About
Articles by Wilson
Activity
20K followers
Experience & Education
Licenses & Certifications
-
-
-
-
-
-
Certified Information Systems Security Professional
(ISC)²
Issued ExpiresCredential ID CISSP ISC2:451843 -
-
-
-
Volunteer Experience
-
Cyber Security Consultant
Project Prosper
- 1 year 7 months
Economic Empowerment
Due to language barriers, the absence of, or limited exposure to banking systems in their countries of origin, their lack of credit and lack of opportunities to build credit, as well as the overall difficulties in adjusting to a new culture, immigrants and refugees have an overwhelming need for our services. Immigrants are often victims of predatory lending schemes and destructive financial practices that have the ability to create irreparable damage. Serving a majority of low-moderate income…
Due to language barriers, the absence of, or limited exposure to banking systems in their countries of origin, their lack of credit and lack of opportunities to build credit, as well as the overall difficulties in adjusting to a new culture, immigrants and refugees have an overwhelming need for our services. Immigrants are often victims of predatory lending schemes and destructive financial practices that have the ability to create irreparable damage. Serving a majority of low-moderate income individuals (91% in 2014), Project Prosper provides an opportunity for some of the most vulnerable people to protect themselves and become positive contributing members of society.
-
Cyber Threat Intelligence- Special Interest Group
Forum of Incident Response and Security Teams
- 3 years
Education
CTI-SIG Mission: To define Threat Intelligence in the commercial space. To discuss common applications of threat intelligence capability with a view to agree best practice in the context of supporting effective digital forensics and incident response (DFIR) operations.
FIRST is the premier organization and recognized global leader in incident response. Membership in FIRST enables incident response teams to more effectively respond to security incidents reactive as well as…CTI-SIG Mission: To define Threat Intelligence in the commercial space. To discuss common applications of threat intelligence capability with a view to agree best practice in the context of supporting effective digital forensics and incident response (DFIR) operations.
FIRST is the premier organization and recognized global leader in incident response. Membership in FIRST enables incident response teams to more effectively respond to security incidents reactive as well as proactive.
FIRST brings together a variety of computer security incident response teams from government, commercial, and educational organizations. FIRST aims to foster cooperation and coordination in incident prevention, to stimulate rapid reaction to incidents, and to promote information sharing among members and the community at large.
Apart from the trust network that FIRST forms in the global incident response community, FIRST also provides value added services. Some of these are:
access to up-to-date best practice documents
technical colloquia for security experts
hands-on classes
annual incident response conference
publications and web services
special interest groups -
Community Athlete
Wounded Warrior Project
- 6 years 8 months
Raising awareness and funds for the Wounded Warrior Project while participating in a community-sporting event.
-
Mentor
International Consortium of Minority Cybersecurity Professionals (ICMCP)
- 2 years 1 month
ICMCP “Mutual–Match” Mentor-Protégé Program seeks to create lasting and mutually rewarding professional networking and learning opportunities for cybersecurity practitioners acting as mentors or protégés
ICMCP Mentors: Experienced and Successful Cybersecurity Leaders who want to:
Mentor Minority Cybersecurity Practitioners on professional growth and career development
Share professional and life experiences to help other Minority Cybersecurity Practitioners
Develop new…ICMCP “Mutual–Match” Mentor-Protégé Program seeks to create lasting and mutually rewarding professional networking and learning opportunities for cybersecurity practitioners acting as mentors or protégés
ICMCP Mentors: Experienced and Successful Cybersecurity Leaders who want to:
Mentor Minority Cybersecurity Practitioners on professional growth and career development
Share professional and life experiences to help other Minority Cybersecurity Practitioners
Develop new relationships
Experience dynamic personal growth through interactions with others
ICMCP Proteges: Minority Cybersecurity Practitioners who want to:
Gain insight from experienced mentors on professional growth and career development
Develop new relationships
Experience dynamic personal growth through interactions with different mentors -
Community Leader
Center for Cyber Intelligence
- 11 months
Animal Welfare
The Center for Cyber Intelligence (CCI) serves the cybersecurity community by developing and providing best in class cyber intelligence standards and guidance while creating an environment that promotes visibility, innovation, and the evolution of cyber intelligence industry. All of our resources are free and open to the public and we strongly encourage the community to contribute.
