Randy Rowland is a Security Operations Manager with 18+ years of military expertise in electronic warfare and intelligence operations, transitioning to a more cyber security-centric career path. Acknowledged for securing and maintaining ground/airborne systems and delivering rapid network issue resolution. Proficient in diverse technical skills spanning networking, security protocols, and stakeholder compliance, establishing mission protection. An adept leader who is skilled in aligning programs with priorities, fostering innovation, and optimizing personnel performance for complex operational success. Seamlessly transitioning into a cyber security focus, leveraging a dedicated track record and comprehensive experience to safeguard critical assets, fortify data integrity, and drive cyber security initiatives.In-scope TS/SCI Clearance.
MS, Cyber security, 2024
Southern New Hampshire University
BS, Cyber security, 2022
Southern New Hampshire University
BS, Computer Science, 2017
American Sentinel University
AAS, Information Systems, 2014
Community College of the Air Force
CIS Benchmarks & Blackberry MDM
Debian, Red Hat, Proxmox, Kali
TrueNAS & pfSense
CIS Benchmarks, STIGs, Active Directory
BASH & Powershell
Java, C++, Python
Wireshark, Nmap, Burp, Netcat, Socat
Jira, Github Projects, GitKraken Boards
MSFT Power Automate & SharePoint Workflow
VLANs, OpenVPN, Wireguard, IPSec
Metasploit & Msfvenom
Gobuster, Nikto, WPScan, enum4linux
PIV, SmartCard, Yubikey, GPG
MSFT OneDrive, Google Drive, Nextcloud, TrueNAS
IPS/IDS, Snort, Squid, Suricata, HAProxy
ACME, Let’s Encrypt, AD Certificate Services
Self-Awareness, Self-Regulation, Motivation, Empathy, Social Skills
Communication, Adaptability/Flexibility, Teamwork, Planning/Organizing
The focal point for organizational computer-related activities, provided guidance on technical aspects of computers, and system use to organization users. Monitored, identified, and reported security violations to government functional managers within 1 business day/eight hours. Established new users’ account privileges, and controlled computer security access by assigning, modifying, and deleting role-based access permissions.
Supervised 17 personnel to develop and maintain $17 million flight operations schedule for the EC-130H Compass Call. Coordinates with flight crews and maintenance personnel
Supervised 28 personnel to coordinate the deployment of 147 personnel and cargo. Ensured 528 personnel were properly trained and equipped. Oversaw required documentation and travel arrangements in a high-stress level environment.
Principal advisor to the CEO regarding welfare, morale, and readiness of 41 employees. Assisted the Chief Operating Officer in overseeing the daily operations of the organization. Aided in developing and implementing strategies, policies, and procedures. Managed the budget and resources, and ensured that the organization met its goals and objectives.
Expertise in maintaining and repairing IT systems on 14 $165 million EC-130H Compass Call electronic warfare aircraft. Proven ability to troubleshoot and repair 21 computer systems, 3 networks, and 2 mil-spec data links in a fast-paced environment. Communicated plan of action and risks with key mission stakeholders.
Coordinated with senior management and employees to identify training needs and create training materials. Delivered training sessions and tracked the effectiveness of training programs. Recommened training improvement programs based on feedback.
Directly supervised 14 members. Communicated USAF airspace requirements to the South Korean Air Force.
Supervised all aspects of IT systems upgrades and acquisitions for the $244.4 million E-8C Joint Surveillance Target Attack Radar System (JSTARS) command and control aircraft. Assisted production of Total Systems Support Responsibility (TSSR) for the E-8C with Air Force Life Cycle Management Center (AFLCMC) utilizing FedRAMP, classification guides, and the National Industrial Security Program Operating Manual (NISPOM). Developing and coordinating program acquisition planning, support documentation and program rating. Responsible for managing quality assurance and logistic support, providing recommendations of best practices involved in acquisition program management and identifying potential improvement for processes used in the internal acquisition program. Assessing progress of assigned projects or programs and keeping records of schedules, cost estimates and performance supportability, providing input during source selection, monitoring contractor’s acquisition development up to production and deployment, planning and coordinating activities of logistics, data management and other activities of functional specialists, evaluating program progress, reviewing progress of contractors, taking actions to approve contracts, budgets, terms and other conditions related to the contractor, and ensuring maintenance of documentation.
Analyze training needs to develop new training programs or modify and improve existing programs. Evaluate instructor performance and the effectiveness of training programs, providing recommendations for improvement. Plan, develop, and provide training and staff development programs, using knowledge of the effectiveness of methods such as classroom training, demonstrations, on-the-job training, meetings, conferences, and workshops. Confer with management and conduct surveys to identify training needs based on projected production processes, changes, and other factors.
Documented the performance of 209 aircrew members. Coordinated and facilitated standardization and evaluation processes. Worked with team members to ensure performance evaluations were conducted in a fair, impartial, and objective manner. Analyze training needs to develop new training programs or modify and improve existing programs. Evaluate instructor performance and the effectiveness of training programs, providing recommendations for improvement. Plan, develop, and provide training and staff development programs, using knowledge of the effectiveness of methods such as classroom training, demonstrations, on-the-job training, meetings, conferences, and workshops. Confer with management and conduct surveys to identify training needs based on projected production processes, changes, and other factors.
Verified compliance of junior administrators on computer and network operations aligned with STIGs and organizational policies. Maintained smooth operation of multi-user computer systems, including coordination with network hardware vendors. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources. Ancillary duties may include setting up administrator and service accounts, maintaining system documentation, tuning system performance, installing system wide software and allocating mass storage space. Provides technical leadership to junior administrators through knowledge sharing of computer networking concepts, protocols, network security, system administration concepts, and risk management processes.
Prepared, distributed, and maintained plans, instructions, guidance, and standards concerning the security of classified military network systems. Protected computer systems from unauthorized access, use, modification, or destruction. Communicated security risks to senior leadership.
Oversaw a $196 thousand budget for travel, uniforms, and general purchases.
Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations. Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary. Operate master consoles to monitor the performance of computer systems and networks, and to coordinate computer network access and use
Learn military and leadership principles. Complete technical school geared towards maintaining, troubleshooting, and fixing IT systems. Covered electronic principles, networks, data links, radios, software, and hardware.
Unlike other VPN tools and technologies, Wireguard creates a tunnel interface. It does this outside the official VPN plumbing of Windows. That design has the severe limitation that you need to be an administrator of the machine, but this guide provides a workaround to allow standard users to enable the VPN interface.
Using an email service with aliases help protect you from trackers and ad companies while keeping your other web accounts secure too.
Cryptomator provides transparent, client-side encryption for your file hosting cloud service. Everything you put onto the virtual hard drive ends up encrypted in your vault. Protect your documents from unauthorized access.
Using alternative services and hardening your current applications, you can slow down big brother and corporations from tracking your every move and reading all your personal files.
Installing Pandora on Android ROMs that do not have Google Play Services