Randy Rowland

Randy Rowland

Security Engineer

Biography

Randy Rowland is a Security Engineer with 18+ years of military expertise in electronic warfare and intelligence operations, transitioning to a more cyber security-centric career path. Acknowledged for securing and maintaining ground/airborne systems and delivering rapid network issue resolution. Proficient in diverse technical skills spanning networking, security protocols, and stakeholder compliance, establishing mission protection. An adept leader who is skilled in aligning programs with priorities, fostering innovation, and optimizing personnel performance for complex operational success. Seamlessly transitioning into a cyber security focus, leveraging a dedicated track record and comprehensive experience to safeguard critical assets, fortify data integrity, and drive cyber security initiatives.In-scope TS/SCI Clearance. 

Interests

  • SOC Analyst
  • Cyber Defense
  • Blue Teaming
  • Threat Hunting
  • Security Engineering

Education

  • MS, Cyber security, 2024

    Southern New Hampshire University

  • BS, Cyber security, 2022

    Southern New Hampshire University

  • BS, Computer Science, 2017

    American Sentinel University

  • AAS, Information Systems, 2014

    Community College of the Air Force

Skills

Android

CIS Benchmarks & Blackberry MDM

Linux

Debian, Red Hat, Proxmox, Kali

BSD

TrueNAS & pfSense

Windows

CIS Benchmarks, STIGs, Active Directory

Scripting

BASH & Powershell

Programming

Java, C++, Python

Networking

Wireshark, Nmap, Burp, Netcat, Zeek

Kanban Boards

Jira, Github Projects, M365 Planner

Automation

MSFT Power Automate & SharePoint Workflow

Security

VLANs, OpenVPN, Wireguard, IPSec

Exploit

Metasploit & Msfvenom

Enumeration

Gobuster, Nikto, WPScan, enum4linux

MFA

PIV, SmartCard, Yubikey, GPG

Cloud Storage

MSFT OneDrive, Google Drive, Nextcloud, TrueNAS

Firewalls

IPS/IDS, Snort, Squid, Suricata, HAProxy

Incident Response/Threat Hunting

Security Onion, AC-Hunter, Wazuh

Certificates

ACME & Let’s Encrypt

Emotional Intelligence

Self-Awareness, Self-Regulation, Motivation, Empathy, Social Skills

Attitude Competencies

Communication, Adaptability/Flexibility, Teamwork, Planning/Organizing

Experience

 
 
 
 
 

Security Engineer

United States Air Force

Sep 2023 – Present Tucson, AZ
  • Integrated Security Education Training & Awareness (SETA) program into organization’s culture
  • Assess the nature and level of physical security threats so that the scope of the problem can be determined
  • Budget and schedule security design work
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs
  • Manage project execution to ensure adherence to budget, schedule, and scope
  • Confer with project personnel to identify and resolve problems
  • Monitor or track project milestones and deliverables
  • Conduct security audits to identify potential vulnerabilities related to physical security or staff safety
  • Analyze and evaluate security operations to identify risks or opportunities for improvement through auditing, review, or assessment
  • Assess risks to mitigate potential consequences of incidents and develop a plan to respond to incidents
  • Attend meetings, professional seminars, or conferences to keep abreast of changes in executive legislative directives or new technologies impacting security operations
 
 
 
 
 

Cyber Security Liaison

United States Air Force

Oct 2022 – Sep 2023 Tucson, AZ

The focal point for organizational computer-related activities, provided guidance on technical aspects of computers, and system use to organization users. Monitored, identified, and reported security violations to government functional managers within 1 business day/eight hours. Established new users’ account privileges, and controlled computer security access by assigning, modifying, and deleting role-based access permissions.

  • Enrolled 7 mobile devices into the DoD PKI program through Bring Your Own Device (BYOD) and Corporate-Owned, Personally Enabled (COPE) Mobile Device Management (MDM) programs
  • Issued and configured 34 PKI certificates for encryption, authentication, and authorization
  • Architected 9 SharePoint sites, enabling seamless collaboration for 94 users with 12K+ documents, and fortified data security through Role-Based Access Controls (RBAC), granting precise access to 700+ employees
  • Focal point for organizational computer related activities, provides guidance on technical aspects of computers and system use to organization users
  • Executed IR checklist for two incidents to maintain the confidentiality of classified data
  • Controlled computer security access (RBAC) by assigning, modifying, and removing security groups to organization users
  • Established new user account privileges; authorizes uers, maintains access controls; performs ongoing security reviews; reports security breaches distributes security information and install software and updates
  • Provided security protection to the organization’s data, documents, records, and information through access controls and data loss prevention (DLP)
  • Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure
  • Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources
  • Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup, and restoration
  • Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs
  • Manage accounts, network rights, and access to systems and equipment
  • Knowledge of classification and control markings standards, policies and procedures
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless)
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage)
 
 
 
 
 

Production Planning Director

United States Air Force

Oct 2021 – Present Tucson, AZ

Supervised 17 personnel to develop and maintain $17 million flight operations schedule for the EC-130H Compass Call. Coordinates with flight crews and maintenance personnel

  • Orchestrated a Green Belt initiative to optimize Change in Production Scheduling process, reducing processing time by 66% to 8.2 hours & eliminating duplicate documentation, fortifying organizational resilience against operational disruptions & aligning with stringent security controls & protocols.
  • Led 2 teams in the production of daily flying operations executing $17 million dollar flying program
  • Revamped scheduling process to double annual flights from 400 to 800
  • Devised 21 Power Automate tasks, streamlining approvals and reminders to eradicate potential errors and maintain data integrity for 80+ employees within 4 months
  • Implemented cloud-based workflow utilizing Microsoft Teams, SharePoint, and OneDrive; enabled remote-work, data loss prevention (DLP), and Role-Based Access Controls (RBAC) for collaboration of 975 customers
  • Managed employee training, policies, and initatives
  • Oversaw daily operations in coordinating with federal aviation agencies, partners, and Air Force leadership
  • Constructed secure access paths to suites of information (e.g., link pages) to facilitate access by end-users
  • Develop an understanding of the needs and requirements of information end-users
  • Design, build, implement, and maintain a knowledge management framework that provides end-users access to the organization’s intellectual capital
  • Promote knowledge sharing between information owners/users through an organization’s operational processes and systems
  • Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs
 
 
 
 
 

Logistics Manager

United States Air Force

Jan 2021 – Sep 2021 Tucson, AZ

Supervised 28 personnel to coordinate the deployment of 147 personnel and cargo. Ensured 528 personnel were properly trained and equipped. Oversaw required documentation and travel arrangements in a high-stress level environment.

  • Managed and planned for logistics policies, objectives, and initiatives
  • Oversaw digital transformation, moved processes into Microsoft Teams
  • Optimized workflow and trained employees Managed inventory and record keeping, monitored budget
  • Responded and resolve complaints and problems associated with travel and shipping of military equpiment and personnel
  • Knowledge of classification and control markings standards, policies and procedures
 
 
 
 
 

Deputy Chief Operating Officer

United States Air Force

Aug 2020 – Jan 2021 Abu Dhabi, United Arab Emirates

Principal advisor to the CEO regarding welfare, morale, and readiness of 41 employees. Assisted the Chief Operating Officer in overseeing the daily operations of the organization. Aided in developing and implementing strategies, policies, and procedures. Managed the budget and resources, and ensured that the organization met its goals and objectives.

  • Provide expert insight into people and organizational issues by translating business strategies and into appropriate HR and organizational actions
  • Provide counsel to leadership team in areas of employee relations, employee performance, employement law, HR policies, procedures, and processes
  • Ensure successful implementation of initiatives that support strategies
  • Recommend and develop clear, actionable steps in support of overall business strategy
  • Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.
  • Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program
  • Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements
  • Develop and maintain strategic plans
  • Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders
  • Lead and oversee information security budget, staffing, and contracting
  • Promote awareness of security issues among management and ensure sound security principles are reflected in the organization’s vision and goals
  • Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets
  • Knowledge of classification and control markings standards, policies and procedures
 
 
 
 
 

Network and Computer Systems Administrator

United States Air Force

Nov 2018 – Present Tucson, AZ

Expertise in maintaining and repairing IT systems on 14 $165 million EC-130H Compass Call electronic warfare aircraft. Proven ability to troubleshoot and repair 21 computer systems, 3 networks, and 2 mil-spec data links in a fast-paced environment. Communicated plan of action and risks with key mission stakeholders.

