William L. Smiley
Phone: 308-***-**** / E-mail: ******@*****.***
Objective: Program Manager / Certified Chief Information Security Officer/ Business Development Summary: Over 40+ years of specialized Cybersecurity/C4ISR-C5ISR-C6ISR Command, Control, Communications, Computers, Cyber-Defense, Combat Systems (C6), Intelligence, Surveillance, and Reconnaissance (ISR)/Defense Industrial Base (DIB)/Unmanned Vehicles (UUVs/UAVs/LDUUVs) Information Technology Naval-Industry experience. An initiative-taking Manager, Strategic/Operational/Tactical planner, design/architecture and operations subject matter expert. Industry/Military qualifications are: Pentagon N2/N6 Designated Technical Warrant Holder (TWH)/Technical Area Expert (TAE) Command Functional Security Control Assessor (FSCA) Liaison for Naval Sea Systems Command; Fully Qualified Navy Validator (certification # I0836); Risk Management Framework (RMF) Navy Qualified Validator (NQV) II (certification # I00075); Certified Chief Information Security Officer (certification # CC-WS-731); Industrial Control Systems Cyber Security SME – U.S. Department of Homeland Security; Security
+; NAVSEA Lean Six Sigma Green Belt/SPAWAR Systems Center Pacific (SSC PAC) Lean Six Sigma Yellow Belt; Logistics; Qualified Contracting Officer's Representative (COR)/ Technical Point Of Contact (TPOC) and Member of the Defense Acquisition Corps and Defense Acquisition Workforce Improvement Act (DAWIA) Level III Acquisition Certification in Information Technology/Engineering & Technical Management (ETM) Practitioner. Master’s Degree in Telecommunications Management
University of Maryland Global Campus
Master’s Degree in Business Administration
University of Maryland Global Campus
Bachelor Degree in Information System Management
University of Maryland Global Campus
Attending Naval Postgraduate School to obtain Cyber Security Fundamentals certificate. Military Colleges Attended:
• Defense Acquisition University, San Diego, CA
• Naval War College, Newport, RI; Maritime Staff Operators Course
• Joint Forces Staff College, Norfolk, VA; Joint Command, Control, Communication, Computer, and Intelligence/Reconnaissance Staff Operations (JC5ISRSOC) Staff and Operations course
• National Defense University, Washington, DC; North Atlantic Treaty Organization (NATO) Staff Officer
• Navy and Marine Corps Intelligence Training Center (NMITC), Hampton Roads VA Civilian Awards: Received Department of the Navy Meritorious Civilian Service Medal for Cybersecurity and Civilian Service Achievement Medal for supporting Australia/United Kingdom/United States (AUKUS) trilateral submarine partnership.
U.S. Navy Military Service Information: (retired Disabled Vet/Honorable Discharge) – N2/N6 Limited Duty Officer (LDO Mustang)/Information Professional/Information Warfare Officer (Highest enlisted rank was E8)
Military Awards/Decorations: Information Warfare Pin; Enlisted Surface Warfare Specialist Pin; Enlisted Air Warfare Specialist Pin; Meritorious Service Medal; Joint Service Commendation Medal; Navy and Marine Corps Commendation Medal; Joint Service Achievement Medal; Navy and Marine Corps Achievement Medal; Armed Forces Expeditionary Medal; Global War on Terrorism Expeditionary/Service Medals; Joint Meritorious Unit William Smiley – 308-***-**** Page 2
Award Medal; Navy Meritorious Unit Commendation and various other medals/unit/campaign awards and numerous Flag letters of commendation.
PROFESSIONAL EXPERIENCE: (Held Top Secret/SCI SSBI – Current Top Secret) EmployerOfChoice Contractor Experience:
07/2023 – Present: Senior Director, Business Development & Gov’t Relations for U.S. Space Command, Intelligence Community (IC), Navy, USMC, Army, SOCOM and USCG: Technica, Dulles VA (40hr+ work week)
• Responsible for finding, shaping, and collaborating near-term/long-term with the U.S. Navy, USMC, U.S. Army, U.S. Space Command, Intelligence Community (IC), SOCOM, U.S. Coast Guard and related DoD Cybersecurity, engineering and digital transformation stakeholders with a focus on Other Transaction Agreement/Authority (OTA’s) and other non-traditional Request for Proposal (RFP) options. To include traditional business practices and methodologies.
Key Responsibilities:
• Utilizing my extensive knowledge of government contracting and acquisition practices to direct business development activities within the U.S. Space Command, Intelligence Community (IC), Navy, USMC, Army, SOCOM and USCG.
• Develop and execute customer penetration strategies and individual opportunity win strategies, account plans, and partnering strategies to achieve aggressive business growth within 2-3 years.
• Generate and maintain extensive knowledge of current developments within the U.S. Space Command, Intelligence Community (IC), Navy, USMC, Army, SOCOM, USCG and related DoD Cyber offices to assess current and upcoming needs and to identify and qualify opportunities.
• Gather actionable market intelligence through researching prospective accounts in target markets.
• Develop leads and move them through the sales cycle.
• Provide feedback and recommendations for our Innovations Research & Development (R&D) organization on Artificial Intelligence Operations (AIOPs) and Cyber Operations Capability and Services development and refinement based on named requirements in target markets.
• Capture complex services contracts meeting or exceeding financial targets.
• Develop value propositions through program strategies, supporting business cases and project plans.
• Develop early win strategies and evolve the strategy throughout the capture lifecycle.
• Built key vendor, supplier and partner alliances by collaborating on how strategically to bring new products/solutions/capabilities into the company’s portfolio.
• Sought after expert for implementing/supporting/managing Knowledge Management initiatives and efforts across all company processes to capture tacit and explicit knowledge to help balance technology, information, processes within the organization shared values to maintain a sustainable competitive advantage.
• Maintain and foster territory relationships with key partners and Original Equipment Manufacturers (OEM).
• Write complete and concise competitive bid analyses for executive management review. 04/2017-01/2018: Cybersecurity Program Manager: TM3 Solutions, Inc. Alexandria VA (40hr+ work week)
• Responsible for the NAVSEA 00I Ech II Cyber Security Validation Review Support Services. This includes providing cybersecurity (CS) support activities for post validation review of Assessment and Authorization
(A&A) and Certification and Accreditation (C&A) packages for Naval Sea Systems Command (NAVSEA) enterprises using the Risk Management Framework (RMF) and the Department of Defense (DoD) Information Assurance Certification & Accreditation Process (DIACAP). i.e. PIT AFLOAT, PIT ASHORE, RDT&E, IATT and Defense Business Systems (DBS).
• Key Role - NAVSEA 00I Functional Security Control Assessor (FSCA) Liaison responsible for providing all accreditation type packages to the Functional Authorizing Official (FAO) Commander NAVSEA Command/Functional Security Control Assessor Chief Engineer (CHENG) / FAO CSA - Technical Warrant William Smiley – 308-***-**** Page 3
Holder (TWH) NAVSEA Command and the Navy Authorizing Official (NAO) U.S Fleet Cyber Command (U.S. Tenth Fleet) for approvals.
• Provided subject matter expertise in IA life cycle management and sustainment.
• Selected as the TM3 overall company Program Manager of the year for 2017.
• Coordinated/Submitted/Presented Risk Management Framework (RMF) accreditation package(s) risk and authorization Objective Quality of Evidence to the Functional Security Control Assessor (FSCA) and the Functional Authorizing Official (senior level SESs and Admirals) for signature/approval.
• Managed 10 IA/CYBER Security TM3 contractor support staff members supporting the NAVSEA 00I Ech II contract.
10/2016-4/2017: Senior Cybersecurity Engineer/Knowledge Manager: GRYPHON Technologies, Washington DC (40hr+ work week)
• Responsible for serving as the primary technical subject matter expert in CYBER Security to include the following subsets: Combat Systems Integration, software integration, physical security, Weapon System Explosives Safety Review Board (WSERB) process, Test & Evaluation, COMSEC, TRANSEC, OPSEC, NETSEC, Cross Domain Solutions and Hull, Mechanical & Electrical (HM&E).
• Provided systems engineering and technical aid to ensure that cybersecurity is properly addressed in system acquisition documents such as System Specifications, Analysis of Alternatives (AoAs), Program Protection Plans
(PPPs), Test and Evaluation Master Plans (TEMPs) Annex G, CYBER Security Strategy, Systems Engineering Plans (SEPs), etc.
• Provided guidance in the implementation of the following CYBER requirements: Task Force CYBER Awakening
(TFCA), Naval Ship Technical Manual (NSTM) Cybersecurity Operations, CYBER Security Functional Requirements Document (FRD), Security Classification Guide, Office of the Secretary of Defense Deputy Assistant Secretary of Defense Developmental Test & Evaluation (DT&E) and Operational Test and Evaluation Force (OT&E) CYBER security requirements, NAVSEA PIT-Control Systems Cybersecurity Implementation Manual (NAVSEA 9400.2-M), CYBERSAFE Policy and Guidance, IA/TA Defense-in-Depth Functional Implementation Architecture (DFIA) and IA/TA Standards Implementation Guide (This is replacing the “Best Practices” but is currently in the review process).
• Sought after expert for implementing/supporting/managing Knowledge Management initiatives and efforts across all company processes to capture tacit and explicit knowledge to help balance technology, information, processes within the organization shared values to maintain a sustainable competitive advantage.
• Provided strategic, forward-looking vision to ensure technology alignment within business vision. 02/2011 to 07/2011: Lead Systems Engineer and Knowledge Manager: Information Technology Division, Department of the Navy - Assistant for Administration (DoN/AA)/Secretary of the Navy (SECNAV), Pentagon, Washington DC (40hr+ work week)
• In charge of all Maintenance, repair, and operations (MRO) for organization.
• Wrote/Implemented Data Center Mitigation Plan for future growth to include configuration management plan.
• Possess a combination of technical knowledge and analysis skills to fuse together information from various sources to offer the DON AA Director and Program Manager clear/precise guidance on pertinent issues.
• Duties included network target development, software analysis and development, solid management skills, showed ability in leading and mentoring individuals, maximizing levels of productivity, while performing in dynamic team environments.
• Superior analytical and critical thinking skills and work well under pressure.
• In-depth background in LANs/WANs, Internet technology, experience in routing and network protocols
(especially TCP/IP).
• Maintained required documents for Certification and Accreditation Programs and the Systems Security Authorization Agreement for the Department Administration (DON/AA)/ Secretary of the Navy (SECNAV) network and its continued support of the Navy Assistant for operations.
• Wrote Configuration plan for Developing Test Environment Build Plan, New Server Cluster Build, Implementing new Reverse Proxy Cluster etc.
William Smiley – 308-***-**** Page 4
• Assistant Chairperson of Data Systems Change Control Board (CCB) for all software/hardware installations/procurement.
• Wrote risk mitigation/analysis/security policies and procedures.
• Managed 36 production servers and 36 non-production servers using Windows and Linux operating environments.
• Managed 2 Systems, 5 System Administrators and 1 Database Administrator. Civilian Government Experience:
09/2022- 07/2023: 1043 Cybersecurity Branch Head/Command Information Systems Security Manager/Chief Information Security Officer/Cybersecurity Work Force Program Manager and Technical Point of Contact for Command Cybersecurity Contractor Support (NT-2210-5/6): Bethesda, MD (40hr+ work week)
• Responsible for all Cybersecurity requirements for NSWC Carderock. This includes providing cybersecurity
(CS) support activities for post validation review of Assessment and Authorization (A&A) and Certification and Accreditation (C&A) packages for Naval Sea Systems Command (NAVSEA) enterprises using the Risk Management Framework (RMF) and the Department of Defense (DoD) Information Assurance Certification & Accreditation Process (DIACAP). i.e. PIT CLOUD implementation/architecture, AFLOAT, PIT ASHORE, Research, Development Test & Evaluation (RDT&E)/IATT, TEMPALTs/ECIs and Defense Business Systems
(DBS).
