Justin Monk

Justin Monk Email and Phone Number

Information System Security Officer at CallVitalz, Inc. @ CallVitalz Inc.
Justin Monk's Location
Baltimore, Maryland, United States, United States
About Justin Monk

Current Certifications: A+, Network+, CCNA, Security +, CISSP, RHCSA, RHCECurrent Clearance: Top Secret/SCI - 2024Currently DoD 8570.1M IAT Level I,II & III, IAM Level I,II & III, IASAE I & II Goals to be CISSP-ISSEP to complete the full scope of DoD 8570.1-M compliance.Willing to relocate or travel, national or international.

Justin Monk's Current Company Details
CallVitalz Inc.

Callvitalz Inc.

View
Information System Security Officer at CallVitalz, Inc.
Justin Monk Work Experience Details
  • Callvitalz Inc.
    Security Compliance Officer
    Callvitalz Inc. Oct 2020 - Present
  • Vae, Inc.
    Information System Security Officer
    Vae, Inc. Jul 2020 - Present
    Springfield, Virginia, Us
    Develop Risk Management Framework (RMF) Assessment & Authorization (A&A) process and deliver the necessary Artifacts and Reports required to obtain an Authority-to-Operate (ATO) with Conditions that supports Continuous Monitoring (CM).Apply National Institute of Standards and Technology (NIST) SP 800-53 Rev 4 RMF to bring A&A packages and supporting Artifacts current for Authorizing Official approval.Develop new A&A Network Operations Centers (NOC) packages for Department of Defense (DoD) customer using the DoD NIST RMF Workflow/Xacta 2.0/eMASS.Develop new A&A Master Site Model A&A package to enable the customer sites to apply hybrid and site-specific security controls using the DoD NIST RMF Workflow/Xacta 2.0/eMASS.Provide A&A and ATO Management support to customer sitesProvide ongoing programmatic, implementation, management, and CM support for fully sustained customer operations, and control compliance:Periodically review control selection criteria, based on dynamic threat Maintain test controls, remediate system, and all security relevant documentationMaintain Plan of Action and Milestones (POA&M) for lean tracking & vulnerability assessmentsEnsure that the customer’s Information Systems are properly certified and accredited, and that accreditation and/or certification support documentation packages for said system(s) are developed, maintained, and updated as required.Ensure that all Cyber Security software, hardware, and firmware comply with the appropriate security configurations.The ability to develop security procedures and documents outlined in the NIST SP 800-37 RMF guidelines which may include but is not limited to: System Security Plan (SSP), Contingency Plan, Configuration Management Plan, Security Assessment, Risk Analysis, Component Document Review, and POA&M in support of the Information System Security Manager (ISSM) and Information System Security Officer (ISSO), as required.
  • Kivu Consulting
    Senior Consultant
    Kivu Consulting Feb 2019 - Jul 2020
    Berkeley, California, Us
    Client environment rebuilds scoping and planning infrastructure deployment.▪ No trust AD migrations of AD objects.▪ Handle web application exploitation, server and client side attacks, and protocol subversion.▪ Perform IT System and Network Audits; write technical reports Remain abreast of computer networks, hardware, communications, and connectivity.▪ Perform data breach response, cyber risk/security assessments, and remain involved in phases such as penetration testing, vulnerability scanning, and log configuration.▪ Experience with scan/assessment tools such as Metasploit, Nessus, Burp Suite, Core Impact, and/or others.▪ Participate in engagements related to preemptive data breach response; analytic and reporting for litigation, data breaches, and regulatory response; workplace and employment issues, including theft of trade secrets, and; investigations related to network breaches/unauthorizedaccess of data through computer forensics and incident response.▪ Infrastructure server imaging (Firewall, DHCP, DNS, AD)▪ Workstation imaging and distribution▪ Network device configuration/recommendation▪ Deployment of IR/AV software▪ Recommendations of security processes, software and configurations▪ Assist with compliance-based deployments and reviews▪ Assist Forensics team with image and artifact collection▪ Assist IR teams with IoC Collections.
  • Mastec
    Senior Information Security Analyst
    Mastec Jul 2018 - Feb 2019
    Coral Gables, Florida, Us
    · Function as team lead for a small security team· Recommend threat protection security solutions to business problems· Manage a SIEM, network, intrusion detection and prevention systems· Analyze security breaches to determine their root cause· Recommend and install appropriate tools and countermeasures· Conduct IT self-testing to support ITGCs· Provide support to Internal and external auditors· Assist in the coordination of disaster recovery (DR) efforts for the Company including plan development, IS communication plan, site assessments, training, testing and execution.· Active member of the Corporate Business Continuity team providing support, as needed, to corporate and business continuity teams.· Support security incident response team, as needed, through execution of the communication plan and providing additional support as requested.· Participate in development of security and DR policies, standards and good security practices.· Help strengthen the security culture across the IS department and the company, leading to increased vigilance against common threats, increased preparedness for disaster events and increased protection of Company information and computing assets.· Regularly contribute to security and disaster recovery research to drive continuous improvements to the company’s security, risk management and disaster recovery programs.· Develop and carry out audits of access to database and activities to support ITGCs
  • General Dynamics Information Technology
    Senior Information Systems Security Analyst
    General Dynamics Information Technology Jan 2017 - Jul 2018
    Falls Church, Virginia, Us
    Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management).Assesses and mitigates system security threats and risks throughout the program life cycle.Validates system security requirements definition and analysis.Establishes system security designs. Implements security designs in hardware, software, data, and procedures.Verifies security requirements; performs system certification and accreditation planning and testing and liaison activities.Supports secure systems operations and maintenance.
  • Vectrus
    Swacc Vulnerability Analyst
    Vectrus Jan 2015 - Dec 2016
    Colorado Springs, Colorado, Us
