Quantcast

Lead Cybersecurity Engineer Resume Newna...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Lead cybersecurity Engineer
Target Location US-GA-Newnan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Human Resources Lead Engineer Forest Park, GA

Lead Platform Engineer Atlanta, GA

Lead MERN Stack Engineer Lawrenceville, GA

Lead Python Full Stack Engineer Lawrenceville, GA

Cybersecurity Engineer Business Operations Atlanta, GA

IAM/CyberSecurity Engineer Woodstock, GA

Lead Cloud Architect Roswell, GA

Click here or scroll down to respond to this candidate
 SUMMARY OF EXPERIENCELockheed Martin-AEROSenior Staff. Cyber System Security EngineerIntegrated Cyber Security Project LeadStreet Address  To PresentAs a Cyber System Security Engineer and Integrated Project Team Lead with over twenty years of Software Development Lifecyle and operational experience, I play a critical role in safeguarding vital systems and infrastructure. I provide expert level guidance to program management, product teams, and infrastructure teams. My expertise spans various areas, including the development of new technology, network security, operating system hardening, and cloud-based security. Additionally, I collaborate daily with key members responsible for cyber threat intelligence, while overseeing the implementation pipeline for threat intelligence products.    1. Risk Assessment and Mitigation:      Identifying and evaluating risks through rigorous assessments and developing mitigation plans aligns with best practices.      Your goal is to produce a cyber-resilient security design solution for the target platform across the enterprise.      Applying SP 800-53 controls and accompanying documentation (SCTM, POA&M, SSP, PPIP, CSIP, CSEP, SwAP, SAER,CONOPS, CYBERSAFE(USN) etc..
    2. Leadership and Collaboration:      Leading cyber working groups, attending design reviews, and participating in site surveys and activation planning events demonstrates your leadership.      Collaborating with other Integrated project team (SMEs) ensures comprehensive security coverage.    3. Assessment and Authorization (A&A):      Leveraging your twenty years of experience, you assist sites in developing A&A packages required for obtaining various Authorization to Operate (ATO) certifications.    4. TEMPEST Expertise:      Your dedication to preventing site compromise through investigating and controlling unintentional emanations is commendable.      Maintaining confidentiality, integrity, and availability throughout the systems lifecycle is critical.    5. Cyber Risk Analysis and Security Assessment:      Conducting cyber risk analyses using threat modeling and vulnerability scanning tools ensures robust security measures.    6. Systems Engineering Documentation:      Contribute to the development of various sections of systems engineering documentation,      System Engineering Plans      Initial Capabilities Documents      Requirements Specifications      Interface Control Documents      System Requirements Management:I manage system requirements and derived requirements to ensure the delivery of both developing and production systems that align with defined system architectures.These architectures may include frameworks like the Department of Defense Architecture Framework (DoDAF) and Service-Oriented Architecture (SOA).    7. Functional Requirements Development:      I assist and coordinate my teams ongoing support in developing system requirements and functional requirements.These requirements are then allocated to individual components such as hardware, software, facilities, and personnel.    8. Coordination and Resolution:      I manage and coordinate the resolution of action items from meetings such as Configuration Control Board (CCB) meetings, design reviews, and test reviews.      Cross-discipline coordination is essential for successful outcomes.10. Integrated Product Team Participation:      Actively participate in Integrated Product Teams (IPTs) to design new capabilities.      Evaluate development and operational considerations ensures robust designs.United Technologies/USPROSenior Cyber Systems Engineer2018-2020As a Cyber Security professional, I bridge gaps between high-level security policies/requirements and technical/operational aspects through the implementation of processes and strategies. As a subject matter expert, I operate within an operational and software and hardware developmental environment.Here are some key highlights of my role:    1. Managed Cyber Security Operations Teams:      I oversee rigorous accreditation processes for warfighter and weapon systems. This involves understanding the Software Development Life Cycle (SDLC) and ensuring compliance with requirements for both Controlled Unclassified Information and Classified Information.    2. Produced System Security Plans:
      On behalf of our company s customers, I create System Security Plans, Continuation Operational Management Plans, and directives for Vulnerability and Path management.    3. Ensured Assisting with Assessment and Authorization (A&A):
      I play a crucial role in achieving the Authority to Operate (ATO). This involves adhering to the requirements outlined in NIST SP 800-53 Risk Management Framework (RMF). I also produce related documentation, including the Master Security Control Traceability Matrix (SCTM) and the System Security Plan (SSP).    4. Strategic Research and Roadmap Development:      I contribute to strategic research, leading to a roadmap for the development and transition of new security technologies to embedded platforms and information services.    5. Technical Advisory Role:
      Within the company s cyber security realm, I serve as an expert technical advisor to engineering and business leadership.My work ensures the safety and integrity of critical systems and infrastructure.Department of Defense(Joint Forces; Air Force, Army and Navy)Chief of Cyber Security Operations2015 to 2018Drawing upon my experience in System Engineering, Cyber Security, Software Engineering, and Network Engineering within the Department of Defense, I aimed to drive success. I provided expert-level support to the United States Department of Army Headquarters (NETCOM) and Arizona State University teams in the development of new technologies by assisting with the following functions:    1. Program Requirements Execution:      Executed program requirements across various production and operational cycles, including legacy systems.      Translating box-level requirements down to circuit cards, control algorithms, FPGAs, and mechanical requirements.    2. Interface Control Documents (ICDs) and Compliance:      Ensured compliance with ICDs and assisting in the development of CONOPS (Concept of Operations) for card-level designs demonstrates attention to detail.    3. Verification and Validation Planning:      Focused on  how  requirements are verified during planning, execution, and closure ensures robust system functionality.    4. Tier Three Engineering Support:      Performed troubleshooting and managing joint forces  software refresh, lifecycle development, and enterprise services.      Operational Engineering and Configuration Management (CM) .    5. Change Control and Cyber Security:      Established shared CM processes for change control, testing, baseline maintenance, system validation, and release control.      Managed Cyber Security efforts under DFAS direction and adhering to NIST SP 800-53 Risk Management Framework showcases your expertise.General Dynamics and NCI, Arizona State University (DoD Support)Senior Cyber Security Engineer2014 to 2015Drawing upon my experience in System Engineering, Cyber Security, Software Engineering, and Network Engineering within the Department of Defense, I aimed to drive success. I provided expert-level support to the United States Department of Army Headquarters (NETCOM) and Arizona State University teams in the development of new technologies by assisting with the following functions:    1. Installation, Configuration, and Administration:      Performed installation, configuration, and administration of security measures for information systems.      Ensuring proper setup and maintenance is crucial for system security.    2. Auditing and Reporting:      Oversaw auditing events and promptly reporting suspicious and malicious activity.      Detecting and addressing security threats.    3. Event Log Review and Network Monitoring:      Reviewed event logs and monitoring network devices and servers. Identified anomalies and potential security breaches.    4. Incident Response Support:      Provided incident response support, including impact assessment, damage assessment, and recovery actions, contributes to system resilience.    5. Backup and Recovery:      Managed backup processes and ensuring robust recovery procedures are in place safeguard critical data.Shell Oil and Gas (Joint Venture) QG3&4, Exxon, and ConocoPhillipsDirector and acting Vice President of Special Project of Information Technologies and Champion Director of Corporate Social ResponsibilityLNG Project (Middle Eastern and Southwest Asia)2006-2014As the Director of Special Projects in Information Technology, I hold multifaceted responsibilities that demonstrate strategic leadership and impactful contributions to the introduction of new technology through software development in an agile environment. Additionally, I serve as the acting Vice President, participating on the executive board and providing key advice to the Chief Executive Officer. I report directly to the CEOs of ConocoPhillips and Shell for the Middle Eastern Region and all of Southwest Asia. Furthermore, I support the company s mission and vision by spearheading programs such as the national initiatives Home to Home and Think Pink    1. Maintaining Cohesive Relations:      Ensured a cohesive relationship through the company s Foreign Affairs Branch, especially with various NATO member countries.      Oversaw and met objectives related to cyber-security policies and requirements aligns with critical national and international interests.    2. GAP Analysis and Solutions:      Reviewed and Instructed teams to perform GAP analysis and find solutions to areas of concern is essential.      Developed processed and documents that adhered to host nations  regulations, NATO requirements, and those of the United States Government ensures robust compliance.    3. Budget Management:      Managed a budget of 10 billion USD for Information Technology and Cyber Security demonstrates fiscal responsibility and strategic allocation.    4. Director of Corporate Social Responsibility:      Developed and created an impactful program at the national level, such as Home to Home Connection and Think Pink for a Cure, showcases the company s commitment to social responsibility.      Home to Home Connection emphasized safety for migrating workers from third-world countries by connecting them with their home countries.      Think Pink for a Cure introduced Breast Cancer Awareness in countries like Qatar, Bahrain, Jordan, and the UAE.    5. Capital Planning and Investment Control:      Ensured effective capital planning and investment control within the company s IT departments.
      Collaborated with the Chief Financial Officer on portfolio governance processes enhances strategic decision-making.    6. Linking Project Teams and Senior Executives:      Designed processes that established a measurable link between project teams and senior executives ensures alignment with organizational goals.EDUCATION      Air Force Institute of Technology (AFIT) Cybersecurity, 2018      Pacific University, Bachelor of Science, Computer Science, 2002CONTINUAL EDUCATION AND CERTIFICATIONS      Defense Acquisition University      Leadership and Development level 2      Air Force (ATEC) Software Development course      AIR FORCE TECHNOLOGY AND ENGINEERING COLLEGE (CYBER SECURITY)      Fort Gordon, Software Lifecycle Development      Executive Management      Program Management Planning      Project Management and Planning      Ethical Hacker      Social Responsibility within the Corporation      Brand Management      Effective Corporate CommunicationCERTIFICATIONS      Comptia-Security+      DAU-Acquisition level 2      SAFE-SCALED AGILE(LEAN)      ITIL-3      Ethical HackerSPECIALIZED TOOLS/SKILLSETS

Respond to this candidate
Your Email «
Your Message
Please type the code shown in the image:
Register for Free on Jobvertise