

Defensive Cyber Operations DCO
Defensive Security refers to protecting computer systems and networks from attack by identifying and mitigating vulnerabilities and implementing measures to prevent or detect unauthorized access or activity.

STIGs and SRG
Security Technical Implementation Guides are configurations standards developed by the Defense Information Systems Agency (DISA). They are designed to make device hardware and software as secure as possible.

Experienced SysAdmin
My experience as a System Administrator has allowed me to develop strong problem solving skills and knowledge of software and hardware.

Risk Management Framework, A&A, and ATO
The Risk Management Framework, presented in NIST SP 800-37, Provides a disciplined and structured process 6 step process that integrates information security and risk management activities into the system development life cycle.
The A&A process establishes the extent to which a particular design and implementation, meet a set of specified security requirements defined by the organization.
ATO is the official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk

ACAS and Nessus
Assured Compliance Assessment Solution (ACAS) vulnerability scanning is the mandated enterprise vulnerability scanning capability for network and components that are owned or operated by the DoD.
Nessus is a remote security scanning tool, which scans computer and identifies vulnerabilities by scanning the system registry, files, ports, missing patches, misconfigurations, and software flaws.

Cyber Threat Intelligence (CTI)
Cyber Threat Intelligence (CTI) helps organizations stay informed about new threats so that they can protect themselves. Cyber security experts organize, analyze, and refine the information they gather about attacks to learn from and use it to protect businesses better.













The journey is never ending. There’s always gonna be growth, improvement, adversity; you just gotta take it all in and do what’s right, continue to grow, continue to live in the moment. Strength and growth come only through continuous effort and struggle.
ANTONIO BROWN
I have continuously challenged myself to learn, grow, and over come challenges.
I am seeking to join a group of innovative Cyber Security professionals who share my passion.
Get In Touch
- Message me through Linkedin
- Click here to connect me
Location
San Diego, California