SlideShare una empresa de Scribd logo
1 de 3
CHRISTOPHER MILLER
719-453-5056
christopher.miller2016@yahoo.com
PROFESSIONAL SUMMARY
Information Assurance/Cyber Security Professional and Military Veteran with a Top Secret/ SCI Security
Clearance and 20 years of proven experience in the United States Air Force. Accomplished measurable
results while leading teams of 5 - 20 in a dynamic, fast - paced environment. Possess a comprehensive
background in Cyber Security derived from conducting domestic and global operations in the United States.
Managed risk upon multiple lines to protect assets, property, and equipment valued over $20M while meeting
the expectations of senior leadership. Possess extensive knowledge in Cyber Security and Information Systems
Technology. Recipient of multiple awards for outstanding performance and professionalism. Career supported
by an Associate of Computer Science, Community College of the Air Force and vast military experience and
expertise.
• CISSP • Information Assurance • EMSEC/TEMPEST
Management
• Cyber Security
• Comm/Sec Analysis
• Advanced Networking
• System Administrator
• Organization/Communication
• Info System Security
Management
PROFESSIONAL EXPERIENCE
Chief Information Security Officer June 2014 – July 2016
• Collaborated with Air Force Space Command (AFSPC) Authorizing Officials and ensured Federal
Information Security Management Act (FISMA) reporting standards and continuity across Major
Command Intelligence, Surveillance and Reconnaissance (ISR) network
• Implemented Information Assurance (IA) integration into Joint Worldwide Intelligence System
(JWICS) planning and programming; enabled protection of critical data systems
• Led AFSPC Certification and Accreditation program and managed Risk Management System
(Xacta) database and secured ISR assets valued at $50M
• Managed timeline and implementation vectors for Air Force, Defense Intelligence Agency (DIA)
JWICS migrations and validated base network readiness
• Led 11 incident investigations; mitigated spillage propagation in 2 hours vs 72 hours; secured 75TB
of data and saved 420 man hours; administered resolution on 65 client network incidents; led repair
actions on 43 network systems; assured JWICS user access 24 hours a day and 7 days a week
Information Systems Security Manager May 2011 – May 2014
• Coordinates with Authorizing Officials (AOs) to facilitate continuous FISMA reporting standards in
accordance with published requirements and standards resulting in sustained superior performance
• Led United States Air Forces in Europe (USAFE) Certification and Accreditation program and
managed Enterprise Mission Assurance Support Service (eMASS) database and secured multiple
domains across Europe and Africa
• Resolved Emission Security (EMSEC) shortfalls in Europe, garnered approval from the Air Force
Certified TEMPEST Technical Authority before shortfall caused mission failure
• Led Cyber Awareness Month program, vetted themes and provided education across
TV/radio/newspaper/internet, provided valuable Information Assurance training to 50k users
• Shaped Moroccan and Croatian military cyber conferences and provided valuable IA training
resulting in a solidified partner nation relations
• Implemented Public Key Infrastructure token issuance for classified networks, ensuring 42k
users retain vital access while meeting strict Department of Defense standards
____________________________________________________________CHRISTOPHER MILLER, PG. 2
Information Assurance Manager September 2008 – May 2011
• Managed information assurance annual inspections for a wide area network; inspected 9,000
systems in person despite 50% staff reduction
• Produced monthly information assurance promotion campaign via television and newspapers;
educated over 10,000 employees resulting in 42% reduction in network incidents
• Briefed cyber security and personal network protection at various locations; increased knowledge
and vigilance of average network user protecting 250+ employees at both home and work
Mid-Level Information Assurance September 2004 – September 2008
• Certified and Accredited $1.5M multinational classified network; ensured network was available
24/7 to coordinate defense of North America
• Ensured headquarters move of 43 servers, 200+ system, $2.1M network was completed on-time
and without security incidents, resulting in zero interference in continuing air operations
• Provided information assurance expertise for multinational military event; support minimized
downtime for over 200 operators, efforts lauded by event leadership
Information Systems Security Manager August 2000 – August 2004
• Managed TEMPEST program for the largest Air Force Base in Europe, key adviser on network
infrastructure upgrade, ensured all 148 facilities were up to national standards
• Educated 1900+ employees across Europe in over a 100 various forums, requested by name to brief
on multiple information assurance topics, advanced user knowledge 50%
• Coordinated with 150+ organizations to schedule and conduct annual Information Assurance overviews,
ensured all users were properly educated and all classified processing areas were secure
Information Assurance Analyst August 1996 – August 2000
• Analyzed network traffic in response to 200+ hacker incidents at multiple military locations
worldwide; closed routes to intruders protecting multi-million dollar department of defense
networks
• Reviewed 3,000 network alarms daily; information garnered was used to review and update 12
operational handbooks used to significantly increase network security for eight locations in
Southwest Asia
• Performed as senior shift manager for multinational secured communication network spanning
most of Europe, managed critical circuits and servers
EDUCATION
Associate of Science, Information System Technology, Community College of the Air Force
Basic Leadership and Technical Course
Mid-Level Leadership and Management Course
Information Systems Security Management Course
TEMPEST Fundamentals
TEMPEST Diagnostics and Testing Course
TEMPEST/Emission Security Management Course
Communication Security Course
Risk Management Course
CERTIFICATIONS
Certified Information Systems Security Professional (CISSP)
CompTIA Security +

Más contenido relacionado

La actualidad más candente

American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...Investorideas.com
 
Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray M...
Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray M...Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray M...
Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray M...raymurphy9533
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityDr. Lasantha Ranwala
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk managementDr. Lasantha Ranwala
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter SecuritySam Bowne
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
ME Information Security
ME Information SecurityME Information Security
ME Information SecurityMohamed Monsef
 
Seurity policy
Seurity policySeurity policy
Seurity policyHari Sarda
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksMaurice Dawson
 

La actualidad más candente (19)

Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray M...
Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray M...Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray M...
Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray M...
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
Hiring for cybersecurity
Hiring for cybersecurityHiring for cybersecurity
Hiring for cybersecurity
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Computer security
Computer securityComputer security
Computer security
 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Seurity policy
Seurity policySeurity policy
Seurity policy
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
 

Destacado

Zeshan_Tariq_Resume
Zeshan_Tariq_ResumeZeshan_Tariq_Resume
Zeshan_Tariq_ResumeZeshan Tariq
 
Sistema educativo de finlandia
Sistema educativo de finlandiaSistema educativo de finlandia
Sistema educativo de finlandiaLiz Servín
 
Precificação ginga pro - Pedro Teixeira
Precificação ginga pro - Pedro TeixeiraPrecificação ginga pro - Pedro Teixeira
Precificação ginga pro - Pedro TeixeiraFIBH
 
Trabajo final diseno_proyectos_
Trabajo final diseno_proyectos_Trabajo final diseno_proyectos_
Trabajo final diseno_proyectos_n12345_x
 
Pulsador de pantallla tactil
Pulsador de pantallla tactilPulsador de pantallla tactil
Pulsador de pantallla tactilAlba Ar
 
Presentación1
Presentación1Presentación1
Presentación1116bfracid
 

Destacado (12)

Zeshan_Tariq_Resume
Zeshan_Tariq_ResumeZeshan_Tariq_Resume
Zeshan_Tariq_Resume
 
Entrevista 11-2
Entrevista 11-2Entrevista 11-2
Entrevista 11-2
 
Sistema educativo de finlandia
Sistema educativo de finlandiaSistema educativo de finlandia
Sistema educativo de finlandia
 
Precificação ginga pro - Pedro Teixeira
Precificação ginga pro - Pedro TeixeiraPrecificação ginga pro - Pedro Teixeira
Precificação ginga pro - Pedro Teixeira
 
Womens Day Cup 2016 - Rink Football Tournament
Womens Day Cup 2016 - Rink Football TournamentWomens Day Cup 2016 - Rink Football Tournament
Womens Day Cup 2016 - Rink Football Tournament
 
Aya Alah Emad CV
Aya Alah Emad CVAya Alah Emad CV
Aya Alah Emad CV
 
Temas
TemasTemas
Temas
 
Trabajo final diseno_proyectos_
Trabajo final diseno_proyectos_Trabajo final diseno_proyectos_
Trabajo final diseno_proyectos_
 
Pulsador de pantallla tactil
Pulsador de pantallla tactilPulsador de pantallla tactil
Pulsador de pantallla tactil
 
Los sacramentos
Los sacramentosLos sacramentos
Los sacramentos
 
Presentación1
Presentación1Presentación1
Presentación1
 
ELLWANGER & GEIGER Real Estate: GERMAN PROPERTY PARTNERS
ELLWANGER & GEIGER Real Estate: GERMAN PROPERTY PARTNERSELLWANGER & GEIGER Real Estate: GERMAN PROPERTY PARTNERS
ELLWANGER & GEIGER Real Estate: GERMAN PROPERTY PARTNERS
 

Similar a Resume - Miller, Christopher

19370_Tara_Brooks_21729_Resume1
19370_Tara_Brooks_21729_Resume119370_Tara_Brooks_21729_Resume1
19370_Tara_Brooks_21729_Resume1tara brooks
 
Kevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resumeBryan Davila
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber ElijahElijah Weber
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resumeBryan Davila
 
Resume - Ragadio_Jeveck
Resume - Ragadio_JeveckResume - Ragadio_Jeveck
Resume - Ragadio_JeveckJeveck Ragadio
 
Resume_Mr Herbert A Thompson 10_16_2015
Resume_Mr  Herbert A Thompson 10_16_2015Resume_Mr  Herbert A Thompson 10_16_2015
Resume_Mr Herbert A Thompson 10_16_2015Herbert Thompson
 
BECHTELL, WILLIAM_RESUME FINAL
BECHTELL, WILLIAM_RESUME FINALBECHTELL, WILLIAM_RESUME FINAL
BECHTELL, WILLIAM_RESUME FINALWilliam Bechtel
 
Viera HR and IT Resume (2)
Viera HR and IT Resume (2)Viera HR and IT Resume (2)
Viera HR and IT Resume (2)EJaz VI
 
Davila Bryan resume
Davila Bryan resumeDavila Bryan resume
Davila Bryan resumeBryan Davila
 
2015 Resume for Larry Ogershok
2015 Resume for Larry Ogershok2015 Resume for Larry Ogershok
2015 Resume for Larry OgershokLarry Ogershok
 

Similar a Resume - Miller, Christopher (20)

Favors, Princess Resume
Favors, Princess ResumeFavors, Princess Resume
Favors, Princess Resume
 
B Parker Resume rev 2
B Parker Resume rev 2B Parker Resume rev 2
B Parker Resume rev 2
 
David Clark (C)
David Clark (C)David Clark (C)
David Clark (C)
 
Resume - Timothy Lewis 20160313
Resume - Timothy Lewis 20160313Resume - Timothy Lewis 20160313
Resume - Timothy Lewis 20160313
 
19370_Tara_Brooks_21729_Resume1
19370_Tara_Brooks_21729_Resume119370_Tara_Brooks_21729_Resume1
19370_Tara_Brooks_21729_Resume1
 
Kevin Farmer Chronological
Kevin Farmer ChronologicalKevin Farmer Chronological
Kevin Farmer Chronological
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resume
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber Elijah
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resume
 
Charity Winkler
Charity WinklerCharity Winkler
Charity Winkler
 
kjs resume 2015
kjs resume 2015kjs resume 2015
kjs resume 2015
 
Resume
ResumeResume
Resume
 
Resume - Ragadio_Jeveck
Resume - Ragadio_JeveckResume - Ragadio_Jeveck
Resume - Ragadio_Jeveck
 
Resume_Mr Herbert A Thompson 10_16_2015
Resume_Mr  Herbert A Thompson 10_16_2015Resume_Mr  Herbert A Thompson 10_16_2015
Resume_Mr Herbert A Thompson 10_16_2015
 
BECHTELL, WILLIAM_RESUME FINAL
BECHTELL, WILLIAM_RESUME FINALBECHTELL, WILLIAM_RESUME FINAL
BECHTELL, WILLIAM_RESUME FINAL
 
ConklinResume2
ConklinResume2ConklinResume2
ConklinResume2
 
Viera HR and IT Resume (2)
Viera HR and IT Resume (2)Viera HR and IT Resume (2)
Viera HR and IT Resume (2)
 
Davila Bryan resume
Davila Bryan resumeDavila Bryan resume
Davila Bryan resume
 
2015 Resume for Larry Ogershok
2015 Resume for Larry Ogershok2015 Resume for Larry Ogershok
2015 Resume for Larry Ogershok
 
Bartos (2)
Bartos (2)Bartos (2)
Bartos (2)
 

Resume - Miller, Christopher

  • 1. CHRISTOPHER MILLER 719-453-5056 christopher.miller2016@yahoo.com PROFESSIONAL SUMMARY Information Assurance/Cyber Security Professional and Military Veteran with a Top Secret/ SCI Security Clearance and 20 years of proven experience in the United States Air Force. Accomplished measurable results while leading teams of 5 - 20 in a dynamic, fast - paced environment. Possess a comprehensive background in Cyber Security derived from conducting domestic and global operations in the United States. Managed risk upon multiple lines to protect assets, property, and equipment valued over $20M while meeting the expectations of senior leadership. Possess extensive knowledge in Cyber Security and Information Systems Technology. Recipient of multiple awards for outstanding performance and professionalism. Career supported by an Associate of Computer Science, Community College of the Air Force and vast military experience and expertise. • CISSP • Information Assurance • EMSEC/TEMPEST Management • Cyber Security • Comm/Sec Analysis • Advanced Networking • System Administrator • Organization/Communication • Info System Security Management PROFESSIONAL EXPERIENCE Chief Information Security Officer June 2014 – July 2016 • Collaborated with Air Force Space Command (AFSPC) Authorizing Officials and ensured Federal Information Security Management Act (FISMA) reporting standards and continuity across Major Command Intelligence, Surveillance and Reconnaissance (ISR) network • Implemented Information Assurance (IA) integration into Joint Worldwide Intelligence System (JWICS) planning and programming; enabled protection of critical data systems • Led AFSPC Certification and Accreditation program and managed Risk Management System (Xacta) database and secured ISR assets valued at $50M • Managed timeline and implementation vectors for Air Force, Defense Intelligence Agency (DIA) JWICS migrations and validated base network readiness • Led 11 incident investigations; mitigated spillage propagation in 2 hours vs 72 hours; secured 75TB of data and saved 420 man hours; administered resolution on 65 client network incidents; led repair actions on 43 network systems; assured JWICS user access 24 hours a day and 7 days a week Information Systems Security Manager May 2011 – May 2014 • Coordinates with Authorizing Officials (AOs) to facilitate continuous FISMA reporting standards in accordance with published requirements and standards resulting in sustained superior performance • Led United States Air Forces in Europe (USAFE) Certification and Accreditation program and managed Enterprise Mission Assurance Support Service (eMASS) database and secured multiple domains across Europe and Africa • Resolved Emission Security (EMSEC) shortfalls in Europe, garnered approval from the Air Force Certified TEMPEST Technical Authority before shortfall caused mission failure • Led Cyber Awareness Month program, vetted themes and provided education across TV/radio/newspaper/internet, provided valuable Information Assurance training to 50k users • Shaped Moroccan and Croatian military cyber conferences and provided valuable IA training resulting in a solidified partner nation relations • Implemented Public Key Infrastructure token issuance for classified networks, ensuring 42k users retain vital access while meeting strict Department of Defense standards
  • 2. ____________________________________________________________CHRISTOPHER MILLER, PG. 2 Information Assurance Manager September 2008 – May 2011 • Managed information assurance annual inspections for a wide area network; inspected 9,000 systems in person despite 50% staff reduction • Produced monthly information assurance promotion campaign via television and newspapers; educated over 10,000 employees resulting in 42% reduction in network incidents • Briefed cyber security and personal network protection at various locations; increased knowledge and vigilance of average network user protecting 250+ employees at both home and work Mid-Level Information Assurance September 2004 – September 2008 • Certified and Accredited $1.5M multinational classified network; ensured network was available 24/7 to coordinate defense of North America • Ensured headquarters move of 43 servers, 200+ system, $2.1M network was completed on-time and without security incidents, resulting in zero interference in continuing air operations • Provided information assurance expertise for multinational military event; support minimized downtime for over 200 operators, efforts lauded by event leadership Information Systems Security Manager August 2000 – August 2004 • Managed TEMPEST program for the largest Air Force Base in Europe, key adviser on network infrastructure upgrade, ensured all 148 facilities were up to national standards • Educated 1900+ employees across Europe in over a 100 various forums, requested by name to brief on multiple information assurance topics, advanced user knowledge 50% • Coordinated with 150+ organizations to schedule and conduct annual Information Assurance overviews, ensured all users were properly educated and all classified processing areas were secure Information Assurance Analyst August 1996 – August 2000 • Analyzed network traffic in response to 200+ hacker incidents at multiple military locations worldwide; closed routes to intruders protecting multi-million dollar department of defense networks • Reviewed 3,000 network alarms daily; information garnered was used to review and update 12 operational handbooks used to significantly increase network security for eight locations in Southwest Asia • Performed as senior shift manager for multinational secured communication network spanning most of Europe, managed critical circuits and servers EDUCATION Associate of Science, Information System Technology, Community College of the Air Force Basic Leadership and Technical Course Mid-Level Leadership and Management Course Information Systems Security Management Course TEMPEST Fundamentals TEMPEST Diagnostics and Testing Course TEMPEST/Emission Security Management Course Communication Security Course Risk Management Course CERTIFICATIONS Certified Information Systems Security Professional (CISSP)