2007 – May 2014
Coordinated and executed Information Security and certification activities for Windows based and other equipment types. Ran security scans with Retina and other utilities, analyzed results, and managed and implemented vulnerability remediation for IE, Office, Java, PHP, Apache, Adobe and McAfee applications. Documented findings, performed Microsoft STIG research, wrote database configuration guides, wrote detailed technical procedures, and managed master security plan document. Achieved multiple certifications authorizing global deployment. Developed and documented scan processes and procedures.
Built and tested security update installation and system image disks for multiple Windows operating systems. Wrote installation scripts using VBScript, NullSoft and DOS to install applications and patch updates, and to configure security policies. Built bootable installation images using Symantec Ghost and Nero. Developed test strategies and procedures and tested update and image disks. Wrote build operating instructions and installation procedures and conducted formal code and documentation peer reviews. Connected and configured Cisco Call Managers and routers and other network equipment.
Authored proposals – generated story boards, wrote content, answered technical exercises, and performed demonstrations.
1988 – 2007
Led a team of six engineers in developing software for mission critical defense systems that provide tactical telephony switching products to the United States Army and other domestic and foreign military branches. Led group and wrote code fielding multiple software versions running on several hardware platforms. Assigned tasks and responsibilities, provided direction, mentored and reviewed.
Performed general software debug of OS, operator interface and call processing functions. Implemented area code expansion allowing the utilization of a full range of area codes. Developed a subscriber recovery function enabling users to be restored to a previous state. Recompiled, assembled, re-linked major releases. Modified call routing to provide better capability to control access to vital installations via authorization lists. Modified dialing processing to enable users to dial new string types. Implemented a caller identification function which allowed network managers to better monitor network abuse.
Lead software engineer for software versions used in Operations Desert Storm, Iraqi Freedom and Enduring Freedom. Provided on-site field support to multiple military bases: Forts Bragg, Hood, MacDill, Bliss and Huachuca including on-site data collection and problem resolution.