Security Agency (NSA) and RAND's National Defense Research Institute users to aid in the analysis of computer/network attack incidents The
Duties include, but are not limited to, Computer Network Defense Analysis, Digital Forensics Analysis, Digital Network Analysis, Interactive Operations,
Frontrunner with expertise in cyber defense strategies, NATIONAL SECURITY AGENCY (NSA) • Fort Meade, Maryland / San Antonio, Texas • 2005 – 2009,
17 jan 2013 · (S//NF) Information Assurance and Computer Network Defense Relationship facilitate cooperation, an NSA CT analyst, stationed in Berlin,
12 mar 2009 · With respect to computer network defense, there are multiple DoD manipulating systems, as directed by the intelligence analyst and the
NSA's Top Ten Mitigation Strategies counter a broad range of exploitation techniques used by defense-in-depth security posture high-value assets, and to move laterally through the network 3 reduction of exposure from known threats, and provide access to a much larger threat analysis and tipping capability than
NSA Computer Network Operations Develop Program (CNODP) Graduate, 2007 Senior Cyber Security Analyst / Systems Engineer (June 2007 – May 2012)
PDF document for free
- PDF document for free
59345_3Amelia_Estwick__CV.pdf
AMELIA ESTWICK PhD
EDUCATION
Ph.D., Computer Science, The George Washington University, Department of
Computer Science, 2011
M.S., Computer Science, The George Washington University, Department of
Computer Science, 2000
B.S., Computer Information Systems, Southern University at New Orleans,
Department of Computer Information Systems, 1998
DOCTORAL DISSERTATION
A Business Rules Approach to Self-Healing Software Architectures
Dissertation Advisor: Dr. Shmuel Rotenstreich
This dissertation explores how business rules can be used as a methodology to enforce software architectural constraints in order to manage and correct structural changes that may introduce faults within the software architecture. Software architectural faults, when left uncorrected, may lead to system failure. Utilizing business rules provides us with a common language to model the structural architectural elements of the software architecture as well as identify and enforce the constraints designed within the architecture. In addition, since business rules are valid logical rules that can be automated and computed, building this rule logic within our software architecture will allow us to address software architectural changes with limited or no human interaction, therefore providing a capability to invoke self-healing qualities within the software architecture designs.
PROFESSIONAL EXPERIENCE
PROGRAM MANAGER, The National Cybersecurity Institute (NCI) at Excelsior
College, Washington, DC.
August 2016 - Present
Provide thought leadership to the cybersecurity academic, research, and training initiatives at the institute and Excelsior College Partner with cybersecurity stakeholders and technical leaders to influence and implement cutting-edge cybersecurity policy Chief Editor of the NCI Journal, a high-quality, peer-reviewed journal that covers topics appealing to a broad readership within the cyber security discipline, with a particular focus on education, training, and workforce development Support all activities for the NSA/DHS Center of Academic Excellence in
Cybersecurity Education (CAE-CDE) designation
Lead all student cyber programs and activities
Estwick ʹ P a g e | 2
CYBERSECURITY FACULTY PROGRAM DIRECTOR, Excelsior College, Albany, NY Schedule faculty teaching assignments for the Masters in Cybersecurity (MCY) program Maintain a graduate cybersecurity program that provides specialized coursework to meet the demands of a knowledgeable cybersecurity workforce Department of Defense (DoD) / National Security Agency (NSA). Held several positions to include: Technical Director, Manager, Analyst, Researcher, Teacher, and Developer
May 1999 August 2016
Inactive DoD Top Secret / SCI Security Clearance / Full-Scope Over 20 years of government service working in both the military (U.S. Army) and civilian sectors. 15 of those years were spent in the Intelligence Community (IC) NSA Computer Network Operations Develop Program (CNODP) Graduate, 2007 o -year technical development program for technical managers in the cybersecurity field o Intensive training in all facets of Computer Network Operations (Defense,
Attack, and Exploitation)
Division Technical Director (May 2015 August 2016) o Responsible for the technical health of an organization comprised of over
