Mark Evans
Details
Internet Enginering
Capitol Technology University
2016 : 2019
Bachelor's Degree
Computer and Information Systems Security/Information Assurance
Strayer University
2004 : 2007
• I represent DISA as a voting member at the Cross Domain Technical Advisor Board (CDTAB) reviewing risk ratings, system designs and identifying potential security flaws in cross domain solutions and presenting those concerns to the Defense Security Accreditation Working Group (DSAWG). I am a non-voting SME representing DISA JVAP to the DSAWG where I provide technical advice to the Chair and other members on matters presented for approval. I represented DISA FSO at the JIE/JRSS working group chaired by the JTSO where I provided guidance on operational and network security.
• Provide guidance and technical input to the usage of Cross Domain Solutions in point-to-point configurations as well as within an enterprise enclave.
• I participated in several high profile, complex security assessments, including the Public Key Infrastructure (PKI) for the DoD CIO CISO and review of the CX-I network in Afghanistan and other forward areas. I assist the DISA Red Team and Incident Response team on an ad-hoc basis filling gaps they may have for support.
• I was the lead for the Vulnerability scanning mission overseeing scans with commercially available network scanning tools such as Nessus, Retina, NMAP and Metasploit.
• I developed a self-contained traveling classroom capable of supporting fifteen students and a wide variety of technologies, including wireless, network hardware, server-based operating systems, and virtual domains.
• Participat in various Technical Assessment Groups where DoD changes are discussed and vetted through open forum discussions.
• I am knowledgeable of DOD or DoD-related programs, activities, and systems.
2010 : Present
Department of Defence
IT Cybersecurity Specialist (INFOSEC)
2010 :
United States Department of Defense
IT Cybersecurity Specialist (INFOSEC) GS-2210-14
• I was the lead analyst responsible for vulnerability scanning and testing methodology and vulnerability assessments of DOD networks and systems.
• I enhanced the overall security posture of the GIG through the development of technical and non-technical IA configuration requirements
• I evaluated, used, and maintained open source tools and techniques, as well as DOD sanctioned tools, to ensure security model is effective and up-to-date.
• I developed, implemented, and maintained a wireless discovery process and tool suite that assists security reviewers and users in securing wireless devices and finding rouge wireless devices on their networks.
• I developed training classes for Vulnerability Assessments and Wireless Discovery for DISA and DOD personnel. This consisted of designing training lab and scenarios, testing plans and student evaluation criteria so the student could be certified to perform those duties for DISA and DOD. I conducted the training classes on a scheduled and ad hoc basis with average class size of 12 students.
• I consistently provide diagnostic and analytical input to the highest level of the support triangle to solve IA and ADP processing issues for customers DOD wide.
• I used industry standard tools such as Wireshark, TCP-Dump, WinDump, NMAP and signature-based IDSs to interpret and perform packet analysis on DOD networks and from this analysis provide security strategies and mitigation techniques to overcome the vulnerabilities.
• I aided the war fighter by traveling to Iraq in support of Operation Iraqi Freedom under the leadership and direction of CENTCOM J6 to perform Wireless discovery and Wireless security evaluation of critical Forward Operating Bases wireless systems. The systems found on the five FOBS were evaluated for compliance and the IAM was assisted in securing systems to meet DOD guidelines. I authored the TTPs which became the baseline for the six five-man teams conducting reviews throughout the AOR.
2001 : 2010
Northrop Grumman Corporation
Senior Computer Security Engineer
• As the network manager successfully managed a staff of six IT professionals, responsible for all staff administrative functions, including compensation, evaluations, hiring new personnel and staff restructuring. Ensured all their needs both professionally and personally were balanced with work requirements.
• I established the yearly IT budget, cutting costs by 13% while increasing employee efficiency by instituting better utilizing system automation. I developed and instituted migration plans for numerous systems and new software platforms, including Oracle, Exchange Mail, and DSS.
• I led a team that advanced the corporate IT infrastructure from less reliable and less efficient protocols to the TCP/IP protocol. I developed and implemented a successful Y2K test plan and rollover strategy that resulted in zero operational down time. I performed administration of routers and network components and Windows Workstations and Servers in domain/enterprise configurations.
• I designed and implemented a secure and robust private network that was instrumental in the successful completion of FCC frequency auctions, providing 24x7 reporting of transactions, bid mapping reports with zero down time and no non-bid rounds.
• As security manager, I reported directly to the CIO on all IT security matters. I wrote Internet usage policies, security guidelines for the entire corporation enforcing the policies with legal staff when necessary. I implemented and administered these guidelines with technologically advanced tools requiring minimal user intervention.
• I successfully defended against multiple virus attacks, including Melissa and ILOVEYOU by proactively instituting protection measures. I reduced unauthorized web browsing which decreased the company liability and increased available bandwidth usage. I was active in the tracing and stopping of hacking attempts that could have compromised corporate assets working with law enforcement officials at the state and federal levels.
1998 : 2000
Omnipoint Wireless
Coportate Network Manager / Corporate Security Manager
• As a communications engineer I provided network and communications engineering support to various DOD hospitals and EDS internal groups spanning from physical installation to high level conceptual support. Installed Cat 5 certified LANs, including single-mode and multi-mode FOC using various termination methods and topologies, all within EIA-568/569 TSB-36/40A standards.
• Preformed engineering site surveys and cost estimates, router configuration and installation, network performance and sizing consultations.
• Installed, configured and maintained Cabletron, 3COM, Cisco and Synoptics LAN communication equipment.
• Assigned as a communications engineer to the Defense Information Systems Agency, I was responsible for the development of security policies and implementation of technical solutions for those policies. These solutions required writing security technical implementation guides (STIGS) for UNIX, Windows and IP-based Network technologies. I authored the first DISA FSO Network Security Guide.
• Performed security and readiness reviews of customer networks while assisting personnel in risk assessment, operational posture and vulnerability exposure mitigation. Performed vulnerability assessments and tiger team penetration scenarios using commercial and in-house developed tools. Provided recommendations as to how the site could overcome deficiencies and comply with communications and security standards.
• Developed and deployed Axent OmniGuard/ITA and ESM Security policies. Evaluated and configured ISS RealSecure Intrusion Detection Systems. Designed and implemented router-based access control lists, firewall policies, security administration policies and network intrusion detection schemes for customers.
1994 : 1998
Electronic Data Systems
Advanced Communications Engineer
Skills
CISSP, Computer Forensics, Computer Security, Cyber-security, Ethical Hacking, Information Assurance, Information Security, Information Security Management, Network Administration, Networking, Network Security, Perimeter Protection, Security, Security Clearance, Vulnerability Assessment
About
Talented and energetic with over 35 years of computer, communications, networking and cybersecurity experience. I am passionate about cybersecurity and the stakeholders relying on it - The Warfighter. With specialized experience in cyber defense and operations, Cross Domain Solutions, program management and oversight, I have a proven track record and unique skill sets that translate across many IT boundaries, including program development, network design, cryptography, and operating system controls. I am results oriented and not a yes man glossing over the real issues. My technical writing allows all audiences to come together with a common understanding of the critical issues and permits swiftly rendered decisions. I have led educational and training efforts, creating hands-on teaching of various DoD level courses to civilians and military personnel helping the next generation of IT specialists learn from our mistakes. Cybersecurity - more than a job; it is a way of life.