Justin Monk Email and Phone Number
Justin Monk work email
- Valid
- Valid
- Valid
- Valid
- Valid
Justin Monk personal email
- Valid
- Valid
Justin Monk phone numbers
Current Certifications: A+, Network+, CCNA, Security +, CISSP, RHCSA, RHCECurrent Clearance: Top Secret/SCI - 2024Currently DoD 8570.1M IAT Level I,II & III, IAM Level I,II & III, IASAE I & II Goals to be CISSP-ISSEP to complete the full scope of DoD 8570.1-M compliance.Willing to relocate or travel, national or international.
-
Security Compliance OfficerCallvitalz Inc. Oct 2020 - Present -
Information System Security OfficerVae, Inc. Jul 2020 - PresentSpringfield, Virginia, UsDevelop Risk Management Framework (RMF) Assessment & Authorization (A&A) process and deliver the necessary Artifacts and Reports required to obtain an Authority-to-Operate (ATO) with Conditions that supports Continuous Monitoring (CM).Apply National Institute of Standards and Technology (NIST) SP 800-53 Rev 4 RMF to bring A&A packages and supporting Artifacts current for Authorizing Official approval.Develop new A&A Network Operations Centers (NOC) packages for Department of Defense (DoD) customer using the DoD NIST RMF Workflow/Xacta 2.0/eMASS.Develop new A&A Master Site Model A&A package to enable the customer sites to apply hybrid and site-specific security controls using the DoD NIST RMF Workflow/Xacta 2.0/eMASS.Provide A&A and ATO Management support to customer sitesProvide ongoing programmatic, implementation, management, and CM support for fully sustained customer operations, and control compliance:Periodically review control selection criteria, based on dynamic threat Maintain test controls, remediate system, and all security relevant documentationMaintain Plan of Action and Milestones (POA&M) for lean tracking & vulnerability assessmentsEnsure that the customer’s Information Systems are properly certified and accredited, and that accreditation and/or certification support documentation packages for said system(s) are developed, maintained, and updated as required.Ensure that all Cyber Security software, hardware, and firmware comply with the appropriate security configurations.The ability to develop security procedures and documents outlined in the NIST SP 800-37 RMF guidelines which may include but is not limited to: System Security Plan (SSP), Contingency Plan, Configuration Management Plan, Security Assessment, Risk Analysis, Component Document Review, and POA&M in support of the Information System Security Manager (ISSM) and Information System Security Officer (ISSO), as required. -
Senior ConsultantKivu Consulting Feb 2019 - Jul 2020Berkeley, California, UsClient environment rebuilds scoping and planning infrastructure deployment.▪ No trust AD migrations of AD objects.▪ Handle web application exploitation, server and client side attacks, and protocol subversion.▪ Perform IT System and Network Audits; write technical reports Remain abreast of computer networks, hardware, communications, and connectivity.▪ Perform data breach response, cyber risk/security assessments, and remain involved in phases such as penetration testing, vulnerability scanning, and log configuration.▪ Experience with scan/assessment tools such as Metasploit, Nessus, Burp Suite, Core Impact, and/or others.▪ Participate in engagements related to preemptive data breach response; analytic and reporting for litigation, data breaches, and regulatory response; workplace and employment issues, including theft of trade secrets, and; investigations related to network breaches/unauthorizedaccess of data through computer forensics and incident response.▪ Infrastructure server imaging (Firewall, DHCP, DNS, AD)▪ Workstation imaging and distribution▪ Network device configuration/recommendation▪ Deployment of IR/AV software▪ Recommendations of security processes, software and configurations▪ Assist with compliance-based deployments and reviews▪ Assist Forensics team with image and artifact collection▪ Assist IR teams with IoC Collections. -
Senior Information Security AnalystMastec Jul 2018 - Feb 2019Coral Gables, Florida, Us· Function as team lead for a small security team· Recommend threat protection security solutions to business problems· Manage a SIEM, network, intrusion detection and prevention systems· Analyze security breaches to determine their root cause· Recommend and install appropriate tools and countermeasures· Conduct IT self-testing to support ITGCs· Provide support to Internal and external auditors· Assist in the coordination of disaster recovery (DR) efforts for the Company including plan development, IS communication plan, site assessments, training, testing and execution.· Active member of the Corporate Business Continuity team providing support, as needed, to corporate and business continuity teams.· Support security incident response team, as needed, through execution of the communication plan and providing additional support as requested.· Participate in development of security and DR policies, standards and good security practices.· Help strengthen the security culture across the IS department and the company, leading to increased vigilance against common threats, increased preparedness for disaster events and increased protection of Company information and computing assets.· Regularly contribute to security and disaster recovery research to drive continuous improvements to the company’s security, risk management and disaster recovery programs.· Develop and carry out audits of access to database and activities to support ITGCs -
