Beatrice Springfield
Details
-Performing daily CND analysis (Information Assurance and Insider Threat Detection) as an intelligence analyst, I coordinate with enclave CND staff to validate network alerts. I examine and analyze data, prioritize significant events for further investigation, correlate information with other information sources to establish context, and to compile noteworthy information into analytic reports for working groups and senior management. Leverage extensive research, evaluate, fuse and interpret data from multiple intelligence sources. Produced intelligence reports daily to address intelligence gaps and task utilizing bulk data analytics; providing analytical written recommendations to be utilized by members of the Intelligence Community in an effort to protect national security. I support partnering business areas with ad-hoc data reporting, and will perform hands-on quantitative, statistical, and operational analysis to determine and communicate meaningful and actionable patterns, trends, insights and recommendations. I provide stakeholders and the customers, recommendations based on review of current IA policy, doctrine, and regulations, for consolidating or developing IA policy and procedures in accordance with Executive order 13587 to improve the security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information
2013 : Present
Leidos Corp.
CND Information Security Engineer
Provide dynamic IA operational support to customers the United States European Command (EUCOM), United States African Command (AFRICOM), United States Central Command (CENTCOM), De fense Information Systems Agency Europe (DISA-Europe), Defense Network Operations Center Europe (DNC_EUR), United States Army Europe (USAREUR), United States Navy Europe (USNAVEUR), United States Air Force (USAFE), and the North Atlantic Treaty Organization (NATO).
2005 : 2013
L-3 Communications
Information Assurance Analyst
Performed fault resolution for advanced, state-of-the-art, cryptographically secure U.S. military command, control, and communications electronic message hardware and software. Organizations were globally located that often required significant troubleshooting measures and diagnostic equipment to determine the cause and location of malfunctions, extent faults, and category maintenance required.
•Evaluated, documented, installed, implemented, tested and performed problem isolation and resolution over physical media, protocol, stacks, hubs, routers, bridges, gateways, and digital servers.
•Assisted in managing and maintaining network components, configurations, and installation and distribution of Field Engineering Notes (FENs), patches, releases, and procedures.
•Managed and led a team of 4 IT professionals in the monitoring and configuring of routers, switches, and COMSEC equipment.
2001 : 2005
CACI - Network Services
Information Systems Analyst
About
As part of my individual development goals I seek to bridge my knowledge in strategic level skills in resolving penitential alerts, support the government in the development of audit and insider trade-craft. Currently I am one of three personnel to ensure and consult specified Network Systems that are compatible and in compliance with the standards for open system architectures, the Open Systems Interconnection (OSI) and International Standards Organization (ISO) reference models and profiles of standards - such as Institute of Electrical and Electronic Engineers (IEEE) Open Systems Environment (OSE) reference model - as they apply to the implementation and specification of Information Management (IM) solution of the network layers, across the application program interface (API) and the external environment/software application. The commercial IT industry has a high turn-over rate that demands certifications as well as education; my plan is to have a balance of both demands to the best of my ability
Objectives:
Facilitate the needs of management to improve the processes performed on a day-to-day basis. Promote a higher understanding of events and analysis in effort to raise the level technical proficiency, execution of tasks, and management of incident response within the client’s network. To demonstrate effective auditing capabilities, provide management of organizations with a basic and better cyber view to promote an understanding of network, data social and ethical solutions. Assist the organization by applying efficient work processes (work done by people, equipment and information systems).