Daniel Broussard Email and Phone Number
Daniel Broussard work email
- Valid
- Valid
- Valid
Daniel Broussard personal email
Proud US Military Veteran and dynamic detail-oriented Security Control Assessor highly regarded for demonstrated experience developing and deploying complex infrastructures and technical solutions for industry leaders, including the US Air Force, Navy, and Army. Recognized for expertise of directing risk management initiatives and establishing, implementing, and enhancing key information security objectives for control frameworks while maximizing productivity. Well known for proficiency in determining system requirements and resolving technical issues quickly, and skilled at providing effective leadership in fast paced, deadline-driven environments. Acknowledged for outstanding presentation and communication skills, understanding business requirements to cross-collaborate and increase profits.
-
Senior Security Control AssessorUnited States Air Force Aug 2024 - PresentRandolph Afb, Tx, Us -
Information System Security ManagerLockheed Martin May 2023 - Jun 2024Bethesda, Md, Us -
Information System Security Manager (Advisor)Asrc Federal Nov 2021 - Apr 2023Reston, Va, Us -
Information System Security ManagerLockheed Martin Jun 2018 - Nov 2021Bethesda, Md, UsServe as the principal advisor to the Information System Owner (ISO), on all matters, technical and otherwise, involving the security of an information system. Responsible for ensuring the implementation and maintenance of security controls in accordance with the System Security Plan (SSP) and Department of Defense policies. Providing guidance, oversight, and expertise, may develop security documents and implement any security controls. Coordinate, facilitate, or otherwise ensure certain activities are being performed. Build professional relationships with the ISO, technical staff, customers, and other stakeholders. Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. Inform users about security measures, explain potential threats, install software, implement security measures and monitor networks. As cyber attacks have increased, so too has the demand for security officers in the Department of Defense among other government agencies and large corporations. Responsible for gathering information necessary to maintain security and establish functioning external barriers such as firewalls and other security measures. Define, create and maintain the documentation for certification and accreditation of each information system in accordance with government requirements. Assess the impacts on system modifications and technological advances. Review systems in order to identify potential security weaknesses, recommend improvements to amend vulnerabilities, implement changes and document upgrades. -
Information Systems Security OfficerMantech International Jan 2018 - May 2018Herndon, Virginia, UsServe as the principal advisor to the Information System Owner (ISO), Business Process Owner, and the Chief Information Security Officer (CISO) / Information System Security Manager (ISSM) on all matters, technical and otherwise, involving the security of an information system. Responsible for ensuring the implementation and maintenance of security controls in accordance with the Security Plan (SP) and Department of Defense policies. Providing guidance, oversight, and expertise, may develop security documents and implement any security controls. Coordinate, facilitate, or otherwise ensure certain activities are being performed. Build professional relationships with the ISO, technical staff, and other stakeholders. Research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. Inform users about security measures, explain potential threats, install software, implement security measures and monitor networks. As cyber attacks have increased, so too has the demand for security officers in the Department of Defense among other government agencies and large corporations. Responsible for gathering information necessary to maintain security and establish functioning external barriers such as firewalls and other security measures. Define, create and maintain the documentation for certification and accreditation of each information system in accordance with government requirements. Assess the impacts on system modifications and technological advances. Review systems in order to identify potential security weaknesses, recommend improvements to amend vulnerabilities, implement changes and document upgrades. -
Cyber Security AnalystEpsilon, Inc. Aug 2017 - Jan 2018Weaverville, Nc, UsParticipated in and performed Cybersecurity design, testing, compliance, documentation, and compliance of computing infrastructures. Demonstrated sustained technical participation in engineering teams and hands on experience in UNIX (HP-UX & Solaris), Linux, Windows, Red Hat Enterprise, and CISCO enterprise switches, routers, and firewalls. Hands-on technical experience along with experience managing the overall DIACAP Certification and Accreditation (C&A)/Risk Management Framework (RMF) Assessment and Authorization (A&A) processes. Progressive technical experience to Information Assurance (IA)/Cybersecurity Engineering requirements, determination, development and implementation. Experienced security systems engineering involving various computer hardware and software operating systems and application solutions in both a standalone and in LAN/WAN configurations. Understandings of systems engineering requirements, specifications, and experience implementing DoD and Federal IA C&A/A&A processes, Security Controls and developing and maintaining associated C&A/A&A documentation. Performed independent RMF A&A and system-level security testing services as described in DODI 8510.01 & NIST Special Publication 800-37. Performed security assessments and scans utilizing tools and features such Nessus/Assured Compliance Assessment Solution (ACAS), NMAP, Security Content Automation Protocol (SCAP), and Security Technical Implementation Guides (STIGs). Implemented system security hardening guidelines on the systems and performed functional testing on the systems after system security hardening is in place. Developed network diagrams to show the accreditation boundary and developed all other required A&A documents/artifacts using the MS-Visio, Word, and Excel. Conducted risk and threat analyses, developing mitigation and remediation plans, identifying timelines, resources required, responsible parties, and other amplifying information for each finding uncovered during testing. -
Information Systems Security EngineerEpsilon, Inc. Jan 2017 - Jan 2018Weaverville, Nc, UsPerform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommends mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforces the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification, and awareness activities for system and networking operations. Reviews Certification and Accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following: system security design process; engineering life cycle; information domain; cross-domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA. -
System AnalystCoherent Technical Services, Inc. Oct 2016 - Jan 2017Hollywood, Maryland, UsAnalyzes and defines security' requirements for multilevel Security (MLS) issues. Designs, develops, engineers, and implements solutions to MLS requirements. Gathers and organizes technical information about mission goals and needs, existing security solutions and products, and ongoing programs in the MLS arena. Performs risk analyses of proposed changes to existing environments, and planned implementations of new facilities and field deployments. Performs risk assessments of existing IT environments and identifies impacts of planned changes, and security's risk assessments for new projects. Provides technical support for secure integration of systems hardware, and secure software development and integration. Reviews work products for correctness and adherence to secure design concept and to Command standards. Analyzes and recommends resolution of IA/security problems on the basis of knowledge of the major IA products and services, an understanding of their limitations, and knowledge of the IA disciplines. Conduct complex security architecture analysis to evaluate and mitigate issues. Develops complex technical and programmatic assessments, evaluates engineering and integration initiatives and provides complex technical support to assess security policies, standards and guidelines. Validates and tests complex security architecture and design solutions to produce detailed engineering specifications with recommended vendor technologies. Identifies and oversees the installation, modification or replacement of hardware or software components and any configuration change(s) that affects security. Provides complex technical oversight and enforcement of security directives, orders, standards, plans and procedures at server sites. -
It SpecialistFreedom Staffing May 2016 - Sep 2016Indianapolis, Indiana, UsAnalyzes and defines security' requirements for multilevel Security (MLS) issues. Designs, develops, engineers, and implements solutions to MLS requirements. Gathers and organizes technical information about mission goals and needs, existing security solutions and products, and ongoing programs in the MLS arena. Performs risk analyses of proposed changes to existing environments, and planned implementations of new facilities and field deployments. Performs risk assessments of existing IT environments and identifies impacts of planned changes, and security's risk assessments for new projects. Provides technical support for secure integration of systems hardware, and secure software development and integration. Reviews work products for correctness and adherence to secure design concept and to Command standards. Analyzes and recommends resolution of IA/security problems on the basis of knowledge of the major IA products and services, an understanding of their limitations, and knowledge of the IA disciplines. Conduct complex security architecture analysis to evaluate and mitigate issues. Develops complex technical and programmatic assessments, evaluates engineering and integration initiatives and provides complex technical support to assess security policies, standards and guidelines. Validates and tests complex security architecture and design solutions to produce detailed engineering specifications with recommended vendor technologies. Identifies and oversees the installation, modification or replacement of hardware or software components and any configuration change(s) that affects security. Provides complex technical oversight and enforcement of security directives, orders, standards, plans and procedures at server sites. -
Jstars Network OperatorUnited States Air Force Jul 2013 - Mar 2016Randolph Afb, Tx, UsMaintain, operate & deploy computer based Transportable Mission Support System - Build mission specific software used to increase productivity and effectiveness - Provide exemplary customer service and effective communication between different departments to encourage cohesiveness - Download, organize and archive numerical data utilizing programs such as Microsoft Excel, SharePoint, and Microsoft Server - Perform client-level information technology support functions - Utilizes automated equipment such as optical readers, scanners, and computer keyboards to enter and extract data - Manage hardware, software, and Controlled Cryptographic Items (CCI) - Maintain detailed inventory of critical assets including sensitive data, IT equipment and storage components - Train/ Supervise subordinates on all job duties - Proficient in VMS and UNIX data manipulation - Maintain integrity and accuracy of database information - Maintain professional appearance and punctuality at all times -
Cyber System OperatorUnited States Air Force Dec 2012 - Mar 2016Randolph Afb, Tx, UsInstall, support and maintain servers or other computer systems and plan for responding to service outages and interruptions to network operations. Administer server-based networked systems, distributed applications, network storage, messaging and application monitoring required to provide, sustain, operate and integrate cyber networked systems and applications in garrison and at deployed locations. Knowledgeable in server operating systems, database administration, web technologies and systems-related project management. Support identification, reconnaissance and exploitation of vulnerabilities while enhancing capabilities within cyber environments to achieve desired effects
Daniel Broussard Skills
Daniel Broussard Education Details
-
Waxahachie Global High SchoolHigh School Diploma
Frequently Asked Questions about Daniel Broussard
What company does Daniel Broussard work for?
Daniel Broussard works for United States Air Force
What is Daniel Broussard's role at the current company?
Daniel Broussard's current role is Senior Security Control Assessor at United States Air Force.
What is Daniel Broussard's email address?
Daniel Broussard's email address is db****@****mco.com
What schools did Daniel Broussard attend?
Daniel Broussard attended Waxahachie Global High School.
What skills is Daniel Broussard known for?
Daniel Broussard has skills like Air Force, Information Assurance, Computer Network Operations, Database Administration, Systems Engineering, Program Management, Intelligence Analysis, Operating Systems, Project Management, Openvms, Military Operations, National Security.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial