Post Job Free

Resume

Sign in

Air Force Technical Support

Location:
Landstuhl, Rhineland-Palatinate, Germany
Posted:
August 10, 2023

Contact this candidate

Resume:

Glenn Dizon Hurry CISM CASP CEH ITIL

Am Holzapfelbaum 8 Bruchmuhlbach-Miesau, Germany 66892 C: 017********* E: adyt7u@r.postjobfree.com INFORMATION SYSTEMS SECURITY MANAGER

SUMMARY: Multifaceted business-focused IT professional with 18 plus years managing desktop/system/network administration and cybersecurity. In depth expertise in analysis, implementation, troubleshooting and documentation of critical systems and networks. Focused on delivering efficient, workable solutions with strong attention to security and threat prevention. Solid technical and management abilities combine with effective interpersonal skills and the ability to relate to non-technical personnel to produce cost-effective solutions. Proven ability meeting deadlines in high-pressure environments; cultivates relationships with teams and easily build rapport. TS/SCI clearance. EXPERIENCE: Department of Army – Landstuhl Regional Medical Center (LRMC) 02/20 – Present IT Specialist INFOSEC GS-12 2210 (40hrs/wk.)

Chief of Cybersecurity at LRMC and supervisor of 4 Information Systems Security Officer (ISSO).

Oversee IAVM, ATOs, RMF for medical devices, SIPR, ATCTS, within LRMC footprint.

Conduct Cyber audits to LRMC subordinate units; ensure compliance in ATCTS, IAVMs, SIPR, and DISA STIGs traditional security.

Accomplish DHA RMF processes such as software Assessment Application, Assess & Integrate medical devices, Assess and Authorize medical systems.

Leads risk management activities including planning and conducting assessments to meet objectives.

Supervise 4 ISSO within the Cybersecurity Branch; ensure timely DPMAP validation and ATAAPs certification.

Scan, identify, validate and remediate vulnerabilities published over 30 days in ACAS and Tanium; responsible for 4000 plus machines including various networking devices and medical servers.

Respond to Cyber and HIPAA incidents within the LRMC footprint; guarantee expedient updates with the Cybersecurity Service Provider Naval Information Warfare Center (NIWC).

Weekly brief the Chief Information Officer (CIO) on Cybersecurity related topics, track workload, and provide Cyber Dashboard slides.

Department of Army – Wiesbaden, Germany

10/18 – 02/20 IT Specialist INFOSEC GS-12 2210 (40hrs/wk.)

Oversee compliance of IAVM, TSP packages, 6 NECs within the 102d Signal Battalion AOR.

Established detailed 20 pages of Technique, Tactic and Procedure (TTP) in vulnerability remediation; streamlined process to ensure vulnerabilities are identified, prioritized and remediated on time.

Visit 102d AOR tenant units to inspect telecommunication and open storage rooms to validate physical, environmental, emanation and administrative vulnerabilities are compliant with DISA STIGs.

Assigned as an enhanced trusted agent “ETA” for NEC Wiesbaden supporting the Garrison and several tenants; issuance and reset of SIPR/ASCL tokens, and confirm 100% customer satisfaction.

Quarterly brief leaders and IMO’s cyber awareness, process, policies during IMWG meetings; raise awareness and train IMO’s on how to leverage ACAS for vulnerability management, TSPs and ATCTS.

Practice due care and conduct wireless scans using flying squirrel wireless discovery & mapping application throughout the Wiesbaden area of responsibility.

Respond to UDCI/CDV incidents within the 102nd AOR; guarantee timely incident updates, coordinate with RCC DCOD-E and various tenants; and prevent further compromise to systems.

Scan, identify, verify and remediate residual IAVM’s within the 102d AOR. Responsible for 27,000 plus, NIPR and 4000 plus SIPR machines. Remediated 500+ systems identified with residual IAVMs.

Accomplish TSP artifacts such as hardware/software lists, SCAP, windows STIGs, TTPs, COOP, and various artifacts to achieve compliance with policy directives of Risk Management Framework, “RMF”.

Consistently accomplish device management tasking: track above baseline software, systems without SCCM client, BitLocker unprotected, certificate files, ACAS and vulnerabilities per host “VPH”.

Conduct technical validations; risk assessments using NIST 800-30, and create POAMs to track risk mitigation activities of tenant units.

Department of Army – Kaiserslautern, Germany

10/16 – 09/18 IT Specialist INFOSEC GS-11/2210 (40hrs/wk.)

Single point of contact for cybersecurity; IAM level II for 21st TSC TLSC-E Kaiserslautern, Germany.

Impart cyber awareness to leadership, track workload, and incidents w/ cybersecurity scorecard.

Played key role as subject matter expert in ensuring security baseline met command cyber criteria for excellent rating during security audit; guided organization in tactics, techniques and procedures.

Oversee compliance of INFOSEC, IAVM, and TSP packages for all TLSC-E information systems.

Spearheaded the SIPR technical guidance for the European enduring site in Miesau, Germany; tracked progress to ensure project milestones were on time, on budget and w/ the desired results.

Audit TLSC-E units and validate cyber compliance; correct weaknesses to increase cybersecurity posture.

Streamlined the process of escalating ATCTS user network compliance from 93% to 100%; ensured 100% compliance on AUP, cyber awareness training and DD-2875 system access requests.

Implement cyber network defense; monitor and respond to all incidents resulting in timely mitigation strategies and no compromises to TLSC-E systems.

Leverage ACAS scans, SCAP analysis, STIGs and DISA IAVA notices for vulnerability assessments.

Administer TLSC-E COMSEC equipment w/ zero incidents; maintain 100% accountability.

Exposure to development of local policies, security operating procedures and TSP artifacts for compliance. Department of Air Force/ Department of Navy – Tampa, Fl. 08/12 – 10/16 IT Specialist Network/Information Security GS-11/2210 (40hrs/wk.)

Plan technical support for large exercises in various nations for CENTCOM.

Supervise 20 at 24/7 cyber watch CENTCOM HQ for cyber security incidents and threat prevention.

Rotate to DISA Theater, TNC CENT network defense, update cyber dashboard slides and brief staff.

Increased HQ USCENTCOM’s cybersecurity posture; authored CENTCOM ALL messages.

Ensured 5K personnel educated on cyber alerts/defenses and that systems are IAVA compliant focusing on software vulnerabilities and verify systems receive the latest patches.

IT Specialist for Naval Sea Systems Command, focal point for all desktop/network, system administration and information security; ensured uninterrupted shipbuilding mission.

Increased NAVSEA user network compliance to 99%; ensured users comply with IA training requirements.

Supported Air Force Network Integration Center, AFNIC eMASS certification and accreditation; achieved goal in 3 vs 6 months and reduced system backlog by > 20%.

Attended and successfully graduated 6 mos. Air Force Officer Undergraduate Cyber Training (UCT). United States Air Force – Tampa, Fl.

02/11 – 08/12 Network-Desktop Administrator/JWICS Administrator (40hrs/wk.)

Created a continuity folder to reorganize and streamline helpdesk and desktop procedures.

Performed full project lifecycle, directed resources and resolved project-related issues.

Processed SharePoint outage tickets; resolved 30+ tickets—100% customer satisfaction.

JWICS administrator for the 547th Intelligence Squadron. Provided expert operations and maintenance of cisco devices, taclanes, VoIP, VoSIP and desktops for 200 plus users.

•Set up user accounts/permissions, passwords, and group policies via DRA and Active Directory.

Operate VTC and collaborative conference facilities for executive and administrative staff.

Handled 24/7 on call technical support, resolved an average of 2 mission critical issues every weekend. United States Air Force – Tampa, Fl.

05/06 – 11/10 Force Protection Specialist (40hrs/wk.)

Monitored alarms and CC television cameras in 20+ buildings and patrolled premises.

Verified over 13K access credentials; enhanced installation access with DBIDS to reduce threat.

Utilized x-ray and visual inspections to inspect aircraft, cargo, and commercial vehicles.

Conducted entry point access, vehicle searches and security checks for installation with 70K+ personnel.

Maintained $1M+ highly sensitive equipment; inspected and adjusted equipment, and security systems to ensure operational usage and to detect evidence of tampering. United States Air Force – Del Rio, TX.

04/02 – 04/06 Active Duty/Communications Computer Systems (40hrs/wk.)

Active Duty Air Force at Laughlin AFB, Del Rio, Texas network control center with $8.6 million dollars in Local Area Network/Campus Area Network equipment responsible for administration, fault isolation, and maintenance.

Resolved 400 plus trouble calls/2200 remedy tickets; eliminated tier-two technical support and saved network control center helpdesk 100-man hours.

Managed Local Area Network/ Wide Area Network infrastructure; configured cisco switches and routers.

Performed system maintenance and analysis of networking equipment including software, copper and fiber optic cables; sustained 99.9% operations uptime rate.

Coordinated the migration to MS Window XP Pro from MS Window 2000, implemented roaming profiles and the use of a “SAN” storage area network, exceeded all assigned goals.

Managed user accounts and granted share & security level permissions to network printers and drives.

Installation, configuration and maintenance of cisco edge switches for Laughlin AFB LAN using various models. Duties include IOS upgrades, VLAN configuration and port assignments, backup of switch configurations, etc.

EDUCATION:

2021

2012

Bellevue University– Bellevue, NE

Masters in Cybersecurity Technology 3.8 GPA

Bachelor’s Degree in Management Information Systems 3.7 GPA

Community College of the Air Force (CCAF), Laughlin AFB, TX 2005 Associate of Applied Science for Electronic Systems Technology Systems Plus Computer College, Balibago, Angeles City, PI. 1996 Associate’s Degree in Computer Science

TRAINING:

Technical: ITIL V3 Certified Defending Cyber Attack OCO/DCO CASP Certified DISA Malware Analysis CompTIA Security+ CE COMSEC

DISA Encase & Forensics Business Certified Professional Risk Analysis CompTIA Network+ CE MCP/Microsoft Windows 7 certified CISM Certified Active Directory CISSP Boot Camp Certified Ethical Hacker Military: 17D AF Officer Undergraduate Cyber Security Training, Communications, Computer Systems Control, Knowledge Management, Vulnerability/Risk Assessments, COMSEC, Information Assurance, Incident Handling “NDCI/CDV”, Computer Network Defense. Cyber Watch Officer, IDS/IPS, TASKORDs, Retina, Bluecoat, SNORT, Arc Sight, RMF, Certification and Accreditation, HBSS, SCAP, ACAS, TSPs, SCCM, Tanium

Clearance: TS/SCI (SCI - DCID 1/4)

Citizenship: United States

Desired Job Type/Series: 2210/IT

Veteran’s Preference: 10 points Veteran’s Preference REFERENCES: Available upon request.



Contact this candidate