Profiles search
Billy Criss
Senior Cybersecurity Engineer at Trowbridge & Trowbridge LLC
Sanford, NC, United States
Details
Experience:
• Coordinates with network system owners to conduct manual STIG checks and SAV validations to identify potential vulnerabilities to the USARC network.
• Ensures device documents are transitioned to the Risk Management Framework (RMF) in accordance with DoDI 8510.01
• Ensures device documentation meet minimum security controls derived from the NIST SP 800-53 Revision 4
• Responsible for the audit of all USARC switches, routers, VTC, bluecoat, wireless access points all across the United States Army Reserve enterprise to ensure compliance with standards denoted in the NISPOM, DISA, and ARCYBER.
• Conducts automated Security Content Automation Protocol (SCAP) scans on application servers, and manual Security Technical Implementation Guide (STIG) checks as necessary
• Collaborates with Network Subject Matter Experts to insure all USARC networks are properly secured and maintained in accordance with DoDI 8510.01.
• Provides recommendations to device owners to remediate findings and improve their overall security posture
• Scans over 400 workstations per month using the SCAP scanner to better understand the compliance level of assets on the USARC network.
• Directly involved in the mitigation of vulnerabilities across the entire United States Army Reserve Enterprise by using hotfixes, patches, and working with device subject matter experts to resolve vulnerabilities affecting a wide variety of servers and workstations.
• Ensure physical requirements were met for the Army Forces Command and United States Army Reserve Headquarters building to include room access, smart card compliance, and vault specifications.
• Personally responsible for the audit of two percent of switches, routers, VTC, bluecoat, wireless access points all across the United States Army Reserve enterprise to ensure compliance with standards denoted in the NISPOM, DISA, and ARCYBER to include Web servers, Application servers, DNS servers, and Database servers.
2018 : Present
Trowbridge & Trowbridge, LLC
Senior Cybersecurity Engineer
• Coordinates with network system owners to conduct manual STIG checks and SAV validations to identify potential vulnerabilities to the USARC network.
• Ensures device documents are transitioned to the Risk Management Framework (RMF) in accordance with DoDI 8510.01
• Ensures device documentation meet minimum security controls derived from the NIST SP 800-53 Revision 4
• Responsible for the audit of all USARC switches, routers, VTC, bluecoat, wireless access points all across the United States Army Reserve enterprise to ensure compliance with standards denoted in the NISPOM, DISA, and ARCYBER.
• Conducts automated Security Content Automation Protocol (SCAP) scans on application servers, and manual Security Technical Implementation Guide (STIG) checks as necessary
• Collaborates with Network Subject Matter Experts to insure all USARC networks are properly secured and maintained in accordance with DoDI 8510.01.
• Provides recommendations to device owners to remediate findings and improve their overall security posture
• Scans over 400 workstations per month using the SCAP scanner to better understand the compliance level of assets on the USARC network.
• Directly involved in the mitigation of vulnerabilities across the entire United States Army Reserve Enterprise by using hotfixes, patches, and working with device subject matter experts to resolve vulnerabilities affecting a wide variety of servers and workstations.
• Ensure physical requirements were met for the Army Forces Command and United States Army Reserve Headquarters building to include room access, smart card compliance, and vault specifications.
• Personally responsible for the audit of two percent of switches, routers, VTC, bluecoat, wireless access points all across the United States Army Reserve enterprise to ensure compliance with standards denoted in the NISPOM, DISA, and ARCYBER to include Web servers, Application servers, DNS servers, and Database servers.
2018 : 2018
AT&T
Cybersecurity Engineer
Responsible for the audit of all Enterprise switches, routers, wireless access points, bluecoat, VTC and MFDs over the entire United States Army Reserve domain.
-Worked hand in hand with device subject matter experts to mitigate risks or provide paperwork proving risk acceptance for certain vulnerabilities.
- Applies knowledge of DISA STIGs, SRGs, and Application Security and Development checklist, as well as IAVM messages, and best business practices to validation activities.
- Performs manual checks and automated tests using government approved tools and standards.
- Perform security inspections, as required, and prepares reports which include findings and recommendations for correction deficiencies.
- Follows DKS IA control validations procedures
- Supports DIACAP package preparation for ACA review
- Work with ACAS/SCAP for vulnerability scanning
- Maps non-compliant technical findings to the appropriate IA control and performs risk assessments to determine DIACAP severity codes for non-compliant controls.
- Performs post-certification follow-up assessments
- Supports and works alongside Microsoft and Verizon employees to implement security measures to mitigate vulnerabilities.
- Tanium Question Author
- Other support duties as needed/directed
2017 : 2018
Federal IT Consulting (FEDITC)
Cybersecurity Engineer
Information Technology Specialist
2015 – 2017 : Fort Bragg, NC
Command Post Node operator accountable for Satellite Transmission Terminals valuing over $100,000 :
• Installed and maintained classified and unclassified networks for the 82nd Combat Aviation Brigade during a 30 day exercise.
• Communication security custodian for 25 months with zero incidents.
• Documented and executed maintenance procedures, including system upgrades, patch management, and system backups.
• Installed VoIP phones and customer laptops, both classified and unclassified throughout the site, including making the Cat5E and tactically placing all cables, to include fiber optic cable, in an organized manner.
• Performed PC placement and replacement, along with printers, in collaboration with customers for the most beneficial position.
• Operated, diagnosed, and underwent troubleshooting to properly fully assess the issue whether hardware or software related.
Information Technology Specialist
2013 – 2015 : Camp Buehring, Kuwait
System Administrator accountable for over 3,000 active users :
• Planned, installed, maintained, and optimized continuous voice and data over classified and unclassified enclaves to over 2,500 users.
• Provided a meticulous attention to detail which guaranteed over 235 Armed Forces personnel access to classified Enterprise E-mail.
• Served as operating system expert, providing technical support for entire organization with over 1,000 active users.
• Troubleshot and resolved web application issues escalated from customer support and other departments with a 100% success rate.
• Assisted in the monitoring and reporting on website traffic and performance.
• Documented and executed maintenance procedures, including system upgrades, path management and system backups.
• Installed and supported over 20 Microsoft Windows Servers in an Active Directory Cluster
2013 : 2017
US Army
Information Technology Specialist
• Ensures device documents are transitioned to the Risk Management Framework (RMF) in accordance with DoDI 8510.01
• Ensures device documentation meet minimum security controls derived from the NIST SP 800-53 Revision 4
• Responsible for the audit of all USARC switches, routers, VTC, bluecoat, wireless access points all across the United States Army Reserve enterprise to ensure compliance with standards denoted in the NISPOM, DISA, and ARCYBER.
• Conducts automated Security Content Automation Protocol (SCAP) scans on application servers, and manual Security Technical Implementation Guide (STIG) checks as necessary
• Collaborates with Network Subject Matter Experts to insure all USARC networks are properly secured and maintained in accordance with DoDI 8510.01.
• Provides recommendations to device owners to remediate findings and improve their overall security posture
• Scans over 400 workstations per month using the SCAP scanner to better understand the compliance level of assets on the USARC network.
• Directly involved in the mitigation of vulnerabilities across the entire United States Army Reserve Enterprise by using hotfixes, patches, and working with device subject matter experts to resolve vulnerabilities affecting a wide variety of servers and workstations.
• Ensure physical requirements were met for the Army Forces Command and United States Army Reserve Headquarters building to include room access, smart card compliance, and vault specifications.
• Personally responsible for the audit of two percent of switches, routers, VTC, bluecoat, wireless access points all across the United States Army Reserve enterprise to ensure compliance with standards denoted in the NISPOM, DISA, and ARCYBER to include Web servers, Application servers, DNS servers, and Database servers.
2018 : Present
Trowbridge & Trowbridge, LLC
Senior Cybersecurity Engineer
• Coordinates with network system owners to conduct manual STIG checks and SAV validations to identify potential vulnerabilities to the USARC network.
• Ensures device documents are transitioned to the Risk Management Framework (RMF) in accordance with DoDI 8510.01
• Ensures device documentation meet minimum security controls derived from the NIST SP 800-53 Revision 4
• Responsible for the audit of all USARC switches, routers, VTC, bluecoat, wireless access points all across the United States Army Reserve enterprise to ensure compliance with standards denoted in the NISPOM, DISA, and ARCYBER.
• Conducts automated Security Content Automation Protocol (SCAP) scans on application servers, and manual Security Technical Implementation Guide (STIG) checks as necessary
• Collaborates with Network Subject Matter Experts to insure all USARC networks are properly secured and maintained in accordance with DoDI 8510.01.
• Provides recommendations to device owners to remediate findings and improve their overall security posture
• Scans over 400 workstations per month using the SCAP scanner to better understand the compliance level of assets on the USARC network.
• Directly involved in the mitigation of vulnerabilities across the entire United States Army Reserve Enterprise by using hotfixes, patches, and working with device subject matter experts to resolve vulnerabilities affecting a wide variety of servers and workstations.
• Ensure physical requirements were met for the Army Forces Command and United States Army Reserve Headquarters building to include room access, smart card compliance, and vault specifications.
• Personally responsible for the audit of two percent of switches, routers, VTC, bluecoat, wireless access points all across the United States Army Reserve enterprise to ensure compliance with standards denoted in the NISPOM, DISA, and ARCYBER to include Web servers, Application servers, DNS servers, and Database servers.
2018 : 2018
AT&T
Cybersecurity Engineer
Responsible for the audit of all Enterprise switches, routers, wireless access points, bluecoat, VTC and MFDs over the entire United States Army Reserve domain.
-Worked hand in hand with device subject matter experts to mitigate risks or provide paperwork proving risk acceptance for certain vulnerabilities.
- Applies knowledge of DISA STIGs, SRGs, and Application Security and Development checklist, as well as IAVM messages, and best business practices to validation activities.
- Performs manual checks and automated tests using government approved tools and standards.
- Perform security inspections, as required, and prepares reports which include findings and recommendations for correction deficiencies.
- Follows DKS IA control validations procedures
- Supports DIACAP package preparation for ACA review
- Work with ACAS/SCAP for vulnerability scanning
- Maps non-compliant technical findings to the appropriate IA control and performs risk assessments to determine DIACAP severity codes for non-compliant controls.
- Performs post-certification follow-up assessments
- Supports and works alongside Microsoft and Verizon employees to implement security measures to mitigate vulnerabilities.
- Tanium Question Author
- Other support duties as needed/directed
2017 : 2018
Federal IT Consulting (FEDITC)
Cybersecurity Engineer
Information Technology Specialist
2015 – 2017 : Fort Bragg, NC
Command Post Node operator accountable for Satellite Transmission Terminals valuing over $100,000 :
• Installed and maintained classified and unclassified networks for the 82nd Combat Aviation Brigade during a 30 day exercise.
• Communication security custodian for 25 months with zero incidents.
• Documented and executed maintenance procedures, including system upgrades, patch management, and system backups.
• Installed VoIP phones and customer laptops, both classified and unclassified throughout the site, including making the Cat5E and tactically placing all cables, to include fiber optic cable, in an organized manner.
• Performed PC placement and replacement, along with printers, in collaboration with customers for the most beneficial position.
• Operated, diagnosed, and underwent troubleshooting to properly fully assess the issue whether hardware or software related.
Information Technology Specialist
2013 – 2015 : Camp Buehring, Kuwait
System Administrator accountable for over 3,000 active users :
• Planned, installed, maintained, and optimized continuous voice and data over classified and unclassified enclaves to over 2,500 users.
• Provided a meticulous attention to detail which guaranteed over 235 Armed Forces personnel access to classified Enterprise E-mail.
• Served as operating system expert, providing technical support for entire organization with over 1,000 active users.
• Troubleshot and resolved web application issues escalated from customer support and other departments with a 100% success rate.
• Assisted in the monitoring and reporting on website traffic and performance.
• Documented and executed maintenance procedures, including system upgrades, path management and system backups.
• Installed and supported over 20 Microsoft Windows Servers in an Active Directory Cluster
2013 : 2017
US Army
Information Technology Specialist
Company:
Trowbridge & Trowbridge, LLC
About
Accomplished military veteran with four years of experience as an Information Technology Specialist. Proven ability to adapt to new surroundings while remaining proficient. Ability to configure network architectures in a commercial environment while exceeding all designated objectives.