Christopher Wesley Email and Phone Number
Christopher Wesley work email
- Valid
- Valid
Christopher Wesley personal email
Technically astute and detail-oriented professional with TS SCI clearance and extensive experience leading all aspects of computer information system security, system administration, network operations and threat hunting within top-tier organizations. Expert at analyzing key data and threat information from multiple sources, disciplines, and agencies across the Intelligence Community concerning foreign all-source collection capabilities and activities, i.e., human intelligence (HUMINT) and signals intelligence (SIGINT) to develop effective plans and communicating solution to stakeholders. Possess strong expertise in system security, vulnerability scanning, penetration testing, risk assessment, and cyber security analysis. Demonstrated history of leading projects and system implementation of government systems, medical, telecommunications, and other sizable computer networks. Instrumental leader and communicator both verbally and written; ability to build and direct cross-functional teams to ensure attainment of all set objectives. Proficient at fostering and maintaining relationships with team members and stakeholder at all levels.
-
Sr Cyber Security EngineerRaytheon Technology Sep 2023 - Present -
Sr. Cyber Security EngineerPt Solutions Physical Therapy Jul 2023 - Oct 2023Atlanta, Ga, Us -
Senior Cyber Security EngineerEnvistacom Dec 2018 - Aug 2023Duluth, Us -
Sr. Network Security EngineerUs Army Criminal Investigation Laboratory Nov 2009 - Dec 2018Responsible for maintaining and implementing the network security posture for the United States Army Criminal Investigation Laboratory. *Perform security analyses and risk/vulnerability assessments by check all servers for security breaches and application failures.*Verify Antivirus Endpoint System and threat protection software. Ensuring that there are no viral threats that need attention.*Check AirTight wireless security system for wireless vulnerabilities and take appropriate action.*Check Nitro Security IPS/IDS system for vulnerabilities and take appropriate action.*Check Fortinet Firewall system for vulnerabilities and take appropriate action.*Use Retina, Q-Tip, and Army Gold Disk to scan entire network for vulnerabilities and ensure that all patches and zero day attacks are handled properly.*Review security groups and rights management for users.*Reset CAC and ASCL pin numbers for locked out users.*Apply DISA STIGS and document omissions and report to NEC as part of the ATO requirement.*Conduct review of devices and BES server for STIG compliance.*Prepare a standard software baseline per division and create a build sheet for helpdesk.*Review software/hardware purchase request, Receive & track software licenses for purchased software.*Review software/system capabilities and prepare documentation for CON .*Ensure that unused LAN ports are locked and monitor for anomalies by using NAC.*Resolve patch failure & unknown status of workstations and servers.*Create DAR folders and instruct users on user of entering PII data.*Server as the OU administrator for USACIL network*Create, modify, and implement GPO's for the USACIL network
-
Information Assurance Security OfficerUcg, Inc. /Us Army Crime Lab – Ft. Gillem, Ga Nov 2008 - Nov 2009Responsible for ensuring enterprise information security standards are current. Develop and implement information security procedures in according to DOD protocol. Ensure that all information systems are functional and secure. Implement upgrades and modifications to existing information security hardware and software. Manage all network security systems for LAN/WAN, telecommunications, and IDS systems. Responsible for proactively monitoring, investigating, and tracking, security incidents that have occurred within US Crime Lab network. *Enforce change management and network security policies *Ensure that the all servers and workstations are patched via SCCM server.*Troubleshoot network access problems and implement network security policies and procedures *Ensure network security access and protect against unauthorized access, modification, or destruction *Analyze and provide recommendations to improve network security tools and processes *Develop and maintain tools to monitor the network for suspicious activity *Utilize networks analyzers to ensure that network applications are adhering to security policies *Provide guidance to US Crime Lab regarding security issues for server hardware and application deployment *Monitor IPS and IDS to detect and prevent network security vulnerabilities.*Monitor wireless network traffic to prevent unauthorized access and Wi-Fi attacks.*Administer and support Active Directory, GPO, DNS & Microsoft Exchange replication*Provide a point of escalation and support to the Help Desk Support Group*Produce appropriate documentation for application deployment, configuration, and related processes.*Certify implementation and administer plans to ensure compliance with laboratory information management system (LIMS) requirements and DoD standards.
-
Siprnet AdminUsar Nov 2006 - Nov 2008Performed needs analysis, procurement support, installation, training and problem resolution for the local and wide area networks on the SIPR (Secret Internet Protocol Router Network) for the US Army Reserve.*Implemented and maintained bridges, routers, gateways, remote access servers, domain servers, security firewalls, application and device servers and Internet devices and connections. *Performed preventative and fault isolation maintenance*Worked with cross-functional teams in the design and implementation of the SIPR Network. *Managed the Information Assurance Vulnerability Management process for Information Assurance Division used to verify compliance for the US Army Reserved for automation equipment of all users.*Utilized IAVM reporting for A&VTR *Reviewed vulnerability scans to determine trends and establish or correct mitigation actions.*Directed Field technicians in the distribution of mitigation actions and compliance reports to resolve any disputes of actions taken.*Researched and document threats and their behavior, as well as recommend threat mitigation strategies.*Analyzed network packets and anomaly detection.*Verified malicious /unauthorized websites by checking logs from proxies and firewalls.*Monitored the IDS for malicious activity *Utilized vulnerability assessment tools to mitigate non-compliant systems on the network.*Standardized procedures to perform in-depth evaluations assessing the security risks associated with COTS and GOTS software and hardware on the SIPR Network*Analyzed the pre and post-installation port scan to determine if the tested product has opened any new ports and introduced a potential threat.*Researched any known vulnerabilities associated with the hardware or software that the scans may not have revealed.*Tracked and worked trouble tickets with Remedy and CA Unicenter systems.*Approved updates in WSUS, SMS*Reviewed vulnerability scans to determine trends in patching or in-site problems
Christopher Wesley Skills
Christopher Wesley Education Details
-
North Carolina Agricultural And Technical State University -
Western Governors UniversityComputer And Information Systems Security/Information Assurance
Frequently Asked Questions about Christopher Wesley
What company does Christopher Wesley work for?
Christopher Wesley works for Raytheon Technology
What is Christopher Wesley's role at the current company?
Christopher Wesley's current role is Senior Cyber Security Engineer at Raytheon Intelligence & Space.
What is Christopher Wesley's email address?
Christopher Wesley's email address is cw****@****com.com
What schools did Christopher Wesley attend?
Christopher Wesley attended North Carolina Agricultural And Technical State University, Western Governors University.
What skills is Christopher Wesley known for?
Christopher Wesley has skills like Network Security, Firewalls, Active Directory, Servers, Information Security, Dns, Computer Security, Routers, Microsoft Exchange, Vulnerability Assessment, Troubleshooting, Networking.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial