Post Job Free

Resume

Sign in

Cybersecurity Lead CISSP CEH

Location:
Charleston, SC
Salary:
135k
Posted:
June 06, 2022

Contact this candidate

Resume:

Cinnamon A. Buelk

** ******** ******

Charleston, SC 29407

Phone: 843-***-****

Email: adra83@r.postjobfree.com

Clearance & DoD Cybersecurity Workforce Information:

Current DoD Top Secret - SCI - DCID 6/4

Cybersecurity Workforce (CSWF) Expertise Level: Master

NO-05-2210 with SPAWARSCN-Atlantic (GS-13 equivalent)

Defense Acquisition Workforce Improvement Act (DAWIA) Information Technology Level II Certified:

oISA 201 INTERMEDIATE INFORMATION SYSTEMS ACQUISITION

oACQ 203 INTERMEDIATE SYSTEMS ACQUISITION, PART B

oACQ 202 INTERMEDIATE SYSTEMS ACQUISITION, PART A

oCOR 222 CONTRACTING OFFICERS REPRESENTATIVE (COR) CRS

oIRM 101 BASIC INFORMATION SYSTEMS ACQUISITION

oACQ 101 FUNDAMENTALS OF SYSTEMS ACQUISITION MGMT

Education & Certifications

DAWIA Information Technology Level II Certified

NSA Polygraph

ICS2 Certified Information Systems Security Professional (CISSP)

Defense Acquisition University – CLC 222 – Certified Contract Officer Representative (COR)

EC-Council Certified Ethical Hacker (CEH)

CompTIA Security +

Notary Public

Bachelors of Arts – English Major, Religious Philosophy Minor

Overview:

I am a cybersecurity subject matter expert (SME) with over 15 years of experience in managing, leadng, developing, testing and authorizing Information Technology (IT) systems and services. I have authorized system of systems (SoS), Network Enclaves, and customized software solutions. I have successfully authorized systems under the DoD 8510.01, Risk Management Framework (RMF) for IT, assessment process on multiple classification domains, including but not limited to Unclassified, Classified, Top Secret (TS) / Sensitive Compartmented Information (SCI). I have in-depth knowledge of DoD, Federal, DoN, NIA and DIA cybersecurity policy and requirements. I have a technical background which affords me the advantage of collaborating seamlessly and effectively with Engineers, Project Managers (PMs) and Leadership. I also have excellent written and oral communications skills which allow me to keep all stakeholders abreast of progress on a project. I have experience with the overall management of roles and staff required to support the installation, configuration, troubleshooting, authorization and sustainment of hardware and software systems. I excel at working as a team and generating creative solutions to streamline the cybersecurity threat and vulnerability reduction, information assurance compliance and the authority to operate (ATO) processes. I have extensive experience leading a Cybersecurity Service Provider (CSSP), including implementing and managing threat and protect tools that support incident response and recover. I also enjoy volunteering the NIWC’s Science, Technology, Engineering and Mathematics (STEM) outreach program at multiple local elementary and high schools.

Work Experience:

Naval Information Warfare Center (NIWC)-Atlantic

1 Innovation Drive, North Charleston, SC 29419

Supervisor: Yi-Lin (Larry) Yang, 843-***-****

Series: 2210 Pay Plan: NO Grade: 05

Full Time: 40 Hrs/Wk

July 2019 – Present:

Cyber Security Lead for Command and Operation Centers (C&OC) Division

Duties, Accomplishments and Related Skills:

Manage $15 Million dollar cybersecurity support budget to ensure oversight of government cost estimates and contracts.

Track cost, schedule, risk and authorization of 16 worldwide Command and Control (C2) Military Construction (MILCON) projects.

