Summary
Overview
Work History
Education
Additional Information
Timeline
Generic

Joshua Todd

Cyber Systems Security Engineer Sr.
Colorado Springs

Summary

United States Navy Veteran with a strong commitment to hard work and dedication. With over 18 Years of Information Technology experience related to Department of Defense Information systems across multiple military bases in Japan, Hawaii, San Diego and Colorado Springs. Looking to expand and grow with a team.

Overview

18
18
years of professional experience
5
5
years of post-secondary education

Work History

Cybersecurity Specialist

Amentum
01.2024 - Current
  • Managed, Maintained, Improved ACAS and Trellix ESS Suite Products to include Security Center, Nessus Manager, Nessus Agents for AIE JPOP, AIE KPOP, IMDEE, UPOP.
  • Performed ISSO duties with the use of Defense Information Systems Agency’s (DISA) Enterprise Mission Assurance Support Service (eMASS) related to the National Institute of Standards and Technology (NIST) Controls and control families applying them to Plan of Action and Milestones (POAMS) and Risk acceptance criteria's helping facilitate the approval of system Authority to Operate (ATO) and the DISA Certification and Accreditation (C&A) processes. Utilizing ACAS Security Technical Implementation Guides (STIG) Scans and STIG checklist and SCAP compliance checker to addressed high priority CTO's from Defense Information Systems Agency (DISA).
  • Created vulnerability reports providing awareness with ACAS and Trellix ESS by collaborating with enclave System Administrators utilizing CCRI and Rack N Stack Reports to address vulnerability issues within enclave devices.
  • Maintain ARCSight connections for IMDEE, UPOP. Providing ARCSight logs for AIE JPOP, AIE KPOP.
  • CDS Auditor for cross domain solution that allow controlled data exchange between networks with different security classifications, often involving specialized hardware and software solutions, while adhering to strict government regulations and security standards, typically used in highly sensitive environments like defense or intelligence agencies

IAM / Cyberark / Dilenia

Jacobs
10.2021 - 01.2024
  • Experienced in Identity and access management (IAM) Privileged Access Management (PAM) tools with deployment, configuration, integration and troubleshooting CyberArk Privileged Account Security product suite - Enterprise Password Vault, Password Vault Web Access, Central Policy Manager, Privileged Session Manager, Application Identity Manager, and Privileged Threat Analytics.
  • Experienced in utilizing CyberArk to address NIST 800-53 Rev 4 Acess Control families AC-1, AC-2, AC-x (varius) within emass.
  • Experienced in Privileged Access Management related to security solutions involving managing policies and platforms, creating and assigning safes,
    reconciling accounts, rotating passwords.
  • Experienced in IAM/PAM tools Dilenia (also known as Thycotic / Centrify) Management of access accounts. Creating a deployment plan to enhance Dilenia features to add Session connections, Password rotation features, Video Auditing of privileged sessions. Experienced in deploying additional service/servers to meet IAM/PAM
    requirements to include Secret Server SQL, Secret Server IIS, Rabbit MQ
    Messaging Bus, Distrubuted Engin

Application Engineer

Cabrillo Technologies
11.2019 - 10.2021
  • Perform on/off duty and weekend system, to scheduled and unscheduled, planned and short‐notice MDA test events
  • Assist in developing Certification and Accreditation (C&A) documentation for new and existing systems
  • Provide support with performing security analysis of operational and development environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted industry and government standards Develop certification and accreditation (C&A) documentation for new and existing systems Advises the customer and staff of applicability of multiple frameworks, such as the Unified Architecture Framework (UAF), Risk Management Framework (RMF), and Zachman’s Enterprise Architecture (EA) Framework
  • CANES application developers provide guidance, recommendations and feedback during the design and implementation of technical solutions, as well as supporting test event conduct
  • Continuous integration is performed throughout the entire development cycle through the execution of the AI CONOPS
  • Canes Software 2.0.0/ 2.0.1/ 3.0 / 4.0 Application Integration software automation utilizing CANES Hacsim and Powershell commands
  • Responsibilities include investigation, analysis and documentation of system requirements for CANES applications to insure that functional needs are satisfied, and that new and legacy systems align with the SoS architecture Canes Software 2.0.0/ 2.0.1/ 3.0 / 4.0 Hacsim configuration management and develop powershell automation via use of website CM tools such as CMPRO and Sailor
  • Other Customer Funds (OCF) Military Sealift Command Application Integration Engineer providing technical guidance creating Feasibility Assessment Briefs as well as interfacing with application SME for integration into C4I network.

Data Analyst & Model-Based Systems Engineer

SAIC
11.2018 - 11.2019
  • Responsible for developing System of Systems (SoS) engineering architecture for {Navy Program}, as well as Providing engineering and design activities to support complex decision-making issues
  • Leads the effort in the integration of multiple {Navy Program} architecture designs into a consolidated, digital Architectural representation using a model-based systems engineering tool and the Systems Modeling Language.
  • Captures system data, including behaviors, composition, constraints, requirements, capabilities, & Schedule/performance
  • Implements a Model-Based Systems Engineering (MBSE) approach in accordance with the Department of Defense Architecture Framework (DoDAF) guidelines in the development of network and systems architectures including Cybersecurity and Combat Systems integration with relational traceability
  • Advises the customer and staff of applicability of multiple frameworks, such as the Unified Architecture Framework (UAF), Risk Management Framework (RMF), and Zachman’s Enterprise Architecture (EA) Framework.

Application Integration Engineer

Cabrillo Technologies, Spawar
09.2017 - 11.2018
  • Reviews technical/engineering drawings, provides updates, recommends system configuration changes, and coordinates with NAVSEA and SPAWAR Technical Points of Contact to discuss specific design requirements and details
  • Responsible for tracking, maintaining, and editing project plan status and action items
  • Collects, analyzes, and evaluates historical data and expert opinion to provide a basis for assumptions, methodologies, and estimate results as well as translate functional and technical requirements into design concepts and provide detailed design inputs to system requirements, specifications, and drawings
  • Responsible for reviewing system design documentation for compliance with applicable requirements, NAVSEA and SPAWAR instructions, and statutory and regulatory policies
  • Responsible for Application Research, Development and Implementation of GOTS/COTS software into Military Sealift Platform Windows Server 2008 Environment
  • Responsible for MSC Application SRF Process creation and documentation handling to include Ports / Procedures / IA Protocols / Network Diagrams and Topologies
  • Configure, Troubleshoot, Install and Develop Windows 2008 / Windows 2012 Servers in a Lab environment for Implementation into the Military Sealift Command fleet environment
  • Domain Features include Outlook, SQL, Client Workstation Applications.

Network Administrator

ITF, ITMentor Group, Lab
07.2015 - 09.2017
  • Plan and direct the installation for Navy C4I Systems COMPOSE 3.5, COMPOSE 4.0, COMPOSE 4.0.1 ORT Installing, Configuring, and Maintaining hardware utilizing Deck Installation Diagrams Responsible for testing and determining pass/fail criteria of equipment, programs and information
  • Assists with interfacing with customer application NIAPS, NTCSS, OOMA, MEDAL application testing integration in conjunction with COMPOSE deck variants
  • Responsible for tracking, maintaining, and editing project plan status and action items
  • Assists customer test objective pass criteria & generate application Test Report for shipboard variant approval
  • Responsible for reviewing system design documentation for compliance with applicable requirements, NAVSEA and SPAWAR instructions, and statutory and regulatory policies.

Senior Computer System Analyst

SPAWAR SSC, Koams Engineering Solutions
05.2013 - 07.2015
  • Responsible for the role of CANES Project Lead for the oversight of physical power installation, Ethernet and Fiber interconnection, building and implementing of the CANES installations across CVN/DDG/LSD Variants
  • Ensured effective and efficient operation of network systems, architecture and topology through deployment and oversight of network operations specialists that all operating systems are adequate, functional, and conform to operation security policies and procedures
  • Built, configured and deployed VMs and system configurations on the CANES platform for all enclaves and assets
  • The installation process includes Physical-to-Virtual (P2V), Virtual-to-Virtual (V2V) and Virtual-to-Physical (V2P) migration of Windows Servers for Programs of Record (POR) and other approved systems
  • Worked securely in a testing environment involving Pre-Installation, Test and Check-Out by ensuring that quality checks were completed on each physical and logical interface of routing and switching equipment.

Network Administrator

United States of America-Navy
05.2007 - 05.2013
  • Accomplished over 100 switch and router upgrades and verified all fiber, serial, CEM, and Ethernet terminations
  • Completed multiple high-priority time-sensitive equipment failures well within the time frame given
  • Formatted, configured and installed the IOS and Virtual LAN database files on multiple Cisco router and switch series equipment
  • Managed, configured and replaced ADNS equipment hardware and software, Update hardware, and verified network wide connectivity for the CANES enterprise (LAN/WAN/NOC)
  • Authored and implemented IV&V documentation to finalize CANES installation for acceptance and delivery
  • System/, Maintained and administered primary Network Services: Routers and the Local Area Network, utilizing advanced routing protocols including BGP, EIGRP and OSPF over satellite WAN connections
  • Frequent troubleshooting of secure end-to-end telecommunication systems including LAN and WAN devices
  • Responsibilities include tracking/auditing of outages for all Pacific war naval ships and assets
  • Conducted consistent inventory accountability for all SCI classified cytological devices and key material
  • Performed 3M system backup, equipment maintenance, and preventive maintenance in accordance with NCTAMSPAC command regulations
  • Supervised a team in set-up, maintenance and disposal of forward deployed military network upgrade from Windows 2000 to Windows 7 including hardware upgrades
  • Standardized inventory procedures by implementing inventory accounting system programs, WASP & Remedy
  • Responsible for numerous VMware servers, Windows Servers and Cisco VOIP phone
  • Completed the proper disposal of outdated computer system equipment
  • Recycled over 1,200 computers and equipment saving the Navy over $300,000
  • Managed the successful upgrade of all base wide computers systems from Windows 2000 into Windows 7 maintaining work efficiency
  • Rendered expert oversight to the operating system, security application, supporting application installations, account management, and security compliances
  • Utilized Group Policy Objects to publish applications to end-users; Managed multiple users and devices with Active Directory Users and Computers; Applied Security Configuration and Analysis to manage Domain Policy
  • Provided systems administration support for Windows, Linux and Unix systems including server and workstation upgrades, backup and disaster recovery monitoring, user account setup and security administration
  • Commended for technical, analytical and problem-solving skills; effective task prioritization; and customer service orientation
  • 4]

Education

CompTIA Security+, Microsoft Certified Technology Specialist (MCTS Windows ), CCNA (Expired -

National University

Bachelor of Science - Cybersecurity

National University
San Diego
07.2020 - Current

Additional Information

  • Clearance: Top Secret / Sensitive Compartmented Information Clearance Active.

Timeline

Cybersecurity Specialist

Amentum
01.2024 - Current

IAM / Cyberark / Dilenia

Jacobs
10.2021 - 01.2024

Bachelor of Science - Cybersecurity

National University
07.2020 - Current

Application Engineer

Cabrillo Technologies
11.2019 - 10.2021

Data Analyst & Model-Based Systems Engineer

SAIC
11.2018 - 11.2019

Application Integration Engineer

Cabrillo Technologies, Spawar
09.2017 - 11.2018

Network Administrator

ITF, ITMentor Group, Lab
07.2015 - 09.2017

Senior Computer System Analyst

SPAWAR SSC, Koams Engineering Solutions
05.2013 - 07.2015

Network Administrator

United States of America-Navy
05.2007 - 05.2013

CompTIA Security+, Microsoft Certified Technology Specialist (MCTS Windows ), CCNA (Expired -

National University
Joshua ToddCyber Systems Security Engineer Sr.