Education
Bachelors of Science Degree
Bellevue University
Project Management
Associate of Applied Science Degree(s)
Southeast Community College
Manufacturing Engineering
Machine Design with Tool & Die Design
Certifications
DoD Directive 8140.1 (8570.01-M) based on current certifications
CSSP Analyst - CEH
CSSP Auditor - CEH, CISA
CSSP Incident Responder - CEH
CSSP Infrastructure Support - CEH
CSSP Manager - CCISO, CISSP-ISSMP
IAM Level I, Level II, and Level III - CCISO, CGRC, CISSP
IASAE Level I and Level II - CISSP
IAT Level I, Level II, and Level III - CISA, CISSP
Project Management Institute, Inc. (PMI) - Project Management Professional (PMP)
Globally recognized and demanded, the PMP® demonstrates that you have the experience, education and competency to lead and direct projects. The PMP recognizes demonstrated competence in leading and directing project teams.
EC-Council - Certified Chief Information Security Officer (C|CISO)
Recognized as having strong technical knowledge, experience and the ability to communicate in business value. C|CISOs understand that their information security decisions often have a direct impact on their organization’s operational cost, efficiency and agility. As organizations introduce new technologies, CCISOs develop and communicate a strategy to avoid the potential risks stemming from their implementation to the organization’s operations.
The five C|CISO Domains are:
Domain 1. Governance (Policy, Legal & Compliance)
Domain 2. IS Management Controls and Auditing Management (Projects, Technology & Operations)
Domain 3. Management – Projects and Operations
Domain 4. Information Security Core Competencies
Domain 5. Strategic Planning & Finance
(ISC)2 - Information Systems Security Management Professional (CISSP)
Recognized as as a cybersecurity professional with the knowledge, skills and abilities to lead an organization’s information security program.
The eight domains of the CISSP are:
Domain 1. Security and Risk Management
Domain 2. Asset Security
Domain 3. Security Architecture and Engineering
Domain 4. Communication and Network Security
Domain 5. Identity and Access Management (IAM)
Domain 6. Security Assessment and Testing
Domain 7. Security Operations
Domain 8. Software Development Security
(ISC)2 - Information Systems Security Management Professional (ISSMP)
Recognized as a professionals with a far more well-rounded and complete comprehension of information security than other popular management credentials.
The six domains of the ISSMP are:
Domain 1. Leadership and Business Management
Domain 2. Systems Lifecycle Management
Domain 3. Risk Management
Domain 4. Threat Intelligence and Incident Management
Domain 5. Contingency Management
Domain 6. Law, Ethics, and Security Compliance Management
(ISC)2 - Certified Governance, Risk, and Compliance (CGRC)
Recognized as having experience, knowledge and skill in the following areas:
The seven domains of the CGRC are:
Domain 1: Information Security Risk Management Program
Domain 2: Scope of the Information System
Domain 3: Selection and Approval of Security and Privacy Controls
Domain 4: Implementation of Security and Privacy Controls
Domain 5: Assessment/Audit of Security and Privacy Controls
Domain 6: Authorization/Approval of Information System
Domain 7: Continuous Monitoring
EC-Council - Certified Ethical Hacker (C|EH)
Recognized as having exoerience in the network security discipline of Ethical Hacking from a vendor-neutral perspective. A Certified Ethical Hacker certification fortifies the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
ISACA - Certified Information Systems Auditor (CISA)
Information System Auditor
CompTia - Security+
Recognized as having the knowledge and skills necessary to perform core security functions required of any cybersecurity role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection.
Information Technology Infrastructure Library (ITIL) - ITIL Foundation 2011
The Information Technology Infrastructure Library (ITIL) is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011 edition), ITIL is published in a series of five core volumes, each of which covers an ITSM lifecycle stage. ITIL underpins ISO/IEC 20000 (previously BS15000), the International Service Management Standard for IT service management, although differences between the two frameworks do exist. ITIL describes processes, procedures, tasks and checklists that are not organization-specific, used by an organization for establishing integration with the organization's strategy, delivering value and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement and measure. It is used to demonstrate compliance and to measure improvement.
Microsoft - Microsoft Certified Azure Administrator Associate (AZ-104)
Demonstrated ability to describe the following concepts: cloud concepts; core Azure services; core solutions and management tools on Azure; general security and network security features; identity, governance, privacy, and compliance features; and Azure cost management and Service Level Agreements.
Microsoft - Microsoft Certified Azure Fundamentals (AZ-900)
Demonstrated ability to: Manage Azure identities and governance; Implement and manage storage; Deploy and manage Azure compute resources; Implement and manage virtual networking; and Monitor and maintain Azure resources.
Plesk - Pleask Obsidian Associate
Associate level certification is granted to those who proved their basic knowledge of Plesk Obsidian, its licensing, and the Plesk Partner Program. Demonstrated ability to be able to design a managed hosting service with Plesk and its extensions.
Microsoft - Microsoft Certified Technology Specialist (MCTS), MS Project Professional 2010, Microsoft Certified Professional (MCP)
The MCTS in MS Project 2010 Professional provides proven skills in:
Initializing Project 2010
Create a new project
Create and maintain calendars
Create custom fields
Customize option settings
Creating a Task-Based Schedule
Set up project information
Create and modify a project task structure
Build a logical schedule model
Create a user-controlled schedule
Manage multiple projects
Managing Resources and Assignments
Enter and edit resource information
Apply task types and scheduling calculations
Assign resources, Edit assignments
Manage resource allocation
Manage resource allocations by using Team Planner, Model project costs
Tracking and Analyzing a Project
Set and maintain baselines
Update actual progress
Compare progress against a baseline
Resolve potential schedule problems by using the Task Inspector
Display Critical Path information
Communicating Project Information
Apply views
Customize views
Format views
Share data with external sources
Print schedules and reports
Clearances
Public Trust - U.S. Federal Government
Prior
Department of Interior
U.S. Forest Service
Federal Communications Commission
Department of Homeland Security / Customs Border Patrol
Licences
Amateur Radio License
Federal Communications Commission
Operator Privileges - General - KE0RWC
Associated Skills, Tools, and Techniques
Program/Project Management
Certified Project Management Professional (PMP)
iThoughts Mind Mapping
MS Project Professional- Certified (MCTS)
Federal Emergency Management Agency (FEMA) Certifications
ICS - 100 - Incident Command System (ICS)
ICS - 200 - ICS for Single Resources and Initial Action Incident
ICS - 700 - National Incident Management System (NIMS)
ICS - 800 - National Response Framework
G191 ICS - Emergency Operations Center Interface
State of Colorado Department of Homeland Security and Emergency Management
Emergency Management and Law Enforcement
ARRL PR-101 - Publice Relations 101 for Radio Amateurs
ARRL EC-001-S - Introduction to Emergency Communication
ARRL General Class Accredited Volunteer Examiner (VE)
ARRL Official Emergency Station - ARES R2D3
Colorado Interoperability (CCNC) Overview Training
Colorado Interoperability Training - Module 1
Colorado Interoperability Training - Module 2
Colorado Interoperability Training - Module 3
National Wildfire Coordinating Group (NWCG)
Incident Qualification Card (Red Card)
FFT2 Basic Wildland Firefighter
Colorado Mounted Rangers
Information Technology (IT) Security
Certified IT Security Management Professional (C|CISO, CISSP-ISSMP, CAP, CISA, C|EH, ITIL)
Maintained security measures to protect the PII information of all volunteers on multiple engagements.
Kali Linux (associated tools)
Software Development
Web Application
Learning Management Systems (LMS)