Post Job Free
Sign in

Team Member Project Manager

Location:
San Diego, CA, 92101
Salary:
140,000
Posted:
March 05, 2025

Contact this candidate

Resume:

JOHN "NICO" JOHNSON

Email: ************@*****.***

LinkedIn: https://www.linkedin.com/in/nico-johnson-n8v/

EXPERIENCE/INFORMATION

I hold an expired Top Secret (TS) clearance, which can be reinstated with a sponsoring organization.

OSHA Maritime Shipyard Employment Card (SE1028423)

CompTIA Security + (COMP001020186864 – Expired) also a Certified Fiber Optics Installer.

Over ten (10) years of extensive firsthand experience in network engineering, Windows/Linux/Cisco

systems administration, trouble shooting, and repair.

Technical/Senior Lead as an Information Security (IS) Subject Matter Expert (SME) with more than 8 years of experience managing, supporting, patching, backing up, and restoring VMWare vCenter & Horizon View environments within DoD.

C4ISR system support engineer maintaining command and control post with an internet connection, servers, and workstations that interface with nearby ground vehicles, aircraft, and ground forces gathering information about the given Area of Operations of C4ISR, Cyber, Electronic Warfare, Radar, Communications, and Networking.

Product support in the areas. Establish regular updates and report to stakeholders on progress, potential risks, and project adjustments, ensuring client satisfaction and alignment with federal agency needs.

Proof Point / Carbon Black (VMware) experience with configuration, implementation, and Malware Analysis. VMware – EXi 4.0, EXi 5.5, VMware NSX for vSphere 6.4.7 5.5 including Hypervisor, VSan, VCOPS, VRO, and Aria.

Experience managing Rubrik and Cohesity for threat identification, and containment.

Ensure the privacy and security of PHI (Protected Health Information) as outlined in policies and procedures relating to HIPAA compliance.

Detailed requests for information on cyber best practices to include conducting risk assessments for specialized devices. Experience in mitigating cybersecurity risks, understanding to apply policies.

Support ATO activities for Risk Management Framework (RMF) steps 0-6.

Over 13 years of active duty in the United States Navy, Submarine Force / 8 years Naval Reserves.

Formal lead to manage/mentor other Engineers, Systems engineers/admins, coordinate activities with Enterprise Architects, Application development, service delivery to and from project teams.

Familiar with Naval Shipyard Environment including U.S. Navy Work Authorization Forms (WAF) and Tag-Out Programs.

PC platform experience with extensive knowledge of Microsoft Office suit- Microsoft Word, Excel,

Access, PowerPoint, Visio, Outlook including Outlook Express.

Operating Systems experience – Windows 7, 10, 2003, XP, Windows Server, Linux, Unix, MS DOS.

Windows Server 2008/2012, Microsoft Exchange, and Active Directory experience.

Experience with Cisco routers, Cisco switches, MPLS, TCP/IP, SMTP, SNMP including 802.11x wireless communications including Python, Redhat Linux, SQL, and Splunk experience.

Zscaler Internet Access v5.7 and Palo Alto Firewall configuration and integration (Version 9.0).

Web applications like Apache and experience with IBM Blade servers and HP SANs.

Implemented corrective actions as necessary, escalating issues and collaborating with stakeholders for timely solutions.

Cybersecurity Governance Risk and Compliance (GRC) including ServiceNow, LDAP, DNS, BASH, Tenable, Splunk experience.

Networking technology on Windows/Linux servers, Windows 10, Palo Alto Firewall and Prisma Access Office 365/Azure, AWS (EC2, ALB, WAF) and Azure AD, Cloud, and direct connect.

Experience with Model-Based Systems Engineering (MBSE), Scrum methodology with the AGILE

processes in the format of sprint work weeks.

Installation and troubleshooting of HVAC controls and automation systems (Johnson Controls).

Experience with Ansible (Python) and Puppet (Ruby) configuration management tools (CM Tools).

8+ years of Product Management experience - responsible for the overall success of the business’s products and outputs, shaping the vision of each feature that helps the company meet their goals for the end clients.

Experienced in planning an appropriate business continuity and disaster recovery (BCDR) strategy to help protect against both unplanned and planned failures.

WORK HISTORY

Children’s Hospital of Orange County (CHOC) · Full-time Remote

November 2023 – March 2024

Remote Work – Orange County

Information Security Department (ISD)

1201 W La Veta Avenue

Orange, California 92868

(760) 877- 0875

Information Security Engineer

Staying current with emerging threats and industry trends relating to information security Contributes to risk-based analysis of IT infrastructure, IT systems, and external services.

Larger scale responsibilities include building a playbook to automate and condense tools being utilized.

Lead the certification and accreditation efforts by implementing NIST 800-53 security controls to obtain FISMA compliance.

Implement a manage endpoint encryption solution to secure workstations and network assets against sensitive data loss.

Develop detailed project plans, defining scope, budgets, schedules, with critical milestones.

Conduct Java algorithm design reviews and resolve any design issues.

Auto-mate manual queries and integration using WhiteHat, API's with PERL and Java.

Update ACAS plugins weekly or when updates become available on the DISA provide website.

Provide governance assistance in areas of compliance such as HIPAA, PCI, and SOX.

Support VA-EHT activities to include ISO review of deliverables before submitting to VA QA for review.

Task with the creation of virtual machines, monitoring of resources and configuration of VMware networks.

Function as domain expert for all Unix, security, and networking technical support issues requiring escalation.

Provide security management, guidance, and technical support for Unix, NT, network devices and anti-virus.

Perform DLP server scanning-analysis of PCI/PHI data resting on hospital servers and report findings to the risk assessment group.

Utilize SIEM, logging, and packet tracer applications to retrieve correlate and archive information to resolve various incident relate tickets.

Install, configure, and maintain VMware Linux systems, LDAP server, repository servers and applications security plans and server configuration.

Install and configure Splunk log management solution.

Unemployed – Bereavement Period

June – October 2023

Greater San Diego Area

Took a compassionate leave following the loss of a close family member. During this time, focused on personal reflection and supporting family, while gradually reintegrating into professional activities. This period allowed for emotional recovery and reinforced a deepened commitment to work-life balance and resilience.

Palomar Health – Cyber Security Engineer

February – May 2023 (40+ per week)

Greater San Diego Area

Palomar Health IT

975 South Andreasen Drive

Escondido, CA 92029

(760) 877- 0875

VMware Proof Point Experience

Develop/maintain Proofpoint's cloud-based security products/services for Palomar Health (PH).

Collaborate with cross-functional teams to deliver security configurations.

Participate in design reviews to ensure software meets quality standards for PH.

Stay up to date with emerging technologies and recommend ways to incorporate best practices for PH.

Provide exceptional customer service and technical support/collaboration to PH.

Collaborate with cross-functional teams to identify and resolve issues.

Completed Proofpoint Training Modules to support PH.

Cyber Security Engineer

Document and escalate issues to the appropriate support teams.

Participate in the development of customer-facing documentation and training materials.

Provide technical expertise and guidance to Palomar Health

Monitor and analyze network traffic and security event data to identify potential security threats.

Investigate security incidents and provide recommendations for remediation.

Collaborate with cross-functional teams to develop and implement security best practices.

Participate in security assessments and audits.

Stay up to date with emerging security threats and recommend ways to mitigate them.

I am a highly skilled and experienced Cyber Security Engineer team member.

Responsibilities for designing, implementing, and maintaining the security of our information systems and networks.

Monitoring and analyzing security events, developing, and implementing security policies and procedures, and working with cross-functional teams to ensure the confidentiality, integrity, and availability of data.

Supporting Endpoint Security Solutions (ESS) agents.

Unemployed - Bereavement Break

July 2022 - February 2023 · Nine (9) Months

San Diego Metropolitan Area

Program Manager – Risk Management Framework (RMF)

December 2021– July 2022 (40+ hours per week)

Cinteot, INC.

77 North 3rd Street

Suite #101

Chambersburg, PA. 17201

717-***-****

On-site Government Location: U.S. Army Installation - Schofield Barracks

673 Ayres Avenue

Oahu, Hawaii 96857

Senior Lead as an Information Security (IS) subject matter expert (SME).

Led the full lifecycle of federal projects, managing planning to execution, and ensuring alignment with client objectives, timelines, and budgets.

Support the Assessment and Authorization (A&A) processes and Information Assurance documentation for multiple analytic and mission systems across all CLINs.

Generate and maintain the complete security Body of Evidence (BoE) while leading the A&A activities according to the Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, and NIST 800-53) for all multiple information systems.

Prepare reports and action plans (in the event) that a security breach does occur.

Experience with Ansible (Python) and Puppet (Ruby) configuration management tools (CM Tools).

Monitored and managed key performance indicators (KPIs) across project budgets, scheduling, scope control, and overall project quality.

Experience creating and managing the plan of action and milestones (POA&Ms), working with project managers and engineers to develop schedules and engineering actions that mitigate open findings.

Experience supporting the Continuous Monitoring of operational systems; experience monitoring and auditing operational systems for proper use.

Supporting Assessment and Authorization (A&A) and information assurance processes and documentation using RMF.

Experience with Ansible (Python) and Puppet (Ruby) configuration management tools (CM Tools).

eMASS experience, and VMWare experience.

Experience with managing complex system records in the Enterprise Mission Assurance Support Service (eMASS) tool.

Experience with supporting system Authority to Operate (ATO) processes and creating artifacts, control implementation details, and POAMs.

Experience with Information Security Continuous Monitoring (ISCM), RMF automation, and Comply to Connect.

Experience with National Institute of Standards and Technology (NIST) security controls, the Governance, Risk Management, and Compliance (GRC) security documentation tool, Risk Management Framework (RMF), and security compliance processes.

Experience with implementing and verifying Security Technical Implementation Guides (STIG’s),

Experience with implementing and verifying Nessus (Tenable product) and Security Content Automation Protocol (SCAP) (DISA Product) scans.

Experience with Ansible (Python) and Puppet (Ruby) configuration management tools (CM Tools).

Program Manager - Information Systems Security Manager (ISSM)

October – December 2021 (40+ hours per week)

Softworld INC.

295 Madison Avenue

New York, NY 10017

Office: 617-***-****

On-site Government Location: BAE Systems (UK)

10920 Technology Place

San Diego, California 92127

Acted as the primary point of contact for federal clients, ensuring effective, continuous communication throughout project lifecycles.

Experience with auditing and certifying compliance of various systems (Windows, Linux, Network Devices, and peripherals)

Development and delivery of IA-related briefings and training materials

Compliance and vulnerability scanning tools (Nessus, SCAP, ACAS)

Preparing for and supporting the execution of an audit/inspection conducted by an external auditor.

Experience with Splunk, ServiceNow, POA&M management, GRC solutions such as RSA Archer.

Experience overseeing the implementation of ISO 9001 and NIST frameworks (NIST SP 800-171 and/or NIST SP 800-53) Security Controls supporting federal security and compliance standards.

Oversaw installations of fiber, network servers, firewalls, security cameras, and associated video management systems (VMS).

Implements and manages Information Systems Security on corporate and government information systems including to monitor cybersecurity compliance by performing periodic self-inspections, tests, and reviews of information systems to ensure that workstations/servers are operating as authorized/accredited and that conditions have not changed.

Develop corrective solutions and maintain associated documentation (to include required reports) as appropriate Coordinate with program/project stakeholders, IA staff, the Facility Security Officer (FSO), Contractor Program Security Officers (CPSOs) and other Security and IT team members to define, implement and maintain an acceptable information systems security posture.

Preparation and maintenance of security Assessment and Authorization documentation (e.g., IA Standard Operating Procedures (SOP), SSP, MSSP, RAR, SCTM).

Experience with implementing and verifying Security Technical Implementation Guides (STIG’s),

Experience with implementing and verifying Nessus (Tenable product) and Security Content Automation Protocol (SCAP) (DISA Product) scans.

Maintain thorough understanding of NIST 800-53 controls, determine controls applicable to the application, and document implementation in Security Controls Traceability Matrix (SCTM).

Ability and experience in Information Technology, system administration and network services.

Experience with Ansible (Python) and Puppet (Ruby) configuration management tools (CM Tools).

Manage projects involving Cisco and Aruba networking equipment (wired and wireless), cybersecurity solutions (including Fortinet).

Analyze, evaluate, develop, implement processes, and systems within budget to time requirements and schedule.

Design and develop products and services using state-of-the-art technology, principles, theories, and concepts.

Program Manager - Information System Owner (ISO)

March - October 2021 (40+ hours per week)

Bravura Information Technology Systems, Inc. (BITS)

210 Research Blvd, Suite 300

Aberdeen, MD 21001

Office: 443-***-****

On-site Government Location: Defense Micro Electronics Activity (DMEA)

4234 54th Street

McClellan Park, California 95652

Responsible for overall procurement, development, integration, modification, operation, maintenance, and disposal of an Information System.

Plan and develop budgetary estimates for security control implementation, assessment, and sustainment throughout the system life cycle, including timely and effective configuration and vulnerability management.

Responsible for the development and maintenance of the System Security Plan (SSP) and every other document required for security Authority to Operate (ATO) with the ability to identify potential impacts to existing ATOs.

Ensures that the system is deployed and operated in accordance with the agreed-upon security controls.

Appoints the program ISSM/ISSO and ISSE (may be the same person).

Select, tailor, and supplement the security controls following organizational guidance, documenting the decisions in the security plan with appropriate rationale for the decisions.

Determine the suitability of common controls for use in the information system.

Determine the need for use restrictions in the information system.

Support the Customer's IT staff, accesses classified and unclassified networks, and enables development functions necessary to address requirements from critical DoD, Special operations, and Intelligence missions.

Work with the information owners (IOs), user representatives, and users to identify project computing requirements, budgetary estimates, and project timelines in coordination with the ISSOs in the IT Branch.

Support Risk Management Framework (RMF) initiatives including the determination of the assurance measures that meet the NIST SP 800-53 minimum assurance requirements selected for the system.

Develop hardware and software life cycle business cases and manage assigned projects within each project’s triple constraints of scope, schedule, and budgetary estimates.

Develop, maintain, and update, and track the System Security Plan (SSP) for assigned Information System (IS) and Platform Information Technology (PIT) Systems.

Ensure that system security engineering standards are used to design, develop, implement, integrate, modify, and assess and evaluate the system architecture in compliance with organizational standards.

Experience with verifying Security Technical Implementation Guides (STIG’s).

Experience with verifying Nessus (Tenable product) and Security Content Automation Protocol (SCAP) (DISA Product) scans.

Experience with Ansible (Python) and Puppet (Ruby) configuration management tools (CM Tools).

Identify media sanitization (clearing, purging, or destroying) and reuse procedures.

Identify processes, procedures, and guidelines for complying with protection requirements (e.g., e-mail labels, media labels, etc.), control procedures incident management reporting, remote access requirements, system management and use of encryption.

Guide the Program Manager/System Manager (PM/SM), the IO, and the Information System Security Manager (ISSM), in preparing the final package needed for the Authorizing Official (AO) to make the authorization decision.

Identify authentication and authorization requirements for users to gain access to systems and data based on assigned privileges and permissions.

Completion of required training, completion of required Systems Authorization Access Request and those users have signed the required Acceptable Use Policy.

Document the tailored and supplemented set of security controls in the security plan in sufficient detail to enable a compliant implementation of the control

Define the continuous monitoring strategy for the information system

Obtain approval for the tailored and supplemented security controls, common controls, compensating controls, use restrictions, and assurance requirements prior to their implementation

Review the security controls periodically and, when necessary, update the security control selections

Maintain and update the System Security Plan (SSP).

*Not Employed due to COVID

January – March 2021

San Diego, California

Program Manager - Senior Cyber Security Engineer (SCSE)

September – December 2020 (40+ hours per week)

Insight Global

401 West A Street

# Unit 2075

San Diego, CA 9210

Office: 619-***-****

On-site Government Location: Science Applications International Corporation (SAIC)

4015 Hancock Street

San Diego, CA 92110

Office: (619) 906 - 5888

Proficiency in network protocol analysis, firewall and related technical protection rule analysis.

Strong logical/critical thinking abilities, especially analyzing existing database layouts, application architectures, schemas and developing a good understanding of the application model.

Manager with excellent interpersonal and customer service skills including the ability to work with Senior government officials.

Knowledge of secure technology implementations such as VPNs, encryption technologies, IPSEC, VLANS, and Wireless technologies.

Maintain an up-to-date database to ensure successful execution and status of projects.

Thorough understanding of the federal rules and regulations that encompass Information Technology governance, including Federal Information Security Management Act of 2002 (FISMA) and the National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) and Special Publication 800 series.

Excellent customer service skills to promote further business and proposed contracts.

Demonstrated ability to work autonomously without supervision.

Work habits which show diligence with database creation and record keeping.

Demonstrated excellence in written communications.

Network Operations Center (NOC) Manager

May - September 2020 (40+ hours per week including foreign travel)

Stratas Corporation LLC - Greater San Diego Area

Corporate Headquarters

3351 Stoneshore Road. Suite #203

Virginia Beach, VA 23452

Office: (757) 672 - 2082

On-site Government Location: Military Sealift Command (MSC) Afloat

Network Operations Center (NOC) San Diego

937 North Harbor Drive Building 1

San Diego, CA 92132

(619) 532 - 3204

Utilized Multiple Monitoring Applications to Insure Availability, Integrity, and Confidentiality

Managed Budgets for Training, Hardware/Software and Employee Compensations.

Implemented Intensive Internal Training and Developed Processes and Procedures to Insure Employee Satisfaction, Efficient Customer Support and Company Savings

Worked with All Support and Managerial Teams to Integrate New Customers and Maintain Current Contracts

Created Disaster Recovery Plans and Reported Significant Events to Customers and Support Staff with Resolutions and Initiative-taking Procedures to Avoid Future Outages.

Developed high-level reports for senior leadership, resulting in increased management visibility of problematic production systems monitored by the NOC and driving strategic problem resolution.

Providing support and maintenance for client's infrastructure, disaster recovery, business continuity, and business applications from small to enterprise level clients.

Directly supervise thirty (30) team members, including a service coordinator, systems engineers, NOC analyst, and Help Desk analyst.

Complete oversight and operational direction and guidance of all support and project related activities.

Create and provide technician user support training related to soft skills, technical skills, processes, and procedures.

Developed team metrics, goals, and project plan to align performance metrics and projects with goals.

Performed data and scheduling analysis to capture and track trends and incidents that drive calls, and increased productivity through schedule and staffing adjustments.

Effective client account management, developing and maintaining relationships, ensuring projects and issues are addressed, and managing branch technical and engineering resources.

Addressed escalated client issues and incidents, and managed systems engineers and architects to complete SOW and other managed services and IT related projects.

Managed critical outages and escalations, and served as client liaison, providing timely summary updates and feedback.

Maintained employee schedules, performed quarterly reviews, disciplinary actions, hiring and training.

Developed metric reporting process to identify accurately patterns within systematic flow of information generated by major incidents to gain valuable insight on client single points of failure and lack of redundancy.

Established cross-functional collaboration teams, providing real-time information related to connectivity among contact centers and other critical business unit areas involved in day-to-day operations.

Senior Cyber Engineer - Team Lead

November 2019 – May 2020 (40+ hours per week including foreign travel)

Integrated Planet Incorporated - Greater San Diego Area

Corporate Headquarters

7582 Las Vegas Boulevard South Suite 1136

Las Vegas, Nevada 89123

619-***-****

On-site Government Location: Commander, Naval Surface Force, U.S. Pacific Fleet

(COMNAVSURFAC)

N67 Cyber Readiness

2841 Rendova Road

San Diego, CA 92155.

Provided Cyber Training regarding Cyber Security including RMF A&A / Cyber Readiness Training and Program Management Posture for all Pacific U.S. Naval ships and shore commands.

Provided Assessment & Authorization (A&A) to Navy Sailors for their information systems.

Provided continuous support of The Navy’s Warfighter C4I systems and software that include. CANES, COMPOSE 3.X, 4.X, ADNS, HBSS including EPolicy Orchestrator GCCS, NIAPS, NTCSS, NSIPS, TMIP, Navy Cash, ARRS, Sailor, and other TYCOM SHIPS platforms.

System Administrator for CMPro, eMASS, ACAS, HBSS (2.0 – 5.0), WSUS, VRAM and expert in re-engineering and manual IAVM risk analysis for shipboard, and expeditionary networks.

Operation of CANES Shipboard Computing Environment, and Operation Rolling Tide (ORT) newer assets in desired.

Public/Private Cloud Architectures to include Network and Storage Infrastructure.

Team Lead (Manager) as a Subject Matter Expert (SME) with documented experience, capabilities, training, and technical certification criteria necessary to perform duties associated with the technical / engineering design.

Experience with implementing and verifying Security Technical Implementation Guides (STIG’s),

Experience with implementing and verifying Nessus (Tenable product) and Security Content Automation Protocol (SCAP) (DISA Product) scans.

Procurement and logistics requirements to support the development, installation, configuration, testing and operational deployment for the Fleet’s Cyber Readiness.

Experience with Ansible (Python) and Puppet (Ruby) configuration management tools (CM Tools).

Technical / Engineering and Training Lab environments to include technical drawings, system specifications, system maintenance, system security requirements, standard operating procedures (SOP’s) and Training System Life Cycle Management.

Manager - Systems Engineer IV Level Four

April 2019 – November 2019 (40+ hours per week)

Joint Tactics and Technologies - Greater San Diego Area

1111 Orange Avenue Suite A

Coronado California, 92118

Office 619-***-**** Fax 619-***-****

On-site Government Location: Naval Information Warfare Center (NIWC) Pacific

49275 Electron Drive

San Diego, California 92152

Manager of thirty personnel Developing, implementing, and providing input to Platform System Operation Verification Tests (SOVTs).

Assisting with creation and implementation of the criteria for acceptance testing and evaluation to the Test and Evaluation (T&E) board as required for review and acceptance.

Providing test planning, document creation and revision, supporting future test requirements for designated test sites for research, development, and integration testing.

Familiarity with JIRA, Confluence, CMPro, GIT/ GITHub/ GITLab SW repositories.

Writing tests and implementing them and familiarity with technical design documents.

Apply knowledge of Information Assurance (IA) policy and procedures to identify security weaknesses, gaps, as well as security improvements to include procedures to plan, design and implement security solutions.

Experience with implementing and verifying Security Technical Implementation Guides (STIG’s),

Experience with implementing and verifying Nessus (Tenable product) and Security Content Automation Protocol (SCAP) (DISA Product) scans.

Assess the impact of Communications Tasking Orders (CTOs) on the system.

Perform/support security planning, assessment, risk analysis, and risk management.

Possess effective communication, presentation, and writing skills.

An excellent record of being an analytical person in a technically challenging environment.

Troubleshoot HBSS, as issues occur, to reduce the impact, identify the root cause, and provide a solution for deployment to the Fleet.

Develop Engineering Change Requests (ECRs) to facilitate modifications to the system baseline and meet with the Configuration Control Board (CCB) from stage 1 until final ECR approval.

Experience using vulnerability scanning tools such as Assured Compliance Assessment Solution (ACAS).

Host Intrusion Prevention Software (HIPS) firewall policy development expertise, IPS and AW policy tuning.

Information Systems Security Engineer (ISSE)

October 2018 – April 2019 (40+ hours per week)

Insight Global - Greater San Diego Area

401 West A Street Suite 2075

San Diego California 92101

619-***-****

On-site Government Location: Perspecta

3970 Sherman Street

San Diego California 92110

Perform system inspections/ audits to identify controls not met and work closely with system engineers/administrators to remediate.

Perform technical security controls assessments and baseline validations to identify vulnerabilities and control deficiencies as part of continuous monitoring program.

Participate in internal / external security audits/inspections to create and maintain Plan of Action and Milestones (POAM) and write A&A documentation and ensure the systems operate in accordance with these security plans.

Interact with technical team members from multi-domain organizations in a diversified team environment.

Formally lead and/or manage/mentor other Security Engineers, Systems engineers, Project Admins to coordinate activities with Engineer Architects, Application developers, and Fleet delivery install teams.

Track and audit all assets across the enterprise and ensure they are compliant, while communicating findings to senior leadership.

Maintains records, outlining required patches/system upgrades that have been accomplished throughout the information system's life cycle.

As a member of the cyber security team, supports the system security design effort, security requirements analysis, and security requirements flow down to the program elements.

Executes or supports the execution of the development of program required security documentation, including items such as security plans, contingency plans, and security tests plans



Contact this candidate