Bn Command and IA team
to exchange ideas, provide training, and discuss other items of interest.
Managed the certification and training program for all IMOs, IASOs, and 2700+ end users. Tracked
•
and maintained records to ensure IMOs and IASOs met and maintained certification requirements
for their positions in accordance with DoD and Army regulations. Enforced annual end user training
requirements and provided guidance in the areas of IA awareness, secure portable electronic
devices and removable storage media handling, personally identifiable information (PII) protection,
Phishing awareness, and social media and operations security training.
Architect of multiple software solutions utilized to manage hardware, software, meet inspection
•
requirements, and improve the vulnerability, patch, change management processes.
System Analyst, MACAULAY-BROWN INC. – San Antonio, TX 2004 to 2006 / 2008 to 2009
Recruited to provide technical expertise, innovative ideas, and leadership in order to meet and surpass
client expectations, develop intellectual property, and grow and acquire new and existing contracts.
Primary tasks focused on areas including reverse engineering, red teaming, intellectual property and tool
development, network mapping and traffic analysis, and technical writing. Served as the lead reverse
engineer on a red team charged with reverse engineering protected software applications in order to meet
customer objectives. Coordinated with customers to gather project requirements and deliver bimonthly
project status reports. Guided team members in understanding project objectives, and reverse engineering
techniques, methodologies, and reporting. Proposed and/or developed numerous pieces of intellectual
property.
Key Achievements:
• Demonstrated superior knowledge, skill, and professionalism by achieving a 100% success rate for
all Red Team projects.
• Designed the concept and model for a reverse engineering environment, which directly resulted in
contract expansion and significant revenue growth.
• Led the testing and analysis team that performed quality assurance tests on software developed in-
house. Instructed and provided guidance to team members on testing and analysis methodologies
to identify software bugs or other issues and formal reporting procedures.
• Authored and developed a progressive reverse engineering training program. The program was
used to train all new or inexperienced employees in beginning to advanced reverse engineering
techniques, tools, and methodologies.
• Created numerous unique custom tools, utilities, and scripts that streamlined the analysis of various
reverse engineering projects by automating different steps in the analysis process.
• Significantly contributed to proposal writing process including writing, editing, and doing graphic
design for portions of multiple proposals including the largest client contract to date.
• Developed a proprietary passive and transparent network analysis tool that allowed users to
automatically process network traffic payloads of interest in real-time.
• Created GUI-based forensic tool to find and create signatures for various network devices.
• Interfaced directly with key clients as a primary representative responsible for conducting technical
presentations and delivering high profile report findings.
Created a suite of reverse engineering tool set including PE editor, de-obfuscator, and reverse
•
engineering notebook in Java using Eclipse.
Teaching/Research Assistant, THE UNIVERSITY OF TEXAS AT SAN ANTONIO – San Antonio, TX 2004
Assisted professor in teaching C++ programming course. Graded tests, quizzes, and programming
assignments. Provided instruction in helping students find solutions to problems with applications written in
C++.
Key Achievement:
• Surpassed objectives in researching both academic and trade journals to aid professor in gathering
information on various research topics.
• Assisted many students greatly improve their knowledge of programming concepts and the C++
language.
Additional experience gained as a Foreign Teaching Staff member for AEON (2006-2008), Assistant
Manager for Roger Soler's Sports (2002-04) and as Systems Administrator for Super S Foods (2002).
EDUCATIONAL BACKGROUND
THE UNIVERSITY OF TEXAS AT SAN ANTONIO a National Security Agency Center of Excellence in San
Antonio, TX.
• MS in Information Technology with a concentration in Information Assurance
• BBA in Information Systems
Professional Development:
Formal Training:
Protected Distribution Systems (PDS) – United States Army
Holocom PDS inspector - Holocom
DIACAP Training – United States Army
Hardware Hacking and Reverse Engineering Techniques – Black Hat
Intermediate Reverse Engineering of Malicious Code – Black Hat
Certifications:
CISSP – ISC2
Security+ - CompTIA
Windows 7 Configuration - Microsoft
Technical Proficiencies:
Platforms: Windows XP / Vista / 7, Linux, Mac OS X
Software: Alteris, Active Directory, SoftICE Debugger,
IDA Pro Disassembler, Eclipse, JBuilder, Trac,
MS Office (Word, Excel, PowerPoint, Access,
Outlook) Visio, VMware, mySQL, Sharepoint
Security Tools: eEye Retina vulnerability scanner, QTIP
vulnerability scanner, Nessus, NMap, netcat
Languages: HTML, PHP, Python, Java, C, C++, XML,
ASP, IDC script, GTK, SQL