Post Job Free
Sign in

Security Manager

Location:
Bridgeport, WV
Posted:
October 08, 2012

Contact this candidate

Resume:

M. SEDANO REYNOLDS, CISSP

(verification #*****)

*** *** ***** **.

Bridgeport, WV 26330

202-***-****

304-***-****

******@**.*********@****.***********@*****.***

Active US Top Secret/SCI Clearance

SUMMARY:

24 years General IT

21 yrs Intelligence Analyst/OPS Specialist

12 years Cyber-Network Security Engineering

9 years Cyber-Security Architecture

8 years Information Assurance & Forensics

7 yrs Technical Project Management

6 yrs of Certification & Accreditation (DITSCAP/DIACAP/NIACAP)

QUALIFICATIONS:

Familiarity with a wide variety of security frameworks, including:

DITSCAP, DIACAP, NIACAP, NIST SP 800, ISO17799

IAM Level III Certified (CISSP)

SME with governmental security requirements, including:

FISMA, DCID 6/3, DCID 6/9 and FBI CJIS CAPP

Experience developing and supporting IA documentation, including:

SSAs, SSPs, STIGs, RTMs, and other C&A/POA&M

PROFESSIONAL EXPERIENCE:

Leonie Industries Private ContractAug 2010-Present

Global Multi-Disciplined Intelligence /All Source Intelligence-Operations Integrator

Analyst: Participated in production, indications and warning, collection management,

targeting, imagery, network analysis, counterintelligence, counter-terrorism, information

operations, foreign disclosure, international engagements and threat analysis. Initiated

and conducted deep dive research efforts; planned, coordinated and synthesized research to

produce all source intelligence products/responses. Served in collateral duties included:

Operations Subject Matter Expert as Primary advisor to the deployed Brigade Commander and

staff on all activities with regards to planning, and synchronization of effort of JIEDDO

and JIEDDO COIC support to deployed combat elements. Direct link between JIEDDO COIC and

deployed combat units on all current and future initiatives. Ensured all requests for

support for JIEDDO COIC products are fully coordinated with other JIEDDO COIC deployed

assets and the JIEDDO COIC. Ensured combat assets are kept abreast of all current and

emerging JIEDDO COIC processes, methodologies, and Tactics, Techniques & Procedures (TTP)

for attacking threat networks that utilize IEDs/IRAMS. Provided advice to Combatant

Commanders and their staff on how to best integrate JIEDDO COIC capabilities into their

ongoing operations and analytical efforts in support of actionable intelligence against

hostile forces.

System One Mar 2010-Aug 2010

Cyber Security Intelligence SME - Major Nuclear Power Plant HQ - Major Nuclear Power HQ

Firm, Cranberry Twp, Pa 2010

Cyber Security SME- Leadership responsibilities include providing overall direction,

design, implementation and management of the global information technology cyber security

implementation relevant to business requirements, DOE, NRC, FERC, NERC critical

information protection regulations, internal and external cyber security threats. Thorough

familiarity with Smart Grid technologies as well as providing subject matter expertise on

SCADA(Supervisory Control and Data Acquisition).

Strategic role requiring critical cyber asset identification, troubleshooting, tools

evaluation, intrusion prevention and cyber security training implementation for the AP1000

Project organization.

Primary Responsibilities

Assess technical information security posture, analyze and recommend changes to mission

critical networks, cluster servers and workstation environments

Design security-based solutions to address cyber security vulnerabilities

Implement approved changes that address the security posture

Manage security risks within acceptable limits while in compliance with established

regulatory requirements.

Secondary Responsibilities

Assist Electronic Systems Integration Group regarding cyber security issues. Including

evaluating application and network designs, acquisition of new hardware, software and

services while providing a security prospective and guidance as a service for major

critical infrastructures identified by US Department of Homeland Security.

Additionally, supported baseline assessment of computer networks, industrial control

systems and digital devices to NERC and NRC standards, to include; modification

documentation reviews, drawing reviews, and plant system walk downs.

Provide technical and subject matter expertise in cyber security, malicious software,

viruses and other forms of cyber attack and cyber vulnerability.

Support the identification of cyber threats and vulnerabilities, and participate in the

development of mitigation and protection strategies to minimize impact and risk from

radiation sabotage.

Trace SystemsDec 2009-Mar 2010All Source Cyber-Intel Analyst - Prepped for Afghan deployment under Trace Systems Inc.

Contract suspended. Worked on DOD NIPRnet, SIPRnet, and JWICS networks. Honed skills

utilizing Information Assurance (IA) monitoring tools (e.g., WhatsUp Gold, Sniffer,

Ethereal, Dameware, SolarWinds, Protector Series, ObjectFinder, etc.) Uncanny ability to

establish rapport and interact effectively with customers, supervisors, and/or functional

peer groups to meet objectives productively in a team environment. Gained proficiency in

the field of vulnerability assessments, scanning and penetration testing. Strong working

experience in automated VA, scanning, and penetration tools such as, but not limited to:

Nmap, Nessus, Qualys, AppDetective, Webinspect, AppScan, Nikto, nCircle, BackTrack, Social

Engineering Toolkit, Burp, Metasploit Framework, Core Impact Pro, Wireshark, Retina.

Mentored junior colleagues on FISMA/Clinger Cohen Act compliance requirements.

DHS

Federal Bureau of Investigation, DOJAug 2009-Dec 2009Information Systems Security Officer/Task Order LeaderIntegrated Automated Fingerprint Identification System

Clarksburg, WV

Provided subject matter expertise in the secure design of enterprise network solutions

and services including DMZ, firewall technology, encryption methodologies, secure

networking, intrusion detection, virtual private networking, routing and switching,

enterprise identity and access management solutions (to include federated identity),

enterprise e-mail gateway implementations, Domain Naming Services (to include secure DNS),

wide and local area networks, enterprise logging and auditing, Web & FTP proxy, SOA and

storage solutions. As Project Management lead for the FBI task order, perform project

planning, strategy services and execution, budget, scheduling and monthly status reports

for multiple ISSO roles. Daily interaction with ISSM and ISSR for POA&M oversight using

NIST C&A processes. FBI CJIS CAPP Cyber-Security SME experience.

Jorge Scientific Corp.

Department of DefenseDec 2008 - Aug 2009Information Assurance Officer/Information Systems Security Officer

Responsibilities include development, writing and maintaining formal Information Systems

Security Program. This includes all applicable security documentation in addition to

system security plans (SSPs), System Security Authorization Agreements (SSAAs), network

and system diagrams, Security Requirement Traceability Matrices (SRTMs), and other

applicable Information System (IS) documentation. Most recently assigned to Task Force

ODIN/Constant Hawk/C-IED

Review of System Security Packages and Accreditation Status

Review and approve or deny the entry / exit of AIS equipment

Also responsible for the certification and accreditation (CA) of medium to highly complex

systems. This role also manages a portfolio of systems both CONUS and OCONUS. Leadership

initiatives include working with system program managers, systems administrators, and

information systems security representatives to facilitate the production of CA packages

in a cooperative manner. These packages will consist of systems certification and

accreditation packages that are expiring, being recapitalized and new systems being

deployed pursuant to DIACAP/FISMA requirements.

Recalled to Active Duty Military Mar 2008 - Dec 2008All Source Intelligence Analyst

Plan, organize, manage, and perform intelligence operations and technical information

assurance functions for 106th Rescue Wing, Air National Guard Unit daily operations,

training and readiness missions.

Additionally, provide knowledge transfer of the operational procedures of the USAF Air

and Space Operations Center (AOC) Intelligence, Surveillance, and Reconnaissance (ISR)

Division.

Prepared detailed training requirements of the ISR duty positions in Analysis-Correlation-

and-Fusion, ISR-Operations-Processing-Exploitation-Dissemination; and Targeting functions

at the operational level of war within an AOC

Working knowledge of Distributed Common Ground Station (DCGS) operations.

