Kevin H.

Kevin H. Email and Phone Number

410-846-4582 | CISM / CISSP / VSBE Candidate | CSSO |Author #Hacked2 | Associate C | CISO | (ISSM) | Security + | Network + | @ Hands of Support Computer Services
baltimore, maryland, united states
Kevin H.'s Location
Washington DC-Baltimore Area, United States
About Kevin H.

Pain Killer & Results driven professional with 30 years of experience providing management, consulting, cyber security services to the federal government and commercial clients.Member Professional Working Groups; ie (Community Association for Information Systems Security Working Group (CAISSWG), and Industrial Security Working Group (ISWG).Founder Hands of Support, LLCThis is my personal account. the views and opinions presented herein are those of the author and do not necessarily represent the views of the company or its components. appearance of, or reference to, any commercial Products or services does not constitute endorsement of these products or services. the appearance of external hyperlinks does not constitute company endorsement of the linked websites, or the information, products, or services therein.Read all about the company and our offerings at www.handsofsupport.com...in a nutshell...OUR FOCUS is on Finding, Tailoring, and Monitoring a Small Business Solution that fits YOUR business needs.OUR COMMITMENT is to serve you with frank Integrity, Confidentiality, and Expertise.OUR DISTINGUISHING POINTS...There are many information technology solutions available, but at Hands of Support Computer Services, we pride ourselves in earning client trust by:1) Bringing you returns and methods similar to Larger Corporations by providing computer support and Small Business Solutions at a much lower rate.2) We guarantee the smoothest transition from local administration to secure remote site management3) Guiding you through the selection and acquisition process personally to ensure your choices suit your unique computing needs.4) Staying with you for the long term to provide perspective, service, and advice, through your ever changing technology needs.5) Provide you certified professionals in your area of need, that will communicate your solution in an easy and understandable way free of technology jargon.Contact Us by Phone 410-846-4582

Kevin H.'s Current Company Details
Hands of Support Computer Services

Hands Of Support Computer Services

View
410-846-4582 | CISM / CISSP / VSBE Candidate | CSSO |Author #Hacked2 | Associate C | CISO | (ISSM) | Security + | Network + |
baltimore, maryland, united states
Employees:
2
Kevin H. Work Experience Details
  • Consulting
    Information Systems Security Manager (Issm)
    Consulting Mar 2017 - Present
    United States
    - IT Solutions Engineering focused on IA Supporting Risk Management Framework (RMF) Missions.- Principal advisor on all matters technical and otherwise involving the security & compliance of an information system.- Manage and maintain infrastructure security by developing and maintaining a formal organizational or system level Cybersecurity program that includes architecture, customer policy, requirements, objectives, personnel & cyber process and procedure.-Applies experience to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features for system architectures-Develop enterprise information assurance and security standards- Develops and implements information assurance/security standards and procedures-Identifies, reports, and resolves security violations-Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands-Supports customers at the highest levels in the development and implementation of doctrine and policies-Performs analysis, design, and development of security features for system architectures-Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers-Designs, develops, engineers, and implements solutions that meet security requirements-Provides integration and implementation of the computer system security solutions;-Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems;-Performs vulnerability/risk analysis of computer systems and applications during all phases of the system development life cycle-Ensures that all information systems are functional and secure.
  • Icoc
    Systems Engineer
    Icoc 1997 - Present
    Develop innovative technical solutions IOT provide infrastructure & fly away Support as needed by the customer.Provide event recording and projection support.
  • Hands Of Support Computer Services
    Member Board Of Directors
    Hands Of Support Computer Services Jan 2009 - Present
    200 South Franklintown Rd. Baltimore Md 21223
    *Directed technology investment and adoption with small to medium business customers. * Led Strategic Consulting, including business plan & sales strategy development. * Led Advising new businesses on formation of corporations and business structures, drafting privacy policies and structuring commercial transactions. * Created structure which resulted in technical services distribution and business automation.
  • Itt Technical Institute
    Adjunct Instructor
    Itt Technical Institute Apr 2016 - 2016
    Repurposed 15 year old Computer Hardware that is readily available & Increased technology access to vulnerable & under-represented communities through 135 hours of hands on experience.
  • United States Cyber Command
    It Specialist / Sap Sto Specialist
    United States Cyber Command Dec 2014 - Nov 2015
    Fort Meade Maryland
    • Responsible for conducting military/contingency and crisis planning of Special Access Program (SAP) capabilities and Integrated Joint Special Technical Operations (IJSTO) in direct support to cyberspace operations in order to protect, detect, mitigate, and deter cyber vulnerabilities and cyber adversaries.• Directly supports the execution IJSTO operations in the Joint Operation Center (JOC)• Performs analysis of planned military operations, coordinating with Combatant Commands/Services/Agencies (CCSAs) in combining Information Operation (IO) disciplines to achieve desired operational effects.• Performs planning using the Joint Operation Planning and Execution System (JOPES) and the Joint Staff Review and Approval Process (RAP) determining realistic assumptions, requirements, analytical approaches and techniques to be used in military operations planning and execution.• Provides expertise in technical coordination and advice to superiors, subordinates, and coworkers.• Serves as a technical interface and planner for developing and maturing capabilities in support of military missions and functions.
  • Lockheed Martin
    Information Systems Security Officer / Senior Systems Engineer
    Lockheed Martin Jul 2008 - Jun 2014
    As an IAO, I am continually working Directly with Program Security Officers to ensure that all Network connections and nodes are Certified and Accredited in accordance with specific JAFAN 6/3 Protection layers (PL).Installed and maintained multiple PL II networks and well as work with PLIII networking infrastructure.Ensure all data was maintained with proper labeling and security, and data spills were prevented as much as possible. In the event of a data spill I was able to react quickly to ensure all information was recovered/sanitized and work could continue with minor impact to the missions.Perform Multiple Certification and Accreditations (C&A’s) on classified systems to meet JFAN PL and RMF standards. Worked with officers and management to procure new equipment while trying to keep within budget.Responsible for upgrading and maintaining a classified network to include E-mail servers, Data servers, Domain controllers, and all related servers needed to assist the customers in completing the mission.Created/maintained Dell Powervault data storage units.Maintained computers for office of 20 customers. Insured all computers in compliance with AF standards.Support of test missions down range to ensure all computer related issues were attended to before causing testing mission stoppages and money loss.
  • Lockheed Martin Information Technology
    Sr. Computer Systems Analyst
    Lockheed Martin Information Technology Nov 2006 - Jun 2014
    Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
  • National Counterterrorism Center (Nctc)
    Systems Engineer
    National Counterterrorism Center (Nctc) 2004 - 2006
    Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
  • Planned Systems International
    Network Administrator
    Planned Systems International 2002 - 2003
    Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
  • Navy Marine Corps Intranet (Nmci)
    Remote Fault Manager
    Navy Marine Corps Intranet (Nmci) 2001 - 2002
    Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
  • Us Navy
    Radioman 3Rd Class
    Us Navy 1995 - 1999
    Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.

Kevin H. Skills

Integration Leadership Analysis Security Testing Network Security Management Program Management Networking Information Technology Requirements Analysis Customer Service Computer Repair Hardware Strategic Planning Computer Hardware Technical Support Business Strategy Team Building Outsourcing Information Assurance System Administration Business Intelligence Troubleshooting Server Architecture Purchasing Entrepreneurship Crm B2b Business Analysis Cloud Computing Software Installation Dod Sales Project Management Network Administration Microsoft Office Government Liaison Software Documentation Budgets Security Clearance Windows Project Planning Computer Security Sdlc Servers Sharepoint Designer

Kevin H. Education Details

  • Voc -Tech
    Voc -Tech
    Electronics
  • Learning Tree International
    Learning Tree International
    Cyber/Electronic Operations And Warfare

Frequently Asked Questions about Kevin H.

What company does Kevin H. work for?

Kevin H. works for Hands Of Support Computer Services

What is Kevin H.'s role at the current company?

Kevin H.'s current role is 410-846-4582 | CISM / CISSP / VSBE Candidate | CSSO |Author #Hacked2 | Associate C | CISO | (ISSM) | Security + | Network + |.

What is Kevin H.'s email address?

Kevin H.'s email address is ba****@****att.net

What is Kevin H.'s direct phone number?

Kevin H.'s direct phone number is +141084*****

What schools did Kevin H. attend?

Kevin H. attended Voc -Tech, Learning Tree International.

What are some of Kevin H.'s interests?

Kevin H. has interest in Exercise, Sweepstakes, Nascar, Home Improvement, Reading, Gourmet Cooking, Sports, Home Decoration, Cooking, Electronics.

What skills is Kevin H. known for?

Kevin H. has skills like Integration, Leadership, Analysis, Security, Testing, Network Security, Management, Program Management, Networking, Information Technology, Requirements Analysis, Customer Service.

Not the Kevin H. you were looking for?

  • Kevin H

    San Francisco Bay Area
    5
    gmail.com, ideo.com, stanford.edu, stripe.com, mediapost.com

    1 (212) 2XXXXXXX

  • Kevin H

    Healthcare Recruiter
    Edison, Nj
  • Kevin H.

    Greensboro--Winston-Salem--High Point Area
  • Kevin A.

    Sr. Staff Infrastructure Solutions Architect @ Rivian | Mcsa, Mcse, Cybersecurity Architect
    Los Angeles Metropolitan Area
    3
    infosys.com, yahoo.com, rivian.com
  • Kevin H.

    Senior Principal Software Engineer At Northrop Grumman
    United States

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.