Kevin Walsh, Cissp, Gslc Email and Phone Number
Kevin Walsh, Cissp, Gslc work email
- Valid
- Valid
- Valid
Kevin Walsh, Cissp, Gslc personal email
- Valid
Greetings!I have an expansive information technology (IT) background that ranges from cybersecurity to network management to software development. I have more than 20 years of defense-related IT experience as a former Information Systems Technician Senior Chief Petty Officer (Information Dominance Warfare / Surface Warfare) in the United States Navy, which has given me broad exposure to military cybersecurity and operations security policies and practices. Among my professional certifications are Certified Information Systems Security Professional (CISSP) and GIAC Security Leadership Certification (GSLC), which qualifies me as an Information Assurance Manager (IAT), Level III; Information Assurance Technician (IAT), Level III; and Information Assurance System Architect and Engineer (IASAE), Level II under Department of Defense (DoD) Directive 8570.1-M. I have earned awards for my success in leading and managing large IT staffs in demanding joint operational environments. I have implemented the DoD Risk Management Framework (RMF) and its earlier incarnations, as well as Federal Information Security Management Act (FISMA) certification and accreditation requirements. I am a highly-intelligent and analytical problem-solver. I excel in a team setting, but I am also resourceful enough to work independently. My exceptional communication skills are characterized by clarity and precision of language. A former broadcaster, my presentation abilities have been refined through decades of public speaking. I maintain an active DoD security clearance.I look forward to working with you.V/RKevinPGP: 50F3F277
-
Senior Information Assurance And Security SpecialistEmagine It, Inc.Arlington, Va, Us -
Senior Information Assurance/Security SpecialistEmagine It, Inc. Sep 2018 - PresentFairfax, Virginia, United States -
Voice ActorProducer'S Handy Dandy Mar 2011 - PresentWashington Dc-Baltimore Area -
Voice ActorKevin Walsh Voice-Over Oct 2007 - PresentWashington D.C. Metro Area -
Cybersecurity InstructorDod Cyber Crime Center (Dc3) Nov 2017 - Sep 2018Linthicum, MdCybersecurity Instructor at DC3's Defense Cyber Investigations Training Academy, teaching DoD personnel beginning to advanced technical subjects in the areas of Network Operations and Investigations, Cyber Intelligence, Incident Response, Digital Forensics, Core Technologies, and Programming.Job Functions:● Develops and maintains courseware, realistic training scenarios, and exercises for cyber defense Warfighters.● As a member of the training development team, develops student-focused learning exercises in a variety of virtualization environments with commonly used commercial and open-source incident response tools.● Researches and develops technical instructions for a wide-ranging student audience, and researches relevant advanced persistent threat (APT) profiles for inclusion in exercises and assessments.● Deploys and actively conducts hunt missions with a service, DoD Information Network (DoDIN) or national Cyber Protection Team.● Conducts on-site incident response for network environments on short notice.● Uses tools such as Bro, Snort, GRR, RedSeal, Wireshark, and EnCase Enterprise/EnCase Endpoint Investigator.● Uses Splunk, ELK, or other log aggregators.● Uses Security Onion and Kali Linux distributions, and other network traffic and file-system analysis tools.● Performs basic malware triage and/or malware analysis.● Performs forensic analysis of digital information and gathers and handles evidence.● Identifies network computer intrusion evidence and perpetrators.● Investigates computer fraud or other electronic crimes, crack files and system passwords, detects steganography and recovers deleted, fragmented and corrupted data from digital media of all types.● Ensures chain of custody and control procedures, documents procedures and findings in a manner suitable for courtroom presentation and prepares comprehensive written notes and reports.● May be required to testify in court as an expert witnesses. -
Tactical Public Key Infrastructure LeadFci Enterprises Llc Jan 2016 - Oct 2017Chantilly, Va● Tactical Public Key Infrastructure (TPKI) Task Lead, providing support to the U.S. Army Chief Information Officer/G-6 (CIO/G6) in the development, testing, and evaluation of technologies to enable TPKI capability that will allow Soldiers to use multifactor authentication to access networks and mission-critical information in a timely and reliable manner while in theater. ● Reconciles TPKI bandwidth requirements with Warfighter Information Network-Tactical (WIN-T) bandwidth availability to minimize impact of distributing large Certificate Revocation List (CRL) files on tactical network resources. ● Ensures PKI plans align with Identity and Access Management (IdAM) efforts. Supports the remainder of the PKI Team to enhance oversight of development, test, evaluation, and deployment evolutions. Serves as the CIO/G-6 Cybersecurity Directorate’s liaison to U.S. Army Material Command’s Communications-Electronics Research, Development and Engineering Center (CERDEC) and Program Executive Office Command Control Communications – Tactical (PEO C3T). -
Cybersecurity Team Lead / Program ManagerFederated It Aug 2013 - Jan 2016Herndon, Va● Conducted dozens of incident response investigations for malware, network intrusions, phishing, and other incidents, using tools such as IBM Security QRadar Security Information and Event Management (SIEM) and IBM Tivoli Endpoint Manager. Worked with Verizon technicians to collect data from Managed Trusted Internet Protocol Services (MTIPS) and block communication with malicious Internet Protocol (IP) addresses. Wrote and filed incident reports and conducted network vulnerability scans using Tenable Nessus.● Performed risk assessment for physical relocation of two DOL agency offices and their information assets within the Authority to Operate (ATO) boundary.● Reviewed and updated DOL Contingency and Incident Response Plans to adhere to NIST SP 800-34 and NIST SP 800-61, respectively.● Coordinated Federal Information Security Management Act (FISMA) and Federal Information System Controls Audit Manual (FISCAM) audits, evaluating the confidentiality, integrity, and availability of information systems to ensure information security controls met National Institute of Standards and Technology Special Publication 800-53 (NIST SP 800-53) standards in a manner consistent with the U.S. Government Accountability Office (GAO) Generally Accepted Government Auditing Standards and the Financial Audit Manual. Arranged meetings between DOL staff and auditors, followed-up on Statements of Fact (SOF), created and updated Plans of Action and Milestones (POA&M) and filed audit artifacts in the Cyber Security Assessment and Management (CSAM) system. Almost single-handedly ensured these audits were completed on time, despite taking on this task when it was already weeks behind schedule.
-
Systems Engineering OfficerNational Maritime Domain Awareness Coordination Office Oct 2007 - Sep 2012Washington D.C. Metro Area(This office was formerly known as the Office of Global Maritime Situational Awareness.)Information Systems Technician Senior Chief Petty Officer for the United States Navy.• Managed Data Sharing & Infrastructure Branch, tasked with enabling information sharing among federal agencies, allies and private industry for the purpose of identifying terrorist threats.● Managed Data Sharing & Infrastructure Branch, engaged in the planning of the National Maritime Domain Awareness (MDA) Enterprise Architecture, which is intended to facilitate information sharing among federal, state, county, municipal, and tribal agencies, as well as commercial and international maritime interests, as a means of countering terrorist threats on the world's oceans, waterways, and ports. ● Provided extensive software engineering experience for the MDA Enterprise Architecture. Guided the Technology Working Group in completion of planning and requirement analysis, leading to on-time delivery of the “as-is” phase of design. Developed plans and policies for eliminating information sharing barriers and gaps. Assessed generic and unique security risks throughout the project and made recommendations for mitigation of those risks.● Earned Information Dominance Warfare qualification from the Office of Naval Intelligence. Familiar with Intelligence Community (IC) Information Assurance (IA) publications such as DCID 6/3, Intelligence Community Directives (ICD), including ICD 503, and IC Standards.Managed the Information Assurance program for this office. Administered cybersecurity training. Directed cleanup of classified information spills. -
C4I ManagerCommander, U.S. Naval Forces Korea Aug 2007 - Sep 2007Yongsan-Gu, Seoul, Korea• Directed command, control, communications, computers and intelligence (C4I) operations for U.S. Naval Forces at the Republic of Korea naval base at Chinhae during a major military exercise. Furnished secure network and voice communications. Installed and configured 44 NIPR, SIPR, and CENTRIXS workstations, as well as five network printers, nine cable drops, and six secure telephones. Provided 24/7 IT support to more than 100 exercise participants. Closed over 200 trouble tickets with no adverse impact on exercise operations and no IT-related work stoppages. Provided technical support for more than 50 classified video teleconferences among exercise participants.• Authored the command instruction for the protection of Data-at-Rest for Commander, Naval Forces Korea. Also wrote an instructor guide, PowerPoint presentation, and certification exam to be used for training and qualifying personnel in the handling and protection of Data-at-Rest.
-
Senior Enlisted LeaderCommander, Us Naval Forces Europe - Commander Us Sixth Fleet Mar 2007 - Sep 2007Tallahassee, Florida AreaU.S. Navy Senior Chief Petty Officer serving as the senior enlisted advisor to the Commanding Officer of CNE-C6F Reserve Detachment 108.• Reorganized the unit into seven distinct departments based on occupational specialties. This innovation resulted in a more even distribution of work, improved accountability, increased training efficiency, and more leadership opportunities for personnel.• Streamlined personnel evaluation system to ensure all reports were fair, accurate, and submitted on time. Instituted mandatory evaluation training for all personnel.
-
Cj-6 Operations ChiefCombined Joint Task Force - Horn Of Africa Jan 2006 - Mar 2007Djibouti• Cited by executive leadership for exceptional management of a high operational tempo department of 84 IT professionals in five work centers, resulting in more than 400 successfully completed missions and military exercises in seven East African countries during a demanding overseas deployment in support of Operation Enduring Freedom.• Expertly managed $17-million in network and communications assets, including an inventory of 12 mobile satellite communications packages that delivered mission-critical secure and non-secure packet and voice communications to over 1,500 forces at remote locations throughout the Horn of Africa. Coordinated complex deployment logistics, including air and ground transportation.• Maintained 100% accountability of sensitive cryptographic equipment, including 24 KG-175 network encryption devices and three AN/CYZ-10 data transfer devices, as well as other communications security (COMSEC) material. Passed all information and communications security inspections. Zero security incidents or violations.• Directed Joint Network Control Center at Camp Lemonier, Djibouti. Monitored NIPR, SIPR, and CENTRIXS data networks. Tracked hundreds of authorized service interruptions and ensured timely flow of status information to senior leadership, Theater Network Control in Bahrain, and U.S. Central Command.
-
DeveloperTeksystems Jan 2003 - Jan 2006Tallahassee, Florida AreaPerformed systems analysis and redesign of a web-based application used for managing healthcare for inmates in the Florida Department of Corrections (FDOC). Analyzed requirements and designed workflow. Identified security requirements and mitigated risks throughout the System Development Life Cycle (SDLC). Ensured compliance with all HIPAA regulations. Designed Microsoft SQL Server database using engineering best practices. Developed content for FDOC's web presence. Also created computer-based training for the Florida Department of Transportation. -
Officer In ChargeNon Prior Service Training Unit Detachment 0897 Sep 2002 - Jan 2006Tallahassee, Florida Area
-
Database DeveloperCommander Iceland Defense Force Jun 2005 - Jul 2005IcelandReceived accolades from executive leadership for a 33-day special project redesigning and developing an Administration Department personnel database application in Microsoft Access, resulting in dramatically increased accuracy, speed and efficiency in tracking administrative requirements for 150 personnel. Normalized database and wrote 21 functions and SQL queries to improve data input/output. Redesigned nine application-generated reports, improving accuracy and functionality and giving them a more professional appearance. Created a new user interface, enhancing usability and appearance.
-
Project ManagerIntegrated Data, Inc. Aug 2001 - Jan 2002Merritt Island, FloridaConducted business analysis, gathered requirements, and implemented project plans for various projects, including a web-based quality assurance application for an airport equipment manufacturing company which allowed factory floor managers to conduct inspections using tablet computers.
-
Operations Department Head / InstructorFleet Support Training Unit Det 1208 Nov 1996 - Jan 2002Orlando, Florida Area
-
Senior DeveloperGoco-Op Oct 1999 - Jun 2001Orlando, Florida AreaLead Visual Basic .NET developer in the integration of Procura, GoCo-op's web-based supply chain management application, with client's Enterprise Resource Planning (ERP) systems. Implemented and configured application integration middleware and wrote custom objects that allowed to Procura to send purchase orders and other messages to SAP, PeopleSoft and Oracle ERP financials modules automatically via the Internet.
-
Web Application DeveloperOcwen Financial Corporation Oct 1998 - Oct 1999West Palm Beach, Florida AreaWrote functionality and dynamic web content for a web-based mortgage servicing application for the technology arm of a large bank. Wrote database queries, stored procedures, and created database tables. Integrated client's software with the application. Also designed and developed content for corporate Web and intranet sites, including an interactive events calendar for the Human Resources department. Skills and technologies used include Visual Basic, ASP, HTML, JavaScript, SQL, Microsoft SQL Server, ColdFusion, Adobe Photoshop, Corel Draw and Microsoft FrontPage. -
Air PersonalityWtks Oct 1994 - Oct 1998Orlando, Florida AreaDisc jockey at a major market radio station (104.1 FM). Hosted weekend alternative music program, recorded and produced commercials and other broadcast elements, occasional newscaster and talk radio show producer.
-
Program Director / Air PersonalityWvvv May 1992 - Jul 1994Roanoke, Virginia AreaManaged programming and on-air staff for an eclectic rock music radio station (104.9 FM). Hosted afternoon drive music program, recorded and produced commercials and other broadcast elements, made live appearances at remote broadcasts and concert performances.
-
Air PersonalityWtrs Aug 1989 - Jul 1991Ocala, Florida AreaDisc jockey at a large country music radio station (102.3 FM). Hosted midday music program, recorded and produced commercials and other broadcast elements, made live appearances at remote broadcasts and concert performances.
-
Operations HostWalt Disney World Sep 1979 - May 1983Orlando, Florida AreaOperated attractions in Frontierland and Liberty Square at the Magic Kingdom and in Future World at Epcot, including the Haunted Mansion, Big Thunder Mountain Railroad and Spaceship Earth.
Kevin Walsh, Cissp, Gslc Skills
Kevin Walsh, Cissp, Gslc Education Details
-
Computer Science -
Engineering -
Computer Forensics And Digital Investigation
Frequently Asked Questions about Kevin Walsh, Cissp, Gslc
What company does Kevin Walsh, Cissp, Gslc work for?
Kevin Walsh, Cissp, Gslc works for Emagine It, Inc.
What is Kevin Walsh, Cissp, Gslc's role at the current company?
Kevin Walsh, Cissp, Gslc's current role is Senior Information Assurance and Security Specialist.
What is Kevin Walsh, Cissp, Gslc's email address?
Kevin Walsh, Cissp, Gslc's email address is ne****@****vox.com
What schools did Kevin Walsh, Cissp, Gslc attend?
Kevin Walsh, Cissp, Gslc attended University Of Maryland University College, University Of Central Florida, College Of Central Florida, University Of Maryland Global Campus.
What skills is Kevin Walsh, Cissp, Gslc known for?
Kevin Walsh, Cissp, Gslc has skills like Security Clearance, Security, Military, Program Management, Leadership, Computer Security, Information Technology, Information Security, Intelligence, Management, Navy, Government.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial