Robert C.

Robert C. Email and Phone Number

Vulnerability Program Governance - Manager and GRC @ World Kinect
Calais, ME, US
Robert C.'s Location
Fredericksburg, Virginia, United States, United States
Robert C.'s Contact Details
About Robert C.

Mr. Craig's extensive background in implementing and managing security solutions, as well as infrastructure-related experience in areas such as network, server, and endpoint management, make him a valuable asset to any organization. In addition to his academic and professional qualifications, Mr. Craig holds a professional security certification CISSP, demonstrating his commitment to excellence in the field of cybersecurity.He currently oversees the Vulnerability Management Program (VMP) for World Kinect (previous known as World Fuel Services) managing the detection, analysis, assignment of risk ratings and the progress of remediation efforts of responsible IT/OT/Application owners. Remediation is achieved through the application of patches, hotfixes, updates, changes to systems or application configuration, and other mitigation strategies. Patch and vulnerability management goals are to proactively prevent the exploitation of vulnerabilities that exist within an organization’s information ecosystem. The expected results are to reduce the time and resources expended in resolving the vulnerabilities and prevent exploitation. Timely patching of security issues is critical to maintaining the operational availability, confidentiality, and integrity of information technology (IT) systems. The VMP is designed to create systematic, accountable, and documented processes for managing exposure to vulnerabilities through the timely deployment and tracking of patch implementation.Mr. Craig's exceptional communication skills, both verbally and in writing, have been instrumental in advising executive corporate and federal leadership. He excels at conveying technical and security-related concepts to individuals at all organizational levels, including security vendors, consultants, and senior management. His ability to build cross-organizational coalitions is well-regarded, facilitating collaboration and alignment on security objectives.With a deep understanding of cybersecurity threats, vulnerabilities, controls, and remediation strategies in global environments, Mr. Craig has played a pivotal role in security design, architecture, and incident response. His strong work ethic, attention to detail, excellent time management, and organizational skills have contributed to his track record of success in leading departments, divisions, and teams, as well as advising CIOs, CTOs, and CISOs.