Through the existence of CCI, we aim to mobilize and encourage the cyber intelligence community to share…The Center for Cyber Intelligence (CCI) serves the cybersecurity community by developing and providing best in class cyber intelligence standards and guidance while creating an environment that promotes visibility, innovation, and the evolution of cyber intelligence industry. All of our resources are free and open to the public and we strongly encourage the community to contribute.
Through the existence of CCI, we aim to mobilize and encourage the cyber intelligence community to share knowledge, experience, and expertise to identify and validate best practices.
Current CCI Goals
Develop a community standard for commonly used cyber intelligence terms.
Develop a community standard cyber intelligence data schema.
Document community accepted cyber intelligence methods, models, and techniques.
Develop a community accepted cyber intelligence service/program definition. -
Certified in Governance of Enterprise IT Practice Analysis Task Force
ISACA
- Present 6 years 11 months
To maintain the validity of the CGEIT certification program, a practice analysis will be conducted with the assistance and guidance of PSI, Inc. The objective of this practice analysis is to develop a contemporary description of practice of CGEITs and the knowledge needed to perform their job tasks.
-
Lead
BSides St. Pete
- Present 4 years 4 months
Science and Technology
I lead an incredible team of volunteers to develop and support the cybersecurity community of Saint Petersburg, FL
Publications
-
Building a Security Program for Small to Medium Businesses
US Cybersecurity Magazine
See publicationAccording to a recent study from 2017 by the Enterprise Strategy Group1, 45 percent of organizations have a critical shortage of cybersecurity skills. This impacts the ability of IT teams supporting small and medium businesses (SMB) to acquire talent to fill their cybersecurity gaps. As more organizations are improving their third-party risk assessment programs, there is a need to develop internal employees with a cybersecurity skill set sufficient to protect their organizations and prove that…
According to a recent study from 2017 by the Enterprise Strategy Group1, 45 percent of organizations have a critical shortage of cybersecurity skills. This impacts the ability of IT teams supporting small and medium businesses (SMB) to acquire talent to fill their cybersecurity gaps. As more organizations are improving their third-party risk assessment programs, there is a need to develop internal employees with a cybersecurity skill set sufficient to protect their organizations and prove that the organization does not present a risk to customers or partners.
Courses
-
Active Defense, Offensive Countermeasures, and Cyber Deception
SANS-SEC550C
-
Business Data Communication and Networking
CS625
-
CCNA Mod1
-
-
CISSP Prep
-
-
Certified Ethical Hacker (C|EH)
-
-
Certified Information Security Manager- Self Study
-
-
Certified Information Systems Auditor- Self Study
-
-
Certified in Governance and Enterprise IT- Self Study
-
-
Certified in Risk and Information Systems Control Exam Prep- Self Study
-
-
Communications Officer Course, USMC
-
-
DIACAP Implementation
-
-
DIACAP Overview
-
-
Database Design and Implementation
MET CS 669
-
Database Security
CS674B
-
IT Strategy and Management
CS782
-
ITILv3 Foundations
-
-
Information Assurance Awareness
-
-
Information Structures- Java Programming
MET CS 520
-
Information Systems Analysis and Design
CS682
-
Introduction to Java Programming
-
-
Linux Security II
-
-
Practical Web Application Penetration Testing
-
-
Project Management
AD642B
-
Project Management Professional (PMP)
-
-
QualysGuard Certified Specialist- Vulnerability Management
-
-
Quantitative Methods for Information Systems
CS546
-
RISK MANAGEMENT FRAMEWORK (RMF) STEP 5: AUTHORIZING SYSTEMS
-
-
RISK MANAGEMENT FRAMEWORK (RMF) STEP 6: MONITOR SECURITY CONTROLS
-
-
Risk Management Framework (RMF) Step 1: Categorization of the System
-
-
Risk Management Framework (RMF) Step 2: Selecting Security Controls
-
-
Risk Management Framework (RMF) Step 3: Implementing Security Controls
-
-
Risk Management Framework (RMF) Step 4: Assessing Security Controls
-
-
Security +
-
-
U.S. Defense Information Systems Agency (DISA) Penetration Testing Training
-
-
U.S. Defense Information Systems Agency (DISA) Host Based Security System (HBSS) Admin (201) MR5 (2013) Training
-
-
U.S. Defense Information Systems Agency (DISA) Assured Compliance Assessment Solution (ACAS) Version 4.6 Training
-
-
U.S. Defense Security Service- Derivative Classification
-
-
U.S. Defense Security Service- Developing a Security and Training Program
-
-
U.S. Defense Security Service- Intro to DoD Personnel Security Adjudication
-
-
U.S. Defense Security Service- Intro to Information Security
-
-
U.S. Defense Security Service- Introduction to Industrial Security
-
-
U.S. Defense Security Service- Introduction to Personnel Security
-
-
U.S. Defense Security Service- Marking Classified Information
-
-
U.S. Defense Security Service- NISP Certification and Accreditation Walkthrough
-
-
U.S. Defense Security Service- OPSEC Fundamentals
-
-
U.S. Defense Security Service- Original Classification
-
-
U.S. Defense Security Service- Risk Management for DoD Security Programs
-
-
U.S. Defense Security Service- Security Policies, Principles, and Programs
-
-
U.S. Defense Security Service- Special Access Programs Overview
-
-
U.S. Defense Security Service- Transmission and Transportation for DoD
-
Projects
-
Training Lab - 2nd Marine Division Communications Company
-
Project manager responsible for the establishment of the 2nd Marine Division Communications Company training facility. Supervises the development and reviews curriculum for Marines training in the implementation, operation, and maintenance of military transmissions equipment.
-
Tactical Marine Air Ground Task Force Integration Course 3-13
-
Provided functional area expertise as a battalion communications officer to students of the Tactical Marine Air Ground Task Force Integration Course at Marine Corps Tactics and Operations Group in Twenty-nine Palms, California. Provided guidance to mid-level decision makers on the capabilities and limitations of communications equipment. Planned the installation and retrograde of the transmissions architecture and provided documentation in support of combat operations throughout the exercise.
Provided functional area expertise as a battalion communications officer to students of the Tactical Marine Air Ground Task Force Integration Course at Marine Corps Tactics and Operations Group in Twenty-nine Palms, California. Provided guidance to mid-level decision makers on the capabilities and limitations of communications equipment. Planned the installation and retrograde of the transmissions architecture and provided documentation in support of combat operations throughout the exercise.
-
Bold Alligator 13
-
As the officer in charge of the 2nd Marine Expeditionary Brigade (MEB) Systems Control, was responsible for the day to day installation, operation, and maintenance of the MEB communications architecture for the MEB Headquarters element aboard USS Bataan, the Combat Logistics Regiment, the Marine Aircraft Group, and the Regimental Landing Forces. Managed all Approved System Interruptions (ASIs), Network Change Requests (NCRs) and Operational Directives (OPDIRs). Developed and managed project…
As the officer in charge of the 2nd Marine Expeditionary Brigade (MEB) Systems Control, was responsible for the day to day installation, operation, and maintenance of the MEB communications architecture for the MEB Headquarters element aboard USS Bataan, the Combat Logistics Regiment, the Marine Aircraft Group, and the Regimental Landing Forces. Managed all Approved System Interruptions (ASIs), Network Change Requests (NCRs) and Operational Directives (OPDIRs). Developed and managed project documentation, document libraries, lists on SharePoint that enhanced MEB staff decision making ability to maintain positive communications during ship to shore operations.
-
Operation Enduring Freedom, Afghanistan
-
Responsible for the planning and execution of over 50 personnel/transmissions equipment movements from Nov 2011 to November 2012 that supported combat operations for US and coalition forces in Afghanistan. Supervised the execution of multiple network change requests and ASIs requested from subordinate units and required from higher headquarters for network changes and maintenance. Supervised and received network threat and vulnerability analysis reporting from the IA workforce in support of…
Responsible for the planning and execution of over 50 personnel/transmissions equipment movements from Nov 2011 to November 2012 that supported combat operations for US and coalition forces in Afghanistan. Supervised the execution of multiple network change requests and ASIs requested from subordinate units and required from higher headquarters for network changes and maintenance. Supervised and received network threat and vulnerability analysis reporting from the IA workforce in support of enduring data network communications architecture.
Honors & Awards
-
Navy and Marine Corps Commendation Medal
-
-
Navy and Marine Corps Commendation Medal
-
-
Navy and Marine Corps Achievement Medal
-
Recommendations received
49 people have recommended Wilson
Join now to viewOther similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content