Randy Rowland

Randy Rowland

IT Professional

Biography

Randy Rowland has been working with IT systems for over seventeen years. His background includes Help Desk Technician, IT Support Manager, Network and Computer Systems Administrator, and Information Security Specialist. He leads a variety of teams for the Department of Defense.

In his spare time, he reads about cybersecurity issues, experiments with emerging software. He tinkers with VLANs, IDS, and reverse proxies on his home server and network lab. When time permits, he enjoys writing small programs for the Android operating system. 

Interests

  • Cybersecurity
  • Programming/Secure Coding
  • Penetration Testing

Education

  • MS, Cyber security, 2024

    Southern New Hampshire University

  • BS, Cyber security, 2022

    Southern New Hampshire University

  • BS, Computer Science, 2017

    American Sentinel University

  • AAS, Information Systems, 2014

    Community College of the Air Force

Skills

Android

CIS Benchmarks & Blackberry MDM

Linux

Debian, Red Hat, Proxmox, Kali

BSD

TrueNAS & pfSense

Windows

CIS Benchmarks, STIGs, Active Directory

Scripting

BASH & Powershell

Programming

Java, C++, Python

Networking

Wireshark, Nmap, Burp, Netcat, Socat

Kanban Boards

Jira, Github Projects, GitKraken Boards

Automation

MSFT Power Automate & SharePoint Workflow

Security

VLANs, OpenVPN, Wireguard, IPSec

Exploit

Metasploit & Msfvenom

Enumeration

Gobuster, Nikto, WPScan, enum4linux

MFA

PIV, SmartCard, Yubikey, GPG

Cloud Storage

MSFT OneDrive, Google Drive, Nextcloud, TrueNAS

Firewalls

IPS/IDS, Snort, Squid, Suricata, HAProxy

Certificates

ACME, Let’s Encrypt, AD Certificate Services

Emotional Intelligence

Self-Awareness, Self-Regulation, Motivation, Empathy, Social Skills

Attitude Competencies

Communication, Adaptability/Flexibility, Teamwork, Planning/Organizing

Experience

 
 
 
 
 

Cyber Security Liaison

United States Air Force

Oct 2022 – Present Tucson, AZ
  • Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems within the enterprise, and document and maintain records for them.
  • Focal point for organizational computer related activities, provides guidance on technical aspects of computers and system use to organization users.
  • Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization).
  • Controlled computer security access (Role-Based Access Control) by assigning, modifying, and removing security groups to organization users.
  • Established new user account privileges; authorizes uers, maintains access controls; performs ongoing security reviews; reports security breaches distributes security information and install software and updates.
  • Provided security protection to the organization’s data, documents, records, and information through access controls and data loss prevention (DLP).
  • Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure.
  • Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
  • Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup, and restoration.
  • Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.
  • Manage accounts, network rights, and access to systems and equipment.
  • Knowledge of classification and control markings standards, policies and procedures.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
 
 
 
 
 

Production Planning Director

United States Air Force

Oct 2021 – Present Tucson, AZ
  • Led 2 teams in the production of daily flying operations executing $17 million dollar flying program. Revamped scheduling process to double annual flights from 400 to 800.
  • Managed employee training, policies, and initatives.
  • Oversaw daily operations in coordinating with federal aviation agencies, partners, and Air Force leadership. Implemented automated workflow utilizing Microsoft Power Automate to notify customers about changes reducing communication errors to 0 within 4 months.
  • Implemented cloud-based workflow utilizing Microsoft Teams, SharePoint, and OneDrive; enabled remote-work, data loss prevention (DLP), and Role-Based Access Controls (RBAC) for collaboration of 975 customers.
  • Constructed secure access paths to suites of information (e.g., link pages) to facilitate access by end-users.
  • Develop an understanding of the needs and requirements of information end-users.
  • Design, build, implement, and maintain a knowledge management framework that provides end-users access to the organization’s intellectual capital.
  • Promote knowledge sharing between information owners/users through an organization’s operational processes and systems.
  • Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.
 
