Ben Paddock

Information System Security manager at Sumaria Systems, Inc.
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Languages
  • English -

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • GIAC Certified Forensics Analyst (GCFA)
    SANS Institute
    Sep, 2020
    - Oct, 2024
  • GIAC Certified Incident Handler (GCIH)
    SANS Institute
    May, 2020
    - Oct, 2024
  • CISSP
    (ISC)²
  • ITILv3 Foundation
    AXELOS Global Best Practice
  • Project Management Professional (PMP)
    The Project Management Institute (PMI)
  • SSCP
    (ISC)²
  • Security+
    CompTIA

Experience

    • United States
    • Defense and Space Manufacturing
    • 200 - 300 Employee
    • Information System Security manager
      • Dec 2016 - Present

      -Develop and maintain formal Information System Security programs for numerous systems and enclaves -Complete the necessary bodies of evidence for a system to be Authorized To Operate (ATO) -Participate in Change Control Boards for assigned systems -Oversee ISSOs to ensure established policies and procedures are followed -Provide Risk Management Framework (RMF) expertise -Develop and maintain formal Information System Security programs for numerous systems and enclaves -Complete the necessary bodies of evidence for a system to be Authorized To Operate (ATO) -Participate in Change Control Boards for assigned systems -Oversee ISSOs to ensure established policies and procedures are followed -Provide Risk Management Framework (RMF) expertise

  • General Dynamics Mission Systems
    • San Antonio, Texas Area
    • Information System Security Officer
      • May 2016 - Present

      -Validate and assign access permissions for all users based on clearances and site processing levels -Validate and assign approved site processing levels -Review audit logs through both manual and automated (Splunk) means and report annomalous activity -Enforce Enterprise level established security policies -Develop security policies and procedures as required -Create Insider Threat reports showing statistical privileged use data -Generate incident reporting documentation as required -Garner rapport with users and provide a positive customer service experience -Maintain virus definitions to ensure system security -Provide two person integrity as necessary and validate equipment entering and leaving the secure facility

    • United States
    • Defense and Space Manufacturing
    • 1 - 100 Employee
    • Information Systems Security Manager
      • Jan 2014 - Present

      -Responsible for all facets of information security on assigned networks -Implement Risk Management Framework (RMF) -Information Systems Vulnerability management and risk assessment -Assist systems engineering efforts with security compliance regulations -Responsible for all facets of information security on assigned networks -Implement Risk Management Framework (RMF) -Information Systems Vulnerability management and risk assessment -Assist systems engineering efforts with security compliance regulations

  • USSTRATCOM
    • Greater Omaha Area
    • Information System Security Manager
      • Dec 2014 - Mar 2016

Education

  • American Military University
    Computer and Information Systems Security/Information Assurance
    2010 - 2016
  • Johnson University
    Bachelor's degree, Theology/Theological Studies

Community

You need to have a working account to view this content. Click here to join now