Florida Department of Management Services Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services RFI

Size: px
Start display at page:

Download "Florida Department of Management Services Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services RFI"

Transcription

1 Florida Department of Management Services Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services RFI

2 August 25, 2015 Re: Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services Mr. Joel Atkinson: Thank you for the opportunity to submit an RFI response for Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services. DH Technologies is pleased to present Florida Department of Management Services with this proposal for a Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services. We are prepared to leverage our past performance with several Department of Defense accounts. Our services team includes Justin Henderson who is 1 of 13 people worldwide to achieve Offense and Defense SANS Cyber Guardian certification, and vulnerability specialists to develop a thorough assessment. Why choose DH Technologies as a solution partner for this effort? You can be assured of a fully compliant, best-practice integration methodology Leverage our successful implementation experience with data center and virtualization solutions ranging from 100 to 10,000+ users at federal agencies. Be assured that all work will be completed with 100% satisfaction Employ a team of industry-recognized virtualization experts with numerous certifications from top vendors including GIAC Penetration Tester, Computer Hacking Forensics Investigator, Certified Ethical Hacker certifications. Be assured of a fully compliant solution, our team has deployed multiple DoD and NIST compliant solutions. We are a HUBZone-certified small business, and we can assist with meeting small business set-aside goals for your agency. Our unique ability to analyze business requirements and leverage the right technology to address tactical and strategic goals of an organization has been a key differentiator for DH Technologies, and we have a number of recent accomplishments to substantiate that claim. We re excited to be a part of this effort with Florida Department of Management Services and we are confident that collectively we will deliver the best solution possible. Thank you for your time and consideration. Sincerely, Devin Henderson, CEO / DH Technologies ii

3 Table of Contents 1. Company Background Contact Information Technical (Section IV Response)

4 1. Company Background DH Technologies (DH Tech) is a small business entity that has rapidly established itself as an industry-recognized expert in system integration/virtualization services and cyber security, as validated recently with The Federal Partner of Year 2014 & 2015 award by Nutanix;; The Federal Innovation Partner of the Year 2013 award by Arista Networks;; named to CRN s List of Tech Elite 250 in 2014 & DH Tech is an industry-recognized enterprise data center solution provider with extensive past performance in the Public and Private sectors. We leverage broad exposure gained from our work as a VMware Pre/Post sales Professional Services delivery partner. We focus on proficiency training and customer-facing fieldwork to ensure that we bring the best and brightest team to bear on our projects. We perform services around the globe to include all of the United States, US territories, and military facilities over seas. DH Mission Statement: DH TECHNOLOGIES s mission is to consistently deliver innovative, value-add solutions that effectively address business requirements with proven and repeatable processes. SERVICES and/or PRODUCTS Provided: Complete solution design, implementation and sustainment Datacenter Consolidation/Virtualization Penetration Testing Server Virtualization Application Virtualization Data Center Assessment Virtual Desktop Infrastructure/Mobile Cloud Solutions Continuity of Operations Planning Global Services Delivery for all US States, Territories, and military facilities. CERTIFICATIONS or ACCREDITATIONS or MEMBERSHIPS: VMware Premier Solutions Partner Nutanix Elite Partner & Platform Professional GIAC, EC Council, SANS Institute 1

5 2. Contact Information DH Technologies contact information: Devin Henderson DH Technologies 305 Harrison ST SE, Suite 1B Leesburg, VA

6 3. Technical (Section IV Response) 1) Pre-Incident Services:. a) Incident Response Agreements Terms and conditions in place ahead of time to allow for quicker response in the event of a cyber-security incident. We would develop an incident response agreement based on industry standards. The agreement can be tailored to be specific to state requirements and response time can be agreed upon.. b) Assessments Evaluate a State Agency s current state of information security and cyber-security incident response capability. A gap assessment can be provided based on industry standards methods such as NIST and the SANS 20 Critical Controls. A live assessment can also be performed to evaluate the State Agency s current detect and response capabilities. Depending on the needs, a crosswalk could be provided to base the gap assessment against the State Agency s needs such as DHS CDM, ISO 27002, etc. This would increase the time to report and costs but may be more comprehensive and actionable.. c) Preparation Provide guidance on requirements and best practices. We can work with you to develop policies and procedures based on industry standards. A security awareness program can be developed for both employees and incident response teams.. d) Developing Cyber-Security Incident Response Plans Develop or assist in development of written State Agency plans for incident response in the event of a cyber-security incident. A formal plan for incident response can be created using the industry standard six phase incident management process (PICERL). This will include the establishment of CERT teams and organizational structures so that decisions can be made in a timely matter and reduce damages. Also, a schedule can be established for updating the plan and testing it.. e) Training Provide training for State Agency staff from basic user awareness to technical education. We provide training documentation and custom labs upon request. Also, instructor training can be provided from a SANS instructor who is a qualified GSE and Cyber Guardian. 3

