St. Petersburg, Florida, United States
20K followers 500+ connections

Join to view profile

About

• Defense Industrial Base Cybersecurity expert in DFARS , ITAR, CUI, CDI, and other…

Articles by Wilson

Activity

20K followers

See all activities

Experience & Education

  • Jün Cyber

View Wilson’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Join now to see all certifications

Volunteer Experience

  • Project Prosper Graphic

    Cyber Security Consultant

    Project Prosper

    - 1 year 7 months

    Economic Empowerment

    Due to language barriers, the absence of, or limited exposure to banking systems in their countries of origin, their lack of credit and lack of opportunities to build credit, as well as the overall difficulties in adjusting to a new culture, immigrants and refugees have an overwhelming need for our services. Immigrants are often victims of predatory lending schemes and destructive financial practices that have the ability to create irreparable damage. Serving a majority of low-moderate income…

    Due to language barriers, the absence of, or limited exposure to banking systems in their countries of origin, their lack of credit and lack of opportunities to build credit, as well as the overall difficulties in adjusting to a new culture, immigrants and refugees have an overwhelming need for our services. Immigrants are often victims of predatory lending schemes and destructive financial practices that have the ability to create irreparable damage. Serving a majority of low-moderate income individuals (91% in 2014), Project Prosper provides an opportunity for some of the most vulnerable people to protect themselves and become positive contributing members of society.

  • Cyber Threat Intelligence- Special Interest Group

    Forum of Incident Response and Security Teams

    - 3 years

    Education

    CTI-SIG Mission: To define Threat Intelligence in the commercial space. To discuss common applications of threat intelligence capability with a view to agree best practice in the context of supporting effective digital forensics and incident response (DFIR) operations.

    FIRST is the premier organization and recognized global leader in incident response. Membership in FIRST enables incident response teams to more effectively respond to security incidents reactive as well as…

    CTI-SIG Mission: To define Threat Intelligence in the commercial space. To discuss common applications of threat intelligence capability with a view to agree best practice in the context of supporting effective digital forensics and incident response (DFIR) operations.

    FIRST is the premier organization and recognized global leader in incident response. Membership in FIRST enables incident response teams to more effectively respond to security incidents reactive as well as proactive.

    FIRST brings together a variety of computer security incident response teams from government, commercial, and educational organizations. FIRST aims to foster cooperation and coordination in incident prevention, to stimulate rapid reaction to incidents, and to promote information sharing among members and the community at large.

    Apart from the trust network that FIRST forms in the global incident response community, FIRST also provides value added services. Some of these are:

    access to up-to-date best practice documents
    technical colloquia for security experts
    hands-on classes
    annual incident response conference
    publications and web services
    special interest groups

  • Wounded Warrior Project Graphic

    Community Athlete

    Wounded Warrior Project

    - 6 years 8 months

    Raising awareness and funds for the Wounded Warrior Project while participating in a community-sporting event.

  • International Consortium of Minority Cybersecurity Professionals (ICMCP) Graphic

    Mentor

    International Consortium of Minority Cybersecurity Professionals (ICMCP)

    - 2 years 1 month

    ICMCP “Mutual–Match” Mentor-Protégé Program seeks to create lasting and mutually rewarding professional networking and learning opportunities for cybersecurity practitioners acting as mentors or protégés

    ICMCP Mentors: Experienced and Successful Cybersecurity Leaders who want to:

    Mentor Minority Cybersecurity Practitioners on professional growth and career development
    Share professional and life experiences to help other Minority Cybersecurity Practitioners
    Develop new…

    ICMCP “Mutual–Match” Mentor-Protégé Program seeks to create lasting and mutually rewarding professional networking and learning opportunities for cybersecurity practitioners acting as mentors or protégés

    ICMCP Mentors: Experienced and Successful Cybersecurity Leaders who want to:

    Mentor Minority Cybersecurity Practitioners on professional growth and career development
    Share professional and life experiences to help other Minority Cybersecurity Practitioners
    Develop new relationships
    Experience dynamic personal growth through interactions with others
    ICMCP Proteges: Minority Cybersecurity Practitioners who want to:

    Gain insight from experienced mentors on professional growth and career development
    Develop new relationships
    Experience dynamic personal growth through interactions with different mentors

  • Center for Cyber Intelligence Graphic

    Community Leader

    Center for Cyber Intelligence

    - 11 months

    Animal Welfare

    The Center for Cyber Intelligence (CCI) serves the cybersecurity community by developing and providing best in class cyber intelligence standards and guidance while creating an environment that promotes visibility, innovation, and the evolution of cyber intelligence industry. All of our resources are free and open to the public and we strongly encourage the community to contribute.

    Through the existence of CCI, we aim to mobilize and encourage the cyber intelligence community to share…

    The Center for Cyber Intelligence (CCI) serves the cybersecurity community by developing and providing best in class cyber intelligence standards and guidance while creating an environment that promotes visibility, innovation, and the evolution of cyber intelligence industry. All of our resources are free and open to the public and we strongly encourage the community to contribute.

    Through the existence of CCI, we aim to mobilize and encourage the cyber intelligence community to share knowledge, experience, and expertise to identify and validate best practices.

    Current CCI Goals
    Develop a community standard for commonly used cyber intelligence terms.

    Develop a community standard cyber intelligence data schema.

    Document community accepted cyber intelligence methods, models, and techniques.

    Develop a community accepted cyber intelligence service/program definition.

  • ISACA Graphic

    Certified in Governance of Enterprise IT Practice Analysis Task Force

    ISACA

    - Present 6 years 11 months

    To maintain the validity of the CGEIT certification program, a practice analysis will be conducted with the assistance and guidance of PSI, Inc. The objective of this practice analysis is to develop a contemporary description of practice of CGEITs and the knowledge needed to perform their job tasks.

  • BSides St. Pete Graphic

    Lead

    BSides St. Pete

    - Present 4 years 4 months

    Science and Technology

    I lead an incredible team of volunteers to develop and support the cybersecurity community of Saint Petersburg, FL

Publications

  • Building a Security Program for Small to Medium Businesses

    US Cybersecurity Magazine

    According to a recent study from 2017 by the Enterprise Strategy Group1, 45 percent of organizations have a critical shortage of cybersecurity skills. This impacts the ability of IT teams supporting small and medium businesses (SMB) to acquire talent to fill their cybersecurity gaps. As more organizations are improving their third-party risk assessment programs, there is a need to develop internal employees with a cybersecurity skill set sufficient to protect their organizations and prove that…

    According to a recent study from 2017 by the Enterprise Strategy Group1, 45 percent of organizations have a critical shortage of cybersecurity skills. This impacts the ability of IT teams supporting small and medium businesses (SMB) to acquire talent to fill their cybersecurity gaps. As more organizations are improving their third-party risk assessment programs, there is a need to develop internal employees with a cybersecurity skill set sufficient to protect their organizations and prove that the organization does not present a risk to customers or partners.

    See publication

Courses

  • Active Defense, Offensive Countermeasures, and Cyber Deception

    SANS-SEC550C

  • Business Data Communication and Networking

    CS625

  • CCNA Mod1

    -

  • CISSP Prep

    -

  • Certified Ethical Hacker (C|EH)

    -

  • Certified Information Security Manager- Self Study

    -

  • Certified Information Systems Auditor- Self Study

    -

  • Certified in Governance and Enterprise IT- Self Study

    -

  • Certified in Risk and Information Systems Control Exam Prep- Self Study

    -

  • Communications Officer Course, USMC

    -

  • DIACAP Implementation

    -

  • DIACAP Overview

    -

  • Database Design and Implementation

    MET CS 669

  • Database Security

    CS674B

  • IT Strategy and Management

    CS782

  • ITILv3 Foundations

    -

  • Information Assurance Awareness

    -

  • Information Structures- Java Programming

    MET CS 520

  • Information Systems Analysis and Design

    CS682

  • Introduction to Java Programming

    -

  • Linux Security II

    -

  • Practical Web Application Penetration Testing

    -

  • Project Management

    AD642B

  • Project Management Professional (PMP)

    -

  • QualysGuard Certified Specialist- Vulnerability Management

    -

  • Quantitative Methods for Information Systems

    CS546

  • RISK MANAGEMENT FRAMEWORK (RMF) STEP 5: AUTHORIZING SYSTEMS

    -

  • RISK MANAGEMENT FRAMEWORK (RMF) STEP 6: MONITOR SECURITY CONTROLS

    -

  • Risk Management Framework (RMF) Step 1: Categorization of the System

    -

  • Risk Management Framework (RMF) Step 2: Selecting Security Controls

    -

  • Risk Management Framework (RMF) Step 3: Implementing Security Controls

    -

  • Risk Management Framework (RMF) Step 4: Assessing Security Controls

    -

  • Security +

    -

  • U.S. Defense Information Systems Agency (DISA) Penetration Testing Training

    -

  • U.S. Defense Information Systems Agency (DISA) Host Based Security System (HBSS) Admin (201) MR5 (2013) Training

