Resume

Sign in

Air Force Manager

Location:
Newport News, VA
Posted:
September 25, 2020

Contact this candidate

Resume:

GLENDA N. DANIEL

*** **** **** ********, ** ***** PHONE: 787-***-**** EMAIL: adgex9@r.postjobfree.com SUMMARY OF QUALIFICATIONS: Active TS/SCI security clearance. 20-years of military experience managing and providing Security Management and Cyberspace Security service to support United States Air Force organizations located worldwide. Has completed an Associates of Science in Information Systems Management and another in Space Technology; and has a number of professional certifications, to include: TEMPEST Certified Manager, CompTIA Security+, Certified Ethical Hacker, eMASS, RMF, System Admin, ACAS, HBSS 201 and 301, and Cyberspace 200. Has worked in the United States, Southwest Asia, and United Kingdom, with military, civilian, and local national personnel.

PROFESSIONAL EXPERIENCE

CAREER PROFILE

Broad range of escalating mission responsibilities and experiences highlighted and framed by the following:

• Current TS/SCI Clearance, SCIF experience

• AOC Weapon System experience

• Security Manager

• Information Assurance Manager

• Emissions Security Manager

• Quality Assurance and Compliance Inspector

• Combat Communications experience

• COMSEC experience

• Familiar with DoD Risk Management Framework (RMF) – DISA eMASS, HBSS, ACAS and XACTA

• Broad supervisory and management of personnel and resources GDIT 2019 – Present

INFORMATION SYSTEM SECURITY OFFICER (ISSO)

27 Intel Squadron JOINT BASE LANGLEY-EUSTIS, VA

• Populate the XACTA database with all bodies of evidence to support system accreditation actions Create Plans-of-Action and Milestones (POA&M) based on Security Assessment Reports (SAR) developed during system accreditation actions

• Oversees LDAP/Serena account authorization, creation and management

• Responsible for the day-to-day security accreditation and certification of the systems. Maintains IT Equipment Account as Custodian for all non-platform Information Technology (IT) systems within assigned Special Access Program Facility (SAPF)

• In charge of physical and digital media management

• Ensure proper measures are taken when an IS security incident arise, report to the ISSM, media sanitization

• Write and review security controls for Concept of Operations (CONOPS)

• Responsible of file hashes

• Proficient with ACAS scans

MCR 2019

CYBER SPECIALIST

BATTLE MANAGEMENT DIRECTORATE (AFLCMC/DET 12) JOINT BASE LANGLEY-EUSTIS, VA

• Provides AFLMC-Det 12 support with regards JWICS and IT policy, procedures, troubleshooting, and guidance IAW directives

Glenda N. Daniel: Page 2 of 5

• Ensures configuration management for security relevant IS software, hardware, and firmware is maintained and documented

• Ensures all IS’ are operated, maintained, and disposed of IAW established security policies and practices, SAP directives and the System Security Plan

• Maintains IT Equipment Account as Custodian for all non-platform Information Technology (IT) systems within assigned Special Access Program Facility (SAPF)

• Manages IS Self-Inspection Program

MCR 2018 – 2019

SECURITY MANAGER LEVEL I

BATTLE MANAGEMENT DIRECTORATE (AFLCMC/HB) JOINT BASE LANGLEY-EUSTIS, VA

• Provides technical advice and security support to multiple collateral programs and where specifically called for, SCI programs within the Directorate

• Assists the government in the development and writing of Operations Security (OPSEC) plans, transition plans, emergency action plans, transportation plans and any other security documents as needed for the customer

• Liaison between AFLCMC/HB personnel and the Wing Information Program, responsible for the development and implementation of policies, procedures, standards, training, and methods for identifying and protecting information, personnel, property, facilities, operations, or material from unauthorized disclosure, misuse, theft, assault, vandalism, espionage, sabotage, or loss

• Develops Security Classification Guides, Program Protection Plans, Security Operating Procedures and other key security documents as directed by the IP Lead U.S. AIR FORCE 1998 – 2018

HQ AIR COMBAT COMMAND, DET 4 2013 – 2018

MANAGER, INFORMATION ASSURANCE JOINT BASE LANGLEY-EUSTIS, VA

• Masterfully manages 4-member IA team for a $35M Air Operations Center (AOC) weapon system, sustaining 172 enterprise accounts on 4-networks for Continuity of Operations (COOP) alternate sites and 3-Combatant Commands. Ensures all mandatory network security, hardware, and software updates are enacted in accordance with established guidelines and directives. Oversees IA risk and vulnerability management, ensuring AOC Tier 1 help desk policies comply with Air Force and DoD mandates