Senior Information Systems Security AnalystGeneral Dynamics Information Technology Jan 2017 - Jul 2018Falls Church, Virginia, UsDesigns and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management).Assesses and mitigates system security threats and risks throughout the program life cycle.Validates system security requirements definition and analysis.Establishes system security designs. Implements security designs in hardware, software, data, and procedures.Verifies security requirements; performs system certification and accreditation planning and testing and liaison activities.Supports secure systems operations and maintenance. -
Swacc Vulnerability AnalystVectrus Jan 2015 - Dec 2016Colorado Springs, Colorado, UsScan, analyze and report compliance of systems and network infrastructure on the regional and theater level. MAJOR JOB ACTIVITIES: 1. Plan, coordinate, review, analyze and provide feedback to customers on weekly vulnerability scans (ie - ACAS/analyst, Linux server administrator) 2. Survey network diagrams and other artifacts, utilize network visualization tools and assist in determining if vulnerability scans are being conducted on all network assets; help identify means of overcoming gaps in vulnerability scanning; 3. Prepare and assist in the preparation of vulnerability scanning reports to commanders and higher headquarters; liaison with IAVM manager and IAPM regarding vulnerability and remediation issues 4. Develop plans, develop (PowerShell) and recommend tools for the vulnerability scanning of all network assets, regardless of type 5. Monitor INFOCON status and maintain awareness of all INFOCON requirements; assess current architecture and computer assets for INFOCON compliance 6. Develop reporting mechanisms for current INFOCON requirements and compliance of all subordinate elements and customer equipment on all networks; 7. Generate and update reports for all areas of responsibility, interact with Host Based Security System (HBSS) administrators in order to leverage INFOCON enforcement and compliance capabilities 8. Serve as HBSS administrator for TNOSC and serve as web developer, as required, for reporting tools. 9. Performs other duties and assignments as required. -
OwnerMonk Security Mar 2001 - Jan 2015Worked in 24/7 SOC.Worked with McAfee, Symantec ePO,NSM's.RSA TokensCheckpoint FDE disk encryption.Diagnosed and repaired workstation,server and networks.Configured file ACL for network file systems.Utilized python for forensics, malware analysis, password recovery and penetration testing.Designed security policies for secure data transport over unsecured lines.Designed business continuity and disaster recovery plans.Advising on business partner and employee life insurance.Designed communication codes of operational terms over unsecured lines.Created and Installed secure internal email systems using Open BSD with IKE.Perform computer and network forensics using tools such as TCPDump, Wireshark, network miner and Encase.Configured RAID on servers and production systems.Provided post exploitation support and malware removal.Performed user migrations in mixed environments, linux and windows.Network documentation with wiring diagrams. Design networks with security infrastructure implementation including subnetting, vlans, IDS/IPS, firewall configuration and content filtering proxies. Built log aggregate and display system for SIEM.Build and secured Redhat based VOIP PBX system using AsteriskTrouble shooting and optimizing TCP issues for cloud based POS.Build VPN's out of Recycled equipment using DDWRT. Building web, sftp, and Windows AD servers to NIST standards.Utilized Shell scripting to automate configuration, diagnostic and install procedures using bash, kickstart and batch scripting. Utilized BackTrack, Kali, Nessus, Open VAS for pen-test and security audits.Utilized Cisco CLI for switch router and firewall configurations.Utilized online resources to write zeroday IDS IPS signatures.Provided remote support to users and admins, using LogMeIn, ssh, OpenVPN and Teamviewer. Implemented two and three factor authentication for mobile devices. Implemented CCTV and coordinated install and setup of alarm systems.
-
Assistant Laboratory ManagerCapitol College Sep 2013 - Nov 2013Laurel, Maryland, UsAssisting in classroom instruction. Teaching labs for with content equivalent to either SSCP or Security +. Teaching labs with CEH material to ready participants for competitions. Set up cyber battle lab for contained penetration testing with platform and target visualization. -
Teaching AssistantCommunity College Of Baltimore County Jan 2012 - May 2012Baltimore, Md, UsTeaching and tutoring students along with assisting the professor during class time. -
SupervisorTarget Aug 2009 - Jan 2012Minneapolis, Mn, UsIn addition to managing a staff of up to 45 employees and improving the efficiency of the process by 35%, it was required to update and maintain the store’s PDAs and other technical devices. The store met “best practice” goals and reached highest efficiency ever during employment period. Diagnosed and fixed embedded systems and workstations. -
White TeamCcdc 2012 - 2012Tech support for competitors
-
SupervisorUps Aug 2005 - Jun 2009Atlanta, Ga, UsWhile supervising up to 40 union employees in a time-sensitive and high production environment, quality control has been maintained and the production process efficiency has increase by 40% through suggested changes. The skills used and gained during this employment, has offered a valuable work ethic that can be used in any career. Worked with embedded systems, made recommendation's to improve electronic tracking systems. Re-programmed sorting systems, increasing production by 40%. Beta tested new regional logistics software and helped to make appropriate logical changes. In charge of radio equipment and digital dispatch systems and driver DIAD’s. Team leader of the asset recovery team to protect and control inventory for mission critical systems and maintain security for customer packages. Helped with integration of new wireless communication systems in existing conflicting wireless network. -
Assistant ManagerSouthland Corporation Aug 2004 - Aug 2005Managed more then 45 employees at four franchises of International Corporation. Trained more then 20 employees at entry and management levels. Audited and secured daily cash flow of $20,000 to $40,000; deposited gross profits at bank. Tracked inventory among four locations; ordered merchandise from seven vendors. Monitored internal and external security via surveillance cameras and direct observation. Rotated and merchandised strategically to reduce waste.
-
Systems AdministratorJewish Community Center Jun 2002 - May 2004Introduced and built a computer lab with 30 terminals, 2 servers and a printer using active directory and MS NAS storage solutions in the center for use by seniors and children. Used roaming profiles to personalize the user experience. Used knowledge of sub netting to separate the network from other operational networks. This computer lab included classes in learning how to use the Internet and other basic computer software programs. During this time, Internet and personal computer were relatively new to most people and they benefited by having a person with an A+ certification teaching them how to get by with the basics. They had access to more knowledge about their computers as well as computer repair services.
Justin Monk Skills
Justin Monk Education Details
-
Community College Of Baltimore CountyInformation Systems Security -
ComptiaIt Security -
Anne Arundel Community CollegeNetwork Technology – Associate Of Applied Science -
Howard Community CollegeComputer/Information Technology Administration And Management
Frequently Asked Questions about Justin Monk
What company does Justin Monk work for?
Justin Monk works for Callvitalz Inc.
What is Justin Monk's role at the current company?
Justin Monk's current role is Information System Security Officer at CallVitalz, Inc..
What is Justin Monk's email address?
Justin Monk's email address is jm****@****ail.com
What is Justin Monk's direct phone number?
Justin Monk's direct phone number is +141098*****
What schools did Justin Monk attend?
Justin Monk attended Community College Of Baltimore County, Comptia, Anne Arundel Community College, Howard Community College.
What are some of Justin Monk's interests?
Justin Monk has interest in Exercise, Sweepstakes, Home Improvement, Reading, Gourmet Cooking, Sports, Home Decoration, Health, Photograph, Cooking.
What skills is Justin Monk known for?
Justin Monk has skills like Networking, Security, Firewalls, Troubleshooting, Information Security, Servers, Penetration Testing, Vpn, Information Technology, Active Directory, Linux, Computer Hardware.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial