JAMES F. ETHERTON III
Ph.D.
james.etherton*@gmail.com40A. Iliahi St.
Honolulu, HI 96817
PRIMARY AREAS OF EXPERTISE:
Project management
Enterprise Security Management
Information Assurance
Cyber Security policy development
Threat/Information/Statistical Analysis
Operations/Training
Intrusion Detection Analysis
ISS Real Secure
ISS Scanner
Retina
Windows NT Configuration/Security
UNIX systems configuration/Security
DITSCAP accreditation
CRYPTO management
RF Spectrum management
Tactical data link management
Technical Training:
LT, USCGR Electronic Support Officer (2001-current)
JT-201 LINK-16 Planner Course, April 2010
JT-101 Joint Interoperability Course, February 2010
JT-102 (MAJIC) LINK-16 Manager s Course, December 2009
Air Defense System Integrator (ADSI) Ver. 12.3 Installer/Operator February 2008
Joint Range Extension Operators Course (JRE), L3 Communications, 17 February 2006
Certified Information Systems Security Professional (CISSP), 23 March 2002
System Administrator/Network Manager Security Course, August 2001
SANS GIAC Level One Certification, May 2001
DITSCAP, SecureInfo Corporation, Hickam AFB, HI, April 2001
SANS GIAC Security Essentials, Honolulu, HI March 2001
IA Assurance Workshop and DITSCAP, Wheeler AB, DISA, February 2001
Level II, Mapping and Scanning Certification, ACERT, June 2000
Joint Intrusion Detection System (JIDS), DISA, May 2000
GCCS UNIX, Keesler AFB, MS, August 1999 (Given at Hickam AFB, HI)
Information Systems Security Officer Certification Course, Ft. Gordon, GA, June 1999
Computer Security Incident Handling, CERT CC, Carnegie Mellon (Honolulu, HI) May 1999
Level One Incident Handler Seminar, Honolulu, HI, April 1999
Education:
Ph.D., Capella University, Business/IT Management, January 2012
MBA University of Hawaii, Decision Science, August 2001
BA, Political Science/International Relations, Kansas University, Lawrence, KS, May 1994
Foreign Exchange Program, Sophia University, Tokyo Japan, August 1993
Security Clearance: TS/SCI
Work Experience:
Sparta, Inc
Missile Defense Agency, Battlefield Communications (Networks)
US Pacific Command, J392
July 2005 to Present
US PacificCommand Liaison Network Officer: Subject matter expert (SME) for ballistic
missile defense (BMD) Command and Control (C2) systems in the Pacific area of operational
responsibility (AOR). Coordinate fielding of BMD communications equipment to include
management of long haul communications provisioning and management. Develop strategic plan
for employment of integrated information operations and C2 architectures, provide
technical briefs to leadership. COMSEC and network subject matter expert for deployment of
AN/TPY-2 radar to Japan. Monitor and resolve technical systems and network outages related
to BMDS communications network. Cyber Security subject matter expert, providing technical
guidance on systems and communications architecture vulnerability and information
assurance issues. Assist USPACOM JICO with tactical satellite communications (LINK)
planning and implementation and integrating tactical data feeds to USPACOM common
operating picture (COP). Facilitate C2BMC training and exercise requirements for Battle
management, Command and Control for USPACOM executive staff. Computer Sciences Corporation
(CSC)
US Pacific Command CCP/DJC2
December 2004 to July 2005
Site Lead: Facilitate daily operation and maintenance of tactical/deployable command,
control and intelligence system for Pacific Command. Direct responsibility and supervision
of seven contractors on Congressional program of record. Technical tier-1 support lead
responsible for over $2.6M worth of equipment. Facilitate information assurance and
physical security requirements for storage of controlled items and classified material.
Raytheon Intelligence, Information Systems (IIS)
Missile Defense National Team Bravo
March 2004 to September 2004Regional Planner/Technical Liaison: Prepare and coordinate pre-site inspection criteria
in preparation of equipment installations. Provide on-site technical advice and services
to Hawaii C2BMC site lead. Develop, process and track all documents relevant to site
delivery and operations. Ensure system reliability and continuity of operations by
coordinating frequency, key material and operational requirements with applicable parties.
