Statement of Purpose

Data integrity is becoming tremendously harder to maintain while allowing accessibility. Every individual in today’s society interacts with data whether it is their own or others. This is a key component as technologies advance, so must our information assurance techniques. That is why my professional purpose is to assist others with information assurance and data integrity to help maintain a safer eWorld for everyone.

Skills

Proficient in educating others on many topics related to technology and information assurance:

My core values are based off of the United States Air Force Observe, Orient, Decide, Act (OODA) Loop. I have applied this more complex model to the following Education, Application, Prevention. I believe that these three core values can help anyone accomplish anything and help prevent negative events; to include safety and work mishaps. This is key to the application of technology and the endearment damage of electric shock and ESD.

Well versed in managing and leading teams on projects and tasks:

The foundational values of Education, Application, Prevention applies to the leading of all individuals. By leading by example and teaching others on how to accomplish the task is where my leadership style prevails. My beliefs that managing should be a last resort and that leading a team will be much more fruitful is a core result of my military and security training. This applies many phycological aspects and team building facets that allows us to use very diverse teams to accomplish the smallest or biggest projects.

Has extensive training in information assurance and data integrity:

The core value of integrity first from the United States Air Force has stuck with me and has allowed me to focus that attribute into information technology. Applying this trait by procuring CompTIA’s Security Plus and putting CompTIA’s CASP Plus on the horizon is where the Information Technology data integrity and information assurance mindset gets cemented. With over ten years of annual information assurance training from the military allowing normal computing tasks to be calculated with system security in mind.

Reflection

Prior to attending Southern New Hampshire University, I had over ten years of Information Technology experience and minor security training. While attending the program for my Bachelors in Science, this cemented the knowledge and allowed it to become so much more useful as the broadening of the courses applied security on so many different levels. From security with Human Control Interfaces to security related to project management and asset control.

Qualifications

With my tremendous amount of training and focus in information assurance and data integrity, I am a secure administrator or user, whether that is for a governmental agency or a private company’s proprietary data. This allows me to safety and securely operate with any employer or vendor. My core values include my always progressing and moving forward in every part of my life.