DAVID O. CONCEY PMP CISSP CEH SECURITY+ NETWORK+ A+ ITILV3
**** *** **** **. ******, GA, 30519
*****.******@*****.***
Seeking a position within Information Security Management where my extensive sound federal/military IT and
multi facets of Cyber Intelligence experience can be fully utilized, exemplifying my skills sets and experience to
effective use by solidifying the organization to address its security concerns; in turn providing its stakeholders,
customers and employees a secure IT/IC environment. I believe by owning each problem as if it was my own and
working quickly with efficiency to resolve the issue; gives me the ability to go above and beyond my expected
duties, therefore achieving customer satisfaction. A unique opportunity within the DOD IT/IC infrastructure has
honed my strong problematic and decision making skills with the ability to adapt to any organizational changes.
A proponent of World Class IT Methodologies supported by a detailed knowledge of Computer network
exploitation, computer network attack, Change and Project Management, security tools; server system
administration, current technologies and ITIL best practices. Effective in defining breakthrough technology
options based on organizational standards, security policy and the strategic needs of organization. Skilled in all
aspects of the "protect, detect, respond" cyber security triad and applying the proven tenets of “defense in depth.
Customer focused with the development and implementation of enterprise security policies and in the
recommendation of security controls in light of value vs. threat vs. vulnerability vs. cost.
PROFILE
Results oriented seasoned Senior Information Security Program Leader with over 15 years of broad cyber security and
enterprise risk management experience and a proven record of success. Expert in managing cost effective, high performance,
information technology security programs that balance enterprise risk with legislative and regulatory compliance in the support
of key business objectives.
Effective communicator skilled at gaining business buy in to enterprise security initiatives. Expert at creating effective security
awareness programs, conducting risk and security control assessments for the information assets of the organization. Known
for solid time management and ability to work calmly, accurately under pressure.
Experience managing all aspects of technology to include: large data center management, software development, enterprise
architecture, information security, network operations and management.
Expert in applying cost effective risk based principles to large cyber security programs to support of key business objectives.
Intensive experience dealing with Cyberspace Operations which includes Signal Intelligence (SIGINT), or Computer Network
Exploitation (CNE), or Digital Network Intelligence (DNI) Analysis.
Comprehensive knowledge of Federal, DoD, and DoN IA/Security requirements and policies relating to communications and
computer information systems; to include but not limited to evaluation, validation, and execution of compliance with DoD 8500
IA Controls, Security Technical Implementation Guides (STIG), Computer Tasking Orders (CTO), and their references.
Extensive knowledge of Unix, Apple, Linux, Microsoft Server 2003/2008 Operating System, Microsoft Active Directory,
Microsoft Exchange 2003/2007, Microsoft System Management Server, Microsoft XP, Microsoft Vista, ESM,SCCM, VMware
and workstation imaging.
Experience using and/or detailed knowledge of ArcGIS, Military Analyst, Falcon View, APIX, CIDNE, TIGR, MOTHRA,
Multimedia Analysis Archive System (MAAS), Video Processing Capability (VPC), SOCET GXP, Advanced Intelligence
Multimedia Exploitation Suite (AIMES), Smart Track, Analyst's Notebook, Digital Video Analyzer (DVA), GeoTracker, National
Technical Means (NTM), Peregrine, Tactical Common Datalink (TCDL), RemoteView, and/or Persistent Surveillance and
Dissemination of Systems (PSDS2).
Extensive security knowledge and experience in DoD and special environments NISPOM; NISPOM supplement; JAFAN and
DCID documentation; COMSEC; DD254 and Security Classification Guides; DSS; MDA Security Compliance Reviews (SCR).
Knowledge of Network Management Systems (NMS) software, What's Up Gold (WUG), Ethernet Automated Protection
Switching (EAPS), KG 175 TACLANE, KG 75 FASTLANE.
Familiar with key data correlation tools, data mining (SBSS, Clementine, Matlab, etc) and visualization (Cold Fusion, COGNOS,
etc) all designed to support insider threat detection.
Extensive subject matter expertise in IT Services Management (ITSM) and ITIL, methods, processes, strategic technology
infrastructure planning, and developing cost effective solutions to meet customer business requirements.
