Você está na página 1de 6

Emanuel Payton 202-423-4902 SUMMARY

Mr. Payton is an exceptional professional with experience with Enterprise Architecture, Business Continuity, Information Security, Disaster Recovery, Information Assurance skills in support of computer networks and IT security, to include all aspects of certification and accreditation of multiple platforms.

EDUCATION
PhD., IT emphasis INFOSEC, Information Assurance, Capella University; Dec. 2012 Master of Science, Information Security Management, Trinity College, May 2008 Bachelor of Arts, Computer Science, Morehouse College, 1985 Graduate Diploma, Naval War College, 1990

TRAINING/CERTIFICATIONS
Certified Business Continuity Planner (CBCP) Member of the Business Continuity Institute (MBCI) Certified Information System Security Representative (CISSR) for NRO, May 1997 Certified ISSO via FBI training academy 2006

CLEARANCE
Department of Defense, Top Secret/SCI (CI-Poly)

WORK EXPERIENCE
SMS Data Products Group, Inc., July 2011 Present, Sr. IT Consultant
Provide insight for DHS clients regarding Business Continuity Planning for the organization to include COOP development, identification of critical assets and personnel, testing of current COOP documents, updates to documentation as necessary. Participate in any planned Eagle Horizon testing events. Help report metrics on BC/DR compliancy to OCIO management. Assist in driving Business Continuity concepts across OCIO offices. Demonstrated a systematic understanding of the following core competencies: IT concepts, principles, methods, and practices ; The mission and programs of DHS OCIO offices; IT Information Assurance principles and methods; IT BC/DR requirement analysis principles and methods; New and emerging information technologies and/or industry trends; Analytical BC/DR methods and practices; Program Management principals and methods; and Oral and written communication techniques Receive user requirements for telecommunications services and products. Design network solutions in accordance with those requirements which fit schedule, performance and budget constraints. Identify communications hardware and software interdependencies and resolve conflicts as appropriate. Manage large scale communications project implementations and migrations.

Emanuel Payton
Page 2 of 6

202-423-4902

Survey new communications technologies and service price trends and recommend changes to network architecture and topology as appropriate. Establish the necessary communications hardware and software infrastructure as necessary to support network applications including e-mail, file transfer, etc. Act as second level problem determination support for operations personnel.

Preferred System Solution (IT Infrastructure Operations), August 2010 July 2011; Disaster Recovery - Application/Technology Specialist
Requirements definition, facility design, and planning and implementation are the cornerstone skills required for this effort. Worked with open-systems application and infrastructure teams to coordinate Disaster Recovery (DR) tests on UNIX and Windows server environments. This includes: Identify and engage ITO teams in DR and Business Continuity (BC) planning functions. Provide awareness of BC and DR teams. Steer IT teams in DR testing using resources hosted in the Dearborn datacenters. Coordinate equipment and resource requirements for DR tests. Facilitate the failover and failback testing of high-end infrastructure and applications. Participate in any planned data center failover testing events. Help report metrics on BC/DR compliancy to ITO management. Assist in driving Business Continuity concepts across IT.

Centauri Solutions, December 2009 August 2010; Sr. Disaster Recovery Planner
Senior Disaster Recovery Planner for Defense Intelligence Agency responsible for Business Continuity Management (BCM) program which included both business continuity planning and disaster recovery planning for a client with a world-wide footprint. This required a unique approach that involved training, notification, crisis management, resumption, etc. efforts.

NCI Information Systems, 2008 April 2009; IT Consultant


Responsibilities included providing support to the Air National Guard (ANG) customers, by insuring the confidentiality, integrity, and availability of systems, networks, and data. Ensured that ANG customers are in compliance with policies, directives, instructions, and guidance prescribed by Congress, DOD, Air Force ANG, and Office of Management Budget (OMB). Demonstrated a systematic understanding of the following core competencies: IT concepts, principles, methods, and practices ; The mission and programs of ANG customer organizations; The ANG's Enterprise Architecture framework; IT Information Assurance principles and methods; IT requirement analysis principles and methods; COTS/GOTS products and components; Enterprise Information Technology Data Repository (EITDR) compliance; New and emerging information technologies and/or industry trends; Acquisition management policies and methods; Analytical methods and practices; Program Management principals and methods; and Oral and written communication techniques

General Dynamics Information Technology, 2007-2008; Enterprise Architect


Provide insight for clients regarding Enterprise Architecture and Information Security for the organization to include COOP development, artifacts development of System Interface Diagram, System Communication Description, System Interface Matrix, System Data Flow Diagram, System/Operations Matrix, Systems Data Exchange

Emanuel Payton
Page 3 of 6

202-423-4902

Matrix, System Performance Matrix, System Evolution Diagram and Web Application Diagram. Helped to develop Federal Enterprise Architecture Service Reference Model artifacts for the customer as well as testing of current COOP documents, updates to documentation as necessary.

PAE Consulting, Inc., 2007; Senior Business Continuity Consultant


Provide insight for clients regarding Business Continuity Planning for the organization to include COOP development, identification of critical assets and personnel, testing of current COOP documents, updates to documentation as necessary.

SRA International, 2006; Senior Disaster Recovery Planner


Provided disaster recovery planning and IT contingency planning to the CIO for the GAOs Information Systems and Technology Services Division. Supplied the leadership for the relocation of the backup site to a more secure location. Maintain a level of engagement with upper management regarding COOP planning for the possible Pandemic crisis. Supported efforts to increase the level of training in the area of awareness for the entire agency.

Computer Science Corporation, 2005; Senior Information System Security Representative


Provided support to Federal Bureau of Investigations systems for FISMA compliance and System Security Planning for more than 80 systems. Main point of contact for Certification & Accreditation packets for these systems. Supported table topic exercises for each of these systems as scheduled. Graduated from the FBIs Academy training for ISSOs at Quantico, Virginia per clients requirement.

Veterans Administration, 2004; COOP Consultant


Provided Continuity of Operations (COOP) management consulting to the Enterprise Architecture team as an independent contractor. Evaluated level of preparedness of the organization for COOP events at VA Headquarters and Chinatown locations.

Mahoning County (Youngstown, Ohio) Democratic Headquarters, 2004; Field/Volunteer Coordinator


Met with community leaders, and coordinated volunteer groups to increase the number of registered voters. Implemented the DNC vision by integrating strategic goals, priorities, and values of the DNC. Scheduled volunteers and interns. Provided customer service to all staff. Maintained general administrative and technical oversight

Democratic National Convention Committee, 2003 2004;Deputy Director of Technology


Explains, advocates and expresses facts and ideas (both orally and in writing) in a convincing manner to a diverse group of contractor engineers, including multiple disciplines, Systems Architecture, & Protocol Architecture to include CISCO, Microsoft, Blackberry, IBM, etc. Provided daily reports to the Director of Technology to develop and implement the organizational vision by integrating strategic goals, priorities, and values of the DNCC.

Emanuel Payton
Page 4 of 6

202-423-4902

Scheduled volunteers and interns. Maintained Vendor accountability. Provided customer service to all staff. Negotiates with individuals and groups both internally and externally when needed. Maintains general administrative and technical oversight. Supports direction of functional departments for Overall Architecture, Protocol Architecture, Physical Layer Architecture and RF Systems. Defines overall IT security functions and performance requirements, as well as high-level Security design requirements.

Booz Allen Hamilton, Inc., 2002 2003; Associate


Conducted computer security evaluations and develops computer security plans. Interfaces with clients to conduct requirement analyses, reviews system security plans, and develops client questionnaires to gather information and dispel misinformation. Conducted site visits to determine security enhancements or improvements and then briefs clients on recommendations for improving their computer security. Examined ways to secure computer software (encrypting). Analyzed client installed software security measures. Ensured user adheres to sound security practices. Confirmed security procedures are present and properly configured. Conducted evaluations to ascertain sufficient software security to protect sensitive client information. Performs risk assessments to examine clients physical environment to assess clientidentified vulnerabilities. Interviews technical staffs to assess system vulnerabilities and identify possible threats to system integrity or data.

Sprint E-Solution, November 1999 August 2002; Technical Solutions Consultant


Serves as an Information Security generalist with a background in enterprise level security, security process re-engineering and managing security practices to maximize the IT investment to enable and maintain business goals and objectives. Provided services to both the Federal Government, as well as Commercial clientele.

J.G. Van Dyke/Wang Government Systems, 1999; Senior Information Security Engineer
Served as Task Leader for Army Backdoor Initiative to detect the five categories of backdoors on the clients UNIX, NT and DOS based LANs. Provided Certification and Accreditation support for the Pentagon Renovation Project for the various backbone networks and the worldwide Army Lodging system.

Executive Security & Engineering Technology, Inc., (ESET), 1998; Senior Management Analyst
Made recommendations for consolidating or developing information security systems (ISS) policy, and reviewed and recommended ISS solutions based on major products for various INFOSEC tasking. Coordinated tasks between various team members to meet deliverable deadlines. Worked independently or under only general direction to compile, analyze, and monitor quantitative information regarding the progress and compliance of program activities. Lead instructor for the Certified Information System Security Professional study course held in house. Developed and evaluated policies and business practices associated with migration strategies.

