JOSHUA M. NOEL
PSC *** Box ***, APO AE, Vicenza Italy
**************@*****.***
SUMMARY OF QUALIFICATIONS:
Degreed professional experience over ten years of leadership, service, management information technology experience in both the military and civilian sectors. Implemented various training products and commercial software hardware for technical tactical systems. Extensive experience with a Joint Special Operations Command (JSOC) unit, studied special operations requirements and techniques; to ensure interoperability and equipment standardization; to plan and conduct special operations exercises and training, while serving in multiple junior leadership positions. US Army Veteran and National Guard. SECURITY CLEARANCE: Active TS NATO S T5 20200918
SKILLS:
Service Now
SharePoint
Knowledge Management
PKI Administration: NSS; PKI RPS, PKI CPS; RA-LRA
NIPR/SIPR/NETCOM
LRA / NPE
Compliance/Regulations: DoD 8500.01 [Cybersecurity] - 8570.01[IA WIP] - 8510.01[RMF for DoD IT] - AR 25-2[IM IA].
Information Assurance: POA&Ms, Information Assurance Vulnerability Management (IAVM), RMF IAM ISSO IASO IMO ISSM
LAN WAN, firewalls, security, storage, and backup methodologies, Cisco, Fujitsu, Hewlett Packard, Tripwire
CERTIFICATIONS:
CCNP-S
CCS-Score
CCS-SIMI
PMP
CRISC
CISM
C CISO
CSIE
CSAE
CASP +
CNSP
CNVP
Pen Test +
CSAP
CySA + CE
Security + CE
Linux + (LPIC 1 and 2)
PROFESSIONAL EXPERIENCE
PERATON 1/2020 – PRESENT
Information Management Analyst – ISSM-Information Systems Security Manager ETA Enhanced Trusted Agent
SETAF: USAREUR-AF & AFRICOM, Caserma Ederle & Caserma Del Din, Vicenza, Italy
Serve as a liaison for the unit by installing software and equipment upgrades and requests for repair.
Ensure that the ATCTS system is up to date and all users have been notified accordingly for required training as well as their Acceptable Use Policy agreements (AUPs) and their DD2875s SAARs.
Ensure the unit’s portal site is maintained, as well as inputting and closing over thousands of incident tickets utilizing BMC Remedy service management system (ITSM).
Interface to the Supporting NEC on C4IM Services.
Knowledge Management (KM), developing and implementing strategies that improve information sharing and collaboration across assigned units.
Content manager for Web and SharePoint Sites.
Web Support Services, focusing on technical troubleshooting, ticket resolution, and user support.
Desktop, Software, Peripheral Support Services.
Database Administration Services: Implemented and maintained database security measures, including user access controls and data encryption.
User Account Maintenance
Proper resolutions of Out of Life cycle equipment.
Secretary of the General's Staff (SGS-IMO). Support of the Commanding General, staff, and the CG’s communication team.
ETA-Enhanced Trusted Agent:
Maintain Certificate Authority to ensure that the subscribers appropriately present necessary credentials for registration into the PKI.
Enroll devices into the PKI, revoke user certificates and authorize.
Auditing current tokens issued to the Foreign Military Local Nationals and other DoD personnel who support and utilize the DoD’s Unclassified network
Resolving current issues surrounding their certificate authorizations
Supporting revocation and suspension of a certificate on Unclassified and/or Classified networks, both the NIPR and SIPR systems
Supporting restoration of suspended certificates
Supporting registration and/or termination of Local Registration Authorities (LRAs).
Approving the issuance of certificates to Network Process Engines (NPEs).
Producing and delivering revocation reports.
Supporting retention of all associated documentation for ten (10) years for DOD and zero (0) years six (6) months for NSS documents.
Supporting duties as assigned through National Security Service Public Key Infrastructure Registration Practice Statement (NSS PKI RPS) and Department of Defense Public Key Infrastructure Certificate Practice Statement (DoD PKI CPS).
Providing support to LRAs, Trusted Agents (TAs), and Enhanced Trusted Agents (ETAs) per DoD PKI RA-LRA CPS and RPS to ensure RA Operations are aligned with DISA Audit requirements.
Monitoring the RA Operations per DoD PKI RA-LRA CPS and RPS to ensure RA Operations are aligned with DISA Audit requirements. Supporting the Army CIO/G6 Cyber Security Directorate and the NETCOM, G3/5/7 in addressing audit findings to include migration and correction of findings per DoD PKI CPS and RPS. Developing and maintaining an On-the-Job Training (OJT) package.
ISSM-Information Systems Security Manager
Cybersecurity assurance of any non-compliance is reported to the highest authorized person keeping in terms with the organizational rules and regulations of the organization per the DoD 8500.01 [Cybersecurity] - 8570.01[IA WIP] - 8510.01[RMF for DoD IT] - AR 25-2[IM IA].
Ensure that all the certification and accreditation procedures have been fulfilled and maintained in compliance with DoD information assurance certification and accreditation process.
Notify and report in writing if there is any kind of security violation and make sure that there is no occurrence of any such incidents.
Analyzing and assessing the security solutions, checking, review, and verify all the details related to information assurance vulnerability management, and to maintain all the necessary documentation to keep a track of the security-related problems. Assisting the Cybersecurity team and ensuring all users are up to date, and able of accessing required DoD networks and infrastructures.
Account creation and verification of required training Security Services and Incident Response Information Assurance Training, Risk Management, Certification Services, Reporting
Coordination of POA&Ms, Information Assurance Vulnerability Management (IAVM).
APPLIED TRAINING SOLUTIONS. Fort Bliss Texas 12/2018 – 1/2020
GG12 - Computer Simulations Analyst I – ISSO IMO Network System Administrator, Help Desk
Troubleshoots Mission Command Systems and other related system software issues.
Manages Mission Command Systems and other related systems with Information Assurance Vulnerability Alerts and updates.
Provides IT Technical support for the Mission Training Complex and its functional training team including the Warrior Skills Training Center, the Mission Command Training Team, and the Individual Training Team.
Strong understanding of technology integration and information flow including LAN WAN, firewalls, security, storage, and backup methodologies.
Knowledge of specific product lines (Cisco, Fujitsu, Hewlett Packard, Tripwire, etc.) Trained in and understand the RMF Certification & Accreditation process, and Information Assurance requirements.
Establishes system parameters and formats for all simulation equipment.
Serves the secondary point of contact for the Network team with the maintaining of the mission training center’s internal and external networks, in conjunction with the exercise design in support of operations anywhere on the continuum of conflict from civil-support to high-intensity conflict.
IMO for hosting the mission training center’s Video Tele-Conferencing VTCs labeled as Unclassified and Secret levels.
Serves as the secondary for the Information Assurance manager, taking on various personnel management duties. Ensures hardware software compatibility.
Coordinates and or modifies user requirements in terms of existing and projected computer capacity and capabilities.
Maintains supplied software packages for internal users. Analyzes new hardware to determine its need or application in the existing or proposed system.
Advises on new techniques and estimated costs associated with new or revised programs and utilities, taking into consideration personnel, time, and hardware requirements.
Makes trade-off analyses; Develops general and detailed documentation describing system specifications and operating instructions.
LOWER VALLEY WATER DISTRICT, Clint, Texas 3/2016 – 12/2018
EXPERIENCE – GS10 – Security Specialist and IT Network Administrator
Provided first-level security support and awareness for new and existing employees; in a database of approximately two hundred (200) employees.
Assist in updating information on system outages, training users with specific and general software.
Wrote new policies for existing security systems in place and provided to the District’s Executive Board members for approval.
Ensured that all policies were abided and recognized by each employee. Assisted to ensure customers and employees follow internal security policies and procedures.
Approve and assign new employee accounts, internet access, and verify requests for other software; per all security protocols set in place.
Assist network resource maintenance with the Information Technology department, by maintaining and repairing network connections to keep the business’ internal network infrastructure secure. Ensured that all systems were connected to existing cable modules, installed, and/or configure new.
Identified the source of the problems, took corrective action, and documented all trouble spots in every safety and security matter.
Provided administrative security, personnel, physical and infrastructure security, and maintains all surveillance security, by developing and maintaining department databases, policies, reports, and all other documentation.
Establish and maintain effective working relationships with fellow employees, officials, and the public.
Performed any other duties as assigned by the General Manager and the executive level staff.
Defining access privileges, control structures, and resources.
Identifying abnormalities, reporting violations.
Implemented security improvements - assessing current situation; evaluating trends; anticipating requirements.
Determines security violations and inefficiencies by conducting periodic audits.
Upgraded systems for optimal performance by implementing and maintaining security controls.
Prepare performance reports, communicating system status.
Solid knowledge of information security principles and practices.
Working experience with intrusion detection systems.
Installation, configuration, monitoring, and response to all surveillance and security system.
Advanced security protocols and standard, software and security architectures.
United States Army, Fort Bliss, Texas 10/2006 – 4/2016
Engineer, STB 4-1AD, Intelligence Officer, 1-37 FA
Performed basic combat construction.
Operates various light or heavy engineer wheeled vehicles; operates or serves as a crewmember on a CEV, AVLB, or an ACE while participating in combat mobility, counter-mobility, and survivability operations.
Prepares and installs priming and firing systems for demolition and explosives.
Arms disarm and install anti-personnel and anti-tank mines.
Locates mines by visual means or by using a mine detector.
Recognizes and neutralizes booby traps, friendly and threat mines, and firing devices.
Supervises lower grade soldiers and provides technical guidance to the soldiers in the accomplishment of their duties.
Directs and assists in the operation of engineer wheeled or tracked vehicles.
Supervises and/or operates the ACE.
Directs and assists in launching and retrieval of an AVLB.
Determines zero settings (boresight) and fires the CEV weapon systems.
Assists in the performance of organizational maintenance of vehicle and armament system components.
Directed the construction of fighting positions and wire entanglements.
Control fire team movements, directs a mine-clearing line charge loading team.
Places explosives and clears misfires, directs minefield marking party and dispensing operation of mine scattering systems.
Conducts reconnaissance operations, determines limit slopes, curves, stream velocity, and gap widths.
Worked with a Joint Special Operations Command (JSOC) unit and studied special operations requirements and techniques; to ensure interoperability and equipment standardization; to plan and conduct special operations exercises and training.
EDUCATION:
Master of Science in Information Technology: Purdue University
Bachelor of Science in Information & Computer Science: Park University, El Paso, Texas.
Associates of Applied Science in Computer Information Systems Security Major: Information Systems Security (ISS) Western Technical College, El Paso, Texas
Associates of Applied Science in Criminal Justice Major: Criminology Minor: Cyber Security; El Paso Community College, El Paso, Texas.