Profiles search
Craig M.
Cybersecurity Professional
Sumter, SC, United States
Details
Experience:
2023 : Present
United States Air Force
ISSM/Section Chief, Wing Cybersecurity Office
- Leads regional provision center consisting of 9 member total force team in support of national level missions linking two combatant commands, Numbered Air Forces, and 16 msn partners with mobile operations.
- Serves in a nominative/selectively manned joint organization overseeing DISA data services within Headquarters, United States Central Command supporting Operation INHERENT RESOLVE and Operation ENDURING SENTINAL.
- Directs and monitors command cyberspace programs ensuring assessment & authorization packages are accomplished for command and control of 32 networks and 12 nodes.
- Conducts installation planning and manages the execution of Defense Information Systems Network services delivering actionable warfighting intel data across a $222M Department of Defense Information Network.
2020 : 2023
United States Air Force
Section Chief, Systems Support and Mobility
• Guided 5-member Information Security team implementing plans and providing cybersecurity guidance for 14 classified Developmental and Operational Test and Evaluation (DT&E and OT&E) networks.
• Upgraded F-35’s high speed network and tested analyst tool functionality enabling Developmental Test and Evaluation for 375 aircraft clearing the initial operational capability of the F-35A.
• Built, configured, and implemented ACAS vulnerability and compliance monitoring server and tools, providing the ability to verify security compliance with the JSIG for the F-35 network.
• Served as the Combat Shield Mission Defense Team Cyber Lead for Electronic Warfare Readiness Assessments conducted by 16 Electronic Warfare Squadron, Operating Location Alpha.
• Established and executed continuous monitoring testing and reporting in order to maintain compliance with NIST 800-53, CNSSI 1253, and JSIG on the F-35 network.
• Created Security Control Traceability Matrix verifying 406 security controls enabling a $100K Air Force Space Command Advanced Program network to be accredited utilizing RMF.
• Examined network configurations of 2 AP networks, scanned 38 systems and mitigated 228 vulnerabilities securing developmental and operational test and evaluation data from exploitation.
• Engineered A-10 security plan revamping and revitalizing the OT&E network enhancing the Secretary of Defense’s Combat Air Support maintenance and sortie strategy for 4th generation aircraft.
• Configured and implemented Windows Server Update Services across six networks.
• Stood-up and led 3-member Vulnerability and Compliance Management team securing local DT&E and OT&E networks.
2015 : 2020
United States Air Force
NCOIC, Advanced Programs, Information Systems Security Officer
• Provided International Security Assistance Force (ISAF) units system security guidance and training.
• Established a digital record tracking system improving the critical information file process required before working intelligence missions.
• Overhauled a 4,400 controlled media item Media Control Program within 8 media libraries; the program was identified as best practice for the Air Combat Command.
• Designed and implemented an account management program utilizing SharePoint to route forms for approvals and creation, identified as best practice and benchmarked for 480 ISRW units.
• Led 3-member Vulnerability Management team, performed 1K server audits monitoring system security events and conducted vulnerability scans protecting $3B global operation ISR weapon system.
• Orchestrated response to 28 classified message incidents/spillages, worked with Original Classification Authority to properly isolate/sanitize classified material protecting critical intelligence data.
• Oversaw TEMPEST/EMSEC program, conducted 18 facility inspections of 2K systems mitigating 184 Information Security/EMSEC violations.
• Network security representative for change request board; provided security insight for potential plans and updated network diagrams.
2011 : 2015
United States Air Force
Intelligence, Surveillance, Reconnaissance (ISR) Cybersecurity Technician
• Managed 6-member vulnerability management team responsible for the compliance of 5.1K Air Force Central Command (AFCENT) systems.
• Identified failed communications between local threat server and threat mitigation server in Texas, reconfigured server restoring cyber defense posture of AFCENT Area Of Responsibility (AOR)
• Troubleshot base-wide outage of shared drives, identified hung service restoring access to required mission data for 9K Army and Air Force personnel.
• Coordinated install and configuration of the AFCENT AOR’s first scalable vulnerability management suite with subject matter experts from Shaw Air Force Base.
2013 : 2014
United States Air Force
Network Control Center System Administrator
United States Air Force
ISSM/Section Chief, Wing Cybersecurity Office
- Leads regional provision center consisting of 9 member total force team in support of national level missions linking two combatant commands, Numbered Air Forces, and 16 msn partners with mobile operations.
- Serves in a nominative/selectively manned joint organization overseeing DISA data services within Headquarters, United States Central Command supporting Operation INHERENT RESOLVE and Operation ENDURING SENTINAL.
- Directs and monitors command cyberspace programs ensuring assessment & authorization packages are accomplished for command and control of 32 networks and 12 nodes.
- Conducts installation planning and manages the execution of Defense Information Systems Network services delivering actionable warfighting intel data across a $222M Department of Defense Information Network.
2020 : 2023
United States Air Force
Section Chief, Systems Support and Mobility
• Guided 5-member Information Security team implementing plans and providing cybersecurity guidance for 14 classified Developmental and Operational Test and Evaluation (DT&E and OT&E) networks.
• Upgraded F-35’s high speed network and tested analyst tool functionality enabling Developmental Test and Evaluation for 375 aircraft clearing the initial operational capability of the F-35A.
• Built, configured, and implemented ACAS vulnerability and compliance monitoring server and tools, providing the ability to verify security compliance with the JSIG for the F-35 network.
• Served as the Combat Shield Mission Defense Team Cyber Lead for Electronic Warfare Readiness Assessments conducted by 16 Electronic Warfare Squadron, Operating Location Alpha.
• Established and executed continuous monitoring testing and reporting in order to maintain compliance with NIST 800-53, CNSSI 1253, and JSIG on the F-35 network.
• Created Security Control Traceability Matrix verifying 406 security controls enabling a $100K Air Force Space Command Advanced Program network to be accredited utilizing RMF.
• Examined network configurations of 2 AP networks, scanned 38 systems and mitigated 228 vulnerabilities securing developmental and operational test and evaluation data from exploitation.
• Engineered A-10 security plan revamping and revitalizing the OT&E network enhancing the Secretary of Defense’s Combat Air Support maintenance and sortie strategy for 4th generation aircraft.
• Configured and implemented Windows Server Update Services across six networks.
• Stood-up and led 3-member Vulnerability and Compliance Management team securing local DT&E and OT&E networks.
2015 : 2020
United States Air Force
NCOIC, Advanced Programs, Information Systems Security Officer
• Provided International Security Assistance Force (ISAF) units system security guidance and training.
• Established a digital record tracking system improving the critical information file process required before working intelligence missions.
• Overhauled a 4,400 controlled media item Media Control Program within 8 media libraries; the program was identified as best practice for the Air Combat Command.
• Designed and implemented an account management program utilizing SharePoint to route forms for approvals and creation, identified as best practice and benchmarked for 480 ISRW units.
• Led 3-member Vulnerability Management team, performed 1K server audits monitoring system security events and conducted vulnerability scans protecting $3B global operation ISR weapon system.
• Orchestrated response to 28 classified message incidents/spillages, worked with Original Classification Authority to properly isolate/sanitize classified material protecting critical intelligence data.
• Oversaw TEMPEST/EMSEC program, conducted 18 facility inspections of 2K systems mitigating 184 Information Security/EMSEC violations.
• Network security representative for change request board; provided security insight for potential plans and updated network diagrams.
2011 : 2015
United States Air Force
Intelligence, Surveillance, Reconnaissance (ISR) Cybersecurity Technician
• Managed 6-member vulnerability management team responsible for the compliance of 5.1K Air Force Central Command (AFCENT) systems.
• Identified failed communications between local threat server and threat mitigation server in Texas, reconfigured server restoring cyber defense posture of AFCENT Area Of Responsibility (AOR)
• Troubleshot base-wide outage of shared drives, identified hung service restoring access to required mission data for 9K Army and Air Force personnel.
• Coordinated install and configuration of the AFCENT AOR’s first scalable vulnerability management suite with subject matter experts from Shaw Air Force Base.
2013 : 2014
United States Air Force
Network Control Center System Administrator
Company:
United States Air Force
About
SECURITY CLEARANCE: TS/SCI (DCID 1/14 Eligible) – 2016; CI Poly – 2019
Motivated cybersecurity professional with over 12 years of experience in enterprise level Department of Defense weapon systems. Innovative, dependable, mission focused with attention to detail. In-depth expertise in Risk Management Framework (RMF) Assessment and Authorization (A&A), NIST 800-53, Revision 4/CNSSI 1253/Joint SAP Implementation Guide (JSIG), vulnerability and patch management, Information Security compliance, Emission Security (EMSEC/TEMPEST), Communication Security (COMSEC), mobility (DoD Mobility Unclassified Capabilities [DMUC] and DoD Mobility Classified Capabilities - Secret [DMCC-S]) and Windows system administration.