Kevin H. Email and Phone Number
Kevin H. work email
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
Kevin H. personal email
Kevin H. phone numbers
Pain Killer & Results driven professional with 30 years of experience providing management, consulting, cyber security services to the federal government and commercial clients.Member Professional Working Groups; ie (Community Association for Information Systems Security Working Group (CAISSWG), and Industrial Security Working Group (ISWG).Founder Hands of Support, LLCThis is my personal account. the views and opinions presented herein are those of the author and do not necessarily represent the views of the company or its components. appearance of, or reference to, any commercial Products or services does not constitute endorsement of these products or services. the appearance of external hyperlinks does not constitute company endorsement of the linked websites, or the information, products, or services therein.Read all about the company and our offerings at www.handsofsupport.com...in a nutshell...OUR FOCUS is on Finding, Tailoring, and Monitoring a Small Business Solution that fits YOUR business needs.OUR COMMITMENT is to serve you with frank Integrity, Confidentiality, and Expertise.OUR DISTINGUISHING POINTS...There are many information technology solutions available, but at Hands of Support Computer Services, we pride ourselves in earning client trust by:1) Bringing you returns and methods similar to Larger Corporations by providing computer support and Small Business Solutions at a much lower rate.2) We guarantee the smoothest transition from local administration to secure remote site management3) Guiding you through the selection and acquisition process personally to ensure your choices suit your unique computing needs.4) Staying with you for the long term to provide perspective, service, and advice, through your ever changing technology needs.5) Provide you certified professionals in your area of need, that will communicate your solution in an easy and understandable way free of technology jargon.Contact Us by Phone 410-846-4582
Hands Of Support Computer Services
View- Website:
- handsofsupport.com
- Employees:
- 2
-
Information Systems Security Manager (Issm)Consulting Mar 2017 - PresentUnited States- IT Solutions Engineering focused on IA Supporting Risk Management Framework (RMF) Missions.- Principal advisor on all matters technical and otherwise involving the security & compliance of an information system.- Manage and maintain infrastructure security by developing and maintaining a formal organizational or system level Cybersecurity program that includes architecture, customer policy, requirements, objectives, personnel & cyber process and procedure.-Applies experience to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features for system architectures-Develop enterprise information assurance and security standards- Develops and implements information assurance/security standards and procedures-Identifies, reports, and resolves security violations-Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands-Supports customers at the highest levels in the development and implementation of doctrine and policies-Performs analysis, design, and development of security features for system architectures-Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers-Designs, develops, engineers, and implements solutions that meet security requirements-Provides integration and implementation of the computer system security solutions;-Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems;-Performs vulnerability/risk analysis of computer systems and applications during all phases of the system development life cycle-Ensures that all information systems are functional and secure.
-
Systems EngineerIcoc 1997 - PresentDevelop innovative technical solutions IOT provide infrastructure & fly away Support as needed by the customer.Provide event recording and projection support.
-
Member Board Of DirectorsHands Of Support Computer Services Jan 2009 - Present200 South Franklintown Rd. Baltimore Md 21223*Directed technology investment and adoption with small to medium business customers. * Led Strategic Consulting, including business plan & sales strategy development. * Led Advising new businesses on formation of corporations and business structures, drafting privacy policies and structuring commercial transactions. * Created structure which resulted in technical services distribution and business automation. -
Adjunct InstructorItt Technical Institute Apr 2016 - 2016Repurposed 15 year old Computer Hardware that is readily available & Increased technology access to vulnerable & under-represented communities through 135 hours of hands on experience. -
It Specialist / Sap Sto SpecialistUnited States Cyber Command Dec 2014 - Nov 2015Fort Meade Maryland• Responsible for conducting military/contingency and crisis planning of Special Access Program (SAP) capabilities and Integrated Joint Special Technical Operations (IJSTO) in direct support to cyberspace operations in order to protect, detect, mitigate, and deter cyber vulnerabilities and cyber adversaries.• Directly supports the execution IJSTO operations in the Joint Operation Center (JOC)• Performs analysis of planned military operations, coordinating with Combatant Commands/Services/Agencies (CCSAs) in combining Information Operation (IO) disciplines to achieve desired operational effects.• Performs planning using the Joint Operation Planning and Execution System (JOPES) and the Joint Staff Review and Approval Process (RAP) determining realistic assumptions, requirements, analytical approaches and techniques to be used in military operations planning and execution.• Provides expertise in technical coordination and advice to superiors, subordinates, and coworkers.• Serves as a technical interface and planner for developing and maturing capabilities in support of military missions and functions. -
Information Systems Security Officer / Senior Systems EngineerLockheed Martin Jul 2008 - Jun 2014As an IAO, I am continually working Directly with Program Security Officers to ensure that all Network connections and nodes are Certified and Accredited in accordance with specific JAFAN 6/3 Protection layers (PL).Installed and maintained multiple PL II networks and well as work with PLIII networking infrastructure.Ensure all data was maintained with proper labeling and security, and data spills were prevented as much as possible. In the event of a data spill I was able to react quickly to ensure all information was recovered/sanitized and work could continue with minor impact to the missions.Perform Multiple Certification and Accreditations (C&A’s) on classified systems to meet JFAN PL and RMF standards. Worked with officers and management to procure new equipment while trying to keep within budget.Responsible for upgrading and maintaining a classified network to include E-mail servers, Data servers, Domain controllers, and all related servers needed to assist the customers in completing the mission.Created/maintained Dell Powervault data storage units.Maintained computers for office of 20 customers. Insured all computers in compliance with AF standards.Support of test missions down range to ensure all computer related issues were attended to before causing testing mission stoppages and money loss. -
Sr. Computer Systems AnalystLockheed Martin Information Technology Nov 2006 - Jun 2014Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications. -
Systems EngineerNational Counterterrorism Center (Nctc) 2004 - 2006Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
-
Network AdministratorPlanned Systems International 2002 - 2003Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
-
Remote Fault ManagerNavy Marine Corps Intranet (Nmci) 2001 - 2002Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
-
Radioman 3Rd ClassUs Navy 1995 - 1999Performs technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems. Analyses are performed at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal. Ensures the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
Kevin H. Skills
Kevin H. Education Details
-
Voc -TechElectronics -
Learning Tree InternationalCyber/Electronic Operations And Warfare
Frequently Asked Questions about Kevin H.
What company does Kevin H. work for?
Kevin H. works for Hands Of Support Computer Services
What is Kevin H.'s role at the current company?
Kevin H.'s current role is 410-846-4582 | CISM / CISSP / VSBE Candidate | CSSO |Author #Hacked2 | Associate C | CISO | (ISSM) | Security + | Network + |.
What is Kevin H.'s email address?
Kevin H.'s email address is ba****@****att.net
What is Kevin H.'s direct phone number?
Kevin H.'s direct phone number is +141084*****
What schools did Kevin H. attend?
Kevin H. attended Voc -Tech, Learning Tree International.
What are some of Kevin H.'s interests?
Kevin H. has interest in Exercise, Sweepstakes, Nascar, Home Improvement, Reading, Gourmet Cooking, Sports, Home Decoration, Cooking, Electronics.
What skills is Kevin H. known for?
Kevin H. has skills like Integration, Leadership, Analysis, Security, Testing, Network Security, Management, Program Management, Networking, Information Technology, Requirements Analysis, Customer Service.
Not the Kevin H. you were looking for?
-
5gmail.com, ideo.com, stanford.edu, stripe.com, mediapost.com
1 (212) 2XXXXXXX
-
Kevin A.
Sr. Staff Infrastructure Solutions Architect @ Rivian | Mcsa, Mcse, Cybersecurity ArchitectLos Angeles Metropolitan Area3infosys.com, yahoo.com, rivian.com
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial