• No results found

Emanuel Payton

N/A
N/A
Protected

Academic year: 2021

Share "Emanuel Payton"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

1438 Jonquil Street, NW 202-291-4372 - Home Washington, DC 20012 202-423-4902 - Cell

Emanuel Payton

Epayton403@msn.com

1 ACCOMPLISHMENT SUMMARY

Senior Information Technology professional with over twenty years of progressively engaging experience supported by a technical master of science degree in information security management. Exceptional professional with experience in Enterprise Architecture, Business Continuity, Information Security, Disaster Recovery, and Information Assurance skills in support of computer networks and information technology security, to include all aspects of certification and

accreditation of multiple platforms in and out of the intelligence community. Maintain active Department of Defense, Top Secret/SCI (CI-Poly) clearance.

DISASTER RECOVERY

 Developed disaster recovery policies, standards, guidelines, training programs and related quality assurance processes using knowledge of business processes, management structures, and technology programs/platforms.  Provided guidance and training to COOP Planners and Enablers on the use and utility of Living Disaster

Recovery Planning System (LDRPS) application

 Worked with open-systems application and infrastructure teams to coordinate Disaster Recovery (DR) tests on UNIX and Windows server environments. Identified and engaged ITO teams in DR and Business Continuity (BC) planning functions. Provided awareness training input for benefit of BC and DR teams to enhance the level of reaction during an actual crisis.

 Steered IT teams in DR testing resources hosted in the Dearborn datacenters. Coordinated equipment and resource requirements for DR tests. Facilitate the failover and failback testing of high-end infrastructure and applications. Participated in planned data center failover testing events. Helped report metrics on BC/DR compliancy to ITO management. Assisted in driving Business Continuity concepts across IT.

 Senior Disaster Recovery Planner for Defense Intelligence Agency responsible for Business Continuity

Management (BCM) program, which included both business continuity planning and disaster recovery planning for a client with a world-wide footprint. This required a unique approach that involved training, notification, crisis management, resumption, and etc. efforts.

 Provided disaster recovery planning and IT contingency planning to the CIO for the GAO’s Information Systems and Technology Services Division. Supplied the leadership for the relocation of the backup site to a more secure location.

BUSINESS CONTINUITY

 Provided insight for clients regarding Business Continuity Planning for their organization to include COOP development, identification of critical assets and personnel, testing of current COOP documents, updates to documentation as necessary.

 Provided Business Continuity and Mission Assurance (MA) services. Maintain a level of engagement with upper management regarding COOP planning for the possible Pandemic crisis. Supported efforts to increase the level of training in the area of awareness for the entire agency.

 Facilitated the creation of Continuity of Operations Plans (COOP) guiding the implementation of and adherence to MA and COOP policies, standards, and regulations

 Provided insight for clients regarding Business Continuity Planning for the organization to include COOP development, identification of critical assets and personnel, testing of current COOP documents, updates to documentation as necessary.

 Provided Continuity of Operations (COOP) management consulting to the Enterprise Architecture team as an independent contractor.

 Evaluated level of preparedness of the organization for COOP events at VA Headquarters and Chinatown locations.

(2)

Emanuel Payton

INFORMATION ASSURANCE

 Provided support to the Air National Guard (ANG) customers, by insuring the confidentiality, integrity, and availability of systems, networks, and data. Ensured that ANG customers are in compliance with policies, directives, instructions, and guidance prescribed by Congress, DOD, Air Force ANG, and Office of Management Budget (OMB). Demonstrated a systematic understanding of the following core competencies: IT concepts, principles, methods, and practices.

 Supported the mission and programs of ANG customer organizations to include Enterprise Architecture

framework; IT Information Assurance principles and methods; IT requirement analysis principles and methods; COTS/GOTS products and components; Enterprise Information Technology Data Repository (EITDR)

compliance; New and emerging information technologies and/or industry trends; Acquisition management

policies and methods; Analytical methods and practices; Program Management principals and methods; using oral and written communication techniques.

 Explained, advocated and expressed facts and ideas (both orally and in writing) in a convincing manner to a diverse group of contractor engineers, including multiple disciplines, Systems Architecture, & Protocol Architecture to include CISCO, Microsoft, Blackberry, IBM, etc. Provided daily technology reports to the Director of Technology to develop and implement the organizational vision by integrating strategic goals, priorities, and values of the DNCC.

 Scheduled volunteers and interns. Maintained Vendor accountability. Provided customer service to all staff. Negotiated with individuals and groups both internally and externally when needed. Maintained general administrative and technical oversight. Supported direction of functional departments for Overall Architecture, Protocol Architecture, Physical Layer Architecture and RF Systems. Defined overall IT security functions and performance requirements, as well as high-level Security design requirements.

 Conducted computer security evaluations and developed computer security plans. Interfaced with clients to conduct requirement analyses, reviewed system security plans developed client questionnaires to gather information and dispel misinformation.

 Conducted site visits to determine security enhancements or improvements and then briefed clients about recommendations for improving computer security. Examined ways to secure computer software (encrypting).

 Analyzed client installed software security measures. Ensured user adherence to sound security practices. Confirmed that client built-in security procedures were in place and properly configured.

 Conducted evaluations to ascertain whether software security was sufficient to protect sensitive client

information. Performed risk assessments examining the client’s physical environment to assess client-identified vulnerabilities. Interviewed client technical staffs to assess system vulnerabilities and to identify possible threats to the system integrity or data.

 Disseminated Navy computer security requirements information to NSWC personnel; conducted quarterly meetings; showed educational films; booked experts in computer security to present seminars on password maintenance, encrypting, and determining what constituted a security vulnerability, threat, etc.

 Provided technical direction and guidance to laboratory and field personnel in the areas of computer security research, design, and implementation and testing. Supported design, code requirements; and verification analyses and testing of software security packages developed by outside contractors and other agencies.

 Conducted pre-acquisition software evaluations; installed and tested software upgrades on large-scale machines and microprocessors; assisted in customizing control and computational software; and advised users, managers and contractors on information security technical issues.

INFORMATION SECURITY

 Provided support to Federal Bureau of Investigation’s systems for FISMA compliance and System Security Planning for more than 80 systems and act as point of contact for Certification & Accreditation packets.

(3)

Emanuel Payton

Page 3 of 5

 Supported table topic exercises for each of these systems as scheduled. Graduated from the FBI’s Academy training for ISSO’s at Quantico, Virginia per client’s requirement.

 Conducted computer security evaluations and developed computer security plans. Interfaces with clients to conduct requirement analyses, reviews system security plans, and develops client questionnaires to gather information and dispel misinformation.

 Conducted site visits to determine security enhancements or improvements and then brief clients on recommendations for improving their computer security. Examined ways to secure computer software (encrypting). Analyzed client installed software security measures. Ensured user adheres to sound security practices. Confirmed security procedures are present and properly configured. Conducted evaluations to ascertain sufficient software security to protect sensitive client information.

 Performed risk assessments to examine client’s physical environment to assess client-identified vulnerabilities by interviewing technical staff to assess system vulnerabilities and identify possible threats to system integrity or data.

 Served as an information security generalist with a background in enterprise level security, security process re-engineering and managing security practices to maximize the IT investment to enable and maintain business goals and objectives.

 Served as Task Leader for Army Backdoor Initiative to detect the five categories of backdoors on the client’s UNIX, NT and DOS based LANs.

 Interacted daily with customer to consult on a wide variety of technical issues involving Windows NT, UNIX, Firewall evaluation, Virus Detection, Security Investigations, removal of sensitive equipment from the site, etc.

 Responsible for Information Security Engineering in a networked environment using IBM 3090/Es9000, SUN and PC systems.

 Supported all facets of operations to include physical security, product production, communications security, personnel security, software upgrades, etc.

 Evaluated new security products and security audits. Responsible for security audits, configuration controls of security systems and as required, design security for current information systems.

 Led a team of three junior Information Security Specialists via delegation of duties and daily guidance. Monitored local system usage and audit trails. Responsible for reviewing proposals for any additions, modifications or deletions of security access information. Assisted with IC&T preparation activities and tests for all involved sites.

 Responsible for the day-to-day operations for Information Security at the customer site.

 Provided technical support and analysis of current and proposed system architectures, and security capabilities. PROFESSIONAL EXPERIENCE

Kaiser Permanente

March 2013 – June 2013

Sr. IT BCP Consultant

PAE Consulting, Inc.

September 2012 – Present

Senior Business Continuity Consultant

Expert Network and Software Engineering, Inc.

March 2012 – June 2012

Mission Assurance Continuity Specialist

SMS Data Products Group, Inc.

July 2011 – February 2012

Sr. IT Consultant

Preferred System Solution (IT Infrastructure Operations)

August 2010 – July 2011

Disaster Recovery - Application/Technology Specialist

Centauri Solutions

December 2009 – August 2010

(4)

Emanuel Payton

NCI Information Systems

IT Consultant

2008 – April 2009

General Dynamics Information Technology

Enterprise Architect

2007-2008

PAE Consulting, Inc.

Senior Business Continuity Consultant

2007

SRA International

Senior Disaster Recovery Planner

2006

Computer Science Corporation

Senior Information System Security Representative

2005

Veterans Administration

COOP Consultant

2004

Mahoning County (Youngstown, Ohio) Democratic Headquarters

Field/Volunteer Coordinator

2004

Democratic National Convention Committee

Deputy Director of Technology

2003 – 2004

Booz Allen Hamilton, Inc.

Associate

2002 – 2003

Sprint E-Solutions

Technical Solutions Consultant

Nov. 1999 – August 2002

J.G. Van Dyke/Wang Government Systems

Senior Information Security Engineer

1999

Executive Security & Engineering Technology, Inc., (ESET)

Senior Management Analyst

1998

Lockheed Martin Management & Data Systems

Senior Electronic Information Security Specialist

October 1995 - October 1998

Booz Allen & Hamilton, Inc.

Senior Consultant

1994

U. S. Department of Agriculture

Computer Specialist

April 1993 - November 1994

Naval Surface Warfare Center (NSWC)

Computer Security Officer

February 1986 - April 1993

EDUCATION

PhD level courses, Information Technology, specializing in INFOSEC & Assurance, Capella University Master of Science, Information Security Management, Trinity University, June, 2008

(5)

Emanuel Payton

Page 5 of 5 Bachelor of Arts, Computer Science, Morehouse College, May 1985

CERTIFICATIONS/MEMBERSHIPS

Certified Business Continuity Planner (CBCP) Member Business Continuity Institute (MBCI)

Certified Information System Security Representative (CISSR) for NRO, May 1997 Certified ISSO via FBI training academy 2006

OTHER ACCOMPLISHMENTS

External Publications:

“Laptop Security”, Direct Wire Magazine, 8/1998;

“Windows 95 verses Windows 98, A Comparison”; Direct Wire Magazine, 10/1998 Internal Publications:

Lockheed Martin, 1997 Internet Policy for Customer Site; Standard Operating Procedures for Virus Detection; Area Security Plans; Risk Assessments and a number of existing policy updates or rewrites

Speaking Engagement:

Connected International Meeting Professionals Association (CIMPA) Las Vegas, Nevada, 11/1998; Bangkok, Thailand, 10/2000; Assumption University and Chulalongkorn University, Cairo, Egypt, 1/2002; Amsterdam, Holland, 09/2002; Lisbon, Portugal 11/2003; Athens, Greece, 10/2005; Prague, Czech Republic 10/2006, Beijing, China 02/2008.

Organizations:

National Contractor’s Automated Information System Security Working Group (CAISSWG), 1996, Contingency Exchange, DC Chapter 2006, Association of Contingency Planners, 2007

REFERENCES

References

Related documents

4 IT Assurance - Business Continuity and Disaster Recovery │Audit Summary

Workshops on Verification of Infinite State Systems (INFINITY’10), volume 39 of Electronic Proceedings in Theoretical Computer Science, pages 91–99, Singapore, September 2010.

The answer lies in the training of the Certified Disaster Recovery Engineer course. Disaster recovery and business continuity planning is the process of having a professional

A human resource (HR) department should be focussed on achieving the desired organizational goals otherwise a department that is highly administrative with no strategic

This means VizX2 is also in continuous development, and ZiuZ works closely with police and security services across the globe to take VizX2 further. If you have any questions

-  The  sub  bass  should  be  low-passed,  cutting  off  about two-thirds of the spectrum, so that certain frequencies do not  interfere  with  your  leads 

In terms of other mental health problems, we found that problematic smartphone use was signi ficantly asso- ciated with lower self-esteem, higher impulsive problems (ADHD and

Conclusion: The results revealed that poor sleep quality, amplitude of circadian rhythm, and occupational stress were the contributing factors for sickness absence in the