Jason S. Lytle
**** ******** **, *****, ** ***** 580-***-**** adtwfn@r.postjobfree.com
OBJECTIVE
The purpose of this resume is to obtain a position in the Information Security/Risk Management or Information Technology Management industry by utilizing my extensive military and civilian experience and leadership in these areas.
SKILLS & ABILITIES
MANAGEMENT
oOver 20 years of experience supervising/managing numerous teams, both government and civilian, spread across multiple countries. Promoted ahead of peers for lead or supervisory roles in almost every job held.
COMMUNICATION
oExcellent communicator, with ability to speak before senior leadership or subordinates. Tailor information to the audience, and give the information needed, when needed.
LEADERSHIP
oI have a simple leadership style, direct, but hands off. I believe an employee should not have their hand held to perform a job, they were hired to do that job, and they can or cannot do it. If they can do it, they should receive a task, then be given the opportunity to complete that task.
SECURITY
oI have 20+ years of overall security operational experience. Served as Communication Security (COMSEC) Specialist for most of my US Army career, and beyond. 12+ years of experience with the US Army while on active duty, another 3 years’ experience with the US Air Force as a DoD Civilian, 2 years of Information Assurance/Cybersecurity (IA/Cyber) with Northrop Grumman on a US Army contract, and 5+ years’ experience with IT/OT Security Operations at Western Farmers Electric Cooperative.
WORK EXPERIENCE
SECURITY CONSULTANT
VSEC Enterprises
July 2022 – Present
• Provide insight into IT/OT security for customers to build their security infrastructure.
• Evaluate current security posture of companies and provide a security assessment needed for risk management, vulnerability mitigation, and security implementation/improvement.
INFORMATION SECURITY SUPERVISOR
Western Farmers Electric Cooperative
May 2019 – July 2022
• Managed/Supervised a team of 5 Security Professionals.
• Successfully repelled numerous cyber-attacks. Monitored all network and system activity, investigated anomalies, and had no security related compromises, breaches, or attacks.
• Analyzed, evaluated, and lead the response to security incidents occurring an any of our 4 primary sites spread across multiple states.
• Performed NERC CIP Compliance duties including Secure Controls Testing, System Monitoring, System Evaluation, Baseline Configuration Management, User Management. During MRO Audits, we did not have any significant violations or lapses in our compliance posture.
• Monitored/scanned 100+ networks, spanning 5 Primary Facilities, 4 Power Plants, several outposts, and 100+ individual Switches, Substations, Microwave Relays, MODs, and other systems for security incidents, risks, vulnerabilities, and system deficiencies.
• Project Lead/Manager for numerous projects from start to finish, both my own and my employee’s projects.
• Directed in-depth threat hunting/vulnerability scans activities across all networks and systems.
• Evaluated all new software titles for weaknesses, vulnerabilities, and how it fit into our work environments, then approved those titles to be used on our networks or not.
• Wrote and directed numerous Annual Exercises where the Security Operations Team performed above expectations.
• Responded to security alerts 24x7/365 and followed them to their conclusion.
• Wrote Internal Situation Awareness Reports (iSAR) and SITREPS (Situation Reports) for identified threats, traffic/anomalies on the network, user behavior/downloads, and anything that would be of use to the team or leadership.
• Primary or secondary for numerous Corporate and NERC CIP security systems. These systems include: CISCO Sourcefire IDS/IPS, Tripwire Enterprise (FIM), Intel SIEM, Log Rhythm SIEM, SolarWinds, AlienVault, Symantec SEPM, Carbon Black Cloud, Sophos, Firemon, Duo MFA, Vasco (OneSpan) MFA, Moloch/Arkime NDR, Rapid7, Nessus.
INFORMATION SECURITY ANALYST
Western Farmers Electric Cooperative
October 2016 – May 2019
• Primary for the Tripwire Enterprise Server (FIM), ensuring NERC CIP compliance on all EMS, EACMS, and PACS IT/OT systems.
• Cross trained on multiple systems to expand security knowledge. These systems include: CISCO Sourcefire IDS/IPS, Tripwire Enterprise (FIM), Intel SIEM, SolarWinds, AlienVault, Symantec SEPM, Sophos, Firemon, Vasco (OneSpan) MFA, Moloch NDR, Rapid7, Nessus.
• Participated in the Annual GridEx Live Fire Exercise where the Security Operations Team performed above expectations, causing havoc for the rest of the exercise.
• Responded to numerous threats and investigated/responded to ensure the integrity of our networks.
• Monitor numerous systems for intrusions, vulnerabilities, and unauthorized access. FIM, SIEM, IDS, AV, VMS, just to name a few.
FIELD SYSTEMS ENGINEER
ITEC - Northrop Grumman - Fort Carson, CO
December 2014 to October 2016
• Re-designed network infrastructure to meet JPO requirements. Involved Cisco switch, router, and ASA firewall configurations requiring SSL VPN tunnels and IPSec.