• Flawlessly manages Numbered Air Force COOP account roster; processes 28 weapon system access requests–eliminating stagnant credentials, safeguarding $35M in assets

• Expertly directs next-general secure phone installation; expedites 27 crypto device pins–prepares multi- Numbered Air Force secure communication COOP requirements

• Oversees Detachment COMSEC Staff Assistance Visits; scrubbed 118 controlled communications and

$58K in resources, enforces Information Assurance standards for 78 personnel–lauded by inspectors

• Communication Security (COMSEC) Responsible Officer; maintained COMSEC account in support of SAP requirements, to include Tactical Local Area Network Encryptor (TACLANE), VIPER phones and Secure Telephone Equipment (STE) equipment

• Leads TEMPEST accreditation; enforces compliance and updates systems maps and 723 assets–averted classified network ATO revocation

• Successfully stood-up Detachment Operations Security (OPSEC) program; fulfilled 14 readiness items and drafted Critical Information List and briefed guidance to 86 users–closed Quality Assurance findings

• Revamped account request process; teamed up with SharePoint administration to develop Portal and 14 forms merged into 1–saved 45-minutes per account, per user

• Quarterbacked Classified Message Incident closures; discovered classified assets on unclassified network–educated users and halted additional data release Glenda N. Daniel: Page 3 of 5

• Initiated network vulnerability scans; tasked 900 desktops and 62 servers updates–ensured network security conformance with DoD requirement

• Handpicked as Air Combat Command Information Systems Security Officer during 3-month vacancy; provided IA program direction and continuity for 140 personnel 26TH NETWORK OPERATIONS SQUADRON 2012 – 2013

MANAGER, INFORMATION ASSURANCE MAXWELL AFB – GUNTER ANNEX, AL

• Expertly enforced Information Assurance (IA) policies for $10B cyber weapons system defending AFIN for 9 Combatant Commands, 10 Major Commands, and 385 Air Force sites

• Revamped account management process; verified training and forms for 290 accounts–safeguarded access by $1.5B network battlespace

• Discovered rogue USB device; locked user’s network account and secured the system–averted insider threat and defended $6.4B Air Force Network

• Masterfully managed Squadron EMSEC program; conducted 2-Staff Assistance Visits and applied 6- countermeasures–fortified security posture of $40M networks

• Implemented 110+ IA C&A controls; efforts let to “first-ever” SIPR security suite approval to operate

• Directed wing 10K user account audit; purged over 500 dormant records–mitigated cyber threats at 7- geographically separated units and a $150M enclave 100TH COMMUNICATIONS SQUADRON 2009 – 2012

WING EMISSIONS SECURITY MANAGER RAF MILDENHALL, ENGLAND

• Reinvigorated Squadron antiterrorism program; updated 12 expired Force Protection and Random Anti- Terrorist Measures action items–ensured security of $78M in Squadron assets

• Security expert for USAFE/Air Force Special Operations Command secure network expansion; bolstered Special Operations Group IA posture–paved way for 2-Star General’s vision

• Served as lead Command and Control secure planner; developed and advised Special Operation Force clandestine mission operations–secured U.S. Special Operations Command’s #1 command priority/$4M

• Key to AF network migration; validated 14 safeguards for $57M infrastructure–base primed for success

• 2011 RAFM Cyber Surety NCO of the Year; fostered security mindset to 9K United Kingdom/Royal Air Force personnel–coined by USAFE Communications Commander (Colonel)

• Led unit security management program; approved 23 clearance packages and cross-checked 3 personnel’s system access, revised unit processes and drove 100% mission readiness USAF OL-A COMBINED AIR OPERATIONS CENTER 6 2008 – 2009 MANAGER, COMMUNICATIONS INFORMATION SYSTEMS BRANCH ESKISEHIR AFD, TURKEY

• Project Manager for digital voice upgrade; installed network equipment and 22 phones–saved $4.2K per year in operational costs

• Oversees CAOC OL-A COMSEC program and Staff Assistance Visits

• Assists Communication Security (COMSEC) Responsible Officer in maintaining COMSEC account in support of SAP requirements, to include Tactical Local Area Network Encryptor (TACLANE), encrypted keys and Secure Telephone Equipment (STE) equipment

• Expertly solved major network failure–helpdesk stumped; revealed configuration error–restored system access in minimal time

• Identified and fixed 358 errors in personnel information files; resolved 8 members’ access to classified material

• Facilitated configuration of more than 100 NATO Secret workstations; ensured compliance with new security directives-strategic/global impact

Glenda N. Daniel: Page 4 of 5

• Graduated CISCO Network Management courses; increased understanding on administration of routers and switches

5TH COMBAT COMMUNICATIONS GROUP 2007 – 2008

SECURITY MANAGER ROBINS AFB, GA

• Managed combat group’s Security Management Program; initiated 11 security clearance investigations and 14 reinvestigations, ensuring on-time completion

• Processed 4 units network system authorization requests; ensured users received program accesses to meet national security requirements

• Provided yearly security training to 400+ members to assure compliance within the program requirements

• Managed security program inspections for 5th

group units

• Provided initial Eqip package review to avoid delays. Verified information with user, requested corrections and ensured package delivery dead lines were met 5TH COMBAT COMMUNICATIONS GROUP 2006 – 2007

MAINTENANCE OPERATION CENTER ROBINS AFB, GA

• Provided 24/7 operations to assist personnel during planning, preparation and implementation of exercises or real life deployments

• Supported maintenance of ground equipment, packing/pallets. Tracked injuries, incidents, inclement weather and stored in transit deployers weapons

• Inspected 4 Units ADPE accounts for accuracy. Used modlog to track organizations equipment and assigned pallets. Identified equipment short falls and notified users 5TH COMBAT COMMUNICATIONS GROUP 2004 – 2006

MAINTENANCE CONTROLLER AND COMPUTER SYSTEM OPERATOR ROBINS AFB, GA

• Scheduled, monitored, and controlled maintenance actions; collected and reported equipment status for 5,600 major end items of equipment valued at $160M

• Operated and maintained $10M of Theater Deployable Communications assets, tactical telephone switching systems, Local Area Network and voice/data related assets

• Deployed to provide inter-theater Command and Control (C2) for the Joint Chiefs of Staff, Air Combat Command, and local training exercises

3d SPACE OPERATIONS SQUADRONS 1998 – 2004

SATELITE SYSTEM OPERATOR INSTRUCTOR SCHRIEVER AFB, CO

• Planned, Scheduled, monitored, and controlled satellite supports; collected and reported data, equipment status and troubleshoot as needed to support secure high-rate data communication links

• Created Master Qualification Training (MQT) scripts; provided accurate, realistic training scenarios to enable proficiency of 3 SOPS new personnel

• Worked in conjunction with the Satellite Vehicle Operator (SVO) to identify data anomalies and initiate reports

• Deployed in-place during September 11, 2001, provided inter-theater Command and Control (C2) for the Joint Chiefs of Staff, Air Combat Command, and exercises PROFESSIONAL EDUCATION:

A.A.S. – Information Systems Management, Community College of the Air Force; completed 2012 Glenda N. Daniel: Page 5 of 5

A.A.S. – Space Technology, Community College of the Air Force; completed 2012 CERTIFICATIONS:

RMF and Xacta 360 User Training, Certified, completed 2019 Certified Ethical Hacker (CEH), Certified, completed 2016 Assured Compliance Assessment Solution (ACAS) Certified, completed 2014 Host-Based Security System (HBSS) 201 & 301 Certified, completed 2014 Emissions Security (EMSEC) Certified Manager, completed 2010 CompTIA Security+, completed 2010

MILITARY TRAINING:

Lifecycle Management Process Classroom Training, completed 2019 Introduction to Agile program Classroom Training, completed 2018 Introduction to Scrum program Classroom Training, completed 2018 Enterprise Mission Assurance Support Service (eMASS) Computer-Based Training in support of the DoD RMF Authorization Process for System Administrator Role, completed 2019 Cyberspace 200, completed 2017

DISA HBSS Advanced (301) ePo5.3, Course (2016), completed 2017 CASP - CompTIA Advanced Security Practitioner, completed 2015 Defense Information Systems Agency, Assured Compliance Assessment Solution (ACAS), completed 2014 Host-Based Security System (HBSS 201) Classroom Training, completed 2014 AF ISR Agency Intelligence Community Directive (ICD) 503/XACTA Training Course, completed 2014 Xacta IA Manager Assessment Engine AFISR User Training, completed 2014 Air Force Risk Management Fundamentals, completed 2013 Introduction to Cyber Operations Fundamentals Course, completed 2013 Noncommissioned Officer Academy; completed 2012

Predictive Battlespace Awareness (PBA) Intelligence Baseline Course, completed 2008 Airman Leadership School; completed 2003

Missile and Space Maintenance Apprentice, ICBM, completed 1998 Basic Military Training; completed 1998



Contact this candidate