Active Top Security Clearance of TS/SCI (DCID 1/14 Eligible) DIA/DHS/NGA SCI CLEARED.
PROFESSIONAL EXPERIENCE
US DEPARTMENT OF THE TREASURY
INTERNAL REVENUE SERVICE
SUPERVISORY IT SPECIALIST IR 2210 04/GS 14 OCT 2012 PRESENT
As Chief IT Enterprise Tools Ownership (ETO), directs, manages a federal workforce of 20 at the GS 13/GS 14
levels, comprised of four business units Tivoli Environment, Altiris Deployment, Control M EM, and End to End
(E2E);responsible for ensuring that the organization's strategic plan, mission, vision and values are communicated and
integrated into the team's strategies, goals, objectives, and work. Employs contemporary, proven, project management
techniques. Provides senior technical product and infrastructure support for enterprise utilities, tools, and their
standardization in production environments including the modernized enterprise systems management environment.
Evaluates project schedules and developer resource allocations to ensure successful development of approved
software applications. Tracks, analyzes and coordinates multiple, complex applications development projects using
principles and guidelines of the Project Management Institute (PMI) and Capability Maturity Model® Integration (CMMI)
methodologies. Facilitates cross functional and cross team planning sessions to ensure integration of critical path
development activities.
Programmatic Leadership and Oversight: Directs agency driven World Class IT initiative by serving
o
as the subject matter expert to support the integration of the Release and Deployment Management
Process with other enterprise ITIL based processes (e.g., Change Management and Configuration
Management).
Leads and manages complex computer engineering projects or programs that may have ill defined
o
requirements, ambiguity, parallel tasks, multiple dependencies, high risks, and multiple interfaces;
provide technical oversight and initiate, plan, implement, and coordinate activities throughout the life of
the project.
Develops, executes, and communicates a spend plan and assess variances from cost and schedule
o
baseline; reallocate resources in response to change, considering impact to project cost, schedule, and
quality of deliverables.
Strategy & Planning: Manages complex Cross Functional Transformations involving ITIL Processes,
o
ITSM and Enterprise Service Automation & Service Assurance Tools Implementations across various
production environments.
Participates as a member of the senior management team in governance processes of the
o
ECMS/ERTB organization’s security and risk management strategies. Develops and communicates
security strategies and plans to executive team, staff, partners, customers, and stakeholders.
Leads strategic security planning to achieve business goals by prioritizing defense initiatives and
o
coordinating the evaluation, deployment, and management of current and future security technologies.
Monitors the broad scope of Tivoli Environment, Altiris Deployment, Control M EM, and End to
o
End (E2E) security technical activities and tracks progress in meeting goals and objectives, resolving
technically complex management and operational issues directly with other senior level managers
throughout Infrastructure Services Division.
Evaluates complex programmatic problems, applies Business Process Improvement techniques to
o
evaluate and improve business processes and procedures to enhance effectiveness, efficiency, and
productivity of managed business units. Ensures that a disciplined, repeatable systems, and project
management approach is used to assess, prioritize, and carry out assigned duties and responsibilities
including process improvements and reengineering efforts.
Guides and directs systems security analysis, vulnerability management and assessments, risk
o
assessments, security surveys, independent certification testing, security test and evaluation, and
verifies the accuracy and completeness of the reports associated with each of those activities.
Tools utilized: IT Service Management Tools like HP Service Manager/ BSM, HP Asset
Manager, BMC Control M/Enterprise Manager, HP Service Manager, HP Asset Manager.
Strategic Human Resources (HR) Guidance: Ensures the provision of outstanding HR guidance,
o
training and development guidance, and professional support to targeted staff, technical leads and
employees. Provides technical expertise, leadership in developing and implementing targeted human
capital programs. Identifies developmental training needs of employees and arrange for needed
development and training.
Oversees and leads project implementation and quality assurance by effectively monitoring cost,
o
schedule, and performance; assess variances from the plan and take necessary corrective actions,
conducts project performance reviews and control gates, gather important information and make
decisions about required next steps, and develop and maintain appropriate project documentation.
Leads technical discussions for complex projects and communicate with customers, information
o
technology (IT) service providers, and technical components to fully understand problems.
