Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

22
Kevin L. Lucier 8025 Interlaken Dr. Colorado Springs, CO 80920 US Mobile: 719-330-7941 Day Phone: 303-969-7120 DSN: 883-3612 Email: [email protected] [email protected] Country of Citizenship:United States Veterans' Preference: 10-point preference based on a compensable service connected disability of 30% or more (CPS) Registered for Selective Service: I am a male born on or after January 1, 1960 & I have registered for the Selective Service. Highest Grade: 15 ICTAP Eligible: No Availability: Job Type: Permanent, Presidential Management Fellows Work Schedule: Full-Time Desired locations: Profile: United States - CO - Air Force Academy United States - CO - Fort Carson United States - CO - Peterson AFB United States - CO - Schriever AFB United States - CO - Colorado Springs United States - CO - Denver United States - CO – Lakewood United States - MT Germany - Self-motivated - Very dedicated, organized, systematic & prioritized - Outgoing analytical leader - Able to integrate & excel in changing environments - Extremely meticulous to detail - Maintain great pride in completing assignments proficiently - Active Top Secret Security Clearance (previous TS SCI) - Senior Executive Service Qualifications; Leading Change, Leading People, Results Driven, Business Acumen, Building Coalitions - Qualifications spanning 24 years with emphasis on hosting services, security, administration, project management and leadership Work Experience: Department of the Interior, Office of the Chief Information Officer OCIO (transition from Interior Business Center position, listed below) Service Delivery Division (SDD), Hosting Services Branch 7301 W. Mansfield Ave. Mail Stop D2130 Denver, CO 80235 United States 10/2013 - Present Salary: $119,922.00 USD Per Year Hours per week: 60 Series: 2210 Pay Plan: GS Grade: 14 Chief, Systems Administration (Supervisory IT Specialist - OS/SYSADMIN) (This is a federal job) Supervisor: Mr. Spencer Bessette (303-969-7205) -- previously Mr. Dennis Donovan (303-969-5033) Okay to contact this Supervisor: Yes - Position has increased in size, scope and intensity since transition from Interior Business Center, IT Directorate, System Software Administration Branch position, listed after the recent temp promotion below. Organizational transition and new organizational alignment, with same position description, expectations, and responsibilities. - Effectively use a combination of leadership styles, prefer the Participative - "Lead by Example" - Embodies "BE-KNOW-DO" Army leadership - Experienced in advising senior executives on effective utilization of IT systems / solutions to meet business objectives . - Provide high-level technical expertise & supervision / leadership / motivation of a cross-functional staff - Work with peers, to include the newly assigned dedicated Information System Security Officer (ISSO) for the OCIO to ensure all security devices and architecture are in compliance with security regulations and risk management framework. In coordination with the OCIO Information Security Compliance Team, review and lead the remediation of

Transcript of Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Page 1: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier 8025 Interlaken Dr.

Colorado Springs, CO 80920 US Mobile: 719-330-7941

Day Phone: 303-969-7120 DSN: 883-3612

Email: [email protected] [email protected]

Country of Citizenship:United States Veterans' Preference:

10-point preference based on a compensable service connected disability of 30% or more (CPS)

Registered for Selective Service:

I am a male born on or after January 1, 1960 & I have registered for the Selective Service.

Highest Grade:

15

ICTAP Eligible:

No

Availability:

Job Type: Permanent, Presidential Management Fellows Work Schedule: Full-Time

Desired locations: Profile:

United States - CO - Air Force Academy United States - CO - Fort Carson United States - CO - Peterson AFB United States - CO - Schriever AFB United States - CO - Colorado Springs United States - CO - Denver United States - CO – Lakewood United States - MT Germany

- Self-motivated - Very dedicated, organized, systematic & prioritized - Outgoing analytical leader - Able to integrate & excel in changing environments - Extremely meticulous to detail - Maintain great pride in completing assignments proficiently - Active Top Secret Security Clearance (previous TS SCI) - Senior Executive Service Qualifications; Leading Change, Leading People, Results Driven, Business Acumen, Building Coalitions - Qualifications spanning 24 years with emphasis on hosting services, security, administration, project management and leadership

 

Work Experience: Department of the Interior, Office of the Chief Information Officer – OCIO (transition from Interior Business Center position, listed below) Service Delivery Division (SDD), Hosting Services Branch 7301 W. Mansfield Ave. Mail Stop D2130 Denver, CO 80235 United States

10/2013 - Present Salary: $119,922.00 USD Per YearHours per week: 60 Series: 2210 Pay Plan: GS Grade: 14

Chief, Systems Administration (Supervisory IT Specialist - OS/SYSADMIN) (This is a federal job) Supervisor: Mr. Spencer Bessette (303-969-7205) -- previously Mr. Dennis Donovan (303-969-5033) Okay to contact this Supervisor: Yes - Position has increased in size, scope and intensity since transition from Interior Business Center, IT Directorate, System Software Administration Branch position, listed after the recent temp promotion below. Organizational transition and new organizational alignment, with same position description, expectations, and responsibilities. - Effectively use a combination of leadership styles, prefer the Participative - "Lead by Example" - Embodies "BE-KNOW-DO" Army leadership - Experienced in advising senior executives on effective utilization of IT systems / solutions to meet business objectives. - Provide high-level technical expertise & supervision / leadership / motivation of a cross-functional staff - Work with peers, to include the newly assigned dedicated Information System Security Officer (ISSO) for the OCIO to ensure all security devices and architecture are in compliance with security regulations and risk management framework. In coordination with the OCIO Information Security Compliance Team, review and lead the remediation of

Page 2: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 2 of 22 

vulnerability findings and audit recommendations before and after they become POA&M items.) (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large, geographically dispersed hosting/data center environment.) - Serve as ISSO for the Denver Data Center General Support System - DDC GSS, with oversight of my staff providing ISSO and SSO duties for their relevant portions of the environment until January, 2016 when we were assigned dedicated ISSO staffing from IAD. Aviation Management Local Area Network - AM-LAN GSS, Interagency Aviation System Local Area Network IAS-LAN GSS, and collaboration with peers and their direct report staff in their roles over the Reston LAN and DC LAN GSS and the related FISMA children and major systems we host, that inherit controls from the general support systems. (Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring according to NIST, OMB, and DHS guidance and framework)- Supervise (direct & indirect) a geographically dispersed staff of 54 IT professionals; fourteen federal employees – eight GS-2210-14s, four GS-2210-13s, two GS-2210-12 & oversee an additional 40 staff (equivalent to GS-2210-11-14) from 3 labor contracts – the largest branch within hosting. (Manage multiple layers of staff including managers and their subordinates and contractors.) - I meet my goals, accomplish what is truly most important & empower staff to do the same. - Manage the System Software Administration Branch (SSAB) to execute the full range of SSAB disciplines to include; System Administration (Operating System Functions & Administration, Performance Monitoring & Tuning, Patch Management, Security Compliance, Operating System Testing & Directory Services to include Active Directory, RAC-F, and Enterprise Access Control Services)

- Security Compliance as one of the 5 defined Roles and Responsibilities of my position – demonstrate compliance with applicable standards, and work to improve processes, and expand the breadth of the environment covered by proactive and detective monitoring actions. Traditional Patch Management, and audit of security controls have been improved through proactive monitoring for devices, system state, and vulnerabilities to provide ever increasing levels of awareness of the risks within our hosted environments.

(Serve as a technical expert and consultant to agency personnel on Information Security Continuous Monitoring as defined by NIST standards and guidance.)

We work collaboratively with IT Security to transition from C&A (Certification & Accreditation methodologies to Continuous Monitoring, to replace point-in-time audits and compliance checks with a continuous monitoring program to help prioritize controls and provide visibility into current threats. “Information security continuous monitoring is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. The objective is to conduct ongoing monitoring of the security of an organization’s networks, information, and systems, and respond by accepting, avoiding/rejecting, transferring/sharing, or mitigating risk as situations change.” (NIST Special Publication 800-137 Draft December 2010) Serve as technical expert / subject matter expert - SME (and manage a large team of SMEs for their respective areas) on the four hosting related Operating Systems and the System Administration actions to design, plan, implement and manage IT systems as a major component of an appropriate operational security posture. - Three of the four remaining Roles and Responsibilities of my position directly relate to Information Security as well, with System Administration (Operating System Functions & Administration, Patch Management, Security Compliance, Operating System Testing & Directory Services all requiring direct and indirect expert level architecture design, operations & management that ensure compliance with security regulations, guidance, policy and controls and active participation in maintaining and improving the security posture of the hosted information systems. Examples include Access Management, Patch Management, Change Management, Vulnerability Management and Information Systems architecture and designs to ensure that the appropriate operational security posture is maintained for the information system(s) and/or major application(s).

- Although we apply separation of duties / roles & responsibilities, and utilize these methods to ensure compliance, my staff and I demonstrate the mindset that we are all security professionals, and apply the same requirements, knowledge, skills and abilities toward our respective organizational roles and responsibilities. The training and certification requirements of my CP-34 Individual Development Plan, and the additional duties assignment as an ISSO, and an IAT and IAM prepared me to cross-train our new ISSO, from January through October, 2016 and to transition roles and assist in responding to requests and projects assigned to ISSO, Dale Bogle.

(The primary purpose of this position is to research, evaluate, develop, and maintain the Information Assurance Cybersecurity program.) (Provide expert technical, analytical, and managerial guidance for the planning, review, evaluation, implementation, coordination, and integration of DOI's information technology and identifies plans to maintain an effective information security program.) (Serve as a technical expert on the design and implementation of security controls on both internal and cloud computing based environments as specified by the National Institute of Standards and Technology (NIST) guidance.) (Serve as a technical expert and consultant to agency personnel on Information Security Continuous Monitoring as defined by NIST standards and guidance.) (Ensure that the appropriate operational security posture is maintained for the information system(s) and/or major application(s) assigned to that position.) (Interpret government-wide information security guidance as a means to establish standards, policies, guidelines, and procedures to ensure confidentiality, integrity, and availability of the information system.)

- Provide technical, program and project management and functional expertise, complimenting the System Administration staff technical IT expertise & fostering collaboration on solutions. - Manage schedules, workloads, priorities, deadlines, and deliverables to achieve positive results.

Page 3: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 3 of 22 

- Provide essential 24x7 management with four Team Leads overseeing systems infrastructure across Windows Server, Unix (Solaris & Linux) Server & Mainframe (z/OS) architectures, to include distributed systems, (x86 & SPARC), virtualized x86 (VMware & HyperV) & System Z Enterprise Server / Mainframe (z/196) platforms developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against

unauthorized access to systems, networks, and data; conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and

protection needs; promoting awareness of security issues among management and ensuring sound security principles are reflected in

organizations’ visions and goals; conducting systems security evaluations, audits, and reviews; developing systems security contingency plans and disaster recovery procedures; developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere

to systems security policies and procedures; participating in network and systems design to ensure implementation of appropriate systems security policies; facilitating the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes; assessing security events to determine impact and implementing corrective actions; and/or ensuring the rigorous application of information security/ information assurance policies, principles, and practices in the delivery

of all IT services.

- Nominated by the Information Technology Directorate as the 2013 Interior Business Center Supervisor of the Year (3rd nomination as IBC/NBC Supervisor of the Year since 2009), with some highlights provided below from nomination by ITD staff and senior leadership:

- “Kevin has displayed all the attributes of an exceptional supervisor while leading this large, dispersed organization which has contributed so significantly to the accomplishment of the NBC’s Strategic Goals.” - “Made outstanding contributions to the continued improvement and success of the hosting business and overall IT service mission.” - “Kevin has worked to develop his branch into a high performing team. He emphasizes teamwork among the functional silos of Mainframe, Windows and Unix administration.” -“Continually makes program decisions and recommendations that are aligned with Departmental needs. Where applicable, effectively reaches out throughout the Department to solicit needs, ideas and perspectives in order to deliver cost effective, quality services. He clearly demonstrates a strong understanding of the Department’s needs and culture, issues to be addressed, and goals and outcome expectations.” - “Kevin proactively identifies opportunities to decrease costs and improve financial and performance transparency. He holds self and others accountable for goal accomplishment in the four focus areas of Customer Service and Service Delivery, Costs and Transparency, Internal Communication, and Employee Empowerment. Ensures that projects within areas of specific responsibilities are completed in a timely, efficient and effective manner that meets or exceeds objectives.” - “Demonstrated an outstanding appreciation for the NBC's financial management goals. He continually makes recommendations for improvements, and cost savings.”

- “Kevin provided extensive technical, project management, leadership and customer service improvements for the OCIO Operational Improvement Project, the Data Center Consolidation – ESC to USGS Move, and the z/196 Mainframe Project, each of which were completed successfully according to detailed, aggressive project schedules, with appreciation expressed from customers across multiple agencies.

- Ability to focus efforts and concentrate on details, even in the face of significant stresses and challenges has been proven on an almost constant basis. Kevin’s high quality work, attention to detail, and quick delivery turnaround times have contributed significantly to the IBC’s business relationships on a long term basis.” - “Kevin’s technical expertise and his ability to train, mentor and oversee SSAB has been and will continue to add significant value to the IBC workforce. His leadership has been exemplary as evidenced by the sustained high performance and high morale of the SSAB. The total impact of his leadership, management and voluntary contributions to the welfare of the employees of his branch and the IBC are without peer.”

- Worked collaboratively with peers to define new Hosting Services Offerings & provided significant input and refinement to the Cost Model definitions, Requirement Definitions, and Service Agreements in support of solutions, to include FMD’s Oracle Federal Financials (OFF) Virtualization, Governance Risk & Compliance (GRC), OFF for Department of Homeland Security (DHS), Business Intelligence (BI), Sunflower and Shared Services Internal Disaster Recovery (DR). - Assigned as one of six Core Team members of the new Segmented Security Architecture Team on August 11th, 2015. Team has developed a high level architecture strategy to segment DOI Core services from DOI Shared Service Hosting, and to provide for additional segmentation where required, whereby customers will not share services with others. (Experience with the application of security principles to common structures, processes, and techniques of IT system development, operations and maintenance) (participating in network and systems design to ensure implementation of appropriate systems security policies) - Chair the Change Management, weekly Change Advisory Board (CAB) when available, attend and give input to the Pre-CAB and CAB, and emergency change requests. Review and approve Firewall Change Requests (FCR) bi-weekly as a Hosting Services representative to a small FCR review team. (IT service frameworks (e.g. ITIL)) - Provided the underlying solution to ensure significant efficiency for OFF application and Oracle Database software licensing, and the key justification for the cloud waiver to accommodate internal hosting solutions. Namely, the utilization of Oracle Sparc server hardware to benefit from Oracle software license model benefits – a combination of operating system, software and hardware not offered by cloud service providers on the OCIO Cloud Hosting IDIQ contract, but a proven, efficient model offered by OCIO Internal Hosting. (Experience with the application of security principles to common structures, processes, and techniques of IT system development, operations and maintenance) - Further optimized the hosting operations through increased server virtualization, with the percentage of the 1768 hosted server environment raising from 23% to 64% virtualized since 2009 (my arrival at DOI), despite largely unfunded

Page 4: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 4 of 22 

lifecycle management plans. (Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring according to NIST, OMB, and DHS guidance and framework. ) (Mastery understanding of service provider managed or cloud computing technologies and the application of security controls within them.) - Coordinates systems operations, management & engineering activities (OCIO Service Delivery, Hosting Services -- Multi-tenancy, Shared Services Provider) infrastructure including approximately 1800 servers, 1700 desktop computers, 400 network printers, 400 databases & 900 TB of combined Tier I and Tier II enterprise storage) at two enterprise data centers (Denver Data Center - DDC - Denver, CO & Reston Data Center - RDC - Reston, VA) & 10 smaller data centers supporting customers within the DOI (to include 3 primary locations & 18 remote / satellite offices) as well as 150 external federal agencies throughout the country. (Conduct analysis and interpretation of IT security policies and directives; and develop strategies, policies and procedures to ensure compliance and extensive knowledge of Department of the Interior, vendor managed external systems, or similar systems) - Ensure the customer's requirements are filled & kept Hosting Chief & OCIO senior leadership aware of all decisions made & status of operations, to include any risks of impact to services. - Combined Federal Campaign Board Member for the Denver metropolitan area since 2009 - Serve as Task Area Lead for the Systems Operation & Administration (SOA) staffing Contract, one of the Big 5 Contracts within IBC, and OCIO. Utilize delegated Team Lead model to collaboratively oversee the largest task area of the SOA staffing – averaging 39 IT professionals since contract award. - My staff performs highly technical tasks, manage critical projects & participate in every IT mission within OCIO, & the OCIO’s Service Delivery Division’s consistently growing hosting mission in support of DOI and external federal agencies. All while demonstrating some of the most effective customer support & teamwork within the organization. - Serves as Acting Division Chief, Hosting Services, on a consistent basis, managing a staff of ~173 FTE's, to accomplish the OCIO, Service Delivery, Hosting Services mission. Communicate technical & managerial guidance to Branch Chiefs, Section Chiefs, Team Leads, employees & contract personnel. - Manage ~55% (~$20M of the ~$36M) of the annual budget within Hosting Services. Provide efficient, cost-saving focused fiscal oversight in support of personal philosophy to empower and expect every staff member to deliver the most cost-effective, and appropriate shared services solution every time – as the civic duty to every tax payer. Mastery of service provider managed or cloud computing technologies and the application of security controls within them.

Department of the Interior, Office of the Chief Information Officer – OCIO (detailed to a Special Project / Temp Promotion) Service Delivery Division 7301 W. Mansfield Ave. Mail Stop D2130 Denver, CO 80235 United States

6/2015 – 10/2015 Salary: $136,970.00+ USD Per YearHours per week: 60 Series: 0340 Pay Plan: GS Grade: 15

Cyber Lead, Service Delivery, Office of the CIO (Supervisory Program Manager GS-0340-15) (This is a federal job) Supervisor: Bruce Downs, Deputy CIO (571-723-6073) Okay to contact this Supervisor: Yes - Effectively use a combination of leadership styles, in this case, utilized directive authority across organizational lines - Experienced in advising senior executives – leveraged for efficient staffing, budgetary planning, and recommendations for critical decisions at the departmental level in support of national security initiatives. - Provide high-level technical expertise, program management and leadership / motivation of a cross-functional staff - I meet my goals, accomplish what is truly most important & empower staff to do the same. - Active Top Secret Security Clearance - Much of the narrative provided was taken from nomination and award citation for the OCIO Cybersecurity Award dated August 31, 2015: - In response to an advanced persistent threat (APT) detected at a DOI data center, on April 17, 2015: - As a key member of the initial incident response team (IRT), rallied swiftly and effectively to contain the threat in collaboration with colleagues from the Department of Homeland Security (DHS), the Federal Bureau of Investigations (FBI) and other interagency partners. We took immediate action to deploy the needed tools to detect and respond to the adversary's activities. - I transitioned roles, especially operational priorities, & focused even more granularly upon Incident Mitigation - I was detailed to a Special Project / Temp Promotion to Supervisory Program Manager GS-0340-15/04 as the Cyber Lead for Service Delivery from 06/14/2015 through 10/11/2015. promoting awareness of security issues among management and ensuring sound security principles are reflected in

organizations’ visions and goals; developing and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere

to systems security policies and procedures; participating in network and systems design to ensure implementation of appropriate systems security policies; facilitating the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes; assessing security events to determine impact and implementing corrective actions; and/or ensuring the rigorous application of information security/ information assurance policies, principles, and practices in the delivery

of all IT services. conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and

protection needs;

Page 5: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 5 of 22 

- Provided direct technical Systems Administration, project management, and cyber reporting as well as daily implementation, incident response, and security control guidance to staff across OCIO Operations. (Manage and host security devices in conjunction with Information Assurance. Work with peers, to include the newly assigned dedicated Information System Security Officer (ISSO) for the OCIO to ensure all security devices and architecture are in compliance with security regulations and risk management framework. In coordination with the OCIO Information Security Compliance Team, review and lead the remediation of vulnerability findings and audit recommendations before and after they become POA&M items.) (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large, geographically dispersed hosting/data center environment.) - I coordinated immediate remediation efforts on behalf of Hosting, in coordination with Hosting Services Managers, and Team Leads, with direct assignments to staff where necessary. Once detailed, I tasked on behalf of Chief, Service Delivery and expanded coordination of remediation efforts across Service Delivery. - Coordinated, and ran a daily (became 2/week) SD Ops Meeting on Security Mitigation to collaboratively work mitigation project plan assignments, and keep senior leadership informed over the past year. - Coordinated and oversaw tactical actions taken, as well as the strategic and architectural decisions, and high level projects/assignments and reporting that fell within this new Cyber Lead Role. We developed a comprehensive lessons learned and used this to build and implement a remediation plan for the immediate areas of compromise. Ultimately, we expanded remediation planning to all bureaus and offices and worked with colleagues in Policy Management and Budget, the DOI Budget Office (POB), the Interior Business Center (IBC) Acquisition Directorate (AQD) and the Office of the Solicitor (SOL) to prepare and prioritize urgent acquisitions and respond to questions and inquiries from DOI leadership and oversight authorities about resource needs.

Many of the tactical actions taken are provided as bullets below, as well as the strategic and architectural actions, and high level projects/assignments that fell within this new Cyber Lead role.

I coordinated immediate remediation efforts on behalf of Hosting, in coordination with HSD Managers, and Team Leads, with direct assignments to staff where necessary.

Coordinated Position Designation Statements in support of others in HSD Management for receipt of classified cyber threat, incident and situational awareness briefings.

Began and continually improved upon Lessons Learned as input to other core data centers and bureaus Budget procurement needs/recommendations/prioritization, justification

(insure maximum use of personnel, materials and funds)

In May, I recommended and gained consensus and approval of a method of covering Operational roles across Systems Administration in order to focus efforts toward Incident Mitigation for Hosting Services. I then began to transition roles, especially operational focus according to this plan, and focused even more granularly upon the Incident Mitigation efforts for Hosting Services. Soon after I was detailed / temp promoted NTE120 days and began to report to June Hartley as Chief, Service Delivery (with periods under Bruce Downs as Acting Chief, Service Delivery). Detail to Special Project / Temp Promotion to Supervisory Program Manager GS-0340-15/04 as the Cyber Lead for Service Delivery from 06/14/2015 to 10/11/2015.

Tasking delegated to me for Service Delivery by Chief of SD, and Deputy CIO. Collaborated with Office of Info Assurance then I coordinated for Service Delivery Coordinated further remediation efforts on behalf of Service Delivery (vs Hosting Services specific) Coordinated, and ran a daily (became 2/week) SD Ops Meeting on Security Mitigation (promoting awareness of

security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals; )

Helped to prepare draft responses and provide input to preparatory questions then participated in practice sessions with DOI CIO, Sylvia Burns in preparation for her hearing sessions with House Oversight and Government Reform Committee. The DOI Cyber Security Strategic Plan, the Incident Mitigation Plan, and IRT and US Cert Action Notes all informed these preparations.

Collaborated with FCCO / NETCOM Network Enterprise Center (NEC) and G-4 POCs at Army and MDA for Classified procurement strategy

Provided direct technical Systems Administration, as well as implementation, incident response, and security control guidance to staff across OCIO Operations.

Collaborated with FCCO / NETCOM Network Enterprise Center (NEC), Public Affairs Officer and G-4 POCs at Army and MDA for Incident Comm Plan examples to provide IRT POCs at DOI.

Page 6: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 6 of 22 

Coordinated and met DHS / Whitehouse Binding Operational Directive (BOD) 15-01 prior to suspense for Service Delivery: DOICIRC Urgent Advisory ID #: 20150526-02 DOICIRC Incident Reference#: 00000000019476 Date Issued: May 26, 2015 Binding Operational Directive (BOD) 15-01, Critical vulnerability Mitigation Requirement for Federal Civilian Executive Branch Departments’ and Agencies’ Internet-Accessible Systems (Expanded by DOI to apply controls to all systems) (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large, geographically dispersed hosting/data center environment.) The Large-Scale PII Breach Incidents Report (AR-15-20001B) updated on May 22, 2015. This product, developed by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC), contains Indicators of Compromise (IOCs) resulting from a number of recent large-scale PII breach incidents. You are requested to have these IOCs deployed to your intrusion detection/prevention systems (IDS/IPS), vulnerability scanning solutions (e.g., McAfee Vulnerability Manager (MVM) & Tenable), hardware/software configuration scanning systems (e.g., SCCM & IEM) and other sensors to the fullest extent and initiating detection, scanning and analysis of every workstation, server and other information technology assets by close of business (COB) …

~55 Snort rules deployed. Any traffic -> malicious IPs, DNS request for malicious host names.

Worked tirelessly to draft, review and edit the DOI Cyber Security Strategic Plan (requested by the Secretary on June 23), in collaboration with the Cyber Advisory Group (CAG) formed in late June by DOI CIO. It has five goals: 1. Protect the Department’s critical assets and information; 2. Identify cyber security risks and vulnerabilities; 3. Continuously provide situational awareness and detect incidents; 4. Improve the Department’s ability to respond to and recover from cyber events; and 5. Improve cyber security and privacy awareness and develop a skilled information assurance cyber workforce. and is built around the NIST framework of five core functions, the cyber advisory group added a sixth "Learn" as our commitment to continuous learning and improvement. Identify: What assets need protection? Protect: What safeguards are available? Detect: What techniques can identify incidents? Respond: What techniques can contain impacts of incidents? Recover: What techniques can restore capabilities? Learn: What have we learned and what can we do better? (promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals; )

As a member of the Cyber Sprint team, undertook the challenge of meeting the goals defined in the Office of Management and Budget's (OMB) 30-day Cyber Sprint. I provided SD response, reviewed input and finalized for OS, IBC, OHA, DDC (Mansfield) and RDC. The Cyber Sprint team undertook the challenge of meeting the goals defined in the Office of Management and Budget's (OMB) 30-day cyber sprint. Within one week of the announcement of the cyber sprint, this group effectively engaged the bureaus and offices to achieve 100% personal identity verification (PIV) compliance of privileged IT users throughout the Department. They helped drive 94.5% PIV enforcement for unprivileged users to date, while also reducing the number of privileged users by over 1000 from the initial target. They aggressively promoted cyber hygiene, which included scanning and remediation of all critical and high vulnerability within 30 days. In addition, they helped ensure the bureaus and offices deployed indicators of compromise provided by DHS to all publicly facing IT systems and created the first inventory of DOI's high value data assets. As a result of this extraordinary work, DOI was proud to among the top five federal agencies (and third amongst large cabinet level agencies) that met or exceeded the cyber sprint goals. OMB punished the results publicly in August 2015. This took countless hours of hard work including many long evenings and weekends over several months. The group unified and focused on protecting and securing the Department's IT systems and network to ensure the continuity of DOI's vital mission work. (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large, geographically dispersed hosting/data center environment.)

Page 7: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 7 of 22 

2017 Cybersecurity Budget Addendum for Department of Interior (DOI) bureau and offices. Collaborated on the requirements, solutions, and budgetary estimates to provide the Cybersecurity Budget Addendum worksheets. Collaborated, and edited the Cybersecurity Budget Addendum Submission document that will go forward to OMB to request the estimated $88.1 million that builds on: (1) baseline cybersecurity investments in the Department’s IT portfolio ($68.5 million); (2) the Department’s 2016 continuing resolution (CR) cybersecurity anomaly request of $89.4 million; (3) and the 2017 Office of the Secretary request of $62.1 million (which includes recurring costs from actions in the 2016 CR anomaly request).

Cyber Sprint 2.0 internal Department reporting – coordinated, and consolidated data, and provided

submissions for OS, IBC, OHA, DDC (Mansfield) and RDC on 9 weekly datacalls (continued to 24 at Present). Collaborated with OIA on questions, intent, and phrasing to ensure data collected across the department was actionable, and clearly understood. Met suspense every week, and ensured green reports for our respective areas by prior coordination and assignment of tasks to meet actions in advance of reporting. (promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals; )

Assigned as one of six Core Team members of the new Segmented Security Architecture Team on August 11th, 2015. Team has developed a high level architecture strategy to segment DOI Core services from DOI Shared Service Hosting, and to provide for additional segmentation where required, whereby customers will not share services with others. (Experience with the application of security principles to common structures, processes, and techniques of IT system development, operations and maintenance) (participating in network and systems design to ensure implementation of appropriate systems security policies)

Briefed DOI CIO on numerous occasions, provided data for briefings, and coordinated resources for meetings, datacalls, and deliverables. (promoting awareness of security issues among management and ensuring sound security principles are reflected in organizations’ visions and goals; )

Reviewed the final US-CERT report on incident with recommended mitigation tasks, to ensure all are covered in the DOI Mitigation Plan or addressed/accepted

Recommended and gathered support for staffing assistance Complied with Litigation Hold RE: preservation of documentation

Department of the Interior, Interior Business Center – IBC (formerly National Business Center – NBC) Information Technology Directorate - ITD Infrastructure Operations Services Division - IOSD 7301 W. Mansfield Ave. Mail Stop D2130 Denver, CO 80235 United States

04/2009 – 10/2013 Salary: $117,606.00 USD Per YearHours per week: 60 Series: 2210 Pay Plan: GS Grade: 14

Chief, Systems Software Administration Branch (Supervisory IT Specialist - OS/SYSADMIN) (This is a federal job) Supervisor: Mr. Spencer Bessette (303-969-7205) -- previously Mr. Dennis Donovan (303-969-5033) Okay to contact this Supervisor: Yes - Effectively use a combination of leadership styles, prefer the Participative - "Lead by Example" - Embodies "BE-KNOW-DO" Army leadership - Provide high-level technical expertise & supervision / leadership / motivation of a cross functional staff - Supervise (direct & indirect) a geographically dispersed staff of 51 IT professionals, twelve federal employees - six GS-2210-14s, four GS-2210-13s, two GS-2210-12 & oversee an additional 39 staff (equivalent to GS-2210-11-14) from 7 labor contracts - Serve as ISSO for the Denver Data Center General Support System - DDC GSS, with oversight of my staff providing ISSO and SSO duties for their relevant portions of the environment. Aviation Management Local Area Network - AM-LAN GSS, Interagency Aviation System Local Area Network IAS-LAN GSS, and collaboration with peers and their direct report staff in their roles over the Reston LAN and DC LAN GSS and the related FISMA children and major systems we host, that inherit controls from the general support systems. - Experienced in advising senior executives on effective utilization of IT systems / solutions to meet business objectives.- I meet my goals, accomplish what is truly most important & empower staff to do the same. - Manage the System Software Administration Branch (SSAB) to execute the full range of SSAB disciplines to include; System Administration (Operating System Functions & Administration, Performance Monitoring & Tuning, Patch Management, Security Compliance, Operating System Testing & Directory Services to include Active Directory, RAC-F, and Enterprise Access Control Services)

- Security Compliance as one of the 5 defined Roles and Responsibilities of my position – demonstrate compliance with applicable standards, and work to improve processes, and expand the breadth of the environment covered by proactive and detective monitoring actions. Traditional Patch Management, and audit of security controls have been improved through proactive monitoring for devices, system state, and vulnerabilities to provide ever increasing levels of awareness of the risks within our hosted environments.

(Serve as a technical expert and consultant to agency personnel on Information Security Continuous Monitoring as defined by NIST standards and guidance.)

Page 8: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 8 of 22 

We work collaboratively with IT Security to transition from C&A (Certification & Accreditation methodologies to Continuous Monitoring, to replace point-in-time audits and compliance checks with a continuous monitoring program to help prioritize controls and provide visibility into current threats. “Information security continuous monitoring is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. The objective is to conduct ongoing monitoring of the security of an organization’s networks, information, and systems, and respond by accepting, avoiding/rejecting, transferring/sharing, or mitigating risk as situations change.” (NIST Special Publication 800-137 Draft December 2010) Serve as technical expert / subject matter expert - SME (and manage a large team of SMEs for their respective areas) on the four hosting related Operating Systems and the System Administration actions to design, plan, implement and manage IT systems as a major component of an appropriate operational security posture.

- Three of the four remaining Roles and Responsibilities of my position directly relate to Information Security as well, with System Administration (Operating System Functions & Administration, Patch Management, Security Compliance, Operating System Testing & Directory Services all requiring direct and indirect expert level architecture design, operations & management that ensure compliance with security regulations, guidance, policy and controls and active participation in maintaining and improving the security posture of the hosted information systems. (participating in network and systems design to ensure implementation of appropriate systems security policies) Other examples include Access Management, Patch Management, Change Management, Vulnerability Management and Information Systems architecture and designs to ensure that the appropriate operational security posture is maintained for the information system(s) and/or major application(s).

- Although we apply separation of duties / roles & responsibilities, and utilize these methods to ensure compliance, my staff and I demonstrate the mindset that we are all security professionals, and apply the same requirements, knowledge, skills and abilities toward our respective organizational roles and responsibilities. The training and certification requirements of my CP-34 Individual Development Plan, and the additional duties assignment as an ISSO, and an IAT and IAM prepared me to cross-train our new ISSO, from January through October, 2016 and to transition roles and assist in responding to requests and projects assigned to ISSO, Dale Bogle.

(Provide expert technical, analytical, and managerial guidance for the planning, review, evaluation, implementation, coordination, and integration of DOI's information technology and identifies plans to maintain an effective information security program.) (Serve as a technical expert on the design and implementation of security controls on both internal and cloud computing based environments as specified by the National Institute of Standards and Technology (NIST) guidance.) (Serve as a technical expert and consultant to agency personnel on Information Security Continuous Monitoring as defined by NIST standards and guidance.) (Ensure that the appropriate operational security posture is maintained for the information system(s) and/or major application(s) assigned to that position.) (Interpret government-wide information security guidance as a means to establish standards, policies, guidelines, and procedures to ensure confidentiality, integrity, and availability of the information system.)

- Manage schedules, workloads, priorities, deadlines, and deliverables to achieve positive results. - Provide essential 24x7 management with three Team Leads overseeing SSAB systems infrastructure across Windows Server, Unix (Solaris, Linux & z/Linux) Server & Mainframe (z/OS & z/VM) architectures, to include distributed systems, (x86 & SPARC), virtualized x86 (VMware & HyperV) & System Z / Mainframe (z/196- z/9 - z/10 , z/VM) platforms - Nominated by the Information Technology Directorate as the 2012 Interior Business Center Professional Employee of the Year, with some highlights provided below from my nomination by ITD senior leadership:

- “Kevin has demonstrated an outstanding appreciation for the NBC's financial management goals. He continually makes recommendations for improvements, and cost savings. One of the finest examples of modernizing Financial and Business Management Practices is Kevin's very successful z/9 to z/196 Mini-Mainframe Migration Project. This follow-on to the project entails replacing the existing NBC IBM 2094- 604 z/9 Mainframe with an IBM 2817-506 z/196 (Mini) Mainframe for the purpose of "right-sizing" the z/OS operating system environment to fit current and anticipated client resource demands, while providing advanced IBM System/ z architectural services in reliability, availability, and serviceability. He was instrumental to the success of the production upgrade of the hosting environment for z/OS based mainframe applications hosted by NBC. Kevin's technical, project management, and leadership approach have helped make this project a success. This mission-critical, multi-line of business environment was required to quickly upgrade processor hardware, while "right-sizing" capacity in order to decrease costs and remain a viable hosting solution providing the NBC's Federal Personnel and Payroll system (FPPS), the Federal Financial System (FFS) applications as well as other applications hosted for other DOI bureaus. The planning and quick implementation of the new IBM z/196 mainframe, culminated in an extremely successful production implementation without impacting the services provided to clients.” (executing implementation and conversion support to clients migrating from legacy systems; coordinating the resolution of system issues arising from factors such as changes in legislation and agency policies; and experience with strategic planning to analyze financial processes and execute policy development) - “Responsible for the management of approximately 1700 servers, Operating System and Directory Services, the largest portion of the Hosting Operation.” - “Detail assignment providing Operation Management expertise for the OCIO ‘Operational Improvement’ Plan”

- Developed staffing plan projections, and gave significant input into the ITD VERA/VSIP planning. - Met the FY12 and FY13 goals for SSAB staffing plan, decreasing staffing from 11 to 9 federal staff with the VSIP retirement of SSAB staff. As planned the staffing model has incorporated a heavier reliance upon contract staffing, but has taken advantage of existing federal staff on the team to cover necessary federal functions and oversight/reporting. - Worked collaboratively with peers to define a new ITD Hosting Service Offering and provided significant input and refinement to the Cost Model definition, with requirement definition, refinement and ROM presentation to EPA, & SBA. Kevin has demonstrated an outstanding appreciation for the NBC’s financial management goals. He manages ~55% (~$20M of the ~$36M) of the annual budget within Hosting Services. He was an integral contributor to the Virtualization Platform Business Case which provided the analysis and recommendations leading to the strategic decision to retire the zVM (mainframe based virtualized platform for Linux) environment and focus on x86 virtualization as the NBC’s preferred virtualization platform.

Page 9: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 9 of 22 

- Data Center Consolidation – ESC to USGS Move April 8th, 2013 marked the successfully completion of the colossal, three month project for the DOI’s Interior Business Center’s (IBC) data center relocation for its’ Enterprise Service Center (ESC) in Herndon, VA to the USGS Powell Center in Reston, VA. Obtained funding, and through consolidation by virtualization and decommissioning physical servers, we achieved a 53% reduction in data center space (2,500 square feet, down from 5,300) in Virginia, to provide efficiencies in power, cooling and hosting space requirements estimated at over $100K / year. Overall, IBC seized upon the opportunity to transform its’ IT consolidation success, and significantly raise our server virtualization ratio (from 15% to 89% within the ESC), while contributing to the Department’s objective to consolidate data centers and reduce its real estate footprint. This consolidation made possible the avoidance of a million dollar facility lease renewal, while avoiding approximately $283K in unfunded customer lifecycle requirements for server infrastructure. This monumental accomplishment demonstrates IBC’s commitment to reducing costs while maintaining high quality customer service, and through teamwork was accomplished according to a very detailed project plan, within budget and through coordination with over 100 federal stakeholders and vendors – with no unplanned outages / impacts to customers. - Further optimized the hosting operations through increased server virtualization, with the percentage of the 1652 hosted server environment raising from 23% to 51% virtualized since my arrival at NBC, despite largely unfunded lifecycle management plans. - Worked extensively on documenting, reviewing, and finalizing ITIL Process Flows originally began as a follow-on action for A-123 Audit, these processes have since been emulated by the DOI, OCIO (IT service frameworks (e.g. ITIL)) (Cyber Security as related to hosting based on Federal laws, policies and procedures; and handling cyber security incidents within a large, geographically dispersed hosting/data center environment.) - Nominated by the IT Directorate and selected for the NBC Technical Employee of the Quarter (Q3 FY12) - Conceived and led a cross-agency project to incorporate best-practice procedures and re-use of documentation, and templates for the NBC ITD Engineering Review Board from the Department of the Army, Fort Carson Network Enterprise Center. (Experience with the application of security principles to common structures, processes, and techniques of IT system development, operations and maintenance) - The following citations were taken from my nomination by ITD staff as the 2010 NBC Supervisor of the Year:

"Kevin has displayed all the attributes of an exceptional supervisor while leading this large, dispersed organization which has contributed so significantly to the accomplishment of the NBC's Strategic Goals." "Kevin is a talented, effective & compassionate supervisor & leads the largest branch in ITD." "The total impact of his leadership, management & efforts extended for the welfare of the employees of his branch & the ITD are on par with the best supervisor's I have worked in my career extending over 30+ years in the military & federal civilian service." "Mr. Lucier continually displays an outstanding commitment to customer service." "Kevin's technical expertise & his ability to train, mentor & oversee SSAB has been & will continue to add significant value to the NBC workforce." "Mr. Lucier continually makes program decisions & recommendations that are aligned with Departmental needs." "His blending & balancing of effective technical oversight with consistent attention to the administrative, morale & other needs of his staff is exemplary." "Kevin made outstanding contributions to the continued improvement & success of the hosting business & overall IT service mission."

- Change Agent - requested as detail assignment (temp promotion to 15) to the OCIO reporting to June Hartley under Service Delivery as the new "Operations Manager" position. Rather than 100% detail, a part-time "Consultant" type role, with about 10% of my time toward the OCIO "Operational Improvement" Plan was supported as better overall for the organization. I provided my recommendations & then made these into a Continuous Service Improvement Plan & have led efforts to complete action items. (IT service frameworks (e.g. ITIL)) - Requested as Subject Matter Expert (SME) for the Department's development of position descriptions for management positions in support of service areas. My assignment was as primary SME (of 3 SMEs DOI-wide) for the "Hosting" focus area. Developed draft PD & gave input to all relevant requests until assessment tool development was requested, whereby I requested dismissal as SME to prevent Conflict of Interest with future application toward these promotion potential positions. Verified concern of conflict of interest with NBC HR & NBC ADIR & completed all assignments prior to requesting dismissal from team. - Coordinates systems operations, management & engineering activities (NBC Infrastructure Operations Hosting Services -- Multi-tenancy Shared Service Provider) infrastructure including approximately 1800 servers, 1700 desktop computers, 400 network printers, 400 databases & 600 TB of enterprise storage) at two enterprise data centers (Denver Data Center - DDC - Denver, CO & Enterprise Service Center - ESC - Herndon, VA) & 10 smaller data centers supporting customers within the DOI (to include 3 primary locations & 18 remote / satellite offices) as well as 150 external federal agencies throughout the country. Ensure the customer's requirements are filled & kept IOSD Chief & ADIR aware of all decisions made & status of operations, to include any risks of impact to services. - Windows Server Administration - Windows 2003 / 2008 Servers, Active Directory Services for ~906 servers enterprise-wide, currently ~7% virtualized. - Unix / Linux Administration - Solaris 9/10 Servers (Solaris 10 Zones 120-340 VMs), RedHat Enterprise Linux (RHEL) 4 / 5.5 Servers ~ 932 Unix/Linux servers enterprise-wide, currently ~61% Virtualized - Mainframe / Systems Software - z/9 & z/800 Mainframes in a parallel sysplex Enterprise-class Multi-OS partitioned platform (z/OS 1.10/1.12) - DOI mainframe consolidated hosting, Federal Personnel & Payroll System (FPPS) support to DOI bureaus & numerous other Federal agencies, servicing 240,000+ accounts, 102 third-part systems software products supported - Virtualization Platforms: -- VMware (vSphere ESXi 4.1 Enterprise Plus) VM Platform Standard - preferred VM platform, Production & Non- Production Clusters per data center with defined security zones & 3-tiered architecture – VMware Administration ~ 200 VM Servers enterprise-wide, capacity for ~600 VMs -- IBM z/VM – RHEL virtualized on z/9 & z/10 mainframes – z/Linux (200 VMs, scaling down to 25 remaining) -- Oracle (Sun) Solaris Domains (physical hardware partitioning) & Zones/Containers (logical partitioning) -- Application Virtualization - Increased utilization per physical server, with licensing benefits through multi-instance per physical server / cluster

Page 10: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 10 of 22 

- Defined Patch Management Program integrates with Continuous Security & Compliance Monitoring & Change Management Programs, Patching schedules, published STIGs & post-patch procedures work symbiotically to keep servers within defined DOI standards, using published & exemplified procedures. Strengthened enterprise coordination & procedures to improve patch management of 3rd party (non-Microsoft) products in the Windows environments. On servers, this has resulted in Adobe Acrobat Reader, Flash & Java updates being released in accordance with defined critical patch procedures/deadlines & on desktops, the additional coordination & delegation of roles has improved patch management of these same products across the enterprise desktop environment. - Change Advisory Board (CAB) – Attend & serve as delegate for the IOSD Chief to chair the board that is responsible for coordination & consensus approval to changes of the IT infrastructure. Change Management (CM) is a related function that allows for orderly implementation of continuous operational improvements. (IT service frameworks (e.g. ITIL)) - Preparation, automation & training for Emergency Accountability of all SSAB staff w/ assistance for same within IOSD. Demonstrated extremely efficient automated capabilities during core & after hours accountability exercises. - Combined Federal Campaign Board Member for the Denver metropolitan area since 2009 - Volunteered & serve on Fort Carson’s Transition Assistance Program (TAP) Employer Panel 2010-13 - Conceived a plan to demonstrate the need for competition for the NBC VM architecture by developing & releasing a VM RFI. Utilized market research in standardizing ITD Virtual Hosting service offering, & in negotiating the Enterprise License Agreement / VMware Contract terms for cost effective current & projected requirements. - Reviewed VM capabilities, verified licensing information & developed costing model to allow NBC to offer virtualized servers that are more cost effective than the current virtual servers capitalizing on the DOI wide Microsoft volume licensing agreement to offer Microsoft HyperV virtualization. - NBC representative for the DOI Innovations & Efficiencies Team (DIET) Infrastructure Consolidation Servers & Storage Group – cross bureau team of 7 key members establishing technical & planning recommendations for DOI – continued involvement as the team integrated into DOI IT Transformation Team, recommendations & NBC datacall responses in support of DOI / OCIO projects/initiatives to meet the Department needs. (Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring according to NIST, OMB, and DHS guidance and framework. ) (Mastery of service provider managed or cloud computing technologies and the application of security controls within them.) - Cloud Computing - Significant project contribution to the DOI / NBC Cloud implementation. Cloud computing is a pay-per-use model for enabling available, convenient, on-demand network access to a shared pool of configurable computing resources. -- Significant priority & dedication toward the cloud service offering definition, design & implementation. I was part of the technical design, implementation, testing & even marketing of NBC's Cloud Service offerings. (Experience with the application of security principles to common structures, processes, and techniques of IT system development, operations and maintenance) (Mastery of service provider managed or cloud computing technologies and the application of security controls within them.) I provided demonstrations of capabilities for automated provisioning, monitoring & metering, on numerous occasions I orchestrated & coordinated these customer presentations with little lead time & amidst continued development & operations efforts. I was directly involved with technical implementation/administration though the majority of the time I served collaboratively & in oversight of team tasks. I provided input into the strategic vision & high level technical solutions & integration efforts. The automated provisioning of z/Linux guests within the Cloud Service offering is certainly an enormous example of the optimization of operational performance. Even with the thoroughly documented, efficient model that existed prior to this automation, the steps necessary to provision a virtual server were benchmarked as taking 114 minutes to complete (vs 1.5 months for physical server procurement & provisioning) & involved multiple staff. Through the efforts of the team & with near daily input from SSAB staff, the provisioning can be completed by one staff member in less than 20 minutes. -- Automated Provisioning: After manual administrator authorization is complete, self-service provisioning requests (via public website & Remedy workflow integration) quickly provided z/Linux virtual server instances on the Denver z/9 & the Herndon z/10 mainframes via automated provisioning, primarily using Tivoli Provisioning Manager (TPM), Tivoli Service Automation Manager (TSAM), EACS (TIM/TAM) integration & Citrix Netscaler Access Gateways. -- Monitoring System: Immediate, automated integration of newly provisioned virtual servers into the performance/availability monitoring system provided a “single pane of glass” view of (OS, App, DB) system performance & alerts, including select customer accessible dashboards & integration to enterprise monitoring & alert processes, primarily using IBM Tivoli Monitoring (ITM), Tivoli Data Warehouse (TDW), Tivoli Enterprise Portal (TEP) & numerous IBM Tivoli Composite Application Manager (ITCAM) agents (ITCAM for Server Management, ITCAM for Applications, ITCAM for WebSphere Application Server – WAS). -- Metering System: Immediate, automated integration of newly provisioned virtual servers into the utilization-centric metering system provided the collection of usage data needed to develop a chargeback billing system. The utilization for network bandwidth, memory, cpu & storage per virtual server & per customer were maintained utilizing IBM Tivoli Usage & Accounting Manager (ITUAM). -- Effective November 7, 2009, the first federal government cloud service offering was released – The NBC Cloud Computing website was activated for registering, ordering & provisioning the NBC's Infrastructure as a Service (IaaS) offering - NBC-GRID! Effective November 20, 2009, NBC’s Platform as a Service (PaaS) offering - NBC-STAGE was successfully launched. NBC’s first cloud computing customer (Social Security Administration) began benefitting from the capabilities this project has provided on January 4, 2010. On February 26, 2010 NBC launched Release 2 of our Cloud Computing Services. This set of offerings included significant process improvements & included NBC’s numerous Software as a Service (SaaS) offerings – NBC-APPS. A total of 384 IaaS offerings, 386 PaaS offerings & 12 SaaS offerings were available to customers for NBC Cloud Computing. Release 3 requirements were effectively scoped & prioritized before a change in senior leadership & a decision for NBC to focus upon the requirements of the DOI & the Department’s Innovations & Efficiencies Team (DIET) project. This change in focus & decision on virtualization platform (with recommendation from the Virtualization Platform Business Case) led to decisions to discontinue cloud release 3 & not to offer R1 & R2 services to additional customers outside DOI.

