Greg Gutman
Email: Z3JlZ0BpbnB1dGRyaXZlc2VjdXJpdHkuY29t
Email: aW5wdXRkcml2ZUBnbWFpbC5jb20=
Phone: +1 KDcwMyk5NTctODMyMQ==
My LinkedIn || My GitHubObjective
To provide expert consulting services that drive strategic growth and operational efficiency for businesses by delivering customized, data-driven solutions and actionable insights. Leveraging a deep understanding of industry trends and best practices, my goal is to empower clients to achieve their objectives and sustain long-term success.
Work Experience
Sr. Security Engineer | AISSO | SCA
-Tikras Technology Solutions Corp.,
- Federal contractor, CONUS, Public Trust
- Migrate multiple FedRAMP FISMA systems from 800-53r4 to r5 in Xacta
- Analyze system, SSP, SSPP, policy, procedures, regulations
- Conduct system security assessments
- Support DOI IA ACIO ASIA BIA BIE systems
Sr. Security | Network | Cloud Architect
-Ardent Management Consulting Inc.,
- Federal contractor, CONUS, Public Trust
- Dynamic role in support of DHS FEMA RTPD FACT FTTS
- Collaborated with cross-functional teams to achieve project goals
- Achieved 100% FISMA green scorecard for FACT-FTTS
- Achieved initial and renewal of system ATO for FACT-FTTS
SME - Subject Matter Expert
-- Federal contractor, CONUS, Public Trust
- ISSO support for DHS FEMA Contract
- Achieved ATO for two AWS GovCloud hosted systems
- SME for DHS FEMA OCIO Cloud Migration Effort, TIC 2.2 solution
- Network Engineering SME for NCBI @ NLM on NIH contract
Systems Engineer | Network Analyst | Network Engineer, Principal | Network Engineer, Sr. Principal
-- Federal contractor, OCONUS, CONUS, TS SCI
- Dynamic role in the circuit terrestrial engineering group, supporting global network in support of US missions at the Diplomatic Telecommunication Program Office (DTS-PO)
- Troubleshoot and maintained unclassified and classified networks. NSA-CSS Contactor
- Troubleshoot and maintained unclassified and classified satellite earth terminal. DoD contractor
Satellite Systems Technician
-- Federal contractor, OCONUS, TS SCI
- Collaborated with cross-functional teams to achieve project goals
- Provided high-quality network, secure voice and data command and direct communications supporting the 160th Signal Brigade customers via tactical USC-60 SATCOM terminals & TSSR Line-Of-Sight radios
US Airman, Enlisted
-- Active Duty
- AFSC 2E151 - Satellite, Wideband, and Telemetry Systems (Journeyman)
- Line-of-Sight, Microwave Systems
- OIF - Operation Iraqi Freedom
- OEF - Operation Enduring Freedom
Education
HTB Courses, ongoing | HTB Academy
CodeCademy Courses, ongoing | Codecademy
edX Courses, ongoing | edX
Bachelor's Degree in Management Information Systems, 2010 | UMUC (now UMGC)
Associates's Degree in Electronics Systems Technology, 2006 | CCAF
Computer Networking Certification Program (Microsoft and Novell), 1999 | DPT Business School
Network Skills
- Programming Languages: Python, JavaScript
- Network Design and Architecture
- IP Addressing and Subnetting
- Routing Protocols (e.g., OSPF, EIGRP, BGP)
- Switching Technologies (e.g., VLANs, STP)
- Network Security (e.g., Firewalls, VPNs, IDS/IPS)
- Wireless Networking (e.g., Wi-Fi, WAPs)
- Network Monitoring and Troubleshooting
- Experience with Network Hardware (e.g., Routers, Switches)
- Knowledge of Network Management Tools (e.g., SNMP, NetFlow)
- Familiarity with Network Operating Systems (e.g., Cisco IOS, Junos)
- Ability to Configure and Maintain Network Devices
- Understanding of Network Protocols (e.g., TCP/IP, DNS, DHCP)
- Technical Documentation and Reporting
- Problem-Solving and Analytical Skills
- Strong Communication Skills
- Knowledge of Cloud Networking (e.g., AWS, Azure)
- Experience with Automation Tools (e.g., Ansible, Puppet)
Cyber Security (information security) Skills
- Network Security
- Risk Assessment and Management
- Cryptography
- Incident Response
- Penetration Testing
- Security Information and Event Management (SIEM)
- Firewall Management
- Intrusion Detection Systems (IDS)
- Security Auditing
- Compliance and Regulatory Knowledge
- Endpoint Security
- Identity and Access Management (IAM)
- Cloud Security
- Malware Analysis
- Vulnerability Assessment
- Secure Software Development
- Data Privacy
- Forensics
- Threat Intelligence
- Security Policy Development