Altria Group/Electronic Data ServiceDec 2003 - Mar 2008Senior Security Compliance Architect

Provided effective Information Security, Cyber-defense and Enterprise Risk Reduction

Programs for all of Altria family of companies across multiple data centers and geographic

regions. Supported: Phillip Morris USA, Phillip Morris International & Kraft Global

Provided consistent interpretation of Enterprise Information Security Policy, Standards

and Governance.

Promoted security awareness and understanding of Information Security Compliance &

Privacy to all levels of the business (executive management, directors technical, support

staff, consultants and vendors, etc.)

Managed Information Security Risks through coordinating internal Security Risk

Assessments and the creation of the Corporate Information Security risk acceptance

process.

Ensured appropriate Information Assurance Compliance requirements are addressed in all

application development initiatives.

Semper Fi Global Comm., Inc., Silicon Valley, CA & NYC Jun 2001 - Dec 2003Information Security Architect

Spearheaded and conducted confidential forensic analysis of more than 300 seized computer

systems for organizations in military, law enforcement, healthcare, retail & financial

industry.

Implemented disaster recovery planning, pen-testing, auditing, risk analysis, business

resumption planning, contingency planning, as well as contract and vendor negotiations of

third party security firms.

Provided technical application security lead for engineering and business units in

development of wired and wireless (802.11x) solutions in line with enterprise business

enabling goals. Silicon Valley & NYC.

Designed Windows XP enterprise hands-on cyber-security architecture, concepts, and

infrastructure for managed desktop support to enhance client's security posture. Silicon

Valley, Ca.

Technical Advisory Board member, Alliance America, Inc. (Homeland Security Initiative)

Developed host based defense methodologies while conducting research and analysis for

next generation web based attacks against critical infrastructures.

Performed IS audits for a myriad of large Fortune companies in accordance with COBIT

standards.

Established Security compliance analysis, audit and remediation for Fortune 11 firms

towards achievement of industry recognized enterprise-wide security certification from

TruSecure ICSA labs.

Merrill Lynch & Co., New York, NY Mar 1999 - Jun 2001Senior Enterprise Network Security Project Manager, Information Security & Privacy Group

Project lead of Merrill Lynch Corporate and Institutional Client Group's enterprise

network security team.

Gathered business requirements from international and domestic business groups

Oversaw new client requests, maintained firewall rule base design and architecture for

all business units within ML's Corporate and Institutional Client Group

Investigated and identified security issues, mitigate potential risks and implement

controls in accordance with corporate security policy, standards and governance.

Evaluated and selected enterprise tools for implementation of electronic evidence

gathering at targeted infrastructures.

Prepared detailed specifications for encryption technology, digital signing, PKI, VPN,

IPSec, SSL, and Kerberos technology and Limited Sign-On approaches.

Senior E-commerce Service Delivery Manager, Merrill Lynch Direct Market Group

Planned and executed E-commerce business unit expansion proposal and initiative for

presentation to CFO and executive management of the firm. This process involved

participation in vendor selection process for Gig-E connectivity; Selection of onsite

technical candidates for project lead, engineering and administration;

Reviewed architectural designs with Cisco technical engineers; Designed strategies for

connectivity while mitigating security risks of the firm's portal and; wrote technical

requirements and specs for co-location of web hosting environment.

Lead teams of highly skilled technical engineers to deploy the network infrastructure at

the Merrill Lynch London location.

Resolved infrastructure and networking security issues; Performed architecture,

design/application reviews; Conducted intrusion tests, fail-over/high availability tests;

Produced technical/process recommendations; Analyzed industry available tools with respect

to multiple business client requirements; and participated in change management and design

review boards.

Semper Fi Global Comm. Inc., New York, NY Dec 1997 - Mar 1999Chief Technology Officer (Outsourced Consultant

)

Security Intelligence services consulting for Fortune 100 including

Dept. of Defense;

Department of Justice, Morgan Stanley, Dean Witter & Co., Merrill Lynch & Co, Johnson &

Johnson, SOCGEN (French Bank), Columbia Artists Management, CompUSA, AT&T Solutions.

