Post Job Free
Sign in

Cyber Security Engineer

Location:
Odenton, MD
Salary:
190000
Posted:
December 07, 2024

Contact this candidate

Resume:

Reginald B. Ragland

410-***-**** (Cell)

********************@*****.***

CAREER PROFILE

An accomplished Senior Cyber Security Engineer with a documented record of successfully completing complex projects on time and within budget. An effective communicator with excellent written, verbal and interpersonal skills and documented experience in managing and mentoring multi-disciplined teams. Able to learn new concepts quickly and adapt new security tools, technologies, processes and workflows to mitigate legacy security issues based on legacy SDLC phase activities and implementation approaches.

Extensive knowledge of NIST/FIPS 800 Series, ISO 27000, ISO 15288, ISO 12207, ISO 55000, ISO/IEC TR 15504, ISA/IEC 62443, EO 12333, ITIL,OASIS, COBIT, ISA/EC 62443, BSIMM, NIST 800-82, NERC CIP, NEI-08-09, ICS, SCADA, Facility Related Control Systems (FRCS), OMB 14-03, DoDI 4650.01, E3 Analysis, NISCAP, NISPOM, DCID 6/3, DODIN, JAFAN, DOD, NSA, CNSS 1253/ICD 503, HiTrust, AR 25-2, MATLAB, LABVIEW, DICOS 1.0/2.0, Adaptive Planning and Execution System (APEX), SATCOM, IoT Security Framework and toolsets, Cross Domain Security Frameworks, AI/ML Data Ingestion and Analytics, Deep Learning (Image Processing), Pytorch and Jupyter Notebook Data Analysis/Data Analytics, Artificial Intelligence, Machine Learning (Cyber Security/Image Identification and Correlation), DataBricks, Pyramart, Snowflake, Snowplow, Yellowbrick, ERwin, Tool Set, Alluxio, Hadoop, Tensor Flow, TAF, IACS, GEOINT, Xacta, IntelliJ, Eclipse, CSAM, Open Source Security Testing Methodology (OSTMM), Atlassian Tool Suite (Jira, Confluence, BitBucket), Cisco Stealthwatch, Selenium, Bromium, ACAS Suite, Rapid App Spider, Sysdig, Fortify, Nexpose, AppScan, BURP, SCAP, PCAP, Palantir, STRIDE Threat Model, OESIS Framework, NGINX, OWASP Security Remediation, Thread Fix, Nessus Tenable Security Center Tool Suite, FortiGate Tool Suite, FortiAnalyzer, DB Protect, Kali Linux, Centrify, Veracode, Pentaho, Acunetix, NetScout, Intelliview, SonaType, SonarCube, NSA IAM/IEM, CyberArk, IBM Guardium, DataSunrise, Thycotic, RSA Netwitness, Checkmarx, DBProtect, Continuum, Foundstone, Carbon Black, ForeScout, Nmap, Retina, ELK Stack, Edge Computing, SASE, Splunk Enterprise, SolarWinds, ForeScout Product Suite, AlgoSec Product Suite, BigFix, Intella, Metasploit, Cain and Abel, Suricata, White Hat Sentinel, ArcSight, HP WebInspect, Fortify, McAfee ePolicy Orchestrator/HBSS, Encase, Digital Forensics Incident Response (DFIR), DOORS/DX, Cameo/SysML,RSA Archer, LeanIX, CSET, SAFe, Microsoft MOF, eMASS, NGA, SailPoint, DISA, DCI, JCS, DOJ, DHS/TSA/CBP/ICE/USCIS, OMB, FedRAMP, FISMA, FFIEC, CSAM, IACS, Cisco ISE, COSO, FISCAM, FFMS, CVSS, HITRUST, Cyber Security Maturity Modeling (CMM), Troux, TOGAF, SABSA, FAIR Cyber Risk Management Model, DoDAF, Zachman, Cameo Enterprise, FHIR, EPLC, ArchiMate, Magic Draw, Rational Rhapsody, IBM Jazz, UML, SysML, MOSA, FEAF, ERwin, SEBok, INCOSE, Model Based Systems Engineering (MBSE), SysML/UML, SABSA, AWS, Azure, Cisco Tetration, SASE, RedShift, DoD Cloud Computing Security Requirements Guide (CC SRG), Cloud Entity, SnowFlake, Nexus, Ansible, GitHub/GitLab, Jenkins, SALT Stack, Swagger API Integrated Tool Suite, Terraform, Chef, Puppet, TOSCA and Cloud Security Alliance Frameworks.

Clearance: Active Top Secret, SCI Eligible

Certifications: C: CISO (ecc 263********), CRISC (5707675), CICA (17097669), CIST (4150), CIMP (4854),

CCS (20028659), CDPSE (2009174), CIGE

Professional Experience:

GLOBAL SYSTEMS TECHNOLOGY/CYBER SECURITY ARCHITECT/SR. ISSO/CYBER SME June 2017 - Present

Currently providing strategic guidance to DHS customer base for implementing NIST 800 Series Risk Management Framework based security authorization and assessment (SAA) activities. Support includes cyber security, system/application vulnerability assessments support cyber security architecture technical and management support. Duties include performing SAA tasks in accordance with NIST Risk Management Framework, conducting security vulnerability assessments, validating security posture compliance of COTS operating system products. Responsible for providing: cyber security architecture support for Open System Screening Architecture (OSSA) roadmap to support transition to cloud service models and vendor API framework development to support consolidation of stove-piped applications/systems; developing architectural reference models, microservices analysis and implementation, coordinating rugged SecDevOps and CI/CD backlogs to mitigate vulnerabilities, testing and approval workflows/quality gates that support alignment with target state architectures across all deployed system security configuration baselines. Additional duties requirements include providing detailed guidance to support secure system/application development activities that are consistent with IT and Business Roadmap goals and objectives, which meet or surpass user requirements and will maximize collaboration and cooperation among stakeholder community members

Providing cyber security and system/application architecture technical/management support to the DHS Innovation Task Force (ITF) ( whose initial goals follow: improve the efficiency of current processes and workflows such as cyber threat intelligence collection, integration; processing and dissemination; improve security policy gap analysis based on evolving/dynamic threat scenarios; improve processes to support the ingestion and focused use of structured and unstructured data); support secure software development processes that involve new computer languages such as Go, R, Python; building protections into all software products from the initial concept stage of the system/software development life cycle process/stages); supporting the development of AI guardrails that will monitor adherence to current DHS/TSA Security Policies and security accreditation guidance; evaluation of Machine Learning Network Architectures; Models and Techniques used by Large Language Models; and the development of AI guardrails that will assure compliance with current DHS/TSA Security Policies and best practices for security accreditation guidance by embedding default protection into generative AI models. Also responsible for supporting the development of AI Guardrails to support DHS/TSA Innovation Task Force (ITF) improvement of cybersecurity validation workflows security policy gap analysis (based on evolving threat scenarios) and developing policy and summaries of AI/ML and LLM capabilities to be used to support Model Base System Engineering and TOGAF representations to support new projects identified by DHS Innovation Task Force Management Team. Responsible for documenting and testing cloud security controls and system/application migration requirements, providing AWS, Salesforce, Google and FedRAMP transition planning to support migration to target architecture models that are consistent with DHS Enterprise Architecture Frameworks and commercial vendor cloud offerings. Additional duties include making recommendations to maintain posture of current security baselines based on DHS/TSA security policies/directives; making changes to security SOPs based on security incidents and changes in operational threat environment.

KCG/MANTECH INTERNATIONAL May 11 - June 2017

Senior Information System Security Officer

Responsible for capturing, documenting, integrating and testing functional/security requirements to ensure that multi-vendor developer’s system application builds comply with NIST Risk Management Framework (RMF) Agile; DevSecOps; API framework requirements; DHS/TSA enterprise architecture and cyber security guidance/standards/best practices; and FedRAMP transition planning and FedRAMP compliance mandates. Responsible for reviewing and validating all inputs to cyber security compliance systems (IACS and eMASS); preparation of cloud migration, POAM mitigation and transition plans, continuous diagnostic mitigation, and ongoing authorization plans. Responsible for developing executive level and internal/external stakeholder briefings; supporting security product/technology insertion activities and enterprise security architecture changes; providing recommendations on system improvements whose goals are to achieve/optimize performance, monitoring and management of the implementation and institutionalization of improvements at the enterprise level. Additional duties included conducting a risk-based architectural analysis of alternatives (AoA) using a combination of architecture/modeling frameworks (FEAF, Zachman, DoDAF, ATAM and Sherwood Applied Business Security Architecture (SABSA)) architectural to document functionality to support the consolidation of stove-piped systems reduce the security footprint and transition the new system to OneNet/TIC network infrastructure. Responsible for reviewing database schema, data architecture, developing and documenting linkage to architectural reference models; CI/CD processes and activities, pipeline development, testing and approval workflows/quality gates that support alignment with target state architectures across all security configuration baselines. Responsible for documenting cloud migration requirements, FedRAMP compliant test requirements, transition planning and execution based on current service offerings to ensure that interim architecture baselines are consistent with DHS target cloud architecture and enterprise architecture frameworks. Responsible for: performing security assessment and authorization (SAA) tasks in accordance with NIST 800 Risk Management Framework; developing cloud migration plans for systems and applications within security authorization boundary. Also responsible for supporting the capture and documenting of business process level and workflow details for all DHS/TSA Stakeholders to support system development and testing of functional and security requirements for evolving security products; providing advice to stakeholders. Algorithm developers, and application development partners who own and manage the environments used to support the care and feeding of DHS/TSA applications/servers supporting airport security devices, network infrastructure and intelligence gathering/dissemination systems.

INFORMATION ASSURANCE ASSOCIATES Oct 08 - May 11

Consultant: DIACAP/DITSCAP/Certification& Accreditation/Security/Security Architect/Cyber SME

Provided spectrum supportability risk assessment, strategic and tactical IA consulting services for the following clients: National Security Agency (IA32), Defense Intelligence Agency, National Geospatial Agency (NGA), Office of Naval Intelligence (ONI), PawPrintz, SOCOM, ACT Integrity Consultants, Artel Inc, NTIA, Spectrum Certification System, EL-CID, Stepstone, EMASS, ACAS, HBSS, KARTA,GSK, CTC, Carter Lambert Divisions, INSTOS Inc., Defense Health Affairs (DHA), Veterans Administration (VA), Quality Solutions Incorporated (QSI), Northrop Grumman, Office of Justice Programs (OJP, Solers Inc., Amyx, General Dynamics Information Systems, J2 Associates, and ComInfo Systems. Specific responsibilities included developing DIACAP/DITSCAP, Authority To Connect (ATC), Interim Authority to Test (IATT), security documentation packages for terrestrial and SATCOM networks; cross domain security design, testing and implementation; conducting security and business architecture analysis/developing technical services roadmaps; performing penetration tests and conducting vulnerability analysis; performing security certification and accreditation tasks (SC&A); conducting certification test and evaluations; creating POA&M closure packages; creating and maintaining risk mitigation plans for COTS software packages; and, performing mandatory annual security assessments to maintain SC&A status of systems accredited under DIACAP/DITSCAP and NIST security frameworks.

Provided System Security Engineering oversight, including security vulnerability and penetration testing/mitigation on the Cross Domain Web Services Gateway, DoDEA CONUS network infrastructure components, DISA SATCOM Security and Teleport Security Services, Geospatial Intelligence Collection and Integration Systems (GEOINT), Standard Tactical Entry Point (STEP) workstations; cryptographic key management systems (CKMS), ISSE Mail Guard Systems; conducting security audits; and, testing Cross Domain web service security services. Also performed SABSA and DODIIS security architecture engineering analysis required to support re-engineering of stove-piped systems/applications to support system of systems integration and supporting software development, security requirements and dependent technical and acquisition roadmaps. Additional duties included providing technical and management support for Electronic Key Management Systems used by Defense Intelligence Agency (DIA), Intelligence Community (IC) and JFHQ DODIN with Priority Intelligence Requirements (PIR). Supported the development of bad actor centric/threat-based standard operating procedures/countermeasures and indication/warning requirements for potential attacks against DoD information systems and computer networks based on the analysis of network nodes (people and groups) and the characterization of the identified data links and electronic signal intelligence data flows. Additional duties included performing metadata and content analysis of threat adversary information system and reconstruct threat digital networks.

THE INFORMATICS APPLICATION GROUP (TIAG), INC Aug 06 - Oct 08

Theater Medical Information Program (TMIP) Security Manager

Responsible for coordinating the development and integration of Adaptive Planning and Execution System (APEX) based outputs to integrate strategic and tactical Information Assurance (IA) and System of Systems capability integration oversight to support the design, development, implementation and deployment of a Joint Requirements Oversight Committee (JROC) approved Information Systems for the TMIP Program Management Office. System design approach integrated functionality from several legacy military health applications and systems, military clinical repositories from Navy, and SOCOM and resulted in the development of a Family of Systems to support medical readiness visibility for Special Forces and Stryker Brigade via PDA devices which supported FIPS 140-2 256-bit key encryption. Specific responsibilities included: providing security life-cycle management oversight supporting the development, testing, integration and delivery of COTS and proprietary Military Health Systems CONUS components/software applications into deployed theater baselines; ensuring that work products were compliant with Net Centric interoperability guidelines, Advanced Encryption Standard (AES), NSA Type-1 and DoD 8500 security certification and accreditation requirements; managing the preparation and validation of Authority to Operate (ATO), Authority to Connect (ATC), and Certificate of Net Worthiness (CON) documentation; developing and testing IA security controls, and conducting regression tests to ensure that proposed changes do not invalidate current accreditation guidelines. Security architecture responsibilities included using structured analysis and design technique (SADT) to document/develop activity & data models to support security architecture and application software requirements roadmaps which served as an initial functional baseline framework for the development of an integrated “system of systems” framework for HL7 and ICD9 systems.

CORBETT TECHNOLOGIES Dec 03 - Aug 06

Security Program Manager/ Security Architect

Responsible for managing all life cycle tasks associated with certification and accreditation (C&A) activities for Navy Marines Corps Intranet (NMCI) systems/applications through all phases of the DITSCAP, ICD 503, CNSS, DCID 6/3 and DCID 6/9 Certification and Accreditation (C&A) processes and approval workflows. Specific responsibilities included; conducting network infrastructure risk assessments and penetration tests on SATCOM and terrestrial networks to validate security posture compliance with certification requirements; terrestrial and SATCOM network management design activities, performing security policy audits, and vulnerability analysis for satellite communication infrastructure components and Standard Tactical Entry Point (STEP) SATCOM compartmented mode work stations, GEOINT data collection and integration, and Silent Runner deployment. Also responsible for gathering and validating stakeholder requirements, developing segment re-use and security solution architecture roadmap based on requirements baseline and developing linkage to system/application structure, non-technology specific reuse/re-alignment metrics, specific All View (AV), Operational View (OV), System and Services View (SV) and Technical Views (TV). Technical transition and migration roadmaps were based on combinations of Federal Enterprise Architecture Framework (FEAF), DoDAF and Zachman enterprise architecture framework models.

MANAGEMENT SYSTEMS DESIGNERS (MSD) Sept 01 - Dec 03

Data Security Manager/Security Architect

Responsible for conducting security architecture assessment and validation, conducting risk and vulnerability assessments, and developing certification and accreditation packages for the Department of Justice/Immigration and Naturalization Service (INS). Specific responsibilities included developing security transition and system/application security architecture roadmaps; conducting penetration tests, performing security audits, optimizing risk management processes and implementing Plan of Objectives and Milestones (POA&M) remediation activities and ensuring that POA&M implementation did not violate the terms of the current security accreditation. Additional tasking included leading the system security architecture redesign effort to develop target business architecture snapshots, develop application/data domain architecture roadmaps and identify supporting connectivity workflows to map system/application components to evolving solution architecture products, technologies and components based on supporting technology architecture requirements. Federal Enterprise Architecture Framework (FEAF) was used to capture and document Technical Reference system and application architecture.

EXECUTIVE SECURITY ENGINEERING TECHNOLOGIES (ESET) Jan 98 - Sept 01

Senior Infosec Mgr./Security integration Architect

Responsible for providing information security management, network security architecture, information assurance technical and management support to the Joint Staff for Army Materiel Command (AMC) information technology assets. Specific responsibilities included: developing security mitigation, Department of Defense Architecture Framework (DoDAF), Technical Architecture Framework for Information Management (TAFIM), and Zachman framework based security architecture re-alignment/transition roadmaps; developing security technology migration/insertion plans to ensure overall compliance with Defense Information Infrastructure Common Operating Environment (DIICOE), Command, Control, Communications, Computer, Intelligence Surveillance and Reconnaissance (C4ISR), Electromagnetic Environmental Effects (EEE), DoDAF, Technical Architecture Framework for Information Management (TAFIM), Joint Technical Architecture (JTA), Network Centric Enterprise Service (NCES), and Global Information Grid (GIG) interoperability requirements; developing “as-is” and “to-be” architecture snapshots to document current security architecture configurations of terrestrial and SATCOM network infrastructures and identifying changes needed to be compliant with DIICOE, TAFIM and DoDAF over-arching compatibility requirements. Development of Operational Views (OV)/Technical Views (TV)/System and Services Views (SV) to support cyber security and functional integration requirements. Also provided technical support for the retrofit/upgrade and integration of KY/KG devices into DISA, Air Force and Navy SATCOM networks.

CACI Aug 96 - Jan 98

Project Manager/System Architect

Served as the Project Manager for the Ammunition Materiel Standard System (AMSS) Security and Technical Architecture Implementation Team responsible for coordinating/validating work products done by a team of 30 engineers, computer scientists, security architects/analysts, network engineers, and database designers supporting multiple network security design and integration teams involved in the re-engineering/re-architecting, interface development, system integration and security certification and accreditation (SC&A) efforts supporting the development/deployment of the AMSS. Responsible for developing ZACHMAN and Department of Defense Architecture Framework (DODAF) based security architecture roadmaps to support interoperability requirements identified in Technical Architecture Framework for Information Management (TAFIM), Joint Technical Architecture (JTA), Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) and Defense Information Infrastructure Common Operating Environment (DIICOE) frameworks for multi-level security Sun/Solaris compartmented-mode workstations that connected to SIPRNET via SATCOM network infrastructures using Defense Information System Agency (DISA) Standard Tactical Entry Point (STEP) workstations. Provided technical design, integration, implementation and upgrade support for the 14 DSCS fixed station facilities by providing a standard set of Core Command, Control, Communications, Computers, and Intelligence (C4I) services and equipment to better provide standardized support for tactical forces. Supported the integration of encryption devices within the STEPs link via DSCS satellite interfaces to tactical terminals in the theater of operations and beyond into the area common user system.

THE ANALYTICAL SCIENCES CORPORATION (TASC) Jan 94 - Aug 96

Sr Security Engineer/System Architect/Algorithm designer

Provided COMSEC, SATCOM, OPSEC, SIGINT, ELINT, IMINT, FISINT, RADINT, MASINT, Electromagnetic Environmental Effects (EEE), INFOSEC and computer security architecture analysis support for the Ballistic Missile Defense Office (BMDO), PATRIOT, and HAWK Missile Program Offices. Specific responsibilities included: conducting formal security certification and accreditation tests on weapon and intelligence system platforms in accordance with Service and DCID security requirements on Intel and Solaris based multi-level operating system security compartmented-mode workstations; algorithm design and verification and developing: TAFIM based architecture transition roadmaps; technology insertion/migration/integration test plans; software verification and validation test plans; and, developing SCA documentation Interim Authority to Test (IATT), and Authority to Operate (ATO)/Authority to Connect (ATC) packages for terrestrial and SATCOM networks. Also responsible for evaluating/refining/integrating moving target indicator algorithms to determine target discrimination effectiveness in various heavy threat tactical electronic clutter environments.

ANCHOR SOFTWARE MANAGEMENT May 89 - Jan 94

Principal Engineer/Technical Project Manager

Responsible for managing multi-contractor teams of engineers, physicists, software engineers/algorithm developers, and computer scientists supporting the development, testing and deployment of electro-optical, signal processing, automatic target recognition (ATR) and consequence modeling algorithms designed to counter fixed-wing airborne threats in support of the Non-Cooperative Target Recognition (NCTR), Homing All The Way Killer (HAWK), Non-Line of Sight (NLOS) Forward-Heavy (F-H), LADEN MEADOW classified weapon system projects. Provided technical development and testing support for multi-source missile terminal guidance algorithm implementation. Specific responsibilities included: providing INFOSEC, COMSEC, ELINT, SIGINT, MASINT, SATCOM, Electromagnetic Environmental Effects (EEE), signal processing, algorithm development, electro-optical and SIGINT data flow, and signal processing and security engineering support to AMC, MICOM and CECOM for Army Information and Air Defense Systems (ADS); developing/testing electronic counter measure/counter-counter measure algorithms and developing/testing electro-optical and infrared target tracking algorithms/countermeasures to be used in high threat environments; development and testing of cross-cueing algorithms to support processing and classification of spatial, spectral, radiometric, temporal, geospatial data inputs and satellite feeds for time division multiple access (TDMA) frame structure and frequency division multiple access (FDMA) data formats to support weapons terminal guidance processing.

Responsible for developing, testing and integrating automatic target recognition (ATR), clutter mapping, target discrimination algorithms, for HAWK, Non-Cooperative Target Recognition (NCTR), LADEN MEADOW and NLOS-F/H Weapons Programs and developing RADINT, COMINT, HUMINT, SIGINT, IMINT and NBC analysis to support NCTR and terminal weapons guidance delivery based on collection, analysis of FISINT, OSINT, SIGINT, MASINT, ELINT, 3 to 5 and 8 to 14-micron infrared data sources. Also responsible for: developing and testing algorithms to collect, process, analyze and classify hostile ELINT and MASINT signals and integrate them with Mark XII, HAWK, PATRIOT and HARM Missile Systems; AN/ALQ-165 Airborne Self Protection Jammer (ASPJ); Developing/testing and integrating target discrimination and signal processing algorithms to support terminal weapons delivery; conducting analysis of SIGINT parameters including Angle of Arrival (AoA), Direction Finding (DF), Time/Frequency Difference of Arrival techniques; conducting architecture centric tasks included developing ZACHMAN based security architecture (data, security and technical reference model) roadmaps to provide integration framework for near and far IR Threat Detection platforms/systems processing interfaces tactical assets that provide algorithms supporting terminal guidance calculations.

AERONAUTICAL RESEARCH INCORPORATED (ARINC) Jun 87 - May 89

Principal Engineer/Intelligence Analyst

Responsible for managing the software development, testing, security certification and accreditation (SC&A) activities for the Autodin Intersite Gateway (AISG) Category II Certification Test Plan in accordance with security and interoperability guidelines mandated by the NSA Rainbow Series, SOCOM, DCID 6/2, 6/3 and Defense Communications Agency (DCA) SCA requirements. Responsible for coordinating all SCA activities with Defense Communications Agency (DCA), National Security Agency (NSA) liaisons and stakeholders and working with DCA and NSA security stakeholders to conduct quarterly audits and re-certify the classified communications links annually. Managed the security life cycle activities in support of tactical data links (11, 14, and 16), SATCOM and RC/EC-135 based USAF intelligence gathering/correlation/dissemination and communications programs (COMPASS CALL/CONSTANT WATCH/CONSTANT PHOENIX and Rivet Joint) in support of EA-6B, F-15, F-16 and EF-111 aircraft to support the jamming of communications links, electronic attack (EA), Suppression of Enemy Air Defense (SEAD) nuclear detection missions and development of SATCOM link budgets. Additional duties included: providing Electromagnetic Environmental Effects (EEE), Measurement and Signal Intelligence (MASINT), Signals Intelligence (SIGINT), Electronics Intelligence (ELINT) Collection and Technical Analysis, Image Intelligence (IMINT), SATCOM technical and management support for USAF Full Scale Engineering Development (FSED) Programs supporting secure data interchange with Intelligent Preparation of the Battlespace (IPB), Combined Emitter Database (CED), and Modern Integrated Database (MIDB), electronic support toolset/signal databases; and, testing/refining algorithms supporting threat detection, identification, correlation/tracking, target assignment and terminal weapons guidance.

SONICRAFT, INC Apr 84 - Jun 87

Systems Engineering Software Group Manager

Managed the system life-cycle activities for high-performance classified communications systems in support of USAF Command and Control Communications (C3) Systems for the Electronics Systems Division (ESD) located at Hansom Air Force Base. Responsible for: managing the development, testing, hardware/software integration and deployment of Ada, Pascal, C, Intel/Motorola assembly language, Fortran 77, and C application software programs for use in the Minimum Essential Emergency Communications Network (MEECN)/Diversity Reception Equipment (DRE) housed in the E4-B Very Low Frequency (VLF) C3 System. Also responsible for performing and testing neutron fluence, gamma dot, gamma dose, and transient radiation effects analysis via simulation to document/validate the effects of radiation on the electronic circuitry used in the MEECN/DRE equipment suites to support very low frequency command and control communication system survivability analysis. Additional technical duties included developing, testing/integrating modulation, coding, frequency hopping algorithms, and time/frequency division multiplexing schemes for classified spread spectrum communication systems that interfaced with the DRE/MEECN network via terrestrial, Air Force SATCOM and tactical data links.

AUTOMATION INDUSTRIES, VITRO Aug 80 - Apr 84

Combat Systems Engineer/Team Leader

Duties as a combat system engineer included providing software development/test, integration and deployment support for Sixth Fleet Naval Intelligence Collection/Dissemination and Weapons System Programs for NAVSEA Code 61Y1, NAVELEX, NAVSUP and Fleet Combat Direction Support Activity (FCDSSA). Responsible for: coding, testing, and integrating



Contact this candidate