Cyber

Involved at Strategic, Operational and Tactical levels of Cyber planning and execution

  • Support Echelon I through Echelon III Commands
  • Support ACAT I through ACAT IV program
  • Cybersecurity history through current efforts
    • Task Force Cyber Awakening
    • Cybersecurity Coordination
    • CYBERSAFE
    • IT/IA Technical Advisory Board
    • Cyber Program Objective Memoranda (POM)
    • Cybersecurity Work Force (CSWF)
    • Navy Policy Documents
    • Fleet Cyber Training Symposiums
    • Naval Ships’ Technical Manual 402 “Cybersecurity Operations for Naval Control Systems”
    • OPNAV N2/N6G (2016)
    • Fleet Scan and Patch Summit (2016)
    • WANNACRY (2017)
  • With 20 years of experience across the acquisition life cycle – we know all the Cyber touchpoints, why they matter, and how to serve the warfighter

NAVSEA Headquarters: SEA 05Q

  • Development of NAVSEA 00/05 Cybersecurity policy and procedures, Fleet doctrine, TTPs, education and training programs
  • Development of Fleet metrics – consistency in interpretation and application of cybersecurity policies
  • Cybersecurity program (metrics-based) evaluation capturing Fleet performance / DOTMLPF building blocks
  • Risk Management & RMF implemented on naval machinery control systems (NAV, HM&E & CS) design
  • CYBERSAFE support accounting for cyber risk management through the acquisition lifecycle

COMOPTEVFOR and DOT&E: Operational Test & Evaluation

  • Cybersecurity T&E for ACAT I – ACAT IV Systems Under Test
  • Surface, Subsurface, Aviation, C5ISR, & Expeditionary warfare areas including System of System platforms

Missile Defense Agency: Sea-based X-Band Radar (SBX)

  • Implementing DISA Continuous Monitoring & Risk Scoring (CMRS)
  • Perform as the Information System Security Officer (ISSO)  – Transitioned SBX from DIACAP to RMF
  • Information Assurance Vulnerabilities Management (IAVM) and Patch Management

PEO IWS 10: SSDS Integrated Combat System

  • SSDS system architecture and Cybersecurity enclave design
  • Cybersecurity requirements and compliance oversight
  • Develop and maintain Cybersecurity Program Objective Memorandum (POM) inputs