Nathan Keough
Details
Information Technology Project Management
Webster University
2014 : 2015
BS Electronics Systems Technologies (EST)
Electrical/Electronics Maintenance and Repair Technology
Southern Illinois University, Carbondale
2004 : 2006
Northrop Grumman
Sr. Principal Cybersecurity Analyst
• Led Authorization and Assessment submission for two systems, both obtained an ATO
• Regular engagement with the customer, Network/Test/Systems/Software Engineers, and Program Management to explain cyber requirements, security configs, risk mitigation, impact of vulnerabilities
• Perform STIG analysis, risk assessments, policy analysis, IAVA analysis and applicability, ACAS and SCAP scan analysis, POA&M review, dev/test security updates and configs, review security configuration
• Created compliance library with rolling checklists, base policy rules, how-to articles
• Created ATT&CK matrices for multiple APT, enabled CSA compliance testing and validation
• Created information system security plan for an off-network environment subject to NIST SP 800-171
• Reviewed and advised Cyber Engineers on the application of CMMC controls
2019 : 2023
Northrop Grumman
Sr. Principal Cyber Systems Engineer
• Security Control Assessor-Liaison (SCA-L) : identify, implement, assess, and manage cybersecurity capabilities and services, team coordination, and subject matter expertise
• Conduct required vulnerability analysis to support mitigation and residual risk determination, and eMASS data entry
• Review security requirements, products, configurations, and cybersecurity architectures
• Develop and execute security test plans, and assess cybersecurity risk of IT systems
• Participate in collaboration meetings; act as trusted agent to program managers and cybersecurity practitioners
• Track critical cybersecurity processes, assess network and/or systems using cybersecurity automated tools such as Nessus, SCAP, and any applicable Security Technical Implementation Guides (STIGs)
• Produce a monthly Open Source Intelligence report covering current threats and vulnerabilities
2019 : 2019
Sentek Global
Cybersecurity Engineer
• Led operations for two sections comprised of 20 permanent staff and over 565 temporary workers
• Improved departmental operations by prioritizing deliberate and dynamic planning
• Administered a $1.4M mail sorting contract; oversaw the transfer to new management and technical support 35 days prior to the 2018 Gubernatorial General Election
• Handled and mitigated a last-minute increase of 400% in the daily workload due to excessive technical issues with DMV and Secretary of State registration systems
• Streamlined in-office voting; Facilitated 390% increase since last Gubernatorial General Election
• Supervised a call center staff of up to 40 receiving more than 5k in phone calls in a one day
• Developed a new method for the daily count of outstanding ballots; saved 960 man-hours
• Analyzed and resolved cross-organization gaps saving $3K in unnecessary mail ballots
2018 : 2018
County of San Diego
Chief, Voter Services Division
• Managed a staff of 70 military, federal civilian, contractors, and international officers
• Consolidate and rationalize reporting to Senior Management in detailed writing and/or briefings
• Streamline IT processes to reflect changing requirements from Senior Management and customers
• Successful application of project management methodologies -personnel, emergency planning, research and analysis used to inform Congress and the President
• Led IT project to implement system to distribute reporting; reduced calls by 80%
• Liaison between foreign military dignitaries and senior US personnel
• Additional responsibilities : SharePoint manager, customer engagement, travel budget manager, VIP scheduling, system/data/site access
2014 : 2018
US Army
Operations Manager
Skills
Active TS/SCI Clearance, Application Security, Artifactory, Assured Compliance Assessment Solution (ACAS), Atlassian Suite, Auditing, Aviation Electronics, Business Process Improvement, Certified Knowledge Manager, Cisco IOS, ClearQuest, Confluence, Customer Service, Cyber, Cybersecurity, Electronics Repair, Electronic Troubleshooting, eMASS, Event Planning, Git, Group Policy, HBSS, Information Analysis, Information Assurance, Information Security, Information Security Management, Intelligence Analysis, Jira, Knowledge Management, Knowledge Organization, Knowledge Sharing, Leadership, Management, Military Operations, Multi-Cultural Team Leadership, NIST 800-53, Personnel Security, Physical Security, Public Speaking, Red Hat Enterprise Linux (RHEL), RMF, Security Audits, Security Operations, STIG, Team Building, Technical Support, Time Management, Trend Analysis, Windows, Windows 10
About
I am an engaged worker and committed team member. I strive for efficiency and excel in high stress environments. I am committed to efficacy in all I do. I thoroughly enjoy working in Cybersecurity and look forward to seeing where this industry takes me.