Will Knehr, MS, MBA, CISSP, PMP
Details
Information Assurance and Cybersecurity
Florida Institute of Technology
2014 : 2016
Master of Business Administration - MBA
IT Management
Western Governors University
2017 : 2019
Bachelor of Science - BS
Information Technology with Security Concentration
Western Governors University
2011 : 2014
Doctor of Business Administration Information Systems
Indiana Wesleyan University
2025
- Develop, implement, and operate a comprehensive cyber defense program including incident response, network and device hardening, employee training, security policy updates, asset management, and endpoint detection and response.
- Determine applicable laws and standards, requirements and industry best practices for information security controls, cybersecurity, data privacy, cloud services, and other legal or compliance-related topics relevant in the video surveillance business at the federal, state, municipal levels, as well as within private industry (CMMC, FedRAMP, PCI/DSS, HIPAA, CJIS, NIST, GDPR).
- Develop strategies and actions to help i-PRO meet future needs.
- Consult on product development to ensure products meet market security demands.
- Present analysis and recommendations to i-Pro executive leadership and other stakeholders, develop and track Key Performance Indicators (KPI) that both forecast and measure progress and success of the plan, hire and manage necessary personnel and contractors to achieve plan, and develop and manage financial budgets related to implementing and sustaining the plan.
2021 : Present
i-PRO Americas Inc.
Senior Manager of Information Security and Data Privacy
Well versed in all facets of Information Operations (IO), including Cyber Defense, Cyber Protection, traditional Cryptology, Command and Control, Computer Network Operations and Space Systems. Create warfighting options for Fleet Commanders to fight and win in the information age. Deliver and operate reliable, secure and battle-ready global networks, and lead in development and integration of IO capabilities in the Fleet. Specialize in Defensive Cyber Operations (DCO) leading multiple Cyber Protect Teams (CPTs).
2019 :
U.S. Navy Reserve
Cryptologic Warfare Officer
- Cyber Security Professor at Loyola University, American University, Kansas State, Univeristy of Buffalo, University of Central Florida, and Wisconson University.
– Educate students in a variety of topics including : cyber security research, Windows, Linux, network attacks, countermeasures and defense, cyber attack cycle, DNS, Active Directory, PowerShell, IOS, network security, BASH, analysis, SIEM, cryptography, game theory, forensics, incident response, and wide range of attacks.
2020 : 2023
ThriveDX (formerly HackerU)
Cyber Security Professor
- Teaches graduate and undergraduate students about Advanced Security Practices (CASP) in enterprise security, risk management and response, research and analysis, integration of computing, communications, and business disciplines, and technical integration of enterprise components.
- Topics cover hashing, encryption, clouds, storage management, host hardening, BYOD, industrial control systems, virtual environments, web security, risk management, forensics, change management, protocols, and so much more.
2017 : 2023
Pensacola State College
Cyber Security Adjunct Professor
- Managed Cybersecurity Operations Center (CSOC/SOC) Analysts supporting large-scale DISA, NSA, and DoD networks utilizing a multitude of tools such as Splunk, ACAS (Tenable Nessus, Security Center, Nessus Scanners), HBSS, SiLK, SourceFire Intrusion Detection System (IDS), Firepower Management Center (FMC), and various packet capture systems.
- Monitored and analyzed alerts/data from SIEM, End Point protection, IDS/IPS, logs, and network devices or hosts to watch for security violations and determine vulnerabilities.
- Conducted initial triage of security events and incidents and facilitating communication within the SOC and/or to IT , generate and submit security incident tickets and reports, and communicate with executive management.
- Recognized potential, successful, and unsuccessful intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information
- Developed and maintained a first responder’s guide for incident response and SOP for SOC operations, policies, and procedures.
- Provided analysis, design, development, implementation, and security assessments to ensure compliance with the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, STIG, SCAP, and DoD Risk Management Framework (RMF) Knowledge Service guidance.
- Provided remote access solutions for users and virtual sandbox solutions for malware analysis. Works with vCenter, vSphere, VMware ESXi, vSAN, VMware Horizon, and Citrix.
-Oversaw the development and maintenance of a Data Monitoring Portal. Monitor Joint Data Tagging and Transport System (JDTTS) data brokering service. Develop and maintain a Data Brokering Service Design Plan. Apache Kafka, NiFi, Flare, and custom data pipeline and processing expertise. Data tagging, metadata and schema design, and management. Data enrichment development and processing using CI/CD and DevSecOps approach. Familiarity with CSG Intermediate / Data Orchestrator, SOAP, REST
2017 : 2021
Northrop Grumman
Information Security Manager / Access Solutions Lead / Data Brokering
Skills
Command, DoD, Information Assurance, Leadership, Microsoft Office, Military, Military Operations, Navy, Operational Planning, Program Management, Public Speaking, Security Clearance, Training, U.S. Department of Defense, Active TS/SCI Clearance
About
Cyber Security Expert with strong technical skills, governance experience (CMMC, NIST, RMF, ISO, HIPAA, PCI, and SOC), project management, leadership, and a firm understanding of business operations. Works well with all facets of IT/Cyber support including project management, cyber defense, large data collection, analysis, instruction, troubleshooting, installations, and maintenance. In-depth knowledge and understanding of numerous software packages and operating systems. Master Training Specialist. Experienced with Windows, Linux, Analysis Tools, and SIEM.