Adam Feldman

Senior Information Systems Security Officer (ISSO) at Raytheon
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Tucson, Arizona, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 1 ratings
  • (1)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Steven Armentrout

I worked with Adam at the CTNOSC for four years. He was always a pleasure to work with. He regularly performed vulnerability assessments on servers I management and was always consistent and communicative at helping me resolve these issues.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Microsoft Certified Professional
    Microsoft
    Apr, 2012
    - Oct, 2024
  • MCTS: 70-640 Windows Server 2008 Active Directory, Configuring
    Microsoft
    Jun, 2011
    - Oct, 2024
  • Security+ CE
    CompTIA
    Feb, 2015
    - Oct, 2024
  • ITIL Foundation
    EXIN

Experience

    • United States
    • Defense and Space Manufacturing
    • 700 & Above Employee
    • Senior Information Systems Security Officer (ISSO)
      • Aug 2018 - Present

      As a Senior Information Systems Security Officer (ISSO) for Raytheon Missiles and Defense:• Design, develop, and recommend integrated security solutions for a multitude of classified systems and projects. • Analyze, audit and coordinate information assurance requirements for networked and standalone systems within environments of varying complexity levels. • Design, develop, and recommend security solutions for platforms with various operating systems. • Participate in interdepartmental projects in a leadership role.• Trains and mentors novice and intermediate ISSOs. • Interface with internal and external Security personnel, customers, management, and U.S. Government representatives where required.•Update POAM, SCTM, DACs and other security artifacts for Continuous Monitoring.• Perform additional IA-related duties as assigned by management on an “as required” basis.• Travel as needed to other business locations to provide necessary cybersecurity support.• Responsible for creating and maintaining certification and accreditation documentation.•Create and submit BoE packages to the customer for ATO extensions.• Ensure system security measures comply with multiple regulatory requirements (e.g. NISPOM, JSIG, JAFAN, DCID/ICD 503, DoD RMF), and accurately assess the impact of modifications, changes, and vulnerabilities for each system where needed. • Conduct reviews and technical inspections to identify and mitigate potential security weaknesses, and ensure that all security features applied to a system are implemented and functional. • Create and maintain all information assurance documentation (e.g. SSPs, Security Profiles, approvals, etc.) for assigned areas.

    • United States
    • Defense & Space
    • 700 & Above Employee
    • Senior Enterprise Administrator
      • Feb 2012 - Aug 2018

      As the lead system and security administrator for the Distributed Development and Test Enterprise (DDTE), I was responsible for securing, managing, and expanding the DNOC DDTE network and its associated enterprise services. System assets included Windows 2008R2, 2012R2, Red Hat Enterprise Linux and VMware ESXI servers, Synology NAS servers as well as Windows 10 workstations, both physical and virtual.• Successfully provided technical leadership on multiple technical implementations and transformations for DDTE projects. Spearheaded the discovery, architecture design, solution development, as well as solution delivery and execution. Additionally, provided knowledge transfer, training and guidance to other members of the system administration team for the DDTE network.• Participated in organizational strategic planning, determine team goals based on emerging trends, customer requirements and community needs.• Experience standing up Domain Controllers, creating Child Domains and establishing Transitive Trusts between DCs.• Experience standing up, updating and managing a VMware environment including ESXI, vCenter, Site Recovery Manager and Replication servers. Utilize vCenter to manage virtual assets and migrate virtual machines between hosts. VMware SRM and Replication servers ensure high availability and disaster recovery.• Successfully implemented and manage DNS servers creating forward/reverse lookup zones and AA records as needed for the DDTE domain.• Successfully implemented and manage a Single Sign-On solution, IDAM. Includes DEIAS and DIAS SIM.• Utilize Group Policy Manager to create, update and maintain STIG policies for Active Directory OUs.Continued in next section

    • Senior Enterprise Administrator
      • Feb 2012 - Aug 2018

      • Utilize Active Directory to create and manage domain user and system accounts and permissions, utilize organizational units to apply policy\STIG settings, and Active Directory Sites and Services to monitor domain controllers for child domains and manage replication between the DCs as needed.• Successfully deploy software builds for new/rebuilt windows servers and workstations. Builds entail operating systems, various software, drivers, STIGS/patches, network configuration settings, and adding systems to the domain. • Experience in installing, configuring, and managing ACAS Security Center with Nessus integrated. Create scan zones, repositories, asset lists, credentials, user accounts, roles, and scan policies within the ACAS Security Center.• Perform routine IA duties including running vulnerability scans via Nessus Vulnerability Scanner and analyzing them with ACAS Security Center. Remediate findings on system assets.• Experience in standing up and managing a WSUS server to push updates to DDTE system assets routinely. Utilize WSUS Package Publisher to push out third-party software updates to DDTE system assets.• Manage and update an HBSS server via McAfee HBSS ePolicy Orchestrator as an anti-virus solution.• Configured PKI on the DDTE network and manage a Microsoft Certificate Authority to create soft tokens. Additionally, create and supply hard tokens offering both as a PKI service to customers.• Manage an IIS Web Servers which includes hosting the DNOC DDTE Web Portal serving as a hub to access the suite of DNOC enterprise services for customers.• Experience in installing, configuring, and managing a Microsoft SQL server (2005, 2008, 2016) to include creating and backing up databases and tying into services such as SolarWinds.Continued in next section

    • Senior Enterprise Administrator
      • Feb 2012 - Aug 2018

      • Successful with installing, configuring, and managing a Microsoft Exchange server to include creating user mailboxes for domain users and utilizing the exchange server with various enterprise services for alerts, notifications, and recorded chat discussions if desired.• Manage a File share Server utilized as a major resource tool by the DDTE community.• Experience in standing up, managing, and updating a SolarWinds server to include NPM, NCM, Netflow Traffic Analyzer, VoIP and Network Quality Manager, and an additional proprietary database for TFA logging. Additionally, utilize SNMP to monitor system assets within SolarWinds.• Provide services nationwide including updating customer systems with Microsoft patches and McAfee antivirus updates via the DDTE WSUS and ePO servers, granting them access to email across the enterprise network, live chat access via the Jabber Server, and offer network scanning capabilities among other enterprise services.

    • IT Services and IT Consulting
    • 500 - 600 Employee
    • Security Administrator (Windows)
      • Apr 2009 - Sep 2011

      Windows Service Management- Security AdministratorAs part of Windows Service Management Team, I was responsible for system security, network security and data security for assigned DoD systems. Duties include scanning of DoD assets including workstations, servers, printers, digital senders, as well as, stand alone systems using Retina Network Security Scanner and DISA Gold Disk, to ensure systems are compliant with DoD, Army STIGs regulations. • Developed and distributed Retina Vulnerability Reports to Administrators. • Assisted the team in corrective action, solution development, as well as consulting the team on appropriate remediation.• Communicated final deliverables and DISA findings through DISA GOLD Disk via uploading into VMS.

    • Server Administrator (Windows)
      • Apr 2008 - Sep 2011

      Windows Service Management - Server AdministratorResponsible for managing and maintaining Windows 2003/2008 Servers within the C-TNOSC via Active Directory and Remote Desktop Connection Manager. •Supported over 200 servers with various builds, as well as added new servers to assigned domains, constantly maintained and configures objects in Active Directory as needed. •Created new user accounts within Active Directory, providing user permissions and granting access to associated groups on servers. •Successfully provided/disseminated software builds for all new windows servers as part of the C-TNOSC. Entailed various software, drivers, patches, network configuration settings, adding servers to the domain, and creating server names to be applied into Active Directory and requesting permanent static IPs to be assigned (unblocked).•Executed security scans via Retina Network Security Scanner to check for vulnerabilities and other security violations for every new server assembled. Verify and analyzes vulnerabilities and eliminates them by installing proper security patches, making changes in the Registry, and/or eliminating sources as needed. •Ensured servers are fully equipped and vulnerability-free prior to adding servers to network. Administrates W2K3/2K8 C-TNOSC servers and troubleshoots occurring issues. Issues range between software and hardware errors, user errors, network setting and domain issues. Additionally, ran daily checks on servers to ensure they are in working order via Remote Desktop Connection Manager as well as Microsoft Operations Manager for constant monitoring. •Utilized APC ITSM and Legacy Remedy to effectively create, log, and update incidents and tasks as needed. Coordinated with other organizations for special projects. •Configured ILOs and DRACs for servers. Drafted TTP’s (technical guides) as needed and submitted for publishing.•Trained new employees on server check/maintenance procedures as needed.

    • System Administrator
      • Oct 2006 - Apr 2008

      Windows Service Management- System AdministratorManaged and maintained internal users within the C-TNOSC via Active Directory and desktop support. Responsible for creating new user accounts within Active Directory, providing proper permissions to users and granting access to particular groups to include share drives. Added new computers to the domain and constantly maintained and configured objects in Active Directory as needed. • Supported over 300 devices and assets including workstations, laptops, printers, and digital senders.• Provided software builds for all new computers for local C-TNOSC users by installing various software, drivers, patches, configuring network settings, adding computers to domain, creating computer names to be applied into Active Directory, as well as requesting permanent static IPs to be assigned and unblocked. • Executed security scans via Retina Network Security Scanner to check for vulnerabilities and other security violations for every new computer assembled and computers within domain suspected of having vulnerabilities. Verified computers were fully equipped and vulnerability-free prior to adding computers to network. Updated database for reference and logging purposes that included assigned IP, MAC Address, assigned user, etc. • Administrated local C-TNOSC workstations and provided trouble shooting for issue resolution. Issues ranged between software and hardware errors, user errors, network setting and domain issues. • Utilized APC ITSM and Legacy Remedy to effectively log and update occurring incidents and tasks and create them as needed. Trained new employees and directed effort for in-processing and obtaining new employee accounts and privileged access.• Responsible for configuring network settings on work stations to DHCP, prepared for re-imaging as a first step towards increased Directorate of Information Management (DOIM) influence.

Education

  • University of Maryland University College
    Computer Networks and Cyber Security
    2015 - 2018

Community

You need to have a working account to view this content. Click here to join now