Binh Phan Email and Phone Number
Binh Phan work email
- Valid
Binh Phan personal email
- Valid
"The function of education is to teach one to think intensively and to think critically. Intelligence plus character - that is the goal of true education."- Dr. Martin Luther King, Jr.Considering the time commitments and arduous work schedules of service members, pursuing higher education can be challenging. Among my responsibilities were managing the communication watch team aboard the USS NIMITZ (CVN-68), the Commander of the United States Third Fleet (COMTHIRDFLT), and the USS HOPPER (DDG-70). As a result of the experience, I was motivated to pursue a career in IT portfolio management. My accomplishments have given me the confidence that I can excel in any challenging scenario. As a result of my experience in the US Navy and Cyber Defense, I am committed to pursuing a Ph.D., earning a Scholarly Distinction in Risk Management and Information Security, and contributing to Data Science and Innovation for Guam, Honolulu, and Hawaii.
University Of Phoenix
View-
University Of PhoenixKapolei, Hi, Us -
Doctor Of Management In Organizational Leadership/Information Systems And Technology Ph.D. CandidateUniversity Of Phoenix Feb 2020 - PresentPhoenix, Az, UsKey Responsibilities:Making a positive impact on the business industry. It is my intention to pursue a Doctor of Management (DM) degree, as well as to continue my career as a lifelong student who does not just think outside the box, but also removes it. The question is, will this doctoral degree leverage my leadership skills while incorporating critical thinking and creative solutions to complex problems? This doctoral degree is a "practitioner program" which will help me gain the skills essential to make my organization or community a more successful place. -
Collegiate MemberInformation Systems Audit & Control Association (Isaca) Nov 2015 - PresentSchaumburg, Illinois, UsInformation Systems Audit and Control Association, ISACA® is a nonprofit, independent association that advocates for professionals involved in information security, assurance, risk management and governance. The Association is a resource you can draw upon to enhance your skills, expanding professional connections and experience a vibrant local and global community of colleagues. -
Collegiate MemberAssociation For Computing Machinery (Acm) Dec 2015 - PresentNew York, Ny, UsThe Association for Computing Machinery (ACM) brings together computing educators, researchers, and professionals to inspire dialogue, share resources, and address the field's challenges. As the world’s largest computing society, ACM strengthens the profession's collective voice through strong leadership, promotion of the highest standards, and recognition of technical excellence. -
Collegiate MemberInstitute Of Electrical And Electronics Engineers (Ieee) Dec 2015 - PresentPiscataway, Nj, UsThe Institute of Electrical and Electronics Engineers (IEEE) is the world’s largest professional association advancing innovation and technological excellence for the benefit of humanity. IEEE is the trusted “voice” for engineering, computing and technology information around the globe. -
Principal Chief Education OfficerTeihaku: Security & Business Consulting Group Llc Aug 2019 - May 2022Key Responsibilities:Offers creative solutions to customers on and between coasts. Each situation is handled with extensive expertise and professionalism, and our assistance is tailored to meet your specific needs. Revenue increased by 5% as a result of providing technology consulting services to non-tech companies. In total, three long-term projects have been implemented: 28 trainings, 13 seminars, seven networking activities, and five study visits. Develop and implement an innovative partnership framework that resulted in over 100% revenue growth. The total cost of the project was reduced by 5% after the introduction of the cost center concept. Over 700 clients were transitioned to cloud accounting, leading to a proactive, real-time relationship with value-added services.
