
Timeline
About me
Mgr, Cyber Architecture at Raytheon
Education

Csula
-Bachelor of science (bs) fp technology
El camino college
-Associate of science (a.s.)
University of san diego
2019 - 2021Master of science - ms cyber security operations and leadership a
Experience

Us navy reserves
Jun 1999 - now1825USNR IP Officer (1825)Prior Service/Active Duty EM 1999-03 | SELRES 2004 - CurrentAssignments: C3F | CPF | NAVWAR | MSRON | USS Juneau LPD-10 7th Fleet

Raytheon
Apr 2013 - Dec 2019Investigates anomalous network activity, and responds to cyber incidents within the network environment or enclave. Collects data from a variety of tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment. Provides persistent monitoring of all designated networks, enclaves, and systems. Interprets, analyzes, and reports all events and anomalies in compliance with company policy and external regulations. Continuously works to tune security tools to minimize false positives and maximize detection and prevention effectiveness. Collaborates with the owners of cyber defense tools to tune systems for optimum performance. Analyzes malware and attacker tactics to improve network detection capabilities. Collaborates with external companies or government agencies to share open source or classified intelligence. Distributes vulnerability and threat advisories to identified consumers and may set mandatory remediation timelines. Show less Responsible for creating Security Authorization (Formerly C&A) packages and perform Annual assessments, re-authorizations to include vulnerability scanning, interviews and system testing. Working with a variety of stakeholders, including System Owners, implementation engineers, System Admins, Networking teams and the organizational security team to develop deliverables, recommend security solutions, and maintain the existing Authority to Operate (ATO).*CompTIA Security +, Splunk PowerUser, Splunk Admin* Support the analysis and review of information security programs and systems to ensure compliance to Federal security policies.* Independently develop a variety of Security Authorization deliverables including: System Security Plans, Risk Assessment Reports, Privacy Impact Assessments, Annual Assessments, POAMs etc.* Analyze existing processes and procedures to determine areas of possible improvement that will lead to gains in efficiency and security.* Provide guidance on security threats, technology, standards, and practices.* Develop and review organizational security policies.* Preparing and analyzing test results to develop into a POA&M for engineering review.* Interface with the Information Systems Security Manager, Program Engineering staff and Classified Lab Managers to ensure adherence to all NISPOM Chapter 8 policies* Hands on Splunk dashboard and panel development, data inputs, field generation and operation experience including non-windows systems. Show less
Sr Cyber Threat Ops Technologist II
Dec 2017 - Dec 2019Manager, Information Systems Security Team Lead
Feb 2017 - Dec 2017Senior ISSO
Nov 2015 - Feb 2017Information System Security Officer
Apr 2013 - Nov 2015

Raytheon technologies
Jan 2020 - Jun 2021Principal cyber designDesigns system security environments for enterprise, enclaves or the enterprise to include requirements definition, risk assessment, systems analysis and design, security test and evaluation plans, systems hardening, and business continuity planning. Provides analytical support for security policy development. Ensures stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed and documented in reference models, segment and solution architectures, and the resulting systems. Designs and evaluates enterprise information system security throughout the systems development life cycle. Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of cyber security features and relates existing system to future needs and consults on integration and testing issues. May liaise with appropriate internal and external governance bodies or regulators to evaluate cybersecurity risks and vulnerabilities in the context of new or unique security architectures. Develops solutions with but not limited to: Splunk, Tenable/Nessus, SEP, AD, Centrify, Ivanti, Innerview/Forcepoint. Experience with PowerShell, Bash. Dislikes: YAML. Any system that starts with "legacy". Show less

Raytheon
Jun 2021 - nowMgr, cyber architecture<([^\/][^>]+)>(.*?)<\/[^>]+>dt="2021-02-08">selected</dco:status> <cd:title>CyberArchitecture</cd:title> <cd:description>Security configuration, automation and SIEM</cd:description> <cd:buzzwords="splunk,vmware,STIGs,Tenable/ACAS,8570"></cd:buzzwords>
Licenses & Certifications

Vmware certified associate 6 – data center virtualization
VmwareJul 2017
Comptia security +
ComptiaJun 2014
Splunk certified admin
SplunkFeb 2017
Splunk certified power user
SplunkFeb 2017
Recommendations

Panagiota martina tschiderer
Store Manager at Lidl HellasGreece
Barlas armatlı
Civil Engineer MBASarıyer, Istanbul, Türkiye
Shannon bean
Professional Assistant at DeloitteGreater Sydney Area
Jack stanbury
Senior Project Manager for a large UKRI funded research project within Financial Services and FinTec...Bristol, England, United Kingdom
Laís araújo
Operações, Pessoas e CulturaSão Paulo, São Paulo, Brasil
Sharon fernanda martínez aranda
Product Graphic AnalystMonterrey, Nuevo León, Mexico
Nathan unsworth
Solution Architect at Toyota Financial ServicesMcKinney, Texas, United States
Morteza eradi
Adwords manager @ Gold Fintech LLC | Google Ads AI expertDubai, United Arab Emirates
Klevis sotaj
💌 Seeking e-commerce success through email brilliance? Look no further! | Founder, Pegasus Marketin...Italy
Alisa pyszka
Executive Director of the Center for Real EstatePortland, Oregon Metropolitan Area
...