LANDIN M. COMINS
Washington, DC, *****
202-***-**** ******.******@*****.*** www.linkedin.com/in/landin-comins CISSP INFORMATION ASSURANCE OPERATIONAL PLANNING Navy Veteran with 23 years of collective experience developing and managing cross-agency relationships within the Information Technology industry. Hands-on experience utilizing communications security suites and cryptographic key management distribution systems. Quality-driven leadership involvement spans IT Project management, incident response, watch-floor operations, LAN administration, telecommunications, and help-desk support. Career supported by an advanced degree.
• IA Project Management •Policy Analysis
• Enterprise Risk Management •Risk Management Framework
• Network Security Management
•Cloud Security
•LAN Administration
•COOP, EAP, and Incident Response •Wireless
EDUCATION CERTIFICATIONS
Master of Engineering Cybersecurity Policy and Compliance George Washington University Anticipated completion, Jan 2023
Certificate Business Administration Georgetown McDonough School of Business Anticipated completion, September 2021
Bachelor of Science Computer Network and Cyber Security Minor Information Systems Management University of Maryland Global Campus
CISSP Security + Information Systems Security Manager School Network Security Vulnerability Technician School Host Base Security System Technician Transmission System Technician Information and Communications Managers Course
TECHNICAL FAMILIARITIES
Operating Systems: Networking:
Linux, Windows 7/8/10 LAN, WAN, VPN, Wireless, VOIP Windows Server 2008/2012/2016, Switches, Routers, Wi-Fi Security Applications:
HBSS, NESSUS, ACAS, IVANTI
Processes:
RMF, STIG, Auditing, Personal &
Physical Security
FULL-TIME PROFESSIONAL EXPERIENCE
Information Systems Security Manager ManTech – Washington, DC Dec. 2020- Current
• Manages ISSO's, ISSE's, and analysts and coordinates with ITs to ensure the day-to-day implementation, oversight, continuous monitoring (CONMON), and maintenance of the security configuration, practices, and procedures for each IS
• Oversees a Security Operation Center (SOC) by managing people, processes, and technology to provide CONMON and improve the organization's security posture while preventing, detecting, analyzing, and responding to cybersecurity incidents.
• Provides liaison support between the system owners and other IS security personnel
• Ensures that selected security controls are implemented IAW RMF, NIST controls and operating as intended during all phases of the IS lifecycle
• Ensures that system security documentation is developed, maintained, reviewed, and updated continuously
• Conducts required IS vulnerability scans according to risk assessment parameters.
• Develops Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities
• Manages the risks to ISs and other assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs)
• Coordinates system owner concurrence for correction or mitigation actions
• Monitors security controls for ISs to maintain security Authorized to Operate (ATO)
• Ensures that change management to an IS, its environment, and/or operational needs that may affect the authorization status are researched, documented, and reported to the system owner
• Ensures the removal and retirement of ISs being decommissioned are in coordination and in accordance with Information Security Program lifecycle
Information Systems Security Manager US Navy – Yokosuka Japan Aug. 2019 – Oct. 2020
• Managed a team of cyber experts that oversee 25+ programs of record (POR), encompassing 800 end-users, and multiple domains of all classification levels onboard the US Navy's only Command and Control Flagship
• Employed Risk Management to ensure new technologies meet organizational requirements and compliance, conducts assessments, tracks cybersecurity metrics regarding patches and compliance utilizing security tools
• Conducts strategic and operational-level planning across the full range of operations. Implemented end-user cyber training courses and enforced end-user compliance. Responded to incidents and reported post-incident measures and responses.
Communications Operation Chief US Navy – Yokosuka Japan Oct. 2018 – Aug. 2018
• Directly managed 30 personnel in the operations of the most advanced communications ship in the world.
• Facilitated command, control, communications, computers, and intelligence in support of the embarked Admiral and his staff
• Provided secure, rapid, and reliable SATCOM, RF, and IP communications to 70 ships, 300 aircraft, and 40,000 Navy and Marine Corps personnel
Presidential Communicator Chairman of the Joint Chiefs of Staff, – Washington, DC Aug. 2015 – Sep. 2018
• Performed watch duties in a nonstop, presidentially mandated mission in direct support of the Chairman of the Joint Chiefs of Staff nuclear command and control mission
• Ensured continuous connectivity, reliability, and security for the primary crisis communications link between the President of the United States and Heads of State
• Briefed and advised Presidential staff and stakeholders on recommended actions to defend the nation. Specifically focused on US critical infrastructure and vital resources which enabled time-sensitive decisions in support of operations
Chief Information Assurance Officer US Navy – Manama, Bahrain Jan. 2013 – Aug. 2015
• Managed 13 personnel to maintain the security and operations of Unclassified and Classified networks
• Maintained network baselines, utilized STIG's, ensured latest patches, scanning, and testing of systems using Retina and HBSS
• Ensured National Security objectives by employing Intrusion Detection Systems (IDS), audit tools, and implementing INFOSEC education, training, and awareness programs
• Prepared SOPS, POA&M's, conducted spill investigations, developed System Security Plans (SSP)
• Oversaw a multimillion-dollar modernization suite upgrade of multiple Unclassified and Classified servers. Performed documentation for accreditation.
Communications Watch Officer US Navy – San Diego, CA Dec. 2009 – Jan. 2013
• Led a team of 24 IT's that provided rapid, secure communications to worldwide assets that included 50 afloat and 400 shore units
• Liaised with the Defense Information Systems Agency to ensure timely restoral of outages; provided network services to afloat units
• Ensured that over 300 nationally sensitive serial, IP, voice, and data circuit services were maintained around the clock EKMS Manager US Navy – Corpus Christi, TX Nov. 2006 – Nov. 2009
• Managed the Encrypted Key Management Systems (EKMS) account; ensured accountability and security of cryptographic keys
• Loaded EKMS on aircraft before departure and facilitated training personnel in the proper use and procedures
• Additional duties include providing tech support to 600 end-users Senior LAN Administrator US Army – Qalat, Afghanistan Sept. 2008 – Sept. 2009
• As the Leading Information Systems Technician, directly led Army, Navy and advised Afghan military communicators in administering and troubleshooting two servers and VOIP technologies
• Maintained and managed SHF, HF, and UHF communications and numerous SATCOM connectivity's
• Maintained, installed, and repaired field communications gear to include full buildouts of Humvee communications suites and electronic IED defeating equipment.
• Managed assets, architecture buildouts, and EKMS while operating in an environment lacking in both resources and tiered support
Help Desk Technician US Navy – San Diego, CA Aug 2003 – Oct 2006
• Collaborated with the CTO during upgrades, network hardening, and acquisition of new assets and contracts worth
$721K
• Provided technical support to 250 end-users while ensuring deployable IT assets were prepared and accounted for in support of deploying personnel
• Developed locally generated User Agreement and an extensive library of Standard Operating Procedures Tech Controller US Navy – San Diego, CA Sep. 2001 – Aug 2003
• Established and maintained the continuity of external shipboard communications in Support of Operation Enduring Freedom and ensured electronic delivery of incoming messages was delivered.
• Patched circuits, maintained EHF communications, troubleshot equipment, and maintained records Information Systems Technician US Navy– Yokosuka, Japan Aug 1999 – Aug 2001 HONORS AWARDS
Information Warfare Specialist (IW) Surface Warfare Specialist (SW) Aviation Warfare Specialist (AW)