Page 11: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 11 of 22 

- Virtualization Platform Business Case - recommendation led to a decision to modify the NBC's virtualization platform standard, in order to capitalize on performance benefits & ensure cost avoidance through use of the least cost solution. Virtualization Platform Standard established utilizing VMware & stand-alone multi-instance DB Servers - Microsoft SCCM Implementation, an enterprise-wide (7 geographically dispersed locales) SMS migration - Implementation of initial hardware refresh, in conjunction with department mandated migration to Windows Server 2008 for all OS & BC Active Directory Domain Controllers, with newly developed NBC Windows 2008 Server STIGS - Serve as Task Area Lead and evaluation team member for the Systems Operation & Administration (SOA) staffing Contract, one of the Big 5 Contracts within NBC ITD. - My staff performs highly technical tasks, manage critical projects & participate in every IT mission within NBC, all while demonstrating some of the most effective customer support & teamwork within the organization - Provided technical expertise, complimenting the technical IT expertise & fostering collaboration on solutions. - Participated as member of the FPPS Business Case Team to evaluate options for FPPS with respect to FFS replacement impacting FPPS without ability to share cost of the mainframe platform. - I have taken the input of my staff & have begun steps toward establishing the Enterprise Capacity Management Team, with re-utilization of existing federal & contract staff within the mainframe team, currently performing these functions on the mainframe platform only, but trained & capable of initiating the effort & running the team with matrixed staffing from each of the hosting services functional silos. Formed as a subset of the Mainframe Team & by blending in SSAB UNIX, Windows & VMware staff as co-contributors to form a permanent functional capacity management group, I expect improvements to Operational Service Levels & improvements in the life cycle management program.

We envision a panel of System Administrators meeting regularly with the Capacity Management Team to review meaningful capacity & performance events & collectively work the issues proactively - Serves as Acting Division Chief, Infrastructure Operations Services Division (IOSD), on a consistent basis, managing a staff of ~173 FTE's, to accomplish the NBC Hosting Services mission. Communicate technical & managerial guidance to Branch Chiefs, Team Leads, employees & contract personnel

Loose Wire, LLC 406 East Park Ave. Anaconda, MT 59711 United States

09/1994 - Present Salary: ~$17,500.00 USD Per YearHours per week: 1-5

Owner / Director of Technology Supervisor: Self Employed (719-210-2687) Okay to contact this Supervisor: Yes - Owner / Director of Technology, Public relations, System Administrator, NOC / Network Administrator, Postmaster, Listmaster, Webmaster & Hostmaster of a small Web Services company, providing customer focused services specializing in personal & small-business Web Services development, management & hosting services - Perform all levels of technical work (development, requirements definitions, administration, customer service, consulting, design, presentation, solutions development & user acceptance) and have trained staff to succeed in each area in my absence. - Provide all functions of business operations (client relations, sales, requirements definitions, sales, negotiations, licensing, procurement, logistics, financial, payroll, contract, scheduling, task assignment, staff supervision & contract oversight) – from program development to cross-training and assignment of staff for daily operations. - Application design & development in .NET-VB & C#, PHP, Python, Perl, C, C++, Java, Assembly, Basic, Visual Basic, Lisp, uPascal, JavaScript, VBScript, PowerShell & various shell scripts, in both procedural & object oriented-OOP methodologies, encompassing many different environments - Interactive website design, development, e-mail & hosting services, interactive web application coding utilizing HTML / DHTML, PHP, server side includes, css style sheets, Visual Basic & Java Scripting, Apache:ASP Active Server Pages, CFML Coldfusion Markup, Active-X controls, client & server side Java solutions, Perl CGI scripts - Maintain web servers & related TCP/IP network child processes; Apache, Bind DNS, ModPerl, Apache:ASP, Resin, Perl, Majordomo, Sendmail, Samba, ProFTPD, WU-FTPD, NFS Mounts, Frontpage Server Extensions & Log Analysis on all servers - Maintain Sun / Oracle SPARC Solaris, x86 Redhat Linux & Microsoft Windows 2003/2008 servers, schedule downtime to minimize user / customer impact, correct security vulnerabilities & train staff with user / customer requests - Information Systems consulting services, custom & ready-made applications, web applications, UNIX/Linux system security, administration & hosting services for local & national clients

   

Page 12: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 12 of 22 

Department of the Army Network Enterprise Center (NEC) (formerly Directorate of Information Management - DOIM) Information Systems Division (ISD) 6151 Specker Ave. Bldg 1550 Fort Carson, CO 80913 United States

11/2006 - 04/2009 Salary: $76,981.00 USD Per Year Hours per week: 60 Series: 2210 Pay Plan: GS Grade:13

Chief, Systems Management Branch (Supervisory IT Specialist - SYSADMIN/NETWORK) (This is a federal job) Supervisor: Mr. Frank J. Davis (719-232-1197) Okay to contact this Supervisor: Yes - GS-13 equivalent, YC-2 position (pay setting 5% above permanent GS-12 position when reassigned) - Provide the full spectrum of Systems Management (Hosting Services); oversee Systems Administration, Data Center Management, Database / Storage / Enterprise Applications, Network Operations, Web Services, Executive Support, Desktop Management, Video Teleconferencing (VTC) & Tactical Operations - Supervise (direct & indirect) forty-six employees engaged in 24X7 information technology (IT) work; 2 GS-2210-12s, 19 GS-2210-11s, 1 YA-2210-02, 4 GS-2210-09s, 1 GS-1001-09 & 19 contractors equivalent to GS-2210-11s - My staff performs at an amazing level & have been exemplified & recognized (DOIM of the Year & Innovative IA Project) throughout the Army for their achievements with the DIACAP (Department of Defense Information Assurance Certification & Accreditation) process - Act as Contract Task Monitor & serve as Project Manager for multiple high-profile, critical IT projects on three Command & Control (C2) Networks (NIPRNet, SIPRNet, JWICS - the Army network environments dedicated to Unclassified, Secret Classified & Top Secret Classified data, respectively - Provide a vision & advocate for the future of the Ft Carson DOIM - Effectively use a combination of leadership styles, embodies "BE-KNOW-DO" Army leadership - Provide high-level technical expertise - As an early step in preparation for Continuous Monitoring to replace the DIACAP (Department of Defense Information Assurance Certification & Accreditation process, Department of the Army began to integrate similar requirements for training and certifications for Systems Administration and Network Administration specialties (later expanded across numerous parenthetical specialties to the Information Technology Specialist / 2210 series positions) that had previously been in place for GS and GG 2210(InfoSec) – Information Security specialists. The intent being to integrate the INFOSEC knowledge and experience into the Plans / Engineering and Integration, architecture and design of IT Systems, as well as into the Programs / Operations & Management (O&M) of Information Systems. Our successful history of DIACAP accreditations and tight collaboration with Information Assurance (IA) combined with additional training for my staff and I toward credentials ensured improvements to the security posture of Army Command & Control (C2) Networks (NIPRNet, SIPRNet, JWICS). Relevant development and certification requirements were to prepare the ITM civilian workforce to meet the demands of the Army of the 21st century, fostering mutual respect between fields / specialties to include higher headquarter accreditation teams, and led the way to consolidation and centralization of many continuous monitoring functions to NETCOM regional capabilities. Although we continued to apply separation of duties / roles & responsibilities, and utilize these methods to ensure compliance, my staff and I have developed within Department of the Army, Training and Doctrine Command (TRADOC), Career Program - CP-34, with the training, development and application of the mindset that we are all security professionals, and apply the same requirements, knowledge, skills and abilities toward our respective organizational roles and responsibilities. The training and certification requirements of my CP-34 Individual Development Plan (Please see Training section of resume below for CP-34 and DoD IA Workforce Management Objectives) applied to Systems Administration Roles, and the Chief of Systems position – ensuring the application of the NIST Risk Management Framework (RMF) to all of my responsibilities. This led to training, & credential testing for Certified Information Systems Security Professional (CISSP) and award of Associate of the (ISC)2 for CISSP – February 2009 - Through Department of Defense guidance, my position, and those of the majority of my staff were marked as required to comply with DoD 8570 IA Workforce Management , and designated with Information Assurance Technical (IAT) and Managerial (IAM) categories I, II, or III. The IAT category’s functions are cumulative. Thus, an IAT Level II or III position requires mastery of the functions of the preceding levels. We determined the identification and categorization of positions and certification of personnel conducting Information Assurance (IA) functions within the DoD workforce supporting the DoD Global Information Grid (GIG) per DoD Instruction 8500.2 8500.01. Starting in 2005, the referenced policy was in place, in 2007 interpretation and clarifications occurred that informed decisions and planning on position designations across the Fort Carson DOIM. In January, 2008, we had certification goals in place, and by Year Three (CY-09), 70 percent of the IA positions were filled with certified personnel. My position is designated as both an Information Assurance Technical (IAT) category III – IAT III, and Information Assurance Managerial (IAM) category II – IAM II. My CP-34 IDP included these goals toward DoD-approved information assurance workforce certifications appropriate for each category and level and appropriate operating system certification for information assurance technical positions. With the program intentions and requirements listed below, I was required to obtain and hold CISSP or Associate, and Security+ training, and certification. (Please see additional details under Training section of resume) - Team efforts were exemplified & recognized (DOIM of the Year & Innovative IA Project) throughout the Army for their achievements with the DIACAP (Department of Defense Information Assurance Certification & Accreditation) process

Page 13: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 13 of 22 

- One of five members of the Fort Carson IT Engineering Review Board (ERB) (Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring according to NIST, OMB, and DHS guidance and framework. ) (Mastery of service provider managed technologies and the application of security controls within them.) - One of eleven voting members of the Fort Carson IT Configuration Control Board (CCB) - Provide technical input & requisite data on Collaborative Information Environment (CIE) to the adopted Army CONUS-wide implementation plan of Office Communications Server (OCS) framework - Effectively & efficiently manage resources; responsible for the management of the Fort Carson IT Infrastructure & Operations. Manage the 100% accountability of the Data Center hand-receipt consisting of 6439 items (327 LIN), worth 79 million dollars, with no compensatory material loss. - Lean Six Sigma (LSS) Project Sponsor: Identified & developed project charters for DMAIC & JDI projects - Oversaw consolidation methodology for installation datacenter operations, including servers, network, storage & physical datacenter infrastructure. After installation consolidation, performed regional consolidation & began enterprise consolidation. - Evaluate the nature & scope of work to automate to determine the need for system development, mods or redesign - Execute the full range of human resources (including performance management) & fiscal responsibilities - Manage schedules, workloads, priorities, deadlines & deliverables to achieve positive results - Serve as a technical expert performing feasibility studies, which involve application of emerging computer technology to resolve unique information management requirements - Ensure the highest levels of availability & functionality of the data center / IT systems and services (Conduct analysis and interpretation of IT security policies and directives; and develop strategies, policies and procedures to ensure compliance and extensive knowledge of Department of the Interior, vendor managed external systems, or similar systems.) - Deputy / Alternate Division Chief, Information Systems Division (ISD), managing a staff of 70 FTE's, to accomplish the DOIM operations mission. Communicated both technical & managerial guidance to Branch Chiefs, Leads & employees

Department of the Army Directorate of Information Management (DOIM) System Management Branch (SMB) 6151 Specker Ave. Bldg 1550 Fort Carson, CO 80913 United States

07/2005 - 11/2006 Salary: $62,557.00 USD Per Year Hours per week: 60 Series: 2210 Pay Plan: GS Grade: 12

Lead, Web Services / Web Architect (Information Technology Specialist-INET/SYSADMIN) (This is a federal job) Supervisor: Mr. Frank J. Davis (719-232-1197) Okay to contact this Supervisor: Yes

- Web Services Lead, supervise & coordinate staffing for Web Services, a highly qualified team of six full time employees/contractors, act as Contract Task Monitor & Project Lead for multiple high profile, critical IT projects for both NIPRNet & SIPRNet - Serve as Programmer/Analyst - Resolves problems, coordinates work with others & makes technical decisions - Conduct needs analysis to define opportunities for new or improved applications, consult with users to identify requirements, conduct feasibility studies & trade-off analysis, define systems scope & objectives, develop overall functional & technical requirements & specifications, evaluate & recommend sources for systems components - Coordinate efforts between staff elements at all levels of the Ft Carson DOIM Interacts closely with Public Affairs Officer & PAO staff to ensure timely, interactive content with appropriate review & clearance for public dissemination via the web. Works closely with customers. - Engineered, tested & deployed a robust Collaboration Information Environment-CIE; utilizing Live Communication Server-LCS, a paired deployment of SIP (Session Initialization Protocol) enabled clients, Windows Messenger 5.1 with Office Communicator 2005, multiple hierarchal SharePoint 2003 portals/WSS sites with desktop integration/authentication & presence/awareness integration to LCS & all Office 2003 applications. Successfully lobbied to extend the CONUS Active Directory Schema for LCS. Administer CIE servers (Windows Server 2003) on VMware & serve as backup SA for VMware ESX / VMware Virtual Environment. - Designed & deployed Federated LCS Architecture. Piloted with FORSCOM & 1st Army HQ. Permitted IM, Audio/Visual & Presence & Awareness outside of the Fort Carson enclave - Administered Collaboration Information Enterprise servers on VMWare & served as SA for Web Services servers. Monitors server performance using performance monitoring tools, installs server upgrades. - Designed & implemented "Meet with the Commanding General" utilizing services from SPS 2003, LCS 2005 & Office Live Meeting. Enabled the Commanding General of Ft Carson to host real-time chat & visual presentations with up to 200 individuals from the Ft Carson & Colorado Springs community via the Internet. - Completed the dynamic web redesign per requirements of the Commanding General, to include use of SharePoint Portal Server for content delivery, enhancing the design of the public web presence. Decreased time-to-live & allowed for delegation of content edits for select portions of the web presence to PAO & Installation Emergency Ops Center - Garrison & Tactical SIPRNet Portal deployments in failover configurations utilizing IDM-T (Information Dissemination Management-Tactical) SharePoint Portal 2003, to provide Army Battle Command Systems (ABCS) - Attended & briefed the DA Collaboration Best of Breed Working Group to present & influence FORSCOM & III Corps best business practices on collaboration efforts within tactical environments - Alternate Branch Chief, System Management Branch – oversee a staff of forty employees.

Page 14: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 14 of 22 

Department of the Army Directorate of Information Management (DOIM) Engineering & Integration ( E&I) 6151 Specker Ave. Bldg 1550 Fort Carson, CO 80913 United States

10/2004 - 07/2005Salary: $56,320.00 USD Per Year Hours per week: 50 Series: 2210 Pay Plan: GS Grade: 11

Systems Analyst (Information Technology Specialist-SYSANALYSIS/APPSW/INET/SYSADMIN) (This is a federal job) Supervisor: Mr. George Jessen (719-526-1300) Okay to contact this Supervisor: Yes - Selected for and served as Subject Matter Expert (SME), and Team Lead within a small (6 staff), dedicated Engineering and Integration (E&I) unit for the Fort Carson DOIM. (Experience in applying the Risk Management framework and ability to ensure appropriate operational security posture is maintained to large General Support Systems, Major Applications, or systems with a focus on Continuous Monitoring according to DISA, NIST, OMB, and DHS guidance and framework. ) - Sole provider of Tier III Web Services, expert web technical advisor/trainer & on-call INET - Internet Specialist/Web Services Programmer-technical planning, designing, developing, testing, implementing & managing Internet, intranet & extranet components & applications development - Development of policies, procedures, training & guidelines related to web services - Project Lead to multiple Engineering Review Boards (SharePoint 2003 migration / SQL Architecture / Taxonomy / Live Communication Server-LCS / Web Services) - Project Coordinator / Integrator - provides direction & technical guidance on the integration & acquisition / development of Information Technology-IT solutions - Provide high-level technical expertise to accomplish analysis of options & development of the design for advanced systems, software & complex programming specifications - Engineered, tested & deployed a robust Collaboration Information Environment-CIE; utilizing Live Communication Server-LCS, a paired deployment of SIP (Session Initialization Protocol) enabled clients, Windows Messenger 5.1 with Office Communicator 2005, multiple (Internet/Public & IntraNet/ExtraNet) hierarchal SharePoint 2003 portals/WSS sites with desktop integration (NTLM/kerberos authentication) & presence/awareness integration to LCS & all Office 2003 applications. Successfully lobbied the CIO G6 & Tech CCB to extend the CONUS Active Directory Schema for LCS. Administer CIE servers (Windows Server 2003) on VMWare & serve as backup SA for ESX/VmWare environment - Systems Analyst - applies analytical processes to the planning, design & implementation of information systems for both SIPRNet & NIPRNet environments - Programmer Analyst-analyzes & refines requirements, planning & designing application architectures, developing, modifying & debugging code, documenting, testing, implementing & supporting applications software; "writes code" - Work with Web Services operations team to develop a scalable server architecture to support regional DOIM web services & provide for network, hardware & data failover - UNIX/Windows Systems Administrator, planning & coordinating the installation, testing, operation, troubleshooting & maintenance of hardware, operating systems & applications software (Problem Solving) - Defined & conducted engineering & testing on IT systems - Maintained awareness of new Research & Development (R&D) & advanced techniques in the INET specialty

Department of the Army Directorate of Information Management (DOIM) Information Dissemination Branch (IDB) – Web Services 6151 Specker Ave. Bldg 1550 Fort Carson, CO 80913 United States

08/2003 - 10/2004 Salary: $47,421.00 USD Per Year Hours per week: 45 Series: 2210 Pay Plan: GS Grade: 09

Web Services Programmer / Web System Admin (Information Technology Specialist-INET/SYSADMIN) (This is a federal job) Supervisor: Ms. Vicki Craig (719-526-1008) Okay to contact this Supervisor: Yes - Served as Web Services Programmer/Analyst (non-supervisory) - Worked to develop, adopt, train & implement adherence to policies of standardization & design - Creates complex scripts or code; Responsible for analyzing, managing, or performing work necessary to plan, design, develop, acquire, document, test, implement, integrate, maintain, or modify systems that provide web services Develops & implements new applications & scripts - Primary Web Services Systems Administrator - Adapt & implement systems diagnostic & maintenance tools to ensure availability & functionality of all systems - Ensured compliance with Section 508 ADA, Public Affairs, Legal, OPSEC, Information Security, statutory & regulatory guidance at all levels of DOD - Provide Internet / Intranet / Extranet services for the greater Fort Carson area - Utilized DBA experience (Oracle, DB2, Microsoft SQL Server, MySQL) & web security expertise to scan, identify & correct SQL injection concerns in existing code, trained staff to prevent exploits

Page 15: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 15 of 22 

- Provided custom software solutions for the web environment, featuring Java Server Pages-JSP, Java Portlets / Servlets, Flash/Swish, DHTML, XHTML, css style sheets, VB & Java Scripting, Active Server Pages-ASP, SQL stored procedures, Coldfusion-CFML & Perl CGI scripts - Developed action plan for regional consolidation of hosting services specific to enterprise application / web services - planning, design, development, implementation & management - Coordinate efforts between staff elements at all levels of the Ft Carson DOIM Interacts closely with Public Affairs Officer & PAO staff to ensure timely, interactive content with appropriate review & clearance for public dissemination - Domain Admin - Served as System Administrator of IDB servers, advised & upgraded to blade infrastructure - Served as IBM WebSphere Administrator - designed, developed & deployed custom web portal solutions with WebSphere Portal (4.2 & 5.01) on WebSphere Application Server, Single Sign On-SSO & collaborative features (Quickplace & Sametime) - Integrated / implemented a redundant single source authentication via LDAP - SunOne Directory Server

National Center for Appropriate Technology (NCAT) & NHT, Inc 3040 Continental Dr. Butte, MT 59701 United States

05/1999 - 08/2003 Salary: $41,384.00 USD Per Year Hours per week: 45

Web Technical Specialist II Supervisor: Ms. Mary Anne Skuletich (406-494-8649) Okay to contact this Supervisor: Yes - Oversaw Web Services, provided guidance, training & assistance to a team-10 web developers, 2 system administrators - Interactive Internet application design & Internet Services management for 23 federal & state funded websites, including domain spaces of 5 federal government agencies - Managed interactive Internet application design & Web Services for 23 internationally acclaimed federal & state funded websites, including domain spaces of The U.S. Departments of Energy, Housing & Urban Development, Department of Agriculture & Health & Human Services, as well as many State & Federal funded project domains. - Utilized SSI, css style sheets, CGI scripting in Perl or C, Active Server Pages, PHP, VBScript, JavaScript, CFML & server/client side Java to meet all webpage & application requirements Ensured functional, easily navigable, accessible (Section 508 compliant) webpages - Filled roles of System Administrator, NOC/Network Administrator & Systems Security Specialist Expertise with web, e-mail, DNS, telnet, SSH & FTP daemons - Proposed & developed formal telework program, then demonstrated success from CO home office (2002-03)

Graduate School Office, Montana Tech of The University of Montana 1300 West Park Butte, MT 59701-8997 United States

03/1998 - 05/1999 Salary: ~$15,000.00 USD Per YearHours per week: 25

Database Administrator-DBA / Information System Support Specialist Supervisor: John Brower, PhD (406-496-4128) Okay to contact this Supervisor: Yes - Oracle Database Administration Development of custom VB interface to SCT Banner tables via ODBC & SQL - Record-oriented, flat file & relational DB development, data querying & optimization, Oracle 8i for Unix - Lead for website & FTP server - Worked with content developers & other server admins to meet webpage & application requirements / design standards

US ARMY Fort Carson, CO 80913 United States

05/1992 - 04/1997 Salary: ~$26,000.00 USD Per Year Hours per week: 50

Automated Logistics Supervisor, CPL(P) 92A20 Supervisor: MAJ Mark Vande Hei (719-282-0481) Okay to contact this Supervisor: Yes - Supervised & trained a seven member Information Systems (IS) staff to work as a team, organize workload & prioritize tasks to exceed section goals - System Administrator of a critical STAMIS logistics system, exceed down time goals & ensure data integrity - Systems Analyst-applies analytical processes to the planning, design & implementation of information systems - Recognized for leadership, excelled at Non-Commissioned Officer / Sergeant promotion board -SPC(P). - Earned recommendation to Warrant Officer Candidate School. - Conceived & implemented an information system to lessen strain on the Army's supply system that ultimately led to savings of over $750,000 in fiscal year 1995. - Granted first security clearance & served as Section Supervisor, responsible for maintaining sensitive & pilferage items with 100% accountability rate. - Automated Inventory Database Management Clerk – responsible for cost savings effort that automated distribution of $195,000,000 in class IX repair parts back into the supply system - Field-tested, evaluated & implemented a new government inventory management database / logistics data communication program in a mission essential logistical environment. - Special Qualification ID: A-Technical Intelligence

Page 16: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 16 of 22 

 

Education: Montana Tech of The University of Montana Butte, MT United States Bachelor's Degree 01/1998 - 05/2002 GPA: 2.74 of a maximum 4.0 Program GPA: 3.68 of a maximum 4.0 Credits Earned: 109 Semester hours Major: Computer Science, Business Process Development Relevant Coursework, Licenses & Certifications: Credits Course Title 3 CS-142 MIL Credit - Operating Systems 3 CS-242 MIL Credit - Data Communications & Networks 3 CS-141 Microcomputer Software 3 CS-210 Intro to Computer Science I 3 ENGL-104 English Composition 3 ES-321 Scientific & Tech Writing 3 HSS-174 Intro to Sociology 2 HSS-121 Principles of Speaking 3 CS-211 Intro to Computer Science II 2 CS-298 Internship in Computer Science sub for CS-491 (Internship in C.S.) 3 CS-215 Assembly Language Programming 3 CS-298 Internship in Computer Science sub for CS-491 (Internship in C.S.) 5 CS-301 Web-based Accelerated Intro Comp. Science I sub for CS-326 (Software Engineering II) 3 STS-139 Introduction to Logic 1 CS-250 Advanced Webpage Design 5 CS-302 Web-based Accelerated Intro Comp. Science II sub for CS-326 (Software Engineering II) 3 CS-354 UNIX, C & C++ 3 MATH-152 Calculus I 3 BS-120T Keyboarding I 4 CS-350 Independent Study in Computer Science sub for CS-365 (Database Management) 3 HSS-337 Professional Ethics 3 CS-331 Data Structures & Algorithms 3 CS-3166 Discrete Structures 3 CS-3326 Data Structures & Algorithms II 3 BUS-3616 Management 3 CS-3256 Software Engineering I 3 MATH-1530 Calculus II 3 CS-4016 Programming Languages 3 CS-4406 Computer Architecture 3 CS-4556 Artificial Intelligence 4 MATH-2510 Calculus III 3 MATH-3256 Matrices & Linear Algebra

Montana State University Bozeman, MT United States Some College Coursework Completed 08/1991 - 05/1992 Major: General Studies

Job Related Training:

Course, Location / dL (Distance Learning) - Date Completed (# Hours) - FY 2017 Transit Benefit Integrity Awareness Training - 10/3/2016 1) - DEO 2016 Annual Ethics Training - 8/31/2016 (1) - IBC Personnel Security Branch Annual Security Awareness Training - 7/7/2016 (2) - Ethics Sweepstakes - 6/28/2016 (1) - Uniformed Services Employment and Reemployment Rights Act (USERRA) - 2016 Completed 6/27/2016 (1) - Veteran Employment Training for Hiring Managers - 2016 - 6/26/2016 (1) - 2016 Role Based Security Training (RBST) Self Certification - 6/26/2016 - Computer Security Incident Response Team (CSIRT) Overview 2016 - 6/26/2016 - Computer Security Incident Response Team (CSIRT) 2016 - 6/26/2016 - 2016 Role Based Security Training (RBST) Certification for SUPERVISORS ONLY - 6/26/2016 - DOI Introduction to Counterintelligence Self-Certification - 6/26/2016 - DOI Introduction to Counterintelligence 2016 - 6/26/2016 (1)

Page 17: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 17 of 22 

- VMware Certified Professional 5 - Data Center Virtualization (VCP5-DCV) certification qualifying exam with exam code VCP550. Certification of prior training for Professional Learning Credits - 6/10/2015 - 2016 Federal Information Systems Security Awareness+ Privacy and Records Management (FISSA+) - 5/31/2016 (3) - Floor monitor and first aid / CPR training - 2015 Federal Information Systems Security Awareness + Privacy and Records Management (FISSA+) - 6/3/2015 - 2015 Role Based Security Training (RBST) Self Certification - 6/3/2015 - DOI Introduction to Counterintelligence Self-Certification - 3/4/2015

- Purchase Card Annual Agreement of Responsibility 2015 - Implementing and Supporting Active Directory Infrastructure - in progress - .NET Remoting - dL via Skillport - in progress - Remoting with Visual Basic 2005 - dL via Skillport - in progress - Remoting with C# 2005 - dL via Skillport - in progress - Veteran Employment Training for Hiring Managers - 2015 - dL - 2/3/2015 - Uniformed Services Employment and Re-employment Rights Act (USERRA) - 2015 - dL - 2/3/2015 - Transit Benefit Integrity Training - FY 2015 - dL - 11/10/2014 - Thrift Savings Plan (TSP) at a Glance Training - 10/31/2014 - 2014 Role Based Security Training (RBST) - dL - 8/10/2014 - Identity, Presence, and Privacy - dL - 8/10/2014 - Providing Cloud Security - dL - 8/8/2014 - Social Engineering and Sniffing - dL - 3/31/14 - 2014 Federal Information Systems Security Awareness + Privacy and Records Management (FISSA+) - dL - 3/31/14

- Transit Benefit Integrity Training - FY 14 - dL -11/8/13 - FEMA Emergency Preparedness for Federal Employees - dL -10/3/13 - GSA SmartPay® Purchase Card Training (Cardholders & Approving Officials) - dL -10/3/13 - GSA SmartPay® Travel Card Training (Cardholders & Approving Officials) - dL -10/3/13 - The No FEAR Act - dL -10/3/13 - Veteran Employment Training for Hiring Managers - dL -10/3/13 - Purchase Card Annual Agreement of Responsibility 2013 - dL -10/3/13 - Charge Card Annual Agreement of Responsibility 2013 - dL -10/2/13 - DOI Charge Card Refresher Course - dL -10/2/13 - Role Based Security Training (RBST) Self Certification (2013) - dL - 7/30/13 - Cloud Computing Basics - dL - 7/30/13 - Computer Security Incident Response Training (CSIRT) - dL - 7/30/13 - 2013 Federal Information Systems Security Awareness + Privacy and Records Management (FISSA+) - dL - 7/30/13 - Uniformed Services Employment and Re-employment Rights Act (USERRA) - dL - 2/20/13 - Researched, prepared & submit (and resubmit / tracked) a request for constructive credit of the Advanced Course of Civilian Education System (CES) from The Army Management Staff College. The intent was to validate & document equivalence for training prerequisites for the Senior Executive Service (SES) Executive Core Qualifications (ECQ) - specifically in preparation for attendance at a future course offering of Continuing Education for Senior Leaders. Consideration after 2008 completion of CES Intermediate Course 09-1, Army Management Staff College, Processed through HQDA, G-37 for determination. Ft. Belvoir, VA - 12/7/12 (140) - Veteran Employment Training for Hiring Managers - dL - 10/16/12 - Managing Shared Calendars in Google Apps - dL - 10/16/12 - Google Email and Calendar Essentials Training for DOI - dL - 10/16/12 - Transit Benefit Integrity Training - FY 2013 - dL - 9/17/12 - VMware VMWorld 2012, San Francisco, CA - 8/30/12 (50) - Effective Performance Workshop - DOI University - 8/2/12 - Applying the Risk Management Framework to Federal Information Systems - dL - 7/20/12 - Computer Security Incident Response Training (CSIRT) - dL - 7/20/12 - VMware Power CLI, dL - 6/22/12 (16) - VMware Security / Network custom course, Denver, CO - 6/15/12 (40) - VMware vSphere Optimize & Scale vSphere 5, New York, NY - 6/8/12 (40) - VMware vCenter Site Recovery Manager: Install Configure Manage [V5.0], Wash, DC - 6/1/12 (16) - VMware vSphere Troubleshooting, dL - 5/25/12 (40) - VMware vSphere 5 Fastrack, Denver, CO - 5/18/12 (50) - FBMS Basic Reporting Course - dL - 4/13/12 (1) - Federal Information Systems Security Awareness + Privacy & Records Management FISSA+, dL - 4/13/12 (1)- 2011 Discrimination & Whistleblowing in the Workplace (No FEAR Act) - dL - 1/20/12 (1) - Charge Card Approving Official Refresher Training - dL - 1/11/12 (1) - FBMS Acquisition Receiver Course - dL - 11/7/11 (2) - FBMS Basic Navigation Course - dL - 11/7/11 (1) - VMworld -Completed 2 technical lab training sessions in preparation for Technical certifications, Las Vegas, NV - 10/21/11 (8)

Page 18: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 18 of 22 

- U.S. Department of Energy, Federal Energy Management Program Labs, Data Centers & High Tech Facilities dL - 10/7/11 (1) - Transit Benefit Integrity Awareness Training - dL - 9/19/11 (1) - VMware Seminar - Managing Virtual Infrastructure, Colorado Springs, CO - 8/2/11 (8) - Getting Results: The Six Disciplines of Performance-Based Project Management , Denver, CO - 7/19/11 (16) - Network World's IT Roadmap Denver Conference & Expo - Denver, CO - 4/28/11 (8) - Hiring Reform for Supervisors 2, NBC Denver, CO - 2011 (2) - "Developing Resilience in Times of Change", USGS, Denver, CO - 2/16/11 (8) - Computer Security Incident Response Training Overview, dL - 2011 (4) - FISSA, Privacy Act, Records Management & ROB, dL - 2011 (2) - Retirement Planning for FERS Employees, DOI University Denver, CO - 2011 (16) - Mid-Career Planning Seminar for FERS Employees, DOI University Denver, CO - 2011 (8) - Reasonable Accommodations Training 1 & 2, NBC Denver, CO - 2011 (4) - Visibility & Intelligence to Manage Service Levels in a Dynamic Environment, Colorado Springs, CO - 2/8/11(8) - USERRA, Uniformed Services Employment & Reemployment Rights Act, dL - 2011 (2) - NBC Hiring Reform Training for Managers 1, dL - 2010 (1) - IDP Conference Attendance, NBC Denver, CO - 2010 (8) - "Getting the Right People for the Job" Supervisor Training, NBC Denver, CO - 2010 (8) - "Take Action Against Bizarre Behavior in the Federal Workplace", NBC Denver, CO - 2010 (4) - Training Webinar VMware Administration, dL - 2010 (8) - Training Webinar Enterprise Access Control System - EACS, dL - 2010 (8) - FISSA, Records Management & Privacy Act, dL - 2010 (2) - Computer Security Incident Response Training Overview, dL - 2010 (4) - "A Look at the Future IT Infrastructure: Making of the DoD Cloud", Colorado Springs, CO - 7/10 (8) - Group 2 Program & Functional Management (CP-34 IDP), dL - 2010 (2) - Associate of the (ISC)2 for CISSP – 2009 (80) - CISSP (Certified Information Systems Security Specialist) Study Prep (CP-34 IDP), dL -2009 (80) Associate of the (ISC)2 for CISSP (CP-34 IDP) – February 2009 Completed CISSP (Certified Information Systems Security Specialist) training & credential test, but CISSP not conferred as required experience at the time, as CP-34 IDP required GS/GG-2210(INFOSEC) experience at / after credential certification. - Security+, TestOut Suite of Certification Prep (CP-34 IDP), dL - 2008-2009 (80) - Civilian Education System (CES) Intermediate Course 09-1, Army Management Staff College, Ft. Belvoir, VA -10/24/08 (140) - Introduction to Incident Command System (ICS) IS-100 (CP-34 IDP), dL -9/29/08 (1) - Introduction to the National Incident Management System (NIMS) IS-700 (CP-34 IDP), dL -9/29/08 (1) - ICS for Single Resources & Initial Action Incidents IS-200 (CP-34 IDP), dL -9/29/08 (2) - Continuity of Operations (COOP) Awareness IS-546 (CP-34 IDP), dL -9/29/08 (2) - National Security Personnel System (NSPS) iSuccess, dL -9/7/08 (2) - Service Strategy Management Training (ITIL/Action Planning) HDI, Ft. Carson, CO -9/8/08 (8) - Accident Avoidance Course for Army Motor Vehicle Drivers, dL -6/16/08 (2) - ITIL v3 Foundations Certification Course (CP-34 IDP), HDI, Colorado Springs, CO -6/26/08 (24) - Dealing Effectively With Unacceptable Employee Behavior, Colorado Springs, CO -6/5/08 (8) - Lean Six Sigma (LSS) Project Sponsor -IMCOM Training / Certification (CP-34 IDP), Ft. Carson, CO -5/9/08 (32) - Overcoming Five Dysfunctions of a Team, Ft. Carson, CO -9/18/07 (3) - OSIsoft PI System Manager Update, RtWebParts & PI Notifications Training (CP-34 IDP), Monterey, CA -8/10/07 (10) - Career Program (CP-34) Individual Development Plan (IDP) – 2007–2009 (440) CP-34 is an Army-wide enterprise for ITM Proponency, built on programs and services that are customer-focused, communications-strong, and technology-managed, to prepare for the ITM civilian workforce to meet the demands of the Army of the 21st century. Position / role assigned a CP-34 IDP starting in January 2007 with development / training and certification requirements. Utilized Army Civilian Training Education and Development System (ACTEDS) to include ACTEDS scholarships, as well as Army Management Staff College Civilian Education System (CES), National Defense University, Free Training, Army eLearning / SkilSoft Training and Computer Based Training / Distributed Learning (dL) to complete requirements of an extensive CP-34 IDP with IT Technical, ITM, ITIL, Process Improvement, LSS, and IT Systems Security / Information Assurance (IA) development, and credential goals (all listed here, and completed prior to my move to DOI, NBC) - 2007–2009 (440) - DoD IA Workforce Management – DoD 8570.01-M http://www.dtic.mil/whs/directives/corres/pdf/857001m.pdf Through Department of Defense guidance, my position, and those of the majority of my staff were marked as required to comply with DoD 8570 IA Workforce Management , and designated with Information Assurance Technical (IAT) and Managerial (IAM) categories I, II, or III. The IAT category’s functions are cumulative. Thus, an IAT Level II or III position requires mastery of the functions of the preceding levels. We determined the identification and categorization of positions and certification of personnel conducting Information Assurance (IA) functions within the DoD workforce supporting the DoD Global Information Grid (GIG) per DoD Instruction 8500.2 8500.01. Starting in 2005, the referenced policy was in place, in 2007 interpretation and clarifications occurred that informed decisions and planning on position designations across the Fort Carson DOIM. In January, 2008, we had certification goals in place, and by Year Three (CY-09), 70 percent of the IA positions were filled with certified personnel.