US AIRFORCE RESERVES
USPACOM INTELLIGENCE DIRECTORATE (J2)
ALL SOURCE INTELLIGENCE ANALYST INTELLIGENCE (POL/MIL) APR 2012 PRESENT
Serves as a Political/military all source strategic intelligence analyst in the South Asia Division (India Branch) at
the United States Pacific Command Joint Intelligence Operations Center, Pearl Harbor, Hawaii.
Primarily responsible for researching, developing, presenting and publishing All Source products at the
o
tactical and operational level related to insurgent IED cell activities, and threats to local/regional stability
as part of an overall analytical team.
Develops counterintelligence initiatives, including insider threats and cyber threats, to effectively protect
o
national security and the operational mission of DIA. Identifies information gaps and prepares collection
requirements to meet current and anticipated intelligence needs.
DEPARTMENT OF HOMELAND SECURITY (HEADQUARTERS)
ARLINGTON, VA
IT GOVERNANCE / CYBER SECURITY TEST MANAGER / CONTRACTING OFFICER'S MAR 2011 – OCT 2012
TECHNICAL REPRESENTATIVE (COTR)
As the DHS NPPD OCIO Manager of IT Governance, was responsible for directing, developing, implementing and
integrating agency wide investigative change management practices with a defense in depth strategy to ensure
protection of the DHS IT UNCLASS/CLASSIFIED environments; managed a robust ITIL/CMMI set of tools and
techniques to refine, control the enterprise wide change, approval and implementation phases for maximizing benefit
and minimizing impact on workers and processes. Reported to the executive Director of Information Technology with a
dotted line to the Department of Homeland Security CIO. Led the design and implementation of IT governance
policies, procedures and standards. As the Chair of the Engineer Review Board, participated in change control efforts
for the DHS Infrastructure team by setting standards and best practices that defined and maintain appropriate SLAs for
the group. Collated team was responsible for evaluating cyber security products, deciding go forward products,
implementing these products, then properly turning them over to the Cyber Security Operations team.
IT Governance Leadership: Provided leadership and management for the Service Operations group.
o
Fulfill customer requests, resolve service failures, fix problems, and carry out routine operational tasks.
Chaired the National Protection and Programs Directorate Enterprise Review (NPPD ERB) change
advisory boards to ensure all changes applied within the managed information technology infrastructure
are properly approved, tested, documented, and validated.
Managed and led a team of cyber security test experts responsible testing and assessing the
o
effectiveness of application, system, or network security controls; validate risk and vulnerability
management programs; and demonstrate the risk associated with unaddressed vulnerabilities.
Addressed means to reduce exploitable software weaknesses and improve capabilities that routinely
o
develop, acquire, and deploy resilient software products. Enhanced development and acquisition
processes to address software security needs. Transition software assurance processes and practices
into standards, and maturity models
Team Management: Directed organizational change management strategy and created change
o
management roadmap; formulate change management plans, including allocation of resources,
determination of risks, and identification of deadlines and deliverables with a goal of successful
implementation of tasks which are completed on time while maintaining flexibility that is required to deal
with changing conditions.
o Managed phases of the Incident Handling Life Cycle to ensure resolution of cyber incidents
within the command.
Responsible for interfacing daily with high end IT staff and will be responsible for reconfiguring (full life
o
cycle process) current Tivoli IDM platform; overseeing the planning, installation, component
configuration, application configuration, problem determination, and customization of the IBM Tivoli
Endpoint Manager VS.2 solution.
Maintained overall responsibility for system availability, capacity planning, system performance,
o
installation, and configuration of software and hardware for Tivoli Monitoring; responsible for planning the
implementation of new technologies and technology upgrades and consulting with application support
groups relative to Tivoli End Point (TEM) output.
Managed IT engineering services such as MS Exchange support; MS SharePoint support; Blackberry
o
Enterprise support; Good for Enterprise support; Microsoft .Net support; MS SQL Server support; Oracle
RDBMS support; Oracle Java support; DHS XaaS support; and support for the deployment of new or
upgraded platform technologies into TSA's IT production environment.
Supervised IT project managers responsible for the delivery of highly complex IT projects involving
o
Systems Engineering Lifecycle (SELC) technical support for TSA mission critical IT services. Overseeing
the work of senior level technical staff of other TSA and DHS organizations and contractors to ensure
project completion.
