[PDF] AMELIA ESTWICK PhD - Excelsior College





Loading...








[PDF] RAND - Advanced Network Defense Research - DTIC

Security Agency (NSA) and RAND's National Defense Research Institute users to aid in the analysis of computer/network attack incidents The




[PDF] Cryptologic Technician - Networks (CTN) - DoD COOL

Duties include, but are not limited to, Computer Network Defense Analysis, Digital Forensics Analysis, Digital Network Analysis, Interactive Operations, 

[PDF] Attilio Bonaccorso Jr Executive IT & Cybersecurity

Frontrunner with expertise in cyber defense strategies, NATIONAL SECURITY AGENCY (NSA) • Fort Meade, Maryland / San Antonio, Texas • 2005 – 2009, 

[PDF] TOP SECRET//S1//N OF ORN National Security Agency/Central

17 jan 2013 · (S//NF) Information Assurance and Computer Network Defense Relationship facilitate cooperation, an NSA CT analyst, stationed in Berlin, 

[PDF] Organization of DOD computer network defense exploitation and

12 mar 2009 · With respect to computer network defense, there are multiple DoD manipulating systems, as directed by the intelligence analyst and the 




[PDF] NSA'S Top Ten Cybersecurity Mitigation Strategies

NSA's Top Ten Mitigation Strategies counter a broad range of exploitation techniques used by defense-in-depth security posture high-value assets, and to move laterally through the network 3 reduction of exposure from known threats, and provide access to a much larger threat analysis and tipping capability than

[PDF] AMELIA ESTWICK PhD - Excelsior College

NSA Computer Network Operations Develop Program (CNODP) Graduate, 2007 Senior Cyber Security Analyst / Systems Engineer (June 2007 – May 2012)

PDF document for free
  1. PDF document for free
[PDF] AMELIA ESTWICK PhD - Excelsior College 59345_3Amelia_Estwick__CV.pdf

AMELIA ESTWICK PhD

EDUCATION

Ph.D., Computer Science, The George Washington University, Department of

Computer Science, 2011

M.S., Computer Science, The George Washington University, Department of

Computer Science, 2000

B.S., Computer Information Systems, Southern University at New Orleans,

Department of Computer Information Systems, 1998

DOCTORAL DISSERTATION

A Business Rules Approach to Self-Healing Software Architectures

Dissertation Advisor: Dr. Shmuel Rotenstreich

This dissertation explores how business rules can be used as a methodology to enforce software architectural constraints in order to manage and correct structural changes that may introduce faults within the software architecture. Software architectural faults, when left uncorrected, may lead to system failure. Utilizing business rules provides us with a common language to model the structural architectural elements of the software architecture as well as identify and enforce the constraints designed within the architecture. In addition, since business rules are valid logical rules that can be automated and computed, building this rule logic within our software architecture will allow us to address software architectural changes with limited or no human interaction, therefore providing a capability to invoke self-healing qualities within the software architecture designs.

PROFESSIONAL EXPERIENCE

PROGRAM MANAGER, The National Cybersecurity Institute (NCI) at Excelsior

College, Washington, DC.

August 2016 - Present

Provide thought leadership to the cybersecurity academic, research, and training initiatives at the institute and Excelsior College Partner with cybersecurity stakeholders and technical leaders to influence and implement cutting-edge cybersecurity policy Chief Editor of the NCI Journal, a high-quality, peer-reviewed journal that covers topics appealing to a broad readership within the cyber security discipline, with a particular focus on education, training, and workforce development Support all activities for the NSA/DHS Center of Academic Excellence in

Cybersecurity Education (CAE-CDE) designation

Lead all student cyber programs and activities

Estwick ʹ P a g e | 2

CYBERSECURITY FACULTY PROGRAM DIRECTOR, Excelsior College, Albany, NY Schedule faculty teaching assignments for the Masters in Cybersecurity (MCY) program Maintain a graduate cybersecurity program that provides specialized coursework to meet the demands of a knowledgeable cybersecurity workforce Department of Defense (DoD) / National Security Agency (NSA). Held several positions to include: Technical Director, Manager, Analyst, Researcher, Teacher, and Developer

May 1999 August 2016

Inactive DoD Top Secret / SCI Security Clearance / Full-Scope Over 20 years of government service working in both the military (U.S. Army) and civilian sectors. 15 of those years were spent in the Intelligence Community (IC) NSA Computer Network Operations Develop Program (CNODP) Graduate, 2007 o -year technical development program for technical managers in the cybersecurity field o Intensive training in all facets of Computer Network Operations (Defense,

