Derek A. Smith



0-283335Derek A. Smith, CISSPDsmith8952@ (301)744-735500Derek A. Smith, CISSPDsmith8952@ (301)744-7355A senior level Cyber Security executive with proven ability to combine broad-based technology, security and business expertise. Go to cyber expert for International and Local News ShowsProfessional ExperienceDirector of Cybersecurity Initiatives National Cybersecurity Institute at Excelsior CollegeSeptember 2014 - PresentPerform complex duties relating to the development and coordination of cyber security initiatives at the National Cybersecurity Institute. Develop strategies to promote the NCI as an academic and research center dedicated to increasing knowledge in the cyber security discipline and to assist the government, military, and industry sectors meet the challenges in cyber security policy, technology and education. Promote Excelsior College and NCI as a leader in the cyber security discipline and enhance the visibility of Excelsior College’s cyber security programs. Lead a team; meet budget requirements and deadlines, marketing, social media, and computer applications, as well as problem solving and decision making. Established and manages a “for profit” business within NCI to perform cybersecurity assessments and training.Proactively promote and position NCI and Excelsior College as a thought leader in the cyber security discipline. Proactively cultivate and foster relationships with government agencies and industry to promote Excelsior College and NCI as a leader in cyber security. Design and implement academic and research initiatives to increase knowledge in the cyber security discipline. Travel as needed to promote the cyber security programs. Establish effective works plans to accomplish goals and manage workflow efficiently. Solicit/obtain grant funding for individual or collaborative cyber security research/ projects. Collaborate to develop webinars, podcasts and other media. Collaborate to develop white papers and other publications and professional research. Proactively promote and market NCI and Excelsior College to enhance the visibility of Excelsior’s cyber security programsDirector of Cyber Initiatives/Program Manager Enlightened, Inc.September 2013 – September 2014Director of Cyber Initiatives at Enlightened, Inc. an award-winning, HUBZone certified, Information Technology (IT) and Management Consulting firm. Responsible for strategic and operational leadership that established, supported and continuously improved cyber information strategies. Led the development and operations of Enlightened's Cyber Security division. Project Manager for multimillion dollar cybersecurity contract with the U.S. Department of Health and Human Services, Centers for Medicare & Medicaid Services.Global Manager, Cybersecurity Education, Training and Awareness Computer Sciences CorporationCybersecurity Architect/Project Manager June 2012 – September 2013Developed and managed the Cybersecurity Education, Training and Awareness practice.Collaborated with clients to develop and refine information security strategies, roadmaps, and change agendas that reflect information security “best practices.”Provided technical oversight for specified projects, and across multiple projects, to ensure that technologies within the information security capability are properly leveraged.Cyber Security Project ManagerBooz Allen HamiltonJuly 2010 – June 2012Senior Project Manager for eight information security projects and programs totaling $18 million for the Enterprise Information Security (EIS) team, which secures the Booz Allen Infrastructure. Coordinated multiple related projects directed toward IT security initiatives.Led several small teams as a Career Manager include a Security Awareness Team, responsible for security and awareness training and communications for the firm, Strategy and Metrics Team, responsible for developing, and reporting performance metrics for the 15 EIS teams, and Personnel for EIS, responsible for managing 60 rotational personnel for the 15 teams within EIS. Information Assurance Team Manager Army Research Laboratory April 2009 – June 2010Government lead for two separate Computer Network Defense Service Provider (CNDSP) Protect Teams. Directed eight contractor personnel in support of, as well as coordination amongst, the various CNDSP elements for Protect Services.Managed various projects relating to computer network defense.Managed a team of security analysts who did analysis and management of incident response data from a variety of sources. Determined work requirements, priorities, and maximized the effectiveness of analysts through efficient scheduling and effective deployment of technology.Directed, guided, and oversaw the activities of the CSIRT analysts. Assured a high quality of work products, client communication, and incident response reporting. Created and monitored team member performance goals, training plans, and organizational metrics.Provided oversight to incident response activities (triage, root cause analysis, escalations, notifications, communication, etc.). Determined the severity level of incidents, acted as a conduit for escalation to the Senior Executive Team, and assured accordance with regulatory requirements.Sr. Security Engineer/Information Security Manager InFozenFebruary 2008 – April 2009Information Security Engineer for the Transportation Security Administration’s (TSAO), Transportation Threat Assessment and Credentialing (TTAC) Secure Flight program. Information Security Officer for TSA’s TTAC Secure Flight Program. Monitored, tracked, and managed FISMA compliance for the Secure Flight Program.Performed all actions associated with proper Information Assurance and security Certification and Accreditation of information technologies for TSA’s Secure Flight program. Conducted C&A-related enterprise network vulnerability scans using mandated tools (Nessus) Provided 24 X 7 Internet Security Surveillance as the SOC manager.Planned and prepared detail practices and procedures on various technical security processes.Designed and configured network security and enterprise network monitoring. Identified and tested vulnerabilities as well as conducted research in areas of information system and network security. Analyzed security incidents. Federal Government: April 1997 – February 2008GS14 Criminal investigator/Program ManagerDepartment of Education Office of the Inspector General United States Postal Service Office of Inspector GeneralDepartment of the Treasury, Office of the Inspector GeneralDevised and executed strategies and managed programs, projects, budgets, and teams for assigned criminal investigative regions and Investigative Services Headquarters. Oversaw the planning and operation of field investigations activities across 5 regionsProvided technical direction/managerial leadership to 100+ employees. Performed a variety of criminal investigative and analytical assignments to include: Analyzed initial allegations and recommended the extent of required investigative resources and the necessity for collateral support; planned, organized and conducted investigations with regard to a wide variety of allegations; planned and conducted surveillance and undercover work. National Training Director for Protective ServicesDefense Intelligence AgencyAs the first DIA National Training Director built and deployed certification program and validation protocol for Protective Services officers in order to ensure team members received and maintained adequate training to perform their duties.Directed all activities related to national training and certification program for the Protective Services Branch.Acting Deputy Chief for the Protective Services Branch.Supervised 57 Protective Services officers USAF/Air Force Office of Special Investigations Criminal Investigator/Academy InstructorJuly 1983 – April 1997As a Criminal Investigator, investigated felony crimes including murder, robbery, rape, assault, major burglaries, drug use and trafficking, sex offenses, arson, black market activities, and other criminal activities. Violations of the public trust, appropriated and non-appropriated funds activities, computer systems, pay and allowance matters, environmental matters, acquiring and disposing of government property, employee misconduct, and other major administrative irregularities.Instructor at the Air Force Office of Special Investigations Special Investigations academyTraining ExperienceTraining ExperienceExcelsior College, Adjunct Professor, 2014- Present)Certified ISC(2) Instructor – 2014-Present)ASM Educational Center, Inc., Technical Instructor (2011-Present) Nyack College, Adjunct Instructor (2005-2009) Strayer University, Adjunct Instructor (2000-2011)Southern New Hampshire University, Adjunct Instructor (2001-2008)USDA Graduate School, Adjunct Instructor (1997-2005)Education and Publications Doctor of Business Administration in Leadership– Doctoral CandidateWalden University – Baltimore, MDDoctor of Education in Organizational Leadership – (ABD)Nova Southeastern University - Fort Lauderdale, FLMaster of Business Administration University of Phoenix - Las Vegas, NVMaster of Information Technology in Information AssuranceUniversity of Maryland, University College - College Park, MDMaster of Science in IT Project ManagementAmerican InterContinental University - Schaumburg, ILBachelor of Science in EducationUniversity of Nevada - Las Vegas, NVAssociate of Science in Criminal JusticeCommunity College of the Air Force - Maxwell AFB, ALAssociate of Science in Information SystemsCommunity College of the Air Force - Maxwell AFB, ALAssociate of Science in Computing & Information TechnologyClark County Community College - Las Vegas, NVCertificate in Information Security Specialist Certification ProgramUSDA Graduate School - Washington, DCPUBLICATIONSBook: Cybersense: The Leaders Guide to Protecting Critical InformationBook Chapter: Cyber Security in our Digital Lives “Cybersecurity and Insider Threat”BOARDSBoard member on the Prince George’s Community College Computing and Information Technology Institute (CITI) – Chairman of the Cyber CommitteeCertifications & MilitaryCertificationsCertified Chief Information Security Officer (C/CISO)Certified Information System Security Professional (CISSP)Certified EC-Council Instructor (CEI)Certified Ethical Hacker (CEH)Certified Hacking Forensic Investigator (CHFI)Certified Authorization Professional (CAP)Certified Computer Network Defense Architect (CNDA)Certified SCADA Security Architect (CSSA)Security +IT Project+MilitaryArmy National Guard, Military Intelligence and Criminal Investigations Command Criminal Investigator (1998-2003)U.S. Air Force – Flight Operations Specialist & Air Force Office of Special Investigations Criminal Investigator (1983-1997); US Naval Reserve, Heavy Equipment Mechanic, Seabees (1981-1983)Experience key words: Cyber Security, Healthcare Cybersecurity, Cyber Forensics, Penetration Testing, Program and Project Management, SCRUM, Lean Six Sigma, Leadership, Education and Training, Industrial Control System Security, Business Analysis, LINUX, UNIX, ITIL, MS SQL Server 2014, MySQL, CISCO, VMWARE, Cloud Computing and Security, Mobile Device Security, CISO ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download