Stephanie T.

Professor of Cybersecurity at Defense Acquisition University
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Washington DC-Baltimore Area
Languages
  • English Native or bilingual proficiency
  • Mandarin Limited working proficiency
  • Spanish Limited working proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • CompTIA Security+ ce Certification
    CompTIA
    Aug, 2018
    - Oct, 2024
  • Certified Data Privacy Solutions Engineer
    ISACA
    Jul, 2020
    - Oct, 2024
  • Certified Information Systems Security Professional (CISSP)
    (ISC)²
    Feb, 2020
    - Oct, 2024

Experience

    • United States
    • Defense and Space Manufacturing
    • 400 - 500 Employee
    • Professor of Cybersecurity
      • Apr 2021 - Present

    • United States
    • IT Services and IT Consulting
    • Associate Researcher Fellow
      • Jan 2019 - Present

      Associate Research Fellow and member of the Cybersecurity Policy committee which focused on research in Cyber Intelligence, Penetration Testing, Software Threat Analysis and military cybersecurity operations. Associate Research Fellow and member of the Cybersecurity Policy committee which focused on research in Cyber Intelligence, Penetration Testing, Software Threat Analysis and military cybersecurity operations.

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Cyber Systems Operation / Mission Defense Team Sergeant
      • Dec 2017 - Present

      • Successfully configured and deployed all required hardware and software for SOC analysis and monitoring operations while providing core SOC services by guiding efforts on network mapping, reconnaissance, enumeration, scanning, and vulnerability discovery leading to the protection of over $545M of military assets. • Conducted a Function Mission Analysis on the on critical networks operating in the cyber key terrain, leading to the briefing of high-level officers with vulnerability findings and risk mitigation strategies for asset protection.• Worked with team to preform cyber discovery and counter-infiltration (threat hunt) actions that detect, illuminate, and respond to threats on information systems and providing leadership with network incident response impact assessments and network security posture assessments for protection of critical national infrastructure. Show less

    • Client Systems Technician
      • May 2016 - Dec 2017

      • Preformed Administrator functions. Operated Active Directory to create, modify, delete, provision, and deprovision users, security groups, distribution groups, organizational boxes and email accounts.• Performed drive (storage media) disposition/wiping/purging using approved software (UPT) to include drive degaussing, destruction, and incineration actions. Maintaining media chain of custody, documentation collection/creation and maintaining archived databases for IA compliancy

    • Security Force Specialist
      • Apr 2014 - Jul 2016

      Utilized and provided training on identification and surveillance systems such as Z backscatter, CCTV, DBIDS(Defense Biometric Identification Database System) scanners in conjunction with CAC and PIV Cards. Handled and implemented the use of combat communication and tracking systems such as The Blue Force Tracker System, AN/PSN-11 (Precision Lightweight GPS Receiver), SINCGARS VHF radios, EPLRS (Enhanced Position Location Reporting System), MT-2011 satellite transceiver, AN/PSC-5 Satellite Radio Terminal and HAVEQUICK Frequency Hopping system. Provide armed Airbase Defense to ensure combat capability through the functions of physical security. Monitored security systems to identify and neutralize security threats in real time Operated MRAP (Mine-Resistant Ambush Protected) vehicles to conduct anti-terrorist measures and perimeter security patrols. Provided and Trained military personnel in proper search procedures in regards to IEDs (Improvised Explosive devices), personnel searches, vehicle searches and building searches. Show less

    • United States
    • Defense and Space Manufacturing
    • 700 & Above Employee
    • Senior Information System Secuity Officer
      • Mar 2020 - Aug 2021