Raytheon Technical Services Company (RTSC)
Navy/Marine Corps Intranet (NMCI)
November 2003 to March 2004Certification and Accreditation Engineer: Prepared site-specific addendums (SSA's) for
accreditation of the Navy and Marine Corps Intranet (NMCI) for both NIPRNET and SIPRNET
systems. Assisted in preparation of over 50 certification and accreditation packages for
sites in Hawaii, Louisiana, Washington DC, Delaware and California. Participated in
security, test and evaluation technical and non-technical reviews with SPAWAR
representatives. Facilitated major site delivery of classified systems for the Pearl
Harbor Naval Zone, including VIP housing.
Raytheon Technical Services Company (RTSC)
Navy/Marine Corps Intranet (NMCI)
April 2002 to November 2003Regional Manager, Base Operations: Project manager responsible for managing 18 employees
over four main geographic Hawaii locations and supporting 28 disparate remote sites.
Oversee installation and implementation and functional management of firewalls, VPN s, IDS
sensors, SENDMAIL, Mailgear, Manhunt, Shadow and other enterprise information assurance
products. Responsible for maintaining ALCATEL remote access server and Kasten Chase
classified RAS. Immediate supervisor in charge (ISIC), responsible for over 100 pieces of
COMSEC equipment. Maintain and implement monthly re-key for KG-95 and quarterly re-key for
KIV-7 providing primary and redundant connections to SIPRNET for the Hawaii NMCI
project. Primary interface to partner s for all IA related issues from connectivity to
Classified RAS and PKI certificate request.
Deputy Director/Technical Manager, Hawaii Information Assurance Center: Concurrent with
regional manager position. Conduct business on behalf of the Director in his absence.
Maintain highest levels of availability, integrity, access and authenticity of data for
the project. Key member in the building of the IAC from the ground up recruited, trained
and manage a dedicated team of 15 IA professionals: Watch staff, Vulnerability
Assessment/Analysis team and planning and implementation cell. Supervise and assist in the
performance of network monitoring for intrusions, viruses, network anomalies and
classified incidents. Assist in completion and submission of accreditation packages and
facilitate high-level technical issues with clients and other partners on the project.
Quantum Research International, Intelligence and Information Operations Group
Regional Computer Emergency Response Team (RCERT), Fort Shafter, HI
November 1999 to april 2002
Information Assurance Analyst: Provide operational, technical, and analytical support to
Pacific Regional Computer Emergency Response Team (RCERT). Examine systems and
communications architecture to identify vulnerabilities. Analyze network intrusion
detection data, create alerts, determine impact, formulate countermeasures and develop
advisories. Conduct open source research for network exploits and current vulnerabilities.
Deploy ISS Real Secure and ISS Scanner, enterprise wide, to identify network
vulnerabilities. Identify intrusion techniques through penetration testing on isolated
equipment. Utilize Joint Intrusion Detection System (JIDS) for retrospective analysis and
verification of Real Secure data. Create SQL queries and PERL scripts to assist in
detection of network anomalies.
SMF Corporation
Theater Network Operations Center (TNOC), Fort Shafter, HI
May 1999November19 99Network Operations Analyst: Conduct daily operation of REAL SECURE intrusion detection
system, including initial analysis of raw data, compiling reports, intrusion tracking and
reporting to higher headquarters. Utilize Remedy trouble ticketing system to track and
maintain system outages. Monitor Intruder Alert, REAL SECURE and Joint Intrusion Detection
System consoles. Analyze data from systems and pass to the RCERT for in-depth analysis.
Monitor Spectrum, Net Health, and HP Openview to ensure 24-hour network operability.
Initiate appropriate immediate actions for outages. Additional duties as Physical Security
Manager accepting responsibility for overall security of the facility, including
maintenance of combinations, access to facility and accountability for classified
materials.
ETHERTON, James