Derrick Downs

Derrick Downs Email and Phone Number

TS Clearance - Cybersecurity SME - IT Professional at United States Department of Defense @
Derrick Downs's Location
Lawrenceville, Georgia, United States, United States
Derrick Downs's Contact Details

Derrick Downs personal email

About Derrick Downs

PROFESSIONAL SUMMARY:Highly skilled Information Technology (IT) Specialist and certified Information Assurance Security Officer (IASO) with more than 14 years of experience supporting complex government, military and corporate enterprise systems, networks, databases, hardware, software and systems. Supported crucial Department of Defense (DoD) logistics automated information management systems in Iraq with thorough knowledge of US Army automated systems. Strong technical, oral and written communication skills with the ability to identify problems and present analytical data in clear and concise terms. Experience providing system and data analysis, configuration, troubleshooting, integration and maintenance of systems such as the Standard Army Retail Supply System (SARSS), Property Book Unit Supply Enhanced (PBUSE), Standard Army Maintenance System (SAMS), Unit Level Logistics System (ULLS), Integrated Logistics Analysis Program (ILAP) and the Funds Control Module. Skilled Network Administrator supporting Local Area Network/Wide Area Network (LAN/WAN) security and connectivity in a distributed environment.

Derrick Downs's Current Company Details
INSIGHT GLOBAL / FBI

Insight Global / Fbi

TS Clearance - Cybersecurity SME - IT Professional at United States Department of Defense
Derrick Downs Work Experience Details
  • Insight Global / Fbi
    Information System Security Officer (Isso)
    Insight Global / Fbi Jul 2023 - Present
    Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS provide liaison support between the system owner and other IS security personnel ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle ensure that system security documentation is developed, maintained, reviewed, and updated in XACTA on a continuous basis.Conduct required IS vulnerability scans according to risk assessment parameters using NESSUS.Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities.Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs).Coordinate system owner concurrence for correction or mitigation actions.Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO).Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase.Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM).Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR.
  • Serco International
    Information System Security Officer (Isso)
    Serco International May 2022 - Jul 2023
    Verified that all GEODSS mission systems are certified and accredited as required by DoD and Army regulations and policy. Provides direction to ensure all ICS and related products are managed within Army management/oversight databases to provide accurate depiction of the systems or products.Establishes and ensures that appropriate security controls over software and hardware are always maintained. Analyzes software and hardware requirements. Patches devices in accordance with IAVAs and reports on compliancy.Develops, manages and communicates organizational security policies and standards to protect company systems and assets. Research emerging threats and recommends software and hardware solutions and procedures that neutralize those threats.Designs, establishes and executes company security strategy. Documents, reviews, maintain and edit security best practices and policies. Communicates and collaborates with IT team to maintain equipment and optimize security of system architecture. Creates Logical maps of ICS systems and components using Visio.INFORMATION SECURITYPerform computer security assessments, and to implement and maintain the Detachments Cybersecurity program for the GEODSS mission system, NIPRNET and SIPRNET. Execute cybersecurity responsibilities protecting and defending information systems by ensuring the availability, integrity, confidentiality, authentication, and non-repudiation of data through the application of cybersecurity measures. Protect ISs, their operating system, peripherals (media and devices), applications, and the information it contains against loss, misuse, unauthorized access, or modification. Ensure all users and ISSOs receive all required training and provide training to the GEODSS employees. In conduction with the SAs the ISSOs will manage the cybersecurity of the mission on a regular basis to include audit logging and reviewing, account management, incident response and other requirements IAW NIST SP 800-53, AFI 17-130.
  • Vista Technical Services, Llc/Atl
    Information Security Engineer
    Vista Technical Services, Llc/Atl Apr 2021 - Jul 2022
    Verifies that all ICS are certified and accredited as required by DoD and Army regulations and policy. Provides direction to ensure all ICS and related products are managed within Army management/oversight databases to provide accurate depiction of the systems or products.Establishes and ensures that appropriate security controls over software and hardware are maintained at all times. Analyzes software and hardware requirements. Patches devices in accordance with IAVAs and reports on compliancy.Develops, manages and communicates organizational security policies and standards to protect company systems and assets. Researches emerging threats and recommends software and hardware solutions and procedures that neutralize those threats.Designs, establishes and executes company security strategy. Documents, reviews, maintain and edit security best practices and policies. Communicates and collaborates with IT team to maintain equipment and optimize security of system architecture. Creates Logical maps of ICS systems