Attack, and Exploitation)

Division Technical Director (May 2015 August 2016) o Responsible for the technical health of an organization comprised of over

50 highly-skilled cybersecurity professionals within 3 different branches

o Provide strategic and tactical vision for a Division that was responsible for monitoring DoD networks o Technical lead for several cybersecurity systems and projects directly related to our national defense (cyber threat intelligence) o Technical Leader for various Security Information and Event Management (SIEM) software products Manager Branch Chief (May 2012 May 2015) o Managed a Branch of cybersecurity professionals responsible for developing requirements for various computer network operation systems o Directly handled all personnel matters to include hiring, promotions, and training o Responsible for all budgeting and acquisitions within the Branch o Mission Manager for new systems and capabilities being developed and o Managed teams to create workflows and standard operating procedures (SOPs) for several high-priority systems and capabilities being developed and deployed for national defense Senior Cyber Security Analyst / Systems Engineer (June 2007 May 2012) o Analyzed customer systems for security threats and monitored network applications o Conducted vulnerability assessments on computers, systems, and networks

Estwick ʹ P a g e | 3

o Conducted mobile incident response handling utilizing various commercial, open source, and custom software o Produced numerous security operations orders and policies, standard operating procedures (SOPs), and techniques for incident response, vulnerability assessments, and systems security Computer Science Researcher (May 1999 June 2007) o Researched new computer network exploitations (e.g. malware analysis) o Conducted Red Teaming activities (network penetration testing) to identify vulnerabilities in customer networks o Researched network vulnerabilities in commercial operating systems (e.g.

Windows, UNIX, etc.)

o Evaluated various SIEM software products o Analyzed malicious files from live network traffic for forensic examination

ACADEMIC EXPERIENCE

ONLINE VISITING PROFESSOR, Devry University, Downers Grove, Illinois. College of

Engineering & Information Sciences.

October 2015 December 2015

Taught the undergraduate Ethical Hacking course Graded all assignments (e.g. essays, exams, and lab exercises) submitted by the students (timely and with constructive feedback) Proficient in the eCollege Learning Management System (LMS) ADJUNCT FACULTY, Excelsior College, Albany, New York. School of Business and Technology, Department of Information Technology (IT) and Cybersecurity (CYS)

May 2013 April 2016

Taught seven different IT and CYS Undergraduate & Graduate courses: o Cybersecurity Defense-in-Depth; IT Risk Analysis and Management; Computer Security Overview; Cybersecurity Investigation and Case Studies; Ethics, Legal and Compliance Issues in Cybersecurity; Security Focused Risk Management; Security Management Awareness (NCI)

Journal

Proficient in the Blackboard and Canvas Learning Management System (LMS) ADJUNCT FACULTY, American Public University System (APUS), Charlestown, West Virginia. School of Science and Technology, Department of Information Technology (IT), December 2012 February 2017

Estwick ʹ P a g e | 4

Taught six different Information System Security (ISSC) Undergraduate &

Graduate courses:

o Information Assurance; Advanced Cybercrime Analysis; Computer Forensics; Digital Forensics (taught the entire series: Wireless Networks & Devices, Investigating Network Intrusions & Cybercrime Security, and

Investigative Procedures & Incident Response )

Proficient in the Sakai Learning Management System (LMS)

PUBLICATIONS

A Business Rules Approach to Self-Healing Software ArchitecturesInternational Conference on Software Engineering Research. Software Engineering Research and Practice (SERP), July 12-15,

2010, Las Vegas, Nevada. pp. 133-139.

Authored and co-authored several internal technical papers on various technologies of interest, NSA Internal, 2004 2015 Authored a technical report Voice over Internet Protocol (VoIP) , NSA Internal, 2003 Co-Authored a technical report , NSA Internal, 2002

INVITED TALKS & MEDIA INTERVIEWS

Invited speaker for the Another Day Another Data Breach: How the Collection of Data and Metadata Present Cybersecurity

Risks, Las Vegas, NV, May 2, 2018

Invited speaker for the 2nd Annual Cyber Security for Utilities Conference, on Security Operations (SOC), Washington, DC, November 8-9, 2017 Invited speaker for the 2017 Data Management and Intelligence Conference on

Another Day Another Data BreachCybersecurity

Awareness-30, 2017.

Estwick, A. Canadian Broadcasting Corporation radio news interview, Edmonton,

Canada, October 24, 2017

Invited panelist for the 2017 Association of Government Accountants (AGA) 2017

Cybersecurity and Your Mobile Device

Boston, MA, July 11, 2017.

Moderated a panel discBuilding the Pipeline of Cybersecurity

Professionals

Baltimore, MD, June 14, 2017

Thanks to These Websites, Your Personal Info Is Just a Keystroke Away

Estwick ʹ P a g e | 5

Panelist for the International Consortium of Minority Cybersecurity Professionals (ICMCP) 2017 ICMCP National Conference Women to Women Diversity obstacles Impacting Advancement, Washington, DC, March 15, 2017 Cybersecurity in the New Administration

8/WJLA interview, January 31, 2017

Computing Careers 16th Annual Leadership Institute, Washington, DC. November 2016 Moderated a panel discussion on Cybersecurity Careersfor the Women Veterans Interactive (WVI) 5th Annual Women Veterans & Women in the Military Extravaganza, Georgetown University, Washington, DC. November 2016 The Growing Need for Cybersecurity ProfessionalsNewsTalk

Channel 8/WJLA 7 interview. October 12, 2016

Research Opportunities in the Government SectorAfrican- American Researchers in Computing Sciences (AARCS), Auburn University,

Auburn, Alabama. July 21, 2007.

Estwick, A. Importance of Building the STEM Pipeline (minority focused). Addressed to members of the United States 110th Congress in support of financial assistance for the National Physical Science Consortium (NPSC). The United States House of Representatives, Washington, District of Columbia.

November 12, 2007

MILITARY EXPERIENCE

Personnel Actions Specialist, Louisiana Army National Guard, New Orleans, Louisiana /United States Army, Germany, Honorable Discharge, January 1993

November 1997

o Managed personnel records for all Louisiana National Guardsman o Supported Operation Joint Endeavor (Bosnian peacekeeping mission) Telecommunications Center Operator, United States Army, Germany, Gulf War Veteran/ Honorable Discharge, July 1990 January 1993 o SIGINT Analyst for the U.S. Army European Theater o Created and facilitated training on various security policies (e.g. Operations Security, Computer Security, and Network Security)

TECHNOLOGY SKILLS

Languages: C, C++, Visual Basic, SQL, Java, Javascript, shell/batch scripting (Windows and Linux) Digital Forensic Tools: Digital Forensics Framework (DFF), Helix3

Estwick ʹ P a g e | 6

Network monitoring and Intrusion Detection Tools: SNORT, Wireshark, Squil,

Nmap Security Scanner, FS Live

Professional courses passed with certificates: SNORT I (certified professional), REDHAT Network Security, SANS Intrusion Detection, Foundstone Ultimate

Hacking Expert (Linux and Windows)

PROFESSIONAL CERTIFICATIONS and MEMBERSHIPs

EC-Council Certified Ethical Hacker (C|EH) CompTIA Security+ Certification (SEC+) Associated for Computing Machinery (ACM) Information Systems Security Association (ISSA) Information Systems Audit and Control Association (ISACA)

FELLOWSHIPS, HONORS AND AWARDS

Awarded the NSA/NSF GenCyber Grant, 2018 (~$100K award) Various achievement and team awards (NSA internal), 2004 - 2016 NSA Computer Network Operations Develop Program (CNODP) Graduate, 2007 Joint Meritorious Unit Award, 2003 & 2007 National Physical Sciences Consortium (NPSC) Fellowship Recipient. Sponsored by the Department of Defense, 1998 2004 ($200K award) , 1998 Louisiana Alliance for Minority Participation (LAMP) in the Sciences Scholarship,

1997

Department of Energy (DoE) Experimental Program to Stimulate Competitive Research (EPSCoR) of Louisiana, Grant Recipient, 1997 Beta Kappa Chi (BKX) National Scientific Honor Society Inductee, 1995

REFERENCES

Credential file forwarded upon request


Computer Networks Documents PDF, PPT , Doc

[PDF] advanced computer networks lab programs

  1. Engineering Technology

  2. Computer Science

  3. Computer Networks

[PDF] bcs computer networks past papers

[PDF] before computer networks

[PDF] best computer networks courses

[PDF] best online course for computer networking

[PDF] between computer networks

[PDF] character count in computer networks examples

[PDF] classes computer networks

[PDF] cns computer networks & solutions

[PDF] comp network plus

Politique de confidentialité -Privacy policy