Kimberly Register
Details
Information System Management
Colorado Technical Institute
• Supervise, mentor, and direct 40 personnel in performing security measures including analysis, assessments, testing, evaluation, verification, accreditation, and review of information system installations at appropriate classification levels within Army Reserve enterprise network.
• Cost-effectively control $7M budget and govern security across US Army Reserve enterprise network and subordinate commands spanning nearly 1,000 locations nationwide and over 200,000 users; consistently maintain 100% FISMA compliance.
• Maintain 100% of DoD Authority to Operate (ATO) for six networks.
• Align and mobilize computer network defense, compliance, and incident response teams in response to incidents, threats, and vulnerabilities.
• Conduct risk and vulnerability assessments of planned and installed information systems.
• Develop, schedule, and administer information security training program for internal staff.
• Perform detailed analysis and review of all accreditation packages, assess security events to determine impact, and develop and execute robust corrective action plans.
• Use cutting-edge network monitoring tools to identify tactics, techniques, and procedures used by malicious attackers seeking to exploit vulnerabilities and weaknesses of infrastructure.
2011 : Present
Us Army Reserves
Cybersecurity Division Chief
• Directed, mentored, trained, instructed, and supervised eight personnel in delivering technical leadership and guidance for information security programs involving 42 Network Enterprise Centers (NECs).
• Methodically assessed threats, risks and vulnerabilities, and recommended preventive, mitigating, and compensation controls to ensure confidentiality, integrity, and availability of systems.
• Ensured STIG compliance and guided strategic efforts for NEC to earn passing rating from inspections.
• Helmed all aspects of network and system security including vulnerability/risk assessments and management plans for 42 NECs.
2009 : 2011
US Army
Supervisor | Information Technology Specialist
• Improved remote support for 1,000+ users via Lean Six Sigma project and captured $30K in savings by dramatically accelerating turnaround time on support tickets.
• Performed full-scope network administration, provided desktop support, solved configuration issues, repaired network as required, and project-managed imaging and configuration of 300+ remote systems.
2006 : 2009
US Army
Information Technology Specialist
• Functioned as information system/network security analyst and brigade's technical expert on security-related planning of networks and LAN expansions.
• Managed complex network operations encompassing system configurations, automation, data processing, network analysis, network security, disaster recovery plans, and user access control.
• Delivered comprehensive training in information security, information assurance, and encryption devices.
2004 : 2006
US Army
Network Manager
• Managed North Carolina National Guard Military Center and remote WAN & LAN operations, consisting of 300+ servers; retained full-time following outstanding performance in contractor assignment.
• Monitored network security, installed upgrades and patches, and devised COOP plan for offsite storage of tapes to ensure data integrity.
• Performed system backups, configured routers and switches, authored standard operating procedures for network control center, and provided level 3 support for 1,300 end users spanning 108 counties.
• Served as Team Lead on successful implementation and conversion of Compaq SAN.
2001 : 2004
North Carolina National Guard
Network Manager
Skills
Certified Information Security Manager (CISM), CISSP, Compliance Management, Configuration Management, Continuous Process Improvement, Cybersecurity, Data Analysis, Disaster Recovery, Information Security, Leadership, Lean Process Improvement, Lean Six Sigma, Microsoft Office, Network Security, Program Management, Risk Management, Risk Mitigation, Security, Solution Architecture, Team Building, Team Leadership, Testing, Training, Vulnerability Assessment, Vulnerability Management
About
Results-driven Leader possessing two decades of experience in various cybersecurity capacities ranging from program management to risk mitigation and strategic planning. Dynamic leadership abilities, instrumental to building, training and managing high performance teams dedicated to ensuring strict quality control and utmost security. Expertise in conducting thorough security scans / audits and implementing innovative plans to mitigate risk based on findings. Possesses active Top / Secret (SCI) security clearance.