ExpertConnect - Mentoring & Discussions

You can join mentoring & discussions for Free Ask Question, Give Answer, Discuss IT Problems, Learn, and Grow

Profile menu
2019-07-19 04:10:48
About this user
Biography
After graduating from the Cisco Networking Academy with honors, he’s achieved AAS degrees in Computer Networking and Network Security, as well as BS in Network Engineering. Twice awarded the National Science Foundation Scholarship; and a recognized SME by the CSIAC, CompTIA, and ISC2. He has sat on the advisory boards for both the undergraduate colleges as served as the Chair - Cybersecurity Training Working Group for the US Army. Michael has a demonstrated ability to deliver complex technical instruction in a clear and understandable manner. This ability earned him recognition by the Southern Association of Colleges as an outstanding educator in 2010.
My Professional Background
  • SR. DISA CND INSTRUCTOR
    Sealing Tech Inc
    Nov 2018 - Jan 2019 2 Month(s)

    • Provide Subject Matter Expertise (SME) instruction related to the orchestration of end-to-end JRSS project technologies. Including CISCO ASA Firewalls, Palo Alto Firewalls, F5 load balancers, Cisco MPLS (Multi-Protocol Label Switching), BGP routing. (Border Gateway Protocol) • Provide task-oriented instruction related to In-depth protocol analysis, with CND tools in the JRSS cyber suite: Tipping Point (IPS), Fidelis DLP, SourceFire, ArcSight, Gigamon, OPSWAT, Inquest, Argus/Bro, ELK • Provide SME instruction related to techniques related to network intrusion analyzation and/or Security Operations Center (SOC) analyzation.
  • INFORMATION ASSURANCE PROGRAM MANAGER
    PEO MISSILE & SPACE
    Mar 2015 - Apr 2016 1 Year(s) and 1 Month(s)

    • IAPM for all PEO Missiles and Space business and tactical systems and facilities. • Chair - Cybersecurity Training & Planning (CST&P) Working Group • Principle NIST Risk Management Framework (RMF) Subject Matter Expert and Risk Management Framework lead organizational advisor. • Establish the scope of responsibilities for all Information Assurance / Cyber Security personnel • Senior Advisor to the Army Major General (2 Star) commander, Army Brigadier General (1 Star) deputy commander and Senior Executive Service (SES) management regarding advanced techniques and developments in the Information Assurance / Cyber Security arena of Automated Information Systems (AIS) by providing forecasts and recommendations for long-range strategic plans and lifecycle management. • Evaluate information system security and computer network defense-in-depth requirements and procedures. Provide program-oriented Information Assurance / Cyber Security technical and procedural review and oversight within all phases of proposed programs and program elements to determine the applicability and compliance of NIST 800-53 R4, CNSSI1253, FISMA 199 security controls. Responsible to both identify risk and recommend response within the network enclave environment • Evaluate, review and provide oversight for all information system security and computer network defense-in-depth requirements and procedures. Responsible to both identify risk and recommend response within the fielded tactical environment • Advise and supervise the implementation of the command level Network Cyber Security Improvement Program (NCSIP) subprograms as it applies to infrastructure network devices and DoD interconnection policy and technical initiatives up to and including command assigned Special Access Programs (SAP), Sensitive Compartmented Information (SCI) and the associated Connection Approval Process(s) • Serve as a cybersecurity Subject Matter Expert partner G2 Security personnel, G4 Logistics personnel as well as the various external organizations including the Defense Security Service (DSS), the Defense Information Systems Agency (DISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) • Responsible for the review and implementation of Federal/DoD/Army policy and development of the required command-specific policy and procedures in compliance with all applicable information security regulations, including Federal Information Security Management Act (FISMA), Federal Risk and Authorization Management Program (FedRAMP), Federal Information Processing Standard (FIPS), National Institute of Standards and Technology (NIST), Committee on National Security Systems Instruction (CNSSI), Defense Federal Acquisition Regulation Supplement (DFARS), Health Insurance Portability and Accountability Act (HIPPA), Personally Identifiable Information (PII), and various other laws and regulations including Executive Orders.