John Wilhelm, Mba, Cissp Email and Phone Number
John Wilhelm, Mba, Cissp work email
- Valid
- Valid
John Wilhelm, Mba, Cissp personal email
John Wilhelm, Mba, Cissp phone numbers
I am a tenured cybersecurity / information assurance consultant, systems engineer, forensic analyst, security controls assessor & Servant Leader in pursuit of enriching opportunities in the IT/IA/CS/SE fields, where I can leverage my experience and knowledge to deliver solid, effective results. I hold several certifications, most relevant of which include my CISSP, C|EH, SCTA, A+ and Net+. I have over 25 years experience in defense & intelligence IT & cybersecurity, both in large-scale enterprise and small-business startup cultures; 20+ in Cyber, 18 as an ISSO/ISSM, and 14+ as an ISSE/IASAE in security engineering. I hold a Baccalaureate Degree of Science in Technology Management (B.S.T.M.) w/ Honors, with a specialization in Security Management, and a Master's Degree in Business (MBA) w/ Distinction, with a concentration in Security Management. I am experienced in ICD 503 & JSIG A&A, NIST SP800-53, SP800-171, and CNSSI 1253 control implementation, and continuous monitoring / automated vulnerability assessment and remediation as I have personally overseen and/or were primarily responsible for over 500 C&A/A&A packages in my career. Experienced in leading and/or applying cybersecurity engineering best practices within tactical and strategic classified and unclassified environments, scaled from flight line / RDT&E, to rapid development projects via agile / scrum / DevOps, to long-term ACAT-1 and ACAT-1A major defense acquisition programs. I possess a current Top Secret clearance with ICD 704 eligibility, and polygraph.
-
Embedded Cyber Security EngineerAerovironmentSimi Valley, Ca, Us -
Embedded Cyber Security EngineerAerovironment Mar 2024 - PresentArlington, Virginia, Us -
Sr. Manager, Cybersecurity & Risk Management & IssmRaytheon Intelligence & Space Jun 2021 - Mar 2024Arlington, Va, Us -
Principal Cyber Technologist & IssmRaytheon Technologies May 2020 - Mar 2024Arlington, Va, Us -
Information Systems Security Manager | Sr. Industrial Security EngineerValkyrie Systems Corporation Sep 2018 - Mar 2020Phoenix, Arizona, UsContributions focused on taking cybersecurity best practices from large defense contracting environments and tailor a cybersecurity program suited for an emerging technology provider with a startup culture. Key contributions at VSC included implementing email encryption, designing secure infrastructure, achieving NIST SP 800-171r1 and CUI compliance, establishing security baselines, configuration management, change management & incident response / reporting practices, and designing and prototyping a cost-effective open-source hybrid-cloud Security Information Event Management (SIEM) log collection and aggregation platform. -
Information Assurance Manager IiRaytheon Apr 2017 - Aug 2018Arlington, Va, UsServant leader and part the Global Security Solutions group, supporting cybersecurity team rockstars in all aspects of RMF transition and ATO sustainability at the Raytheon Missile Systems campus in Tucson, Arizona. -
Information Systems Security Risk Analyst Stf., Advanced Development ProgramsLockheed Martin May 2014 - Apr 2017Bethesda, Md, UsIn this position, I functioned as an ISSE/IASAE and IPT lead, providing cybersecurity advisory services and systems security engineering guidance to ISSOs and ISSMs within the Technical Security group supporting multiple programs for a variety of defense & intelligence community customers. Primary focus items included counterintelligence and insider threat mitigation, JSIG / ICD 503 / DIACAP Risk Management Framework (RMF) Accreditation & Authorization (A&A), Continuous Monitoring (ConMon), Security business process automation & test automation. Contributions were to develop and implement a software assurance / integrity verification program for a significant program, create and publish a Basis of Estimate (BoE) template for Lockheed Martin Aeronautics programs to quantify additional cost estimates for JSIG accreditation impacts, draft an organizational IASOP with NIST SP800-53 common controls across the Palmdale Skunk Works site, and design, implement and test several cybersecurity capabilities, features and assurances relative to insider threat, configuration management, auditing, access control, network security, media control, test & evaluation and forensic investigations. I meet/exceed DoD 8570.01-M qualification criteria for these aforementioned roles and functions. -
