Keep in touch with meI'm using Intch to connect with new people. Use this link to open chat with me via Intch app
Work Background
Security Manager
L3 Harris - (LanceSoft)Security Manager
Dec. 2024Reston, Virginia, United States
Sr. Information Assurance Engineer/ SOC Manager
1901 GroupSr. Information Assurance Engineer/ SOC Manager
Oct. 2022 - Jul. 2024Blacksburg, Virginia, United StatesI developed and managed Information Security policies and procedures, significantly reducing vulnerabilities and ensuring compliance across the organization. I conducted security audits and penetration testing, meticulously documenting and remediating findings to enhance overall security posture. I delivered incident response, forensic analysis, and cybersecurity training, successfully upskilling team members and improving overall capability. Despite facing customer and contractor challenges, I maintained superior team performance by effectively managing access, report generation, and knowledge expansion. * Increased operational efficiency by 25% by managing and reporting on Information Security operations, creating a culture of security awareness across departments. * Achieved 15% cost savings by managing Information Security operations within budget while ensuring high data protection and regulatory compliance. * Enhanced security posture by 40% through effective development and maintenance of the Information Security workforce. * Improved deliverables by 30% through strategic planning and policy development, significantly strengthening the protection of information assets. * Achieved 100% staff compliance with information security policies by creating a culture of awareness and reducing security incidents through negotiation and training.
Sr. Cyber Security Engineer
1901 GroupSr. Cyber Security Engineer
May. 2020 - Oct. 2022Blacksburg, Virginia, United StatesIn this position I will have a broad spectrum of responsibilities, reporting directly to the Director, Security Engineering Services.
ACAS/Trellix AESS Administrator, formerly McAfee HBSS Administrator
Apex SystemsACAS/Trellix AESS Administrator, formerly McAfee HBSS Administrator
Aug. 2019 - May. 2020Radford, VAI implemented and maintained DoD security configurations and industry best practices for HBSS, ensuring a secure capability baseline while creating visual dashboards and reports to improve information analysis. I integrated and tested new signatures on servers and workstations, which enhanced enterprise-wide security measures and remediation efforts. I managed HBSS operations, overseeing the deployment, configuration, and troubleshooting of agent and endpoint products to maintain security baselines and ensure compliance. Additionally, I delivered troubleshooting expertise for Tenable- based products, collaborating with engineering teams to resolve technical issues and meet reporting requirements. * Ensured 100% asset coverage and successful scan completion by operating and maintaining the ACAS solution for network and application scanning as well as configuration assessments. * Maintained and updated Security Center through manual updates, professional feeds, or DISA-hosted feeds, ensuring accurate and up-to-date vulnerability information. * Conducted thorough vulnerability analysis and script verification, identifying and addressing potential false positives to ensure accurate results. * Collaborated with C5ISR to ensure timely deployment and accurate scanning capabilities, supporting DoD regulation compliance and risk mitigation reporting. * Applied USCC/Joint Force Headquarters DoDIN directives to configure scanning policies, ensuring alignment with security requirements, and effective lockdown. * Administered and troubleshot McAfee's Host Based Security System HBSS, ensuring effective vulnerability scanning, identification, and remediation in compliance with government and cybersecurity guidelines. * Established and enforced Information Security policies and procedures, achieving 100% compliance with laws and regulations while effectively mitigating security risks.
Sr. Information Assurance Engineer/ISSM / Project Manager for ATO
Systematic U.S.Sr. Information Assurance Engineer/ISSM / Project Manager for ATO
Sep. 2017 - Aug. 2019Centreville, VirginiaI led security coordination efforts between Systematic A/S in Denmark and Systematic Inc. in Centerville, VA, to facilitate the U.S. Army's acquisition of Systematics' C4ISR solution. I oversaw the adaptation of Danish security protocols to meet U.S. Department of Defense (DoD) requirements, guiding the Authorization to Operate (ATO) process. I managed the first-time export of the software to the U.S. for code scanning and vulnerability analysis. Additionally, I directed security documentation and compliance efforts, traveling to Denmark to collaborate with engineers and executives on Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs). My coordination of all security requirements and documentation led to the successful DoD approval of the software. * Enhanced project alignment and security awareness by supporting project and customer-facing security meetings with expert subject matter advice. * Increased staff awareness and proactive involvement in cybersecurity efforts by 40% through the establishment and facilitation of information security awareness activities, including phishing simulations. * Positioned Systematic U.S. as a leader in information security by developing and implementing robust security policies and procedures, resulting in 100% compliance with relevant laws and regulations. * Built strong partnerships and ensured policy alignment by representing the Information Security Office in interactions with internal and external organizations.
