Post Job Free

Resume

Sign in

Army Officer System Administrator

Location:
Downtown, TX, 78701
Posted:
June 13, 2022

Contact this candidate

Resume:

MR. STACY LAVELLE WILLIAMS

*** ********* *****

Temple, TX 76502

Mobile/Evening: 619-***-****

Day Phone/Office: 619-***-****

Email: adrd35@r.postjobfree.com

Work Experience:

Office of Army Futures Command CIO G6 Cybersecurity Division

09/2019 - Present

Deputy Director, Cybersecurity Division

Army Futures Command, Austin, TX

Performs Cybersecurity services & products meet customers' requirements with acceptable level of operating risk based on Security Control Assessor (SCA) review, Program Cost, Schedule, and Performance.

Applies metrics to improve quality of products and services to render them effective & efficient. 2. Implements solutions for standardization through quality Standard Operating Procedures (SOPs) IAW US ARMY implementation of the Risk Management Framework (RMF) Process, including but not limited to RMF Assess Only Processes for Applications, and RMF for Rapid Deployment Systems. Standard Operating Procedures (SOPs), AFC ISSM guidance and automation within the Directorate. Support the full utilization of the Enterprise Mission Assurance Support Service (eMASS).

Develops Key Performance Indicators (KPI) created to measure Cybersecurity Team performance as pertaining to Cybersecurity products and services. 2. Program Management Reviews with AFC CIO, AFC Director Cybersecurity, PEOs, CFT's & other supported AFC commands and programs as applicable to measure customer satisfaction and quality of products and services. 3. Ongoing liaison with customers/leadership/ management.

Implements Sufficient Cybersecurity solutions contribute directly to Command's mission with an acceptable level of risk (ALR). Realistic: As achievable within Program priorities and resource availability.

Directly Supports Cybersecurity Program Management efforts as Prioritized by the AFC Cybersecurity Director in meeting schedule, and performance thresholds based on the needs of the Program.

Develops and maintain a Schedule (IMS) detailing Cybersecurity efforts supported based on Program direction and schedule. 2. As required, provide feedback/recommendations on Risk Management Framework (RMF) documentation for Applications, Information Technology (IT) Systems, PIT Systems, PIT, IT Products, and Developmental Systems under evaluation. Manage aspects of Applications, Platform Information Technology (PIT) and PIT System Assess and Assess and Authorize (A&A) packages. Frequent and maintain proficiency in the navigation of the Army Portfolio Management System (APMS) database ensuring compliance with Federal Information Security Management Act (FISMA) and Clinger-Cohen Act (CCA) for acquisition systems and/or business systems (as applicable).

Ensure Cybersecurity project schedule is aligned with the milestones/events as communicated by the Program Manager and IPT Leads within Program constraints.

Ensure that Cybersecurity projects are continuously monitored to ensure Program Cybersecurity requirements are met and Program milestones are not impacted.

Collaborate with Cybersecurity SME's to relay and recommend new policy requirements and communicate the Programs needs to Competency management and peers. Provide Cybersecurity leadership to support rapid emergent Cybersecurity requirements for the Program and Cybersecurity Competency.

Makes significant contributions to the office of the AFC CIO in formulating short and long-term strategies across the AFC CIO Cybersecurity Program that takes a broad view with the goal of succeeding in supporting the organization's goals and strategic plan. Translates Cybersecurity goals into objectives and assignments and provides solutions as well as feedback to the CIO and CS Director on outcomes as well as recommendations for improvement to current Cybersecurity best practices.

01/2017 – 09/2019 / CACI

Information System Security Manager (ISSM)

National Training Center Ft Irwin, CA & 1st Cavalry Division Ft Hood, TX

Performs duties as the IAM/IAO for the G2, National Training Center as a member of the FORSCOM Cybersecurity Team.

Primary responsibilities are to ensure successful Assessment and Authorization (formerly Certification and Accreditation) in order to achieve Authority to Operate (ATO) by way of the USAINSCOM Policies for DOD Risk Management Framework (RMF) Processes for JWICS systems. Specifically for JWICS systems in use throughout the 1st Cavalry Division G2.

Responsibilities include but not limited to:

-Maintaining inventories of all JWICS associated assets (workstations, VOIP Telephones, Video Teleconference systems, etc.)

-Identify systems and devices that are approaching the “Lifecycle Replacement” and initiate processes for disposition of those systems.

-Initiate the Site Specific Authorization (SSA) & RMF Processes for 1st Cav Div G2 JWICS Target-of-Evaluation. Key areas are as follows:

oAssess Security Controls

oUpdate POAM on an as-needed basis

oDraft the 1st Cav Division JWICS Standard Operating Procedure (SOP)

Maintain Information Assurance/Cybersecurity Workforce Certification IAW DOD 8570 and Army Regulations.

Attend and Participate in FORSCOM Cybersecurity Readiness Conferences (FCRC) and JWICS Working Group meetings.

Prepare and deliver CACI Status Reports at a minimum bi-weekly basis or more frequently as required.

Maintain open communication with associate Cybersecurity Team Members and maintain liaison with the office of the FORSCOM IAPM.

Perform Cybersecurity Tasks as assigned by the NTC G2, 1st Cav Division and FORSCOM IAPM.

Make Cybersecurity and IT recommendations to NTC G2 & 1st Cav Division Government Lead on process improvement concerning security matters.

Naval Aviation Warfare Center – Aircraft Division (NAWCAD) 5.4 IBST

48150 Shaw Road, Naval Air Station (NAS) Patuxent River, MD 20670

09/2014 – 12/2016 (Grade DS-06/GS-15)

5.4 Department Lead and Research Development Test & Evaluation (RDT&E) SME for Portfolios, Processes, & Practices

Served as the 5.4 Department Lead and RDT&E Subject Matter Expert for Portfolios, Processes, Practices, and Communications for the RDT&E laboratory community. Provided direct support to the RDT&E Executive (SES) and interacted with Senior Competency Leadership, and major RDT&E laboratories and facilities on IT process requirements, guidance on applicable use, and advises the RDT&E Executive on the integration RDT&E community infrastructure.

Coordinated actions across Navy Systems Commands in order to provide, awareness, outreach, and direct support to the RDT&E Community Leads, Points of Contact, and Community Integrated Direct Support personnel.

Performed duties as the RDT&E Information Systems Validator for Risk Management Framework (RMF) systems which entails performing duties as an independent third party to ensure (through verification and validation) that information system security controls are implemented in order to ensure that systems and networks operate at an acceptable level of risk. Expert proficiency in the implementation of National Institute for Standards and Technology Special Publication (NIST SP) 800-53 and Committee for National Security Systems Instruction (CNSSI) 1253 Controls for National Security Systems.

Subject Matter Expert (SME) for Risk Management Processes for the F-35 Joint Simulation Environment (JSE) at NAS PAX River, MD. Facilitator of the F-35 JSE Cybersecurity Configuration Control Board (CCB) ensuring accuracy of baseline configurations submitted to the Joint Strike Fighter Program Office (JPO) for System Authorization per Joint SAP Implementation Guide (JSIG) Guidelines.

Naval Aviation Warfare Center – Aircraft Division (NAWCAD) 7.2.6.2 Cybersecurity

47762 Ranch Road, B1490; NAS Patuxent River, MD 20670

11/2013 - 09/2014 (Grade GS-14/10)

Senior Program Information System Security Manager (ISSM)

Performed duties as the Information System Security Manager (ISSM)/Cyber Security Subject Matter Expert for the Program Manager, AIR 268 (PMA 268) Unmanned Carrier Aviation Systems (UCAS) Program Responsible for implementation and oversight of the Cyber Security posture and Certification and Accreditation (C&A) processes of the Unmanned Carrier Air System (Demonstration) (UCAS-D) and the Unmanned Carrier Launched Airborne Surveillance and Strive (UCLASS) Air Vehicles.

Solely responsible to the local IA authority (NAVAIR AODR) for ensuring the security of each PMA-268 owned IT system, and ensuring that it is developed, approved, operated, and maintained throughout its life cycle per the Navy Office of the Designated Approving Authority/ US Navy Fleet Cyber Command (ODAA/FLTCYBERCOM). ODAA required C&A documentation. Conducted oversight for creating and maintaining accreditation documentation for Program owned systems. Maintain Professional Certification IAW DOD 8570.01-M Information Assurance Workforce. Maintain Certification as a Fully Qualified Navy Validator. Implement an effective training program for Program Cyber Security Personnel/Staff. Develop processes for transition from DIACAP to DOD Risk Management Framework Authorizations.

Developed and completed Unmanned Carrier Launched Airborne Surveillance & Strike (UCLASS) Milestone A documentation including Cyber Security Strategy development and Clinger-Cohen Act compliance verification. Acquisition documentation development support with IA inputs to Specifications, Statements of Work (SOW), Contract Deliverables Requirements List (CDRL), and other major programmatic documents. Initiated RMF Processes for systems and subsystems identified as having authorization requirements. Performs oversight and analysis (pre-award) contractor submitted documentation during Systems Engineering Technical Reviews (SETR) and test events. Ensures proper implementation of Cyber Security related policies including but not limited to: Director of Central Intelligence Directive (DCID) 6/3, DCID 6/9, DoD Instruction (DODI) 8500.01, DODI 8510.01 and NIST 800-53 & CNSSI 1253. Responsible for implementing security measures such as Cross Domain Solutions, NSA Encryption modules.

Performed liaison duties as required with external agencies, programs and offices that interface with UCLASS Program information systems such as: SPAWAR, NAVSEA (CVN), NSA, DISA and the Unified Cross Domain Management Office (UCDMO).

Naval Aviation Systems Command (NAVAIR) 7.2.6 Information Assurance

47762 Ranch Road, B1490; NAS Patuxent River, MD 20670

08/2010 - 11/2013 (Grade GS-14/8)

Information Assurance Technical Warrant Holder

Led the Chief Information Office (CIO) Information Assurance Team for Platform Information Technology (PIT) for Naval Aviation Systems Command 7.2.6 Information Assurance. Perform Duties as the Lead for Information Assurance Systems Engineering Technology Review (SETR) Process. Performed duties as the NAVAIR IA Technical Warrant Holder.

Developed the SETR Checklists for Information Assurance for Naval Aviation Systems Command to cover all technical reviews. Participate in SETR events for NAVAIR Programs of Record. Act as the primary AIR 7.2.6 IA SME for reporting the IA status of SETR events for Programs. Made recommendations to Program Managers on processes to mitigate identified IA risks to the reviewed Programs. Review NAVAIR documentation for SETR and make recommendations as required.

Using the OPNAV guidance for Platform IT systems, developed the Business Rules for the NAVAIR Platform Information Technology (PIT) systems facilitating the Certification and Accreditation Process for these systems. Assisted the PMAs in implementation of PIT Strategy for their systems.

Coordinated SETR and PIT accreditation activities as applicable with outside organizations such as NAVY ODAA, OPNAV N2/N6 and Naval Sea Systems Command (NAVSEA).

Naval Aviation Warfare Center – Aircraft Division (NAWCAD) 7.2.6 Information Assurance 47762 Ranch Road, NAS Patuxent River, MD 20670 United States

01/2007 - 08/2010 (Grade GS-14/6)

Senior Information Assurance Manager (IAM) Program Manager, AIR 274 Presidential Helicopters Program

Independently led the IA team and preformed duties as the Information Assurance Manager/IA SME to the Program Manager, AIR 274 Presidential Helicopters Program Responsible for implementation and oversight of the Certification and Accreditation (C&A) process of the VH-71 Helicopter Platform in support of rotary wing transportation of the President of the United States.

Responsible for the security of systems that receive, transmit, store, manipulate, and display electronic and digital information including but not limited to information systems and networks. Ensured that C&A processes are implemented from program inception to retirement. Ensured implementation of DCID 6/3, DCID 6/9, DODI 8500.2, and NIST 800-53 & CNSSI 1253 measures are satisfied. Responsible for implementing security measures of information systems and networks throughout the Presidential Helicopter Support Facility.

Performed duties as the Program Manager's Representative for all of the program's Information Assurance matters. Performed Liaison duties with the Marine Helicopter Squadron-1, The White House Military Office, and the White House Communications Agency. Including but not limited to Information Assurance Vulnerability Management, recommending security measures for the protection of data, including cryptography and encryption of data-at-rest, intrusion detection and prevention configurations, and vulnerability assessments of information systems, networks and network devices.

Jan 09 - Jul 09 Six-Month Rotation/Temporary Assignment to the Assistant Chief of Naval Operations Next Generation Enterprise Network System Program Office ACNO NGEN SPO (N099) as the Lead for Cyber Security Plans. Responsible for developing the Cyber Security Charter in addition to assisting in standing up and directing the Cyber Security Branch. Review and make recommendations to the Director NGEN for all matters concerning Cyber Security. Outlined and detailed cyber security priorities and develop courses of action for implementation throughout the enterprise.

Naval Aviation Systems Command (NAVAIR) 7.2.6 Information Assurance

47762 Ranch Road, B1490 NAS Patuxent River, MD 20670

11/2003 - 01/2007 (Grade GS-13/10)

Senior IT Analyst (Information Assurance)

As the Lead Certification Agent for NAVAIR, perform duties as Certification Agent/Certification and Accreditation Team Lead for Naval Aviation Systems Command (NAVAIR) ensuring Certification and Accreditation for Information Systems and Information System enclaves throughout the Command. Perform IT operational analysis and vulnerability assessment of security configurations for NAVAIR Information systems.

Primarily supported the Research, Development Test and Evaluation (RDT&E), Programs of Record (POR) and Centrally Managed Program (CMP) information systems. Responsibilities included developing and implementing security programs, policies and procedures to ensure the security, reliability and accessibility of information systems, networks and data; conducting systems security audits and risk and vulnerability assessments; participating in network and systems design to ensure implementation of appropriate security policy and developing information security contingency plans and disaster recover procedures.

Performed duties as Primary Advisor to Program Management on issues concerning IA process implementation. Performed supervision of support staff in the review and quality control of accreditation packages. Supported DoD Information Technology System Certification and Accreditation Process (DITSCAP). Assist with transition to DIACAP. Apply Certification processes for Sensitive Compartmented Information Systems per DCID 6/3.

Other areas of responsibility are as follows: Led a team of civilian and contractor personnel in implementing NAVAIR command IA and National Security policies, IT programs, and related procedures in accordance with NAVAIR, Navy, and DOD INFOSEC requirements. Supported Program Managers, Program Executive Offices, Navy Marine Corp Intranet (NMCI) managers, Special Security Office (SSO), and Network Security personnel in order to comply with INFOSYSSEC policies. Performed reviews of Information technology Approvals (IT Approvals) and forwarded recommendations to the Designated Approval Authority. Conducted risk and vulnerability assessments of information systems to identify and mitigate vulnerabilities, risks, and to determine countermeasures.

Naval Aviation Warfare Center - Aircraft Division (NAWCAD) 5.4

48150 Shaw Rd, Bldg 2109 Patuxent River, MD 20670 United States

05/2002 - 11/2003 (Grade GS-12/10)

Network Security Officer

Directly responsible for maintaining the High Security Posture for classified and unclassified information systems and the network for the Air Combat Environment Test and Evaluation Facility(ACETEF) and Manned Flight Simulator (MFS). Responsible for the implementing security measures for information systems and computer network infrastructure totaling over $60 million in organization/Navy assets.

Recommended security procedures to 5.1.6 and 5.1 Management in order to maintain effective security policy. Developed and implemented SOPs for the organization. Maintained liaison with Security Competencies throughout NAS Patuxent River, specifically, 7.4.2 Information Assurance, and 7.4.1 Industrial Security. Maintain Liaison with the DoD High Performance Computing Modernization Office/Program in ensuring the high security posture of ACETEF’s High Performance Computing Center. Ensured maintenance of a robust security posture for ACETEF/MFS Information systems and Networks. Ensured the networks successfully pass the DOD High Performance Computing Modernization Office Security Audits in order to maintain ATO status. Act as the Network Security Officer for DOD HPC assets located at China Lake, CA and Pax River, MD. Personally oversaw and directed security measures implemented during Commercial Service Agreements enabling outside contractors to perform classified work at ACETEF Facilities. Compose the System Security Authorization Agreement IAW the DoD Information Technology Security Certification and Accreditation Process.