 
 
 
 

Logistics Manager

United States Air Force

Jan 2021 – Sep 2021 Tucson, AZ
  • Managed and planned for logistics policies, objectives, and initiatives.
  • Optimized workflow and trained employees. Managed inventory and record keeping, monitored budget.
  • Responded and resolve complaints and problems associated with travel and shipping of military equpiment and personnel.
  • Knowledge of classification and control markings standards, policies and procedures.
 
 
 
 
 

Senior Executive Officer

United States Air Force

Aug 2020 – Jan 2021 Abu Dhabi, United Arab Emirates
  • Provide expert insight into people and organizational issues by translating business strategies and into appropriate HR and organizational actions. Provide counsel to leadership team in areas of employee relations, employee performance, employement law, HR policies, procedures, and processes. Ensure successful implementation of initiatives that support strategies. Recommend and develop clear, actionable steps in support of overall business strategy.
  • Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.
  • Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program.
  • Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements.
  • Develop and maintain strategic plans. Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders. Lead and oversee information security budget, staffing, and contracting.
  • Promote awareness of security issues among management and ensure sound security principles are reflected in the organization’s vision and goals.
  • Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets.
  • Knowledge of classification and control markings standards, policies and procedures.
 
 
 
 
 

Network and Computer Systems Administrator

United States Air Force

Nov 2018 – Present Tucson, AZ
  • Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, virtual machines, and all configurations.
  • Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary.
  • Operate master consoles and KVMs to monitor the performance of computer systems and networks, and to coordinate computer network access and use.
  • Maintain baseline system security according to organizational policies.
  • Manage accounts, network rights, and access to systems and equipment.
  • Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.
  • Monitor and maintain system/server configuration. Perform repairs on faulty system/server hardware. Troubleshoot hardware/software interface and interoperability problems.
  • Knowledge of classification and control markings standards, policies and procedures.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
 
 
 
 
 

Training and Development Manager

United States Air Force

Aug 2018 – Jul 2020 Tucson, AZ
  • Led a 36 member team - automated training reports saving over 300 hours/year
  • Analyzed training needs - developed new training programs and improved existing programs
  • Conferred with management to identify training needs based on projected changes
  • Ensured training goals met for 186 personnel
  • Implemented cloud-based workflow utilizing Microsoft Teams, SharePoint, and OneDrive; enabled remote-work, data loss prevention (DLP), and Role-Based Access Controls (RBAC)
 
 
 
 
 

Flight Operations Resource Manager

United States Air Force

Aug 2017 – Aug 2018 Pyeongtaek, Gyeonggi-do, South Korea
  • Led 14 member team - Synchronized operations with South Korean Air Force
  • Tracked daily flight requirements - maximized airspace utilization
  • Guided US Air Force’s $171 million flying program - enabled over 21,000 flights
  • Organized 46 working groups between 9 US agencies and South Korea
  • Knowledge of classification and control markings standards, policies and procedures.
 
 
 
 
 

Procurement Manager

United States Air Force

Aug 2015 – Jul 2017 Warner Robins, GA

Developing and coordinating program acquisition planning, support documentation and program rating. Responsible for managing quality assurance and logistic support, providing recommendations of best practices involved in acquisition program management and identifying potential improvement for processes used in the internal acquisition program. Assessing progress of assigned projects or programs and keeping records of schedules, cost estimates and performance supportability, providing input during source selection, monitoring contractor’s acquisition development up to production and deployment, planning and coordinating activities of logistics, data management and other activities of functional specialists, evaluating program progress, reviewing progress of contractors, taking actions to approve contracts, budgets, terms and other conditions related to the contractor, and ensuring maintenance of documentation.

  • Ensure that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.
  • Assess all the configuration management (change configuration/release management) processes.
  • Establish acceptable limits for the software application, network, or system.
  • Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
  • Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy.
  • Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks.
  • Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).
  • Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.
  • Participate in the development or modification of the computer environment cybersecurity program plans and requirements.
  • Knowledge of classification and control markings standards, policies and procedures.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
 
 
 
 
 

Education and Development Manager

United States Air Force

Feb 2014 – Aug 2015 Warner Robins, GA

Analyze training needs to develop new training programs or modify and improve existing programs. Evaluate instructor performance and the effectiveness of training programs, providing recommendations for improvement. Plan, develop, and provide training and staff development programs, using knowledge of the effectiveness of methods such as classroom training, demonstrations, on-the-job training, meetings, conferences, and workshops. Confer with management and conduct surveys to identify training needs based on projected production processes, changes, and other factors.

  • Review training documentation (e.g., Course Content Documents [CCD], lesson plans, student texts, examinations, Schedules of Instruction [SOI], and course descriptions).
  • Develop new or identify existing awareness and training materials that are appropriate for intended audiences.
  • Develop or assist in the development of grading and proficiency standards.
  • Develop or assist in the development of learning objectives and goals.
  • Develop or assist in the development of on-the-job training materials or programs.
 
 
 
 
 

Quality Assurance Supervisor

United States Air Force

Mar 2011 – Feb 2014 Warner Robins, GA

Analyze training needs to develop new training programs or modify and improve existing programs. Evaluate instructor performance and the effectiveness of training programs, providing recommendations for improvement. Plan, develop, and provide training and staff development programs, using knowledge of the effectiveness of methods such as classroom training, demonstrations, on-the-job training, meetings, conferences, and workshops. Confer with management and conduct surveys to identify training needs based on projected production processes, changes, and other factors.

  • Evaluate the effectiveness and comprehensiveness of existing training programs.
  • Provide expertise to the development of measures of effectiveness and measures of performance.
  • Knowledge of human-computer interaction principles.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless)
  • Knowledge of classification and control markings standards, policies and procedures.
 
 
 
 
 

Senior Systems Administrator

United States Air Force

Apr 2010 – Jul 2017 Warner Robins, GA

Verified compliance of junior administrators on computer and network operations aligned with STIGs and organizational policies. Maintained smooth operation of multi-user computer systems, including coordination with network hardware vendors. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources. Ancillary duties may include setting up administrator and service accounts, maintaining system documentation, tuning system performance, installing system wide software and allocating mass storage space. Provides technical leadership to junior administrators through knowledge sharing of computer networking concepts, protocols, network security, system administration concepts, and risk management processes.

  • Provide advice on project costs, design concepts, or design changes.
  • Develop a system security context, a preliminary system security Concept of Operations (CONOPS), and define baseline system security requirements in accordance with applicable cybersecurity requirements.
  • Capture and integrate essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.
  • Translate proposed capabilities into technical requirements.
  • Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.
  • Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.
  • Ensure that security improvement actions are evaluated, validated, and implemented as required.
  • Lead and align information technology (IT) security priorities with the security strategy.
  • Participate in the development or modification of the computer environment cybersecurity program plans and requirements.
  • Knowledge of classification and control markings standards, policies and procedures.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
 
 
 
 
 

Informations Systems Security Officer

United States Air Force

Feb 2008 – Mar 2011 Warner Robins, GA
  • Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.
  • Recognize a possible security violation and take appropriate action to report the incident, as required.
  • Recommend resource allocations required to securely operate and maintain an organization’s cybersecurity requirements.
  • Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.
  • Identify security requirements specific to an information technology (IT) system in all phases of the system life cycle.
  • Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
  • Knowledge of classification and control markings standards, policies and procedures.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
 
 
 
 
 

Cost Estimator & Purchasing Agent

United States Air Force

Feb 2008 – Mar 2011 Warner Robins, GA
Analyze training needs to develop new training programs or modify and improve existing programs. Evaluate instructor performance and the effectiveness of training programs, providing recommendations for improvement. Plan, develop, and provide training and staff development programs, using knowledge of the effectiveness of methods such as classroom training, demonstrations, on-the-job training, meetings, conferences, and workshops. Confer with management and conduct surveys to identify training needs based on projected production processes, changes, and other factors.
 
