CISSP & CISM Certified Info System Security Pro
Multi-certified Info System Security Pro seeks employment. Have certifications CISSP and CISM (Certified Info Security Manager - ISACA.org).
For credentials, see CISSP+CISM WIKI: http://cisspcism.pbwiki.com/
For commentary, see http://itdefpat.blogspot.com
To see my TOP links, see http://del.icio.us/president_cFL_ISSA
or
for the top 104 infosec links
via RSS
http://del.icio.us/rss/itdefpat/infosec
About Me
- Name: IT Defense Patrol
- Location: Orlando, Florida, United States
Certifications: CISSP, CISM LinkedIn http://www.linkedin.com/pub/2/267/926 (Most info, contacts) PeopleAggregator http://peopleaggregator.net/user.php?tier_one=mypage&tier_two=public_page&uid=1371 (Prettiest) VOX http://gmotu.vox.com/
Monday, October 16, 2006
Sunday, October 08, 2006
CISM Body of Knowlege/Domains
• Risk management
• Information security program(me) management
• Information security management
• Response management
Friday, October 06, 2006
Oh, my words!
Risk,vulnerability,regulations,standards,ISO,Polic,Architect,Assessment,
audit,firewall,intrusion,control,network
Tuesday, October 03, 2006
Overview
Current:
Lockheed Martin (1997)2003-present
Joint Strike Fighter F-35 Program Autonomic Logistic Information System (ALIS)
Expertise:
- Information Assurance (Governance) - policy, procedure, standards, compliance
- Requirements - creation, revision and validation
- Information Security analysis - requirements, initial design, architecture
- Information Security - Network and Operating system protections (firewall, intrusion, virus, permissions)
- Value: Cost/Technology/Schedule - Program Estimate at Completion, Risk, Basis of Estimate
- CISSP - (ISC)2, 2005
- CISM - ISACA, 2005
- Information System Security Association (ISSA), Central Florida Chapter President 2006
- Information Systems Audit and Control Association (ISACA), 2005 Board
- International Council on Systems Engineering (INCOSE), Orlando Chapter Secretary 2006
- ISC2 CISSP Exam Supervisor
Qualifications
- CISSP
- CISM
Other
- US DoD Clearance
- Top Secret (active)
- NATO access
- Foreign Government Information
Monday, October 02, 2006
Works, Writings and Publications
- Development of policies, procedures and architecture.
- Development and implementation of information technology security methodologies, protocols and technologies (encryption, firewall, technical policies and configurations).
- Analysis of applicable regulation and standards such various ISO (e.g. 17799) and NIST (e.g. FIPS and SPs)
Compare to guidance, regulation, standards and policies.
Create appopriate policies and/or requirements statements.
Analyze existing requirements for appropriateness, parentage, and allocation.
Occasional expert reference source for publications such as Information Security Magazine, SearchSecurity.com, and Certification Magazine. Occasionally quoted by such on industry issues.
Standards, Regulations, Guidance and Policy
- IETF, IEEE, ISO and other relevant standards
- NASA and DoD standards, policies handbooks and guidelines, expecially DoD 8500 and related.
- Federal Information Processing Standards (FIPS), NIST, OMB, White House and GAO Standards and Practices
- Public Law (P.L.) 100-235, "Computer Security Act of 1987"
- Office of Management and Budget Circular No. A-130, "Management of Federal Information Resources"
- P.L. 106-398, Government Information Security Reform Act (The Security Act of 2000).
- DITSCAP by inference of the above citations
- HIPAA
- Sarbanes-Oxley
- FISMA
Key Technologies
- Firewall; Intrusion detection; Virtual Private Networks, Public Key Infrastructure, and cryptography;
- Perimeter Security and Vulnerability Assessment:
- Used tools such as ISS Internet Scanner, Nmap, Cheops and Nessus.
- Deploy security systems and devices (firewalls, intrusion sensors).
- Networks:
- Network security technology and practices - routers, firewalls, etc. Configuration, rules, ACLs, protocols, ports.
- General Security Functions - anti-virus/malicious, vulnerability management (scanners, security evaluation testing, penetration testing), intrusion controls, VPNs, encryption
- DNS
- VLAN
- IP network design
- Operating Systems
- Windows
- Web Server configuration, especially security managment of services, port, protocols
- Operating System secure configuration - services, ports, protocols, permissions/shares
Experience (1)
Lockheed Martin Simulation, Training & Support
09/27/2003-Present
Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal.
Includes Requirements analysis for system-wide and subsystem allocation. Analyze and interpret requirements proposed from higher tier organizations.
Experience (2)
Network Security Strategic Design:
apply current and new technologies to the design, development, evaluation, and integration of System Security.
Interact with senior internal and external personnel on significant matters requiring coordination between internal groups and other organizations.
Apply regulations and standards based on a full and competent knowledge of governmental, industry and best practices and principles.
See list below.
Demonstrated participation and leadership within several Information Security focused organizations and publications
Experience (3)
System Engineering in support of developing the System Security Architecture.
Investigated various technologies and methodologies in order to provide most effective solution based on cost, schedule and technical measures. Provided and proposed architectures:
• Infrastructure Defense, Design Integration and System Analysis:
Worked with interdisciplinary Teams to develop Security Architectures.
Contributing author to Security Architecture
Architecture Development (e.g. DoD Architecture Framework, NATO NC3TA, Open Group TOGAF, etc.)
Experience (4)
Provide direction on Threat Management, Identification Management.
Support for program financial planning (“Estimate At Completion”) and sub-project pre-proposal.
Reviewed and revised Program Security Requirements, contract analysis; gap analysis
• Program Internationalization Sub-Project
Analysis of multi-national requirements and standards.
Utilized NATO C3 Technical Architecture to create sub-project architecture
Designed preliminary estimate for technical elements.
Correlated ISO standards (
System engineering costing estimation:
Estimation of effort of multiple tasks over various periods to occur during seven e year period.