CURRICULUM VITAE
Dr. Jamaine Mungo
Phone: 856-***-****
Email: ************@******.***
LinkedIn: www.linkedin.com/in/jamainemungo
Publications: https://www.anatomyofcyberattacks.com/publications Statement of Teaching Philosophy
As an educator, I am motivated to share and provide my knowledge and expertise to students that have a desire to learn. In my chosen profession, information technology, continual learning is crucial to sustainability. My 20+ years of experience positions me to be able to help students to become critical thinkers who ask questions from a place of curiosity and create a philosophy of always wanting to learn and grow professionally and personally. My hope is that while students glean knowledge through their course work, they will simultaneously grasp the material and apply that knowledge in the practice and principle of their chosen field. Staying up to date on information technology is crucial to success. My goal is ensure my students comprehend the understanding of information technology practices so they have the ability to secure their environments and have the capacity to secure systems and data. Information technology is a constantly evolving industry that is continuously changing and gaining a firm education on the procedures and processes will enable students to be successful in the workforce. I believe the formal education process is the catalyst for individuals to become critical thinkers and lifelong learners. Through education, individuals of all ages and backgrounds, including myself, can learn and gain a wealth of knowledge that will drive them to success.
A good instructor takes the time to ensure students fully understand the concepts and have the ability to apply it to real world situations. In the classroom, I maintain focus, provide guidance, engage students, and keep order to provide students with knowledge that they will maintain giving them a firm understanding of the course concepts. To create an engaged learning environment, the key is interaction. This requires participation on their part and will keep them thinking on how they are contributing to the course/classroom. While instructing, I create lessons that are relevant to each student by listening to the interests, hopes, and dreams. My goal is to get students motivated to the extent that they are still thinking about subject matter outside of the classroom. I believe in the ability for each student to make major contributions to a class, based upon their own life, professional and educational experiences. I utilize teaching methods such as engaging in student discussions, targeting individual interests, and using motivational interviewing to encourage ideas and open exchanges of ideas. This creates a customized educational experience that is dynamic and specific with each course and group to students. My challenge for each student I teach is to leave my classroom better than when they entered and knowing I can have that positive change in someone’s life is what inspires me to teach. Personal Attributes
Skilled in many disciplines such as information security, starting from the baseline of how to ensure a computer system is secure from known attacks, utilizing and writing scripts to automate processes.
Respected professional with a passion for educating those in the area of information security on implementing information security best practices and developing solutions on securing systems. Ability to excel in a demanding, outcome-oriented, and dynamic work environment. Skilled at establishing strategic vision, setting key reporting metrics, and defining clear objectives for leading high performing teams, individuals and developing an action plan to mitigate identified concerns.
Utilize innovative teaching strategies that promote student success. Ensure compliance with state and federal information security policies, standards, directives and work closely with senior leadership, data custodians and governance groups. Strong leadership experience with designing and the execution of several initiatives focusing on enterprise wide vulnerability assessments, penetration tests, security audits, automated patch management and continuous risk program management receiving recognition for successful implementation and remediation.
Management skills while defining vision paths that align with business objectives. Establish and maintain effective communication and rapport with various layers of management ranging from the chief technology officer, senior leadership staff, technical teams, peers, clients and vendors.
Organized, goal oriented and technically skilled individual whom enjoys the challenge of complex demanding tasks and assignments.
Formal Education
DIT, Information Assurance & Cybersecurity 2022
Capella University, Minneapolis, MN
MS, Information Systems Security 2013
New Jersey Institute of Technology, Newark, NJ
BS, Information Systems and Decision Sciences 2002 Virginia State University, Petersburg, VA
Licenses and Certifications
Certified Network Defense Architect (CNDA) 2016
Certified Hacking Forensic Investigator (CHFI) 2016 Certified Ethical Hacker (CEH) 2015
Certified Information Systems Security Professional (CISSP) 2014 Certified Professional Managers (CM) 2014
Microsoft Certified Professional (MCP) 2010
Microsoft Certified System Administrator (MCSA) 2009 Security + Certification 2008
Network + Certification 2006
CompTIA A+ 2005
Scholarly Publications
Author, “Anatomy of Cyber Attacks: Exploitation of the Weakest Link,” Palmetto Publishing https://www.anatomyofcyberattacks.com/the-book
Research Journal Article, “Self-Paced Cybersecurity Awareness Training: Educating Employees to Identify Phishing Attacks,” published in the Journal of Cyber Security Technology https://doi.org/10.1080/23742917.2023.2244210
Current Faculty Appointments
Adjunct Faculty
Cornell University, Ithaca, NY 2021-Present
Serve as an Adjunct Faculty member in Cornell University’s Campus teaching courses in the area of System Design for Organizations and System Administration. Courses Taught:
Course Title: System Design for Organizations
This course provides design principles of intelligent, adaptive organizations built for systems thinking. With expert guidance and hands-on activities, students will create organization’s vision and mission and build capacity and learning systems that support organization’s ability to achieve core principles. This approach is a systems leadership and organizational design model that provides students to help design, guide, manage, and to have an organization, at every level, working toward realizing their company’s vision.