Coordinated security measures with the Designated Approving Authority (DAA) for Pax River and NAWCAD. Implement corrective action, as applicable, when in receipt of Information Assurance Vulnerability Alerts issued by the DoN and DoD. Ensure all security training was conducted throughout 5.1.6 and Manned Flight Simulator organization IAW Navy guidelines. Develop and implement Physical Security guidelines throughout ACETEF.

Science Applications International Corporation (SAIC)

22999 Exploration Drive; Lexington Park, MD

07/1999 - 05/2002 (Contractor)

Simulation Engineer

Contributed as a Simulation Engineer, Warfare Simulation Analyst, and Air Defense Analyst, at the Simulation and Research Services Division of SAIC in California, MD supporting the ACETEF, Warfare Simulation Section. Responsibilities included developing classified warfare scenarios (military theme) using the SWEG/JIMM computer simulation models emulating test environments for military aircraft and related systems. Conducted analysis and provided system(s) subject matter expertise in doctrine and employment of lethal weapons, including evaluating intelligence information. Performed as customer interface for coordinating ACETEF laboratory assets for project support. Provided support and assisted section members in ensuring successful customer satisfaction. Maintained and increased proficiency in the use of the Simulated Warfare Environment Generator/Joint Interoperability Mission Model (SWEG/JIMM) simulation tools and other simulation models as required. Prepared Research and prepared simulation documentation supporting Air Combat Environment Test and Evaluation Facility (ACETEF) engineering projects.

The Boeing Airplane Company, Military Airplanes Division

East Marginal Way, MS 4J-06, Seattle, WA 98134

12/1997 - 06/1999 (Contractor)

Manager, Integrated Battlespace Lab (AWACS Lab)

Served as the primary customer interface for coordinating laboratory assets to support technology demonstrations. Provided overall lab support to ensure successful demonstrations to customers, visitors and other VIPs. Verified demonstration parameters, level of support, personnel requirements, simulation operations, and security requirements for all demonstrations. Ensured the Lab is in the highest state of operational readiness, i.e. ensure all workstations, High Performance Computers, Uninterrupted Power Supplies and other major end items for the lab are in operational working order. Provided guidance and technical requirements to the Technical (installation) personnel when reconfiguration of the lab is in order. Assisted the technical Staff as needed. Configured the Network as required by the supported user, i.e., configured Asynchronous Transfer Mode (ATM) and/or Ethernet Network(s) as appropriate. Made recommendations to the supported user in order to increase the efficiency of Laboratory assets.

Maintained all documentation for all computers and Computer networks including but not limited to maintenance, hardware and software licensing, network security including classified and unclassified networks. Performed duties as the Security Point of Contact for Laboratory projects. Maintain document control including control of all classified magnetic media. Maintained diagrams of all networks in the lab including stand-alone classified, unclassified, and 'mixed' Networks. Ensure all personnel using the network are trained and briefed on the auspices of working with classified networks.

Responsible for documenting security violations and reporting to the investigating authorities. Wrote and maintained all Laboratory SOP's, Memorandums of Understanding, and Memorandums of Agreement. Prepared and Submitted Laboratory Status Reports to Supervising Managers and Executive Staff.

Illinois Institute of Technology - Research Institute

Admiral Cochrane Drive; Annapolis, MD 21401 United States

02/1993 - 08/1997 (Contractor)

Military Operations, Intelligence, & Communications Analyst

Evaluated raw intelligence and technological data, developed finished products and deliver to users; provided analytical expertise and conduct presentations. Stayed abreast of changes to IITRI/Department of Defense Joint Spectrum Center Database structure. Completed projects within budget and time guidelines. Conducted liaison duties with federal government sponsors concerning government sponsored/funded projects.

