Christopher Hill

Cyber Security Specialist at West Virginia National Guard
  • Claim this Profile
Contact Information
Location
Charleston, West Virginia, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Armed Forces
    • 1 - 100 Employee
    • Cyber Security Specialist
      • Oct 2018 - Present

      -ISSO since 2018 -DOD 8570 compliant with CompTIA Security+ and Linux+ -DISA Assured Compliance Assessment Solution (ACAS) certified and trained -ePO/AESS certified and trained -Actively ensures compliance with cybersecurity inspections, tests, and reviews associated with Assessment and Authorization activities and efforts are synchronized and coordinated with effected stakeholders and organizations -Cooperates and works with personnel in planning and developing new or additional infrastructure/architecture capabilities -Knowledge of operational and performance characteristics of data/voice transport to define, coordinate, plan, and satisfy user requirements for equipment -Participate in accreditation/reaccreditation processes to identify and implement standard operating procedures (SOP's) for systems and systems users - Monitor and enforce established Enterprise Cybersecurity policy, State Information Assurance, Cybersecruity, and Accreditation policies to assure compliance of customers utilizing the network - Perform network device configuration and connectivity tasks to include changes, installs and updates, performance monitoring - Investigates security-related incidents, unauthorized device connections, and unauthorized network access to exercise authority for denial of computer access and coordinates re-establishment of service with system owner(s) - Enforces established policy and guidance for all Information Systems Security Officers (ISSO) located throughout the state -Conducts audits of information systems compliance, to include network devices; servers; and end user devices, related to security standards, guides and application updates to enable and ensure accreditation of all systems -Maintains an operational knowledge base of past, current and possible future threats to the security posture by attending courses, conferences, seminars, online research, and information sharing between other Cybersecurity/Information Assurance professionals Show less

Community

You need to have a working account to view this content. Click here to join now