Responsibilities included leadership advisement for more than 650 LAN/WAN engineers,

vendors, programmers and IT trainers, with additional oversight for the daily and

continued operations of multiple clients' global networking environment, WAN

infrastructure (Servers, hubs, switches, cabling, connectivity hardware), desktop

PCs/peripherals.

Recalled to Active Military Duty

U.S. Justice Department, El Centro, CA & Puerto Rico Apr 1996 - Dec 1997Sr. Intelligence Analyst/Sr. Project Leader

Responsibilities Included:

Project Lead for upgrade of systems hardware and intelligence software providing IT

vendor management leadership for integration and implementation of various dissimilar US

Gov't networks, proprietary applications and hardware; Network; Migration included Novell

3.x to Windows NT 4.0; Provided leadership training and field support of multiple projects

on; Remote communications and Internet open source enterprise solutions utilizing MS

Project; Provided timely automated intelligence reports through the use of multi-platform

Internet open sources. Utilized DITSCAP Standards for Systems Integration.

Lead Tiger Team member for Joint Task Forces Counter-Drug initiatives.

Member of U. S. Narcotics and International Drug Interdiction effort code-named Valley

Project in the U. S. Southwest Border. Supported more than 25,000 nodes. Combined $140

million dollar budget. Provided executive summaries & briefs for high-level prosecution.

Semper Fi Global Comm., Inc., East Meadow, NY May 1986 - Apr 1996Systems Administrator & Network Security Consultant

Consulting contracts for Fortune 100 including Dept of Defense; Department of Justice,

Morgan Stanley, Dean Witter & Co., Merrill Lynch, Johnson & Johnson, SOCGEN (French Bank),

Columbia Artists Management, CompUSA, AT&T Solutions.

Responsibilities Included:

Defining client security policies.

Creating strategic and tactical security implementation plan & manage its execution

Evaluated & introduced security products and tools for client consumption

Conducted systems audits for new and current devices

Updated security policies, standards, governance & procedures.

United States Marine Corps1975 - 1998

Gunnery Sergeant of Marines

United States Marine Corps Active Reserves1986 - 1998

Active Duty Service

1975-1986

Progressively rose to the ranks from Private to Gunnery Sergeant of U.S. Marines.

Global peace-keeping assignments include Asia-Pacific, Middle East, Europe, South and

Central Americas; duties include small unit combat infantry leader, photojournalist,

counter-intelligence and intelligence specialist/analyst.

Trained in counter-terrorism and advanced counter-intelligence/counter-insurgency

operations.

Advanced special operations, low intensity conflict, asymmetric warfare, nuclear,

biological and chemical warfare.

Assigned to lead a myriad of international joint task forces including counter-drug

missions with the US Justice Dept. under the auspices of DoD and the White House Drug

Control initiatives.

EDUCATION

Fairfax University, Distance Learning Degree Expected December 2012

MBA Program, Global Technology Management

S.U.N.Y, Empire State College, Saratoga Springs, NY 1988

Bachelor of Science, Interdisciplinary Studies & Communications

REFERENCES

Available upon requestand mutual interest

Miscellaneous tools/topologies/technologies:

ABC Terrorism Prediction Model

CASIAT (Computer Assisted Security Investigative Analysis Tool)

CIPA (Counter Insurgency Pattern Assessment)

Data Detective

DataMiner 3D

Data mining suite

DataMite

DataScope

Data Serfer

DataSurferPlus

Data Surveyor

LAW (Link Analysis Workbench)

Intelligent Miner for Text

NORA (Non-Obvious Relationship Analysis)

SpyGLASA2IPB

ABA

ABC Terrorism Prediction Model

ABIS (Automated Biometric Identification System)

AC2

ACCO (Army Central Control Office) counter-intelligence investigations database

ACOA

ACTOR (Analyzing Complex Threats for Operations and Readiness)

Adversary

AeroText

AFIS (Automated Fingerprint Identification Systems)

AIES (Automated Information Extraction System)

AIM

AIR (Arabic Information Retrieval):

Aira Data Mining Tool

AIPSA (Automated Intel Processing for Situational Awareness)

aiSee

AKA

ALADDIN (Automated Link Analysis for Data Mining of Distributed Information)

ALE (Aires Life Extension)

Alembic

ALICE d'ISoft

Alien Migration db

Alterian NucleusAME (analyst modeling environment)

Analyst Notebook/Analyst Notebook Link Chart Reader

Analyst Workbench

Anchory

AnswerTree

Answerer

AOCG (automated org-chart generation)

APOLLO

Aquarius

ARENA

ARM

ART (Author-Recipient-Topic)

ASAS (All Source Analysis System)/ASAS-L with MAST

ASID (Automated Systems Integration Management Intelligence Database)

ASIM (Automated Security Incident Measurement)

Association

AT Sigma Data Chopper

ATHENA

ATIX (Anti-Terrorism Information Exchange/Automated Trusted Information Exchange):

AUDITT

AutoMap

Autonomy

Automatic Identification System

Automated Warning Prototype

Auto-X tools

AutoTrackXP (ATXP)

AXIS (Analysis and eXploration of Information Sources)

AVS/Express Visualization Edition

Basketball

BioWar

Blackknight

Blue Data Miner

BNN (Broadcast News Navigator)

Breve

Broadbase EPM (Enter Perf Mgmt)

Brocade

BUILDINGCODE

BusinessMiner

C2PC

CADRE (Continuous Analysis and Discovery from Relational Evidence)

CamStudio

Camps

Capri

Carillon

CART

CASIAT (Computer Assisted Security Investigative Analysis Tool)

Categorizer/Tree Studio

CATEIS (Counterintelligence Automated Tactical Exploitation & Information Software)

CCDB (Consolidated Counterdrug Data Base)

CCIP (Counterterrorism Collaboration Interoperability Project)

CCM

Centrifuge

CETA

Chassis

CHATS (CI/HUMINT Automation Tool Set)

Checkpoint

CHIMS (CI/HUMINT Information Management System)

CHINET (Chinese Name Extraction and Translation)

CIA TD/TDX

CiceroLite:

CIDAR (Critical Infrastructure Detection, Analysis and Reporting)

CIM (Critical Intent Model)

CIM/SEAS Nested Argumentation

CIPA (Counter Insurgency Pattern Assessment)

CIRC

CIS (Case Information System)

CITF (Criminal Investigative Task Force) Web-enabled Database

CJMTK

Clear Case

Clear Quest

ClearForest

ClearResearch

Clementine

CMS (Case Management System)

Cobra Focus

CODIS (Combined DNA Index System)

CoGen

COGNET

Cognos (COTS Tool for Report Generation)

Coliseum

Conceptual Model of Counter-Terrorism Operations

Constant Web

Construct

Content Analyst

Context

Convera

Cornerstone

Coverterm

CPOF

CPXP

CrimeLink

CrissCross

CrossGraphs

CTAC (Counter-Terrorism Analysis Capability)

CTDB (Combating Terrorism Database)

CT-AVRS/CT-AVARS (Combined Theater - Analyst Vetted Relational System/Combined Theater

Analyst-Vetted, Relational, Structured Database)

Cubist

Cultweave/Cultweave II

CyberLINXX

CyberTrans

CYC

Darwin

Data Clarity

Data Detective

Data Logic/RDS

DataMiner 3D

Data mining suite

DataMite

DataScope

Data Serfer

DataSurferPlus

Data Surveyor

DB2

dbProbe

DCIIS

DECIDE

DecisionWORKS

DeltaMiner

Diamond

DIAZ

DIMS (Detainee Information Management System)

DNA (Dynamic Network Analysis)

Dollar-Dinar db DOORS

Dream Media

DTES

DyNet

Eagle Eye

EARS

EASYBORDER

EICK

EKM

Elite Network Modeling

Emergejust (EJ)

Enterprise Miner

ENVIE (Extensible News Video Exploitation for Intelligence Analysis)

Envision

EP

FaceIt

FactBrowser

Fair Isaac

Fascia

FAST DIAMOND US

FAST ISSM

FAST toolbox for OOTW

FastTalk

Fastus/TextPro

FatCat

FeedDemon

Festival

FINTEL

FOMA

FORECITE Monitor

Foreign terrorism communication profile database

Foundationstone

Fraud Investigator

Freedom

Fulcrum Knowledge Server

GATE (General Architecture for Text Engineering)

GBAE (Glass Box Analytical Environment)

GCS

GDA

GDM-FC

Geo-Browser

Genysis

GeoTagger

GIDI

GIP (Generic Intelligence Processor)

Glide

Graphlet

GRAPHVIZ/graphvis

Grindstone

Groove Workspace:

Groundbreaker

Group Discovery Algorithm

Guardian

Harvester

HD Map

HIDTA DIG (High Intensity Drug Trafficking Areas Digital Information Gateway)

Highpoint

HIS (HUMINT Imagery Server)

Homebase/Homebase II

HMSng (HUMINT Management System next generation)

HPS (HUMINT Processing System)

Hydrant

i2 Visual Notebook:

IAA (Intelligence Analyst Associate)

IAFIS (Integrated Automated Fingerprint Identification System)

iBase

IBM Intelligence Miner for Data

IBM MT:

IC ROSE

IdentiFinder

IDP (Intelligence discovery portal)

IDW (Investigative Data Warehouse)

IE CounterDrug

IES (IIR Evaluation System)

IFS (Intelligence Fusion System)

ILS

iMapData

IMPACT (Intelligent Mining Platform for the Analysis of Counter Terrorism)

InCLUEsion

Indri

InFact

InfoMASQ

Informix Red Brick Formation

InfoWorkspace

InfoXtract

INQUEST

IN-SPIRE

Insta-Know

Intelligent Miner for Text

Intelligenxia

InterSCOPE 3-D Geospatial Visualization

INTREPID (Intelligence and Terrorist Photograph Identification Database)

IR Discover

ISM (InfoSphere Management System)

ITN (Identification Tasking and Network)

IWS

Jabber

Jaguar

JDS

JMIE

Juggernaut

JWARN (Joint Warning System)

KATE-DataMining

KDD Explorer/SRA KDD Explorer

Keycard

KeyPlayer

KnowledgeSEEKER

KnowledgeSTUDIO

LADS (Linkage Analysis Database System)

LAS

LAW (Link Analysis Workbench)

LDS (Lotus Discovery Server)

LEADMiner (NIPS)

LEMUR

LexiQuest Mine

LingPipe

LingSoft

LinkView

LSI (Latent Semantic Indexer)

Mage

Mailorder

Mainway

Malolo

Malta

MAPLE

MARS

MatView

MAUI NITE

MayaVis

Media Manager

METIS

METS (Metadata Extraction and Tagging Service)

MindManager

MINDS (Multilingual Interactive Document Summarization)

MINER

Minerva

MineSet

MiTAP (MITRE Text and Audio Processing)

MODEL 1

Modus Operandi Database

Mohomine

MPES

Name Variant

NameStats

NDA (name data archive)

NDCore

NDEx (National Data Exchange)

NDPIX (National Drug Pointer Index)

NER (named entity extraction)

Nested Vision 3D

NetDraw

Netica

NetMap Analytics

NetMiner

NetOwl/Net Owl

NETVIZ

NexMiner

NLP++

Nooscape

NORMALLAW

NORA (Non-Obvious Relationship Analysis)

NorthernLight

NRM (NSA Reference Model)

Nuggets

Oasis

ObjectFX

OCULIS

OMNIDEX

OnTap

OnTopic

Open Visualization Data Explorer

Optionspace Visualization

ORA

Orion

ORIONMagic

OSALAT (Open Source Automated Link Analysis Tool)

Outline/Magic

Overwatch

PAC (Portal Automated Collection)

Pajek

Paladin

Pantheon

PASSGEAR

PathFinder

PEAC-WMDv5 Decision Support tool

Pen-Link

Pensa

Pinpoint

PINWALE

Pipeline

PIRANHA

Plus

Polaris

PolyAnalyst

PowerDrill

Powerplant

PPS

Procon

Project Foundry

Proximity

PrudSys Discoverer

PTEK

QACTIS (Question-Answering for Cross-Lingual Text, Image, and Speech)

QANDA

Query Tree NG/Querytree

QUIET (QUery Improvement Elevation Technique)

QKS Classifier

Radiant Garnet

Rampart

Rational Rose

Raven

Razor

REES

Remedy

Renoir/Renoir+

REPAST

Rigel

RMS

ROSID (Rapid Open Source Intelligence Deployment System)

ROVER

RPS

S-PLUS

SAFE

SaffronNet

Saffron Web

SAIL Labs Media Mining (MM) and Communications Mining (CM) Tool

SameTime

Sandbox

Sander

SANDKEY.

SAS/SAS Enterprise Miner

SAVANT (Systematic Architecture for Virtual Analytic Net-centric Threat Information):

Scenario

SeaLink/SeaWatch

SEAS (Structured Evidence Argumentation System)

See 5/C5.0

Semantic Forests

Semantic Navigator

Semantic Web

SEMESTER

Semio Taxonomy

SERIF (Statistical Entity & Relation Information Finding)

SIAAD (Secure Information Access Analysis & Dissemination)

SIAM (Situational Influence Assessment Module)

Siena

SIFT

SIGINT on Demand

SKYWRITER

Slate

SmartDiscovery

SmartDiscovery Analysis Server

SmartDiscovery Awareness Server

SNAKE (Social Network Analysis for Knowledge Exploitation)

SOCIDS

SoNIA

Soundex

Sparkler

sphinxVision

SPIRE/Themeview

Springtide

Spotfire Pro

SPSS/Clementine

SpyGLAS

SS7

SSNAStandpoint

Starlight

StarTree

STK (Surge Toolkit)

Strategic Player

STRONG ANGEL

Subdue

SUMMAC (Summarization Analysis Conference)

Suspect Finder

Swarm

Sybase

Syllogic Data Mining

Symphony

SyNERA

Synergist

System Dynamic Modeling

SYSTRAN

TACS

TAG Manager (Thematic Argument Group Manager)

TAIC (Text Analysis International Corporation)

TAPAS (Threat Anticipation Program Agent-Based Simulation of Terrorist Motivations,

Objectives and Strategies)

TEES (Trainable Evidence Extraction System)

Tel-Scope

TER (The Easy Reasoner)

TERQAS (Time and Event Recognition for Question Answering Systems)

Teradata

TextWise

Themelink

ThingFinder

THREADS (Threat HUMINT Reporting, Evaluation, Analysis, and Display System)

Threat Tracker

TILADS (Terrorist Identification Linkage Analysis Database)

Timewall

TIMEX

Tina Tool

Tinman

TIRT

TKT (Tacit Knowledge Toolkit)

TMODS (Terrorist Modus Operandi Detection System)

TOLLS

Tom Sawyer

TouchGraph

Trailblazer

TravelNet

TRIDENT

TRIST ( The Rapid Information Scanning Tool )

Trusted Wisdom

TruTalk

TTKB

Ucinet

UWIL

Vantage Point

Verity Indexer

Verity K2E (Verity K2 Enterprise)

Verity Locales

Verity Profiler

Verona

VIA Repository

Viceroy

Virtual Situation Book

Viscovery SOMine

Visual Insights ADVIZOR

Visual Links

VisualMine

ViTAP

VizServer

VKB (Virtual Knowledge Base) FINTEL ISM

Voltaire

WAEWarlord

Watchtower

Watson Pro

Webster

Webtas (Web-based Time Line Analysis System)

WilmaScope

Windgrinder/WnGrinder

Wired

Wrangler

XMB (XML Metadata Browser)

XpertRule Miner

Yellowston



Contact this candidate