• Incorporated new Army ACAS (Nessus Scanner) to meet the new Risk Management Framework (RMF) standards with the transition from DIACAP (DoD Information Assurance Certification and Accreditation Process) to RMF. This scanner tool for multi-platform network, including RHEL, Windows, IRIX, and other forms of Linux verified vulnerability and risk management status so that risks could be mitigated or accepted.
• Analyzed network for security vulnerabilities and deployed managed security solutions to meet DISA security compliance.
• Analyzed new build configurations for security, vulnerability and flaws prior to being implemented.
• Served as the Information Assurance/Cybersecurity (IA/Cyber) Compliance Officer as the liaison between the US Army and Northrop Grumman, ensuring that Northrop Grumman met and adhered to all US Army IA/Cyber policies.
DIRECTOR OF COMMUNICATIONS, USNORTHCOM J33/COMMUNICATIONS SUPERVISOR/SYSTEMS-NETWORK ENGINEER (GS-13)
US AIR FORCE
February 2012 to October 2014
• Supervised a communications team of, up to, 18 civilian/military personnel spread across different countries.
• Deployed Site Lead and Communications Infrastructure Architect.
• Responsible for all Systems and Network Security to meet DISA requirements.
• Managed over 50 Cisco devices, to include Routers, Switches, ASA Firewalls, and multiple endpoint management systems.
• Designed ASA Firewall configurations to prevent network intrusion by conducting network intrusion detection tests to prevent active vulnerabilities inside of a foreign country.
• Managed multiple SATCOM Communications Data Links, building load balancing, TCP acceleration, and fail-over capabilities into network integration utilizing Riverbed, COMTECH, and F5 technologies
• Lead for re-engineering, designing, and implementation of a new, streamlined communications architecture to facilitate secure communications outside the United States.
• Managed and maintained multiple DCs, NASs, WSUSs, vCenters both physical and virtual via ESXs and vSphere.
• Managed Full Motion Video deployed network to include multiple FMV remote workstations, FMV server, web access (Big IP and Encore), network storage and circuit connectivity (2 satellite hops and 4 terrestrial circuits).
• Responsible for VoIP and VoSIP phone system and a Secure VTC.
• Provided a deployed 24/7 on-call response team for ISR, and real-time intelligence collection assets.
• Intelligence Software Configurations Specialist focusing on WebTAS, i2 Analyst Notebook, and ARCgis, as well as other intelligence driven software.
• Lead IA/Cyber Compliance Officer responsible for the remote site’s security posture, using DIACAP (DoD Information Assurance Certification and Accreditation Process) and RMF (Risk Management Framework) standards, and COMSEC Custodian responsible for all communications encryption.
• Performed more than 100 DISA vulnerability analysis scans for all systems and kept DIACAP accreditation documentation up to date for random DISA inspection and analysis.
• 2nd Quarter 2012, J3 Employee of the Quarter.
• 2012 J3 Employee of the Year.
WOUNDED WARRIOR – RETIREMENT TRANSITION
US ARMY - WARRIOR TRANSITION BATTALION - Fort Carson, CO
April 2010 to December 2011
RETIREMENT TRANSITION
• Responsible for a team of 25 communications personnel, spread over 4 teams.
• Provided technical evaluation and reported on over 10 new computer/network devices to include network and computer security vulnerability assessments per DOD guidelines.
• Attended over 500 appointments with a 100% attendance rating.
• Served as COMSEC Audit Analyst for Fort Carson Garrison Audit.
TEAM LEAD
DOD UNIFIED COMMAND
March 2008 to April 2010
Non-Commissioned Officer in Charge (NCOIC), DOD SPECIAL ACTIVITIES - INFORMATION SYSTEMS SECURITY/COMMUNICATIONS INFILTRATION
• Team Lead (Supervisor) in the acquisition/infiltration of over 500 enemy communications devices/networks.
• Monitored, evaluated, and tested for COMSEC, security, and network vulnerabilities, both enemy and ally, covering all computer, network, satellite, radio, telecom, IR, LOS, BLOS, and cellular communications, some equipment included: Cisco, Juniper, Foundry, Riverbed, F5, HP, Dell, Ace Powerservers, COMETCH, Harris Radios, Kenwood Radios, L3 Communications, AVL SATCOM, Falcon Systems, HP, Compaq, Alienwear, Lenovo, IBM, Apple, Samsung, Panasonic, Toshiba, Acer, MSI, Asus, Cyberpower, JACO, Sharp, LG, Giga-Byte, and other various OTC items.
• Responsible for security over 100,000 computers and over 500,000 total communications devices in 5 countries.
• Executed over 450 security protocol and intrusion vulnerability scans and 3-4 remote site compliance visits a week, including RETINA, DGSA, and vMaP
• Trained incoming Information Management Officers (IMOs) to recognize vulnerabilities and steps to eliminate all vulnerabilities from the network.