Information Assurance Engineer Sr.Lockheed Martin Dec 2011 - May 2014Bethesda, Md, UsContributions were to lead the security architecture, logical and physical design, implementation, assessment, and support of deliverable systems for the Mission Communications & Processing Directorate Advanced Programs group, as well as to serve as an Information Systems Security Officer / Manager for the IS&GS National programs at the Goodyear, AZ campus. Many projects included transitioning multiple systems from certification & accreditation (C&A) under the legacy Director of Central Intelligence Directive (DCID) 6/3 risk management framework (RMF) to Intelligence Community Directive (ICD) 503, and integration of legacy systems into customer enterprise services in accordance with the IC Joint Architecture Reference Model. Among the core Information Assurance work products as part of these activities included business capture / project planning, documentation, security architecture and engineering, system development, implementation, verification and testing and sustainment / support of various NIST SP 800-53 and CNSSI 1253 security controls. I functioned exclusively as the security architect and security systems engineer, as well as providing system engineering support & sustainment services through O&M transition. At the Goodyear, AZ factory, I also served as a COMSEC subject matter expert (SME), supporting a variety of FASTLANE, TACLANE and SafeNet inline network encryptors (INEs) and related cryptosystems. Routinely used WASSP, SECSCN, Retina, Nessus, nmap, and OWASP ZAP as assessment tools, targeting a variety of assessment targets to include VMware ESX, Citrix XenServer / XenApp / XenDesktop, Windows Server 2008 R2 / 7 Enterprise, Active Directory / GSSAPI, RedHat Enterprise Linux (RHEL), Solaris, IIS / Apache, Oracle 11g / PostgreSQL / MySQL / MSSQL, Cisco IOS / Foundry / McAfee Sidewinder / JuniperOS, and NetApp. -
Systems Engineer Sr. / Information Systems Security EngineerLockheed Martin Aug 2008 - Dec 2011Bethesda, Md, UsPrimary contributions were to support the Sensor Processing Security Engineering Team’s Operations and Maintenance effort. In this role, responsibilities included vulnerability management program activities, assessment of system / product defects, developing remediation solutions, and developing / executing certification test plans and component test plans. Frequent coordination and continuous communication with the customer certifier to deliver the most resilient security support structure within delivered products was essential. Ensured effective application of remediation solutions to the system baseline without regressing system performance or capability. C&A of deployed systems in accordance with DCID 6/3 and ICD 503 requirements were a core responsibility, and the ability to develop and apply solutions to meet NIST SP 800-53 and CNSSI 1253 common controls were routinely demanded. Focal SME for Public Key Infrastructure (PKI), Atrribute-Based Access Controls (ABAC) and x.509 certificate provisioning. -
Systems Engineer Sr.Lockheed Martin Jul 2005 - Aug 2008Bethesda, Md, UsServed as the primary ISSO, and effectual ISSM for core-customer SCI programs and select SAP/SAR programs. Served as a system administrator and primary ISSO for Special Programs @ LM Goodyear, as well as for several other information systems. Transformed C&A structure from 11 stovepipe C&A packages to a Site Master SSP / Addendum SSP format. Worked to meet / exceed AIS security requirements on several internally- and/or externally-connected AIS from initial plan to ATO, to include plans and policies IAW DoD 5105.21M-1, DCID 6/x, NISPOM Chap. 8, JAFAN 6/x and others. Provided and managed Security Education and Awareness Training program regarding AIS Security. Processed and approved change requests to the Security Support Structure (hardware and software moves, additions, and changes affecting accreditation). Routinely reviewed audit logs, backup processes, and account usage statistics. Provided oversight and assistance to antivirus and patch management processes IAW customer guidance and IAVA’s.Conducted vulnerability assessments and penetration testing for select programs IAW customer guidance and/or program objectives. Supported ethics & fraud investigations, as well as other forensic activities. Initiated protective and/or corrective measures when security incidents occurred, and was a primary campus CIRT POC. Participated in red teaming activities on several national security information systems. Campus focal point for COMSEC equipment trouble resolution on KG-75 FASTLANE, KG-235 SECTERA, KG-175 TACLANE INE’s and associated CCI. -
