Craig T.

Craig T. Email and Phone Number

Cyber Security Specialist @ Integrated Security Solutions, Inc.
Little Rock, AR, US
Craig T.'s Location
Little Rock Metropolitan Area, United States
About Craig T.

As a Systems Administrator at Integrated Security Solutions, I perform complex product security risk, attack surface, and vulnerability analyses and audits of applications and application stacks of various provenances. I also implement the Risk Management Framework for assessment and authorization of electronic surveillance systems to ensure compliance with DoD Instructions 8500.01 Cybersecurity and 8510.01 Risk Management Framework. Additionally, I document and review security compliance checklists and apply computer changes to comply with DoD Security Technical Guides for the Army National Guard.With over 14 years of experience in information security, I have developed and deployed solutions to protect networks, systems, and information assets for diverse companies and organizations. I have also conducted offensive and defensive cyberspace operations using established tactics, techniques, and procedures to achieve service, COCOM, and national objectives. Furthermore, I have supported and managed server virtualization, server provisioning, physical server maintenance, and pfSense firewalls. I hold certifications in CISSP, CISM, and BCCPA, as well as a master's degree in IT Management. My specialties include network security, IT security, CISSP, CISM, military, and vulnerability assessment.

Craig T.'s Current Company Details
Integrated Security Solutions, Inc.

Integrated Security Solutions, Inc.

View
Cyber Security Specialist
Little Rock, AR, US
Website:
mtiss.com
Employees:
62
Craig T. Work Experience Details
  • Integrated Security Solutions, Inc.
    Cyber Security Specialist
    Integrated Security Solutions, Inc.
    Little Rock, Ar, Us
  • Integrated Security Solutions, Inc.
    Systems Administrator
    Integrated Security Solutions, Inc. Oct 2020 - Present
    North Little Rock, Arkansas, United States
    •Performs complex product security risk/attack surface/vulnerability analyses and security audits of applications and application stacks of various provenances.•Implement the Risk Management Framework for assessment and authorization of electronic surveillance systems to ensure compliance with DoD Instructions 8500.01 Cybersecurity and 8510.01 Risk Management Framework•Document and review security compliance checklists (SCCs) and how they will be used by the Army National… Show more •Performs complex product security risk/attack surface/vulnerability analyses and security audits of applications and application stacks of various provenances.•Implement the Risk Management Framework for assessment and authorization of electronic surveillance systems to ensure compliance with DoD Instructions 8500.01 Cybersecurity and 8510.01 Risk Management Framework•Document and review security compliance checklists (SCCs) and how they will be used by the Army National Guard•Apply computer changes to comply with DoD Security Technical Guides (STIGS) and give guidance on how these settings could affect the video/access control systems for the Army National Guard. Show less
  • Air National Guard
    Cyber Warfare Operator
    Air National Guard Sep 2014 - Present
    Little Rock Air Force Base, Arkansas
    Active Top Secret SCI Clearance•Performs duties to develop, sustain, and enhance cyberspace capabilities to defend national interests from attack and to create effects in cyberspace to achieve national objectives•Conduct Offensive Cyberspace Operations (OCO) and Defensive Cyberspace Operations (DCO) using established tactics, techniques, and procedures to achieve Service, COCOM and national objectives•Partners with DoD, interagency and Coalition Forces to detect, deny, disrupt… Show more Active Top Secret SCI Clearance•Performs duties to develop, sustain, and enhance cyberspace capabilities to defend national interests from attack and to create effects in cyberspace to achieve national objectives•Conduct Offensive Cyberspace Operations (OCO) and Defensive Cyberspace Operations (DCO) using established tactics, techniques, and procedures to achieve Service, COCOM and national objectives•Partners with DoD, interagency and Coalition Forces to detect, deny, disrupt, deceive, and mitigate adversarial access to sovereign national cyberspace systems•Provide input into future cyber operation training and how it can be used to assist the State of Arkansas in training and real-world incidents Show less
  • Metova
    Vmware Engineer
    Metova Jul 2018 - Feb 2020
    Little Rock Afb, Jacksonville, Ar
    •Supported and managed server virtualization (VDI), server provisioning, physical server maintenance and pfSense firewalls•Analyzed, designed, developed, evaluated and implemented changes as they pertain to classroom environments•Troubleshoot, maintained integrity and configure network components along with implementing CentOS, RedHat and Windows operating systems enhancements to improve reliability and performance•Analysis, planning, design, implementation, documentation… Show more •Supported and managed server virtualization (VDI), server provisioning, physical server maintenance and pfSense firewalls•Analyzed, designed, developed, evaluated and implemented changes as they pertain to classroom environments•Troubleshoot, maintained integrity and configure network components along with implementing CentOS, RedHat and Windows operating systems enhancements to improve reliability and performance•Analysis, planning, design, implementation, documentation, assessment, and management of the VMWare training environment to align IT strategy, plans, and systems with the mission, goals, structure, and processes of the organization. Show less
  • Saic
    Cyber Warfare Instructor
    Saic Feb 2017 - Jul 2018
    Little Rock Air Force Base, Arkansas
    •Served as a Subject Matter Expert and Instructor for the 223 Cyber Operation Squadron (COS)•Monitored and managed VDI related hardware/software using VMWare for all aspects of classroom training through the use of Microsoft Windows Server 2016•Instructed courses on Network Analytics, Wireshark, Wireless Concepts, Offensive/Defensive Cyber Operations and Powershell scripting language •Served as the Active Directory engineer for the classroom environment, which… Show more •Served as a Subject Matter Expert and Instructor for the 223 Cyber Operation Squadron (COS)•Monitored and managed VDI related hardware/software using VMWare for all aspects of classroom training through the use of Microsoft Windows Server 2016•Instructed courses on Network Analytics, Wireshark, Wireless Concepts, Offensive/Defensive Cyber Operations and Powershell scripting language •Served as the Active Directory engineer for the classroom environment, which consisted of all virtual machines within VMWare. Show less
  • Dillard'S Inc.
    Information Security Analyst
    Dillard'S Inc. May 2016 - Jan 2017
    Little Rock, Arkansas
    •Analyzed, troubleshot, and investigated security-related anomalies based on security platform reporting, network traffic, log files, host-based and automated security alerts through the use of Tenable, Tripwire and Carbon Black•Provided security consulting, solutions, designs, reviews and recommendations for various projects and initiatives
  • Fidelity National Information Services
    Security Analyst
    Fidelity National Information Services Dec 2013 - Apr 2016
    Little Rock, Arkansas Area
    1. Maintained security systems and administered security policies to control access to systems via BlueCoat proxies2. Executed security controls to prevent unauthorized users from infiltrating company information or jeopardizing programs via Wireless Cisco Prime Infrastructure and McAfee EPO.
  • Dsci Corporation
    System Administrator
    Dsci Corporation Jun 2013 - Nov 2013
    Kabul, Afghanistan
    1. Implements and monitors Information Assurance (IA) procedures and information security protective measures for DOD systems and networks to protect classified and sensitive information.2. Develops and monitors methods to protect information processed, stored and transmitted by classified systems and other systems in classified environments and prevent unauthorized disclosures.3. Responsible for security review and submission of connection packages to DAAs for all enclaves and systems… Show more 1. Implements and monitors Information Assurance (IA) procedures and information security protective measures for DOD systems and networks to protect classified and sensitive information.2. Develops and monitors methods to protect information processed, stored and transmitted by classified systems and other systems in classified environments and prevent unauthorized disclosures.3. Responsible for security review and submission of connection packages to DAAs for all enclaves and systems on the classified US-only and coalition networks.4. Maintain network security authentication including application security, event investigations and compliance enforcement while located in a NOSC (Network Operations Security Center).5. Assists in proactive vulnerability assessments, scanning of devices, Protected Distribution System (PDS) inspections, Plan of Action and Milestones (POA&M) and Vulnerability Management System (VMS). Show less
  • Exelis
    Information Assurance Analyst
    Exelis Sep 2012 - Jun 2013
    New Kabul Compound, Kabul, Afghanistan
    1. Responsible for providing key government personnel with policy coordination and interpretation support, general information security support, and assisting with the development and implementation of a defensive security program that protects Information systems and documents.2. Responsible for ensuring and documenting that all systems are regularly scanned and audited in accordance with applicable DoD policy and procedures, and that incidents are documented and accounted for as necessary… Show more 1. Responsible for providing key government personnel with policy coordination and interpretation support, general information security support, and assisting with the development and implementation of a defensive security program that protects Information systems and documents.2. Responsible for ensuring and documenting that all systems are regularly scanned and audited in accordance with applicable DoD policy and procedures, and that incidents are documented and accounted for as necessary through leadership.3. Maintained a database to track trends, unauthorized activities, and common practice procedures and remedies to be followed by subordinate units in correcting deficiencies identified during information assurance vulnerability compliance visits.4. Employed network scanning tools such as ACAS, QTip, SCCM/SMS, WSUS etc, to detect system and network vulnerabilities/deficiencies, as part of a proactive network security policy.5. Provided daily status on findings and recommendations and provide follow-on written technical analyses and reports.6. Investigated and reported security violations and incidents to U.S. Army headquarters in accordance with DoD policy through the use of ACAS and QTIP Show less
  • Lonoke/Prairie County Regional Library System
    It Manager
    Lonoke/Prairie County Regional Library System Sep 2011 - Sep 2012
    Lonoke, Ar
    -Was responsible for purchasing hardware/software for all 8 library branches-Maintained the MS Exchange Server 2008, Symantec Antivirus Server, and Deepfreeze Server-Verified all library computers were updated with the most current MS patches through the use of a WSUS server and keep all third party software patches updated with LANGuard-Responded to various computer issues through the use of a Spiceworks ticketing system
  • Exelis
    Systems Administrator
    Exelis Jan 2011 - Jul 2011
    Bagram, Afghanistan
    -While in a NOC (Network Operations Center), responsible for enforcing security policy across network infrastructure and patch management strategies for Afghanistan, to include protection of all government computers from viruses and network security compromises-Ensure all security patches have been applied for all Operating Systems and associated software packages- maintaining an above 95% compliance rate on over 15,000 machines over 3 networks (NIPR/SIPR/CXI)-Proactive weekly scanning… Show more -While in a NOC (Network Operations Center), responsible for enforcing security policy across network infrastructure and patch management strategies for Afghanistan, to include protection of all government computers from viruses and network security compromises-Ensure all security patches have been applied for all Operating Systems and associated software packages- maintaining an above 95% compliance rate on over 15,000 machines over 3 networks (NIPR/SIPR/CXI)-Proactive weekly scanning of government networks on 3 classifications for Unauthorized Software (utilizing QTip) and Vulnerability Assessment scans (utilizing ACAS), subsequently patching machines to maintain compliance (utilizing GFI LANguard)-Enforce Data Spillage Recovery and Remediation policy and procedures over classified networks Show less
  • Verizon Wireless
    It Security
    Verizon Wireless Mar 2006 - May 2011
    Little Rock, Arkansas Area
    Provided identity management to over 50 wireless applicationsProvided identity management to UNIX and Windows platform servers via local accounts, LDAP Services, and Active DirectoryProvided assistance troubleshooting access rights to wireless applicationsConducted quarterly audits of all rights on applications assigned by managementAssisted Verizon helpdesk during high call volume.
  • Alltel
    Lan/Wan Specialist I
    Alltel Aug 2006 - Mar 2009
    Little Rock, Arkansas Area
    •Provides computer assistance to Alltel employees. •Troubleshot and resolved problems with laptops/desktops, network/stand-alone printers and plotters, Windows operating systems/applications for all Alltel employees•Provided telephone response for various hardware and software problems
  • Arkansas Department Of Information Systems (Dis)
    Dis Field Support
    Arkansas Department Of Information Systems (Dis) Mar 2005 - Aug 2006
    Little Rock, Arkansas Area
    •Maintained the antivirus server for DIS, Arkansas State Capital and Governor’s Mansion•Provided hardware and software support to the State of Arkansas Capital and the Governor's Mansion•Troubleshot and resolved problems with laptops/desktops network/stand alone printers•Identified problems with hardware/software performance and performed routine diagnostics for the different departments within the Multi-Agency Complex building
  • Research Analysis And Maintenance, Inc.
    Lan Integrator
    Research Analysis And Maintenance, Inc. May 2003 - Mar 2005
    Little Rock, Arkansas Area
    Provided computer assistance to soldiers of the Arkansas Army National GuardTroubleshot and resolved problems with laptops/desktops, network/stand alone printers and plotters, Windows operating systems/applications and Oracle client, Citrix client and SMS*Provided three-line telephone response of hardware and software problems*Identified problems with hardware/software and performs routine diagnostics*Created and provided weekly open calls report and monthly listing of all… Show more Provided computer assistance to soldiers of the Arkansas Army National GuardTroubleshot and resolved problems with laptops/desktops, network/stand alone printers and plotters, Windows operating systems/applications and Oracle client, Citrix client and SMS*Provided three-line telephone response of hardware and software problems*Identified problems with hardware/software and performs routine diagnostics*Created and provided weekly open calls report and monthly listing of all calls logged Show less

Craig T. Skills

Information Technology Information Security Linux Cissp Active Directory Cybersecurity Antivirus Computer Hardware It Audit Burp Suite Endpoint Security Networking It Automation Troubleshooting Computer Security Ansible Team Management System Administration Vulnerability Management Cism Microsoft Office Relationship Building Cyber Security Bluecoat Proxies A+ Network Security Encryption Security+ Network Administration Disaster Recovery Customer Service Information Security Management Military Technical Support Microsoft Certified Professional Hardware Vulnerability Assessment Comptia Security Dod Servers System Deployment Information Assurance Diacap Comptia Security+ Analysis Cyber Threat Hunting Vmware Vsphere Vulnerability Scanning

Craig T. Education Details

Frequently Asked Questions about Craig T.

What company does Craig T. work for?

Craig T. works for Integrated Security Solutions, Inc.

What is Craig T.'s role at the current company?

Craig T.'s current role is Cyber Security Specialist.

What schools did Craig T. attend?

Craig T. attended Webster University, Central Baptist College.

What skills is Craig T. known for?

Craig T. has skills like Information Technology, Information Security, Linux, Cissp, Active Directory, Cybersecurity, Antivirus, Computer Hardware, It Audit, Burp Suite, Endpoint Security, Networking.

Who are Craig T.'s colleagues?

Craig T.'s colleagues are Mike Wrbelis, Rose Dawson, Matthew Fehlman, Donovan Reed, Rebecca Johnson, Joanna Wyss, Shannon Freyholtz.

Not the Craig T. you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.