-
Capabilties Watch Officer (Cwo) / Technical Watch Officer (Two)National Security Agency Oct 2017 - May 2021Ft. Meade, Md, UsKey Responsibilities:In order to ensure that all scheduled network outages are coordinated in a timely and accurate manner in accordance with existing regulations, a continuous monitoring of all incoming and outgoing network traffic must be conducted so that all scheduled network outages are coordinated as soon as possible. Monitoring the performance of the communication staff as well as their activities regarding the communication of information to and from the areas on watch in accordance with current communications directives. Communicate constantly with members of the IC elements to gain a baseline understanding of the capabilities and the assets of the CND, CNA, and IC-wide networks by collaborating with members of the community and by communicating persistently with the IC elements. Among the tasks assigned to the manager are the supervision of all messaging operations, circuit operations, and the proper handling of all communications related to any urgent or unusual issues, as well as the review of all operational logs and the monitoring of the condition and alignment of all equipment. Capabilities Watch Officers have the role of assuring that the command's communications capabilities are met in line with the organization's mission in accordance with the command's capabilities. -
Sr. Information Systems Security Manager (Issm)National Security Agency Feb 2017 - May 2021Ft. Meade, Md, UsKey Responsibilities:Acts as the primary liaison between the Chief Information Officer and the organization's approval officer, co-management provider, information system owner, and information system security officer. Many organizations are responsible for managing the security aspects of their systems on a day-to-day basis, due to their detailed knowledge and expertise. Ensure compliance with security policies and procedures by supporting the development of them. An Information Systems Security Manager (ISSM) is responsible for implementing an appropriate operational security regime. Communication between the Chief Information Officer and the authorized person of the organization. It is the responsibility of the Sr. Information Systems Security Manager (ISSM) to implement the appropriate operational security regime. Identify and review corporate governance policies, procedures, information system owners, and common control vendors that provide support to information system security personnel. A comprehensive knowledge of information security as well as the expertise to manage day-to-day cyber operations in five or more joint military operations enabling the ability to manage the security aspects of information. As part of our security services, we support the development of security policies and procedures, as well as ensuring that they are implemented. -
Information Technology (It) Portfolio ManagerUs Navy Nov 2016 - May 2021Washington, Dc, UsKey Responsibilities:Manages all IT investment and asset management matters for NAVIFOR Portfolio Managers. A member of the NAVIFOR Portfolio Manager Drumbeat conference. Actively engages in ITPR process support. Implement processes and procedures for supporting the analyst, selection, control, and evaluation phases of IT portfolio management through NAV-ITAS or with the command ITPR POC. Maintain consistency and standardization across NAVIFOR Portfolio Managers. Follows federal, Department of Defense, and Department of Navy directives regarding IT portfolio management. Implements programmatic and budgetary initiatives to maximize IT capabilities and mission support. In support of programmatic initiatives and the development of enterprise solutions for emerging IT needs, providing advice to the NAVIFOR IT Portfolio Managers about IT capabilities gaps and redundancies. Assumes responsibility for overseeing and managing the command's IT investments and overall management of IT resources. Produces command baselines based on DOD and DON authoritative sources (DADMS, DITPR-DON, ICRS). Analyzes investment requests against baseline IT portfolios of command and subordinate activities. Assesses whether command and subordinate activities' IT portfolios are capable of providing the capabilities required. Retiring underperforming or no longer needed capabilities based on periodic performance reviews. -
Information Systems TechnicianUs Navy Jul 2005 - May 2021Washington, Dc, UsKey Responsibilities:From electronic mail systems to shipboard control systems to Special Intelligence (SI) systems, information technology (IT) plays a key role in the Navy. Enlisted Sailors are Navy Information System Technicians (IT specialists). An integral part of the Information Dominance Corps' mission is to gain a deep understanding of adversaries and develop unrivaled knowledge of the battlespace during wartime. Develop and implement computer hardware and software in addition to network administration, database management, and computer hardware and software support. Information Systems Technicians work at the forefront of the information technology field in the U.S. Navy, ensuring the integrity of everyday communications or protecting top secret data. Operation and maintenance of Navy satellite telecommunications systems are among the responsibilities. Implementing microcomputer systems throughout the Fleet by administering mainframe computers and local and wide area networks. Identification or resolution of operational problems based on data analysis. Work collaboratively with others to resolve information technology problems. Coordinate the development of information technology projects or systems.s or systems. Comply with regulatory requirements or prepare documentation for contracts, transactions, or transactions.transactions, or transactions. Verifies that each Information System (IS) meets security specifications for an acceptable level of risk, and develops and maintains accreditation support documentation. Makes sure the Development of System Security Plans (SSPs) for systems that contain sensitive information is in compliance with the Activity Cyber Security Plan (CSP). -
Information System Security Manager (Issm)Us Navy Aug 2016 - Feb 2017Washington, Dc, UsKey Responsibilities:It is the responsibility of the Information Systems Security Manager (ISSM) to oversee the security of information systems in the United States Navy. Providing guidance and coordination for Fleet Cyber Command's service and exercise activities. Establishes and documents a cyber security workforce program for an operating unit. Responsible for implementing strategic planning and ensuring that the organization adheres to the requirements of Fleet Cyber Command.Fleet Cyber Command. Cultivate the cybersecurity workforce in the NIOC Hawaii Region to protect critical information systems from existing and emerging threats. Knowledge of the principles and practices of network and information system security. Providing support to the Command Cyber Readiness Inspection (CCRI). Developing and implementing procedures for authorizing software, hardware, and firmware usage. Perform the duties of a Data Transfer Agent. The management of personnel is part of the tasks and responsibilities of the site lead. Examine compliance with laws and regulations. In addition to performing assigned duties, tasks, and responsibilities, other duties may be assigned. Managing and developing systems development, implementation, and production support projects. Maintain an information technology (IT) security policy and assist with its development. Provide assistance and advice in the development of Concept of Operation (CONOP) documents to describe and clarify operational parameters. Working with various high-level technical groups to provide support and expertise. Prepare detailed reports for management based on the results of security assessment visits. Establishing and implementing a program to educate, train, and raise awareness about information security. Assessing and auditing security policies and compliance monitoring. -
Sr. Computer Information Systems Security ManagerUs Navy Jun 2013 - Jul 2016Washington, Dc, UsKey Responsibilities:Analyze and recommend computer upgrades to executives at the top of the organization. Plan and direct the installation and upgrade of computer hardware and software. Maintain the organization's network and electronic documents with a high degree of security. Make a rational case for spending on a new project to top executives by evaluating costs and benefits. Determination of all short- and long-term personnel needs for each department. Assisted other IT professionals, including computer system analysts, software developers, information security analysts, and computer support specialists, in their work. Achieving the highest level of service for their organization's technology by negotiating with vendors. Immediately responsible for network-centric systems of critical importance. Assisted in the remediation of numerous assets in NAVNETWARCOM, NCDOC, and SPAWAR Directives of the Department of Defense (DoD). Improved C4I readiness and IA compliance posture of all commands on shipboard and at shore by 98%, resulting in 100% integrity of asset networks on shipboard and at shore. -
Sr. Information Systems Security Engineer (Isse)Us Navy Jun 2013 - Jul 2016Washington, Dc, UsKey Responsibilities:The Information Systems Security Engineer (ISSE) must receive the appropriate technical or management training, education, and certification to perform his or her duties. Ensure that compliance monitoring is conducted, and review the results of this monitoring, notifying the DAA of significant findings (i.e. CAT I). Coordinated security measures include the analysis, periodic testing, evaluation, verification, and review of information system installation at the appropriate classification level within the command or organizational network structure. In accordance with Navy Cyber Defense Operations Command (NCDOC) and DoD reporting chains, developed reporting procedures and ensured that security violations and incidents are reported. Developing standard operating procedures for the ISSO team from the original system owner. The development, implementation, and enforcement of policies are essential for ensuring the security of information systems. In coordination with the System Administration, maintains the various certifications and accreditations (C&As) for the systems and applications. In collaboration with the Information System Security Manager (ISSM) and System Owner, participate in the Configuration Management Board to ensure a Configuration Management Plan (CMP) for software, hardware, and firmware is documented and maintained. A security review should be conducted prior to the introduction of media from external sources to security controlled information systems. -
Information Systems Security Engineer (Isse)Us Navy Sep 2010 - Apr 2013Washington, Dc, UsKey Responsibilities:Create and maintain a program for identifying IA architecture, IA requirements, IA objectives, IA policies, as well as IA personnel and IA processes and procedures. Responsible for providing security oversight to COMTHIRDFLT. The task involves coordinating command security measures, including analysis, periodic testing, evaluation, verification, accreditation, and review of information system installations. Assure that accountability, access approvals, and special handling requirements are established for each COMTHIRDFLT information system. Developed, reviewed, endorsed, and maintained the IA certification and accreditation documentation in accordance with reference (DoD Instruction 8510.01, DoD Information Assurance Certification and Accreditation Process (DIACAP)", 28NOV07). Continually updates the repository of this documentation and all modifications to the organization. Evaluates performance using evaluation criteria and technical performance measures. Evaluates end-to-end systems and systems-oriented products throughout their entire life cycles. Researches and evaluates the technical performance of software products as well as overall segments and systems. Certification and Accreditation (C&A) of existing and new systems. Prepare and provide a DHS formatted System Security Plan. Plan, assess, analyze, and manage security risks. Install and process new security products and procedures. -
Computer Information Systems Security ManagerUs Navy Jul 2007 - May 2010Washington, Dc, UsKey Responsibilities:Direct, coordinate, or plan activities in electronic data processing, information systems, systems analysis, and computer programming. Operated and coordinated all state-of-the-art information systems technology, including local and wide area networks, mainframe, mini and microcomputer systems, as well as their peripheral devices; wrote programs to handle the collection, manipulation, and distribution of data; performed the functions of a computer system analyst; and operated and coordinated telecommunications systems. Integrating all aspects of an integrated information system, including automated networks, data links, and circuits; transmitting, receiving, operating, monitoring, controlling, and processing all forms of telecommunications; monitoring, correcting, and recovering information. Assisting a variety of personnel with telecommunications and computer-related training at the communications center. Develop, implement, and manage secure networking, computing, and enclave environments using knowledge of IA policy, procedures, and workforce structure. Provide security planning, assessment, and risk management services. Processes and operating procedures for security standards. Conduct system audits to determine security issues, mitigate them, and report results. Build and integrate TS/SCI information systems, and participate in their configuration and testing. Work closely with ISSO and IAM to support day-to-day operations. Provide leadership and direction to IA operations personnel. -
Computer Information Systems Administrator And Networking TechnicianUs Navy Nov 2005 - Mar 2007Washington, Dc, UsKey Responsibilities:Install all vital community hardware and software, in addition to making any essential enhancements and upkeep with the intention to preserve the safety of networks and laptop structures. Served as a protection engineering consultant on engineering groups to help in designing, developing, implementing, and/or integrating stable networks, computing environments, and enclaves. Design, develop, put into effect, and/or combine IA architectures, structures, and additives on engineering groups. Provides stable networking, computing, and enclave environments to engineering groups through developing, implementing, evaluating, and/or integrating them. Served as a member of engineering groups that designed, developed, implemented, evaluated, or included facts architectures, structures, or factor structures. Uses understanding of IA policy, procedures, and group of workers' shape to design, develop, and put into effect stable community, computing, and enclave environments. -
University Of Phoenix Graduate Student (Mba/Pm) ConcentrationUniversity Of Phoenix Aug 2017 - Oct 2019Phoenix, Az, UsActive duty member of the United States Navy with knowledge, experience, and leadership skills in the IDC (Information Dominance Corps). Graduated from The University of Phoenix with a Masters degree in Business Administration and a Project Management Professional designation. Perform personnel-related tasks such as selection, training, or evaluation. Plan or direct promotional activities that require coordination with other department heads. Marketing strategies are developed or implemented, including advertising campaigns and sales promotions. -
University Of Phoenix Graduate Student (Mis/Cs) ConcentrationUniversity Of Phoenix Nov 2015 - Jun 2017Phoenix, Az, UsAs a member of the United States Navy Active Duty, knowledgeable, experienced, and equipped with leadership skills in the IDC (Information Dominance Corps). Graduated from The University of Phoenix with a Masters Degree in Information Systems with a Cyber Security Certificate (MIS/CS). -
Computer OperatorU.S. Department Of Labor Nov 2015 - Apr 2016Washington, Dc, Us0817N - Computer Operator (4,000 Hours) Cumulative - Monitored and controlled the operation of an electronic computer as well as peripheral electronic data processing equipment in order to process business, scientific, engineering, and other information according to operating instructions. Control computer and peripheral devices by entering commands at a computer terminal and setting controls on the devices. Response to operating and error messages should be monitored and responded to accordingly. -
Internetworking TechnicianU.S. Department Of Labor Jan 2015 - Jul 2015Washington, Dc, Us1038N - Internetworking Technician (5,000 Hours) Cumulative - In an integrated data/voice network, responsible for the installation, maintenance, and operation of advanced data networking products, routers, hubs, and switches. Assembled, installed, and configured terminal transmission products, such as modems and channel servers, and interface applications for user interfaces. Providing maintenance support on-premise and in the Network Operation Center, as well as interpreting diagnostic results and resolving maintenance issues through the interpretation of system tests and diagnostic results, was another part of the job. -
Undergraduate StudentUniversity Of Phoenix Undergraduate Student (Bsit/Se) Concentration Sep 2009 - May 2015Phoenix, Az, UsIt's my desire to refine and sharpen current knowledge and insight within the Science and Information Technology community as a student at University of Phoenix studying the BSIT/SE program (Bachelor of Science in Information Technology with a Concentration in Software Engineering). -
Computer Programmer (Professional & Kindred)U.S. Department Of Labor Jan 2012 - Jun 2012Washington, Dc, Us0811N - Computer Programmer (Professional & Kindred) (4,000 Hours) Cumulative - The conversion of project specifications and statements of problems and procedures is carried out by creating detailed logical flow charts that can be coded into computer language. Develop and write computer programs to store, find, and retrieve specific documents, data, and information. Developing web sites is also part of the job description.
Binh Phan Skills
Binh Phan Education Details
-
University Of Phoenix(Dm) Information Systems And Technology (Ist) -
University Of PhoenixProject Management (Pm) -
University Of PhoenixCyber Security (Cs) -
University Of PhoenixSoftware Engineering (Se) -
University Of PhoenixIn General Studies (Aags)
Frequently Asked Questions about Binh Phan
What company does Binh Phan work for?
Binh Phan works for University Of Phoenix
What is Binh Phan's role at the current company?
Binh Phan's current role is Indie Game Developer & Cybersecurity Engineer | Passionate About Building and Securing Innovative Experiences.
What is Binh Phan's email address?
Binh Phan's email address is bi****@****ail.com
What schools did Binh Phan attend?
Binh Phan attended University Of Phoenix, University Of Phoenix, University Of Phoenix, University Of Phoenix, University Of Phoenix.
What skills is Binh Phan known for?
Binh Phan has skills like Information Assurance, Computer Security, Security, Network Security, Information Security, Dod, Vulnerability Assessment, Military, Networking, Security Clearance, Defense, Cyber Security.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial