Randy Rowland has been working with IT systems for over seventeen years. His background includes Help Desk Technician, IT Support Manager, Network and Computer Systems Administrator, and Information Security Specialist. He leads a variety of teams for the Department of Defense.
In his spare time, he reads about cybersecurity issues, experiments with emerging software. He tinkers with VLANs, IDS, and reverse proxies on his home server and network lab. When time permits, he enjoys writing small programs for the Android operating system.
MS, Cyber security, 2024
Southern New Hampshire University
BS, Cyber security, 2022
Southern New Hampshire University
BS, Computer Science, 2017
American Sentinel University
AAS, Information Systems, 2014
Community College of the Air Force
CIS Benchmarks & Blackberry MDM
Debian, Red Hat, Proxmox, Kali
TrueNAS & pfSense
CIS Benchmarks, STIGs, Active Directory
BASH & Powershell
Java, C++, Python
Wireshark, Nmap, Burp, Netcat, Socat
Jira, Github Projects, GitKraken Boards
MSFT Power Automate & SharePoint Workflow
VLANs, OpenVPN, Wireguard, IPSec
Metasploit & Msfvenom
Gobuster, Nikto, WPScan, enum4linux
PIV, SmartCard, Yubikey, GPG
MSFT OneDrive, Google Drive, Nextcloud, TrueNAS
IPS/IDS, Snort, Squid, Suricata, HAProxy
ACME, Let’s Encrypt, AD Certificate Services
Self-Awareness, Self-Regulation, Motivation, Empathy, Social Skills
Communication, Adaptability/Flexibility, Teamwork, Planning/Organizing
Developing and coordinating program acquisition planning, support documentation and program rating. Responsible for managing quality assurance and logistic support, providing recommendations of best practices involved in acquisition program management and identifying potential improvement for processes used in the internal acquisition program. Assessing progress of assigned projects or programs and keeping records of schedules, cost estimates and performance supportability, providing input during source selection, monitoring contractor’s acquisition development up to production and deployment, planning and coordinating activities of logistics, data management and other activities of functional specialists, evaluating program progress, reviewing progress of contractors, taking actions to approve contracts, budgets, terms and other conditions related to the contractor, and ensuring maintenance of documentation.
Analyze training needs to develop new training programs or modify and improve existing programs. Evaluate instructor performance and the effectiveness of training programs, providing recommendations for improvement. Plan, develop, and provide training and staff development programs, using knowledge of the effectiveness of methods such as classroom training, demonstrations, on-the-job training, meetings, conferences, and workshops. Confer with management and conduct surveys to identify training needs based on projected production processes, changes, and other factors.
Analyze training needs to develop new training programs or modify and improve existing programs. Evaluate instructor performance and the effectiveness of training programs, providing recommendations for improvement. Plan, develop, and provide training and staff development programs, using knowledge of the effectiveness of methods such as classroom training, demonstrations, on-the-job training, meetings, conferences, and workshops. Confer with management and conduct surveys to identify training needs based on projected production processes, changes, and other factors.
Verified compliance of junior administrators on computer and network operations aligned with STIGs and organizational policies. Maintained smooth operation of multi-user computer systems, including coordination with network hardware vendors. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources. Ancillary duties may include setting up administrator and service accounts, maintaining system documentation, tuning system performance, installing system wide software and allocating mass storage space. Provides technical leadership to junior administrators through knowledge sharing of computer networking concepts, protocols, network security, system administration concepts, and risk management processes.
Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations. Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary. Operate master consoles to monitor the performance of computer systems and networks, and to coordinate computer network access and use
Using an email service with aliases help protect you from trackers and ad companies while keeping your other web accounts secure too.
Cryptomator provides transparent, client-side encryption for your file hosting cloud service. Everything you put onto the virtual hard drive ends up encrypted in your vault. Protect your documents from unauthorized access.
Using alternative services and hardening your current applications, you can slow down big brother and corporations from tracking your every move and reading all your personal files.
Installing Pandora on Android ROMs that do not have Google Play Services
Shows how to pull updates from upstream repos while making changes to your down stream repo
A playbook to preserve and share knowledge about my homelab.
A playbook to preserve and share knowledge about cybersecurity.
A native Pandora Radio client for Android
My first Android application designed for Android 4.0 Ice Cream Sandwich