Here is my Certifications and Education History…

EC-Council - Certified Chief Information Security Officer (C|CISO)

The requirements of the CCISO are strong technical knowledge and experience are now even more imperative than ever before but it must be accompanied by the ability to communicate in business value. CCISOs understand that their information security decisions often have a direct impact on their organization’s operational cost, efficiency and agility. As organizations introduce new technologies, CCISOs develop and communicate a strategy to avoid the potential risks stemming from their implementation to the organization’s operations.

CCISOs are certified in the knowledge of and experience in the following CCISO Domains:

Governance (Policy, Legal & Compliance)

IS Management Controls and Auditing Management (Projects, Technology & Operations)

Management – Projects and Operations

Information Security Core Competencies

Strategic Planning & Finance

Project Management Institute, Inc. (PMI) - Project Management Professional (PMP)

PMI’s Project Management Professional (PMP)® credential is the most important industry-recognized certification for project managers. Globally recognized and demanded, the PMP® demonstrates that you have the experience, education and competency to lead and direct projects. The PMP recognizes demonstrated competence in leading and directing project teams.

EC-Council - Certified Ethical Hacker (C|EH)

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification fortifies the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

An Ethical Hacker is an individual who is employed with, or contracted, the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.

This certified CEH professional has proven expertise in:

Introduction to Ethical Hacking

Footprinting and Reconnaissance

Scanning Networks

Enumeration

System Hacking

Trojans and Backdoors

Viruses and Worms

Sniffers

Social Engineering

Denial of Service

Session Hijacking

Hacking Webservers

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Evading IDS, Firewalls, and Honeypots

Buffer Overflow

Cryptography

Penetration Testing

ISACA - Certified Information Systems Auditor (CISA)

Information System Auditor

(ISC)2 - Information Systems Security Management Professional (CISSP-ISSMP)

This CISSP-ISSMP requires that the certified professional to have verifiable experience in the area of security management, considering it on a larger enterprise-wide security model. The professional must have the knowledge of deeper managerial elements such as project management, risk management, setting up and delivering a security awareness program, and managing a Business Continuity Planning program. A CISSP-ISSMP establishes, presents and governs information security programs demonstrating management and leadership skills.Typically the CISSP-ISSMP professional will be responsible for constructing the framework of the information security department and define the means of supporting the group internally.

CISSP-ISSMP professionals have a far more well-rounded and complete comprehension of information security than other popular management credentials.

The five domains of the CISSP-ISSMP are:

Security Leadership and Management

Security Lifecycle Management

Security Compliance Management

Contingency ManagementLaw

Ethics

Incident Management

(ISC)2 - Certified Authorization Professional (CAP)

The Certified Authorization Professional (CAP) must have experience, knowledge and skill in the following areas:

Risk Management Framework (RMF)

Categorization of Information Systems

Selection of Security Controls

Security Control Implementation

Security Control Assessment

Information System Authorization

Monitoring of Security Controls

Technical and/or auditing experience within the U.S. Federal government agencies (e.g., U.S. Department of Defense etc.), financial institutions, health care providers, auditing and/or consulting organizations.

Strong familiarity with NIST and OMB publications

Information Technology Infrastructure Library (ITIL) - ITIL Foundation 2011

The Information Technology Infrastructure Library (ITIL) is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011 edition), ITIL is published in a series of five core volumes, each of which covers an ITSM lifecycle stage. ITIL underpins ISO/IEC 20000 (previously BS15000), the International Service Management Standard for IT service management, although differences between the two frameworks do exist.

ITIL describes processes, procedures, tasks and checklists that are not organization-specific, used by an organization for establishing integration with the organization's strategy, delivering value and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement and measure. It is used to demonstrate compliance and to measure improvement.

Microsoft - Microsoft Certified Technology Specialist )MCTS), MS Project Professional 2010, Microsoft Certified Professional (MCP)

The MCTS in MS Project 2010 Professional provides proven skills in:

Initializing Project 2010

Create a new project

Create and maintain calendars

Create custom fields

Customize option settings

Creating a Task-Based Schedule

Set up project information

Create and modify a project task structure

Build a logical schedule model

Create a user-controlled schedule

Manage multiple projects

Managing Resources and Assignments

Enter and edit resource information

Apply task types and scheduling calculations

Assign resources, Edit assignments

Manage resource allocation

Manage resource allocations by using Team Planner, Model project costs

Tracking and Analyzing a Project

Set and maintain baselines

Update actual progress

Compare progress against a baseline

Resolve potential schedule problems by using the Task Inspector

Display Critical Path information

Communicating Project Information

Apply views

Customize views

Format views

Share data with external sources

Print schedules and reports

Bellevue University - Bachelors of Science Degree, Project Management.

Southeast Community College - Associate of Applied Science Degree, Manufacturing Engineering

Southest Community College - Associate of Applied Science Degree, Machine Design with Tool & Die Design

Associated Skills, Tools, and Techniques

Proram/Project Management

Certified Project Management Professional (PMP)

iThoughts Mind Mapping

MS Project Professional- Certified (MCTS)

Federal Emergency Management Agency (FEMA) Certifications

ICS - 100 - Incident Command System (ICS)

ICS - 200 - ICS for Single Resources and Initial Action Incident

ICS - 700 - National Incident Management System (NIMS)

ICS - 800 - National Response Framework

G191 ICS - Emergency Operations Center Interface

State of Colorado Department of Homeland Security and Emergency Management

Radio Communications

Amateur Radio License, General - KE0RWC

ARRL ARES Public Informatioin Officer (PIO)

ARRL General Class Accredited Volunteer Examiner (VE)

ARRL Official Emergency Station - ARES R2D3

Colorado Interoperability (CCNC) Overview Training

Colorado Interoperability Training - Module 1

Colorado Interoperability Training - Module 2

Colorado Interoperability Training - Module 3

National Wildfire Coordinating Group (NWCG)

Incident Qualification Card (Red Card)

FFT2 Basic Wildland Firefighter

Information Technology (IT) Security

Certified IT Security Management Professional (C|CISO, CISSP-ISSMP, CAP, CISA, C|EH, ITIL)

Maintained security measures to protect the PII information of all volunteers on multiple engagements.

Kali Linux (associated tools)

Software Development

Web Application

Learning Management Systems (LMS)

Law Enforcement Trafic Control

Colorado Mounted Rangers

Radio Communications Equipment

Wouxun Quad Band Mobile/Base Transceiver w/ Crossband Repeater

Receive:

UHF

70 cm: 400.000 - 479.995 MHz

VHF

2 m: 108.000 - 179.995 MHz

6 m: 50.000 - 53.998 MHz

HF

10 m: 26.000 - 29.995 MHz

AM

320.000 - 349.995 MHz

FM

700.000 - 985.000 MHz

Transmit:

UHF - 40W

70 cm: 400.000 - 479.995 MHz

VHF - 50W

2 m: 136.000 - 174.995 MHz

6 m: 50.000 - 53.995 MHz

HF - 50W

10 m: 26.000 - 29.995 MHz

Anytone D878UV Plus HT w/ GPS and DMR

Receive/Transmit

VHF- 7W

2m 136.0000 - 174.0000 MHz

UHF - 6W

400.0000 - 480.0000 MHz

Relm VHF HT (2 Units)

Receive/Transmit:

VHF - 5W

2 m: 136.000 - 174.000 MHz