Systems Administrator Sr. & Information Systems Security OfficerLockheed Martin Mar 2000 - Jul 2005Bethesda, Md, UsProvided design, development and support for several classified SCI/advanced program automated information systems (AIS) at the Air Force Research Laboratory, Mesa Research Site. Served as the primary system administrator, primary ISSO, and effectual ISSM for all SCI AIS, to include JWICS. Served as a system administrator and primary ISSO for Mesa’s SIPRNet AIS. Served as SA & ISSO for several other AIS. With the assistance of the previous site ISSM, built and maintain several internally- and/or externally-connected AIS from initial plan to ATO; established the SSP, SOP, Site Security CONOPS, and several other C&A plans and policies IAW DITSCAP, DoD 5105.21M-1, DCID 6/3, 6/4, 6/9, NISPOM Chap. 8, JAFAN 6/x and others. Created andmaintained configuration management baselines, system diagrams, and user training. Routinely reviewed and maintained audit logs, backup processes, and account usage statistics. Conducted antivirus and patch management IAW DIA guidance and IAVA’s. Conducted vulnerability assessments for SCI AIS IAW AFMC ISSM guidance. AFMC/XRIS had sourced Mesa during employment term as having implemented superior best practices in the implementation of Information Systems Security/Information Assurance for SCI AIS. Was a member of Mesa’s IT Threat Working Group, and routinely interfaced with AFOSI and the FBI. Also functioned as a senior support engineer for the Mesa Network Control Center (NCC). Supported client/server and supporting network architectures throughout all layers of the OSI model. Installed and supported COMSEC devices (specifically KG-194, KIV-7, TACLANE, and SECTERA INEs), VPN’s (Nokia CryptoCluster and Cisco 3300), routers, switches, firewalls (Cisco PIX, NetScreen and Sidewinder), operating systems (Linux, NT4/W2K/XP/2003), Active Directory migration/implementation, network services, Video Teleconferencing Systems (H.320- and H.323-based Polycom, Tandberg, Picturetel, VTel, and custom distributed multipoint systems). -
Service Repair Advisor / Tier 2 Information Technology TechnicianGte Mar 1999 - Mar 2000UsSpecializing in the services sustainment sector, my duties included responding to inbound phone calls from GTE Communications residential and small business customers to diagnose, troubleshoot, and provide solutions to their repair related issues on internet, local telephone, long distance, paging, and cellular communications service. Ability to perform complex troubleshooting was essential. Furthermore, extensive knowledge of various internet technologies, communications devices and related hardware, the public switched telephone network (PSTN), Signaling System 7 (SS7), central office switching / trunking systems, CDMA/TDMA/GSM, transmission protocols, and familiarity of the media was vital to my success at GTE.
John Wilhelm, Mba, Cissp Skills
John Wilhelm, Mba, Cissp Education Details
-
Keller Graduate School Of Management Of Devry UniversitySecurity Management -
Devry UniversityTechnical Management - Security Management
Frequently Asked Questions about John Wilhelm, Mba, Cissp
What company does John Wilhelm, Mba, Cissp work for?
John Wilhelm, Mba, Cissp works for Aerovironment
What is John Wilhelm, Mba, Cissp's role at the current company?
John Wilhelm, Mba, Cissp's current role is Embedded Cyber Security Engineer.
What is John Wilhelm, Mba, Cissp's email address?
John Wilhelm, Mba, Cissp's email address is jw****@****tin.com
What is John Wilhelm, Mba, Cissp's direct phone number?
John Wilhelm, Mba, Cissp's direct phone number is +160243*****
What schools did John Wilhelm, Mba, Cissp attend?
John Wilhelm, Mba, Cissp attended Keller Graduate School Of Management Of Devry University, Devry University.
What skills is John Wilhelm, Mba, Cissp known for?
John Wilhelm, Mba, Cissp has skills like System Architecture, Information Assurance, Dod, Security Clearance, Earned Value Management, Systems Engineering, Computer Security, Aerospace, Diacap, Cissp, Dodaf, Security+.
Who are John Wilhelm, Mba, Cissp's colleagues?
John Wilhelm, Mba, Cissp's colleagues are Aaron Prichard, Tiziano Fiorenzani, Mathew Gan, Owen D., Jason Mukherjee, Dave Fugleberg, Mba, Pmp, Ryan Golding, Esq..
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial