home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: misc.jobs.resumes
- Path: sparky!uunet!stanford.edu!kronos.arc.nasa.gov!butch!LMSC5.IS.LMSC.LOCKHEED.COM!J024330
- From: J024330@LMSC5.IS.LMSC.LOCKHEED.COM
- Subject: For Denver/ColSpgs: Security Specialist
- Message-ID: <93022.48350.J024330@LMSC5.IS.LMSC.LOCKHEED.COM>
- Sender: news@butch.lmsc.lockheed.com
- Organization: Lockheed Missiles & Space Company, Inc.
- Date: Fri, 22 Jan 93 13:25:50 PST
- Lines: 329
-
- ============================== Start Resume ===========================
-
-
- CHRISTOPHER D. COLVIN
- 264 BLOSSOM HILL RD., SAN JOSE, CA 95123
- (408)578-7673
-
- PROFESSIONAL RESUME
-
- FACILITIES DESIGN
-
- Conduct extensive security vulnerability surveys of prospective
- facilities. Negotiate physical security requirements with US
- Government Representatives. Provide security requirements,
- design specifications and functional requirements for securing
- industrial facilities and Sensitive Compartmented Information
- Facilities (SCIFs). Designed detailed drawings on a CAD work
- station using Autocad Version 10. Edited and approved design
- concepts for government secured facilities. Supervised
- construction to assure compliance with US Government Industrial
- Security Manual standards for Closed Areas and Strong Rooms. In
- addition designed and supervised construction on secure work
- areas to comply with Defense Intelligence Agency Manual 50-3 and
- Director of Central Intelligence Directive 1/21 Government
- standards for Secret and Top Secret Sensitive Compartmented
- Information Facilities. Furnish reports on facilities using the
- desktop publishing capabilities of WordPerfect 5.1 and Word for
- Windows, and importing graphics created in Autocad and Scanned
- images when necessary.
-
- TECHNICAL
-
- Designed and supervised installation of grand master key systems.
- Serviced residential, commercial and industrial locking hardware.
- Installed and serviced Group I and Group II GSA rated safes and
- vaults. Installed mechanical and electronic keyless access
- systems. Fabricated and installed European Exterior Rolling
- Shutters similar to countertop fire and smoke shutters. Provide
- technical surveillance supporting the apprehension of individuals
- suspected of sexual harassment, theft and sabotage.
-
- BUSINESS MANAGEMENT
-
- Opened and managed a physical security business from 1975 to
- 1988. During that time, supervised four field service persons
- and three administrative clerks. Responsible for consulting with
- small businesses and major corporations on how to increase their
- security profile while holding costs down.
-
- SECURITY CLEARANCES
-
- DoD Top Secret, WNINTEL, CNWDI, COMSEC
-
- WORK EXPERIENCE
-
- 1986 - Present LOCKHEED MISSILES & SPACE CO. - Technical
- Security Representative. Design secure work
- areas.
-
- 1983 - 1985 BAY AREA ROLLADEN - Owner/Manager. Marketed
- and sold exterior rolling shutters and home
- improvements. Directed advertising of the product
- and the company name.
-
- 1975 - 1988 ALMADEN COMMERCIAL LOCKSMITHS -
- Owner/Manager. Developed security systems for
- large and small corporations. Negotiated
- contracts with business owners, and purchasing
- departments.
-
- EDUCATION
-
- De Anza College - Associate of Arts in Liberal Arts 3/27/92.
- Graduated Magna Cum Laude.
-
- American Society for Industrial Security - Physical Security
- Technology Workshop.
- Facility Security Design Workshop
-
- LMSC Formal Company Training - Introduction to UNIX Operating
- Systems
- OfficeVision (IBM electronic communication system)
- Computer Security
- Communications Security (COMSEC)
- Investigation
-
-
- Mosler Anti Crime Bureau - Vault Penetration, Extortion & Executive
- Kidnap
-
- ===================== Start Detailed Description ==================
-
- Technical Security Detailed Product Task descriptions
-
- 1. Facility Concept & Configuration Approval Documents.
-
- Prepare and coordinate pre-construction or facilities, to
- obtain Customer approvals to proceed. These include text
- and drawings to describe the facility concept to the
- Customer in enough detail for them to ensure that
- appropriate security measures are planned. For many areas
- the "concept documentation" must often be a full
- accreditation checklist package done on a pre-construction
- basis. The package is described in item 2 below.pre-
- configuration concept and design approval requests for
- program
-
- 2. Physical Facility Accreditation Documents and Drawings.
-
- Provide and maintain DCID 1/21 (or other) Physical Facility
- Accreditation Checklist documentation to describe the
- facility and its security profile to the Customer. This
- package includes text and descriptive drawings of
- architectural, electrical, communications, mechanical, site,
- and other facility details. Customer approval of this
- package must be obtained prior to any classified program
- operations in the facility. The package must be updated
- (page change or larger revisions) with every significant
- change or group of small changes made to the facility that
- could affect its security profile such as for all wiring
- changes that penetrate the area perimeter.
-
- 3. TEMPEST Accreditation Documents and Drawings.
-
- Provide and maintain TEMPEST Accreditation Checklist and
- documentation to describe all facility TEMPEST security
- details to the Customer. Customer approval of this package
- must be obtained prior to their allowing classified computer
- operations and other classified operations using electrical
- equipment in the facility. This package is in addition to
- the Physical Facility Accreditation checklist and includes
- physical descriptions of the areas, lists of all electrical
- hardware and computing devices and drawings showing their
- locations. Also required are architectural, electrical,
- communications, mechanical, site, and area drawings.
- Information common to both checklists is duplicated in each
- package, since they must be submitted as stand alone
- packages. This checklist must be updated in the same manner
- as the Physical Facility Checklist described above, but more
- often since internal computer network configurations change
- more frequently.
-
- 4. Coordination & Negotiation of Facility Physical &
- TEMPEST Security with Customer.
-
- Maintain direct liaison and conduct negotiations with
- Customer security offices regarding physical, technical, and
- TEMPEST design and configuration of all program facilities,
- to provide appropriate security at the lowest possible cost.
- The Customer has designated representatives to coordinate
- these issues for secure facilities, and they want to
- participate in cost-cutting efforts, while preserving
- appropriate security. There are many phone calls and secure
- fax exchanges, as well as direct inspections, in the
- coordination process.
-
- 5. Establish New or Renovate Existing Secure Facility.
-
- Provide facility security design requirements, drawings,
- documents, oversight and controls for construction or
- modifications required to establish or renovate secure
- facilities for program use. The requirement includes
- physical, technical, and TEMPEST security design
- requirements for all facility architectural, mechanical,
- electrical, communications, computer wiring and placement,
- and other considerations. These are submitted to and
- coordinated with the facility design and construction
- engineering team. The Technical Security representative is
- a project team member, and attends design meetings, job site
- inspections, etc. Site selection and vulnerability surveys
- to evaluate potential new facilities are included in this
- task.
-
- Support provided under this task element includes:
- wall/roof/floor construction type and sound rating; door
- types, sound rating, and mounting & locking hardware; HVAC
- ducting security features placement of manbars, alarms, and
- sound masking in all ducts; vault construction requirements
- steel, concrete, or reinforced, and special penetration and
- door considerations; TEMPEST shielding placement, methods,
- testing; Red/black separation requirements and systems
- layout oversight to ensure separation of classified and
- unclassified lines; phone, power, alarm, and other wire
- line filter requirements and line isolation techniques;
- Emergency notification system isolation; facility alarm
- system design oversight, sensor placement and type above and
- below false ceilings and raised floors, electronic line
- supervision, and testing; warning beacon requirements and
- placement; secure phone placement and wiring concerns;
- administrative and "hello" phone system layout, line
- isolation (Sanbar cards, etc.), line separation, and secure
- Key Service Units or Computerized Phone system units;
- window covering/securing requirements; sound masking
- methods, locations, and volume; computer and communications
- data line oversight; access control methods and hardware
- details; closed circuit television usage; evaluation and
- control of electronic or electrical devices to ensure
- security from technical eavesdropping attempts; and other
- items of interest to the Customer.
-
- 6. Maintain Secure Program Facilities
-
- Provide ongoing physical and technical security oversight to
- maintain secure program facilities. This includes all
- functions and responsibilities described in number 4 above
- to establish or renovate an area, but at a greatly reduced
- level of effort. Especially important are maintenance
- actions involving computer wiring changes, electrical,
- phone, power and other utility modifications whether driven
- by program requests or building facility maintenance
- requirements (often required by city building code).
- Examples of work that requires technical security oversight,
- but that is often unanticipated, are: phone moves,
- furniture and computer moves, electrical wiring changes or
- maintenance, water pipe repairs, fire sprinkler maintenance,
- painting, office layout partition changes, seismic bracing,
- etc. Any of these activities could introduce security
- vulnerabilities into a program area. The Customer requires
- diligent oversight and documentation of these activities,
- which generally includes revisions of the area checklists
- (item 2 above).
-
- 7. Facility Physical & TEMPEST Security Inspections.
-
- Provide continuous oversight and inspections to ensure
- compliance with physical and TEMPEST security requirements;
- i.e. to keep equipment and phones used for classified
- processing separated by the required distance from all other
- items, ensure proper operation of security door hardware,
- and ensure that maintenance actions that affect security are
- not overlooked.
-
- 8. Facility TEMPEST Vulnerability Assessment Requests
- (TVARs).
-
- Prepare Customer required TVAR documentation for Cusomer use
- in evaluating the TEMPEST profile of equipment within a
- secure facility. This is a comprehensive document that
- includes text, detailed drawings of the facility, electrical
- wiring, location drawings for each piece of equipment, an
- itemized list of all electrical equipment, and other
- information about the facility and type of use the equipment
- gets. A Physical Facility Checklist is often attached to a
- TVAR.
-
- 9. Facility TEMPEST Zone Surveys.
-
- Arrange for and oversee Facility TEMPEST Zone Tests, and
- provide reports to the Customer. These tests define the
- facility TEMPEST profile and aid in determining the
- appropriate security measures to ensure that classified
- information is not unintentionally transmitted out of the
- secure environment. The report is written by Technical
- Security from raw data provided by the test personnel. It
- includes text and drawings of the site and equipment test
- positions, and shows all personnel access control features
- and natural land features that affect the TEMPEST profile of
- the facility.
-
- 10. Research & Document Equipment TEMPEST Zone ratings.
-
- Each type of electrical/electronic equipment radiates
- information at different levels. Each equipment type must
- be evaluated against Customer approved criteria, or
- submitted to them for review, to ensure that the equipment
- does not pose a security threat to the program. Technical
- Security provides the coordination and research.
-
- 11. Support Customer Semi-annual (or other) Inspections of
- Facility Physical/Technical Security.
-
- Customers generally inspect program facilities on a semi-
- annual basis. During the facility portion of the
- inspection, they want a person knowledgeable about the
- building construction details to accompany them, for
- clarification of their questions, and to record any
- discrepancies. It is particularly important to properly
- understand their concerns, be technically knowledgeable of
- the facility security details, and be able to answer their
- questions in order to avoid unnecessary security costs and
- findings.
-
- 12. Facility Technical Surveillance Countermeasures
- Services.
-
- Provide Technical Surveillance Countermeasures Survey
- services for detection of possible technical surveillance
- devices ("bugs" for eavesdropping), technical security
- hazards, threats, or vulnerabilities. This involves radio
- frequency spectrum searching with specialized equipment,
- inspection of administrative telephone systems, computer
- systems, telecommunications systems, other wiring, and
- physical inspections of both structures and furnishings.
- These services are requested by the customer or program
- management to ensure the technical security of program
- areas. Technical security must be assured prior to the
- Customer allowing classified operations in the area.
-
- 13. Remote Facility Support.
-
- Remote facilities require the same security as local ones,
- and often do not have technically qualified personnel
- available to handle all of the details. For subcontractors,
- the Prime is still responsible to ensure proper compliance
- by the sub. Technical Security support is provided as
- necessary in each case.
-
- 14. Travel to Remote Facilities.
-
- Travel for personal inspection is required to ensure proper
- physical construction, both before and often with a Customer
- inspector. It may be required to coordinate details during
- construction, or during preparation of the Accreditation
- document if the on-site personnel are not knowledgeable of
- the correct way to complete the documentation.
-
- 15. Facility Usage Security Consulting for Management.
-
- Program management often desires to use various areas for
- open storage, new proposal activities, special computer
- operations, or for large group briefings. Each case could
- require different security measures, and the Technical
- Security representative can help provide the appropriate
- support to management. If area reconfiguration is needed,
- the Technical Security representative can accurately prepare
- the concept for presentation to the Customer.
-
- ========================End Detailed Description=====================
-
-