Title Years of Experience
INFORMATION TECHNOLOGY 22 years
Clearance
Tier 5R investigation 182******* Completed on 2019-07-02.
Eligibility Determination: Favorable made on 2019-07-16 by DoD CAF (Pending Adjudication for Top Secret/SCI)
Continuous Evaluation: Continued Enrollment in CE on 2024-06-20
Education
Keller Graduate School of Management, Arlington, VA Spring 2014 – Spring 2016
Master of Science Degree Recipient: Management of Information Systems
Concentration: Information Security
Strayer University, Arlington, VA Fall 2009 – Spring 2011
Bachelor of Science Degree Recipient: Criminal Justice
Concentration: Computer Security/Computer Forensics
US Navy Cryptologic “A” School (CTR), Pensacola, FL Sep 2000 – Jan 2001
Certificate: Cryptologic Technician Collection Analyst
Preston High School, Bronx, NY 1996 – 2000
Diploma
Certification
CompTIA Security+ce Certified Professional
IT Infrastructure Library (ITIL) Certified
DCITA Computer Incident Responder – Forensic (CIRC – FC)
DCITA Windows Forensic Examiner (WFE– E)
DC3 Digital Forensic Examiner (DFE)
FLETC Digital Evidence Acquisition Specialist (DEASTP-704)
DC3 Cyber Analyst (CAC-2004-ILV)
CompTIA Cybersecurity Analyst (CySA+) Candidate
ISACA Certified Information Security Manager (CISM) Candidate
Work Experience
Department of the Army - 1811; Criminal Investigation Division, Quantico, VA
DATES: Dec 2016 – Mar 2025
TITLE: Special Agent, Cyber
oConducted thorough investigations into cyber-related crimes, utilizing advanced techniques and tools to gather evidence and analyze data.
oCertified Digital Media Collector (DMC), proficient in the preservation and analysis of digital evidence in compliance with legal standards.
oCollaborated with law enforcement agencies and military personnel to address and resolve cybersecurity threats and incidents.
oDeveloped and implement strategies to enhance the security posture of Department of the Army systems and networks.
oProvided expert testimony and support during legal proceedings related to cyber investigations, ensuring adherence to legal and procedural standards.
oTrained and mentor junior investigators in cyber investigation techniques, fostering a culture of continuous learning and professional development.
oAnalyzed emerging cyber threats and trends to develop proactive measures that safeguard sensitive information and critical infrastructure.
oPrepared detailed reports and documentation of investigative findings for senior leadership and stakeholders, ensuring clarity and accuracy.
Department of the Army - 2210; Army Cyber Command, Ft. Belvoir, VA
DATES: Dec 2015 – Dec 2016
TITLE: IT SPECIALIST
oProvided technical support and expertise in the management and maintenance of Army Cyber Command's IT infrastructure, ensuring optimal performance and reliability.
oImplement cybersecurity measures to protect sensitive data and systems from unauthorized access and cyber threats, adhering to DoD and Army policies.
oCollaborated with cross-functional teams to design, deploy, and maintain secure networks and systems, enhancing operational capabilities.
oConducted system diagnostics and troubleshooting to resolve hardware and software issues, minimizing downtime and ensuring mission readiness.
oDeveloped and deliver training programs for personnel on IT systems and cybersecurity best practices, fostering a security-conscious culture within the organization.
oAssisted in the planning and execution of IT projects, contributing to the development of innovative solutions that meet the evolving needs of Army Cyber Command.
oMaintained accurate documentation of IT systems, configurations, and procedures to support compliance and facilitate knowledge transfer.
oMonitored emerging technologies and cybersecurity trends and proposed enhancements and improvements to current IT systems and processes.
Department of the Defense - 2210; DISA, Ft. Meade, MD
DATES: May 2015 – Dec 2015
TITLE: IT SPECIALIST (INFOSEC)
oProvided strategic guidance in setting program goals and establishing priorities to align with the Risk Management Framework (RMF), ensuring compliance with DoD policies and procedures for information assurance.
oConducted comprehensive risk assessments of information systems utilizing eMass and STIG Viewer to identify and mitigate vulnerabilities, safeguarding the confidentiality, integrity, and availability of systems against unauthorized access.
oCollaborated with stakeholders to identify, analyze, and decompose Information Security and NetOps requests, leveraging ACAS for continuous compliance monitoring and reporting status in accordance with RMF requirements.
Department of the Army - 2210; Army Cyber Command, Ft. Belvoir, VA
DATES: March 2013 – May 2015
TITLE: IT SPECIALIST (INFOSEC)
oCyber Response Team (CRT) Lead providing incident response services to Army Cyber Command (ARCYBER) and Army Cyber Operations and Integration Center (ACOIC) including managing complex tracking and data analysis tasks in order to identify computer attacks and probes as they occur.
oAccessed, understood, and provided appropriate response to computer security incidents involving Army and other similar activities in government and industry.
oResponsible for all technical aspects of Army cyber operations including intrusion detection, new incident tracking, documentation, analytical investigation, problem closure, and future security threat countermeasures.
oIdentified new hacker and intrusion set actor methodologies.
oAbility to identify potential or emerging cyber-crimes and threats.
oDeveloped Army/DoD defense countermeasures by integrating information from defensive and offensive cyberspace operations and generating operational requirements to meet those needs.
oExecuted and conducted operational assessment, and risk analysis through the review and analysis of incidents and threat/vulnerabilities.
oPerformed trending, capability gap analysis and friendly network forces prioritization.
oContinuously assessed the Army and DOD’s security posture; to mitigate or remediate new and emerging threats to Army and DOD networks; as well as coordinating cyber response actions with the Theater Signal Commands, Regional Cyber Centers, Functional Commands and other Army entities in accordance with the USCYBERCOM Threat Mitigation Framework.
