Here is my Education, Certifications, Clearances, Licenses, and Associated Skills…


Bachelors of Science Degree

Bellevue University

Project Management

Associate of Applied Science Degree(s)

Southeast Community College

Manufacturing Engineering

Machine Design with Tool & Die Design


DoD Directive 8140.1 (8570.01-M) based on current certifications

CSSP Analyst - CEH

CSSP Auditor - CEH, CISA

CSSP Incident Responder - CEH

CSSP Infrastructure Support - CEH


IAM Level I, Level II, and Level III - CAP, CCISO, CISSP

IASAE Level I and Level II - CISSP

IAT Level I, Level II, and Level III - CISA, CISSP.

EC-Council - Certified Chief Information Security Officer (C|CISO)

The requirements of the CCISO are strong technical knowledge and experience are now even more imperative than ever before but it must be accompanied by the ability to communicate in business value. CCISOs understand that their information security decisions often have a direct impact on their organization’s operational cost, efficiency and agility. As organizations introduce new technologies, CCISOs develop and communicate a strategy to avoid the potential risks stemming from their implementation to the organization’s operations.

CCISOs are certified in the knowledge of and experience in the following CCISO Domains:

Governance (Policy, Legal & Compliance)

IS Management Controls and Auditing Management (Projects, Technology & Operations)

Management – Projects and Operations

Information Security Core Competencies

Strategic Planning & Finance

Project Management Institute, Inc. (PMI) - Project Management Professional (PMP)

PMI’s Project Management Professional (PMP)® credential is the most important industry-recognized certification for project managers. Globally recognized and demanded, the PMP® demonstrates that you have the experience, education and competency to lead and direct projects. The PMP recognizes demonstrated competence in leading and directing project teams.

EC-Council - Certified Ethical Hacker (C|EH)

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification fortifies the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

An Ethical Hacker is an individual who is employed with, or contracted, the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.

This certified CEH professional has proven expertise in:

Introduction to Ethical Hacking

Footprinting and Reconnaissance

Scanning Networks


System Hacking

Trojans and Backdoors

Viruses and Worms


Social Engineering

Denial of Service

Session Hijacking

Hacking Webservers

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Evading IDS, Firewalls, and Honeypots

Buffer Overflow


Penetration Testing

ISACA - Certified Information Systems Auditor (CISA)

Information System Auditor

(ISC)2 - Information Systems Security Management Professional (CISSP-ISSMP)

This CISSP-ISSMP requires that the certified professional to have verifiable experience in the area of security management, considering it on a larger enterprise-wide security model. The professional must have the knowledge of deeper managerial elements such as project management, risk management, setting up and delivering a security awareness program, and managing a Business Continuity Planning program. A CISSP-ISSMP establishes, presents and governs information security programs demonstrating management and leadership skills.Typically the CISSP-ISSMP professional will be responsible for constructing the framework of the information security department and define the means of supporting the group internally.

CISSP-ISSMP professionals have a far more well-rounded and complete comprehension of information security than other popular management credentials.

The five domains of the CISSP-ISSMP are:

Security Leadership and Management

Security Lifecycle Management

Security Compliance Management

Contingency ManagementLaw


Incident Management

(ISC)2 - Certified Authorization Professional (CAP)

The Certified Authorization Professional (CAP) must have experience, knowledge and skill in the following areas:

Risk Management Framework (RMF)

Categorization of Information Systems

Selection of Security Controls

Security Control Implementation

Security Control Assessment

Information System Authorization

Monitoring of Security Controls

Technical and/or auditing experience within the U.S. Federal government agencies (e.g., U.S. Department of Defense etc.), financial institutions, health care providers, auditing and/or consulting organizations.

Strong familiarity with NIST and OMB publications

Information Technology Infrastructure Library (ITIL) - ITIL Foundation 2011

The Information Technology Infrastructure Library (ITIL) is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011 edition), ITIL is published in a series of five core volumes, each of which covers an ITSM lifecycle stage. ITIL underpins ISO/IEC 20000 (previously BS15000), the International Service Management Standard for IT service management, although differences between the two frameworks do exist.

