logo
Keep in touch with meI'm using Intch to connect with new people. Use this link to open chat with me via Intch app
Work Background
Manager, Cybersecurity Vulnerability and Management Detection
ConstellationManager, Cybersecurity Vulnerability and Management Detection
May. 2022Baltimore, Maryland, United StatesResponsible for supporting the architecture, implementation, and ongoing maintenance of the Cybesecurity Vulnerability Detection and Management program, ensuring the confidentiality, integrity, and availability of all corporate assets. Responsible for the design and operation of cyber security vulnerability solutions to ensure these solutions are implemented in accordance with industry standards, best practices, and Constellation Management Model governance. Responsible for the creation of and/or maintenance of policies, standards, baselines, guidelines, and procedures, as well as risk and vulnerability assessments on a large array of IT/OT systems. •Serve the organization as the technical leader by maintaining an annual vulnerability assessment schedule through interaction with businessunits, project management, emergent assessments, and inclusion of business-critical applications requiring predefined assessmentrequirements. •Manage Vulnerability Threat and Industrial Control Systems notifications of emergent vulnerabilities ensuring remediation tracking.Oversee supporting security-related functions, processes, and engagement. •Maintain monthly reporting to senior Security management and Business Units for all Vulnerability Management responsibilities.
Adjunct Professor
Purdue GlobalAdjunct Professor
Jun. 2023I am a driven professor dedicated to teaching students how to communicate professionally in their respective fields. In the CS212: Communicating Professionalism course, students learn about professionalism, personal branding, social media in the workplace and other skills necessary to succeed in the workplace. o Deliver online lectures and instruction to 40+ undergraduate students o Initiate, facilitate, and moderate course discussions o Evaluate and grade students’ coursework, assignments, and discussion posts o Prepare course materials such as assignments, and announcements o Teach courses in a 10-week online format
Cyber Officer
US ArmyCyber Officer
May. 2016Washington D.C. Metro AreaS-6 Executive Officer Company Commander Task Force COVID Commander Signal Officer Selective Service Officer Directed complex logistical needs for an eighty-person operation, as well as planning and implementation of program strategy impacting 20,000 personnel; created in-depth reports for senior stakeholders. Guaranteed the maintenance and functionality of over $2 million in cutting-edge equipment. Studied, arranged, and executed multiple cyber exercises and simulated attacks as a key member of the Defensive Cyber Operations Element (DCO-E; under the JFHQ Joint Staff). Obtained advanced skills and leadership training designed to ensure optimal performance even under conditions of high stress and fast-paced uncertainty, namely emergency response scenarios. o Served in a multidimensional role as an Executive Officer, Aide De Camp, and Cyber Health Assessment Assistant Team Lead, supervising the strategic and tactical activities of Operation Enduring Freedom in Kabul, Afghanistan, as well as serving in the Continental United States. o Developed proficiency in the optimal usage of communications, weapons, gear, and biometric solutions. o Trained staff using practical methods to help them quickly master essential technology/equipment. o Displayed strong resolve and team leadership, leveraging crowd control, traffic management, and investigative authority to maintain law and order in a hazardous environment. o Procured civilian security details, population escorts, entry control point security, customs / border control support, and other mission-critical safety functions.
Cyber Governance, Risk, and Compliance Manager - Air Force Commands and Agencies
SAICCyber Governance, Risk, and Compliance Manager - Air Force Commands and Agencies
Jun. 2019 - May. 2022National Capitol RegionPrimary point of contact providing operational oversight to the IT Security Program for the NCR Region deploys information systems security tasks that safeguard, organize, and control classified information. Applies knowledge of Defense Information Systems Agency (DISA) security policies and Security Technical Implementation Guides (STIGs) to secure computing components and frequently push software/firmware patches from Information Assurance Vulnerability Alerts (IAVA). Technical subject matter expert capable of preparing, analyzing, and disseminating critical documentation and vulnerability/risk assessments such as System Security Plans (SSPs), Risk Assessment Reports, Authorization and Accreditation (A&A) packages, and Security Controls Traceability Matrices (SCTMs). o Establishes and maintains an official operational security posture for all assigned information systems. o Oversees Information Systems Security Managers (ISSMs) and Information Systems Security Officers (ISSOs) to ensure policy/procedural compliance. o Validates customer security authorization requests and closely monitors their activity. o Adheres closely to information security standards based on federal government requirements, namely FISMA, NIST 800, ISO/IEC standards, NISPOM, and Intelligence Community of Risk Management Framework. o Collaborates with the Facility Security Officer (FSO) to utilize customer databases such as JPAS, Scattered Castles and TALON in order to grant access to users; interfaces with SAIC management and occasionally federal government personnel.
Supervisory Information Assurance Manager
District of Columbia Army National GuardSupervisory Information Assurance Manager
May. 2017 - Jun. 2019Washington D.C. Metro AreaServe as the senior IT Specialist assigned to the DCARNG, J6 Directorate, Chief Information (CIO) Division. o Facilitate the seamless continuity of cyberspace operations through planning, execution, assessment, process improvement, and issue resolution. o Develop and maintain an IT management strategy that aligns technical capabilities with operational objectives, regulatory requirements, and end user needs. o Cultivate a culture of excellence by developing benchmarks, measuring performance, establishing backup processes, coordinating upgrades, and recommending standard operating procedures for all devices on the network. o Create decision-point papers and briefs that drive informed technology choices up to the executive level. o Perform audits, assessments, and triage to understand incident nature, scope, complexity, urgency, and impact. o Mitigate potential risks by identifying and remediating vulnerabilities in a timely fashion. o Monitor patches, hot fixes, system change packages, and AV definitions for proper application and compliance with DoD STIGs and information security policies, principles, and practices. o Calibrate tools and interfaces to ensure usability for individuals with varying degrees of technical aptitude. o Maintain a variety of solutions in seamless working order McAfee Host Based Security Suite, Assured Compliance Assessment Solution, and Security Event and Incident Management.
Information Technology Specialist-CUSTSPT, Help Desk Supervisor
DC Army National GuardInformation Technology Specialist-CUSTSPT, Help Desk Supervisor
May. 2016 - Dec. 2016Washington D.C. Metro AreaResolved issues, elevated technical capabilities, and served as an internal consultant to cross-functional military and civilian colleagues. o Advised senior leaders on major aspects of IT system design, including custom functionality and viable alternate approaches. o Guided internal development activities by providing trusted expertise in distribution platform guidelines and capabilities. o Used remote management software tools to maintain and update configurations, protocols, and user / system files. o Minimized operational downtime by troubleshooting issues, diagnosing Level Two problems, and addressing help desk tickets pertaining to desktops, laptops, servers, and LAN / WAN issues. o Leveraged in-depth understanding of end-to-end customer experience management to identify pain points and address latent user needs.
Cyber Health Assessment/Command Cyber Readiness Inspection (CCRI) Asst. Team Lead/Windows Reviewer
National Guard BureauCyber Health Assessment/Command Cyber Readiness Inspection (CCRI) Asst. Team Lead/Windows Reviewer
Dec. 2018 - Jun. 2019Perform traditional security compliance inspections, including Command Cyber Readiness Inspection (CCRI), Site Assistance Visits (SAV), and Cyber Health Assessments using DISA/DOD preferred tools and checklists to support the 54 states/territories and the United States Army Reserves. o Communicate tactical and strategic threat information to senior leaders, Cybersecurity-Ops, Intelligence/Security Community, and Facilities to assist them in making cyber risk decisions and to mitigate threats. o Brief senior leadership on technical vulnerabilities using visual aids to summarize the findings and trend analysis. o Overseeing the work of other Analysts within the Army Cyber Health Assessment Team and the Navy Naval Information Warfare Center (NIWC). o Leverage expertise in oral and written communications to interact with clients and perform technical audits. o Helped create, track and review Plan of Action and Milestones (POA&Ms) and conduct solution identification to assist in problem remediation and resolution. o Assists with implementation of countermeasures or mitigating controls. o Provides guidance and work leadership to less-experienced technical staff members. o Maintains current knowledge of relevant technologies.
CyberCorps Scholarship Recipient
National Science FoundationCyberCorps Scholarship Recipient
Jan. 2017 - May. 2018Arlington, VA
Real Estate Agent
Long & Foster Real Estate, Inc.Real Estate Agent
May. 2015 - May. 2017Springfield, VA
Information Security Analyst (INFOSEC)
U.S. Customs and Border ProtectionInformation Security Analyst (INFOSEC)
Apr. 2014 - Jun. 2016Alexandria, Virginiao Developed, managed, and updated databases, software, and information systems to minimize business interruption. o Executed data processing functions and general management principles in accordance with governing standards. o Prioritized workflows, allocated resources, and managed a ten-person team to deliver superior project outcomes. o Partnered with internal staff and external contractors to resolve IT support cases. o Protected data integrity by defining, documenting, and assigning roles based on information access needs. o Optimized database support for IT applications in compliance with departmental goals and operational needs. o Used Splunk Enterprise to uncover data insights and prepare reports pertaining to processes and information flows. o Prepared meticulous cost / benefit documentation in support of departmental decision-making. o Empowered successful collaboration with contractors and government personnel by translating operational requirements into actionable technology plans. o Protected and promoted the department’s reputation for excellence by serving as the first point of contact to investigate, address, and resolve complex issues. o Used the Remedy ticketing system to prioritize, manage, update, and track customer issues for maximum efficiency. o Balanced proven best practices, creative innovation, and data-driven insights to resolve operational challenges. o Conducted IT application analyses, identified strategic alternatives, and briefed stakeholders on possible solutions.
Military Police
Army National GuardMilitary Police
Dec. 2008 - May. 2016
Diplomatic Security Officer
Intercon SecurityDiplomatic Security Officer
Mar. 2011 - Aug. 2013o Coordinated security logistics to ensure the safety of personnel, assets, buildings, passports, and property. o Monitored processes and technologies for compliance with applicable policies, regulations, and laws. o Cultivated expertise in the effective use of self-defense techniques, security procedures, and weaponry. o Documented and tracked incoming / outgoing activity to ensure the integrity of perimeters and access points. o Managed diplomatic escorts, reviewed access / authorization requests, and carried out other essential front-line security measures.
Intch is a Professional Networking App for the Future of Work
100k+ people
130+ countries
AI matching
See more people like Tasha on Intch
IT
62111 people
15
Data Analyst
8
CEO @ AssetData
18
Jr Cybersecurity analyst @ Anazem company
ITProject Manager
17395 people
20
Chief Technical Officer @ Blackhole Software
15
Business analysts @ National Flood Services
18
Sr Devops Engineer @ Electronic Arts