50 highly-skilled cybersecurity professionals within 3 different branches
o Provide strategic and tactical vision for a Division that was responsible for monitoring DoD networks o Technical lead for several cybersecurity systems and projects directly related to our national defense (cyber threat intelligence) o Technical Leader for various Security Information and Event Management (SIEM) software products Manager Branch Chief (May 2012 May 2015) o Managed a Branch of cybersecurity professionals responsible for developing requirements for various computer network operation systems o Directly handled all personnel matters to include hiring, promotions, and training o Responsible for all budgeting and acquisitions within the Branch o Mission Manager for new systems and capabilities being developed and o Managed teams to create workflows and standard operating procedures (SOPs) for several high-priority systems and capabilities being developed and deployed for national defense Senior Cyber Security Analyst / Systems Engineer (June 2007 May 2012) o Analyzed customer systems for security threats and monitored network applications o Conducted vulnerability assessments on computers, systems, and networks
Estwick ʹ P a g e | 3
o Conducted mobile incident response handling utilizing various commercial, open source, and custom software o Produced numerous security operations orders and policies, standard operating procedures (SOPs), and techniques for incident response, vulnerability assessments, and systems security Computer Science Researcher (May 1999 June 2007) o Researched new computer network exploitations (e.g. malware analysis) o Conducted Red Teaming activities (network penetration testing) to identify vulnerabilities in customer networks o Researched network vulnerabilities in commercial operating systems (e.g.
Windows, UNIX, etc.)
o Evaluated various SIEM software products o Analyzed malicious files from live network traffic for forensic examination
ACADEMIC EXPERIENCE
ONLINE VISITING PROFESSOR, Devry University, Downers Grove, Illinois. College of
Engineering & Information Sciences.
October 2015 December 2015
Taught the undergraduate Ethical Hacking course Graded all assignments (e.g. essays, exams, and lab exercises) submitted by the students (timely and with constructive feedback) Proficient in the eCollege Learning Management System (LMS) ADJUNCT FACULTY, Excelsior College, Albany, New York. School of Business and Technology, Department of Information Technology (IT) and Cybersecurity (CYS)
May 2013 April 2016
Taught seven different IT and CYS Undergraduate & Graduate courses: o Cybersecurity Defense-in-Depth; IT Risk Analysis and Management; Computer Security Overview; Cybersecurity Investigation and Case Studies; Ethics, Legal and Compliance Issues in Cybersecurity; Security Focused Risk Management; Security Management Awareness (NCI)
Journal
Proficient in the Blackboard and Canvas Learning Management System (LMS) ADJUNCT FACULTY, American Public University System (APUS), Charlestown, West Virginia. School of Science and Technology, Department of Information Technology (IT), December 2012 February 2017
Estwick ʹ P a g e | 4
Taught six different Information System Security (ISSC) Undergraduate &
Graduate courses:
o Information Assurance; Advanced Cybercrime Analysis; Computer Forensics; Digital Forensics (taught the entire series: Wireless Networks & Devices, Investigating Network Intrusions & Cybercrime Security, and
Investigative Procedures & Incident Response )
Proficient in the Sakai Learning Management System (LMS)
PUBLICATIONS
A Business Rules Approach to Self-Healing Software ArchitecturesInternational Conference on Software Engineering Research. Software Engineering Research and Practice (SERP), July 12-15,
2010, Las Vegas, Nevada. pp. 133-139.
Authored and co-authored several internal technical papers on various technologies of interest, NSA Internal, 2004 2015 Authored a technical report Voice over Internet Protocol (VoIP) , NSA Internal, 2003 Co-Authored a technical report , NSA Internal, 2002
INVITED TALKS & MEDIA INTERVIEWS
Invited speaker for the Another Day Another Data Breach: How the Collection of Data and Metadata Present Cybersecurity
Risks, Las Vegas, NV, May 2, 2018
Invited speaker for the 2nd Annual Cyber Security for Utilities Conference, on Security Operations (SOC), Washington, DC, November 8-9, 2017 Invited speaker for the 2017 Data Management and Intelligence Conference on
Another Day Another Data BreachCybersecurity
Awareness-30, 2017.
Estwick, A. Canadian Broadcasting Corporation radio news interview, Edmonton,
Canada, October 24, 2017
Invited panelist for the 2017 Association of Government Accountants (AGA) 2017
Cybersecurity and Your Mobile Device
Boston, MA, July 11, 2017.
Moderated a panel discBuilding the Pipeline of Cybersecurity
Professionals
Baltimore, MD, June 14, 2017
Thanks to These Websites, Your Personal Info Is Just a Keystroke Away
Estwick ʹ P a g e | 5
Panelist for the International Consortium of Minority Cybersecurity Professionals (ICMCP) 2017 ICMCP National Conference Women to Women Diversity obstacles Impacting Advancement, Washington, DC, March 15, 2017 Cybersecurity in the New Administration
8/WJLA interview, January 31, 2017
Computing Careers 16th Annual Leadership Institute, Washington, DC. November 2016 Moderated a panel discussion on Cybersecurity Careersfor the Women Veterans Interactive (WVI) 5th Annual Women Veterans & Women in the Military Extravaganza, Georgetown University, Washington, DC. November 2016 The Growing Need for Cybersecurity ProfessionalsNewsTalk
Channel 8/WJLA 7 interview. October 12, 2016
Research Opportunities in the Government SectorAfrican- American Researchers in Computing Sciences (AARCS), Auburn University,
Auburn, Alabama. July 21, 2007.
Estwick, A. Importance of Building the STEM Pipeline (minority focused). Addressed to members of the United States 110th Congress in support of financial assistance for the National Physical Science Consortium (NPSC). The United States House of Representatives, Washington, District of Columbia.
November 12, 2007
MILITARY EXPERIENCE
Personnel Actions Specialist, Louisiana Army National Guard, New Orleans, Louisiana /United States Army, Germany, Honorable Discharge, January 1993
November 1997
o Managed personnel records for all Louisiana National Guardsman o Supported Operation Joint Endeavor (Bosnian peacekeeping mission) Telecommunications Center Operator, United States Army, Germany, Gulf War Veteran/ Honorable Discharge, July 1990 January 1993 o SIGINT Analyst for the U.S. Army European Theater o Created and facilitated training on various security policies (e.g. Operations Security, Computer Security, and Network Security)
TECHNOLOGY SKILLS
Languages: C, C++, Visual Basic, SQL, Java, Javascript, shell/batch scripting (Windows and Linux) Digital Forensic Tools: Digital Forensics Framework (DFF), Helix3
Estwick ʹ P a g e | 6
Network monitoring and Intrusion Detection Tools: SNORT, Wireshark, Squil,
Nmap Security Scanner, FS Live
Professional courses passed with certificates: SNORT I (certified professional), REDHAT Network Security, SANS Intrusion Detection, Foundstone Ultimate
Hacking Expert (Linux and Windows)
PROFESSIONAL CERTIFICATIONS and MEMBERSHIPs
EC-Council Certified Ethical Hacker (C|EH) CompTIA Security+ Certification (SEC+) Associated for Computing Machinery (ACM) Information Systems Security Association (ISSA) Information Systems Audit and Control Association (ISACA)
FELLOWSHIPS, HONORS AND AWARDS
Awarded the NSA/NSF GenCyber Grant, 2018 (~$100K award) Various achievement and team awards (NSA internal), 2004 - 2016 NSA Computer Network Operations Develop Program (CNODP) Graduate, 2007 Joint Meritorious Unit Award, 2003 & 2007 National Physical Sciences Consortium (NPSC) Fellowship Recipient. Sponsored by the Department of Defense, 1998 2004 ($200K award) , 1998 Louisiana Alliance for Minority Participation (LAMP) in the Sciences Scholarship,
1997
Department of Energy (DoE) Experimental Program to Stimulate Competitive Research (EPSCoR) of Louisiana, Grant Recipient, 1997 Beta Kappa Chi (BKX) National Scientific Honor Society Inductee, 1995
REFERENCES
Credential file forwarded upon request
Computer Networks Documents PDF, PPT , Doc