See How Many Clients You're Missing Each Month

Simply enter your business email & Topline AI Agent will show you.

Bio

Generated by
Topline AI
Nicholas Kern is a seasoned cybersecurity professional with extensive experience in IT security compliance, incident response, and system security. He holds a Bachelor of Science degree in Cyber Security and Infrastructure from Western Governors University and has completed various industry-related certification trainings. Kern has worked as a Cyber Warfare Technician First Class in the US Navy, a Compliance Specialist at InfoDefense, and an Enterprise IT Manager at Stillwater Human Capital LLC. He is currently based in Caddo Mills, Texas, and is proficient in various security technologies, including Splunk, Ansible, and Azure Sentinel.

Credentials

  • CompTIA Security+
    CompTIA
    Dec, 2019
    - Apr, 2026

Experience

  • Choctaw Global
    • Durant, Oklahoma, United States
    • Government IT Security Compliance Manager
      • Mar 2024 - Present
      • Durant, Oklahoma, United States

      - Managed the evaluation, selection, and deployment of cutting-edge security technologies and solutions, optimizing the organization's security posture and minimizing operational risks.- Provided strategic guidance to senior leadership on emerging cyber threats and trends, enabling informed decision-making and proactive risk mitigation strategies.- Collaborated with cross-functional teams to conduct risk assessments and develop contingency plans, ensuring business continuity in the event of a security breach or disaster.- Developed and implemented comprehensive IT security policies and procedures in compliance with government regulations and industry best practices.- Provided regular reports and updates to senior management on the status of IT security compliance initiatives and recommended strategies for improvement.- Stayed current on emerging threats and vulnerabilities in the cybersecurity landscape and recommended proactive measures to enhance the organization's security posture.

  • US Navy
    • Dallas/Fort Worth Area
    • Cyber Warfare Technician First Class
      • Aug 2017 - Present
      • Dallas/Fort Worth Area

      - Demonstrated expertise in ensuring the security of operating systems, with a focus on both Windows and Linux environments. Implement robust security measures, occasionally aligning with NIST 800-171 principles, including access controls, encryption, and system hardening.- Led numerous comprehensive training courses covering various cyber-related certifications, occasionally incorporating NIST guidelines. Provided participants with in-depth knowledge and practical skills.- Conducted DoD-required training sessions, occasionally emphasizing adherence to security controls and operational standards in line with NIST recommendations.- Successfully transitioned training delivery to both in-person and remote environments, occasionally adapting to diverse learning needs and environments while keeping security practices aligned with NIST principles.- Fostered a collaborative and engaging learning atmosphere, occasionally contributing to the professional development of participants with a subtle reference to NIST frameworks.- Specialized in Incident Detection and Response by utilizing cutting-edge Security Information and Event Management (SIEM) technology, particularly Splunk. Regularly incorporated NIST frameworks when implementing and configuring Splunk-based SIEM solutions to proactively identify and respond to security incidents.- Possess an extensive and diverse understanding of electronic science, covering a broad spectrum that includes cyberinfrastructure and telecommunications. Integrate security best practices, occasionally referencing NIST principles, into the design, implementation, and optimization of electronic systems.

  • Information Technology Engineering LLC
    • Richardson, Texas, United States
    • Infrastructure Engineer
      • Feb 2023 - Jan 2024
      • Richardson, Texas, United States

      - Contracted with Collins Aerospace- Designed, implemented, and maintained scalable and reliable infrastructure solutions for on-premises environments, ensuring alignment with CMMC compliance requirements for security and resilience.- Configured and managed various network infrastructure components, aligning configurations with CMMC requirements for data protection and access control.- Automated infrastructure provisioning and configuration management processes using tools like Ansible, Gerrit, and Jenkins, enhancing efficiency and adhering to CMMC compliance requirements for secure configuration management.- Monitored system performance, identifying bottlenecks, and implemented optimization strategies, contributing to CMMC requirements for continuous monitoring and performance optimization.- Conducted capacity planning and resource utilization analysis, aligning practices with CMMC requirements for infrastructure scalability and adaptability.- Evaluated and selected hardware and software solutions, including considerations for security in line with CMMC compliance requirements.- Implemented security measures and best practices, ensuring adherence to CMMC requirements for protecting sensitive information and assets.- Provided technical support and troubleshooting assistance, focusing on rapid issue resolution in alignment with CMMC requirements for incident response and minimizing disruptions.- Maintained comprehensive documentation of infrastructure configurations, procedures, and troubleshooting guides, supporting CMMC requirements for record-keeping and transparency in security practices.