and components using Visio.INFORMATION SECURITYVerifies that all ICS are certified and accredited as required by DoD and Army regulations and policy. Provides direction to ensure all ICS and related products are managed within Army management/oversight databases to provide accurate depiction of the systems or products. Participate in strategic planning for the deployment of information security technologies and program enhancements in the OT ICS environment.Work and communicate with operations, engineering, facilities engineers, public works, and IT departments to ensure adequate security controls are in place for systems.Conducts and facilitates inquiries into all security issues and incidents involving ICS and provides findings and recommendations to the ISSM.Identify and evaluate complex technology risks and remediation methods to mitigate risks, assesses and evaluates vulnerabilities and/or adversary activity in ICS enclaves.
  • United States Department Of Defense
    Lead Information Technology (It) Specialist (Isso), (Sasmo), (Lms) (Gs12)
    United States Department Of Defense Feb 2018 - Apr 2022
    Washington, Dc, Us
    IT EXPERT: Maintain nonstop IT enterprise providing worldwide data, Global Video Services (GVS), voice and Video Teleconferencing (VTC) services over classified networks and systems. Provide lifecycle management from customer query and validation to implementation, reviewing, validating, managing, tracking and executing service requirements in accordance with Department of Defense (DOD) standards. Develop and implement IT solutions as Systems Administrator and Lead Support Technician for all Forces Command (FORCOM) units and 65 contractors. Install, configure, troubleshoot, repair and maintain hardware, software and operating systems in a mixed Microsoft (MS) Windows, UNIX and Linux environment with Oracle databases and Storage Area Network (SAN) systems. Maintain MS Active Directory accounts, groups and permissions. Ensure reliable Local Area Network (LAN) and Wide Area Network (WAN) connectivity to provide Internet and communications access. Used Assured Compliance Assessment Solution (ACAS) to scan for system vulnerabilities and corrected all category 1-5 vulnerabilities after system detection from that scan.Used Assured Compliance Assessment Solution (ACAS) to scan for system vulnerabilities and corrected all category 1-5 vulnerabilities after system detection from that scan. Supported all assigned systems, including Very Small Aperture Terminal (VSAT) two-way satellite communications used by the military for Internet access, Client Access to Integrated Services and Information (CAISI) access point. Property Book Unit Supply Enhanced (PBUSE), Standard Army Maintenance System-Enhanced (SAMS-E), Standard Army Retail Supply System (SARSS) and Standard Army Ammunition System-Modernization (SAAS-MOD). Performed thorough work with conscientious attention to detail in managing the Internet Information Server (IIS) in a multilocation and multiserver environment.
  • Mantech
    Lead Cssamo/ Sasmo
    Mantech Jan 2011 - Feb 2018
    Herndon, Virginia, Us
    Maintain confidential and classified information on secure DOD networks and databases as a certified Information Assurance Security Officer (IASO). Provide guidance and support to Information Security (INFOSEC) officers in structuring, implementing and monitoring safeguards to maintain security and confidentiality. Support Information Assurance (IA) programs to ensure the security of classified and confidential data on the Secret Internet Protocol Router Network (SIPRNet) and Unclassified but Sensitive IP Router Network (NIPRNet). Implement and maintain firewalls, intrusion protection and antivirus systems and software to guard against cyber attacks, hackers, viruses, unauthorized access and other threats. Used Assured Compliance Assessment Solution (ACAS) to scan for system vulnerabilities and corrected all category 1-5 vulnerabilities after system detection from that scan. Implemented DOD Security Technical implementation Guides (STIGS) using SCAP Compliance Checker (SCC). Assisted in the development and verification of documentation used to complete the DOD RMF assessment and authorization process. Used the DISA & PURDUE model to figuring out a typical modern ICS architecture. Conducted ICS/SCADA system inventories gathering the sensor locations, Human Machine Interfaces (HMI), Programmable Logical Controllers, Switches, Variable Frequency Devices (VFD), IP addresses, MAC addresses, and Serial Numbers.
  • L3 Technologies
    Lead Cssamo/Sasmo
    L3 Technologies Sep 2009 - Dec 2010
    New York, Ny, Us
    Maintained the confidentiality and security of all information, including transmission over the deployable wireless LAN infrastructure. Evaluated and defined IT security requirements, applying IT security principles, methods and tools. Managed Information Assurance and enforced INFOSEC policies and procedures in compliances with US Army and DOD laws and regulations. Ensured proper protocols and intrusion detection/protection systems were in place for network security. Used Assured Compliance Assessment Solution (ACAS) to scan for system vulnerabilities and corrected all category 1-5 vulnerabilities after system detection from that scan. Implemented DOD Security Technical implementation Guides (STIGS) using SCAP Compliance Checker (SCC). Assisted in the development and verification of documentation used to complete the DOD RMF assessment and authorization process. Used the DISA & PURDUE model to figuring out a typical modern ICS architecture. Conducted ICS/SCADA system inventories gathering the sensor locations, Human Machine Interfaces (HMI), Programmable Logical Controllers, Switches, Variable Frequency Devices (VFD), IP addresses, MAC addresses, and Serial Numbers. This was mainly used for the HVAC systems and at the Water Treatment Facilities.Supported all assigned systems, including Very Small Aperture Terminal (VSAT) two-way satellite communications used by the military for Internet access, Client Access to Integrated Services and Information (CAISI) access point. Property Book Unit Supply Enhanced (PBUSE), Standard Army Maintenance System-Enhanced (SAMS-E), Standard Army Retail Supply System (SARSS) and Standard Army Ammunition System-Modernization (SAAS-MOD). Performed thorough work with conscientious attention to detail in managing the Internet Information Server (IIS) in a multilocation and multiserver environment.
  • Caci International Inc
    Readiness Research Analyst 2
    Caci International Inc Dec 2007 - Feb 2009
    Reston, Virginia, Us
    Contract employee performing research and analysis of unit readiness status for US Army Central Command (ARCENT).LEADERSHIP: Directed and coordinated unit analysis efforts to improve unit readiness in preparation for mobilization. Ensured command-wide implementation of Joint Chiefs of Staff (JCS) Publication 1.03-3, Army Regulation 220-1 and other directives pertaining to Unit Status Reports (USRs).RESEARCH AND ANALYSIS: Ensured accurate evaluation of ARCENT unit’s ability to mobilize, deploy, fight and sustain the force in support of worldwide contingencies. Reviewed all information to provide quality products and services to senior leadership.IT EXPERT: Used a variety of automated information management systems to accomplish daily tasks, including Defense Readiness Reporting System-Army (DRRS-A), Net USR, Global Command and Control System-Army (GCCS-A), Army Readiness Management System (ARMS) and Force Management System (FMS).COMMUNICATIONS: Assembled information and assisted in preparing in-depth presentations of unit readiness for the ARCENT Command Group. Prepared detailed reports and documents on ARCENT unit readiness, coordinating USR submissions from all units deployed in the Area of Responsibility (AOR). Published supplemental guidelines in USR submissions for ARCENT units, ensuring USR submissions met JCS and Headquarters, Department of the Army (HQDA)-established timelines. Expressed information, ideas and facts to individuals or groups effectively, taking into account the audience and nature of technical, sensitive or controversial information.ACCOMPLISHMENTS:*Processed more than 500 USRs,*Trained and inspected more than 300 soldiers on proper equipment and supply tracking and reporting *Improved communications between the PBO and the Systems Clerk to eliminate critical deficiencies
  • Logistics Management Resources, Inc. (Lmr)
    81St Rrc (Sasmo)
    Logistics Management Resources, Inc. (Lmr) Dec 2004 - Nov 2007
    Baton Rouge, La, Us
    Provided logistics management support to the US Army Reserve Command (USARC) throughout eight states (Kentucky, Tennessee, Mississippi, Alabama, Georgia, Florida, South Carolina, and North Carolina).LEADERSHIP: Managed the implementation and fielding of new systems, working independently and managing teams of up to 40 personnel.RESEARCH AND ANALYSIS: Researched daily operations and management practices, collecting data to determine customer needs and develop specifications for automated logistics and maintenance management systems development.IT EXPERT: Designed comprehensive systems that covered the functional areas of maintenance management, inventory control, transportation, deployment/redeployment management, logistics management, information systems management and material readiness control. Identified problems and used sound judgment to generate and evaluate alternatives and to make recommendations for problem solving.TRAINING: Created and delivered training programs to build employee proficiency basic computer use, SAMS-E, and PBUSE to ensure a smooth transition.CUSTOMER SUPPORT: Provided customer support by operating, troubleshooting and maintaining STAMIS application software and hardware. Fielded STAMIS machines, adding the systems to the domain, adding user groups as well as running the Security Identifier (SID) changes.COMMUNICATIONS: Made clear and convincing oral presentations, listening to others, attending to nonverbal cues and responding appropriately. Communicated effectively, both orally and in writing.ACCOMPLISHMENTS:*Received Best Customer Support Award, 04/2005*Independently managed National Guard, Army and Army Reserve Units in eight states *Increased system support percentage from 35% to 95%

Derrick Downs Skills

Troubleshooting Network Administration Computer Hardware Networking Access Logistics Management Microsoft Office Microsoft Excel Project Management Strategic Planning Windows Microsoft Sql Server Ms Project Sql Program Management

Derrick Downs Education Details

  • Pima Community College
    Pima Community College
    Computer Management
  • Long Beach City College
    Long Beach City College
    And Related Support Services

Frequently Asked Questions about Derrick Downs

What company does Derrick Downs work for?

Derrick Downs works for Insight Global / Fbi

What is Derrick Downs's role at the current company?

Derrick Downs's current role is TS Clearance - Cybersecurity SME - IT Professional at United States Department of Defense.

What is Derrick Downs's email address?

Derrick Downs's email address is dd****@****ail.com

What schools did Derrick Downs attend?

Derrick Downs attended Pima Community College, Long Beach City College.

What skills is Derrick Downs known for?

Derrick Downs has skills like Troubleshooting, Network Administration, Computer Hardware, Networking, Access, Logistics Management, Microsoft Office, Microsoft Excel, Project Management, Strategic Planning, Windows, Microsoft Sql Server.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.