 
 
 
 

Network and Computer Systems Administrator

United States Air Force

Jan 2006 – Apr 2010 Warner Robins, GA

Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations. Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary. Operate master consoles to monitor the performance of computer systems and networks, and to coordinate computer network access and use

  • Knowledge of classification and control markings standards, policies and procedures.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
 
 
 
 
 

Student

United States Air Force

Jun 2005 – Dec 2005 San Antonio, TX
Learn military and leadership principles. Complete technical school geared towards maintaining, troubleshooting, and fixing IT systems. Covered electronic principles, networks, data links, radios, software, and hardware.
 
 
 
 
 

Crew Member

McDonald’s Corporation

Apr 2001 – Jun 2005 Rapid City, SD
  • Ensured proper storage and handling of food.
  • Adaptable to pressure, responsible, organized and hardworking
  • Teamwork: Able to cope with different people and solving problems
  • Maintained equipment such as oven and grill in proper condition

Certifications

Certified Information Systems Security Professional (CISSP)

The vendor-neutral CISSP credential confirms technical knowledge and experience to design, engineer, implement, and manage the overall security posture of an organization. Required by the world’s most security-conscious organizations, CISSP is the gold-standard information security certification that assures information security leaders possess the breadth and depth of knowledge to establish holistic security programs that protect against threats in an increasingly complex cyber world.
See certificate

Security+

Earners of the CompTIA Security+ certification have the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.
See certificate

Server+

Server+ certification demonstrates the skills necessary to be a server administrator and have mastered the concepts covering virtualization, server architecture and administrations, networking, disaster recovery, storage, security, and troubleshooting common problems.
See certificate

Network Infrastructure Professional

Earners of the CompTIA Network Infrastructure Professional (CNIP) certification are network infrastructure professionals capable of delivering complex infrastructure design projects from inception through development and delivery.
See certificate

Linux+

Linux+ certification demonstrates technical competency and provides a broad awareness of Linux operating systems. Professionals who have achieved the Linux+ certification exhibit all-important knowledge of installation, operation, administration, and troubleshooting services.
See certificate

LPIC-1: System Administrator

The LPIC-1 will validate the candidate’s ability to perform maintenance tasks on the command line, install and configure a computer running Linux and configure basic networking.
See certificate

Linux Network Professional

Earners of the CompTIA Linux Network Professional (CLNP) certification are Linux network professionals that are able to provide hands-on support and to monitor critical internal and client systems.
See certificate

Network+

Earners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage enterprise networks.
See certificate

Recent Posts

Using Email Alias Addresses to Enhance Privacy & Security

Using an email service with aliases help protect you from trackers and ad companies while keeping your other web accounts secure too.

Encrypted File Syncing with Cryptomator

Cryptomator provides transparent, client-side encryption for your file hosting cloud service. Everything you put onto the virtual hard drive ends up encrypted in your vault. Protect your documents from unauthorized access.

Taking Control of your Privacy

Using alternative services and hardening your current applications, you can slow down big brother and corporations from tracking your every move and reading all your personal files.

Pandora Radio on Android ROMs

Installing Pandora on Android ROMs that do not have Google Play Services

Working with upstream repos

Shows how to pull updates from upstream repos while making changes to your down stream repo

Projects

Homelab Playbook

A playbook to preserve and share knowledge about my homelab.

Cyber Playbook

A playbook to preserve and share knowledge about cybersecurity.

Pyxis

A native Pandora Radio client for Android

Drink of the Day

My first Android application designed for Android 4.0 Ice Cream Sandwich

Contact