• Designated Naval Sea Systems Command Functional Security Control Assessor (FSCA) Liaison directly supporting the Functional Security Control Assessor Chief Engineer (CHENG) by addressing all Risk related items in all accreditation type packages that go to the Functional Authorizing Official (FAO) Commander NAVSEA Command and the Navy Authorizing Official (NAO) U.S Fleet Cyber Command (U.S. Tenth Fleet) for approvals. Additionally, in this role, I manage the interface with PMs, Information System Owners, Program Executive Offices and NAVSEA Directorate Lead ISSMs.
• Appointed Technical Warrant Holder (TWH)/Technical Area Expert (TAE) for Naval Sea Systems Command. Appointment provides authority to approve and sign by direction on behalf of the FSCA (CHENG). Responsibilities include ensuring conformance with the Cybersecurity TA cybersecurity policy, requirements, architectures, and standards throughout NAVSEA; implement and ensure RMF cybersecurity assessment oversight and standardization for NAVSEA assigned areas of responsibility and systems; work in conjunction with Navy Naval Information Warfare Systems Command (NAVWAR formerly known as SPAWAR) security control assessor (SCA) and NAVWAR Cybersecurity TA to report relevant RMF security control assessment products; provide technical expertise to ensure all RMF tasks are initiated and completed, with appropriate documentation, for assigned systems as well as reviewing of assigned RMF technical documents; Apprise the cybersecurity DWO in a timely manner of significant engineering and TA issues, including technical disagreements that cannot be resolved with other TWHs or with programmatic authorities; ensured and graded Navy qualified validators that have been approved by the Cybersecurity TA etc.
• My responsibilities as the Certified Chief Information Security Officer (CCISO) were to educate, brief, report to and guide C-Level executives (SES’s/Admirals/Generals/Executive Leadership boards or equivalent) on how to establish, implement, maintain, understand and integrate DoD cybersecurity level compliance guidance/policies for the current and future operational network enterprise vision program requirements to ensure warfighter’s have an information warfare strategic advantage over adversaries by ensuring all information assets and technologies were adequately protected.
• As the (CCISO), subject matter expert, I used five critical enterprise domain criteria as a foundational baseline for ensuring a successful security plan was put in place that met business goals/needs. Additionally, overseeing the staff that researched, verified, confirmed, developed, and built the command enterprise architecture my focus was to ensure that I mentored, trained, and provided resources to my team to maintain and sustained the highest security posture level to meet all organizational branches requirements.
• Governance, Risk, Compliance – Developed and implemented secure processes and systems used to prevent, detect, mitigate, and recover from cyberattacks. Implementing and managing the cyber governance, risk, and compliance (GRC) process.
William Smiley – 308-***-**** Page 5
• Information Security Controls and Audit Management – Implemented controls, forensics analysis and audit capabilities.
• Security Program Management & Operations - Continuously evaluating and managing the cyber and technology risk posture of the organization.
• Information Security Core Competencies - Building and driving a cybersecurity strategy and framework, with initiatives to secure the organization's cyber and technology assets.
• Strategic Planning, Finance, Procurement, and Third-Party Management - justifying, and evaluating cybersecurity investments Leading cybersecurity operations and implementing disaster recovery protocols and business continuity/incident response plans with business resilience in mind.
• Received command wide recognition for my NSWC Carderock command support in the Cybersecurity arena by having a Perspectives publication article written on me in the command Wavelets Online April/May 2023 newspaper.
• Manage 6 government and 13 contractor support staff. 05/2020-09/2022: Team SUBS Director of Information technology/Deputy Director of Cybersecurity/Activity Chief Information Officer (ACIO)/Information System Security Manager (ISSM)/Knowledge Manager
(KM)/Certified Chief Information Security Officer (CCISO) and Activity Security Manager (Lead IT Project Security Manager NH-2210-4): Program Executive Office (PEO) Submarines, Washington Navy Yard, Washington DC (40hr+ work week)
• Responsible for all Cybersecurity requirements for Team Submarine (Team SUBS) which is a combination of the Program Executive Office, Attack Submarines (PEO SSN formerly PEO SUB), Program Executive Office, Undersea Warfare Systems (PEO UWS formerly the Deputy Commander, Undersea Warfare (NAVSEA 07) and the Undersea Technology Officer (NAVSEA 073)) and Program Executive Office, Strategic SUBS (PEO SSBN formerly PEO CLB). This includes providing cybersecurity (CS) support activities for post validation review of Assessment and Authorization (A&A) and Certification and Accreditation (C&A) packages for Naval Sea Systems Command (NAVSEA) enterprises using the Risk Management Framework (RMF) and the Department of Defense (DoD) Information Assurance Certification & Accreditation Process (DIACAP). i.e. PIT AFLOAT, PIT ASHORE, Research, Development Test & Evaluation (RDT&E)/IATT, TEMPALTs/ECIs and Defense Business Systems (DBS).
• Hand selected by Senior Leadership (SES’s/Admiral’s) to extend my current duties to become the Team SUBS organization Activity Chief Information Officer/Activity Security Manager.
• Other key duties were being the Command Information Systems Security Manager for Team SUBS
(TSUBS) Chief Information Officer for all enterprise and DBS systems and TSUB Career Field Manager
(CFM) for all Information Technology (IT) Naval Acquisition Development Program (NADP) interns.
• As the Team SUBS Program Security Manager, I was responsible for the DoD Information Security Program for the command which I oversaw and conducted numerous system and physical security evaluations, audits, reviews, program monitoring/reporting for over 50+ Team SYBS IT DADMS-DITPR DON portfolios that monitored assigned project/program progress and reported back to COMNAVIFOR Fleet FAM Analysis Working Group and N2N6 Pentagon representatives for adjudicating System/Program Level Purchases, Policy Planning, Network Services, Enterprise Architecture, Data Management, IT security, Systems Analysis, Systems Administration, Applications Software, IT contracts (contributed in reducing Total Ownership Costs
(TOC) both internal direct and overhead NAVSEA Warfare Center Costs), Customer support, VTC operations, SIPR Token issuance, PERSEC, INFOSEC, Data Spillage, Property Passes, Visitor Requests, Defense Information System for Security (DISS – clearance validation) and Operating Systems.
• Hand selected to take part in two Cyber Tabletop (CTT) / IA TA Tabletop Mission Cyber Risk Assessment
(TMCRA) in support of program risk analysis for accreditation approval.
• Direct liaison to numerous organizational and external CYBER Scientific and Technical Intelligence Liaison Officer’s (STILO) collaborating on ways to introduce Cyber intelligence into risks assessments.
• Direct Liaison to DON CIO, NAVWAR, ONI, NIA, NSA, NAVAIR, NAVFAC, SSP, Fleet Cyber Command, SUBPAC, SUBLANT, CFFC, and NAVSEA CIO for all submarine tactical systems. Ensured synergistic relationships are forged and kept between these organizations and multiple other program offices and Program Executive Offices within NAVSEA. Represented TEAMSUB on all matters pertinent to assigned projects. William Smiley – 308-***-**** Page 6
• Appointed Naval Sea Systems Command Functional Security Control Assessor (FSCA) Liaison and Designated Technical Warrant Holder (TWH)/Technical Area Expert (TAE) for Naval Sea Systems Command. Appointment also provides authority to approve and sign by direction on behalf of the FSCA (CHENG).
• Coordinated/Submitted/Presented Risk Management Framework (RMF) accreditation package(s) risk and authorization Objective Quality of Evidence to the Functional Security Control Assessor (FSCA) and the Functional Authorizing Official (senior level SESs and Admirals) for signature/approval.
• Sought after expert for implementing/supporting/managing Knowledge Management initiatives and efforts across all company processes to capture tacit and explicit knowledge to help balance technology, information, processes within the organization shared values to maintain a sustainable competitive advantage.
• Provided critical support to the NAVSEA command 2022 Naval Information Warfare Systems Command (NAVWAR formerly known as SPAWAR) FSCA AUDIT.
• Managed 17 government and 48 contractor support staff. 01/2018-05/2020: Cybersecurity/Information Technology Specialist and Knowledge Manager (IT SPECIALIST INFOSEC NT- 2210-06): Commander Naval Sea Systems Command (NAVSEA), Washington Navy Yard, Washington DC (40hr+ work week)
• Responsible for the NAVSEA 00I Ech II Cyber Security Validation Review Support Services. This includes providing cybersecurity (CS) support activities for post validation review of Assessment and Authorization
(A&A) and Certification and Accreditation (C&A) packages for Naval Sea Systems Command (NAVSEA) enterprises using the Risk Management Framework (RMF) and the Department of Defense (DoD) Information Assurance Certification & Accreditation Process (DIACAP). i.e. PIT AFLOAT, PIT ASHORE, RDT&E/IATT, TEMPALTs and Defense Business Systems (DBS).
• Designated Naval Sea Systems Command Functional Security Control Assessor (FSCA) Liaison directly supporting the Functional Security Control Assessor Chief Engineer (CHENG) by addressing all Risk related items in all accreditation type packages that go to the Functional Authorizing Official (FAO) Commander NAVSEA Command and the Navy Authorizing Official (NAO) U.S Fleet Cyber Command (U.S. Tenth Fleet) for approvals. Additionally, in this role, I was the direct interface to the PMs, Information System Owners, Program Executive Offices and NAVSEA Directorate Lead ISSMs.
• Wrote and provided Functional Security Control Assessor (FSCA) Technical Area Expert (TAE) Technical Warrant Holder (TWH) subject matter expertise to the first ever Memorandum of Understanding between Commander, Naval Sea Systems Command (NAVSEA) and the Director of Naval Intelligence Agency (NIA) in October 2019 good for 9 years.
• Designated Warrant Holder (TWH)/Technical Area Expert (TAE) for Naval Sea Systems Command. Hand selected to be the NAVSEA Lead for the command 2018 SPAWAR FSCA AUDIT.
• Trained/Mentored NAVSEA engineers in the application of the Risk Management Framework and NAVSEA FAO/FSCA approval process to include understanding what artifacts are needed for accreditation.
• Sought after expert for implementing/supporting/managing Knowledge Management initiatives and efforts across all company processes to capture tacit and explicit knowledge to help balance technology, information, processes within the organization shared values to maintain a sustainable competitive advantage.
• Provided subject matter expertise in IA life cycle management and sustainment.
• Coordinated/Submitted/Presented Risk Management Framework (RMF) accreditation package(s) risk and authorization Objective Quality of Evidence to the Functional Security Control Assessor (FSCA) and the Functional Authorizing Official (senior level SESs and Admirals) for signature/approval.
• Managed 2 government employees and 11 contractors. 09/2015-10/2016: Director of Cybersecurity/Certified Chief Information Security Officer/Knowledge Manager/Cybersecurity/Information Security and Information Systems Security Manager (IT SPECIALIST INFOSEC NT-2210-05/06): COMMANDER, Naval Sea Systems Command/PEO SHIPS Washington Navy Yard, District of Columbia, DC (40hr+ work week)
• Direct liaison to National Security Agency (NSA), Navy Cross Domain Solution Office (NCDSO), U.S. Fleet Cyber Command/U.S TENTH Fleet Office of Designated Approving Authority (ODAA)/Navy Authorizing William Smiley – 308-***-**** Page 7
Official (NAO), U.S. Fleet Forces (USFF), Navy Information Operations Command (NIOC) Norfolk/San Diego, Navy Cyber Defense Operations Command (NCDOC), Defense Security Service, (DSS), National Cyber Range, Commander Naval Surface Force (CNSP)/U.S. Pacific Fleet, Naval Information Forces (NAVIFOR), Deputy Assistant Secretary of Defense for Developmental Test and Evaluation (DASD DT&E), Office of Naval Intelligence (ONI), Chief of Naval Operations (CNO), Commander Operational Test and Evaluation Force
(OPTEVFOR OT&E), Office of the Secretary of Defense (OSD), General Dynamics, Bath Iron Works (BIW), Raytheon, Unified Cross Domain Management Office, Office of Naval Research (ONR), Space and Naval Warfare Systems Command (SPAWAR) and numerous other senior level military/industry officials.
• Served as the Director of Cybersecurity to the DDG 1000 Major Program Manager (MPM/PMS 500 NAVSEA) on all CYBER Security issues (three ships with crews, 1 shipyard and four+ Labs). Hand selected for current position as the designated Program Information Systems Security Manager (ISSM) for the entire DDG 1000 Zumwalt Class Destroyers program.
• Coordinated/Provided critical DDG 1000 CYBER security input to the following required OSD level documents: Test and Evaluation Master Plan (TEMP), Program Protection Plan (PPP) and the Cyber security strategy.
• DDG 1000 subject matter expert for Criticality Analysis/Assessment reports to the Damage Assessment Management Office (DAMO).
• Direct program representative in charge of conducting the Office of the Secretary of Defense (OSD) Triage review for both Program Damage Assessment Management Office (DAMO) program CNO taskers. This included working with the Defense Cyber Crime Center (DC3) lab Program inquiry/review. The first DAMO/OSD tasker was completed 3-30-16 with ASN RDA, DASN RDT&E concurrence.
• Mentored/Guided/Trained/Lead/Gave technical assistance to all 70+ program PARMS, BIW, SHIPSUP Bath, SPAWAR, NAVAIR, NAVSEA, Raytheon, ship crew and program labs on what CYBER Security is and how current CYBER policy changes from SECNAV/OPNAV/OSD (DASD)/OPTEVFOR, CYBER Safe etc. affects them and the program. All entities reported to me.
• Updated/Re-wrote DDG 1000 Program Protection Plan to resolve/complete program CNO tasker which needed ASN RDA, DASN RDT&E and OPNAV N2/N6 concurrence on.
• Managed over 70+ Program Acquisition Resource Manager’s (PARMS) and 3 direct CYBER security contractors support staff members for the DDG 1000 program. 07/2011-09/2015: Certified Chief Information Security Officer/Cybersecurity/Knowledge Manager and Program Information Systems Security Manager (P-ISSM) (IT SPECIALIST INFOSEC NO-2210-05): Space and Naval Warfare (SPAWAR) Pacific Command Information Assurance (IA) Division Key Management Architecture & Information Systems Code 58120, San Diego CA (40hr+ work week)
• Direct liaison to NSA, NCDSO, U.S. Fleet Cyber Command/U.S TENTH Fleet ODAA/NAO, USFF, NIOC Norfolk/San Diego, NCDOC, National Cyber Range, CNSP/U.S. Pacific, and numerous other senior level military/industry officials.
• Designated Program Information Assurance Manager (IAM) for the entire DDG 1000 Zumwalt Class Destroyers program. Served as the primary CYBER security advisor to the DDG 1000 Major Program Manager (MPM/PMS 500 NAVSEA) on all CYBER Security issues (three ships with crews, 1 shipyard and four+ Labs).
• My responsibilities as the Certified Chief Information Security Officer (CCISO) were to educate, brief, report to and guide C-Level executives (SES’s/Admirals/Generals/Executive Leadership boards or equivalent) on how to establish, implement, maintain, understand and integrate DoD cybersecurity level compliance guidance/policies for the current and future operational network enterprise vision program requirements to ensure warfighter’s have an information warfare strategic advantage over adversaries by ensuring all information assets and technologies were adequately protected.
• DDG 1000 subject matter expert for Criticality Analysis/Assessment to the Damage Assessment Management Office.
• Developed reporting procedures to ensure security violations and incidents are properly reported to the Computer Network Defense Service Provider Office (CNDSPO), Navy Cyber Defense Operations Command (NCDOC) and the DoD reporting chain, as needed. This also includes monitoring and implementation of security guidance, William Smiley – 308-***-**** Page 8
coordinating and directing actions proper to remedy security deficiencies, and following procedures set forth in accordance with applicable guidance regarding reporting of electronic spillage of classified information.
• Provided IA/CYBER/Crypto support to the Unmanned Carrier Launched Airborne Surveillance and Strike
(UCLASS).
• Provided Information Assurance