    -

  • U.S. Defense Information Systems Agency (DISA) Assured Compliance Assessment Solution (ACAS) Version 4.6 Training

    -

  • U.S. Defense Security Service- Derivative Classification

    -

  • U.S. Defense Security Service- Developing a Security and Training Program

    -

  • U.S. Defense Security Service- Intro to DoD Personnel Security Adjudication

    -

  • U.S. Defense Security Service- Intro to Information Security

    -

  • U.S. Defense Security Service- Introduction to Industrial Security

    -

  • U.S. Defense Security Service- Introduction to Personnel Security

    -

  • U.S. Defense Security Service- Marking Classified Information

    -

  • U.S. Defense Security Service- NISP Certification and Accreditation Walkthrough

    -

  • U.S. Defense Security Service- OPSEC Fundamentals

    -

  • U.S. Defense Security Service- Original Classification

    -

  • U.S. Defense Security Service- Risk Management for DoD Security Programs

    -

  • U.S. Defense Security Service- Security Policies, Principles, and Programs

    -

  • U.S. Defense Security Service- Special Access Programs Overview

    -

  • U.S. Defense Security Service- Transmission and Transportation for DoD

    -

Projects

  • Training Lab - 2nd Marine Division Communications Company

    -

    Project manager responsible for the establishment of the 2nd Marine Division Communications Company training facility. Supervises the development and reviews curriculum for Marines training in the implementation, operation, and maintenance of military transmissions equipment.

  • Tactical Marine Air Ground Task Force Integration Course 3-13

    -

    Provided functional area expertise as a battalion communications officer to students of the Tactical Marine Air Ground Task Force Integration Course at Marine Corps Tactics and Operations Group in Twenty-nine Palms, California. Provided guidance to mid-level decision makers on the capabilities and limitations of communications equipment. Planned the installation and retrograde of the transmissions architecture and provided documentation in support of combat operations throughout the exercise.

    Provided functional area expertise as a battalion communications officer to students of the Tactical Marine Air Ground Task Force Integration Course at Marine Corps Tactics and Operations Group in Twenty-nine Palms, California. Provided guidance to mid-level decision makers on the capabilities and limitations of communications equipment. Planned the installation and retrograde of the transmissions architecture and provided documentation in support of combat operations throughout the exercise.

  • Bold Alligator 13

    -

    As the officer in charge of the 2nd Marine Expeditionary Brigade (MEB) Systems Control, was responsible for the day to day installation, operation, and maintenance of the MEB communications architecture for the MEB Headquarters element aboard USS Bataan, the Combat Logistics Regiment, the Marine Aircraft Group, and the Regimental Landing Forces. Managed all Approved System Interruptions (ASIs), Network Change Requests (NCRs) and Operational Directives (OPDIRs). Developed and managed project…

    As the officer in charge of the 2nd Marine Expeditionary Brigade (MEB) Systems Control, was responsible for the day to day installation, operation, and maintenance of the MEB communications architecture for the MEB Headquarters element aboard USS Bataan, the Combat Logistics Regiment, the Marine Aircraft Group, and the Regimental Landing Forces. Managed all Approved System Interruptions (ASIs), Network Change Requests (NCRs) and Operational Directives (OPDIRs). Developed and managed project documentation, document libraries, lists on SharePoint that enhanced MEB staff decision making ability to maintain positive communications during ship to shore operations.

  • Operation Enduring Freedom, Afghanistan

    -

    Responsible for the planning and execution of over 50 personnel/transmissions equipment movements from Nov 2011 to November 2012 that supported combat operations for US and coalition forces in Afghanistan. Supervised the execution of multiple network change requests and ASIs requested from subordinate units and required from higher headquarters for network changes and maintenance. Supervised and received network threat and vulnerability analysis reporting from the IA workforce in support of…

    Responsible for the planning and execution of over 50 personnel/transmissions equipment movements from Nov 2011 to November 2012 that supported combat operations for US and coalition forces in Afghanistan. Supervised the execution of multiple network change requests and ASIs requested from subordinate units and required from higher headquarters for network changes and maintenance. Supervised and received network threat and vulnerability analysis reporting from the IA workforce in support of enduring data network communications architecture.

Honors & Awards

  • Navy and Marine Corps Commendation Medal

    -

  • Navy and Marine Corps Commendation Medal

    -

  • Navy and Marine Corps Achievement Medal

    -

Recommendations received

49 people have recommended Wilson

Join now to view

View Wilson’s full profile

  • See who you know in common
  • Get introduced
  • Contact Wilson directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content