Sr. Information Assurance Engineer/CIRT Lead
One Federal SolutionSr. Information Assurance Engineer/CIRT Lead
Sep. 2013 - Aug. 2017VAI enhanced cybersecurity activities in the DoD environment by providing comprehensive Information Assurance (IA) expertise and support across system engineering design, certification, accreditation, system analysis, hardening, vulnerability and penetration testing, and policy analysis. I improved decision-making and engineering processes by applying my technology knowledge to analyze the security implications of new IT systems and offering actionable recommendations. Additionally, I assisted with technical projects in attaining and maintaining an Authorization to Operate (ATO) by leveraging my expertise in the Risk Management Framework process. * Mitigated operational and technical impacts by analyzing, coordinating, and responding to cyber incidents with a focus on minimizing adverse effects. * Established a comprehensive cyber incident response framework by developing standard operating procedures for timely reporting, analysis, and remediation of cyber events, resulting in an accurate and meaningful incident management. * Developed standard operating procedures for incident management, focusing on containment, eradication, and recovery to enhance response effectiveness. * Aligned Information Security policies with strategic objectives by briefing leadership and ensuring effective risk mitigation strategies.
Assistant Information Assurance Manager / Information Assurance Security Officer
Department Of Defense Joint Force Headquarters (JFHQ) VirginiaAssistant Information Assurance Manager / Information Assurance Security Officer
Mar. 2013 - Aug. 2013Ft. Pickett / Blackstone VAI enforced Information Assurance (IA) policies, guidance, and training to maintain security standards across the organization. I ensured the implementation of IAVM dissemination, reporting, and compliance procedures, verifying that all users met the necessary security investigations, clearances, authorization, need-to-know, and security responsibilities before granting access to the Information Systems (IS). • Ensured users received initial and annual IA awareness training. • Ensured log files and audits are maintained and reviewed for all systems and that authentication policies are audited for compliance. • Prepared, distributed, and maintained plans, instructions, and SOPs concerning system security • • Revamped Information Security policies and procedures, leading to a 30% increase in compliance with relevant laws and regulations, enhancing data protection for information operations.
Cyber Operations Technical Operator
U.S. Cyber Command N.S.ACyber Operations Technical Operator
Mar. 2011 - Mar. 2013Meade, MDI conducted Cyber Operations and Information Operations (IO), working closely with Operational Planning Teams, Fires, and the Joint Inter-Agency Task Force (JIATF) to meet the time-sensitive operational requirements of Geographic Combatant Commanders. I utilized intelligence products and conducted network analysis to identify and target specific capabilities. I also tested, verified, and implemented new cyber operation tools, and developed tactics, techniques, and procedures (TTPs) documentation to ensure the sustainability of continuous Cyber Operations. • Effectively maintained RHEL, PostFix, and Apache servers within a mixed environment of i686 Linux systems, leveraging SSH and command line interface in an ESX/VMware environment. • Utilized tools like nMap, TCPDump, WireShark, and internally developed solutions to monitor and troubleshoot network issues. • Developed numerous automated scripts to efficiently manage Linux systems, enhancing operational efficiency. • Maintained transparent, forward, and reverse proxies to ensure secure and reliable network communication.
Information Assurance Security Officer (IASO)
VA-G6 (Ft. Pickett) – Blackstone, VAInformation Assurance Security Officer (IASO)
Aug. 2009 - Mar. 2011Enforced IA (Information Assurance) policy, guidance, and training Ensured implementation of IAVM dissemination, reporting, and compliance procedures Ensure all users meet the requisite favorable security investigations, clearances, authorization, need-to-know, and security responsibilities before granting access to the IS Ensured users received initial and annual IA awareness training Ensured log files and audits are maintained and reviewed for all systems and that authentication policies are audited for compliance Prepared distributed, and maintained plans, instructions, and SOPs concerning system security
Vulnerability Assessment /Cyber Security Engineer
U.S. ArmyVulnerability Assessment /Cyber Security Engineer
Aug. 2008 - Aug. 2009Southwest Asia, (Kuwait, Afghanistan, Iraq) Infrastructure Support which includes Threat Analysis, Network monitoring, Incident Response and Handling Assessments of a network's security posture Adviced to network managers on network security issues Recommended network security devices (intrusion detection sensors) Evaluated computer network defense applications or configurations Performed vulnerability assessment of networks and systems Performed Wireless network assessments Assisted with Certification and Accreditation assessments Tailored computer security training for users, leaders, and technicians

Requests

Touchpoint image
0
Personal Pitch
Cybersecurity Consulting Services
Intch is a Professional Networking App for the Future of Work
300k+ people
130+ countries
AI matching
See more people like Frank on Intch
IT
489368 people
24
Data Scientist Intern @ Newell Brands
16
Program Manager @ DISH Network
18
Senior Software Engineer @ EarnIn
ITSecurity Analyst
27004 people
17
Major Crimes Det/CFCSI (Ret.) Business Owner, MBA @ CID / U of A / Rahbuilds.com
16
Programmer @ Castro Studios
23
Director