Security Control: Ensured the following Change management activities were executed; planning and
o
controlling, change and release scheduling, communications, decision making and change authorization,
ensuring remediation plans are in place, measurement and control, management reporting assessing
change impact, continual process improvement.
Planned and coordinated processes for in depth vulnerability analysis and suggest tools/techniques that
o
may be used to exploit identified vulnerabilities through a combination of manual and automated
processes.
Ensured the proper analysis and validation of test results, documented risks, recommended remediation
o
options, and track outstanding remediation efforts to resolution.
Developed and monitored standard operating procedures and team documentation, as required. Manage
o
daily operational tasks provide task coordination / prioritization, and assign resources. Assist in daily
operations to include intrusion detection, incident response, unauthorized device monitoring, web
application scanning / assessments, and auditing support.
NIST SP 800 53, F NIST SPS WITHIN A SECURITY PROGRAM, INCLUDING 800 30, 800 37, 800 53A, AND
800 18 INTEGRATION
VULNERABILITY MANAGEMENT EXPERIENCE – MCAFEE NITRO SECURITY, TENABLE SECURITY CENTER, MCAFEE
EPO, FIREEYE (DIRECT NSF VULNERABILITY MANAGEMENT SUITE EXPERIENCE A PLUS)
BMC PROACTIVENET PERFORMANCE MANAGEMENT (BPPM) (ARCSIGHT, NETFORENSICS, E SECURITY, ETC
USAF MCGUIRE AFB
NEW JERSEY AIR GUARD 204 INTELLIGENCE SQUADRON
TH
OPERATIONS ALL SOURCE PRODUCTION INTELLIGENCE ANALYST NOV 2008 – APR 2012
As Operational All Source Production Intelligence Analyst, supported all aspects of Air Force (AMC) operations
by collating, analyzing, evaluating and disseminating intelligence information. Produced all source intelligence,
situation estimates, order of battle studies and other intelligence reports and studies. Advised commanders on force
protection and intelligence information for US and allied forces. Compiled, segregated, evaluated, researched,
interpreted, analyzed, and disseminated intelligence information.
.
Provided intelligence Country Risk Assessments (CRAs) and estimates at the tactical, operational and
o
strategic levels, supporting AMC A2: Production for USCENTCOM, USPACOM, USEUCOM,
USNORTHCOM and USSOUTHCOM flight operations.
USAF 305 APS, MCGUIRE AFB, NJ
CHIEF COMPUTER NETWORK OPERATIONS (CNO)/ CISO 40HRS NOV 2008 – JUL 2010
Served as Chief of Computer Network Operations Branch, was responsible for developing and implementing
measures/controls to deny unauthorized persons information derived from telecommunications and ensuring the
authenticity of such telecommunications including: crypto security, transmission security, emission security, traffic flow
security and physical security of COM SEC material. Maintained continuous surveillance over the operations, to
include resources, networks and associated assets; upon identification of a network disruption, assesses the extent
and operational impact of the disruption and initiates service restoration actions. Responsible for auditing existing
systems, while directing the administration of security policies, activities, and standards.
Organizational Leadership: Leadership of strategic and tactical decisions surrounding virtualization,
o
storage, backups, wireless, telecommunications, infrastructure, business continuity and other technical
systems as needed. Planned and managed financial and human resources for IT operations while
ensuring the development of high quality technology solutions for the business. These solutions must be
developed at the best possible cost and be aligned with customer and business needs while establishing
relationships with vendors, customers, employees and key internal and external stakeholders. Organized
sectional teams around continuous delivery principles to increase organizational throughput as well as
automate processes to deliver predictable services consistently.
Operations and Maintenance: Managed the communication computer security (COMPUSEC)
o
program, Air Force Electronic Key Management System (AFEKMS), Emission Security, and Information
Assurance Awareness Programs.
Managed the regular event analysis searching for and extracting information, and incident response from
o
the suite of security tools and system security features (HBSS, IDS, Insider Threat, Anti Virus, Firewall,
System security logs and events, etc.