Authored and implemented an Assessment & Authorization (A&A) Strategy to centrally track SCIF/SAPF facility authorization, War Gaming Materiel Solution, Video Distribution System (VDS), Virtual Desktop Infrastructure (VDI), and an Access and Transfer Cross Domain Solution (CDS) for the USMC’s new Wargaming and Analysis Center (MCWAC). The A&A Strategy includes Responsible, Accountable, Consulted and Informed (RACIs) for the facility’s SCIF/SAPF authorization and all new IT capabilities. These RACIs enabled all Stakeholders to collectively collaborate and track required steps to update the Integrated Master Scheduled (IMS) for this 400 Million MILCON project.

Initiate and lead the Division’s cybersecurity team in the full DoD 8510.01 RMF life cycle of cyber security appraisals, including network penetration testing of 16 worldwide, geographically dispersed MILCON facilities across diverse agencies (e.g. USSPACECOM, Air Force, Navy, USMC and DISA).

Updated the Division’s Statement of Work (SOW) and Project Work Scope (PWS) templates to include three options for cybersecurity support for our Sponsors. These updates to our SOW and PWS significantly reduced schedule slippage and unforeseen costs associated with deploying unauthorized hardware and software at MILCON facilities; i.e. integrated cybersecurity requirements into the Shore Installation Process Handbook (SIPH) process instead of having it be an afterthought. The 3 cybersecurity support options included:

1.No cyber support (site survey and design only).

2.Cybersecurity support in updating current site/enclave ATO to incorporate new AV/IT solutions being installed by NIWC.

3.Full turnkey cybersecurity support where NIWC creates an RMF package and obtains an Authorization to Operate (ATO) for the new solution/capabilities installed at the MILCON facility.

Conduct risk and vulnerability assessments to identify vulnerabilities, risks and protection needs of information systems developed by the C&OC. Document security control implementation, STIGs, ACAS scans and POA&M items in eMASS to obtain Authority to Operate (ATOs) for our sponsors.

Responsible for reviewing all products within the C&OC Division for Quality Assurance with DoD, DoN, USMC, Air Force and Intelligence Community (IC) cybersecurity Directives and Instructions to ensure all requirements are met with each MILCON project.

Provide RMF Subject Matter Expertise (SME) support to our IPT, Project Leads, Engineers and Contracting Officer Representative (COR) to draft Request for Proposals (RFPs), Contracts, Integrated Master Schedule (IMS) and Plan of Action and Milestones (POA&Ms) for our various MILCON projects.

Obtained the Navy’s first ATO under the Assess Only Platform IT (PIT) process for PMW 790’s Maritime Operation Center (MOC) VDS and Command and Control (C2) Display system.

Creatively solve cybersecurity-related problems for the C&OC Division. For example, NIWC purchased $5 million of VDS/C2 Display equipment for NCTAMS which was not covered by an ATO. Another sponsor, PMW 790, had a VDS/C2 Display ATO with different equipment. I negotiated a Memorandum of Agreement (MOA) between the two PMOs to allow NCTAMS to utilize PMW 790’s ATO by using the Navy’s Memorandum For Record (MFR) process to add NCTAMS HW/SW to PMW 790’s ATO. This MOA solution, and not having to process a new ATO, saved NCTAMS from adding a year to their Initial Operating Capability (IOC) schedule.

Work with the NIWC Leadership, Division & IPT Leads, and Project Engineers on developing and recommending new or improved inspection, evaluation, and penetration testing methodologies for cyber security appraisals.

Keep NIWC Senior Leaders apprised on engineering issues and opportunities involved with ongoing projects to incorporate cybersecurity support.

Updated the Division’s System Engineering Plan (SEP) to align the System Engineering Technical Review (SETR) process with the six (6) RMF Steps to authorize new systems, capabilities and facilities.

Collaborate with IPT Lead, Project Leads and Chief Engineer (CHENG) to incorporate Model Based System Engineering (MBSE) practices into the RMF authorization processes.

Manage and mentor a team of seven civilian and contractor cybersecurity engineers. Collaborate with senior and Division leadership and contractor PMs and staff in scheduling, planning, coordinating, and implementing the Division’s Cyber Security Appraisal Program.