Lockheed Martin Management & Data Systems, October 1995 - October 1998; Senior Electronic Information Security Specialist
Responsible for the day-to-day operations for Information Security at the customer site. Interacted daily with customer to consult on a wide variety of technical issues

Emanuel Payton
Page 5 of 6

202-423-4902

involving Windows NT, UNIX, Firewall evaluation, Virus Detection, Security Investigations, removal of sensitive equipment from the site, etc. Responsible for Information Security Engineering in a networked environment using IBM 3090/Es9000, SUN and PC systems. Supported all facets of operations to include physical security, product production, communications security, personnel security, software upgrades, etc. Provided technical support and analysis of current and proposed system architectures, and security capabilities. Evaluated new security products and security audits. Responsible for security audits, configuration controls of security systems and as required, design security for current information systems. Led a team of three junior Information Security Specialists via delegation of duties and daily guidance. Monitored local system usage and audit trails. Responsible for reviewing proposals for any additions, modifications or deletions of security access information. Assisted with IC&T preparation activities and tests for all involved sites.

Booz Allen & Hamilton, Inc., 1994; Senior Consultant


Conducted computer security evaluations and developed computer security plans. Interfaced with clients to conduct requirement analyses, reviewed system security plans developed client questionnaires to gather information and dispel misinformation. Conducted site visits to determine security enhancements or improvements and then briefed clients about recommendations for improving computer security. Examined ways to secure computer software (encrypting). Analyzed client installed software security measures. Ensured user adherence to sound security practices. Confirmed that client built-in security procedures were in place and properly configured. Conducted evaluations to ascertain whether software security was sufficient to protect sensitive client information. Performed risk assessments examining the clients physical environment to assess client-identified vulnerabilities. Interviewed client technical staffs to assess system vulnerabilities and to identify possible threats to the system integrity or data.

U. S. Department of Agriculture (USDA), April 1993 - November 1994; Computer Specialist


Project leader for automated processing projects, which involved USDA policy initiatives, technical procedures and security standards. Performed site visits to assess remote sites compliance with USDAs Information Resources Management requirements. Acted to negotiate agreements to standardize automated data processing systems so connectivity could be provided and departments could communicate with other USDA departments. Evaluated different software packages to determine the best method for providing connectivity between two disparate departments. Evaluated USDA policy to determine if it should be adapted to maximize department compliance with Information Resource Management (IRM) regulations. Coordinated the automated data processing procurement process for USDA. Initiated, devised and directed new IRM and ADP policies covering systems,

Emanuel Payton
Page 6 of 6

202-423-4902

information security, data administration, system standards development, and CASE tools use and to help standardize the hardware and software procurement process.

Naval Surface Warfare Center (NSWC), February 1986 - April 1993; Computer Security Officer
Disseminated Navy computer security requirements information to NSWC personnel; conducted quarterly meetings; showed educational films; booked experts in computer security to present seminars on password maintenance, encrypting, and determining what constituted a security vulnerability, threat, etc. Provided technical direction and guidance to laboratory and field personnel in the areas of computer security research, design, and implementation and testing. Supported design, code requirements; and verification analyses and testing of software security packages developed by outside contractors and other agencies. Conducted pre-acquisition software evaluations; installed and tested software upgrades on large-scale machines and microprocessors; assisted in customizing control and computational software; and advised users, managers and contractors on information security technical issues.

OTHER ACCOMPLISHMENTS
External Publications: Laptop Security, Direct Wire Magazine, 8/1998; Windows 95 verses Windows 98, A Comparison; Direct Wire Magazine, 10/1998 Internal Publications: Lockheed Martin, 1997 Internet Policy for Customer Site; Standard Operating Procedures for Virus Detection; Area Security Plans; Risk Assessments and a number of existing policy updates or rewrites Speaking Engagement: Connected International Meeting Professionals Association (CIMPA) Las Vegas, Nevada, 11/1998; Bangkok, Thailand, 10/2000; Assumption University and Chulalongkorn University, Cairo, Egypt, 1/2002; Amsterdam, Holland, 09/2002; Lisbon, Portugal 11/2003; Athens, Greece, 10/2005; Prague, Czech Republic 10/2006, Beijing, China 02/2008. Organizations: National Contractors Automated Information System Security Working Group (CAISSWG), 1996, Contingency Exchange, DC Chapter 2006, Association of Contingency Planners, 2007 Honors Outstanding Young Men of America, 1984 Whos Who Among Young Men in America, 1990 Connected International Meeting Planners Association, Friendship Corps Award for ten years of service 2006

Você também pode gostar