Josh Dill
Cybersecurity Compliance Lead at Defense Security Cooperation Agency- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Adam Hooper, DSc
Josh has proven himself to possess great technical skills through his desire to learn and his drive to complete any task. I have witnessed Josh stepping up to bat when others would not step forward, and getting involved regardless of available accommodations. He is constantly working toward gaining his next certification and shows great ability through every project he completes.
Paul Lubold
Josh was a very valuable employee. His detail oriented approach to new technology was a pleasure to work with. Josh thrives to learn and grow professionally all the time. He would be a valuable asset to any team.
Adam Hooper, DSc
Josh has proven himself to possess great technical skills through his desire to learn and his drive to complete any task. I have witnessed Josh stepping up to bat when others would not step forward, and getting involved regardless of available accommodations. He is constantly working toward gaining his next certification and shows great ability through every project he completes.
Paul Lubold
Josh was a very valuable employee. His detail oriented approach to new technology was a pleasure to work with. Josh thrives to learn and grow professionally all the time. He would be a valuable asset to any team.
Adam Hooper, DSc
Josh has proven himself to possess great technical skills through his desire to learn and his drive to complete any task. I have witnessed Josh stepping up to bat when others would not step forward, and getting involved regardless of available accommodations. He is constantly working toward gaining his next certification and shows great ability through every project he completes.
Paul Lubold
Josh was a very valuable employee. His detail oriented approach to new technology was a pleasure to work with. Josh thrives to learn and grow professionally all the time. He would be a valuable asset to any team.
Adam Hooper, DSc
Josh has proven himself to possess great technical skills through his desire to learn and his drive to complete any task. I have witnessed Josh stepping up to bat when others would not step forward, and getting involved regardless of available accommodations. He is constantly working toward gaining his next certification and shows great ability through every project he completes.
Paul Lubold
Josh was a very valuable employee. His detail oriented approach to new technology was a pleasure to work with. Josh thrives to learn and grow professionally all the time. He would be a valuable asset to any team.
Credentials
-
CISSP
-Jun, 2016- Nov, 2024 -
CCNA
CiscoMay, 2018- Nov, 2024 -
Security+
CompTIA
Experience
-
Defense Security Cooperation Agency
-
United States
-
Armed Forces
-
200 - 300 Employee
-
Cybersecurity Compliance Lead
-
Sep 2021 - Present
-
-
-
Chickasaw Nation Industries, Inc.
-
United States
-
Government Relations Services
-
500 - 600 Employee
-
Information System Security Manager (ISSM)
-
Jan 2020 - Sep 2021
-
-
-
General Dynamics Information Technology
-
IT Services and IT Consulting
-
700 & Above Employee
-
DoD Firewall Engineer
-
Jun 2017 - Jan 2020
-
-
-
Akira Technologies
-
United States
-
Information Technology & Services
-
1 - 100 Employee
-
DoD Firewall Engineer
-
Jun 2016 - Jun 2017
-
-
-
-
Network Security Specialist
-
Jun 2015 - Jun 2016
• Provide network security for two datacenters, 20,000 users, numerous state agencies and business partners • Technical Lead on $7 Million Firewall Hardware and Software Migration • Design, configure and supports core security network infrastructure which includes Checkpoint 61000/41000 appliance firewalls, IPS, VPNs and Bluecoat proxy and antivirus • Created over 30 security procedures, policies, and recommendations to standardize work and provide training for new hires • Works cross-functionally with various departments to better understand business applications and processes to better provide end-to-end security • Performs vulnerability and risk assessments through multiple sources and tools and present findings and suggested corrective to management • Work with third party SOC and Security Event Information Manager (SEIM) to help strengthen event correlation between network security equipment to identify attacks in real time and reduce false positives Show less
-
-
-
Volvo Group
-
Sweden
-
Motor Vehicle Manufacturing
-
700 & Above Employee
-
Service Runtime Manager
-
Jun 2012 - Jun 2015
•Oversaw all IT aspects of a multi-million dollar campus expansion for the Sales and Marketing Department from Asheville North Caroline to Shippensburg, Pennsylvania•Managed a team of five responsible for the Infrastructure and Operations of Volvo Construction Equipment (VCE) North America•Participate in a Change Advisory Board (CAB) to properly manage any change in the production environment•Single Point of Contact for all direct and indirect changes that may affect factory production•Perform risk assessment for IT operations including network infrastructure, servers, and third party applications•Drive resolution of major incidents that affect site production•Provide project management for all IT projects Show less
-
-
Network Planning Analyst
-
Apr 2010 - May 2012
• Design and Implement network solutions to help improve customers business processes• Create Statements of Work to capture scope of projects, deliverables, costs and time lines to customers that outsource their infrastructure to Volvo IT• Handle tasks related to budget preparation for IT related projects and expenses• Provide network support in resolving complex incidents across the globe
-
-
-
-
Network Security Monitor
-
Mar 2009 - Apr 2010
• Received Top Secret Clearance to manage the network and security environment of over 30 Department of Defense sites •Configured Cisco and Checkpoint equipment using Security Technical Implementation Guides (STIGs) •Utilized Solarwinds to proactively provide SNMPv3 device monitoring •Vulnerability Scanning and Mitigation using Retina • Received Top Secret Clearance to manage the network and security environment of over 30 Department of Defense sites •Configured Cisco and Checkpoint equipment using Security Technical Implementation Guides (STIGs) •Utilized Solarwinds to proactively provide SNMPv3 device monitoring •Vulnerability Scanning and Mitigation using Retina
-
-
-
Verizon Business
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
Network Manager
-
Mar 2008 - Mar 2009
Provide proactive network management and support to state agencies that outsource their network infrastructure to Verizon •Cisco ISR Routers •Cisco Catalyst Switches •Cisco ASA Firewalls •Kiwi CatTools Provide proactive network management and support to state agencies that outsource their network infrastructure to Verizon •Cisco ISR Routers •Cisco Catalyst Switches •Cisco ASA Firewalls •Kiwi CatTools
-
-
-
Pennsylvania Office of Attorney General
-
United States
-
Law Enforcement
-
400 - 500 Employee
-
IT Security Architect
-
Jun 2005 - Mar 2008
Helped to implement, maintain and troubleshoot various features of Active Directory including, DNS, DHCP, Group Policy, and Printing. Increased network performance and application speed by implementing Riverbed Steelhead WAN Optimization devices. Developed policies and deployed technologies to help secure the network infrastructure in order to provide an acceptable level or risk that did not impact the functionality and productivity of business work flow. Security Technologies included Cisco NAC, Cisco CSA, Cisco MARS, Group Policy, McAfee Epolicy Show less
-
-
-
-
Information Analyst
-
Sep 2004 - Mar 2005
NCFTA brings together local, state, and federal law enforcement, businesses, and academic institutions to functionally collaborate on cybercrime issues. It establishes jointly developed and staffed facilities, where program participants benefit from cyber-forensic analysis, tactical response development, technological simulation/modeling analysis, and the development of advanced training. NCFTA brings together local, state, and federal law enforcement, businesses, and academic institutions to functionally collaborate on cybercrime issues. It establishes jointly developed and staffed facilities, where program participants benefit from cyber-forensic analysis, tactical response development, technological simulation/modeling analysis, and the development of advanced training.
-
-
Education
-
University of Pittsburgh
BS, Information Sciences -
Shippensburg University of Pennsylvania
Master of Business Administration - MBA