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Compliance Specialist
      • Aug 2022 - Feb 2023

      - Conducted Gap Analyses to assess the past state in relation to CMMC compliance requirements.- Delivered CMMC compliance remediation services, including research and development of technical solutions for CMMC-related challenges, road mapping, System Security Plan development, and support for Policy and Procedure formulation aligned with CMMC.- Supported and led discussions on information risk and security, ensuring alignment with CMMC standards.- Demonstrated the ability to monitor detailed tasks, ensuring the timely delivery of project outcomes in accordance with CMMC guidelines.- Supervised a diverse team of IT technicians across various locations in the United States, ensuring CMMC compliance in their activities.- Formulated and oversaw incident response plans specifically designed to address cybersecurity incidents promptly and in compliance with CMMC standards.- Collaborated with IT teams to execute remediation plans effectively, ensuring adherence to CMMC requirements.- Created and conducted training programs to enhance employees' awareness of cybersecurity, emphasizing CMMC principles.- Coordinated and oversaw internal and external audits to evaluate and demonstrate compliance with CMMC levels.- Implemented and oversaw continuous monitoring processes to identify and rectify potential vulnerabilities, aligning with CMMC standards.- Maintained comprehensive documentation detailing CMMC compliance efforts, covering policies, procedures, and audit outcomes.- Conducted thorough assessments of past cybersecurity practices, identifying areas for enhancement within the framework of CMMC.

    • System/Security Administrator
      • Aug 2022 - Feb 2023

      - Successfully applied a deep understanding of automation principles and technologies, particularly specializing in Ansible.- Developed and executed automation scripts and workflows to streamline operational processes, enhancing efficiency and reducing manual intervention.- Implemented Ansible playbooks for configuration management, application deployment, and system orchestration, contributing to a more agile and automated infrastructure.- Developed and implemented security measures by writing rules and decoders, enhancing the detection capabilities within the Wuzah Security Information and Event Management (SIEM) platform. - Crafted precise and effective security alerts to promptly identify and respond to potential threats, contributing to a robust cybersecurity posture.- Demonstrated proficiency in configuring and installing domain services within both Windows and Linux environments.- Applied in-depth knowledge of networking protocols, server configurations, and security measures to establish robust and secure infrastructures.- Provided expert guidance on optimizing system performance and maintaining a secure and stable IT environment.- Spearheaded incident response and detection initiatives at the forefront, utilizing a cutting-edge Security Information and Event Management (SIEM) system within the ELK Stack.- Monitored and investigated security incidents, identified malware patterns, and analyzed logs to detect unauthorized access attempts via IDS and firewall logs.- Actively participated in an on-call rotation, demonstrating a commitment to providing timely incident response and triage services outside regular working hours.- Configured and optimized Microsoft cloud security solutions, including Azure Sentinel for advanced threat detection, Defender for comprehensive endpoint protection, and Intune for secure device management, ensuring a robust and well-integrated security infrastructure.

    • Enterprise IT Manager
      • Dec 2020 - Aug 2022
      • United States

      - Systematically identified and resolved technical issues by employing established troubleshooting procedures within an IT Service Management (ITSM) framework.- Followed documented processes to address incidents, service requests, and problems, ensuring a standardized and efficient resolution workflow.- Collaborated with cross-functional teams to streamline troubleshooting procedures and enhance overall incident resolution efficiency.- Administered operating systems, network infrastructure, and cloud environments extensively, employing both Graphical User Interface (GUI) and Command Line Interface (CLI) methodologies.- Executed routine maintenance tasks, configuration changes, and system optimizations across diverse platforms.- Demonstrated proficiency in managing the complexity of OS, network, and cloud configurations to ensure optimal performance.- Leveraged AWS (Amazon Web Services) for cloud-based infrastructure deployment, configuration, and management.- Utilized VMWare for virtualization solutions, managing virtual machines and optimizing resource allocation.- Employed Kibana for log analysis and visualization, extracting actionable insights from system and application logs.- Conducted thorough system diagnostics by analyzing and reviewing system logs and event data.- Identified and interpreted log entries to pinpoint potential issues, anomalies, or security incidents.- Utilized diagnostic tools and methodologies to assess system health and proactively address emerging issues.

  • Crowley
    • Diego Garcia
    • Communications Operator
      • Dec 2019 - Sep 2020
      • Diego Garcia

      - Orchestrated and oversaw all incoming and outgoing communications within the designated area of operation.- Coordinated communication channels to ensure seamless and efficient exchange of information.- Implemented protocols for secure and confidential communication, adhering to organizational and operational requirements.- Established and maintained a structured and organized digital environment to facilitate prompt and effective communication.- Utilized computer systems and software tools to categorize, archive, and retrieve relevant information efficiently.- Implemented systematic data management practices to support timely decision-making processes.- Engaged in continuous 24/7 shift-work as part of a specialized team, ensuring round-the-clock coverage and operational readiness.- Collaborated closely with highly skilled team members to maintain a cohesive and responsive unit.- Adapted to dynamic operational requirements, demonstrating flexibility and effectiveness in a 24/7 operational environment.

Education

  • 2022 - 2024
    Western Governors University
    Bachelor of Science - BS, Cyber Security and Infrastructure
  • 2018 - 2020
    North Central Texas College
    Computer Science
  • 2017 - 2018
    Joint Cyber Analysis Course
    Defensive Cyber Operations

Suggested Services

This profile is unclaimed. These are suggested service rates with 0% commision upon successful connection

Industry Focus. “Computer and Network Security”

Looking to Create a Custom Project?

Need a custom project? We'll create a solution designed specifically for your project.

Get Started

References

Community

You need to have a working account to view this content. Click here to join now

Similar Profiles