Bachelors of Science Degree

Bellevue University

Project Management

Associate of Applied Science Degree(s)

Southeast Community College

Manufacturing Engineering
Machine Design with Tool & Die Design


DoD Directive 8140.1 (8570.01-M) based on current certifications

CSSP Analyst - CEH
CSSP Auditor - CEH, CISA
CSSP Incident Responder - CEH CSSP Infrastructure Support - CEH
IAM Level I, Level II, and Level III - CCISO, CGRC, CISSP
IASAE Level I and Level II - CISSP
IAT Level I, Level II, and Level III - CISA, CISSP

EC-Council - Certified Chief Information Security Officer (C|CISO)

The requirements of the CCISO are strong technical knowledge and experience are now even more imperative than ever before but it must be accompanied by the ability to communicate in business value. CCISOs understand that their information security decisions often have a direct impact on their organization’s operational cost, efficiency and agility. As organizations introduce new technologies, CCISOs develop and communicate a strategy to avoid the potential risks stemming from their implementation to the organization’s operations.

CCISOs are certified in the knowledge of and experience in the following CCISO Domains:
Governance (Policy, Legal & Compliance)
IS Management Controls and Auditing Management (Projects, Technology & Operations)
Management – Projects and Operations
Information Security Core Competencies
Strategic Planning & Finance

Project Management Institute, Inc. (PMI) - Project Management Professional (PMP)

PMI’s Project Management Professional (PMP)® credential is the most important industry-recognized certification for project managers. Globally recognized and demanded, the PMP® demonstrates that you have the experience, education and competency to lead and direct projects. The PMP recognizes demonstrated competence in leading and directing project teams.

EC-Council - Certified Ethical Hacker (C|EH)

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification fortifies the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
An Ethical Hacker is an individual who is employed with, or contracted, the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.

ISACA - Certified Information Systems Auditor (CISA)

Information System Auditor

(ISC)2 - Information Systems Security Management Professional (CISSP-ISSMP)

This CISSP-ISSMP requires that the certified professional to have verifiable experience in the area of security management, considering it on a larger enterprise-wide security model. The professional must have the knowledge of deeper managerial elements such as project management, risk management, setting up and delivering a security awareness program, and managing a Business Continuity Planning program. A CISSP-ISSMP establishes, presents and governs information security programs demonstrating management and leadership skills.Typically the CISSP-ISSMP professional will be responsible for constructing the framework of the information security department and define the means of supporting the group internally.

CISSP-ISSMP professionals have a far more well-rounded and complete comprehension of information security than other popular management credentials.
The five domains of the CISSP-ISSMP are:
Security Leadership and Management
Security Lifecycle Management
Security Compliance Management
Contingency Management Law
Incident Management

(ISC)2 - Certified Governance, Risk, and Compliance (CGRC)

The Certified Governance, Risk, and Compliance (CGRC) must have experience, knowledge and skill in the following areas:
Risk Management Framework (RMF)
Categorization of Information Systems
Selection of Security Controls
Security Control Implementation
Security Control Assessment
Information System Authorization
Monitoring of Security Controls
Technical and/or auditing experience within the U.S. Federal government agencies (e.g., U.S. Department of Defense etc.), financial institutions, health care providers, auditing and/or consulting organizations. Strong familiarity with NIST and OMB publications

CompTia - Security+

CompTia Security+ certifiction earners have the knowledge and skills necessary to perform core security functions required of any cybersecurity role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection.

Information Technology Infrastructure Library (ITIL) - ITIL Foundation 2011

The Information Technology Infrastructure Library (ITIL) is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011 edition), ITIL is published in a series of five core volumes, each of which covers an ITSM lifecycle stage. ITIL underpins ISO/IEC 20000 (previously BS15000), the International Service Management Standard for IT service management, although differences between the two frameworks do exist. ITIL describes processes, procedures, tasks and checklists that are not organization-specific, used by an organization for establishing integration with the organization's strategy, delivering value and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement and measure. It is used to demonstrate compliance and to measure improvement.

Microsoft - Microsoft Certified Azure Fundamentals (AZ-900)

Demonstrated ability to describe the following concepts: cloud concepts; core Azure services; core solutions and management tools on Azure; general security and network security features; identity, governance, privacy, and compliance features; and Azure cost management and Service Level Agreements.

Microsoft - Microsoft Certified Technology Specialist (MCTS), MS Project Professional 2010, Microsoft Certified Professional (MCP)

The MCTS in MS Project 2010 Professional provides proven skills in:
Initializing Project 2010
Create a new project
Create and maintain calendars
Create custom fields
Customize option settings
Creating a Task-Based Schedule
Set up project information
Create and modify a project task structure
Build a logical schedule model
Create a user-controlled schedule
Manage multiple projects
Managing Resources and Assignments
Enter and edit resource information
Apply task types and scheduling calculations
Assign resources, Edit assignments
Manage resource allocation
Manage resource allocations by using Team Planner, Model project costs
Tracking and Analyzing a Project
Set and maintain baselines
Update actual progress
Compare progress against a baseline
Resolve potential schedule problems by using the Task Inspector
Display Critical Path information
Communicating Project Information
Apply views
Customize views
Format views
Share data with external sources
Print schedules and reports


Public Trust - U.S. Federal Government


Department of Interior
U.S. Forest Service
Federal Communications Commission
Department of Homeland Security / Customs Border Patrol


Amateur Radio License

Federal Communications Commission

Operator Privileges - General - KE0RWC

Associated Skills, Tools, and Techniques

Program/Project Management

Certified Project Management Professional (PMP)
iThoughts Mind Mapping
MS Project Professional- Certified (MCTS)
Federal Emergency Management Agency (FEMA) Certifications
ICS - 100 - Incident Command System (ICS)
ICS - 200 - ICS for Single Resources and Initial Action Incident
ICS - 700 - National Incident Management System (NIMS)
ICS - 800 - National Response Framework
G191 ICS - Emergency Operations Center Interface
State of Colorado Department of Homeland Security and Emergency Management

Emergency Management and Law Enforcement

ARRL PR-101 - Publice Relations 101 for Radio Amateurs
ARRL EC-001-S - Introduction to Emergency Communication
ARRL General Class Accredited Volunteer Examiner (VE)
ARRL Official Emergency Station - ARES R2D3
Colorado Interoperability (CCNC) Overview Training
Colorado Interoperability Training - Module 1
Colorado Interoperability Training - Module 2
Colorado Interoperability Training - Module 3
National Wildfire Coordinating Group (NWCG)
Incident Qualification Card (Red Card)
FFT2 Basic Wildland Firefighter
Colorado Mounted Rangers

Information Technology (IT) Security

Certified IT Security Management Professional (C|CISO, CISSP-ISSMP, CAP, CISA, C|EH, ITIL)
Maintained security measures to protect the PII information of all volunteers on multiple engagements.
Kali Linux (associated tools)

Software Development

Web Application
Learning Management Systems (LMS)

Contact Information

Cookies are not used on this site. You can continue to access this website and there will be no placement of cookies on your device.

Web Hosting provided by SynoTek LLC Cloud Services

Hosted by SynoTek, LLC