Post Job Free
Sign in

Information Security Machine Learning

Location:
Arlington, VA
Posted:
July 10, 2025

Contact this candidate

Resume:

AZIZ MERABET

Certification: CISSP

Clearance: TS SCI, CI Polygraph

Address: ***** *********** ****, ***********, ** 20155

Telephone: (home) 703-***-****, Email: *********@********.***

CAREER SUMMARY:

·University training in digital communication, automatic control, and system engineering.

·Extensive experience in dynamic system simulation and control, flexible manufacturing and robotic automation, artificial intelligence and expert systems, learning automata and neural networks, radar integration and electronic warfare, computer networking and information security, cryptography and cryptanalysis, zero trust access and data science, cross domain and cross site access, and project engineering and decision management.

·More than fifty publications, technical reports, white papers, and seminars internationally.

PROFESSIONAL EXPERIENCE:

AnaVation, Reston, VA: Senior Security Architect April, 2023-Dec 2023

. Designing information security architectures, performing Assessment & Accreditation (A&A)

And developing an Innovation Plan (including Zero Trust Access, Data Analytics, and

Machine Learning) for the Chief Information Officer (CIO) at the Defense Intelligence Agency

(DIA)

Peraton, Chantilly, VA: Principal Security Engineer July 2015 to February 2023

·Design, implementation, and testing of Data Abstraction, Zero-Trust Access, Data Integrity, Machine Learning, and Information Assurance of Mission Data for the Chief Data Office (CDO) of the National Geospatial Agency (NGA).

·Data Mining, Sensor Fusion, Predictive Analytics, and Machine Learning, A&A using the Risk Management Framework (RMF). and functional testing of Service NOW (SNOW) for the National Reconnaissance Office (NRO)

·Migration of the Defense Information Assurance Certification and Accreditation Process (DIACAP) to RMF for the Naval Surface Warfare Center (NSWC).

·System Design, Functional Testing, Hardening, Vulnerability Scanning, Penetration Testing, and A&A of Attribute Based Access Control (ABAC) Federated Authorization and Authentication for the Department of Homeland Security (DHS).

CenturyLink, Herndon, VA: Senior Security Engineer June 2012 – December 2014

·A&A of an Infrastructure as a Service (IaaS) cloud using the Federal Risk And Management Program (FedRAMP).

·Vulnerability scanning and remediation of the Small Business Organization (SBA) network.

AEROSPACE CORPORATION, Chantilly, VA: Senior Engineer May 2005 – July 2011

·Validation of access control (authentication, authorization), digital signatures, vulnerability management, and penetration testing for the “Sentinel” case management system of the Federal Bureau of Investigation (FBI).

·Evaluation and mitigation of Information Assurance Vulnerability Management (IAVM) notices and Security Technical Implementation Guide (STIG) findings for the Voice over Secure Internet Protocol (VoSIP) system of the Defense Information System Agency (DISA), in accordance with DIACAP.

SEIDCON INC., San Marcos, CA: Principal Engineer Oct. 2001-May 2005

·Design of a diagnostics expert system for the Asynchronous Transfer Mode (ATM) network at DISA-Europe (Stuttgart, Germany).

·Testing of type-3 point-to-point encryption devices with Public Key Infrastructure (PKI) for the ATM Network at DISA-Europe.

·Analysis of requirements, detailed design, and field implementation of the Military Health Services (MHS) network at DISA-Europe.

·Requirement analysis and technology ranking for a secure voice, data, and video infrastructure over the Nonsecure Internet Protocol Router Network (NIPRNet) at US ARmy–EURope (USAREUR) (Heidelberg, Germany).

LUCENT TECHNOLOGIES, Acton, MA: Principal Test Engineer Dec. 2000-Oct. 2001

·Functional, security, recover, stress, interoperability, and performance testing of virtual private networks, including: development of test plan, building of a test network, design of test cases, execution of test cases, and evaluation of test results.

GTE INTERNETWORKING, Burlington, MA: Senior Test Engineer Dec. 1999-Dec. 2000

·Functional testing of secure provisioning, monitoring, and management tools for virtual private networks, including the building of a pre-release network operation center.

DIGITAL EQUIPMENT CORP., Littleton, MA: Customer Consultant Dec. 1997-Dec. 1999

·Technical support for computer security products (firewalls and virtual private networks).

SUN MICROSYSTEMS, Chelmsford; MA: Customer Engineer Oct. 1995-Dec. 1997

·Technical support for hardware, firmware, and software of computer networks.

CONSULTANT, Ottawa, Ontario: Principal Engineer Sept. 1987-Oct. 1995

·Integration and testing of the Canadian Patrol Frigate (CPF) sensors and weapons for the Department of National Defense (DND), Ottawa; Ontario.

·Development of algorithms for the CAnadian Naval Electronic Warfare System (CANEWS) for the Defense Research Establishment (DRE), Ottawa; Ontario.

·Analysis of equipment and design of optimal mixes using war-gaming techniques of a Divisional Fire Support System (DFSS) for DND, Ottawa; Ontario.

NATIONAL RESEARCH COUNCIL, Ottawa; Ontario: Researcher Sept. 1977-Sept. 1987

·Design of a robot cage tracking system in a manufacturing cell using Kalman filtering.

·Specification of a distributed computer manufacturing architecture with failure detection and adaptation.

·Detailed specification of machine-tool synchronization protocols using Petri nets.

·Design of an on-line shop-floor real-time scheduling controller, using dispatching rules, and operation heuristics on behalf of United Nations Industrial Development Organization (UNIDO) for the Central Machine Tool Institute (CMTI), Bangalore; India.

·Development of a computer-aided-engineering software package for rail-vehicle dynamics simulation, ride quality calculation, derailment prediction, limit cycle determination, stability evaluation, and performance optimization for the Transport Development Research Center (TDRC), Montreal; Quebec.

PATENTS (PENDING):

·Zero Trust Access (ZTA) Algorithms:

·Option 1: Eigenvalue Extraction Method

·Option 2: Theorem Proving Method

·Option 3: Rule Based Expert System Method

·Option 4: Inspection Method

·Option 5: Attribute Based Access Control (ABAC) Method

FORMAL EDUCATION:

·B.S. Electrical Engineering; Digital Communication - University of California, Berkeley

·M.S. Electrical Engineering; Automatic Control - Arizona State University, Tempe · Ph.D. Studies (ABD):

Electrical Engineering; Computer Architecture - Arizona State University

Systems Engineering; Artificial Intelligence - Carleton University, Ottawa

ON THE JOB TRAINING (SOME ADVANCED COURSES):

·Kalman Filtering: UCLA Extension, June 1992

·Hacker Techniques: Exploits and Incident Handling: SANS, April 2004

·Network Penetration Testing and Ethical Hacking: SANS, March 2008

·Cryptography: Aerospace Corporation, March 2008

·Hacking CISCO: BlackHat, August 2008

·Advanced Penetration Testing, Exploits and Ethical Hacking: SANS, April 2011

·Virtualization and Private Cloud Security: SANS, June 2013

·Continuous Monitoring and Security Operations: SANS, June 2014

PUBLICATIONS:

White, R. C., Merabet, A. A., "Flexible Software Package for Railcar Design", IMACS Symposium, Nantes, France, May 1983.

Merabet, A. A., "Top-down Design of a Cell Controller for Flexible Manufacturing Systems", Autofact Europe, Basel, Switzerland, September 1984.

Merabet, A. A., "Synchronization of Operations in a Flexible Manufacturing Cell", Computer Integrated Manufacturing and Communication Conference, Anaheim, California, April 1985.

Merabet, A. A., "Intelligent Job-Shop Scheduling", 4th CAD/CAM and Robotics Conference, Toronto, Ontario, June 1985.

Merabet, A. A., "Robot/Machine Tool Concurrency and Cooperation", 1st IFAC Symposium on Robot Control, Barcelona, Spain, November 1985.

Merabet, A. A., "Dynamic Job-Shop Scheduling: An Operating System Based Design", Flexible Manufacturing Systems; Methods and Studies (A. Kusiak, ed.), North Holland, Amsterdam, The Netherlands, 1986.

Merabet, A. A., "Petri Nets: A Flexible Manufacturing Design Tool", 4th IFAC/IFIP Symposium on Software for Computer Control, Graz, Austria, May 1986.

Merabet, A. A., "Synchronization of Operations in a Flexible Manufacturing Cell: A Petri Net Specification", Journal of Manufacturing Systems, Vol. 5, No. 3, Oct. 1986.

Merabet, A. A., "Distributed Expert Systems: An Overview", 3rd APMS Conference, Winnipeg, Manitoba, April 1987.

Merabet, A. A., Moody, M., "A Distributed Artificial Intelligence Testbed for the Autonomous Power Management of the Mobile Servicing Station", 5th CASI Conference on Astronautics, Ottawa, Ontario, November 1988.

Merabet, A. A., "Radar Stealthing of Ships", Association of Old Crows, Ottawa, Ontario, August 1990 (S).

Merabet, A. A., “A Survivable Network Model”, white paper, Aerospace Corporation, September 2005 (FOUO).

Merabet, A. A., “On IPSec and HAIPE”, MILCOM, Washington DC, October 2006 (TS).

Merabet, A. A., “Technology Forecasting”, white paper, NRO, December 2006 (TS/SCI).

Merabet, A. A., “Satellite Communication”, white paper, NRO, March 2007 (TS/SCI).

Merabet, A. A., “Access Control for the Sentinel project”, white paper, FBI, November 2009 (S).

Merabet, A. A., “Digital Signatures for the Sentinel project”, white paper, FBI, February 2010 (S).

Merabet, A. A., “Information Assurance for the Sentinel project”, white paper, FBI, June 2010 (S).

Merabet, A. A., “Assessment and Figure of Merit of the FBMS project”, white paper, DoI, December 2010 (FOUO).

Merabet, A. A., “Cloud Computing: A Critical Review”, white paper, CenturyLink Technology Solutions, November 2012 (U/PROP).

Merabet, A. A., “Functional and Security Testing of an IaaS Cloud”, white paper, CenturyLink Technology Solutions, July 2013 (U/PROP).

Merabet, A. A., “Cloud Access Control: A Critical Review”, white paper, CenturyLink Technology Solutions, April 2014 (U/PROP).

Merabet, A. A., “Cloud Access Control: A Practical Implementation”, 6th Cyber security Framework Workshop, NIST, October 29-30, 2014 (U/PROP).

Merabet, A. A., “Attribute Based Access Control”, white paper, Vencore, August 2015 (U/PROP).

Merabet, A. A., “TLS Vulnerabilities”, white paper, Vencore, October 2016 (U/PROP).

Merabet, A. A., “Federated Authentication”, white paper, Vencore, January 2017 (U/PROP).

Merabet, A. A., “Crypto Ransomware”, white paper, Vencore, May 2017 (U/PROP).

Merabet, A. A., “RMF/Xacta Process Improvement Plan”, white paper, NRO, December 2017 (U/FOUO).

Merabet, A. A., “HeatMap: A Non-Subjective Approach”, white paper, NRO, March 2018 (U/FOUO).

Merabet, A. A., “C2S Access: Services, Protocols, Ports, and IPs”, white paper, NRO, May 2018 (TS/SCI).

Merabet, A. A., “RMF/Xacta Step 5 Automation”, white paper, NRO, June 2018 (U/FOUO).

Merabet, A. A., “Non-Repudiation and Digital Signatures”, white paper, NRO, August 2018 (U/FOUO).

Merabet, A. A., “Cryptographic Vulnerabilities”, white paper, NRO, December 2018 (TS/SCI).

Merabet, A. A., “Shellshock Vulnerability”, white paper, NRO, January 2019 (TS/SCI).

Merabet, A. A., “Heartbleed Vulnerability”, white paper, NRO, March 2019 (TS/SCI).

Merabet, A. A., “Sub-netting and Super-netting the JWICS Space”, white paper, NRO, May 2019 (TS/SCI).

Merabet, A. A., “Data Mining, Sensor Fusion, Predictive Analytics, and Machine Learning”, white paper, NRO, June 2019 (TS/SCI).

Merabet, A. A., “Event Auditing: An Expert System Approach”, white paper, NRO, August 2019 (TS/SCI)

Merabet, A. A., “Continuous Hunting Expert System”, white paper, NRO, October 2019 (TS/SCI)

Merabet, A. A., “Anomaly Detection in Audit Events”, white paper, NRO, December 2019 (TS/SCI)

Merabet, A. A., “Data Science: Algorithms, Paradigms, Procedures, and Threats”, white paper, NRO, March 2020 (TS/SCI)

Merabet, A. A., “Data Science: GOTS, COTS, and FOSS”, white paper, NRO, May 2020 (TS/SCI)

Merabet, A. A., “POODLE Cryptographic Vulnerability”, white paper, NRO, August 2020 (TS/SCI)

Merabet, A. A., “DROWN Cryptographic Vulnerability”, white paper, NRO, November 2020 (TS/SCI)

Merabet, A. A., “Secure Software Download and Upload: The SolarWinds Attack Case”, white paper, NRO, January 2021 (TS/SCI)

Merabet, A. A, “Wireless Security”, white paper, NRO, May 2021 (TS/SCI)

Merabet, A. A., “Continuous Monitoring: Figures of Merit”, white paper, NRO, July 2021 (TS/SCI)

Merabet, A. A, “Machine Learning: AWS/SageMaker”, white paper, NRO, September 2021 (TS/SCI)

Merabet, A. A., “Mission Data Project Plan”, white paper, NGA, November 2021 (TS/SCI)

Merabet, A. A., “Mission Data Security Gap Analysis”, white paper, NGA, December 2021 (TS/SCI)

Merabet, A. A., “Mission Data Cross Domain Access”, white paper, NGA, January 2022 (TS/SCI)

Merabet, A. A., “Mission Data Zero Trust Access Algorithm”, white paper, NGA, March 2022 (TS/SCI)

Merabet, A. A., “Mission Data Abstraction Layer”, white paper, NGA, May 2022 (TS/SCI)

Merabet, A. A., “Mission Data Machine Learning”, white paper, NGA, July 2022 (TS/SCI)

Merabet, A. A., “Mission Data Information Assurance”, white paper, NGA, September 2022 (TS/SCI)

Merabet, A. A., “Zero Trust Work/Data Flow”, white paper, NGA, November 2022 (TS/SCI)

Merabet, A. A., “Data Security: Top 20 Hard Problems”, white paper, NGA, December 2022 (TS/SCI)



Contact this candidate