ITIL describes processes, procedures, tasks and checklists that are not organization-specific, used by an organization for establishing integration with the organization's strategy, delivering value and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement and measure. It is used to demonstrate compliance and to measure improvement.

Microsoft - Microsoft Certified Technology Specialist )MCTS), MS Project Professional 2010, Microsoft Certified Professional (MCP)

The MCTS in MS Project 2010 Professional provides proven skills in:

Initializing Project 2010

Create a new project

Create and maintain calendars

Create custom fields

Customize option settings

Creating a Task-Based Schedule

Set up project information

Create and modify a project task structure

Build a logical schedule model

Create a user-controlled schedule

Manage multiple projects

Managing Resources and Assignments

Enter and edit resource information

Apply task types and scheduling calculations

Assign resources, Edit assignments

Manage resource allocation

Manage resource allocations by using Team Planner, Model project costs

Tracking and Analyzing a Project

Set and maintain baselines

Update actual progress

Compare progress against a baseline

Resolve potential schedule problems by using the Task Inspector

Display Critical Path information

Communicating Project Information

Apply views

Customize views

Format views

Share data with external sources

Print schedules and reports


Public Trust - U.S. Federal Government


Department of Interior

U.S. Forest Service

Federal Communications Commission

Department of Homeland Security / Customs Border Patrol


Amateur Radio License

Federal Communications Commission

Operator Privileges - General - KE0RWC

Associated Skills, Tools, and Techniques

Program/Project Management

Certified Project Management Professional (PMP)

iThoughts Mind Mapping

MS Project Professional- Certified (MCTS)

Federal Emergency Management Agency (FEMA) Certifications

ICS - 100 - Incident Command System (ICS)

ICS - 200 - ICS for Single Resources and Initial Action Incident

ICS - 700 - National Incident Management System (NIMS)

ICS - 800 - National Response Framework

G191 ICS - Emergency Operations Center Interface

State of Colorado Department of Homeland Security and Emergency Management

Radio Communications

ARRL PR-101 - Publice Relations 101 for Radio Amateurs

ARRL EC-001-S - Introduction to Emergency Communication

ARRL General Class Accredited Volunteer Examiner (VE)

ARRL Official Emergency Station - ARES R2D3

Colorado Interoperability (CCNC) Overview Training

Colorado Interoperability Training - Module 1

Colorado Interoperability Training - Module 2

Colorado Interoperability Training - Module 3

National Wildfire Coordinating Group (NWCG)

Incident Qualification Card (Red Card)

FFT2 Basic Wildland Firefighter

Information Technology (IT) Security

Certified IT Security Management Professional (C|CISO, CISSP-ISSMP, CAP, CISA, C|EH, ITIL)

Maintained security measures to protect the PII information of all volunteers on multiple engagements.

Kali Linux (associated tools)

Software Development

Web Application

Learning Management Systems (LMS)

Law Enforcement Trafic Control

Colorado Mounted Rangers

Radio Communications Equipment

Wouxun Quad Band Mobile/Base Transceiver w/ Crossband Repeater



70 cm: 400.000 - 479.995 MHz


2 m: 108.000 - 179.995 MHz

6 m: 50.000 - 53.998 MHz


10 m: 26.000 - 29.995 MHz


320.000 - 349.995 MHz


700.000 - 985.000 MHz


UHF - 40W

70 cm: 400.000 - 479.995 MHz

VHF - 50W

2 m: 136.000 - 174.995 MHz

6 m: 50.000 - 53.995 MHz

HF - 50W

10 m: 26.000 - 29.995 MHz

Anytone D878UV Plus HT w/ GPS and DMR



2m 136.0000 - 174.0000 MHz

UHF - 6W

400.0000 - 480.0000 MHz

Relm VHF HT (2 Units)


VHF - 5W

2 m: 136.000 - 174.000 MHz