Resume

Sign in

Electric Cooperative Communications Specialist

Location:
Elgin, OK
Salary:
110,000+
Posted:
December 06, 2022

Contact this candidate

Resume:

Jason S. Lytle

**** ******** **, *****, ** ***** 580-***-**** adtwfn@r.postjobfree.com

OBJECTIVE

The purpose of this resume is to obtain a position in the Information Security/Risk Management or Information Technology Management industry by utilizing my extensive military and civilian experience and leadership in these areas.

SKILLS & ABILITIES

MANAGEMENT

oOver 20 years of experience supervising/managing numerous teams, both government and civilian, spread across multiple countries. Promoted ahead of peers for lead or supervisory roles in almost every job held.

COMMUNICATION

oExcellent communicator, with ability to speak before senior leadership or subordinates. Tailor information to the audience, and give the information needed, when needed.

LEADERSHIP

oI have a simple leadership style, direct, but hands off. I believe an employee should not have their hand held to perform a job, they were hired to do that job, and they can or cannot do it. If they can do it, they should receive a task, then be given the opportunity to complete that task.

SECURITY

oI have 20+ years of overall security operational experience. Served as Communication Security (COMSEC) Specialist for most of my US Army career, and beyond. 12+ years of experience with the US Army while on active duty, another 3 years’ experience with the US Air Force as a DoD Civilian, 2 years of Information Assurance/Cybersecurity (IA/Cyber) with Northrop Grumman on a US Army contract, and 5+ years’ experience with IT/OT Security Operations at Western Farmers Electric Cooperative.

WORK EXPERIENCE

SECURITY CONSULTANT

VSEC Enterprises

July 2022 – Present

• Provide insight into IT/OT security for customers to build their security infrastructure.

• Evaluate current security posture of companies and provide a security assessment needed for risk management, vulnerability mitigation, and security implementation/improvement.

INFORMATION SECURITY SUPERVISOR

Western Farmers Electric Cooperative

May 2019 – July 2022

• Managed/Supervised a team of 5 Security Professionals.

• Successfully repelled numerous cyber-attacks. Monitored all network and system activity, investigated anomalies, and had no security related compromises, breaches, or attacks.

• Analyzed, evaluated, and lead the response to security incidents occurring an any of our 4 primary sites spread across multiple states.

• Performed NERC CIP Compliance duties including Secure Controls Testing, System Monitoring, System Evaluation, Baseline Configuration Management, User Management. During MRO Audits, we did not have any significant violations or lapses in our compliance posture.

• Monitored/scanned 100+ networks, spanning 5 Primary Facilities, 4 Power Plants, several outposts, and 100+ individual Switches, Substations, Microwave Relays, MODs, and other systems for security incidents, risks, vulnerabilities, and system deficiencies.

• Project Lead/Manager for numerous projects from start to finish, both my own and my employee’s projects.

• Directed in-depth threat hunting/vulnerability scans activities across all networks and systems.

• Evaluated all new software titles for weaknesses, vulnerabilities, and how it fit into our work environments, then approved those titles to be used on our networks or not.

• Wrote and directed numerous Annual Exercises where the Security Operations Team performed above expectations.

• Responded to security alerts 24x7/365 and followed them to their conclusion.

• Wrote Internal Situation Awareness Reports (iSAR) and SITREPS (Situation Reports) for identified threats, traffic/anomalies on the network, user behavior/downloads, and anything that would be of use to the team or leadership.

• Primary or secondary for numerous Corporate and NERC CIP security systems. These systems include: CISCO Sourcefire IDS/IPS, Tripwire Enterprise (FIM), Intel SIEM, Log Rhythm SIEM, SolarWinds, AlienVault, Symantec SEPM, Carbon Black Cloud, Sophos, Firemon, Duo MFA, Vasco (OneSpan) MFA, Moloch/Arkime NDR, Rapid7, Nessus.

INFORMATION SECURITY ANALYST

Western Farmers Electric Cooperative

October 2016 – May 2019

• Primary for the Tripwire Enterprise Server (FIM), ensuring NERC CIP compliance on all EMS, EACMS, and PACS IT/OT systems.

• Cross trained on multiple systems to expand security knowledge. These systems include: CISCO Sourcefire IDS/IPS, Tripwire Enterprise (FIM), Intel SIEM, SolarWinds, AlienVault, Symantec SEPM, Sophos, Firemon, Vasco (OneSpan) MFA, Moloch NDR, Rapid7, Nessus.

• Participated in the Annual GridEx Live Fire Exercise where the Security Operations Team performed above expectations, causing havoc for the rest of the exercise.

• Responded to numerous threats and investigated/responded to ensure the integrity of our networks.

• Monitor numerous systems for intrusions, vulnerabilities, and unauthorized access. FIM, SIEM, IDS, AV, VMS, just to name a few.

FIELD SYSTEMS ENGINEER

ITEC - Northrop Grumman - Fort Carson, CO

December 2014 to October 2016

• Re-designed network infrastructure to meet JPO requirements. Involved Cisco switch, router, and ASA firewall configurations requiring SSL VPN tunnels and IPSec.

• Incorporated new Army ACAS (Nessus Scanner) to meet the new Risk Management Framework (RMF) standards with the transition from DIACAP (DoD Information Assurance Certification and Accreditation Process) to RMF. This scanner tool for multi-platform network, including RHEL, Windows, IRIX, and other forms of Linux verified vulnerability and risk management status so that risks could be mitigated or accepted.

• Analyzed network for security vulnerabilities and deployed managed security solutions to meet DISA security compliance.

• Analyzed new build configurations for security, vulnerability and flaws prior to being implemented.

• Served as the Information Assurance/Cybersecurity (IA/Cyber) Compliance Officer as the liaison between the US Army and Northrop Grumman, ensuring that Northrop Grumman met and adhered to all US Army IA/Cyber policies.

DIRECTOR OF COMMUNICATIONS, USNORTHCOM J33/COMMUNICATIONS SUPERVISOR/SYSTEMS-NETWORK ENGINEER (GS-13)

US AIR FORCE

February 2012 to October 2014

• Supervised a communications team of, up to, 18 civilian/military personnel spread across different countries.

• Deployed Site Lead and Communications Infrastructure Architect.

• Responsible for all Systems and Network Security to meet DISA requirements.

• Managed over 50 Cisco devices, to include Routers, Switches, ASA Firewalls, and multiple endpoint management systems.

• Designed ASA Firewall configurations to prevent network intrusion by conducting network intrusion detection tests to prevent active vulnerabilities inside of a foreign country.

• Managed multiple SATCOM Communications Data Links, building load balancing, TCP acceleration, and fail-over capabilities into network integration utilizing Riverbed, COMTECH, and F5 technologies

• Lead for re-engineering, designing, and implementation of a new, streamlined communications architecture to facilitate secure communications outside the United States.

• Managed and maintained multiple DCs, NASs, WSUSs, vCenters both physical and virtual via ESXs and vSphere.

• Managed Full Motion Video deployed network to include multiple FMV remote workstations, FMV server, web access (Big IP and Encore), network storage and circuit connectivity (2 satellite hops and 4 terrestrial circuits).

• Responsible for VoIP and VoSIP phone system and a Secure VTC.

• Provided a deployed 24/7 on-call response team for ISR, and real-time intelligence collection assets.

• Intelligence Software Configurations Specialist focusing on WebTAS, i2 Analyst Notebook, and ARCgis, as well as other intelligence driven software.

• Lead IA/Cyber Compliance Officer responsible for the remote site’s security posture, using DIACAP (DoD Information Assurance Certification and Accreditation Process) and RMF (Risk Management Framework) standards, and COMSEC Custodian responsible for all communications encryption.

• Performed more than 100 DISA vulnerability analysis scans for all systems and kept DIACAP accreditation documentation up to date for random DISA inspection and analysis.

• 2nd Quarter 2012, J3 Employee of the Quarter.

• 2012 J3 Employee of the Year.

WOUNDED WARRIOR – RETIREMENT TRANSITION

US ARMY - WARRIOR TRANSITION BATTALION - Fort Carson, CO

April 2010 to December 2011

RETIREMENT TRANSITION

• Responsible for a team of 25 communications personnel, spread over 4 teams.

• Provided technical evaluation and reported on over 10 new computer/network devices to include network and computer security vulnerability assessments per DOD guidelines.

• Attended over 500 appointments with a 100% attendance rating.

• Served as COMSEC Audit Analyst for Fort Carson Garrison Audit.

TEAM LEAD

DOD UNIFIED COMMAND

March 2008 to April 2010

Non-Commissioned Officer in Charge (NCOIC), DOD SPECIAL ACTIVITIES - INFORMATION SYSTEMS SECURITY/COMMUNICATIONS INFILTRATION

• Team Lead (Supervisor) in the acquisition/infiltration of over 500 enemy communications devices/networks.

• Monitored, evaluated, and tested for COMSEC, security, and network vulnerabilities, both enemy and ally, covering all computer, network, satellite, radio, telecom, IR, LOS, BLOS, and cellular communications, some equipment included: Cisco, Juniper, Foundry, Riverbed, F5, HP, Dell, Ace Powerservers, COMETCH, Harris Radios, Kenwood Radios, L3 Communications, AVL SATCOM, Falcon Systems, HP, Compaq, Alienwear, Lenovo, IBM, Apple, Samsung, Panasonic, Toshiba, Acer, MSI, Asus, Cyberpower, JACO, Sharp, LG, Giga-Byte, and other various OTC items.

• Responsible for security over 100,000 computers and over 500,000 total communications devices in 5 countries.

• Executed over 450 security protocol and intrusion vulnerability scans and 3-4 remote site compliance visits a week, including RETINA, DGSA, and vMaP

• Trained incoming Information Management Officers (IMOs) to recognize vulnerabilities and steps to eliminate all vulnerabilities from the network.

COMMUNICATIONS SPECIALIST/ TRAINING SUPERVISOR

DEFENSE INFORMATION SYSTEMS AGENCY - PENTAGON, VA, US

August 2004 to March 2008

PENTAGON, VA

COMMUNICATIONS SPECIALIST/TRAINING SUPERVISOR - COMMUNICATIONS WATCH OFFICER

• Supervisor of Training for the National Military Command Center, Communications Watch office

• Supervised the training of over 75 personnel on all systems and in C2 and NC2 protocols and procedures.

• Served at the lead technician for the Joint Staff NMCC Communications Watch office

• Responsible for 88 Command and Control (C2) Communications Circuits and 12 C2 Computer Networks.

• Ensured 100% Nuclear Command and Control (NC2) readiness rate for Critical Mission Communications Systems.

• Maintained and Operated 5 Satellite Ground Terminals, 7 National Level Emergency Voice Systems, 2 Missile Warning Systems, 2 Washington High Speed Facsimile Systems, and a Classified Video and Voice Teleconferencing Systems.

• Monitored and reported on over 800 Communications Circuits supporting the Joint Staff (JS), Deputy Director of Operations (DDO), and NMCC.

• Moved 30 JS computer and communications systems to the new NMCC facility with zero loss of service.

• Ensured 98% readiness rating for the NMCC Communications Operations Missions.

• 100% sustained operations of 88 dedicated C2 circuits and 12 C2 computer systems that directly lead to a Team rating of OUTSTANDING during the JS Nuclear Assessment Visit

• Directed the tracking and reporting of over 100 nuclear and non-nuclear systems outages ensuring minimal downtime.

• Selected to assist Satellite Emergency Conference team to help resolve system engineering flaws and ensure 100% training critical to over 50 JS MILSTAR network conferences.

• Lead DISA COMSEC transition to “New Generation” Data Transfer Devices (DTD) from KOI-18s, AN/CYZ-10s, and KIK-13s, to the new, digital SKL/SDS device.

• Evaluated COMSEC procedures for cryptographic uploads to critical devices (Satellites and remote DTDs), and made recommendations that have shaped the current military DTD operations

• Wrote or revised over 100 SOPs and trained all personnel on those procedures to ensure 100% competence.

IT REPAIR/MAINTENANCE AND DESKTOP SECURITY SPECAILIST

US ARMY - DIRECTORATE OF INFORMATION MANAGEMENT - Fort Carson, CO

March 2003 to August 2004

IT REPAIR/MAINTENANCE AND DESKTOP SECURITY SPECAILIST

• Served as the senior IT tech on the DOIM Help Desk.

• Remedy Ticketing Systems Lead Administrator for the DOIM.

• Selected to serve as the liaison to the Fort Carson Command Suite.

• Hand selected to work with Desktop Security/Management.

• Performed vulnerability scans on over 12,000 network computers for security compliance multiple times a week.

• Compiled lists of computer and network vulnerabilities provided oversight and verified completed vulnerability repairs.

NETWORK OPERATIONS CENTER COMMUNICATIONS SPECIALIST SHIFT SUPERVISOR

US ARMY - Fort Richardson, AK

February 2000 to March 2003

NETWORK OPERATIONS CENTER COMMUNICATIONS SPECIALIST SHIFT SUPERVISOR

• Promoted ahead of peers to become the youngest Watch Shift Supervisor.

• Assisted transition from a non-specific branded (meaning various) network architecture to an entire Foundry Fast Iron network.

• Project supervisor for the network architecture transition from Foundry to an entire CISCO network

• Won DOIM Team of the Year in 2002 for excellence in the implementation of DMS for the Pacific Military Region.

• Systems/Network Administrator on over 12 classified and non-classified systems, and 6 Network infrastructures.

• Lead SCIF redesign and engineering to modern AMHS and MDT capabilities.

• SME for Cavalier Messaging Secure Gateway.

• COMSEC Specialist monitoring and tracking more than 50 COMSEC keys, and loading more than 20 devices on a weekly basis, then testing for security vulnerabilities.

• Selected as 59th Signal Battalion, Soldier of the Quarter, 1st Quarter 2001.

EDUCATION

Bachelor of Science, Cybersecurity and Information Assurance

Western Governors University – Ogdon, UT

2019 - Present

Communications Engineer

US Army, US Army Signal School, Communications Engineering – Fort Gordon, GA

August 2006 to December 2007

Honor Graduate – Communications Systems Engineer

Computer Science

SEMINOLE STATE COLLEGE - Seminole, OK

August 1998 to May 1999

Associates of Science. 1999

Computer Science

NW OKLAHOMA STATE UNIVERSITY - Alva, OK

August 1997 to May 1998

Pre-Med/Chemistry/Sports Medicine

OKLAHOMA BAPTIST UNIVERSITY - Shawnee, OK

August 1995 to May 1997

oTotal College Credit Hours > 130

CERTIFICATION COURCES

CCNA

Spring 2002

September 2014

CCNA Security

September 2014

CCDA

September 2014

CERTIFICATIONS

CISSP

739343

December 2020

Security+

July 2007

Many smaller, more system specific certifications that hold little relevance to any job outside the US Military.



Contact this candidate