Naval Information Warfare Center (NIWC)-Atlantic

1 Innovation Drive, North Charleston, SC 29419

Supervisor: Scott Bell, 843-***-****

Series: 2210 Pay Plan: NO Grade: 05

Full Time: 40 Hrs/Wk

June 2018 – July 2019:

Information Systems Security Manager (ISSM) for PMW 260

Duties, Accomplishments and Related Skills:

Provided technical cyber security support in the design, installation, assessment/audit, system hardening, risk analysis, mitigation and process improvement for PMW 260, Navy’s Sensitive Compartmented Information (SCI) and Compartmented Access Program (CAP) ACAT III Program Management Office (PMO).

Worked closely with PMO, PMW 260 Engineers, N2N6 (Navy SCI CIO) and Defense Intelligence Agency (DIA) to assure all stakeholders are informed and engaged with complex technical and programmatic cyber security challenges and proposed standardized, secure solutions and/or alternatives to resolve these issues.

Developed a Cybersecurity Strategy (CSS) which documents all required policy and artifacts for the PMW 260 Enterprise Architecture (EA) to obtain an Authority to Operate (ATO) under the Risk Management Framework (RMF) assessment process that is JWICS Connection Approval Process 2.0 (JCAP 2.0) compliant. The CSS was instrumental in resolving a communication-disconnect between Navy’s SCI Hopper team at NIA and the new PMW 260 PMO by clearly defining roles and responsibilities of each Stakeholder in the transition to the modernized Enterprise Navy JWICs solution.

Supported the PMW 260 PM in briefing the status of the Navy Enterprise SCI and CAP network modernization to the SES’s at N2N6 and NSA.

Utilized clear and concise oral and written communication with senior leadership, IPT, PMs and engineers to determine the interpret cybersecurity policies, guidelines, standards, and regulations have on PMW 260’s policies and procedures. One example of my expertise with communication is when I briefed NIA’s CIO (SES), CISO and PMW 260 PM on how RMF security controls align with DIA’s Joint Connection Approval Process (JCAP) protection controls. This brief effectively summarized and reported on the cybersecurity roadmap to implement a secure Enterprise Navy SCI infrastructure and domain. It clearly documented which Network Infrastructure and Domain, Compute and Storage tools and capabilities would have Hybrid (Shared) responsibilities for PMW 260 PMO & IPT, PMW 260 NetOps and NIA’s CSSP.

Effectively led secure configuration management projects to ensure the implementation of A&A processes.

Developed a centralized, on-line Knowledge Base System (KBS) that aligned to the PMO’s Work Breakdown Structure (WBS) and implemented a configuration management plan that follows SPAWAR 5.0 CHENG Engineering standards and templates.

Documented a communication battle rhythm to facilitate all relevant stakeholders on the NIWC, ONI Hopper and PMW 260 teams were collaborating and developing effectively.

Advised on Engineering Tasks by providing cyber security requirements, mapping to Intelligence Community Directives (ICDs), CNSSI and NIST requirements, for PMW 260’s System Design Requirements to ensure the Engineer’s Requirements documentation would meet all RMF and JCAP security controls.

Naval Information Warfare Center (NIWC)-Atlantic

1 Innovation Drive, North Charleston, SC 29419

Supervisor: Scott Bell, 843-***-****

Series: 2210 Pay Plan: NO Grade: 05

Full Time: 40 Hrs/Wk

March 2016 – June 2018:

Information Systems Security Manager (ISSM) for DISA SATCOM IPT

Duties, Accomplishments and Related Skills:

Supported multiple DISA IPT projects (SATCOM and Joint Command & Control) by providing ISSM and RMF expertise.

Conducted Technical Assessments, authored Security Plans and updated eMASS packages to allow new systems to be fielded securely with successful Authority to Operate (ATOs).

Worked closely with the DISA ISSM and IPT members to assist them in understanding the new RMF requirements and transitioning current systems from DIACAP to RMF ATOs.

Developed Standard Operating Procedures (SOPs) on how to utilize systems such as HBSS, ACAS and SCAP (STIG-compliance) tools to auto-populate technical related controls within eMASS.

Provided exemplary customer service with cyber security support by evaluating current IT security programs and methodologies to improve policies and plans for IT security systems that minimize vulnerabilities and authorization timelines.

Develop POA&Ms to track and correct non-compliant security controls.

Reviewed organizational cybersecurity and privacy principles requirements and assisted with implementing internal processes to ensure consistency and efficiency of IT security compliance across supported organizations.

Performed Incident Response by identifying and reporting a SATCOM Gateway system that made a connection to a Russian and Tunisian Bot-Net, which resulted in stopping a possible catastrophic incident (was awarded SPAWAR’s 59540 Civilian of the Month in October 2017 for preventing this incident).

Collapsed a multiple security authorization process by aligning the Large SATCOM Gateway (LSG) facilities and Small SATCOM Gateway (SSG) facilities, outlined in the SATCOM Technical Architecture Design (TAD), to a LSG and SSG capabilities-based ATO. The solution entailed combining all the various DISA system ATOs into these two LSG and SSG capability-based ATO packages. This type-accredited (same configuration) modular-approach, utilizing DISA’s ATO Change Request (CR) process to add new capabilities to a LSG or SSG ATO’s, solved the sponsor’s problem with funding and personnel needed to process over 20 different ATO packages. This solution resulted in the following:

oSignificantly reduced the level of redundant work associated with trying to maintain multiple system ATOs.

oStandardized policy-based security controls (such as Incident Response Plans, Configuration Management Plans, Vulnerability Management Plans, etc.) that are applicable to all DISA SATCOM systems.

oStreamlined the ATO process and effectively assured the AO that the PMO maintained baseline configurations.

Naval Information Warfare Center (NIWC)-Atlantic

1 Innovation Drive, North Charleston, SC 29419

Supervisor: Scott West, 843-***-****

Series: 2210 Pay Plan: NO Grade: 05

Full Time: 40 Hrs/Wk

January 2015 – March 2016:

Information Systems Security Officer (ISSO) for SSEE and CCOP

Duties, Accomplishments and Related Skills:

Worked with PMW 120’s ISSM to secure and accredit all Ship’s Signal Exploitation Equipment (SSEE) and Cryptographic Carry-On Program (CCOP) systems on NIPRNET, SIPRNET, JWICS and NSANet.

Developed customized test procedures to map to all NIST 800-53 controls, including technical for RHEL 5, RHEL 6, Windows 7 and Windows 2008 and policy controls.

Streamlined testing and hardening processes for the CCOP program which resulted in our obtaining ATOs for 4 systems which had failed Assessments multiple times before, some waiting to be deployed to our Navy for over 3 years.

Developed, and implemented, cutover strategies for all customers including to ensure that continuity was maintained of all commands without impacting warfighting mission capabilities

Consolidated Analysis Center, Incorporated (CACI)

1141 Remount Rd, North Charleston, SC 29406

Supervisor: Tim Reinaman 703-***-****

Contractor

Salary: $105,000.00 Full Time: 40 Hrs/Wk

May 2014 – January 2015:

Senior Information Systems Security Engineer

Duties, Accomplishments and Related Skills:

Provided security evaluation and testing on the Information Assurance team for VA’s Benefit Management System (VBMS).

Utilized the SCRUM Development technique to provide agile security updates and monitoring as the VBMS system was developed and new functionality added.

Established a Continuous Monitoring Program using weekly Nessus vulnerability scanning and an Environmental Change Request (ECR) process to keep all environments of the system monitored and secured on a consistent basis.

Naval Information Warfare Center (NIWC)-Atlantic

1 Innovation Drive, North Charleston, SC 29419

Supervisor: Mike Morris, 843-***-****

Series: 2210 Pay Plan: NO Grade: 05

Full Time: 40 Hrs/Wk

September 2011 – April 2014:

Deputy Director of Defense Health Agency (DHA) Computer Network Defense Service Provider (CNDSP)

Duties, Accomplishments and Related Skills:

Managed implementation and configuration of all Threat, Detect, Monitor and Protect cyber tools for the SPAWAR Network Security Operations Center (NSOC) Computer Network Defense Service Provider (CNDSP) for Defense Health Agency (DHA).

Assisted IPT and CNDSP Director in managing an 8-million-dollar annual operating budget.

Managed and directed a team of 43 civilians and contractors in assigning work, developing performance standards and making authoritative decisions on how to best provide CNDSP support to our sponsors.

Developed Standard Operating Procedures (SOPs) and Concept of Operations (CONOPS) surrounding the “Protect” aspect of the CNDSP to include deployment and management of forensic agents, vulnerability scanning, analysis, reporting and continuous monitoring.

Created a CND Subscriber Portal to provide security training materials to include: system hardening, Information Assurance policies, INFOCON, malware, anti-virus training, incident handling/reporting, etc.

Led the Vulnerability Analysis and Auditing Team (VAAT) to a perfect score on DISA CND Inspection which resulted in a Tier III CND Accreditation (prior to promotion to CNDSP Deputy Director in APR 2012).

Served as the Contracting Officer Representative (COR) on 20 Military Health System IPT contracts and Task Orders (TOs).

Spearheaded Computer Network Defense Service Provider (CNDSP) certification effort for NSOC IA Sustainment Team of SPAWAR Systems Center, Charleston.

Worked with Subject Matter Experts to develop certification documentation IAW CJCSM 6510.01.

Developed and maintained Evaluation Scoring Matrix (ESM) to assign and track certification package deliverables.

Developed Standard Operating Procedure (SOP) templates, assisted SME research and gathered existing documentation products for reuse.

Performed risk analysis to identify areas of possible information systems compromise by developing the DHA CNDSP Concept of Operations (CONOPS), which outlined the cyber security protect, detect and respond tools the CNDSP uses to mitigate security risks.

Managed project resources and provided status reports to senior leadership, IPT Lead and Director.

Maintained meticulous attention to detail to ensure successful management and implementation of mission goals, objectives, and initiatives.

Worked closely with the teams I manage to assist them in anticipating, identifying, evaluating, mitigating and minimizing risks associated with IT systems vulnerabilities.

Assisted with leadership’s execution of the CNDSP mission and measuring project performance expectations, is my development of the CND Cyber Capabilities Quarterly report. This report provided performance metrics on the deployment and correct implementation of DHA’s CNDSP Detect, Protect and Respond tools. The quarterly report included:

oBottom Line Up Front (BLUF) of compliance percentages with required CNDSP tools and associated risks caused by non-compliance.

oExplanation of what each HBSS module does along with current status of each module’s installation and configuration, including: McAfee Agent (MA), Virus Security Engine (VSE), Host Intrusion Protection (HIPS), Asset Configuration Compliance Module (ACCM), Policy Auditor (PA), and Data Loss Prevention (DLP)

oStatus and metrics of SPLUNK deployment used for log collection/review and ENCASE deployment, used for remote forensics.

oMetrics associated with Assured Compliance Assessment Solution (ACAS) scan reports, including unpatched vulnerabilities (IAVMs) and unmitigated Security Technical Implementation Guide (STIG) critical and high findings.

Performed Risk Analysis by developing a CNDSP Capabilities quarterly report for DHA, which provided risk analysis based on metrics on the deployment and configuration of CNDSP tool.

Naval Information Warfare Center (NIWC)-Atlantic

1 Innovation Drive, North Charleston, SC 29419

Supervisor: Mike Morris, 843-***-****

Series: 2210 Pay Plan: NO Grade: 05

Full Time: 40 Hrs/Wk

August 2010 – September 2011:

Information Assurance Compliance Lead, BUMED Enterprise IA (EIA)

Duties, Accomplishments and Related Skills:

Supported over 50,000 users for the Bureau of Medicine and Surgery’s (BUMED’s) Military Treatment Facilities, worldwide clinics and research facilities.

