Summary of Qualifications:
I am a Lead Security Analyst/Engineer as well as college level instructor with a wide range of expertise from security engineering and design to risk assessment and computer programming with over 20 years of industry experience.
List of Experience:
Firewall Management, VPN Management, IDS Management, Penetration Testing (Host and Web), Security Vulnerability Scanning (Web, Host and Network), Security Audits, Computer Forensics, FISMA 800-53, PCI-DSS, Linux Administration, Technical Training, Technical Writing, Splunk Operations, ArcSight Operation, Burp Suite, Kali Linux, OpenVAS, Nessus Security Center, NeXpose, Acunetix, Netsparker, Qualys
Academic/Teaching Experience:
Adjunct Professor, Capitol Technology University, Information Assurance & Computer Science Department, (2001 to Present)
Computer Forensics and Incident Response
Managing Information Security
Introduction to UNIX
Introduction to C programming
Introduction to Scripting Languages (Python/Perl)
Complementary Security
Student Mentor, Western Governors University, Cyber Security (2017 to 2018)
Additional Teaching Experience:
Certified Ethical Hacking
Introduction to Vulnerability Scanning
Security+
CASP
CISSP
Java Programming
Access Data Introduction and Advance Computer Forensics
Education:
B.Sc.; Computer Science; North Carolina A&T State University – 1997
M.Sc.; Telecommunications Management; University of Maryland – 2001
D.Sc.; Cyber Security; Capitol Technology University – (July 2019)
Training:
Intro to Kali Linux and Pentesting
Fortigate, Fortinet: High Availability
Microsoft Windows Server 2012 R2 - Installing and Configuring: Security
Microsoft Windows 10: Supporting Authentication, Permissions, and Data Security
MAC OS X SECURITY
CompTIA Linux+ 2014 Powered By LPI: LX0-104 Security, Data, and Accessibility
Unix OS Fundamentals: Security
IT SECURITY FOR SYSTEMS ADMINISTRATORS - INTERMEDIATE LEVEL
IT SECURITY FOR SYSTEMS ADMINISTRATORS - BEGINNING LEVEL
SENSS 1.0: Deploying Advanced Cisco ASA Access Policies
Publications:
Charles, K. (2014). Cloud Vulnerability-Scanning Options for Enterprises. USCyberSecurity Magazine (Print and Web).
Charles, K. (2012). Comparing Enterprise Data Anonymization Techniques. TechTarget Magazine -
Charles, K., (2004). Decoy Systems: A New Player in Network Security and Computer Incident Response. International Journal of Digital Evidence. Winter 2004, Volume 2, Issue 3
Book Reviewer
Bidgoli, H. (2006). Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection and Management. Volume 3. John Wiley & Sons.
Certifications:
RESILIA (2016)
Cloud – CTA (2016)
CEH – Certified Ethical Hacker (2014)
C|PTE – Certified Penetration Testing Engineer (2013)
C|VA – Certified Vulnerability Assessor (2013)
CICP – Core Impact Certified Professional (2010)
ITILv3 - Information Technology Infrastructure Library version 3
CISA – Certified Information System Auditor (2007)
CISSP – Computer Information System Security Professional (2004)
NSA-IAM – NSA-Information Assurance Methodology