{"id":20,"date":"2023-11-27T14:35:40","date_gmt":"2023-11-27T14:35:40","guid":{"rendered":"https:\/\/orlandogonzalez.com\/?page_id=20"},"modified":"2023-11-27T14:37:49","modified_gmt":"2023-11-27T14:37:49","slug":"orlando-gonzalez-resume","status":"publish","type":"page","link":"https:\/\/orlandogonzalez.com\/","title":{"rendered":"Orlando Gonzalez Resume"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Orlando Gonzalez<br>20420 Peckham Street<br>Ashburn, Virginia 20147<br>C (703) 587-2248<br>http:\/\/www.orlandogonzalez.com<br>Email <a href=\"mailto:ogonzo@gmail.com\">ogonzo@gmail.com<\/a><\/p>\n\n\n\n<p><strong>Objective: <\/strong>Seeking challenging opportunities in Risk Management Framework (RMF A&amp;A)<\/p>\n\n\n\n<p><strong>Special Qualifications<\/strong><\/p>\n\n\n\n<ul>\n<li><strong>Active DOD TOP Secret Security Clearance (w\/SBI)<\/strong><\/li>\n\n\n\n<li><strong>CISSP (not active)<\/strong><\/li>\n\n\n\n<li><strong>CISM (Test scheduled for December 2023)<\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>Experience<\/strong><\/p>\n\n\n\n<p>10\/2012 \u2013 Present&nbsp; <strong>Principal Analyst<\/strong> \u2013 Belmont Technical Solutions, Ashburn, VA<\/p>\n\n\n\n<p><strong>Supporting Naval Research Lab (NRL) Code 1220 IA Group (Peregrine supporting KBRwyle) \u2013 Senior Cyber Security Consultant <\/strong>\u2013 Perform the following activities in support of NRL RMF A&amp;A Packages in eMASS:<\/p>\n\n\n\n<ul>\n<li>Support NRL Codes\/Programs and guide them through the Navy RMF A&amp;A process to receive an Authority to Operate (ATO).<\/li>\n\n\n\n<li>Act as NRL A&amp;A Liaison with NAO &amp; SCA-L and support Collaboration calls on behalf of the Codes\/Programs.<\/li>\n\n\n\n<li>Assist NRL Codes with:<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Obtain system or site information and use it to evaluate security features of the IT system or site being assessed and authorized<\/li>\n\n\n\n<li>System registration in eMASS<\/li>\n\n\n\n<li>Creating documentation in support of Step 1: System Security Plan (SSP) System Categorization Form, Diagrams (Architecture, A&amp;A Boundary, Info Flow)<\/li>\n\n\n\n<li>Creating\/updating documentation in support of Step 2: Updating Step 2 documentation, Security Assessment Plan, System Lifecycle Continuous Monitoring (SLCM)<\/li>\n\n\n\n<li>Executing Security Assessment Plan (RMF 800-53 Self-Assessment, STIG and ACAS scanning and evaluate all discrepancies to recommend mitigation measures for reducing or eliminating specific risk items<\/li>\n\n\n\n<li>Analyzing A&amp;A test and validation procedure results findings\/weaknesses for risk with respect to RMF requirements. Work with ISSE to determine fixes or mitigations for weaknesses and to determine the level of revalidation testing that is necessary if immediate fixes are applied. Note unmitigated discrepancies, document countermeasures that are in place and update POA&amp;M in eMASS to address open risk\/residual risk items.<\/li>\n\n\n\n<li>Preparing Risk Assessment Reports<\/li>\n\n\n\n<li>Submitting A&amp;A Packages in eMASS for review by higher Echelons<\/li>\n\n\n\n<li>Participating in Step 5 Collaboration Meetings with NAO\/CSA. Previously supported NRL Codes\/Programs in the DIACAP process. Personally responsible for achieving over 20 ATOs to include \u201cType Authorizations\u201d for software and both Classified &amp; Unclassified systems.<\/li>\n<\/ul>\n\n\n\n<p>03\/2010 \u2013 09\/2012&nbsp; <strong>Principal Analyst<\/strong> \u2013 Belmont Technical Solutions, Ashburn, VA<\/p>\n\n\n\n<p><strong>Supporting DoN CNIC N61 Emergency Management Programs (Gupton &amp; Associates) \u2013 Senior Information Assurance Consultant \u2013 <\/strong>Working on various projects to maintain or obtain DIACAP Accreditation.&nbsp; Updated and or developed various DIACAP artifacts (SIP, DIP, C&amp;A Plans, Scorecards, Rules of Behavior, Incident Response Plans, CT&amp;E Plans, POA&amp;Ms).<\/p>\n\n\n\n<p>Performed validation testing of DIACAP controls using DISA tools (Gold Disk, SRRs, Checklists, Retina) for the following projects: Public Safety Network (PSNet), Automated Metering Infrastructure (AMI), Emergency Land Mobile Radio (ELMR).<\/p>\n\n\n\n<p>Conducted a site survey of the environmental and physical DIACAP controls for the Service Delivery Point West in San Diego.<\/p>\n\n\n\n<p>01\/2009 \u2013 04\/2010 <strong>Senior Information Assurance Engineer<\/strong> \u2013 MBA CSi, Herndon, VA<\/p>\n\n\n\n<p><strong>Sentinel Project-FBI (Lockheed Martin) \u2013 IA Increment Lead \u2013 <\/strong>Responsible for taking multiple increments through the full NIST C&amp;A Lifecycle.&nbsp; Assessed security requirements per 800-53 and assigned appropriate security controls. Reviewed Component Design Packages (CDP) and Requirements, Design and Test (RDT) documents to ensure appropriate security design\/architecture were incorporated. Reviewed the Segment level System Security Plans and updated all identified sections.&nbsp; Represented the IA group in weekly Project Engineering &amp; Design (PED) and Technical Interchange (TIMS) meetings.&nbsp; Participated in Peer Reviews to ensure security controls were being met in the designs.&nbsp;<\/p>\n\n\n\n<p><strong>Sentinel Project-FBI (Lockheed Martin) \u2013 Alternate ISSO <\/strong>\u2013 Performed ISSO related duties in the absence of the Primary ISSO. Ensured that security operations were in compliance with established policies and procedures.&nbsp; Performed security scans of files&nbsp; moving from high to low side. Reviewed all requests for privileged user access to systems. Maintained POAM and coordinated work-off of items.<\/p>\n\n\n\n<p>05\/2004- 12\/2008 <strong>Senior Information Assurance Analyst<\/strong> &#8211; Northrop Grumman, Washington, DC<\/p>\n\n\n\n<p>Provided Information Assurance Support for various projects.<\/p>\n\n\n\n<p><strong>Biometric Identification System for Access (BISA) &#8211; <\/strong>Provided support\/mentorship to the Independent Security Test &amp; Evaluation Team Lead. Conducted vulnerability scans using DISA Gold Disks, SRRs and eEye Retina.&nbsp; Assisted in compiling detailed reports for out-brief.<\/p>\n\n\n\n<p><strong>Automated Biometric Identification System (ABIS) &#8211;<\/strong> Led an Independent Security Test &amp; Evaluation Team consisting of 9 personnel prior to an ACA visit.&nbsp; Provided upper management with daily detailed reports on system vulnerabilities to ensure fixes were implemented in a timely manner.<\/p>\n\n\n\n<p><strong>Port Operations Management System (POMS) <\/strong>&#8211; Provided support for a DITSCAP to DIACAP re-accreditation. Acted as the Independent Certifier ensuring all 8500.2 controls were tested.&nbsp; Conducted vulnerability scans using DISA Gold Disks, SRRs and eEye Retina. Compiled the POA&amp;M based on the test results.