COMMUNICATIONS SPECIALIST/ TRAINING SUPERVISOR
DEFENSE INFORMATION SYSTEMS AGENCY - PENTAGON, VA, US
August 2004 to March 2008
PENTAGON, VA
COMMUNICATIONS SPECIALIST/TRAINING SUPERVISOR - COMMUNICATIONS WATCH OFFICER
• Supervisor of Training for the National Military Command Center, Communications Watch office
• Supervised the training of over 75 personnel on all systems and in C2 and NC2 protocols and procedures.
• Served at the lead technician for the Joint Staff NMCC Communications Watch office
• Responsible for 88 Command and Control (C2) Communications Circuits and 12 C2 Computer Networks.
• Ensured 100% Nuclear Command and Control (NC2) readiness rate for Critical Mission Communications Systems.
• Maintained and Operated 5 Satellite Ground Terminals, 7 National Level Emergency Voice Systems, 2 Missile Warning Systems, 2 Washington High Speed Facsimile Systems, and a Classified Video and Voice Teleconferencing Systems.
• Monitored and reported on over 800 Communications Circuits supporting the Joint Staff (JS), Deputy Director of Operations (DDO), and NMCC.
• Moved 30 JS computer and communications systems to the new NMCC facility with zero loss of service.
• Ensured 98% readiness rating for the NMCC Communications Operations Missions.
• 100% sustained operations of 88 dedicated C2 circuits and 12 C2 computer systems that directly lead to a Team rating of OUTSTANDING during the JS Nuclear Assessment Visit
• Directed the tracking and reporting of over 100 nuclear and non-nuclear systems outages ensuring minimal downtime.
• Selected to assist Satellite Emergency Conference team to help resolve system engineering flaws and ensure 100% training critical to over 50 JS MILSTAR network conferences.
• Lead DISA COMSEC transition to “New Generation” Data Transfer Devices (DTD) from KOI-18s, AN/CYZ-10s, and KIK-13s, to the new, digital SKL/SDS device.
• Evaluated COMSEC procedures for cryptographic uploads to critical devices (Satellites and remote DTDs), and made recommendations that have shaped the current military DTD operations
• Wrote or revised over 100 SOPs and trained all personnel on those procedures to ensure 100% competence.
IT REPAIR/MAINTENANCE AND DESKTOP SECURITY SPECAILIST
US ARMY - DIRECTORATE OF INFORMATION MANAGEMENT - Fort Carson, CO
March 2003 to August 2004
IT REPAIR/MAINTENANCE AND DESKTOP SECURITY SPECAILIST
• Served as the senior IT tech on the DOIM Help Desk.
• Remedy Ticketing Systems Lead Administrator for the DOIM.
• Selected to serve as the liaison to the Fort Carson Command Suite.
• Hand selected to work with Desktop Security/Management.
• Performed vulnerability scans on over 12,000 network computers for security compliance multiple times a week.
• Compiled lists of computer and network vulnerabilities provided oversight and verified completed vulnerability repairs.
NETWORK OPERATIONS CENTER COMMUNICATIONS SPECIALIST SHIFT SUPERVISOR
US ARMY - Fort Richardson, AK
February 2000 to March 2003
NETWORK OPERATIONS CENTER COMMUNICATIONS SPECIALIST SHIFT SUPERVISOR
• Promoted ahead of peers to become the youngest Watch Shift Supervisor.
• Assisted transition from a non-specific branded (meaning various) network architecture to an entire Foundry Fast Iron network.
• Project supervisor for the network architecture transition from Foundry to an entire CISCO network
• Won DOIM Team of the Year in 2002 for excellence in the implementation of DMS for the Pacific Military Region.
• Systems/Network Administrator on over 12 classified and non-classified systems, and 6 Network infrastructures.
• Lead SCIF redesign and engineering to modern AMHS and MDT capabilities.
• SME for Cavalier Messaging Secure Gateway.
• COMSEC Specialist monitoring and tracking more than 50 COMSEC keys, and loading more than 20 devices on a weekly basis, then testing for security vulnerabilities.
• Selected as 59th Signal Battalion, Soldier of the Quarter, 1st Quarter 2001.
EDUCATION
Bachelor of Science, Cybersecurity and Information Assurance
Western Governors University – Ogdon, UT
2019 - Present
Communications Engineer
US Army, US Army Signal School, Communications Engineering – Fort Gordon, GA
August 2006 to December 2007
Honor Graduate – Communications Systems Engineer
Computer Science
SEMINOLE STATE COLLEGE - Seminole, OK
August 1998 to May 1999
Associates of Science. 1999
Computer Science
NW OKLAHOMA STATE UNIVERSITY - Alva, OK
August 1997 to May 1998
Pre-Med/Chemistry/Sports Medicine
OKLAHOMA BAPTIST UNIVERSITY - Shawnee, OK
August 1995 to May 1997
oTotal College Credit Hours > 130
CERTIFICATION COURCES
CCNA
Spring 2002
September 2014
CCNA Security
September 2014
CCDA
September 2014
CERTIFICATIONS
CISSP
739343
December 2020
Security+
July 2007
Many smaller, more system specific certifications that hold little relevance to any job outside the US Military.