Northrop Grumman; Army Cyber Command, Ft. Belvoir, Virginia
DATES: October 2009 – March 2013
TITLE: Cyber Information Assurance Analyst
oReviewed the defensive posture of systems and networks within the networking environment or enclave.
oIdentified response actions within an operational environment by evaluating compliance audits, active evaluations, vulnerability assessments, or incident reports.
oSuggested mitigation actions for individual incidents to systemic issues observed over time.
oSupported of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction, emerging technology research inspections and periodic audits.
oAssisted in the implementation of the required government policy (i.e., NISPOM, DCID 6-3, AR25-2).
oMade recommendations on process tailoring.
oParticipated in and document process activities.
oPerformed analysis to validate established security requirements and to recommend additional security requirements and safeguards.
Northrop Grumman; US Cyber Command, Ft. Meade, Maryland
TITLE: Information Assurance Consultant
oSupported Cyber Command formerly the Joint Task Force – Global Networking Operations, HQ
oLead team to conduct analysis and track the compliance status of CC/S/As following Enhanced Compliance Validation (ECV) visits or Command Cyber Readiness Inspections (CCRIs) and other DOD or other agency information security inspections. This task included the evaluation of network architectures, network scanning, physical security findings, and other technology areas.
oLeads team to conduct analysis and prepare the NIPRNet and SIPRNet weekly Threat Assessment and Defense Posture.
oCoordinated the monthly one- and three-star NetOps Scorecard with CC/S/As and distributes action items.
oPerformed other related duties as assigned to foster the Command’s and DOD’s ability to effectively measure CND performance. Included is responsibility for continuing professional development, and for maintaining collaborative working relationships with peers within and outside the Command and DOD requiring knowledge of principles, concepts and policies applicable to the program.
Blue Canopy; Federal Deposit Insurance Company, Arlington, VA
DATES: June 2009 – October 2009
TITLE: Information Assurance Consultant
oSupported the Security Test and Evaluation Team (ST&E) at the Federal Deposit Insurance Corporation.
oEvaluated Plan of Actions and Milestones (POA&M) for mitigation strategies for those vulnerabilities found during initial testing.
oReviewed ST&E reports and System Security Plan (SSP) to assist in facilitating re-tests of systems previously failed using the Risk Management Framework.
oTracked and managed all retest requests from submission to closure.
Northrop Grumman; Defense Intelligence Agency, Washington, DC
DATES: February 2006 – March 2009
TITLE: Intelligence Analyst
oSupported the Information Assurance Protection Center at Bolling AFB.
oIntelligence Community Incident Response Center (IC-IRC) team lead.
oConducted cyber-crime intelligence link analysis utilizing open-source and classified research on emerging/trending threats and vulnerabilities
oCollaborated between IC elements as necessary during incident detection and response stages
oCreated releasable finished intelligence products and reports for the IC as well as IC Senior Leadership
oMaintained incident case management database for all reported IC incidents
oAssessed enterprise/community risk to network assets and performance
oCoordinated and disseminated the best course of action for the IC enterprise during cyber security events, incidents, outages, threats and technical vulnerabilities with IC-IRC fusion analysis team to reduce overall shared risk to the IC Information Environment (IC IE)
Global Analytic Information Technology Services; DISA, Arlington, VA
DATES: October 2005 – February 2006
TITLE: Information Assurance Systems Engineer
oSupported the Joint Task Force – Global Networking Operations, HQ
oProvided support to the Computer Emergency Response Team (CERT) in the Joint Task Force-Global Network under 24x7 operations.
oUpdated anti-virus signature sets, program files, rule sets, and patches and re-hosts them on both unclassified and classified web/ftp servers for DoD- wide distribution.
oSupported incident response teams through a close working relationship as an information assurance engineer.
Keane Federal Systems Inc.; FBI, Washington, DC
DATES: May 2005 – September 2005
TITLE: Senior Consultant; Program Management Analyst
oSupported the FBI’s Security Division
oAssisted in preparing, submitting and presenting written oral and verbal status reports to management and client personnel
oAssisted in preparing and reviewing project plans and technical proposals
oAssisted in conducting project performance and progress reviews on Chief Security Officer Program
oPrepared executive summaries for higher management to determine eligibility of prospective candidates competing for the GS13 – GS15 positions within the Bureau
AT&T Government Solutions; National Reconnaissance Office, Chantilly, VA
DATES: May 2004 – May 2005
TITLE: Senior Technical Associate
oAnalyzed functional security requirements and determined courses of action for applications of secure processing techniques
oMonitored assigned tasks to determine their status and recommended/implemented actions to ensure timely and accurate completion
oTier 1 Field Support Engineer with direct interface with customer
oConducted analysis via multiple Intrusion Detection Systems (IDS) in critical areas impacting the Global Information Grid (GIG) in order to provide Indications and Warnings of cyber threats
oTracked and researched vulnerabilities from data provided by IDS
United States Navy; National Security Agency, Ft. Meade, Maryland
DATES: January 2001 – May 2004
TITLE: Intelligence Analyst
oResponsible for information security for Homeland Defense and European Command National Defense
oManaged all network security systems for LAN/WAN, telecommunications, and voice systems
oResponsible for developing and managing Information Systems security, including disaster recovery, database protection and software development.
oConsolidated and evaluated incoming criminal intelligence
oProvided in-depth analysis on a variety of complex digital communications signals using sophisticated communications equipment and computer technology to provide critical intelligence information.
oPrepared written reports, visualization charts and incident timelines.