Education

Bachelors of Science Degree

Bellevue University

Project Management

Associate of Applied Science Degree(s)

Southeast Community College

Manufacturing Engineering
Machine Design with Tool & Die Design

Certifications

DoD Directive 8140.1 (8570.01-M) based on current certifications

CSSP Analyst - CEH
CSSP Auditor - CEH, CISA
CSSP Incident Responder - CEH CSSP Infrastructure Support - CEH
CSSP Manager - CCISO, CISSP-ISSMP
IAM Level I, Level II, and Level III - CCISO, CGRC, CISSP
IASAE Level I and Level II - CISSP
IAT Level I, Level II, and Level III - CISA, CISSP

Project Management Institute, Inc. (PMI) - Project Management Professional (PMP)

Globally recognized and demanded, the PMP® demonstrates that you have the experience, education and competency to lead and direct projects. The PMP recognizes demonstrated competence in leading and directing project teams.

EC-Council - Certified Chief Information Security Officer (C|CISO)

Recognized as having strong technical knowledge, experience and the ability to communicate in business value. C|CISOs understand that their information security decisions often have a direct impact on their organization’s operational cost, efficiency and agility. As organizations introduce new technologies, CCISOs develop and communicate a strategy to avoid the potential risks stemming from their implementation to the organization’s operations.

The five C|CISO Domains are:
Domain 1. Governance (Policy, Legal & Compliance)
Domain 2. IS Management Controls and Auditing Management (Projects, Technology & Operations)
Domain 3. Management – Projects and Operations
Domain 4. Information Security Core Competencies
Domain 5. Strategic Planning & Finance

Credential Link…

(ISC)2 - Information Systems Security Management Professional (CISSP)

Recognized as as a cybersecurity professional with the knowledge, skills and abilities to lead an organization’s information security program.
The eight domains of the CISSP are:
Domain 1. Security and Risk Management
Domain 2. Asset Security
Domain 3. Security Architecture and Engineering
Domain 4. Communication and Network Security
Domain 5. Identity and Access Management (IAM)
Domain 6. Security Assessment and Testing
Domain 7. Security Operations
Domain 8. Software Development Security

(ISC)2 - Information Systems Security Management Professional (ISSMP)

Recognized as a professionals with a far more well-rounded and complete comprehension of information security than other popular management credentials.
The six domains of the ISSMP are:
Domain 1. Leadership and Business Management
Domain 2. Systems Lifecycle Management
Domain 3. Risk Management
Domain 4. Threat Intelligence and Incident Management
Domain 5. Contingency Management
Domain 6. Law, Ethics, and Security Compliance Management

(ISC)2 - Certified Governance, Risk, and Compliance (CGRC)

Recognized as having experience, knowledge and skill in the following areas:
The seven domains of the CGRC are:
Domain 1: Information Security Risk Management Program
Domain 2: Scope of the Information System
Domain 3: Selection and Approval of Security and Privacy Controls
Domain 4: Implementation of Security and Privacy Controls
Domain 5: Assessment/Audit of Security and Privacy Controls
Domain 6: Authorization/Approval of Information System
Domain 7: Continuous Monitoring

EC-Council - Certified Ethical Hacker (C|EH)

Recognized as having exoerience in the network security discipline of Ethical Hacking from a vendor-neutral perspective. A Certified Ethical Hacker certification fortifies the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Credential Link…

ISACA - Certified Information Systems Auditor (CISA)

Information System Auditor

CompTia - Security+

Recognized as having the knowledge and skills necessary to perform core security functions required of any cybersecurity role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection.

Information Technology Infrastructure Library (ITIL) - ITIL Foundation 2011

The Information Technology Infrastructure Library (ITIL) is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011 edition), ITIL is published in a series of five core volumes, each of which covers an ITSM lifecycle stage. ITIL underpins ISO/IEC 20000 (previously BS15000), the International Service Management Standard for IT service management, although differences between the two frameworks do exist. ITIL describes processes, procedures, tasks and checklists that are not organization-specific, used by an organization for establishing integration with the organization's strategy, delivering value and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement and measure. It is used to demonstrate compliance and to measure improvement.

Microsoft - Microsoft Certified Azure Administrator Associate (AZ-104)

Demonstrated ability to describe the following concepts: cloud concepts; core Azure services; core solutions and management tools on Azure; general security and network security features; identity, governance, privacy, and compliance features; and Azure cost management and Service Level Agreements.

Credential Link…

Microsoft - Microsoft Certified Azure Fundamentals (AZ-900)

Demonstrated ability to: Manage Azure identities and governance; Implement and manage storage; Deploy and manage Azure compute resources; Implement and manage virtual networking; and Monitor and maintain Azure resources.

Microsoft - Microsoft Certified Technology Specialist (MCTS), MS Project Professional 2010, Microsoft Certified Professional (MCP)

The MCTS in MS Project 2010 Professional provides proven skills in:
Initializing Project 2010
Create a new project
Create and maintain calendars
Create custom fields
Customize option settings
Creating a Task-Based Schedule
Set up project information
Create and modify a project task structure
Build a logical schedule model
Create a user-controlled schedule
Manage multiple projects
Managing Resources and Assignments
Enter and edit resource information
Apply task types and scheduling calculations
Assign resources, Edit assignments
Manage resource allocation
Manage resource allocations by using Team Planner, Model project costs
Tracking and Analyzing a Project
Set and maintain baselines
Update actual progress
Compare progress against a baseline
Resolve potential schedule problems by using the Task Inspector
Display Critical Path information
Communicating Project Information
Apply views
Customize views
Format views
Share data with external sources
Print schedules and reports

Clearances

Public Trust - U.S. Federal Government

Prior

Department of Interior
U.S. Forest Service
Federal Communications Commission
Department of Homeland Security / Customs Border Patrol

Licences

Amateur Radio License

Federal Communications Commission

Operator Privileges - General - KE0RWC

Associated Skills, Tools, and Techniques

Program/Project Management

Certified Project Management Professional (PMP)
iThoughts Mind Mapping
MS Project Professional- Certified (MCTS)
Federal Emergency Management Agency (FEMA) Certifications
ICS - 100 - Incident Command System (ICS)
ICS - 200 - ICS for Single Resources and Initial Action Incident
ICS - 700 - National Incident Management System (NIMS)
ICS - 800 - National Response Framework
G191 ICS - Emergency Operations Center Interface
State of Colorado Department of Homeland Security and Emergency Management

Emergency Management and Law Enforcement

ARRL PR-101 - Publice Relations 101 for Radio Amateurs
ARRL EC-001-S - Introduction to Emergency Communication
ARRL General Class Accredited Volunteer Examiner (VE)
ARRL Official Emergency Station - ARES R2D3
Colorado Interoperability (CCNC) Overview Training
Colorado Interoperability Training - Module 1
Colorado Interoperability Training - Module 2
Colorado Interoperability Training - Module 3
National Wildfire Coordinating Group (NWCG)
Incident Qualification Card (Red Card)
FFT2 Basic Wildland Firefighter
Colorado Mounted Rangers

Information Technology (IT) Security

Certified IT Security Management Professional (C|CISO, CISSP-ISSMP, CAP, CISA, C|EH, ITIL)
Maintained security measures to protect the PII information of all volunteers on multiple engagements.
Kali Linux (associated tools)

Software Development

Web Application
Learning Management Systems (LMS)

Contact Information

Cookies are not used on this site. You can continue to access this website and there will be no placement of cookies on your device.

Web Hosting provided by SynoTek LLC Cloud Services

Hosted by SynoTek, LLC