Provided modeling and simulation results to the DOD Joint Spectrum Center to aid in analysis of the Electromagnetic Compatibility of weapons systems emitters.

Supported the DOD Joint Advanced Strike Technology office in the modeling of threat surface-to-air weapons systems in order to effectively model countermeasures.

Using intelligence systems databases construct tables identifying threat identification-friend-for (IFF) systems for use in the development of surface to air engagement scenarios.

United States Army

200 Stovall St, Alexandria, VA 22332 United States

Period of Active Duty Service - 06/1983 - 06/1993

Commissioned Army Officer (Air Defense Artillery & Military Intelligence)

Compilation of positions held over a ten year period of military service: Chief of General Military Intelligence (GMI) for the United States Southern Command (USSOUTHCOM) employed in the US Joint Intelligence Center Southern Command.

Developed the Classified Intelligence Holdings Database for the US Southern Command Area of Responsibility.

Commander of a Military Intelligence Company with the mission of drug interdiction throughout the Republic of Panama. Responsible for maintaining the Unit Status Report which indicates the operational readiness for the Company. Supervised the training program for 125 Army personnel and over 40 occupational specialties.

Counterintelligence Officer responsible for performing human intelligence collection and personnel security investigations, Infantry Battalion Intelligence officer,

Executive Officer and Tactical Control Officer of a HAWK Missile Air Defense Artillery Battery.

Responsible to conduct effective HAWK missile engagement of hostile/threat aircraft in the Commander, Allied Air Forces Central Europe assigned area.

Ensure HAWK Battery personnel are trained in order to effectively conduct Air Defense weapons engagements during hostilities or when operational situation dictates.

PROFESSIONAL CERTIFICATIONS:

Defense Acquisition Workforce Improvement Act (DAWIA)

Achieved DAWIA Information Technology LEVEL III Certification, September 2014

Certified Information System Security Professional (CISSP)

(ISC) 2 Effective: 5 Jan 2007 Cert Cycle 1 Feb 2022 – 31 Jan 2025, ID # 67019

Committee for National Security Studies (CNSS) Senior System Manager

Certification (CNSSI No. 4012) Jan 2007

Committee for National Security Studies (CNSS) Systems Certifier

Certification (NSTISSI No. 4015) Jan 2007

Interim Vocational Teaching Certification

– Washington State Department of Education - Issued 1997.

Education:

St John's College Annapolis, MD United States Annapolis, MD United States

Master's Degree 08/1996

GPA: 3.00 of a maximum 4.00

Credits Earned: 48 Semester hours

Major: Liberal Arts Minor: N/A

Central Washington University Ellensburg, WA United States

Bachelor's Degree 06/1983

GPA: 2.60 of a maximum 4.00

Credits Earned: 180 Semester hours

Major: Education Minor: Military Science

Columbia Basin College Pasco, WA United States

Some College Coursework Completed 12/1978

GPA: 2.9 of a maximum 4.0

Credits Earned: 60 Quarter hours

Major: N/A Minor: N/A

Job Related Training:

*US Navy Fully Qualified System Validator Course - 2016

*US Navy Post Graduate School, NPS Monterey, CA; System Certifier Course

*Certification of Completion, (ISC) 2 CISSP Training

*Completed CISSP Preparation Training/Global Knowledge

*System Administration and Network Security (SANS)

*Silicon Graphics© IRIX System Administrator

*Silicon Graphics© IRIX Advanced System Administrator

*Certificate of Training, Digital/COMPAQ DEC Alpha System Administrator *Certificate of Training, Military Intelligence Integrated Database System

*Combined Arms and Services Staff School/Staff Officer Training.

*Military Intelligence Officer Advanced School - Counterintelligence

*Counterintelligence Officer School

*Air Defense Artillery Officer Basic Course

WILSON, Roy

Naval Aviation Warfare Center 4.5.1

Information Systems Security Engineer

301-***-****

adrd35@r.postjobfree.com

RAGARD, Paul

Naval Aviation Systems Command 7.2.6

Deputy for Cybersecurity

301-***-****

adrd35@r.postjobfree.com



Contact this candidate