7 2) Post-Incident Services:. a) Breach Services Toll-free Hotline Provide a scalable, resilient call center for incident response information to State Agencies. We can establish an in house hotline to provide telephone response after an incident. This can also include breach notification letters as needed.. b) Investigation/Clean-up Conduct rapid evaluation of incidents, lead investigations and provide remediation services to restore State Agency operations to preincident levels. We provide subject matter experts skilled in incident handling and recovery. These experts can be used for live incident response as well as cleanup activities.. c) Incident response Provide guidance or technical staff to assist State Agencies in response to an incident. We provide subject matter experts to provide guidance and/or provide incident handling abilities during or after an incident. During such events, we can either provide guidance or leadership in handling the incident.. d) Mitigation Plans Assist State Agency staff in development of mitigation plans based on investigation and incident response. Assist State Agency staff with incident mitigation activities. We provide industry experts to provide strategic leadership and strategy in risk mitigation. This can range from identifying products or processes that could mitigate risk or staff augmentation to implement solutions.. e) Identity Monitoring, Protection, and Restoration Provide identity monitoring, protection, and restoration services to any individuals potentially affected by a cyber-security incident. We can establish an identity monitoring, protection, and restoration services for individuals impacted by a cyber-security incident. 4

8 Justin Henderson Résumé Page 1 of 2 IT Professional Systems and Solutions Architect, IT Consultant, and Project Manager 1 of 13 People worldwide to achieve Offense and Defense SANS Cyber Guardian certification. Results-driven leader experienced with designing and maintaining cross-platform systems and network infrastructures for small to large companies. Able to multi-task priorities and keep focus on the core business processes. Continual education through regular training and self-research. Able to resolve complex system and networking issues and train staff to handle ongoing business opportunities. Excellent communication, collaboration, and problem solving skills. Able to wear many hats and exceed well under pressure and time constraints. Aligns business goals and processes using industry standards and able to think outside the box. Projects and Accomplishments Achieved SANS Mentor status Performed migrations from Windows NT environments to Active Directory on 2012 Multiple Exchange migrations starting from Exchange 5.5 to Exchange 2010 Managed security team to design and test disaster recovery plans for multiple sites Managed infrastructure team to support systems with over a 100:1 server to staff ratio Performed internal and external penetration tests using industry standard methodologies Architected and built a fully redundant and scalable web server farms Migrated users from physical desktops to virtual desktops across multiple departments with various external devices Certifications and Training Microsoft IT Professional Enterprise Administrator 2008 Solutions Associate Systems Engineer Systems Administrator: Messaging Technology Specialist Systems Administrator Systems Engineer: Messaging Professional Security GIAC Penetration Tester GIAC Certified Firewall GIAC Windows Security GIAC Security Essentials Analyst Administrator Computer Hacking Security+ Forensics Investigator Systems Engineer: Systems Security Administrators: Security Tenable Nessus Certified Auditor Certified Sonicwall Security Administrator Certified Information Systems Security EC-Council Certified Security Analyst Professional Certified Ethical Hacker Licensed Penetration Tester Governance, Service, and Project Management Certified Information Systems Manager ITIL Foundation Project+ COBIT 5 Foundation Course ITIL Lifecycle: Continual Project Management Certified in Risk and Service Improvement Professional Information Systems Control Virtualization VMware Certified VMware Certified VMware Certified VMware Certified Professional 5 Professional 5 : Desktop Professional 4 Professional 3 Network and Hardware A+ I-Net+ Network+ Cisco Certified Entry Networking Technician Cisco Certified Network Associate

9 Justin Henderson Résumé Page 2 of 2 Database MySQL 5 Database Administrator MySQL 4 Core Education WESTERN GOVERNORS UNIVERSITY, Salt Lake City, UT Bachelors of Science, Network Design and Administration, LAKE LAND COLLEGE, Mattoon, IL Associates of Science, Network Administration, Technology Skills Server-Related Technologies Active Directory Microsoft SQL Apache MySQL Microsoft Exchange Microsoft IIS Clustering Load Balancing Proxy Certificate Authorities Virtualization Platforms / Operating Systems Windows NT Linux Android IOS Networking LAN WAN VPN DHCP DNS WINS TCP/IP SMTP Firewalls IDS VoIP FTP / HTTP Telnet / SSH Radius ISCSI NFS Programming Languages PHP Perl SQL MySQL Bash Scripting AutoIT PowerShell Batch Scripting Professional and Consulting Experience HEARTLAND DENTAL CARE, Effingham, IL 2009-Present Heartland Dental Care is the leading dental service management provider in the United States and is a leader of customer care in dentistry. Modeled around letting dentists practice dentistry and business users manage the business, Heartland has achieved record breaking growth while continuing to give back to the community. Systems and Security Architect Systems and security architect that manages the security, infrastructure, and networking team. Developed and created Heartland s security department and risk management platform. Responsible for the design and maintenance of enterprise systems including VMware, Microsoft, and all networking devices. SARAH BUSH LINCOLN HEALTH SYSTEM, Mattoon, IL 2008 Sarah Bush Lincoln Health Center is a not-for-profit, regional hospital centrally located in East Central Illinois' Coles County. Sarah Bush Lincoln is accredited by The Joint Commission, the nation's oldest and largest standardssetting and accrediting body in healthcare. Systems Engineer Identified and deploy virtual desktop system to lower support and increase agility of IT services. Implemented VMware Infrastructure 3.5 for server infrastructure. LAKE LAND COLLEGE, Mattoon, IL Lake Land College is a public community college offering career programs that lead to immediate employment, transfer programs that lead to baccalaureate degree, liberal arts, adult education, special job training, and retraining programs. Network Security Teacher Taught Network Security Fundamentals to students and fostered future growth opportunities. FIRST MID-ILLINOIS BANK & TRUST, Mattoon, IL First Mid-Illinois Bank and Trust is a locally community focused chain of banks in Illinois. Network Engineer Responsible for secure networking and server access from banks to central office. BONUTTI CLINIC, Effingham, IL Bonutti Clinic is a world-class clinical care and orthopedic surgical expertise facility specializing in minimally invasive surgical techniques and instrumentation. Network Administrator Design and implement company website and Active Directory structure. Responsible for day to day support.

Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services

Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring and Request for Information 9/3/2015 12:00PM Prepared For State of Florida Department of Management Services Division of State

More information

Liquidware Labs Partner Solutions Brief. Streamlining Processes for Planning, Deploying, Securing and Managing Virtual Desktop Infrastructure

Liquidware Labs Partner Solutions Brief. Streamlining Processes for Planning, Deploying, Securing and Managing Virtual Desktop Infrastructure Streamlining Processes for Planning, Deploying, Securing and Managing Virtual Desktop Infrastructure 1 It s no secret that providing services to U.S. government agencies requires exacting standards as

More information

Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services

Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 4937 Fargo Street North Charleston SC 29418 Phone 843.266.2330 Fax 843.266.2333 w w w. c o d e l y n x. c o m Request for Information: Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring,

More information

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO. Bridging The Gap Bridged Group is the Strategic partner of The Telstra Business Centre and Telstra Store. We are a Telstra Preferred Cloud Partner with over 35 years of experience between our senior staff

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

carahsoft Florida Department of Management Services CARAHSOFT S RESPONSE TO THE REQUEST FOR INFORMATION

carahsoft Florida Department of Management Services CARAHSOFT S RESPONSE TO THE REQUEST FOR INFORMATION carahsoft CARAHSOFT S RESPONSE TO THE Florida Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services

More information

NextLabs International Private Limited. 1. Position: Software Engineer (Java) Location: Singapore

NextLabs International Private Limited. 1. Position: Software Engineer (Java) Location: Singapore 1. Position: Software Engineer (Java) NextLabs (www.nextlabs.com), a Silicon Valley technology company, is the leading provider of policydriven information risk management (IRM) software for large enterprises,

More information

Department of Management Services. Request for Information

Department of Management Services. Request for Information Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley

More information

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

REQUEST FOR INFORMATION

REQUEST FOR INFORMATION Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 3 September 2015 6506 Loisdale Rd, Ste 325

More information

John Smith Prattville, AL career@hashbangsecurity.com

John Smith Prattville, AL career@hashbangsecurity.com John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position

More information

GEARS Cyber-Security Services

GEARS Cyber-Security Services Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

State of Florida Cyber Security Services RFI

State of Florida Cyber Security Services RFI RFI ATTENTION: State of Florida Dept. of Management Services Joel Atkinson Associate Category Manager 4050 Esplanade Way, Suite 360 Tallahassee, FL 32399-0950 (850) 488-1985 joel.atkinson@dms.myflorida.com

More information

Network Management and Defense Telos offers a full range of managed services for:

Network Management and Defense Telos offers a full range of managed services for: Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:

More information

Cisco and VMware Virtualization Planning and Design Service

Cisco and VMware Virtualization Planning and Design Service Cisco and VMware Virtualization Planning and Design Service Create an End-to-End Virtualization Strategy with Combined Services from Cisco and VMware Service Overview A Collaborative Approach to Virtualization

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Position Description. Job Summary: Campus Job Scope:

Position Description. Job Summary: Campus Job Scope: Position Description Report Run Date Sep 10 2015 11:07AM Position Number: 02018467 Dept: ENT APPS & INFRASTRUCTURE SVCS - 061419 Position: WNDOWS SYSTEM APPLICATION ADMINISTRATOR Approved Payroll Title

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

FISMA Cloud GovDataHosting Service Portfolio

FISMA Cloud GovDataHosting Service Portfolio FISMA Cloud Advanced Government Oriented Cloud Hosting Solutions Cyber FISMA Security Cloud Information Security Management Compliance Security Compliant Disaster Recovery Hosting Application Cyber Security

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

AdvancedHosting SM Solutions from SunGard Availability Services

AdvancedHosting SM Solutions from SunGard Availability Services AdvancedHosting SM Solutions from SunGard Availability Services A SINGLE POINT OF CONTACT A COMPLETE MANAGED SERVICES SOLUTION Higher levels of availability Continuous investment in people, technology

More information

Connecting PTE to Careers in Idaho

Connecting PTE to Careers in Idaho 1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University

More information

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:

More information

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS OVERVIEW MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS 2016 Coursework to Meet Real World Demands The best. Made better. SANS graduate programs are the ultimate expression

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

Research, recommend, and assist in implementing identity automation solution.

Research, recommend, and assist in implementing identity automation solution. Stephen Hargrove PO Box 592241 San Antonio, TX 78259 210-239-9763 stephen@stephenhargrove.com EXPERIENCE Information Security Officer Manager, Information Security Administration, UTHSCSA; San Antonio,

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles. Current Vacancies UK & South Africa This document contains both Permanent & Contract roles. To apply for any of the roles please email your CV and covering letter: Email: resourcing@ecs.co.uk Or call our

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

State of Florida Department of Management Services

State of Florida Department of Management Services September 3, 2015 State of Florida Attn: Joel Atkinson Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 350 Seventh Avenue 10th Floor New York, New

More information

1.Cisco Network Architect

1.Cisco Network Architect 1.Cisco Network Architect Analyze business requirements to develop technical network solutions and their framework. Design, test, and inspect data communications systems. Perform network modeling, analysis,

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth)

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) March 2014 Premier Provider of egov Services to the Commonwealth of Virginia Virginia

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

More information

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security

More information

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES 5.1 MANAGED TIERED SECURITY SERVICES [C.2.7.4, M.2.1.3] Level 3 will support the GSA s Multi-Tier Security Profiles (MTSP) initiative in accordance

More information

6. Responsible for installing, configuring and administering VMware vsphere for test and production environments.

6. Responsible for installing, configuring and administering VMware vsphere for test and production environments. DATE PREPARED: 5/18/2016 TITLE: JOB PURPOSE: NETWORK ENGINEER This position is responsible for the administration and maintenance of the City s IT network infrastructure including network security, data

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup. Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles. Current Vacancies UK & South Africa This document contains both Permanent & Contract roles. To apply for any of the roles please email your CV and covering letter: Email: resourcing@ecs.co.uk Or call our

More information

Mobile MOUSe SERVER ADMINISTRATOR ONLINE COURSE OUTLINE

Mobile MOUSe SERVER ADMINISTRATOR ONLINE COURSE OUTLINE Mobile MOUSe SERVER ADMINISTRATOR ONLINE COURSE OUTLINE COURSE TITLE SERVER ADMINISTRATOR COURSE DURATION 15 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW The Server Administrator designation

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

At the Heart of Connected Manufacturing

At the Heart of Connected Manufacturing www.niit-tech.com At the Heart of Connected Manufacturing Transforming Manufacturing Operations to Drive Agility and Profitability The success of the new manufacturing network hinges on the agility of

More information

Professional Experience

Professional Experience MUTHURAJA S.P. Mobile : +91 9944 282299 E-Mail : s.p.muthuraja@gmail.com Career Summary Windows administrator with over 9.5 years of hands-on and multi-tasking experience, adept at handling multiple system

More information

IT Authorities Builds and Manages Technology Platform of the Future for Coca-Cola Beverages Florida

IT Authorities Builds and Manages Technology Platform of the Future for Coca-Cola Beverages Florida IT Authorities Builds and Manages Technology Platform of the Future for Coca-Cola Beverages Florida Providing a dynamic, flexible IT infrastructure; the key to success of growing Florida bottler Photo

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Cyber Defense Operations Graduate Certificate

Cyber Defense Operations Graduate Certificate The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Chart Optimize Transform Your Data Center

Chart Optimize Transform Your Data Center Chart Optimize Transform Your Data Center Advisory Services The Strength of Your Network Begins with An Optimized Physical Infrastructure The performance of your data center depends on a complex interrelationship

More information

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011 ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review

More information

COMPUTER NETWORKS AND SECURITY A FUTURE IN

COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS & SECURITY WHAT ARE CAREERS IN NETWORKS AND SECURITY ALL ABOUT? Computer networks are an inextricable part of modern life. We use computers

More information

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped

More information

JACK LEVY 8609 Misty River Ct. Tampa, FL 33637 Home: (813) 601-1434 JLEVY1126@gmail.com

JACK LEVY 8609 Misty River Ct. Tampa, FL 33637 Home: (813) 601-1434 JLEVY1126@gmail.com SYSTEMS ADMINISTRATOR\Engineer Infrastructure planning, development and maintenance Systems administrator with 8 years of experience in IT infrastructure, deployment, planning, installation, configuration.

More information

Click here to submit your resume

Click here to submit your resume To be considered for positions with SE Solutions candidates must be clearable to a Top Secret level. A current Secret clearance or higher is preferred. US citizenship is required. All positions are full

More information

IT-CNP, Inc. Capability Statement

IT-CNP, Inc. Capability Statement Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government

More information

Course Descriptions. CS 101 Intro to Computer Science

Course Descriptions. CS 101 Intro to Computer Science Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

Welcome to Tech Data's Enterprise Service Center!

Welcome to Tech Data's Enterprise Service Center! Welcome to Tech Data's Enterprise Service Center! Resellers today are looking for ways to reduce their costs and maximize their resources. Leveraging Tech Data s services has become a successful strategy

More information

Developing a Mature Security Operations Center

Developing a Mature Security Operations Center Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and

More information

DATABASE ADMINISTRATOR (SQL & ORACLE) Location: Richmond, VA (1 position)

DATABASE ADMINISTRATOR (SQL & ORACLE) Location: Richmond, VA (1 position) DATABASE ADMINISTRATOR (SQL & ORACLE) Location: Richmond, VA (1 position) Universal Adaptive Consulting Services, Inc (UACS) is seeking a highly motivated, savvy and energetic professional for the role

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

Remote Infrastructure Support Services & Managed IT Services

Remote Infrastructure Support Services & Managed IT Services Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The

More information

About Injazat Data Systems

About Injazat Data Systems About Injazat Data Systems Injazat Data Systems is an industry-recognized market leader in the region for secure and business-aligned IT services. Injazat serves a diverse variety of industry sectors,

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

About Advent One. Contents. 02 What we do. 03 Infrastructure Services. 04 Cloud and Managed Services. 07 Hosting Desktop. 08 Phone.

About Advent One. Contents. 02 What we do. 03 Infrastructure Services. 04 Cloud and Managed Services. 07 Hosting Desktop. 08 Phone. About Advent One Contents 02 What we do 03 Infrastructure Services 04 Cloud and Managed Services 07 Hosting Desktop 08 Phone 09 Email 10 Back up Recovery 12 Dev/Test 13 Contact Making technology work.

More information

Global Knowledge Cybersecurity Training

Global Knowledge Cybersecurity Training Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 eric.vyverberg@protiviti.com Managing

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours

GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY Career Cluster: Career Pathway: Career Major: Career Major Hours: Information Technology (IT) Network Systems (IT001) Cyber Security Forensics Specialist

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

ALASKA HOUSING FINANCE CORPORATION

ALASKA HOUSING FINANCE CORPORATION ALASKA HOUSING FINANCE CORPORATION Infrastructure Administrator I-IV (DOE) (Two Positions) Anchorage/Job #44-15 ===================================================================== Definition Under supervision

More information

MANAGED IT SERVICES. Expert management

MANAGED IT SERVICES. Expert management MANAGED IT SERVICES Expert management for your missioncritical workloads 2 / 8 MANAGED IT SERVICES Managed IT services from Sungard Availability Services On average, enterprises realize only 43% of technology

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

Training Course ECSA/LPT

Training Course ECSA/LPT Brochure More information from http://www.researchandmarkets.com/reports/2226534/ Training Course ECSA/LPT Description: The EC-Council ECSA/LPT EC-Council Certified Security Analyst/ Licensed Penetration

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO Introduction Since taking office in January 2015, Governor Larry Hogan has

More information

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab

More information

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee. New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone

More information