Cyber Operations Specialist

  • I played a key role in integrating three new Watch Officers into the Orion Ops floor mission, strengthening the DISA-ARE CSD 4 watch officer team and enhancing operational effectiveness.
  • I actively contributed to the creation of a CSD 4 Watch Officer continuity book, ensuring the continuity and ongoing success of this critical DISA mission.
  • I expanded the Watch Officer mission to encompass the Cyber Security Watch Officer and Joint Regional Security Stack cells, streamlining operations and reducing overlapping missions.
  • Through my expertise, I provided valuable advice to leadership on various IT practices, facilitating the adoption of alternative approaches for complex application systems.
  • I successfully resolved critical problems related to database management systems within the organization, resulting in the accreditation of 12 DISA circuits and ensuring their secure and efficient operation.
  • I diligently updated circuit cards, ensuring the ability of JSOC’s Special Operations Forces to effectively communicate in a degraded environment.
  • I played a vital role in the success of the NETOPS mission, contributing to the smooth functioning of critical network operations.
  • My exceptional resourcefulness was instrumental in the success of the Cyber Forward exercise, demonstrating adaptability and innovative thinking.
  • I continuously monitored JSOC’s communications within and outside the organization, validating capabilities and earning accreditation while ensuring secure and reliable communication channels.
  • I certified and accredited JSOC’s three critical Command and Control (C2) networks, which support over 2,000 applications, restoring critical operational capabilities.
  • I addressed a finding from the 2014 USSOCOM Inspector General inspection, ensuring sustained communications and meeting required standards.
  • I exceeded standards while participating in the first Digital Forensics Challenge, showcasing my exceptional skills in the field.
  • I provided technical oversight and guidance in establishing an Information System Security Officer (ISSO) program, ensuring robust cybersecurity practices within the organization.
  • Through the ISSO program I established, I produced 55 fully qualified and capable Cyber Security professionals, enhancing the organization’s cybersecurity capabilities.
  • I administered and implemented communication, infrastructure, and mission-critical solutions supporting combat missions, contributing to the success of the Kodiak Cyber Operations Team (KCOT).
  • By running patches for CPU systems, I enabled the G6 section to increase the number of patches run, resulting in reduced downtime to under 0.5% and achieving a readiness rate of over 99.5%.
  • I efficiently troubleshot and isolated join attempts to an anonymous proxy server in Spain, ensuring the continuous and secure operability of the U.S. Southern Command telephone network.
  • I demonstrated quick and appropriate responses to cybersecurity-related issues, earning a sterling reputation within the Command as an effective force in safeguarding critical assets.
  • I successfully configured and upgraded over 100 General Dynamic Sectera vIPer secure phones, enhancing secure communication capabilities.
  • I provided support to Special Operations Command and the United States Drug Enforcement Agency in Jalalabad, Afghanistan, contributing to their mission success.
  • Through my influence and recommendations at the highest level, I facilitated security changes that improved warfare intelligence and cyber security.
  • I installed 26 workstations and 7 VOIP phones, expanding communications capabilities to critical assets in the field.
  • I conducted the necessary groundwork to establish a new COMSEC account, ensuring secure communications for the organization.
  • I provided instruction to personnel on secure communication practices worldwide, enhancing overall cybersecurity awareness.
  • I participated in the initial setup of JSOC’s Cybersecurity capability, securely integrating a wide range of disparate technologies to establish a robust cybersecurity framework.
  • I delivered briefings to joint attendees during Live Environment Training for ARCYBER at Fort Belvoir, sharing valuable insights and knowledge in the field of cybersecurity.

DoD consultant

  • As a DoD consultant, I participated in the initial setup of JSOC’s Cybersecurity capability, providing expertise in securely integrating a broad range of disparate technologies.
Share this article
Shareable URL
Prev Post


Next Post


Read next