Você está na página 1de 2

William John Kraemer

www.linkedin.com/in/williamkraemer www.twitter.com/William2045
Page 1 of 2

Master of Professional Studies in Cybersecurity May 2015
University of Maryland, Baltimore County (UMBC) Baltimore, MD

Master of Information Technology
Concentration in Project Management November 2009
Concentration in Internet Security July 2008
American InterContinental University Hoffman Estates, IL

Associates in Applied Science in Data Assurance and I.T. Security August 2007
Associates in Applied Science in Cisco Networking August 2007
Visual Basic Programming Certificate May 2007
Associates in Applied Science in PC Networking (Microsoft, Novell) May 2002
PC Service & Repair Certificate, December 2001
Web Master Certificate, August 1999
Rock Valley College Rockford, IL

Bachelors of Science in Biology, Social Science and Philosophy May 1995
Rockford College Rockford, IL


I am pursuing opportunities such as Cybersecurity Analyst, Intelligence Analyst, CNO Network Analyst/Penetration Tester,
Threat Intelligence/Intrusion Analyst, InfoSec Engineer, Network Security Lead or Information Security Ops.
Analyst/Engineer. As I complete my degree, internship or entry level work in these areas is welcome.

Core Competencies:
Forecasting trends in technology and geopolitical events
Analytical problem solving
Technical team building for a focused, results oriented group
Skilled communicator of both general and technical concepts
Training, teaching and presenting to staff

Cybersecurity Graduate Student 08-2013 to 05-2015
University of Maryland, Baltimore County (UMBC) Baltimore, MD

Gained an overview of main technical topic areas of cybersecurity in CYBR 620
Analyzed, researched and discussed definitions of, rationales for and methods of cyberwarfare in CYBR 621.
Learned global geopolitical cybersecurity trends in CYBR 621 and CYBR 622.
Applied and discussed cyber law and policy as it relates to freedom of speech, contracts, criminal statutes,
jurisdiction, national security and the role of the courts, legislature and executive branches in shaping new laws,
policies and enforcement of existing laws in CYBR 623.
Discussed best practices of incident response; real world trade offs in CSIRT and CERT team policies and
simulated an international security incident and responses to it via critical infrastructure sectors in CYBR 650.
Explored different styles of leadership within engineering/technical management and optimal means of
communication in many different situation scenarios within a corporate environment in ENMG 656.
William John Kraemer
www.linkedin.com/in/williamkraemer www.twitter.com/William2045
Page 2 of 2

IT Associate Service Desk Technician & Trainer 02-2005 to 07-2013
Career Education Corporation Elgin, IL
Analyzed computer behavior and error messages to determine the most likely root causes of the technical issues
reported from faculty and students of the supported virtual campuses as well as the PC and MacOS X software
required for curricula offered.
Performed troubleshooting for online applicants, students and faculty regarding the access and functionality of
the virtual campuses in which they are taking or teaching courses.
Documented and escalated calls that were new and unique issues to relevant I.T. departments using the
Technical Support intranet Student Manager and Faculty Manager Web applications, a virtual campus instant
messaging system and Avaya phone system.
Taught new Tech Support Specialists the tools and techniques used for virtual campus troubleshooting via
classroom-like demonstrations, Office Communicator instant messages and other informal means.

Advisory Board volunteer member 03-2012 to Present
Lifeboat Foundation Minden, NV
Participate in discussions on possible futures including benefits we should try to achieve and risks we should try
to avoid with the Futurist Board.
Engage others regarding the advances in Robotics and AI and the dangers and benefits of these technologies with
the Robotics/AI Board.
The foundation works to identify existential risks to humanity and possible misuse of increasingly powerful
technologies. Members discuss the issues and scenarios in the Foundations Blog site primarily.

Microsoft SQL Server 2005/2008, Windows Server 2000, Office 2010, Adobe Creative Suite 5.5 Photoshop, Dreamweaver,
etc. and various Web services

PC desktops, laptops, smartphones, Cisco routers/switches, Linksys VPN routers

Operating System
Win 8.1, 7, Vista, Win XP Pro, Windows 2000, Windows NT, Windows 98, Windows 95, Cisco IOS and Cat OS for routers
and switches respectively, MacOS X v. 10.5, Red Hat Linux

To Interface the Future: Interacting More Intimately with Information. (6)2 Journal of Geoethical Nanotechnology.
http://www.terasemjournals.com/GNJournal/GN0602/kraemer.html December 2011
Mapping the Mind to Merge with Machines: Experimental Research Approaches to Brain Computer Interfaces (BCIs):
http://lifeboat.com/blog/2012/10/mapping-the-mind-to-merge-with-machines October 2012

IEEE (Institute of Electrical and Electronics Engineers)
PMI (Project Management Institute)
ISSA (Information Systems Security Association)

Tae Kwon Do 1992-2014
Third Degree Black Belt in Tae Kwon Do
Certified Referee in Tae Kwon Do
Taught Tae Kwon Do at college and a private academy.