Robert C.'s Current Company Details
World Kinect

World Kinect

View
Vulnerability Program Governance - Manager and GRC
Calais, ME, US
Robert C. Work Experience Details
  • World Kinect
    Vulnerability Program Governance - Manager And Grc
    World Kinect
    Calais, Me, Us
  • World Fuel Services
    Vulnerability Program Governance - Manager / Grc / Information Security (Ciso) / Coo / Wfs
    World Fuel Services Aug 2022 - Present
    Miami, Fl, Us
    Leads the VMP: Improved an established VMP by integrating a Cyber asset attack surface management (CAASM) product, Panaseer, into existing processes. Oversaw activities, including scanning, assessment, prioritization, remediation, and tracking. Continuously evaluated and improved the VMP’s effectiveness in identifying, mitigating, and remediating vulnerabilities creating Remediation Objectives in Panaseer associated with over 150 severity/Critical Jira stories/tickets to easily track remediation progress.Vulnerability Identification and Assessment: Selected and implemented appropriate vulnerability scanning tools, Qualys/MDVM “MS-Defender” and techniques across the IT infrastructure. Analyzed and prioritized vulnerabilities based on severity using Exploit Prediction Scoring System for exploitability prioritization, and business impact determination. This was incorporated into the Atlassian Suite-Jira Story/Ticket creation process for assignment to appropriate teams for remediation. Reviewed penetration testing and advanced security assessments for incorporation into Risk Register categorization and alignment to appropriate Agile projects, initiatives, and epics.Vulnerability Remediation: Developed and implemented remediation plans for identified vulnerabilities, considering feasibility, impact, and resource constraints. Tracked remediation progress and ensured timely resolution of critical vulnerabilities using Mean Time to Remediate (MTTR) metrics per asset owner. Collaborated with cross-functional teams (e.g., development, operations, IT) to facilitate timely remediation.Reporting and Communication: Generated regular reports on VMP activities, including vulnerability trends, remediation progress, and program effectiveness. Presented VMP metrics and findings to stakeholders and senior management in a clear and concise manner. Effectively communicated with internal and external stakeholders regarding vulnerability risks and remediation efforts.
  • Leidos
    Senior Cybersecurity Advisor, Cybersecurity Directorate, Odni Ic-Cio
    Leidos Jun 2016 - Jul 2022
    Reston, Virginia, Us
    Coordinates activities of the IC Audit Subcommittee (ICAS) that fosters consistent standards and processes for collecting, formatting, storing, and sharing resource audit data in support of counterintelligence, information assurance, information sharing, personnel security, business analytics, and law enforcement communities. ICAS helps to fulfill duties of the Information Security Risk Management Committee (ISRMC) and develops recommendations for improving standards, policies, guidelines, and processes across the IC associated with auditing users and system activities. •​Performs as co-chair of the Audit Developer’s Forum, coordinating agenda, topics, tracking forum tasking, managing membership to web-based repository, as well as relaying technical aspects of Audit.XML standard to Counterintelligence and Insider Threat community.•​Developed an Enterprise Audit Capability Maturity Model for the IC. Identified a need for the IC Enterprise Audit programs to have a common benchmark to determine maturity of capabilities for progress reporting to CIOs of IC elements. This led to the creation of the EA CMM, which incorporated the CNSS 1015 Enterprise Audit for NSS, and Electrical Industry EA CMM, CNSS 1253 Security Controls (Audit related), and previous personally developed work on CMMs. •​Chairs the US 5-Eyes Audit Working Group tasked with updating the 2013 5-Eyes Audit Collection and Sharing Standard.
  • Caci Enterprise Solutions (Esmarts Contract)
    Principal Information Security Specialist, Nga
    Caci Enterprise Solutions (Esmarts Contract) Nov 2013 - Jun 2016
    Leads the Agency’s strategy for implementation and compliance with Insider Threat mandates [Office of the Secretary of Defense (OSD), US CYBER Command, Office of the Director of National Intelligence (ODNI), White House/National Security Council (NSC) 45-day plan) as well as incorporating National Insider Threat Task Force (NITTF) guidance. Normalized memorandum’s action statements into strategic organizational tasks that resulted in clear goals for IT implementers to define tasks, track progress, and closure of identified security program weaknesses. Responded on behalf of Agency to the White House Program Manager-Information Sharing Executive (PM-ISE) for quarterly cyber metrics and integrated the Key Information Sharing and Safeguarding Indicators (KISSI) into an Information Assurance-Capability Maturity Model providing Agency cyber executive’s visibility into cyber program/project progress against maturity observations. Provided feedback and roadmap statements on Notice of Findings and Recommendations (NFRs) to Agency Office of Inspector General (OIG) during conduct of a Standards for Attestation Engagements (SSAE 16) audit on Agency financial systems. Crafted Director talking points and CIO responses for House Panel Select Committee for Intelligence (HPSCI) / House Appropriations Committee Survey and Investigations (HAC S&I) and IC-DEXCOM (Director Executive Committee) / IC CIO discussion topics. Successful responses to inquiries eliminated need for HAC S&I to further investigate IC-Cloud investments and strategic direction/implementation plans.Represented Agency at the ODNI-Privileged Access Steering Group (PASG), ODNI-Information Security Risk Management Council (ISRMC), ODNI Identity and Access Management Steering Committee, and ODNI Insider Threat Mission User Group on behalf of Agency CISO that demonstrated Agency commitment to IC initiatives as well as advanced identification of potential senior executive tasking.
  • Fgm Inc., A Novetta Solutions Company
    Senior Risk Management Consultant, Dia
    Fgm Inc., A Novetta Solutions Company Mar 2013 - Nov 2013
    Support TASC StartX (DIA): Mr. Craig performed certification activities for the Composite Signature Intelligence Processing (CSIP) system for the DIA, Directorate for MASINT, Technical Collection Program, Office of Research & Development. Created a detailed project plan (down to WBS levels 4 and 5) based upon the Department Of Defense Intelligence Information System (DoDIIS) - Joint Security Implementation Guide (DJSIG), August 2011, that incorporated the ICD-503 Risk Management Framework (RMF), and combined the DJSIG selected controls for Common, Hybrid, and System with C/I/A of H/H/H with the April 2013 release of version 4 of NIST Special Pub. 800-53 and by reviewing all controls that led to the creation of a tailored Security Requirement Traceability Matrix (SCTM) in advance of DIA’s implementation of version 4 requirements. This allowed systems developers to incorporate security measure well in advance of security assessments that reduced timelines required to receive authorization to operate.
  • Fgm Inc., A Novetta Solutions Company
    Senior Security Engineer, Multi-Use Technology Lab, Nga
    Fgm Inc., A Novetta Solutions Company Feb 2012 - Feb 2013
    Upon completion of the Secure Wireless Trade Study (see below), Mr. Craig assumed all IA responsibilities for the Multi-Use Technology Lab including maintaining and monitoring the McAfee Host-Based Security System (HBSS). He also participated in testing scenarios, where he created Data Loss Protection rules for USB/eSATA connected Guidance/Tableau forensic devices and encrypted Apricorn external hard drives. This included testing security features, limits, and performance testing. He developed the MTL Test Process Guide and Workflows to streamline service requests for MTL support reducing process complexity and increasing timely responses to support.
  • Fgm Inc., A Novetta Solutions Company
    Solution Architect To Cto, Advanced Engineering (Ae) Team, Nga
    Fgm Inc., A Novetta Solutions Company Jun 2011 - Jan 2012
    The Active IT Chief Technology Officer requested Mr. Craig’s re-assignment (see below) to the Architecture Engineering Team to support the Secure Wireless Trade Study for potential deployment of multi-level security wireless networks implementing Suite B using mobile devices at NGA. Mr. Craig reviewed applicable CNSS, ODNI, NGA, NIST, DoD, and DISA policies, guides, standards, and technical guides to establish security requirements and create senior-level presentations for project buy-in, as well as contributing to the security portions of the trade study white paper. Approvals for pilot implementations resulted from this analysis and executive presentations.
  • Fgm Inc., A Novetta Solutions Company
    Cybersecurity Risk Management Team Manager, Nga
    Fgm Inc., A Novetta Solutions Company Feb 2011 - Jun 2011
    Mr. Craig was the Team Manager for the GDIT Active IT (AIT) C&A Team initially consisting of 17 personnel; C&A Project Managers and Security Testers. AIT deployed all the IT systems and services to support the National Geospatial Intelligence Agency (NGA) at the new campus (NCE) at Fort Belvoir North. Mr. Craig’s initial tasks were to analyze funding expenditures of AIT regarding the C&A Team and perform personnel assessments in regards to team re-sizing. Through attrition, counseling, and personnel turnover, the team was reduced to 11 personnel, a more sustainable size in alignment with funding. Other tasks were to track and report on over 60 C&A efforts and continue track current status, as well as interfacing with NGA Program Management Office and Senior GDIT Management. Mr. Craig provided Engineering Change Proposal (ECP) input with respect to C&A man-hours, and analyzed past ECPs to re-capture work performed by AIT but not properly funded by customer. He provided team mentoring to the team leads (PMs and Sr. Tester Lead) and refocused the team on communication, schedule performance/analysis and completion of tasks.
  • Van Dyke Technology Group
    Senior Information Assurance Analyst / Ic Cybersecurity Liaison, Odni
    Van Dyke Technology Group Oct 2007 - Feb 2011
    VDTG PYRAMID Program Manager (DNI) assigned to the PYRAMID program as a full-time technical resource for the Chief / Infrastructure Services Group supporting all customers on the Liberty Crossing Compound. He supported the Chief/ISG regarding all IA issues between ISG and its customers (ODNI and NCTC). He initiated and mediated bi-weekly IA meetings with NCTC ISSM to coordinate IT engineering and IA issues with Branch Chiefs and IT Leads. Wrote a senior level risk document to describe high-risk issues of IT deliverables implemented by another tasked IC-member that provided ODNI resources to Liberty Crossing offices. He reviewed SSPs for ISG and NCTC projects as an initial security review before submission to NCTC ISSM and made recommendations to CIA’s IPC. Managed all aspects of the program including technical work, programmatic deliverables, and personnel. Reviewed and engineered network architecture and system solutions to ensure information was handled, processed and stored in compliance with IC and DoD Information handling regulations for information ranging from unclassified up to the sensitive SCI levels. He handled negotiations with other information system security specialists throughout the IC and DoD for ODNI programs. Wrote new and reviewed existing security plans for ODNI systems and networks and was involved in all aspects of information security including design, development, and accreditation of ODNI applications, LANs and WANs. Provided indirect support to the ODNI ISSM, CIA and other panels working information security issues. He represented ISG at the CIA Security Review Boards and the IPC and Intelligence Community boards and working groups. Mr. Craig provided indirect support to DNI CIO (IC CIO) on IC activities and participated in secure COI and PKI certificate key policies and management. Mr. Craig audited ODNI systems and INFOSEC investigations and assisted in preparing briefings for ODNI senior management regarding INFOSEC issues.
  • Skillstorm Government Integrated Services, Inc.
    Senior Principal Security Engineer, Odni
    Skillstorm Government Integrated Services, Inc. Apr 2006 - Oct 2007
    Organized and conducted bi-weekly intelligence community (IC)-wide Information Security meeting to coordinate IT infrastructure and IC-member connectivity issues and concerns. Established a project tracking process; compiled deliverables listings; provided follow-up to IC IA group, and conducted individual ODNI-IC member IA meetings.Member of the DNI CIO FISMA Tiger Team; charted to draft the IC Policy Guidance (ICPG) relating to IC compliance with FISMA requirements.Facilitated the Government-to-Corporate officers/VP communication relating to periods of performance, annual reviews, expanding contracting support, rates, support to the Pyramid proposal, and analysis of government needs and requirements.Tracked the Certification and Accreditation status of ODNI systems by coordinating and leading project meetings to define requirements, testing methodologies, expectations, remediation efforts, and outlining the process for government and contractor teams. Data points were consolidated within a tracking database that was modified to support FISMA reporting requirements. The modifications streamlined ODNI’s Security and added the capability for instantaneous FISMA reports generation.During a period of reduced staffing on the ISSM Team, all INFOSEC duties were performed by Mr. Craig and Deputy ISSM. A list of common tasks was defined for the new ISSM and delegated to specific personnel as the team grew. Within first month on-site, Mr. Craig modified the Systems Security Plan Community Management System database, to support the new ODNI organization and created Lotus Notes data displays that were easily exportable to the IC IT Registry (used for IC FISMA reporting) to enable streamlined quarterly and annual reporting.
  • Netsec, Inc., A Verizon Company
    Project Manager / Principal Engineer, Dept Of The Treasury, Office Of The Cio, Cyber Security
    Netsec, Inc., A Verizon Company Feb 2005 - Apr 2006
    Developed a Cyber Security Program Management Plan and Security Program Framework for Treasury's Intelligence Community and Classified computer system networks. This Program integrated Program Management, Capital Planning and Investment Control (CPIC), Federal Enterprise Architecture (FEA), Compliance, and Critical Infrastructure Protection (CIP) programs. This framework was used as a basis for assessment and clarified Departments strategy for risk determinations on its classified systems.Created Rough Order of Magnitude (ROMs) estimates for proposed task orders and detailed project plans for Treasury C&A activities allowing government senior managers to project future costs and timeframes for work completion.Created test plans, derived Security Requirements Traceability Matrices (SRTMs) from standards, created test cases based on DISA STIGs, mapped test cases to SRTM, supervised and performed test cases, compiled risk reports based in IC CIO Risk Management guidance, and presented reports to Treasury Executives, Steering Committees, and DAA. Lead team of Senior Security Engineers and Analysts in the performance of the C&A of Treasury’s SCI and SIPRNET connected networks based upon DCID 6/3 and NISCAP standards that allowed Department retain approvals to DoD communication channels.
  • Netsec, Inc., An Mci Company
    Lead Security Engineer, Department Of Justice, Executive Office For United States Attorneys (Eousa)
    Netsec, Inc., An Mci Company May 2002 - Feb 2005
    Captured client requirements for an Enhanced Intrusion Detection System Architecture to provide the capability for 100% up-time and continuous IDS monitoring in the event of a disaster at either geographically segregated location. Researched market-available products; provided vendor-comparison matrixes and selected point-solution products that were integrated into the final design. Implemented remote access technologies on all hardware components allowing administrators the ability to remotely reboot systems at the power cord level and access system BIOS, not an Operating System or Terminal Service-type solution, but an Internet-enabled Keyboard-Video-Mouse with remote power module control.Deployed a single-threaded Internet Security Systems (ISS) SiteProtector 1.2 and 2.0 architecture to support monitoring and analysis operations. Developed disaster recovery capabilities for the system allowing continued monitoring operations in the event of a loss of availability of the Enterprise Database. Provided instruction to Network Security Operations Center (NSOC) personnel on use of SiteProtector Console / JAVA client and analysis capabilities of the Security Fusion Module. Researching / testing multithreaded SiteProtector 2.0 architecture using geographically dispersed clusters to provide 100% availability/fail-over in the event of a total site disaster.Conducted systems analysis, design, and prototyping for the implementation and deployment of information security technologies relating to a large-scale, centrally-managed nationally distributed IDS. This development phase explored the new feature-set and capabilities of the IDS which generated modifications to project and resource planning that improved the accuracy of time-lines and personnel required.
  • Us Navy
    Senior Enlisted Leader (Sel) / Issm, Us Navy Reserves
    Us Navy Dec 1983 - Jan 2005
    Washington, Dc, Us
    Detailed Military Resume' available upon requestCryptologic Technician, Technical/Chief Petty Officer (CTTC) USNR, RetiredReserves (September 1997 – January 2005)Active Duty (December 1983 – August 1997)May 2002 – January 2005Navy Reserve Security Group, Greensboro Title: Command Chief, Senior Enlisted Advisor, Information Systems Security Manager (ISSM)Command Chief of Naval Reserve Security Group, Greensboro, NC. Responsible for all administrative and operational command functions, and the mobilization readiness of 36 personnel.Information Assurance – Protection and defense of information and information systems by incorporating protection, detection, and reaction capabilities.Information Assurance / Monitoring (IA/M) – provides IA Vulnerability Assessments for service elements and joint commands. Missions are performed by on-site teams to provide customers with real-time data to support tactical operational decision-making.Computer Network Defense (CND) – responsible for monitoring all Department of the Navy unclassified web sites. The mission ensures Navy public Internet sites are in compliance with DoD policy through complete and recurring monitoring efforts.High Frequency Mission – a collection mission in response to tasking from national and tactical customers, including fleet commanders. The mission involves collection, analysis, and reporting of military communications.
  • Us Navy, Commander, Second Fleet (Com2Ndflt)  J36 Information Operations
    Computer Network Vulnerability Assessment (Cnva) Coordinator / Nodal Analyst
    Us Navy, Commander, Second Fleet (Com2Ndflt) J36 Information Operations Nov 2001 - May 2002
    Mobilized Reservist in support of Operations Noble Eagle and Enduring FreedomParticipated as a representative of Commander, Second Fleet, at the 2nd Annual Navy Computer Network Vulnerability Assessment Working Group. Drafted scheduling messages for the performance of multi-phase computer network vulnerability assessments for the George Washington Battle Group (multiple ships). Participated in NATO's Strong Resolve 2002 "Operation Allied Timber" as a Joint Operations Center Psychological Operations 3rd Shift Desk Watch and performed interfacing functions with Land and Maritime Desk Watches and Information Operations personnel.Analyzed pre-exercise background documents that resulted in the creation and presentation of briefings on notional irregular and paramilitary organizations and their physical deployments and Information Warfare capabilities that might be conducted/executed during the exercise. Supervised two mobilized reservists performing Electronic Intelligence (ELINT) and Electronic Warfare (EW) functions during John F. Kennedy Battle Group (JFKBG) Joint Tactical Fleet Exercise (JTFEX) in order to prepare JFKBG’s EW Warfighters for their replacement of the Theodore Roosevelt Battle Group (at that time conducting operations against Taliban and Al Qaeda from the Indian Ocean into Afghanistan), and Operation Strong Resolve (NATO Baltic exercise).Attended training at the Fleet Information Warfare Center (FIWC) on Perception Management.
  • Netsec, Inc
    Senior Security Analyst, Department Of Justice, Executive Office For United States Attorneys (Eousa)
    Netsec, Inc Jun 2000 - Nov 2001
    Translated client strategic requirements and objectives into action plans that resulted in the development of Lifecycle Management Plans, IDS Incident Response and Alarm Escalation Plans.Coordinated project plan tasking that integrated an outsourced national Intrusion Detection System, firewall, and VPN monitoring capability and combined those newly identified processes into the Managed Security Services Network Security Operations Center daily procedures. Evaluated and developed comprehensive security policies (Business Continuity, Firewall Management using Managed Security Services, Disaster Recovery etc.) and runbooks for Dot Coms and DOJEOUSA, and contributed to the overall knowledge and skill development of the Government Security Group. Developed documentation for DOJEOUSA’s National Information Assurance Certification and Accreditation Process (NIACAP) System Security Authorization Agreement (SSAA). Provided third-tier analyst support and management guidance to operations personnel of client Intrusion Detection Systems during the incident determination phase of the Incident Response and Alarm Escalation runbooks using product-specific analysis and reporting tools. Regular exercise of these runbooks resulted in the identification of baseline levels of false positives that allowed for the fine-tuning of network sensor policies reducing the overall frequency of alarms. Developed a white paper and recommendations for use of ingress and egress packet filtering within a specific US Government Department’s networking environment based on requirements from OMB A-130 and using RFC 2827 as a development guideTeamed with client security organization personnel to determine their specific information systems security assessment requirements and ensured that the conduct of security assessments, evaluations, and penetration testing of global network operations remain within the negotiated rules-of-engagement.
  • Net-Centric Consulting Group, Llc
    Manager E-Secure Services / Lead-Capital Launch Team
    Net-Centric Consulting Group, Llc Jan 2000 - May 2000
    Established criteria for developing an end-to-end E-Secure Services sector with skills assessment for sub-sectors staffing. Developed contacts with Venture Capital Groups for pursuit of Early Stage financing. Assisted in the development of multiple client business plans.Performed reviews of resumes and potential new-hire interviews. Developed procedures for the selection of prospective Internet Incubation clients. Represented security service offerings at pre-sales meetings.Wrote a white-paper on Distributed Denial of Service attacks.
  • Science Applications International Corporation (Saic)
    Network Systems Security Engineer, Us Army Reserve And National Guard Reserve
    Science Applications International Corporation (Saic) Oct 1998 - Jan 2000
    July 1999–January 2000Science Applications International Corporation (SAIC) Information Services Sector (NOTE: SAIC purchased BIS in July 1999)October 1998–July 1999Boeing Information Services, Inc. (BIS)Client: US Army Reserve and National Guard Reserve Component Automation System (RCAS)Title: Network Systems Security Engineer, Tysons Corner, VADeveloped RCAS PKI implementation and migration plans by adapting guidance specified in the PKI Implementation Plan for the Department of Defense, DoD Public Key Infrastructure Roadmap, and the United States Department of Defense X.509 Cert. Policy.Attended, as a participant, the National Institute of Standards and Technology (NIST) working group meetings for discussion on implementations of the Federal Public Key Infrastructure (PKI). In cooperation with other client contractors, assisted in the development of the reaccredidation package utilizing DITSCAP of the Reserve Component Automation System (RCAS). Analyzed security features for Windows NT Workstation and Server in accordance with AR 380-19, Department of the Army, Information Systems Security Regulation, and submitted discrepancy reports for resolution by the Delivery Systems Department Review Board.Tested, evaluated, and reported on the throughput results regarding the implementation and integration of IPSEC on existing infrastructure equipment. Developed testing scripts and performed security assessments using Identification and Authentication, Discretionary Access Control, and Audit tests and coordinated the implementation of security enhancements with appropriate application and delivery systems products group. Provided training to US Army Reserve personnel on Windows NT 4.0 Dial-Up Networking/Remote Access Services (RAS) utilizing AT&T Secure Data Devices (SDD) for encrypted communications. Assisted application developers with the integration of various security features throughout a multitude of client proprietary applications.
  • Cexec Inc.,
    Team Lead And Senior Nt Network Analyst, Nuclear Regulatory Commission
    Cexec Inc., Jun 1997 - Oct 1998
    Provided technical management and expertise in the development of a unique method for deploying Windows NT Workstation to 3900 desktops using an extensively modified and novel adaptation of native Microsoft and Novell automated installation script standard procedures, neither of which would have been solely capable of performing the successful migration due to the existing Novell Network Operating System. Specific task accomplishments included:- Prepared corporate briefing on NT Operating System deployment issues for Regional Network Management personnel.- Designed network directory structure for NT Domains coexistence with Novell’s “NDS for NT”. - Developed methods and provided technical solutions for integrating NT into the Nuclear Regulatory Commissions’ Novell Netware environment. - Routinely performed analysis of security features of the NT Workstation Build, implementing security settings on file system and registry access control throughout the design and development process. - Managed four network engineers and analysts including Tier 3 Help Desk Support functions. - Conducted introductory NT training for 6 regional LAN administrators. - Supervised research and resolution process for application integration problems.- Created security standards for Windows NT Workstation for the Nuclear Regulatory Commission’s enterprise network (approx. 3900 workstations).- Developed implementation and rollout schedules using project management applications for various scenarios that would result in the implementation of Microsoft’s Systems Management Server (SMS) for use in the deployment and management of a distributed enterprise network.

Robert C. Skills

Computer Security Information Assurance Security Information Security Dod Vulnerability Assessment Network Security Program Management Intelligence Integration Cissp Nist Government Vulnerability Management Information Technology Penetration Testing Information Security Management Defense Security Clearance U.s. Department Of Defense Risk Assessment Systems Engineering Diacap Computer Forensics Security Policy Intrusion Detection Security Management Enterprise Architecture Networking Ids Security Audits Dcid 6/3 Accreditation Policy Fips Security Engineering Vulnerability Scanning Malware Analysis Nessus Ceh Cyber Security Ethical Hacking Compliance Information Security Policy Security Assessments Hardening

Robert C. Education Details

  • University Of Maryland Global Campus
    University Of Maryland Global Campus
    Management Studies
  • Northern Virginia Community College
    Northern Virginia Community College
    Computer Science

Frequently Asked Questions about Robert C.

What company does Robert C. work for?

Robert C. works for World Kinect

What is Robert C.'s role at the current company?

Robert C.'s current role is Vulnerability Program Governance - Manager and GRC.

What is Robert C.'s email address?

Robert C.'s email address is ro****@****dos.com

What is Robert C.'s direct phone number?

Robert C.'s direct phone number is +157152*****

What schools did Robert C. attend?

Robert C. attended University Of Maryland Global Campus, Northern Virginia Community College.

What skills is Robert C. known for?

Robert C. has skills like Computer Security, Information Assurance, Security, Information Security, Dod, Vulnerability Assessment, Network Security, Program Management, Intelligence, Integration, Cissp, Nist.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.