  • Authored comprehensive systems training encompassing encrypted data link operations, effectively preparing the team for large-scale exercises
  • Secured a crucial $40.7K satellite contract, successfully revitalizing secure communications and amplifying aircraft capabilities throughout the Middle East region
  • Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, virtual machines, and all configurations
  • Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary
  • Operate master consoles and KVMs to monitor the performance of computer systems and networks, and to coordinate computer network access and use
  • Maintain baseline system security according to organizational policies
  • Manage accounts, network rights, and access to systems and equipment
  • Manage system/server resources including performance, capacity, availability, serviceability, and recoverability
  • Monitor and maintain system/server configuration. Perform repairs on faulty system/server hardware
  • Troubleshoot hardware/software interface and interoperability problems
  • Knowledge of classification and control markings standards, policies and procedures
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless)
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage)
 
 
 
 
 

Training and Development Manager

United States Air Force

Aug 2018 – Jul 2020 Tucson, AZ

Coordinated with senior management and employees to identify training needs and create training materials. Delivered training sessions and tracked the effectiveness of training programs. Recommened training improvement programs based on feedback.

  • Supervised 36 employees; conducted performance evaluations, swiftly identifying and remedying human performance gaps, and offered constructive feedback to foster personnel growth
  • Automated annual training reports saving over 300 hours/year
  • Developed new training programs and improved existing programs based on organization’s training requirements
  • Conferred with management to identify training needs based on projected changes
  • Ensured training goals met for 186 personnel
  • Implemented Kanban task management system within workcenter, enabling a pull workflow and accomplishing tasks on-time
  • Implemented cloud-based workflow utilizing Microsoft Teams, SharePoint, and OneDrive; enabled remote-work, data loss prevention (DLP), and Role-Based Access Controls (RBAC)
 
 
 
 
 

Flight Operations Resource Manager

United States Air Force

Aug 2017 – Aug 2018 Pyeongtaek, Gyeonggi-do, South Korea

Directly supervised 14 members. Communicated USAF airspace requirements to the South Korean Air Force.

  • Synchronized USAF flying operations with South Korean Air Force
  • Tracked daily flight requirements - maximized airspace utilization
  • Guided US Air Force’s $171 million flying program - enabled over 21,000 flights
  • Organized 46 working groups between 9 US agencies and South Korea
  • Knowledge of classification and control markings standards, policies and procedures
  • Designed SharePoint workflow to automate sensitive flying operations requests between 4 departments
 
 
 
 
 

Procurement Manager

United States Air Force

Aug 2015 – Jul 2017 Warner Robins, GA

Supervised all aspects of IT systems upgrades and acquisitions for the $244.4 million E-8C Joint Surveillance Target Attack Radar System (JSTARS) command and control aircraft. Assisted production of Total Systems Support Responsibility (TSSR) for the E-8C with Air Force Life Cycle Management Center (AFLCMC) utilizing FedRAMP, classification guides, and the National Industrial Security Program Operating Manual (NISPOM). Developing and coordinating program acquisition planning, support documentation and program rating. Responsible for managing quality assurance and logistic support, providing recommendations of best practices involved in acquisition program management and identifying potential improvement for processes used in the internal acquisition program. Assessing progress of assigned projects or programs and keeping records of schedules, cost estimates and performance supportability, providing input during source selection, monitoring contractor’s acquisition development up to production and deployment, planning and coordinating activities of logistics, data management and other activities of functional specialists, evaluating program progress, reviewing progress of contractors, taking actions to approve contracts, budgets, terms and other conditions related to the contractor, and ensuring maintenance of documentation.

  • Co-authored requirements documents; Capability Development and Capability Production Documents (CDD & CPD) and AF Forms 1067s
  • Formulated meticulous policies, standards, and procedures orchestrating an OpenVMS to RHEL migration, ensuring uninterrupted multi-user computer system functionality
  • Customized Linux references, seamlessly integrating them into the organization’s standard operating procedures
  • Coordinated acquisition and integrated $10 million server upgrades across 16 aircraft
  • Installed experimental tactical data link (TDL) on aircraft and ensured antennas configured to be able to have a proper line of site for communications leading to a validated Master Test Procedure (MTP)
  • Ensure that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals
  • Assess all the configuration management (change configuration/release management) processes
  • Establish acceptable limits for the software application, network, or system
  • Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
  • Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy
  • Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks
  • Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials)
  • Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations
  • Participate in the development or modification of the computer environment cybersecurity program plans and requirements
  • Knowledge of classification and control markings standards, policies and procedures
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless)
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage)
 
 
 
 
 

Education and Development Manager

United States Air Force

Feb 2014 – Aug 2015 Warner Robins, GA

Analyze training needs to develop new training programs or modify and improve existing programs. Evaluate instructor performance and the effectiveness of training programs, providing recommendations for improvement. Plan, develop, and provide training and staff development programs, using knowledge of the effectiveness of methods such as classroom training, demonstrations, on-the-job training, meetings, conferences, and workshops. Confer with management and conduct surveys to identify training needs based on projected production processes, changes, and other factors.

  • Compiled 7,650 training requirements for 5 departments into a single report, identified 3 critical training deficiencies, and advised senior management on corrective actions
  • Review training documentation (e.g., Course Content Documents [CCD], lesson plans, student texts, examinations, Schedules of Instruction [SOI], and course descriptions)
  • Develop new or identify existing awareness and training materials that are appropriate for intended audiences
  • Developed grading and proficiency standards, learning objectives and goals, and on-the-job training materials or programs
 
 
 
 
 

Quality Assurance Supervisor

United States Air Force

Mar 2011 – Feb 2014 Warner Robins, GA

Documented the performance of 209 aircrew members. Coordinated and facilitated standardization and evaluation processes. Worked with team members to ensure performance evaluations were conducted in a fair, impartial, and objective manner. Analyze training needs to develop new training programs or modify and improve existing programs. Evaluate instructor performance and the effectiveness of training programs, providing recommendations for improvement. Plan, develop, and provide training and staff development programs, using knowledge of the effectiveness of methods such as classroom training, demonstrations, on-the-job training, meetings, conferences, and workshops. Confer with management and conduct surveys to identify training needs based on projected production processes, changes, and other factors.

  • Maintained a physical policy and compliance library of over 325 documents, ensuring that they were up-to-date, accurate, and accessible to 209 employees
  • Developed and implemented a Microsoft SharePoint compliance library with 1,657 files, 351 folders, and 152 links, providing quick access to 209 organization members
  • Led a 3-member team to review 204 flight evaluation records, discovered and corrected 104 discrepancies, and restored the unit’s compliance with enterprise regulations
  • Initiated and implemented a self-inspection compliance checklist, correcting 148 Microsoft Access database errors that improved 300 reports
  • Administered semi-annual performance exams to 204 members and completed the exams 20% faster than organizational standards
  • Evaluate the effectiveness and comprehensiveness of existing training programs
  • Provide expertise to the development of measures of effectiveness and measures of performance
  • Knowledge of human-computer interaction principles
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless)
  • Knowledge of classification and control markings standards, policies and procedures
 
 
 
 
 

Senior Systems Administrator

United States Air Force

Apr 2010 – Jul 2017 Warner Robins, GA

Verified compliance of junior administrators on computer and network operations aligned with STIGs and organizational policies. Maintained smooth operation of multi-user computer systems, including coordination with network hardware vendors. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources. Ancillary duties may include setting up administrator and service accounts, maintaining system documentation, tuning system performance, installing system wide software and allocating mass storage space. Provides technical leadership to junior administrators through knowledge sharing of computer networking concepts, protocols, network security, system administration concepts, and risk management processes.

  • Audited junior admins’ computer and network operations to verify STIGs and organizational policies were followed
  • Conducted performance evaluations for 57 admins, swiftly identifying and remedying human performance gaps, and offered constructive feedback to foster personnel growth
  • Isolated and fixed faults in the forward antenna control channel computer systems and rear antenna motor in-flight during fast-paced operations, restored 12 hours of scheduled radar coverage
  • Identified a closed port within a firewall; skillfully reconfigured settings across 3 firewalls to reestablish vital communication between airborne and ground IT systems
  • Pioneered training for 20 junior admins, imparting expertise in emerging computer systems and software, resulting in enhanced aircraft capabilities
  • Directly supervised 6 junior admins, uncovering and rectifying a debilitating database error that impeded system loading; orchestrated error resolution, database optimization, and swift system restoration
  • Provide advice on project costs, design concepts, or design changes
  • Develop a system security context, a preliminary system security Concept of Operations (CONOPS), and define baseline system security requirements in accordance with applicable cybersecurity requirements
  • Capture and integrate essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event
  • Translate proposed capabilities into technical requirements
  • Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk
  • Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders
  • Ensure that security improvement actions are evaluated, validated, and implemented as required
  • Lead and align information technology (IT) security priorities with the security strategy
  • Participate in the development or modification of the computer environment cybersecurity program plans and requirements
  • Knowledge of classification and control markings standards, policies and procedures
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless)
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage)
 
 
 
 
 

Informations Systems Security Officer

United States Air Force

Feb 2008 – Mar 2011 Warner Robins, GA

Prepared, distributed, and maintained plans, instructions, guidance, and standards concerning the security of classified military network systems. Protected computer systems from unauthorized access, use, modification, or destruction. Communicated security risks to senior leadership.

  • Created an extensive TEMPEST plan to restructure 5 offices, executing stringent security protocols for safeguarding classified data across more than 1,000 feet of LAN and phone cables
  • Managed an information assurance program and educated 240 members on DoD security policies and procedures
  • Transferred 100 floppy disk drives from the old computers into new computers during tech refresh, saving the organization $1,300
  • Managed $436 thousand IT budget and 535 computer systems
  • Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations
  • Recognize a possible security violation and take appropriate action to report the incident, as required
  • Recommend resource allocations required to securely operate and maintain an organization’s cybersecurity requirements
  • Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies
  • Identify security requirements specific to an information technology (IT) system in all phases of the system life cycle
  • Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance
  • Knowledge of classification and control markings standards, policies and procedures
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless)
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage)
 
 
 
 
 

Cost Estimator & Purchasing Agent

United States Air Force

Feb 2008 – Mar 2011 Warner Robins, GA

Oversaw a $196 thousand budget for travel, uniforms, and general purchases.

  • Developed and managed cost estimates for a variety of projects, including facility construction, furniture upgrade, and IT
  • Negotiated contracts with vendors to secure the best possible prices
  • Sourced and purchased goods and services for a variety of departments, including operations, IT, and travel
  • Saved companies millions of dollars by negotiating better prices and sourcing more cost-effective goods and services
  • Worked independently and as part of a team to meet deadlines and achieve goals
  • Received numerous awards and commendations for outstanding performance
  • Implemented a change to the mode of ground travel that saved the organization $1,755 annually
  • Reviewed and approved 21 travel requests; utilized cost comparisons that saved $2,700 and eliminated a two-week backlog
 
 
 
 
 

Network and Computer Systems Administrator

United States Air Force

Jan 2006 – Apr 2010 Warner Robins, GA

Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations. Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary. Operate master consoles to monitor the performance of computer systems and networks, and to coordinate computer network access and use

  • Knowledge of classification and control markings standards, policies and procedures.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
 
 
 
 
 

Student

United States Air Force

Jun 2005 – Dec 2005 San Antonio, TX

Learn military and leadership principles. Complete technical school geared towards maintaining, troubleshooting, and fixing IT systems. Covered electronic principles, networks, data links, radios, software, and hardware.

  • Learned basic principles and methodologies of radar, voice communications, and electronic data
  • Mastered networking protocols and troubleshooting techniques
 
 
 
 
 

Crew Member

McDonald’s Corporation

Apr 2001 – Jun 2005 Rapid City, SD
  • Greeted and served customers in a friendly and efficient manner
  • Prepared and cooked food according to McDonald’s standards
  • Cleaned and maintained the restaurant to ensure a sanitary environment
  • Resolved customer complaints in a timely and professional manner
  • Received numerous compliments from customers for outstanding service
  • Ensured proper storage and handling of food
  • Maintained equipment such as oven and grill in proper condition
  • Worked well under pressure and was able to meet deadlines
  • Was a team player and was able to work well with others
  • Was able to solve problems and was proactive in finding solutions

Certifications

Continuous Process Improvement Green Belt Certification

Green Belts are collaborators who have been trained in Six Sigma Green Belt level improvement methods and will be leading continuous process improvement groups as part of their regular job. This allows for more time by company leaders and champions to be spent on strategy-building and decision-making components of the Lean Six Sigma project planning process. The Green Belts are better able to understand the entire process and work closely with subject matter experts (SMEs) to achieve performance goals.
See certificate

Cybersecurity Analyst+ (CySA+)

Earners of the CompTIA Cybersecurity Analyst (CySA+) certification have the skills and knowledge to perform incident detection, prevention and response through continuous security monitoring. Includes analysis of indicators of malicious activity, threat hunting and threat intelligence concepts, appropriate tools and methods to manage, prioritize, and respond to attacks and vulnerabilities, performing incident response processes and understanding related reporting and communication concepts.
See certificate

Security Analytics Professional

Earners of the CompTIA Security Analytics Professional (CSAP) are security analytics professional that have the ability to plan and carry out security measures to protect an organization’s computer networks and systems.
See certificate

Certified Information Systems Security Professional (CISSP)

The vendor-neutral CISSP credential confirms technical knowledge and experience to design, engineer, implement, and manage the overall security posture of an organization. Required by the world’s most security-conscious organizations, CISSP is the gold-standard information security certification that assures information security leaders possess the breadth and depth of knowledge to establish holistic security programs that protect against threats in an increasingly complex cyber world.
See certificate

Security+

Earners of the CompTIA Security+ certification have the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.
See certificate

Server+

Server+ certification demonstrates the skills necessary to be a server administrator and have mastered the concepts covering virtualization, server architecture and administrations, networking, disaster recovery, storage, security, and troubleshooting common problems.
See certificate

Network Infrastructure Professional

Earners of the CompTIA Network Infrastructure Professional (CNIP) certification are network infrastructure professionals capable of delivering complex infrastructure design projects from inception through development and delivery.
See certificate

Linux+

Linux+ certification demonstrates technical competency and provides a broad awareness of Linux operating systems. Professionals who have achieved the Linux+ certification exhibit all-important knowledge of installation, operation, administration, and troubleshooting services.
See certificate

LPIC-1: System Administrator

The LPIC-1 will validate the candidate’s ability to perform maintenance tasks on the command line, install and configure a computer running Linux and configure basic networking.
See certificate

Linux Network Professional

Earners of the CompTIA Linux Network Professional (CLNP) certification are Linux network professionals that are able to provide hands-on support and to monitor critical internal and client systems.
See certificate

Network+

Earners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage enterprise networks.
See certificate

Recent Posts

Running WireGuard on Windows Standard User Accounts

Unlike other VPN tools and technologies, Wireguard creates a tunnel interface. It does this outside the official VPN plumbing of Windows. That design has the severe limitation that you need to be an administrator of the machine, but this guide provides a workaround to allow standard users to enable the VPN interface.

Using Email Alias Addresses to Enhance Privacy & Security

Using an email service with aliases help protect you from trackers and ad companies while keeping your other web accounts secure too.

Encrypted File Syncing with Cryptomator

Cryptomator provides transparent, client-side encryption for your file hosting cloud service. Everything you put onto the virtual hard drive ends up encrypted in your vault. Protect your documents from unauthorized access.

Taking Control of your Privacy

Using alternative services and hardening your current applications, you can slow down big brother and corporations from tracking your every move and reading all your personal files.

Pandora Radio on Android ROMs

Installing Pandora on Android ROMs that do not have Google Play Services

Projects

Homelab Playbook

A playbook to preserve and share knowledge about my homelab.

Cyber Playbook

A playbook to preserve and share knowledge about cybersecurity.

Pyxis

A native Pandora Radio client for Android

Drink of the Day

My first Android application designed for Android 4.0 Ice Cream Sandwich