<\/p>\n\n\n\n<p><strong>United States Naval Observatory (USNO<\/strong>) \u2013 Led a team of 5-7 personnel in providing DIACAP system hardening support. Conducted vulnerability scans using DISA Gold Disks, SRRs and eEye Retina.<\/p>\n\n\n\n<p><strong>Battlefield Airborne Command Node (BACN) Spiral 2<\/strong> &#8211; Provided DITSCAP support as the Certification &amp; Accreditation Task Lead. Developed the Security Requirements Traceability Matrix (SRTM). Updated the initial SSAA for the Spiral 2 SSAA. Developed the Certification Test &amp; Evaluation Plan to include all test procedures based on DISA guidance. Conducted a dry-run of the CT&amp;E in preparation for the Formal CT&amp;E. Conducted vulnerability scans using DISA Gold Disks, SRRs and eEye Retina.<\/p>\n\n\n\n<p><strong>Battlefield Airborne Command Node (BACN) Spiral 1<\/strong> &#8211; Assisted the Certification &amp; Accreditation lead with the Certification Test &amp; Evaluation Plan. Developed all test procedures and assisted in the execution of the CT&amp;E. Evaluated results and provided a vulnerability assessment.<\/p>\n\n\n\n<p><strong>United States Army Reserve<\/strong> &#8211; Provided support to the G3 (Provost Marshals) office by conducting Vulnerability Assessments at the Regional Readiness Commands.&nbsp;<\/p>\n\n\n\n<p><strong>Department of Justice &#8211; Senior PKI Systems Engineer<\/strong> &#8211; Assigned as a Sr. Systems Engineer and technical lead on the DOJ PKI Phase 2 Task Order. Responsible for the implementation of the PKI system and the preparation, quality control and delivery of major systems engineering deliverables to include the project Bill of Materials for 3 three-system environments, Preliminary Design Review, System Design Document, Critical Design Review, Test &amp; Evaluation Master Plan and Test Procedures, Training Plan, Deployment Implementation Plan and O&amp;M Manual.<\/p>\n\n\n\n<p>12\/2003-05\/2004 <strong>Certification &amp; Accreditation Engineer<\/strong> American Systems Corp Chantilly, VA<\/p>\n\n\n\n<p><strong>C&amp;A Engineer<\/strong> &#8211; Tasked with providing support to a C &amp; A team working on JCON IIa for the DOJ. Created STE test procedures for 17 components and system level testing and acted as Test Director. Used Harris STAT, ISS Internet Scanner, Security Expressions and WEB Inspect to produce a Vulnerability Assessment for each component. Followed NIST 800 series guidance to provide support for the C &amp; DR, SSG, SSP, STE, the Facilitated Risk Assessment and the Vulnerability Assessments.<\/p>\n\n\n\n<p><strong>Information Assurance Engineer<\/strong> &#8211; Tasked with providing IA support to SDDC (formerly known as MTMC). Conducted vulnerability scans on all network devices and clients using Harris STAT, ISS Internet Scanner and Nessus to ensure the command was compliant with all Army Cert IAVAs. Produced detailed reports on all scans to management. Responsible for scanning all new network and client devices to ensure they were also compliant prior to connecting to the network. Maintained the McAfee ePolicy Orchestrator Server to ensure virus signatures were up to date and clients were compliant.<\/p>\n\n\n\n<p>10\/2000-12\/2003 <strong>Technical Architect III<\/strong> &#8211; Corporate Security, SPRINT Reston, VA<\/p>\n\n\n\n<p><strong>PKI\/Strong Authentication Architect<\/strong> &#8211; Tasked with providing strong authentication solutions for internal and external customers. These include but were not limited to PKI using the Entrust platform, RSAs Ace server\/SecurID platform, Managed Radius consisting of Funks Steel Belted Radius servers and standard LDAP Directories.<\/p>\n\n\n\n<p>Provided testing and validation for various devices (Nortel Contivity, Netscreen, Cisco Pix, Cosine VPN3, Checkpoint and Raptor firewalls) to access and integrate with existing strong authentication infrastructure.<\/p>\n\n\n\n<p>Responsible for Tier 3 application support for escalation of current authentication platforms and servers (Solaris 2.6\/8). Maintained and upgraded all servers to ensure systems were current.<\/p>\n\n\n\n<p><strong>Network Security Engineer III<\/strong> &#8211; Corporate Security, SPRINT Reston, VA<\/p>\n\n\n\n<p><strong>Authentication Group Supervisor &#8211; Promoted from Network Security Engineer II<\/strong>. Tasked with organizing and defining the responsibilities and procedures of the Strong Authentication Group. The group included 5 analysts who worked on a Remedy based ticketing system to provide Sprints internal and external clients with a PKI and token based solution. Products that were used included Entrust (PKI) to provide a managed PKI solution for our external customers and a corporate solution for encrypted e-mail between our Internet Security Operation Center (ISOC) and our clients. Used Entrust\/RA to issue digital web certificates enabling clients to authenticate and view sensitive proprietary information.<\/p>\n\n\n\n<p>Provided Tier 3\/4 support for RSA SecureID and ACE servers are used to provide customers with token based authentication into their various networks. Provided Tier 3\/4 support for Steel Belted Radius Servers and Nortel Contivity VPNs used in our Managed Radius offering for external customers to provide a central password based authentication scheme. X.500 LDAP directories were used to centralize all customers and provide a HA solution.<\/p>\n\n\n\n<p><strong>Network Security Engineer II<\/strong> \u2013 Assigned to the Internet Security Operation Center (ISOC) to provide Tier II support for Checkpoint and Raptor Firewall issues. Handled all firewall and Radius issues escalated to Tier II through the Remedy Ticketing System. Assisted clients in trouble shooting their firewalls for a wide variety of problems. Added and deleted rules on the firewalls to ensure traffic was passing efficiently. Snooped user interfaces and reviewed logs in real time to resolve issues.<\/p>\n\n\n\n<p><strong>U.S. ARMY Experience<\/strong><\/p>\n\n\n\n<p>03\/1999-10\/2000&nbsp; Defense Messaging System (DMS) Implementation Team&nbsp; Pentagon, Washington D.C.<\/p>\n\n\n\n<p><strong>Mail List Manager \u2013<\/strong> Developed detailed install\/maintenance procedures for the Mail List Servers.<\/p>\n\n\n\n<p>11\/1997-10\/2000&nbsp; Single Agency Manager Pentagon Telecom Center&nbsp; Washington D.C.<\/p>\n\n\n\n<p><strong>Shift Supervisor<\/strong> &#8211; Responsible for overseeing and coordinating the operations of a telecommunications center with over 50 personnel.<\/p>\n\n\n\n<p>05\/1991-11\/1997&nbsp; NATO Headquarters Brussels, Belgium<\/p>\n\n\n\n<p><strong>Non-Commissioned Officer In Charge of the Special Handling and Evaluations Detachment<\/strong> &#8211; Maintained a secure (Top Secret) on-line communications facility consisting of a PC\/Windows NT based fiber optic network and a PC\/Unix network.&nbsp;<\/p>\n\n\n\n<p>01\/1990-05\/1991&nbsp; U. S. Army Information Systems Command Telecom Center&nbsp; Redstone Arsenal, AL<\/p>\n\n\n\n<p><strong>Shift Supervisor<\/strong> &#8211; Supervised 6 personnel.