Course Title: System Administration
This course provides the system administration essentials from a security orientated perspective. This course incorporates system administration information on installing and configuring network component; operating system familiarity and scripting. Security awareness including threats, vulnerabilities, secure protocols and secure system design. Students are provided with an the administration and security features of Windows Server, Linux and Unix operating system, features, tools, and security mechanisms. Department Chair, Computer Science Deparment
Purdue University, West Lafayette, IN 2021-Present Proficiently managed the reporting of all sections including Summer, Fall, and Spring schedules, ensuring accurate and timely scheduling of academic offerings. Effectively oversaw and resolved student complaints for all adjunct faculty members within the Computer Science Department, enhancing student satisfaction and fostering a positive learning environment. Successfully supervised curriculum changes for the Computer Science undergraduate degree, contributing to program enhancements and alignment with industry standards. Managed course registration and instructor assignments while maintaining compliance with university established benchmarks and quality metrics.
Adjunct Faculty
North Carolina Agricultural and Technical State University, Greensboro, NC 2021-Present Serve as an Adjunct Faculty member in North Carolina A&T University’s Campus teaching courses in the area of System Communication Security and Human Computer Interaction Courses Taught:
Course Title: System Communication Security
This course builds upon Operating system security by securing communication between networked systems.Implement transport layer security (TLS) and a public key infrastructure (PKI). Use a scripting language to automate security relevant tasks and verify compliance with organizational security standard Course Title: Human Computer Interaction
The study of human-computer interaction enables system architects to design useful, efficient, and enjoyable computer interfaces. The course provides the theory, design procedure, and programming practices behind effective human interaction with computers, and a specific focus on smart phones and tablets.
Adjunct Faculty
Tulane University University, New Orleans, LA 2020-Present Serve as an Adjunct Faculty member in Tulane University’s campus teaching a course in the area of Networking Security Principles and designed the Identity Access & Access Management, Windows Server Administration courses
Courses Taught:
Course Title: Networking Security Principles
This course prepares students to install, configure, and troubleshoot networks. Topic areas include LANs, WANs, TCP/IP, security, cabling, cloud computing and virtualization, wireless networking, network applications. This course covers topics in data communications and various technologies that affect business communications. In addition to learning common networking terminology, students will examine existing and emerging networking standards and architectures. Also covered are operating systems, wiring topologies, communications protocols, Local area network (LAN-to-LAN) interconnectivity, and Wide Area Networks (WAN) fundamentals.This course is intended to provide a solid foundation for the study of communications and networking.
Course Designed:
Course Title: Ethical Hacking
This course empowers students to become proficient in ethical hacking techniques, penetration testing, and network security. The course focuses on developing professionals who can ethically and responsibly safeguard digital assets, making it an essential training ground for aspiring cybersecurity experts and those seeking to protect digital ecosystems from cyber threats. Course Title: Identity Access & Access Management
This course is designed to familiarize students with the skills needed to administer a Microsoft network within an enterprise. The course provides an in-depth look at the features of Active Directory, including Group Policy, scripting, replication, and disaster recovery, plus the use of Exchange Server in the enterprise for reliable communication services.
Course Designed: Windows Server Administration
This course is designed to prepare students with the latest iteration of Microsoft Windows Server. Students will be provided with detailed insight and experience on common, foundational Windows Server configurations. Students will learn about the Microsoft Hyper-V environment and how features like high availability, fault-tolerance, disaster recovery, automated backups, and network load balancing. Adjunct Faculty
Wilmington University, New Castle, DE 2020-Present Serve as an Adjunct Faculty member in Wilmington University’s Campus teaching courses in the areas of Operating Systems & Computer Systems Security and Security Foundations Courses Taught:
Course Title: Operating System & Computer Systems Security This course provides technical knowledge and develops the employability skills necessary for success in the business-world of cybersecurity. The following topics are covered: Security Principles (Windows Security Architecture, Linux Security), Account Security (Securing Accounts, Passwords, Password Aging, and Verification of System State), File System Security (Windows Server 2016, Windows 10 File Security, NAS Storage Security), Accessing Risk (Key loggers, Sniffers, Port Scanning), Risk Analysis
(Viruses, Patches, Packaging Techniques), and Encryption. Course Title: Security Foundations
In the Security Foundations course, students gain a fundamental understanding of the security concepts that provide a conceptual basis for the Cyber Security track. The topics examined in this course include basic security concepts, threat actors and attributes, security frameworks, organizational security policies, security controls, business impact analysis, risk management, incident response, business continuity, and disaster recovery. This course provides students with a global perspective of the challenges of designing, developing, and implementing a comprehensive organizational security solution. Through reading, exercises, discussion forums, and assessments, students learn about the basic foundations, concepts, frameworks, procedures, and laws that shape an organization’s security program. The course also reviews standard security terminology, compliance requirements, and the relationships of assets, vulnerabilities, threats, risk, and harm. Countermeasures, mitigations, and the formulas of the risk/mitigation decision-making process.
Industry and Professional Experience
Excecutive Director of Cybersecurity 2019 – Present Comcast Corporation
Philadelphia, PA
Accountable for driving a comprehensive cybersecurity program to ensure information systems, data, and resources are secured.
Established practices designed to uncover, analyze, and communicate information security risks to business executives.
Collaborated with department leaders, internal teams, stakeholders to execute strategies following determined risk management standards.
Evaluate new cybersecurity threats, trends, and implement technical security controls to mitigate risks.
Provide leadership to a team of cybersecurity professionals in support of established goals, objectives, and career development.
Implement automated cybersecurity solutions, research and propose new technical procedures to enhance the security posture.
Liaise with engineering architecture team to ensure technical security controls are built into the development of applications.
Proactively partner with business leaders to align security requirements, engineering processes and technical security controls.
Deputy Cyber Operations Secuirty Officer 2017 – 2019 State of New Jersey Office of the Attorney General Atlantic City, NJ
Oversee the Information Security Officers of each Atlantic City casino to ensure regulatory information security policies are aligned.
Lead monthly vulnerability risk assessments, develop corrective action plans and evaluate proposed risk mitigation procedures.
Provide strategic direction and leadership to a cyber security team responsible for resolving reported incidents and compliance violations.
Drive reported security incidents through resolution and conduct continuous monitoring to identify potential areas of risks.
Implemented metric dashboard reporting system to measure the overall effectiveness of each casino’s information security program.
Evaluate incident response procedures, business continuity and disaster recovery plans providing recommendations for improvement.
Direct the deployment of new security solutions and enhancements to existing security controls in accordance with compliance standards.
Ensure effective corrective measures have been deployed after an incident or vulnerability has been remediated.
Director of Systems Security
Lockheed Martin Advanced Technology Laboratories Overall 2007 - 2017 Cherry Hill, NJ
Director of Systems Security 2011– 2017
Provided leadership to a team of direct reports responsible for applying information security policies and incident response plans.
Implemented system security controls in accordance to corporate information security and risk management directives.
Liaise with executive leadership to determine acceptable levels of risk and implement procedures to meet defined policies and standards.
Performed continuous risk monitoring of systems to ensure compliance and schedule the remediation of identified vulnerabilities.
Senior Information Security Manager 2009 – 2011
Developed annual information security strategy, established milestones and communicate service level agreements.
Conducted the implementation of corporate security awareness training courses along with online learning education modules.
Created corporate security policies, review vendor acquisition processes and ensure effective security controls are in place.
Infrastructure Security Manager 2007 – 2009
Directed the continuous enhancement of initiatives of the corporate information security program. Ensure corporate departments are adhering to defined security policies, technology control standards and regulatory procedures.
Managed the timely deployment of data loss prevention solutions, intrusion detection and endpoint data protection strategies.
Deployed network defense countermeasures and secure solutions to effectively maintain enterprise network security.
PHH Mortgage Corporation Overall 2002 - 2007
Mt. Laurel, NJ
Division Technical Operations Advisor 2004 – 2007
Provided guidance to a team of system administrators and developer engineers in their daily responsibilities.
Established service level metrics, project deliverables, individual and team commitments. Partner with department groups to implement corporate technology vision, strategy and commitments.
Implemented preventative maintenance logging efforts to ensure network and data integrity. Assessed the need for system and software reconfigurations based on incident reporting metrics and trends.
Performed routine audits of system assets and processes to ensure compliance with established corporate directives.
Collaborated with department project managers to evaluate system improvements to increase efficiency and reduce support costs.
Hosted technical training courses for employees on the functionality of updated application features and new software.
System Administrator Supervisor 2002 – 2004
Supervised a team supporting 10,000 internal and 2,000 remote employees ensuring incidents are prioritized, escalated and resolved.
Developed procedures to increase the effectiveness of how incidents are identified, documented, assigned and remediated.
Monitored the performance of corporate systems to isolate performance bottlenecks and coordinate the required upgrades.
Created online support knowledge base for operational procedures, system documentation and technical reviews for planned projects.
Communicate attentively with stakeholders throughout scheduled system upgrades, incident progress and unplanned outages.
Ensured deployed systems and applications are reliable, effective and meet the service delivery needs of all departments.
Automated the backup and restoration of network drives, employee profiles, critical business documents and application databases.
Business and Technical Training
Certified Manager Training October 2014
Corporate Training
CISSP Training June 2014
CED Solutions Atlanta Georgia
Memberships and Affiliations
ISC CISSP Chair of the Board of Directors 2014 - Present Member of the Board of Advisors 2010 - Present
National Society of Industrial Security Professionals Alpha Phi Alpha Fraternity, Inc Technology Committee Board Member 2019 - Present Alumni Chapter President 2020 - Present
New Jersey Cybersecurity & Communications Integration 2014 - Present FBI InfraGard Advisory Board Member 2007 - Present National Cyber Security Alliance 2010 - Present
Community Service and Social Contributions
Habitat for Humanity 2010 - Present
Maple Shade, NJ
Burlington county community serviceman 2008 - Present Willingboro, NJ
South Jersey Food Bank 2006 - Present
Pennsauken, NJ
Youth Mentoring 2005 - Present
Willingboro, NJ
Conferences Attended
CompTIA Partner Summit August 2023
Las Vegas, NV
Information Security Symposium January 2019
Atlantic City, NJ
Black Hat August 2018
Las Vegas, NV
Defcon August 2018
Las Vegas, NV
RSA Conference March 2017
San Francisco, CA
SANS Cyber Security August 2016
Washington DC
Large Installation System Administration Conference November 2015 San Francisco, CA
Philadelphia Secure World – ISC July 2014
Philadelphia, PA
Dell SecureWorks September 2012
San Francisco, CA
Professional Presentations
Risk Management 2016- Present
Presented to Chief Information Security Officers, Cybersecurity Professionals Information Security Awareness 2012 - Present
Presented to all employees
Social Media Best Secure Practices August 2019
Presented to Interns, All Employees, Senior leadership, Executives Security Education Awareness Training October 2015 Presented to all employees
Data Privacy January 2014
Presented to Engineers, Project Managers, Executive Staff members, All employees Social Engineering July 2013
Presented to Engineers, Project Managers, Executive Staff members, all employees Incident Response July 2012
Presented to Managers, Security Staff, Infrastructure Staff Emerging Threats March 2012
Presented to Security Administrators, Developers, System Administrators, All employees Insider Threat June 2011
Presented to Security Administrators, Developers, System Administrators, All employees Residencies and Colloquia
Doctoral Residency – Orlando November 2018
Awards and Honors
Comcast Corporation Technical Leader of Innovation & Excellence Award 2023 Lockheed Martin Honors Achievement Award 2012
Lockheed Martin Service Recognition Award 2011
Lockheed Martin Employee of the Quarter Award 2008 PHH Mortgage Corporation Technical Leadership Award 2006 PHH Mortgage Corporation Technology Service Award 2004 Highly Competent Subject Areas
Software:
Microsoft Office Suite
Microsoft Active Directory
Group Policy Management
RSA Access Token
McAfee Virus Scan Enterprise
McAfee EPO
McAfee Host Intrusion Prevention
McAfee Foundstone
Symantec Backup Exec
Nessus
Wireshark
FireEye
Splunk
Rapid7
LogRhythm
VMware
Air Defense Enterprise
Juniper VPN Client
Dell KACE
Windows 7
Windows 10
Windows Server 2016
Mac OSX
Linux
Visual Basic
Batch Scripting
Java Script
AutoIT
Learning Management Systems:
Canvas
Moodle
Blackboard
Udemy
Subject Matter Expert:
System Security – Windows / Linux
Windows Forensics
Virtualization
Cyber Security
Computer Security and Systems Management
System Planning and Auditing
Continuous Monitoring and Security Operations
Information Security Awareness Education
IT Auditing & Compliance
Laws of Data Security and Investigations
Project Management
Organizational Behavior
Network-Arch-Protocols
Command and Control Systems
Information Systems Principles
Systems Analysis & Design
Emergency Management Informatics
Information Systems Strategy
References
Dr. Mark Best
Senior Cyber Security Engineer Staff
Lockheed Martin
Phone: 610-***-****
Email: **********@*****.***
Dr. Cortney Bolden
Chief Scientist
MIA Solutions, LLC
Phone: 856-***-****
Email:*******@***************.***
Dr. Kareem Hogan
Adjunct Professor, North Carolina A&T
Phone: 404-***-****
Email:*******@****.***
Dr. Darcel Tolliver
Adjunct Professor, University of the Cumberlands
Phone: 609-***-****
Email: *******@*****.***