Post Job Free
Sign in

Information Technology Systems

Location:
Mount Laurel, NJ
Posted:
May 23, 2024

Contact this candidate

Resume:

CURRICULUM VITAE

Dr. Jamaine Mungo

Phone: 856-***-****

Email: ad5w0o@r.postjobfree.com

LinkedIn: www.linkedin.com/in/jamainemungo

Publications: https://www.anatomyofcyberattacks.com/publications Statement of Teaching Philosophy

As an educator, I am motivated to share and provide my knowledge and expertise to students that have a desire to learn. In my chosen profession, information technology, continual learning is crucial to sustainability. My 20+ years of experience positions me to be able to help students to become critical thinkers who ask questions from a place of curiosity and create a philosophy of always wanting to learn and grow professionally and personally. My hope is that while students glean knowledge through their course work, they will simultaneously grasp the material and apply that knowledge in the practice and principle of their chosen field. Staying up to date on information technology is crucial to success. My goal is ensure my students comprehend the understanding of information technology practices so they have the ability to secure their environments and have the capacity to secure systems and data. Information technology is a constantly evolving industry that is continuously changing and gaining a firm education on the procedures and processes will enable students to be successful in the workforce. I believe the formal education process is the catalyst for individuals to become critical thinkers and lifelong learners. Through education, individuals of all ages and backgrounds, including myself, can learn and gain a wealth of knowledge that will drive them to success.

A good instructor takes the time to ensure students fully understand the concepts and have the ability to apply it to real world situations. In the classroom, I maintain focus, provide guidance, engage students, and keep order to provide students with knowledge that they will maintain giving them a firm understanding of the course concepts. To create an engaged learning environment, the key is interaction. This requires participation on their part and will keep them thinking on how they are contributing to the course/classroom. While instructing, I create lessons that are relevant to each student by listening to the interests, hopes, and dreams. My goal is to get students motivated to the extent that they are still thinking about subject matter outside of the classroom. I believe in the ability for each student to make major contributions to a class, based upon their own life, professional and educational experiences. I utilize teaching methods such as engaging in student discussions, targeting individual interests, and using motivational interviewing to encourage ideas and open exchanges of ideas. This creates a customized educational experience that is dynamic and specific with each course and group to students. My challenge for each student I teach is to leave my classroom better than when they entered and knowing I can have that positive change in someone’s life is what inspires me to teach. Personal Attributes

Skilled in many disciplines such as information security, starting from the baseline of how to ensure a computer system is secure from known attacks, utilizing and writing scripts to automate processes.

Respected professional with a passion for educating those in the area of information security on implementing information security best practices and developing solutions on securing systems. Ability to excel in a demanding, outcome-oriented, and dynamic work environment. Skilled at establishing strategic vision, setting key reporting metrics, and defining clear objectives for leading high performing teams, individuals and developing an action plan to mitigate identified concerns.

Utilize innovative teaching strategies that promote student success. Ensure compliance with state and federal information security policies, standards, directives and work closely with senior leadership, data custodians and governance groups. Strong leadership experience with designing and the execution of several initiatives focusing on enterprise wide vulnerability assessments, penetration tests, security audits, automated patch management and continuous risk program management receiving recognition for successful implementation and remediation.

Management skills while defining vision paths that align with business objectives. Establish and maintain effective communication and rapport with various layers of management ranging from the chief technology officer, senior leadership staff, technical teams, peers, clients and vendors.

Organized, goal oriented and technically skilled individual whom enjoys the challenge of complex demanding tasks and assignments.

Formal Education

DIT, Information Assurance & Cybersecurity 2022

Capella University, Minneapolis, MN

MS, Information Systems Security 2013

New Jersey Institute of Technology, Newark, NJ

BS, Information Systems and Decision Sciences 2002 Virginia State University, Petersburg, VA

Licenses and Certifications

Certified Network Defense Architect (CNDA) 2016

Certified Hacking Forensic Investigator (CHFI) 2016 Certified Ethical Hacker (CEH) 2015

Certified Information Systems Security Professional (CISSP) 2014 Certified Professional Managers (CM) 2014

Microsoft Certified Professional (MCP) 2010

Microsoft Certified System Administrator (MCSA) 2009 Security + Certification 2008

Network + Certification 2006

CompTIA A+ 2005

Scholarly Publications

Author, “Anatomy of Cyber Attacks: Exploitation of the Weakest Link,” Palmetto Publishing https://www.anatomyofcyberattacks.com/the-book

Research Journal Article, “Self-Paced Cybersecurity Awareness Training: Educating Employees to Identify Phishing Attacks,” published in the Journal of Cyber Security Technology https://doi.org/10.1080/23742917.2023.2244210

Current Faculty Appointments

Adjunct Faculty

Cornell University, Ithaca, NY 2021-Present

Serve as an Adjunct Faculty member in Cornell University’s Campus teaching courses in the area of System Design for Organizations and System Administration. Courses Taught:

Course Title: System Design for Organizations

This course provides design principles of intelligent, adaptive organizations built for systems thinking. With expert guidance and hands-on activities, students will create organization’s vision and mission and build capacity and learning systems that support organization’s ability to achieve core principles. This approach is a systems leadership and organizational design model that provides students to help design, guide, manage, and to have an organization, at every level, working toward realizing their company’s vision.

Course Title: System Administration

This course provides the system administration essentials from a security orientated perspective. This course incorporates system administration information on installing and configuring network component; operating system familiarity and scripting. Security awareness including threats, vulnerabilities, secure protocols and secure system design. Students are provided with an the administration and security features of Windows Server, Linux and Unix operating system, features, tools, and security mechanisms. Department Chair, Computer Science Deparment

Purdue University, West Lafayette, IN 2021-Present Proficiently managed the reporting of all sections including Summer, Fall, and Spring schedules, ensuring accurate and timely scheduling of academic offerings. Effectively oversaw and resolved student complaints for all adjunct faculty members within the Computer Science Department, enhancing student satisfaction and fostering a positive learning environment. Successfully supervised curriculum changes for the Computer Science undergraduate degree, contributing to program enhancements and alignment with industry standards. Managed course registration and instructor assignments while maintaining compliance with university established benchmarks and quality metrics.

Adjunct Faculty

North Carolina Agricultural and Technical State University, Greensboro, NC 2021-Present Serve as an Adjunct Faculty member in North Carolina A&T University’s Campus teaching courses in the area of System Communication Security and Human Computer Interaction Courses Taught:

Course Title: System Communication Security

This course builds upon Operating system security by securing communication between networked systems.Implement transport layer security (TLS) and a public key infrastructure (PKI). Use a scripting language to automate security relevant tasks and verify compliance with organizational security standard Course Title: Human Computer Interaction

The study of human-computer interaction enables system architects to design useful, efficient, and enjoyable computer interfaces. The course provides the theory, design procedure, and programming practices behind effective human interaction with computers, and a specific focus on smart phones and tablets.

Adjunct Faculty

Tulane University University, New Orleans, LA 2020-Present Serve as an Adjunct Faculty member in Tulane University’s campus teaching a course in the area of Networking Security Principles and designed the Identity Access & Access Management, Windows Server Administration courses

Courses Taught:

Course Title: Networking Security Principles

This course prepares students to install, configure, and troubleshoot networks. Topic areas include LANs, WANs, TCP/IP, security, cabling, cloud computing and virtualization, wireless networking, network applications. This course covers topics in data communications and various technologies that affect business communications. In addition to learning common networking terminology, students will examine existing and emerging networking standards and architectures. Also covered are operating systems, wiring topologies, communications protocols, Local area network (LAN-to-LAN) interconnectivity, and Wide Area Networks (WAN) fundamentals.This course is intended to provide a solid foundation for the study of communications and networking.

Course Designed:

Course Title: Ethical Hacking

This course empowers students to become proficient in ethical hacking techniques, penetration testing, and network security. The course focuses on developing professionals who can ethically and responsibly safeguard digital assets, making it an essential training ground for aspiring cybersecurity experts and those seeking to protect digital ecosystems from cyber threats. Course Title: Identity Access & Access Management

This course is designed to familiarize students with the skills needed to administer a Microsoft network within an enterprise. The course provides an in-depth look at the features of Active Directory, including Group Policy, scripting, replication, and disaster recovery, plus the use of Exchange Server in the enterprise for reliable communication services.

Course Designed: Windows Server Administration

This course is designed to prepare students with the latest iteration of Microsoft Windows Server. Students will be provided with detailed insight and experience on common, foundational Windows Server configurations. Students will learn about the Microsoft Hyper-V environment and how features like high availability, fault-tolerance, disaster recovery, automated backups, and network load balancing. Adjunct Faculty

Wilmington University, New Castle, DE 2020-Present Serve as an Adjunct Faculty member in Wilmington University’s Campus teaching courses in the areas of Operating Systems & Computer Systems Security and Security Foundations Courses Taught:

Course Title: Operating System & Computer Systems Security This course provides technical knowledge and develops the employability skills necessary for success in the business-world of cybersecurity. The following topics are covered: Security Principles (Windows Security Architecture, Linux Security), Account Security (Securing Accounts, Passwords, Password Aging, and Verification of System State), File System Security (Windows Server 2016, Windows 10 File Security, NAS Storage Security), Accessing Risk (Key loggers, Sniffers, Port Scanning), Risk Analysis

(Viruses, Patches, Packaging Techniques), and Encryption. Course Title: Security Foundations

In the Security Foundations course, students gain a fundamental understanding of the security concepts that provide a conceptual basis for the Cyber Security track. The topics examined in this course include basic security concepts, threat actors and attributes, security frameworks, organizational security policies, security controls, business impact analysis, risk management, incident response, business continuity, and disaster recovery. This course provides students with a global perspective of the challenges of designing, developing, and implementing a comprehensive organizational security solution. Through reading, exercises, discussion forums, and assessments, students learn about the basic foundations, concepts, frameworks, procedures, and laws that shape an organization’s security program. The course also reviews standard security terminology, compliance requirements, and the relationships of assets, vulnerabilities, threats, risk, and harm. Countermeasures, mitigations, and the formulas of the risk/mitigation decision-making process.

Industry and Professional Experience

Excecutive Director of Cybersecurity 2019 – Present Comcast Corporation

Philadelphia, PA

Accountable for driving a comprehensive cybersecurity program to ensure information systems, data, and resources are secured.

Established practices designed to uncover, analyze, and communicate information security risks to business executives.

Collaborated with department leaders, internal teams, stakeholders to execute strategies following determined risk management standards.

Evaluate new cybersecurity threats, trends, and implement technical security controls to mitigate risks.

Provide leadership to a team of cybersecurity professionals in support of established goals, objectives, and career development.

Implement automated cybersecurity solutions, research and propose new technical procedures to enhance the security posture.

Liaise with engineering architecture team to ensure technical security controls are built into the development of applications.

Proactively partner with business leaders to align security requirements, engineering processes and technical security controls.

Deputy Cyber Operations Secuirty Officer 2017 – 2019 State of New Jersey Office of the Attorney General Atlantic City, NJ

Oversee the Information Security Officers of each Atlantic City casino to ensure regulatory information security policies are aligned.

Lead monthly vulnerability risk assessments, develop corrective action plans and evaluate proposed risk mitigation procedures.

Provide strategic direction and leadership to a cyber security team responsible for resolving reported incidents and compliance violations.

Drive reported security incidents through resolution and conduct continuous monitoring to identify potential areas of risks.

Implemented metric dashboard reporting system to measure the overall effectiveness of each casino’s information security program.

Evaluate incident response procedures, business continuity and disaster recovery plans providing recommendations for improvement.

Direct the deployment of new security solutions and enhancements to existing security controls in accordance with compliance standards.

Ensure effective corrective measures have been deployed after an incident or vulnerability has been remediated.

Director of Systems Security

Lockheed Martin Advanced Technology Laboratories Overall 2007 - 2017 Cherry Hill, NJ

Director of Systems Security 2011– 2017

Provided leadership to a team of direct reports responsible for applying information security policies and incident response plans.

Implemented system security controls in accordance to corporate information security and risk management directives.

Liaise with executive leadership to determine acceptable levels of risk and implement procedures to meet defined policies and standards.

Performed continuous risk monitoring of systems to ensure compliance and schedule the remediation of identified vulnerabilities.

Senior Information Security Manager 2009 – 2011

Developed annual information security strategy, established milestones and communicate service level agreements.

Conducted the implementation of corporate security awareness training courses along with online learning education modules.

Created corporate security policies, review vendor acquisition processes and ensure effective security controls are in place.

Infrastructure Security Manager 2007 – 2009

Directed the continuous enhancement of initiatives of the corporate information security program. Ensure corporate departments are adhering to defined security policies, technology control standards and regulatory procedures.

Managed the timely deployment of data loss prevention solutions, intrusion detection and endpoint data protection strategies.

Deployed network defense countermeasures and secure solutions to effectively maintain enterprise network security.

PHH Mortgage Corporation Overall 2002 - 2007

Mt. Laurel, NJ

Division Technical Operations Advisor 2004 – 2007

Provided guidance to a team of system administrators and developer engineers in their daily responsibilities.

Established service level metrics, project deliverables, individual and team commitments. Partner with department groups to implement corporate technology vision, strategy and commitments.

Implemented preventative maintenance logging efforts to ensure network and data integrity. Assessed the need for system and software reconfigurations based on incident reporting metrics and trends.

Performed routine audits of system assets and processes to ensure compliance with established corporate directives.

Collaborated with department project managers to evaluate system improvements to increase efficiency and reduce support costs.

Hosted technical training courses for employees on the functionality of updated application features and new software.

System Administrator Supervisor 2002 – 2004

Supervised a team supporting 10,000 internal and 2,000 remote employees ensuring incidents are prioritized, escalated and resolved.

Developed procedures to increase the effectiveness of how incidents are identified, documented, assigned and remediated.

Monitored the performance of corporate systems to isolate performance bottlenecks and coordinate the required upgrades.

Created online support knowledge base for operational procedures, system documentation and technical reviews for planned projects.

Communicate attentively with stakeholders throughout scheduled system upgrades, incident progress and unplanned outages.

Ensured deployed systems and applications are reliable, effective and meet the service delivery needs of all departments.

Automated the backup and restoration of network drives, employee profiles, critical business documents and application databases.

Business and Technical Training

Certified Manager Training October 2014

Corporate Training

CISSP Training June 2014

CED Solutions Atlanta Georgia

Memberships and Affiliations

ISC CISSP Chair of the Board of Directors 2014 - Present Member of the Board of Advisors 2010 - Present

National Society of Industrial Security Professionals Alpha Phi Alpha Fraternity, Inc Technology Committee Board Member 2019 - Present Alumni Chapter President 2020 - Present

New Jersey Cybersecurity & Communications Integration 2014 - Present FBI InfraGard Advisory Board Member 2007 - Present National Cyber Security Alliance 2010 - Present

Community Service and Social Contributions

Habitat for Humanity 2010 - Present

Maple Shade, NJ

Burlington county community serviceman 2008 - Present Willingboro, NJ

South Jersey Food Bank 2006 - Present

Pennsauken, NJ

Youth Mentoring 2005 - Present

Willingboro, NJ

Conferences Attended

CompTIA Partner Summit August 2023

Las Vegas, NV

Information Security Symposium January 2019

Atlantic City, NJ

Black Hat August 2018

Las Vegas, NV

Defcon August 2018

Las Vegas, NV

RSA Conference March 2017

San Francisco, CA

SANS Cyber Security August 2016

Washington DC

Large Installation System Administration Conference November 2015 San Francisco, CA

Philadelphia Secure World – ISC July 2014

Philadelphia, PA

Dell SecureWorks September 2012

San Francisco, CA

Professional Presentations

Risk Management 2016- Present

Presented to Chief Information Security Officers, Cybersecurity Professionals Information Security Awareness 2012 - Present

Presented to all employees

Social Media Best Secure Practices August 2019

Presented to Interns, All Employees, Senior leadership, Executives Security Education Awareness Training October 2015 Presented to all employees

Data Privacy January 2014

Presented to Engineers, Project Managers, Executive Staff members, All employees Social Engineering July 2013

Presented to Engineers, Project Managers, Executive Staff members, all employees Incident Response July 2012

Presented to Managers, Security Staff, Infrastructure Staff Emerging Threats March 2012

Presented to Security Administrators, Developers, System Administrators, All employees Insider Threat June 2011

Presented to Security Administrators, Developers, System Administrators, All employees Residencies and Colloquia

Doctoral Residency – Orlando November 2018

Awards and Honors

Comcast Corporation Technical Leader of Innovation & Excellence Award 2023 Lockheed Martin Honors Achievement Award 2012

Lockheed Martin Service Recognition Award 2011

Lockheed Martin Employee of the Quarter Award 2008 PHH Mortgage Corporation Technical Leadership Award 2006 PHH Mortgage Corporation Technology Service Award 2004 Highly Competent Subject Areas

Software:

Microsoft Office Suite

Microsoft Active Directory

Group Policy Management

RSA Access Token

McAfee Virus Scan Enterprise

McAfee EPO

McAfee Host Intrusion Prevention

McAfee Foundstone

Symantec Backup Exec

Nessus

Wireshark

FireEye

Splunk

Rapid7

LogRhythm

VMware

Air Defense Enterprise

Juniper VPN Client

Dell KACE

Windows 7

Windows 10

Windows Server 2016

Mac OSX

Linux

Visual Basic

Batch Scripting

Java Script

AutoIT

Learning Management Systems:

Canvas

Moodle

Blackboard

Udemy

Subject Matter Expert:

System Security – Windows / Linux

Windows Forensics

Virtualization

Cyber Security

Computer Security and Systems Management

System Planning and Auditing

Continuous Monitoring and Security Operations

Information Security Awareness Education

IT Auditing & Compliance

Laws of Data Security and Investigations

Project Management

Organizational Behavior

Network-Arch-Protocols

Command and Control Systems

Information Systems Principles

Systems Analysis & Design

Emergency Management Informatics

Information Systems Strategy

References

Dr. Mark Best

Senior Cyber Security Engineer Staff

Lockheed Martin

Phone: 610-***-****

Email: ad5w0o@r.postjobfree.com

Dr. Cortney Bolden

Chief Scientist

MIA Solutions, LLC

Phone: 856-***-****

Email:ad5w0o@r.postjobfree.com

Dr. Kareem Hogan

Adjunct Professor, North Carolina A&T

Phone: 404-***-****

Email:ad5w0o@r.postjobfree.com

Dr. Darcel Tolliver

Adjunct Professor, University of the Cumberlands

Phone: 609-***-****

Email: ad5w0o@r.postjobfree.com



Contact this candidate