Filtered information collected from a variety of computer network defense resources (including, but not
o
limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to
identify, analyze, and report events that occur or might occur within their environment.
Established the necessary capabilities for conducting penetration testing and risk assessments of
o
applications and hosting infrastructure through consistent methodology using a variety of automated and
manual tools, and producing uniform reporting standards.
Architecture of CND Tools utilized enterprise SIEM platform (e.g. Nitro/McAfee
Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk, IDA, OllyDbg
HIPS, ID/PS, Full Packet Capture, Host Based Forensics, Network Forensics, IST 800
53 Rev 4, HIPPA, SOX, and Remote Access Service.
USAF 87TH SECURITY FORCES, MCGUIRE AFB, NJ
PHYSICAL REGIONAL SECURITY OFFICER (RSO) 40 HRS JUL 2008 – NOV 2009
As Regional Security Officer (RSO), served as the authoritative source and subject matter expert on all matters
relative to multiple security disciplines, issues, guidance and assistance in the evaluation/analysis of security needs.
Adhered to security policy guidance to formulate facility, program, and personnel resource requirements for program
security. Developed a comprehensive and ongoing security awareness program; administering a multi faceted security
awareness program consisting of briefings, directives, computer based training and audiovisual presentations.
Primarily for the physical protection of sensitive or classified information, personnel, facilities, installations, or other
sensitive materials, resources, or processes against criminal, terrorist, or hostile intelligence activities.
Exercised security regulations policies for multiple security specializations within the required operating
o
areas. Established security SOPs. Planned, prepared, & presented security briefings, and conducted site
specific security briefings.
Coordinated the commands’ crime prevention and physical security awareness program to ensure
o
adequate security relating to issues such as protection of assets, alarm responses, and card use.
PINNACLE –EDS/HP BRISTOL MYERS, SKILLMAN, NJ
SENIOR INFORMATION SYSTEMS SECURITY PROFESSIONAL PROJECT MANAGER APR 2008 – OCT 2009
(ISSP) 40 HRS
As Senior Information Systems Security Professional Project Manager, directed the on going enterprise wide
security oversight, infrastructure support, guidance, and the reviewing of the Agile IT environments including;
supporting large technology integration projects ensuring appropriate technology alignment; ensuring security is
integrated as a major component when implementing new technology (e.g. mobile devices, wireless connectivity,
remote access systems); developing standards for specific devices (e.g. hard drives, flash drives); and providing the
examples of best practices to build a secure foundation leveraged by all HP Enterprise federal contracts.
Served as Information Center (IC) Action Officer, responsible for providing
o
consulting/installation/training/technical support to computer end users. For each request for technical
assistance, determined procedures required to solve problems of the affected IT infrastructure.
Evaluated, acquired, configured and used software intended to ensure that automated systems were
o
secure from unauthorized use, viral infection and other problems that would compromise sensitive
information in terms of confidentiality, integrity, and availability, or would compromise other aspects of
overall system security.
Responsible for all activities associated with providing management, program direction, and guidance to
o
ensure a highly effective Composite Adversary Team capable of conducting performance tests of
protective forces and security systems.
Assisted in the development of security controls and counter measures as well as their positioning within
o
the architecture to support the desired cyber security architecture requirement at the individual system
and at the enterprise level.
Web Services and related technologies (e.g. cloud computing, XML, XML Schema;
WS Security, XACML, SAML, WSDL; UDDI)
USN COMMANDER FLEET ACTIVITIES, JAPAN
LEAD INFORMATION SYSTEM SECURITY OFFICER (ISSO)/ NETWORK JAN 2005 – JAN 2008
INTELLIGENCE ANALYSIS 65 HRS
As Lead ISSO, provided expert technical advice and guidance to Operational Division Chiefs/ CND Planners on
significant risk management and assessment activities that were undertaken to improve cyber security in critical
infrastructures. Developed, maintained and implemented IT Security Training and Awareness Programs in
Classified/Unclassified environments. Served as the subject matter expert and technical authority of CI cyber threats,
as well as, IT forensic analysis procedures, investigations and mitigating techniques.
As ISSO was responsible for the investigation and reporting of all TSC, LS and Unit(s); including system
o
specification, configuration, maintenance, rationalization and account access control.
Conducted cyber risk, malware/vulnerability, cyber related infrastructure inter dependency analysis and
o
the reporting of foreign computer exploitation capabilities directed against the United States.
Provided oversight and served as an expert consultant regarding COMSEC, COMPUSEC, Systems
o
Certification and Accreditation along with emerging technology related to IA. Provided management
oversight of the Information Assurance Vulnerability Management Program (IAVM).
Conducted intelligence analysis relative to the cyber fields of information processing, data
o
communications, network intrusion, and indications/warning to computer networks; streamlining cyber
analytical support for counterintelligence investigations, and operations.
Managed the network physical security systems; SIPRNet Security, Protected Distribution System (PDS)
o
and IP enabled Anti terrorism/Force protection (AT/FP) network devices. Coordinated IA technicians,
systems administrators in monitoring the network for vulnerabilities and compromises. Conducted
security audits and inspections and provides audit/inspection results to the CAR for compliance
reporting.
USN USS VINCENNES CG 49, JAPAN
INFORMATION SYSTEMS SECURITY MANAGER/COMPUTER NETWORK DEFENSE (IA/CND) JAN 2002 – JAN 2005
MANAGER 60 HRS
As Information Systems Security Manager provided technical knowledge and project management skills for
complex information technologies. Orchestrated enterprise level responses to IT security incidents ensuring
coordination with operational users, incident response teams, network security personnel. Provided technical support,
analysis, and recommendations in areas of: Surveillance and Reconnaissance; Perimeter Defense; Malicious Code
Analysis; attack vector analysis; Computer Network Defense (CND) Incident Handling; Vulnerability
Management/Reporting; and Risk Analysis and Readiness.
Assigned as Terminal Area Security Officer (TASO) responsible for the information security support to all
o
IT Division TASOs onboard USN naval vessels. Recommended corrective actions to the Designated
Accreditation Authority (DAA) as necessary.
Managed daily unclassified and classified network operations to include network management, control,
o
security and administration within Network Management (NM), Help Desk (HD), Information Protection
Operations (IPO), and Network Administration (NA) work centers. Administered and maintained
database.
Led team members and administrative support personnel, and for providing guidance and advice;
o
integrating team efforts to assure systematic, thorough, and professional performance of inspections,
assessments and special reviews.
Prepared and reviewed documentation to include System Security Plans (SSPs), Risk Assessment
o
Reports, Certification and Accreditation (C&A) packages, etc.
Core utilization, configuration, and implementation of industry capabilities to include:
Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Security Event
and Incident Manager (SEIM), advanced log analysis, network monitoring, packet
capture analysis, and UNIX command line.
Expert utilization of the following tools: Cadence, Surrey, Traffic Thief, CNE Portal and
X Key score.
USN USS VINCENNES CG 49, JAPAN
GLOBAL NETWORK EXPLOITATION AND VULNERABILITY ANALYST 60HRS NOV 2000 – JAN 2002
Continued
Continued
Continu
As Network Exploitation and Vulnerability Analyst, was the subject matter expert (SME) responsible for Non
Secure Internet Protocol Router Network (NIPRNET) and Secret Internet Protocol Router Network (SIPRNET) Change
Management. Implemented, maintained, and analyzed procedures and security connection requirements in order to
evaluate overall technical features and security protection required for systems and networks processing all sensitivity
levels of information.
Performed a full range of first level supervisory responsibilities including assigning work to subordinates
o
based on priorities, selective consideration of the difficulty and requirements of assignments, and the
capabilities of junior sailors.
Monitored and evaluated ONE NET, IT 21 and legacy network systems compliance with IT security
o
requirements. Led 3 teams in monitoring, reviewing and analyzing Intrusion Detection System (IDS) logs
and reporting/taking action when anomalies exist. Conducted CI related computer inquiries and
investigations.
Performed forensic analysis, evaluated malware code, fuzzing techniques, identified techniques used by
o
attackers to exploit and gain access, and performed reverse engineering to determine actual root causes
of incidents.
GFI Event Log Manager, Splunk, or equivalent log management software knowledge
Secure Technical Implementation Guides (STIGs), Information Assurance Vulnerability
Alert (IAVA), DCID 6/3, Federal Information Security