Served as Security Manager for an Open Secret 24x7 facility, responsible for ensuring personnel within facility understood and complied with all DoD and SPAWAR requirements for handing classified material.

Developed technical guidance, Computer Based Training (CBTs) and Information Assurance Portal resources to support the Defense Health Agency (DHA) Sponsor with DoD Cyber Security directives, Information Assurance Vulnerability Management and Computer Tasking Orders (CTOs).

Skills

Windows, Unix, SPLUNK, CyberSecurity EnCase, Assured Compliance Assessment Solution (ACAS/ Nessus), McAfee’s Host Based Security System (HBSS), Microsoft Office, Remedy, Photoshop, SharePoint, eMASS & Xacta (DoD RMF Accreditation Tools)

Awards & Honors:

Captain Joan Dooling, MSC, USN Aware “Information Professional Multi-facility Team of the Year” - 2009

Bravo Zulu Award for Computer Tasking Order 08-08 from Deputy Surgeon General – 2009

Bravo Zulu Award for support of DISA Enhanced Compliance Validation visit to Naval Health Clinic New England - 2009

Bravo Zulu Award for support of Navy Medicine INFOCON 3 – 2009

Bravo Zulu Award for successful accreditation of NSOC as a CNDSP from DISA. This was the first time a CNDSP has received a 100% score on CNDSP accreditation from DISA. – 2010

Bravo Zulu Award for support of all Navy Medicine Commands having ATO – 2011

Letter of Appreciation from Commanding Officer of SPAWAR-LANT for DISA CCRI of MHS Network Security Operations Center – 2011

SPAWAR On-the-Spot Award for perfect score with SPAWAR NSOC CND-SP Accreditation – 2012

SPAWAR Subject Matter Expert (SME) for CNDSP SME and IA SME Programs – 2012

Founding Member of Charleston, SC’s ISC2 Chapter – 2013

Special Act Service Award / On The Spot Award for accommodation from NAVINTEL IA for CORSAIR Accreditation, “You have not only far exceeded the NAVINTEL IA SCA team’s expectations, but have also set the bar for future Lab Security Assessments (LSAs)” - 2015

Demo Award/Bonus for Exemplary Cyber Security Service to DISA SATCOM Gateway IPT – 2016 & 2017

SPAWAR-LANT 5.9 Civilian of the Month: “Ms. Buelk is the RMF Task Lead the for Joint SATCOM and DISA Gateway Project. She has performed her duties with the utmost distinction and provided superior service to the customer during this reporting period. Ever vigilant, she discovered and immediately reported Russian and Tunisian malicious IPs in the Ft. Meade SATCOM facility, preventing what could have been an operationally devastating incident. Demonstrating outstanding technical prowess she provided cybersecurity engineering expertise to the new SATCOM Unified NetCentric System (SUNS) which led to DISA approval of system registration at the next level of authority. Ms. Buelk played an integral role in the recent DISA IPT ED Brief with Mr. Chris Miller and SPAWAR leadership, providing key cybersecurity content to the executive level program status report. Cinnamon Buelk is a take charge leader and cyber warrior in her own right. She is most deserving of the Civilian of the Month award.” – OCT 2017

Recognition and appreciation from SPAWAR-LANT’s Division Head for Infrastructure Systems, Cathy Young, for cyber security and technical expertise support resulting in a PERFECT CCRI score for the Navy's Northwest SATCOM Facility – MAR 2018

Civilian of the Month for obtaining the Navy’s first Platform IT (PIT) Product ATO for PMW 790’s Maritime Operation Center (MOC) Video Distribution System (VDS) – September 2019

Civilian of the Month – October 2020

Valiant Women of NIWC Award – August 2021

A list of references is available upon request.



Contact this candidate