      Intelligence and Security Command (INSCOM) Create and develop various information systems security procedures and process maps to promote, compliance, auditing, security plan development, and conducted self-inspections of cyber hygiene to certify that systems in accordance with the ICD 503 and NIST SP 800-53 Verify ATOs and research the implementations of information systems as the Information Assurance approval authority to grant a particular information system the ability to be added to TS/SCI and secret networks. Enforce guidance and utilize security tools to ensure that all sensitive defense information systems are protected against espionage, sabotage, fraud, misappropriation, misuse, or inadvertent or deliberate compromise. Enforced IA policy, guidance, and training requirements. Implemented Information Assurance Vulnerability Management (IAVM )dissemination, reporting, and compliance procedures. Examined that log files and audits are maintained and reviewed for all systems and that authentication (for example, password) policies are audited for compliance. Prepared, distributed, and maintained plans, instructions, and SOPs concerning system security. Reviewed and evaluated the effects on security of system changes, including interfaces with other information systems and document all changes. Verified that all information systems are within their area of responsibility are certified, accredited, and reaccredited. Monitored system recovery processes are and ensured that security features and procedures are properly restored. Preserved current software licenses and ensured security related documentation are current and accessible to properly authorized individuals. Reported security violations and incidents to the servicing RCERT in accordance with Section VIII, Incident, and Intrusion Reporting Show less

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • GRC and Security Consultant
      • Jun 2019 - Dec 2019

      • Lead and coordinated a full-interruption disaster recovery test of a financial institution with assets over $10 billion and 30 locations, resulting in successful asset recovery and meticulous documentation of lessons learned, which encouraged the updates of the in-place Disaster recovery plan and Business Continuity Plan. • Drafted policies for a Business Litigation firm utilizing the structure and format of ISO/IEC 27002 while integrating the business obligations, regulatory requirements, senior management needs, and legal team contributions; Resulting in the acceptance of over ten policies and changes in the information security program. • Co-developed a Robotic Process Automation (RPA) audit work plan by coordinating with internal audit, the center of excellence (COE), and senior management. This led to the gathering of documentation and information affecting over 250 processes, controlled by over 50 robots deployed at an asset management firm. • Initiated the process of conducting HIPAA Gap analysis for a medical software application technology company by establishing communication, creating and sending audit request lists, and analyzing the documents provided. Show less

    • Israel
    • Software Development
    • 700 & Above Employee
    • Web Development Platform (Product) Operations Monitor
      • May 2018 - Jun 2019

      • Reported events and incidents impacting the availability, security, and performance of the platform by creating dashboards and utilizing data visualization tools to monitor applications analytics and server logs. Investigations and identifications of anomalies and alerts errors in postmortem reports led to the visibility of flaws in the application, service, API, or recent update resulting in production or rollback, hotfixes for resolution. • Researched improvements to Wix Artificial Design Intelligence by enhancing communication between developers and the customers though conducting voice and electronic communication analysis gathered from the customer support team. Reported performance and usability issues after recreating, documenting, and testing the ADI interface, product design, input fields, and embedded elements and resulting in A/B test, GA and live releases.• Solved issues for over ten thousand websites by applying knowledge of SSL certificates, web application coding (HTML, CSS JavaScript) database collection management, security software, network architecture (routers, firewalls), and DNS configuration affecting website availability. Investigated issues by utilizing information-gathering tools and methods such as (tracert, ping, WhoIs, Dig) and by recreated issues in a sandbox. Show less

    • Artificial Design Intelligence (ADI) Communication Lead
      • Jan 2017 - Jun 2019

      • Provided dialogue between customer support team and developers in an agile development environment to enhance process improvement, product development and effective delivery for customers. • Conducted voice analysis and electronic communication analysis to investigate customers’ needs and identify the need for the development team to improve the product. • Tested product design, input fields, and embedded API elements for performance, usability, and security flaws.

    • Advanced Technical Support
      • Sep 2016 - Jun 2019

      • Investigated website availability issues by utilizing information gathering tools and methods such as tracert, ping, DNS resolvers, WhoIs, Dig, and Propagation trackers. • Implemented knowledge of JavaScript, CSS, and HTML to provide web site support for customers. • Provided technical support with Wix Corvid (a serverless, open development platform), by troubleshooting issues with built-in IDE, database collection management, JavaScript Fetch APIs, Release candidates and module functionality ( ESES2015, ES2017 features/ syntax) • Configured DNS records (such as MX, CNAME, TXT, A, SPF, SRV, and nameserver records) to solve domain issues, As well as troubleshooting SSL certificate issues. Show less

    • United States
    • Software Development
    • 700 & Above Employee
    • PC Technician
      • Oct 2014 - Jan 2015

      Seasonal position through Tek Systems •Provided installation support and services to setup, installation, moves, adds, and changes for PC hardware and software • Provided IT support at local and remote audio and videoconferences when needed • Helped end users with hardware, software, cables, networking and operational support requirements in keeping with industry standard practices • Investigated and examined technical problems in various computer systems. • Utilized exceptional knowledge of LAN and WAN. Show less

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Master-At-Arms
      • Apr 2010 - Apr 2014

      •Dispatched personnel from Base Defense Operations Center; while monitoring intrusion/ detection and submitted police blotters, reports, and related documents to allow for quick action from incident response teams. Utilized identification and surveillance systems such as CCTV, DBIDS(Defense Biometric Identification Database System) scanners in conjunction with CAC and PIV Cards. Enforced rules and regulations, and conducted fire and security patrols; Conduced searches related to safety and security of vehicles, facilities, property and person for contraband, health hazards, safety and security violations. Sorted and distributed unclassified, classified, and secret incoming communication data in daily task. Preformed collateral duty as a medical coordinator with the responsibility of ensuring the medical readiness of security forces. Performed sentry duties on military installation Everett Naval station. Enforced rules and regulations, conduct fire and security patrols; Oversee urinalysis programs and anti-drug programs. Show less

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Tactical Operation Specialist for Customs Boarder Clearence Agent Mission
      • Apr 2013 - Oct 2013

      Sorted and distributed unclassified, classified, and secret incoming communication data, including faxes, letters and emails. Worked in a secure environment to preserve classified information and communication being transmitted and used. Filed and recorded command sensitive documentation, electronic files, inventories and reports. Provided training and orientation to new command. Inspect and certify that DOD-owned material, personal property, equipment and passengers are acceptable for entry into the United States and meet the Customs Border Patrol and United States Department of Agriculture clearance requirements. Track the movements of personnel, organized data, and execute administrative tasks in a Tactical Operations Center. Preformed duties as the fire warden to inspect berthing areas for hazards. Show less

    • United States
    • Health, Wellness & Fitness
    • 100 - 200 Employee
    • Minority Achievement Program Lead
      • Sep 2012 - Feb 2013

      •Motivate and support minority and immigrant high school students to achieve higher educational and career goals. •Prepared the course material to review the subjects of English, Math, Biology, History and Computer Science. •Assisted students with integrating into the North American educational system. •Motivate and support minority and immigrant high school students to achieve higher educational and career goals. •Prepared the course material to review the subjects of English, Math, Biology, History and Computer Science. •Assisted students with integrating into the North American educational system.

    • Canada
    • Civic and Social Organizations
    • 1 - 100 Employee
    • Praticum Teacher
      • Apr 2012 - Aug 2012

      •Utilized adult teaching methods to instruct and create curriculum for an adult multi-level classroom with special needs students. While accommodating students interests in lesson plans •Instructed a multi-cultural beginner and intermediate adult classroom in the English language and North American customs. •Assessed reading, writing and communication skills to identify skill levels and needs to advance skills. •Utilized adult teaching methods to instruct and create curriculum for an adult multi-level classroom with special needs students. While accommodating students interests in lesson plans •Instructed a multi-cultural beginner and intermediate adult classroom in the English language and North American customs. •Assessed reading, writing and communication skills to identify skill levels and needs to advance skills.

Education

  • St. Thomas University
    Executive Doctorate, Business Administration in Information Security
    2019 - 2024
  • St. Thomas University
    Master of Science - MS, Cyber Security Management
    2017 - 2018
  • Trinity Western University
    Bachelor of Arts (B.A.), Applied Linguistics
    2010 - 2014
  • Columbia College
    Associate's degree, General Studies
    2013 - 2014

Community

You need to have a working account to view this content. Click here to join now