&nbsp;<\/p>\n\n\n\n<p>11\/1988-01\/1990 U. S. Army Information Systems Command Telecom Center Quarry Heights, PM<\/p>\n\n\n\n<p><strong>Operator \/ Supervisor<\/strong> &#8211; Supervised 3 personnel.&nbsp;<\/p>\n\n\n\n<p><strong>Civilian Education<\/strong><\/p>\n\n\n\n<p>2005 Bachelors of Science Information Systems Management, University of Maryland<\/p>\n\n\n\n<p>1992 Associates in Liberal Arts, Central Texas College<\/p>\n\n\n\n<p><strong>IT Certifications<\/strong><\/p>\n\n\n\n<p>2010 Certified Information Systems Security Professional (CISSP)<\/p>\n\n\n\n<p>2005 ActivCard Certified Professional (ACP) on Enterprise Access Card and CMS 3.7.1.<\/p>\n\n\n\n<p>2003 Harris Stat<\/p>\n\n\n\n<p><strong>IT Training<\/strong><\/p>\n\n\n\n<p>2006 CISSP Boot Camp <strong><\/strong><strong> <\/strong><strong><\/strong><strong> <\/strong><strong><\/strong>Global Knowledge, Arlington, VA<\/p>\n\n\n\n<p>2003 Harris STAT Scanner Course U.S. Army<\/p>\n\n\n\n<p>2003 Entrust Authority Security Manager Comprehensive Entrust HQs, Ottawa, CA<\/p>\n\n\n\n<p>2001 RSA SecurID Administration 5.0 Meridian Resources, Herndon, VA<\/p>\n\n\n\n<p>2001 Injoin LiveContent Directory Installation &amp; Administration Global Knowledge, Toronto, CA<\/p>\n\n\n\n<p>2001 Entrust PKI Management Course Global Knowledge, Sterling, VA<\/p>\n\n\n\n<p>2000 Complete MCSE Track NETCERT, Springfield, VA<\/p>\n\n\n\n<p>1999 DMS Administrators Course Lockheed HQ, Manassas, VA<\/p>\n\n\n\n<p>1999 HP-UNIX Administrators Course HP Headquarters, Rockville, MD<\/p>\n\n\n\n<p><strong>Military Training<\/strong><\/p>\n\n\n\n<p>1997 Special Intelligence Training (1 WK) Oberammergau, Germany<\/p>\n\n\n\n<p>1996 DIA Indications &amp; Warning Training (1 WK)&nbsp; Oberammergau, Germany<\/p>\n\n\n\n<p>1991 Basic Non-Commissioned Officers Course (8 Wks) Ft. Gordon, GA<\/p>\n\n\n\n<p>1989 Primary Leadership Development Course (4 Wks) Ft. Sherman, Panama<\/p>\n\n\n\n<p>1987 Automatic Data Telecommunications Center Operator (12 Wks) Ft. Gordon, GA<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Professional references provided from employers and associates upon request.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Orlando Gonzalez20420 Peckham StreetAshburn, Virginia 20147C (703) 587-2248http:\/\/www.orlandogonzalez.comEmail ogonzo@gmail.com Objective: Seeking challenging opportunities in Risk Management Framework (RMF A&amp;A) Special Qualifications Experience 10\/2012 \u2013 Present&nbsp; Principal Analyst \u2013 Belmont Technical Solutions, Ashburn, VA Supporting Naval Research Lab (NRL) Code 1220 IA Group (Peregrine supporting KBRwyle) \u2013 Senior Cyber Security Consultant \u2013 Perform the following activities [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/orlandogonzalez.com\/index.php?rest_route=\/wp\/v2\/pages\/20"}],"collection":[{"href":"https:\/\/orlandogonzalez.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/orlandogonzalez.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/orlandogonzalez.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orlandogonzalez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=20"}],"version-history":[{"count":2,"href":"https:\/\/orlandogonzalez.com\/index.php?rest_route=\/wp\/v2\/pages\/20\/revisions"}],"predecessor-version":[{"id":24,"href":"https:\/\/orlandogonzalez.com\/index.php?rest_route=\/wp\/v2\/pages\/20\/revisions\/24"}],"wp:attachment":[{"href":"https:\/\/orlandogonzalez.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}