    Scan, analyze and report compliance of systems and network infrastructure on the regional and theater level. MAJOR JOB ACTIVITIES: 1. Plan, coordinate, review, analyze and provide feedback to customers on weekly vulnerability scans (ie - ACAS/analyst, Linux server administrator) 2. Survey network diagrams and other artifacts, utilize network visualization tools and assist in determining if vulnerability scans are being conducted on all network assets; help identify means of overcoming gaps in vulnerability scanning; 3. Prepare and assist in the preparation of vulnerability scanning reports to commanders and higher headquarters; liaison with IAVM manager and IAPM regarding vulnerability and remediation issues 4. Develop plans, develop (PowerShell) and recommend tools for the vulnerability scanning of all network assets, regardless of type 5. Monitor INFOCON status and maintain awareness of all INFOCON requirements; assess current architecture and computer assets for INFOCON compliance 6. Develop reporting mechanisms for current INFOCON requirements and compliance of all subordinate elements and customer equipment on all networks; 7. Generate and update reports for all areas of responsibility, interact with Host Based Security System (HBSS) administrators in order to leverage INFOCON enforcement and compliance capabilities 8. Serve as HBSS administrator for TNOSC and serve as web developer, as required, for reporting tools. 9. Performs other duties and assignments as required.
  • Monk Security
    Owner
    Monk Security Mar 2001 - Jan 2015
    Worked in 24/7 SOC.Worked with McAfee, Symantec ePO,NSM's.RSA TokensCheckpoint FDE disk encryption.Diagnosed and repaired workstation,server and networks.Configured file ACL for network file systems.Utilized python for forensics, malware analysis, password recovery and penetration testing.Designed security policies for secure data transport over unsecured lines.Designed business continuity and disaster recovery plans.Advising on business partner and employee life insurance.Designed communication codes of operational terms over unsecured lines.Created and Installed secure internal email systems using Open BSD with IKE.Perform computer and network forensics using tools such as TCPDump, Wireshark, network miner and Encase.Configured RAID on servers and production systems.Provided post exploitation support and malware removal.Performed user migrations in mixed environments, linux and windows.Network documentation with wiring diagrams. Design networks with security infrastructure implementation including subnetting, vlans, IDS/IPS, firewall configuration and content filtering proxies. Built log aggregate and display system for SIEM.Build and secured Redhat based VOIP PBX system using AsteriskTrouble shooting and optimizing TCP issues for cloud based POS.Build VPN's out of Recycled equipment using DDWRT. Building web, sftp, and Windows AD servers to NIST standards.Utilized Shell scripting to automate configuration, diagnostic and install procedures using bash, kickstart and batch scripting. Utilized BackTrack, Kali, Nessus, Open VAS for pen-test and security audits.Utilized Cisco CLI for switch router and firewall configurations.Utilized online resources to write zeroday IDS IPS signatures.Provided remote support to users and admins, using LogMeIn, ssh, OpenVPN and Teamviewer. Implemented two and three factor authentication for mobile devices. Implemented CCTV and coordinated install and setup of alarm systems.
  • Capitol College
    Assistant Laboratory Manager
    Capitol College Sep 2013 - Nov 2013
    Laurel, Maryland, Us
    Assisting in classroom instruction. Teaching labs for with content equivalent to either SSCP or Security +. Teaching labs with CEH material to ready participants for competitions. Set up cyber battle lab for contained penetration testing with platform and target visualization.
  • Community College Of Baltimore County
    Teaching Assistant
    Community College Of Baltimore County Jan 2012 - May 2012
    Baltimore, Md, Us
    Teaching and tutoring students along with assisting the professor during class time.
  • Target
    Supervisor
    Target Aug 2009 - Jan 2012
    Minneapolis, Mn, Us
    In addition to managing a staff of up to 45 employees and improving the efficiency of the process by 35%, it was required to update and maintain the store’s PDAs and other technical devices. The store met “best practice” goals and reached highest efficiency ever during employment period. Diagnosed and fixed embedded systems and workstations.
  • Ccdc
    White Team
    Ccdc 2012 - 2012
    Tech support for competitors
  • Ups
    Supervisor
    Ups Aug 2005 - Jun 2009
    Atlanta, Ga, Us
    While supervising up to 40 union employees in a time-sensitive and high production environment, quality control has been maintained and the production process efficiency has increase by 40% through suggested changes. The skills used and gained during this employment, has offered a valuable work ethic that can be used in any career. Worked with embedded systems, made recommendation's to improve electronic tracking systems. Re-programmed sorting systems, increasing production by 40%. Beta tested new regional logistics software and helped to make appropriate logical changes. In charge of radio equipment and digital dispatch systems and driver DIAD’s. Team leader of the asset recovery team to protect and control inventory for mission critical systems and maintain security for customer packages. Helped with integration of new wireless communication systems in existing conflicting wireless network.
  • Southland Corporation
    Assistant Manager
    Southland Corporation Aug 2004 - Aug 2005
    Managed more then 45 employees at four franchises of International Corporation. Trained more then 20 employees at entry and management levels. Audited and secured daily cash flow of $20,000 to $40,000; deposited gross profits at bank. Tracked inventory among four locations; ordered merchandise from seven vendors. Monitored internal and external security via surveillance cameras and direct observation. Rotated and merchandised strategically to reduce waste.
  • Jewish Community Center
    Systems Administrator
    Jewish Community Center Jun 2002 - May 2004
    Introduced and built a computer lab with 30 terminals, 2 servers and a printer using active directory and MS NAS storage solutions in the center for use by seniors and children. Used roaming profiles to personalize the user experience. Used knowledge of sub netting to separate the network from other operational networks. This computer lab included classes in learning how to use the Internet and other basic computer software programs. During this time, Internet and personal computer were relatively new to most people and they benefited by having a person with an A+ certification teaching them how to get by with the basics. They had access to more knowledge about their computers as well as computer repair services.

Justin Monk Skills

Networking Security Firewalls Troubleshooting Information Security Servers Penetration Testing Vpn Information Technology Active Directory Linux Computer Hardware System Administration Data Recovery Wireless Networking Technical Support Windows 7 Operating Systems Information Assurance Network Design Integration Software Installation Computer Forensics Windows Remote Access Computer Repair Cisco Technologies Network Administration Laptops Windows Server Unix Shell Scripting Dns System Deployment Cisco Ios Help Desk Support Ccna Marketing Communications A+ Certified Os X Ubuntu Databases Pc Lock Picking Firewall Configuration Network Design And Configuration Firmware Editing Network Forensic Analysis Computer Security Network Security

Justin Monk Education Details

  • Community College Of Baltimore County
    Community College Of Baltimore County
    Information Systems Security
  • Comptia
    Comptia
    It Security
  • Anne Arundel Community College
    Anne Arundel Community College
    Network Technology – Associate Of Applied Science
  • Howard Community College
    Howard Community College
    Computer/Information Technology Administration And Management

Frequently Asked Questions about Justin Monk

What company does Justin Monk work for?

Justin Monk works for Callvitalz Inc.

What is Justin Monk's role at the current company?

Justin Monk's current role is Information System Security Officer at CallVitalz, Inc..

What is Justin Monk's email address?

Justin Monk's email address is jm****@****ail.com

What is Justin Monk's direct phone number?

Justin Monk's direct phone number is +141098*****

What schools did Justin Monk attend?

Justin Monk attended Community College Of Baltimore County, Comptia, Anne Arundel Community College, Howard Community College.

What are some of Justin Monk's interests?

Justin Monk has interest in Exercise, Sweepstakes, Home Improvement, Reading, Gourmet Cooking, Sports, Home Decoration, Health, Photograph, Cooking.

What skills is Justin Monk known for?

Justin Monk has skills like Networking, Security, Firewalls, Troubleshooting, Information Security, Servers, Penetration Testing, Vpn, Information Technology, Active Directory, Linux, Computer Hardware.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.