Profiles search
Ben Royer
Wing Information Assurance Office Chief
Ft. Washington, MD, United States
Details
Experience:
2018 : Present
Risk Mitigation Consulting, Inc.
Senior Cybersecurity Specialist
Network Information Operation (IO) Subject Matter Expert assigned to a Joint Staff Integrated Vulnerability Assessment (JSIVA) Team. JSIVA IO SME that evaluates and makes recommendations to Combatant Commanders, Service Chiefs, and Installation Commanders of DoD facilities worldwide on achievable means of enhancing the IO posture. Develops executive-level formal reports and presentations for senior leadership.
Conducts independent technical Information Assurance (IA), Cyber Surety and Computer Network Defense (CND) vulnerability and mission assurance assessments of installation telecommunication networks and information systems that directly support key Critical Infrastructure Protection (CIP) assets on military installations worldwide.
Provides IA and CND vulnerability analysis and recommendations regarding; continuity of operations and / or disaster preparedness plans; configuration management, preventive maintenance and testing of communications systems and networks; and the ability of networks to meet current and future communications needs.
Evaluates use of system scanning tools, vulnerability assessment monitoring, analysis, and detection services used to ensure network security. Key locations for assessments include data and server facilities, system management centers, IA program offices and Network and Security Operations Centers (NOSC).
Reviews plans, procedures and processes related to the effectiveness and readiness of information telecommunication network systems.
2011 : 2017
Defense Threat Reduction Agency
Information Operations SME
Led 10 person office responsible for all aspects of cybersecurity for Andersen AFB $30.5M network supporting over 4,000 network users. Responsible for cyber security of all network devices, computers. servers and other devices on the network.
2011 : 2016
United States Air Force
Chief, Wing Information Assurance Office
Risk Mitigation Consulting, Inc.
Senior Cybersecurity Specialist
Network Information Operation (IO) Subject Matter Expert assigned to a Joint Staff Integrated Vulnerability Assessment (JSIVA) Team. JSIVA IO SME that evaluates and makes recommendations to Combatant Commanders, Service Chiefs, and Installation Commanders of DoD facilities worldwide on achievable means of enhancing the IO posture. Develops executive-level formal reports and presentations for senior leadership.
Conducts independent technical Information Assurance (IA), Cyber Surety and Computer Network Defense (CND) vulnerability and mission assurance assessments of installation telecommunication networks and information systems that directly support key Critical Infrastructure Protection (CIP) assets on military installations worldwide.
Provides IA and CND vulnerability analysis and recommendations regarding; continuity of operations and / or disaster preparedness plans; configuration management, preventive maintenance and testing of communications systems and networks; and the ability of networks to meet current and future communications needs.
Evaluates use of system scanning tools, vulnerability assessment monitoring, analysis, and detection services used to ensure network security. Key locations for assessments include data and server facilities, system management centers, IA program offices and Network and Security Operations Centers (NOSC).
Reviews plans, procedures and processes related to the effectiveness and readiness of information telecommunication network systems.
2011 : 2017
Defense Threat Reduction Agency
Information Operations SME
Led 10 person office responsible for all aspects of cybersecurity for Andersen AFB $30.5M network supporting over 4,000 network users. Responsible for cyber security of all network devices, computers. servers and other devices on the network.
2011 : 2016
United States Air Force
Chief, Wing Information Assurance Office
Company:
Risk Mitigation Consulting, Inc.
About
Effective senior manager with expert ability to implement security policies, secure networks, troubleshoot access problems, review security logs, develop security procedures, manage incident response, conduct security reviews, participate in recovery efforts, and maintain security documentation.