Page 19: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 19 of 22 

My position is designated as both an Information Assurance Technical (IAT) category III – IAT III, and Information Assurance Managerial (IAM) category II – IAM II. My CP-34 IDP included these goals toward DoD-approved information assurance workforce certifications appropriate for each category and level and appropriate operating system certification for information assurance technical positions. With the program intentions and requirements listed below, I was required to obtain and hold CISSP or Associate, and Security+ training, and certification.

Develop a DoD IA workforce with a common understanding of the concepts, principles, and applications of IA for each category, specialty, level, and function to enhance protection and availability of DoD information, information systems, and networks.

Establish baseline technical and management IA skills among personnel performing IA functions across the DoD enterprise. Provide warfighters qualified IA personnel in each category, specialty and level. Implement a formal IA workforce skill development and sustainment process, comprised of resident courses, distributive

training, blended training, supervised on the job training (OJT), exercises, and certification/recertification. Verify IA workforce knowledge and skills through standard certification testing. Augment and expand on a continuous basis the knowledge and skills obtained through experience or formal education. Personnel in technical category positions must maintain certifications, as required by the certifying provider, to retain privileged system access. Level 1 certification is required prior to being authorized unsupervised privileged access. C4.4.2. Table C4.T5. lists the specific functions associated with the IAM Level II position. Personnel performing these functions, regardless of their occupational title (e.g., ISSO, IAO, ISSM, logistics manager, pilot, infantry officer) shall be identified as part of the IA workforce and must comply with the requirements in the table above and C4.T1. C3.5.2. Table C3.T7. lists the specific functions associated with the IAT Level III position. Personnel performing these functions, regardless of their occupational title (e.g., system administrator, help desk technician, information system technician, aviation mechanic, infantry, logistics coordinator) shall be identified as part of the IA workforce and must comply with the requirements in the table above and C3.T1. C2.2.5. A position may include functions spanning multiple levels. In these cases, the level, and related certification requirements will be those of the highest level functions. Individuals performing functions in multiple categories or specialties must hold certifications appropriate to the functions performed in each category or specialty.

- NSPS HR Elem / Performance Management for Supervisors, Ft. Carson, CO -01/31/07 (16) - NSPS 101, Ft. Carson, CO -01/30/07 (2) - Combat Readiness Center Composite Risk Management (CRM) Basic Course, dL -10/30/06 (4) - VMware ESX 3.0 and VirtualCenter 2.0 FastTrack, Colorado Springs, CO – 2/2006 (40) - DA Civilian Leadership Education & Development (LEAD) Course, Ft. Carson, CO -11/18/05 (40) - DA Supervisor Development Course (SDC) Subcourse 2 of 2 ST5002 HR Management, dL -10/28/05 (8) - DA Supervisor Development Course (SDC) Subcourse 1 of 2 ST5001 Managing & Leading, dL -10/27/05 (8) - Army Web Content & OPSEC Certification (WCOT-IAT-14AC006), dL -10/20/05 (5) - Army Webmaster Training Course (Web-Army-001, Webmaster Website-001), dL -10/19/05 (5) - Solaris 10 for Exprienced Solaris System Administrators -SA-225-S10, Colorado Springs, CO -9/23/05 (40) - Microsoft Windows Server 2003 -MS2081, dL -9/16/05 (16) - Deploying Microsoft Office Live Communications Server 2003 -MS2081 Nashua, NH 9/8/05 (24) - Designing IT Platform Collaborative Applications with .NET & Microsoft SharePoint 2003 - TWT-8036, Denver, CO -8/26/05 (16) - Complete SharePoint 2003 Training Experience-TWT-SH01, Colorado Springs, CO -8/24/05 (24) - Enabling Custom Workflow with SharePoint Portal Server 2003-101764 Integro / Microsoft, Denver, CO -3/8/05 (16) - Planning, Implementing & Managing a Microsoft SharePoint Products & Technologies 2003 Infrastructure MS2012, Integro IMS310, Denver, CO -10/22/04 (40) - IBM Digital Video Library DVL 5-Pack: dL -11/19/04 * WebSphere Studio Application Developer-WSAD V5 for J2EE Developers-W60S0 (40) * EJB Dev using WSAD V5-W35S1 (40) * Servlet & JSP Dev Using WSAD-W31S1 (40) * Web Services Dev Using WSAD-X38S0 (40) * Programming EJBs using IBM WebSphere Application Server-WAS-081S0 (40) - Administering WebSphere Application Server Integro SW246, Denver, CO -6/22/04 (16) - Sun Certified Programmer for the Java 2 Platform, 1 of 2 310-025 Army CBT (SmartForce), dL -8/28/03 (8) - Administering a Microsoft SQL Server 2000 Database-TWT-2072, Colorado Springs, CO -6/14/02 (40) - ApacheCon 2001 -Apache Software Group, Santa Clara, CA -4/6/01 (32) MySQL & PHP, WebDAV, Jakarta, Cocoon, Apache 2.0 Filters, Security, FastCGI, Scalable Internet Architectures, PHP-MySQL, The JSP 2.0 Specification, Tcl, Integrating Apache with MS .NET, URL Mapping: Directory indexing-Content negotiation-and URL rewriting, High Performance PHP, Building a Web service from SOAP to Nuts, mod_perl 2.0, Embperl-Dynamic Websites with Perl, Tomcat Performance Tuning & Troubleshooting, Oracle8i with Apache & PHP 4, Handlers with mod_perl, mod_rewrite, LDAP, From ASP to PHP, Tomcat Server & Application Security, Performance-tuning Apache - Additional IT Training details available upon request -'92-'01 (480) - Sizable Conference Attendance & Conference Presentation list available upon request

Language Skills:

Language Spoken Written ReadEnglish Advanced Advanced Advanced Spanish Novice Novice Novice

Page 20: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 20 of 22 

Professional References:

Name Employer Title Phone Email * Bruce Downs DOI, OCIO Deputy CIO 571-723-6073 [email protected] * Jim Preston Army, Ft Carson NEC

Western Region Chief, IA / IIAM (~CISSO)

719-331-4014 [email protected]

June Hartley DOI, OCIO PACIO 303-668-9849 [email protected] * Spencer Bessette DOI, OCIO Chief, Hosting 303-969-7205 [email protected] Dennis Donovan DOI, OCIO Program Manager 720-448-5327 Dennis_Donovan@ IOS.DOI.gov

Frank Davis Army, Ft Carson NEC Chief, ISD 719-232-1197 [email protected] Vicki Craig Army, Ft Carson NEC Chief, BMB 719-526-1008 [email protected] (*) Denotes most relevant professional references for this position.

Additional Information:

CONFERENCE ATTENDANCE / CONFERENCE PRESENTATIONS: Conference Name, Location -- Date Completed (# Hours) - Denver VMware User Group – VMUG User Conference, Denver, CO - 5/29/13 (10) - VMware VMWorld 2012, San Francisco, CA - 8/30/12 (50) - VMware Seminar - Managing Virtual Infrastructure, Colorado Springs, CO - 8/2/11 (8) - VMware VMworld Conference attendance & completion of 2 technical lab training sessions in preparation for VMware Technical certification(s), Las Vegas, NV - 10/21/11 (50) Trip Report: Technical / Functional Manager responsible for the NBC Systems Administration of Physical & Virtual environments attended VMworld conference, learned about current & future versions of the VMware software products. Became familiar with additional product features & integrated into NBC's desired strategic focus. Met with & discussed vendor products interaction/integration with VMware, discussed features & capabilities & compared to NBC's current offerings. Had multiple opportunities to describe & offer DOI / NBC services to potential customer agencies. Attended VMware Federal Customer Reception, met with VMware Federal VP & discussed suggestions & requested briefings for our other LOBs to gain general awareness of Virtual Environments benefits & VMware capabilities. Met with my peers from USDA, NFC - an amazing opportunity for networking. Developed relationship, compared environments, discussed future directions & agreed to collaborate. I have requested an opportunity for introductions to others within the NFC IT organization. Also took the opportunity to take 2 VMware hands-on-lab technical trainings, in preparation for VMware Technical certification(s). - VMware Seminar - Managing Virtual Infrastructure (Visibility & Intelligence to Manage Service Levels in a Dynamic Environment) Colorado Springs, CO - 8/2/11 (8) - Network World's IT Roadmap Denver Conference & Expo - CO Convention Center Denver, CO - 4/28/11(8) - "A Look at the Future IT Infrastructure: Making of the DoD Cloud", Colorado Springs, CO - 7/10 (8) - Gartner Symposium / ITXPO, FL -10/19/09 (40) - Cloud Computing Architectural Design, IBM Poughkeepsie, NY - June, 2009 (50) Collaborative architecture solutions for NBC implementation of the first federal cloud computing environment - Microsoft Army Symposium, Redmond, WA --2/09 (40) - LandWarNet Conference, Ft. Lauderdale, FL -- 8/21/08 (40) - Presentation of "ITSM (Remedy 7.x) Deployment & Integration at FCCO" for Enterprise ITSM team (ITSM PM, RCIOs, DOIMs, APC) - Presentation of "LCS / OCS - Collaboration Architecture Interoperability" for Enterprise OCS Pilot team (ISEC, PEO EIS, PM NSC) - Tactical C4 Conference - Atlanta, GA -- 4/25/08 (40) - Presentation of "FCCO Collaborative Information Environment (CIE)" - Collaboration SWARM, Combined Arms Center, Ft. Leavenworth, KS -- 3/26/08 (16) - Presentation of "FCCO Collaborative Information Environment (CIE)" - Microsoft/Army Symposium, Redmond, WA -- 2/14/08 (40) - FCCO "Model DOIM" - CIO/G6 - Gartner Data Center Conference, Las Vegas, NV -- 11/30/07 (40) - LandWarNet Conference (CP-34 ACTEDS Scholarship), Ft. Lauderdale, FL -- 8/24/07 (40) - OSIsoft User Conference, Monterey, CA -- 8/10/07 (40) - Presentation of "IT Monitor Deployment & ROI for the US Army" - Tactical C4 Conference - Atlanta, GA -- 4/27/07 (40) - Presentation of "Cross-network & Cross-domain Collaboration" for FORSCOM G6 & staff - Microsoft/Army Symposium, Redmond, WA -- 2/16/2007 (40) - Collaboration Best of Breed (Council of COL), CTSF, Ft. Hood, TX -- 3/3/06 (80) - Presentation of "III Corps / FORSCOM sponsored solution at FCCO" - ApacheCon Europe 2001 - Invited to present again in Dublin, Ireland -- 10/15/01 - ApacheCon 2001 - Apache Software Group, Santa Clara, CA -- 4/6/01 (32) - Presentation of "BOF Session - FrontPage Server Extensions on Apache" AWARDS: - Supervisory Performance Appraisal - Exceptional 4.60 / 5.00 - 10/30/15 - Individual Cash Award Rating ($2,096) -12/4/15 - Individual Time-Off Award (32 Hrs)– 12/4/15 - Individual Cash Award ($850) 9/20/15

Page 21: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 21 of 22 

- OCIO Cybersecurity Award - 8/31/15 - Promotion NTE 120 Days GS-0340-15 - 06/14/2015 to 10/11/2015

- Quality Step Increase (QSI) to GS-14 step 7 - 12/14/14 - Supervisory Performance Appraisal - Exceptional 4.80 / 5.00 - 10/30/14 - Individual Time-Off Award – 5/9/14 - Nomination as 2013 IBC Supervisor of the Year (1 of 4 across IBC) -1/9/14 - Individual Cash Award Rating ($1,646) -12/28/13 - Supervisory Performance Appraisal - Exceptional 4.80 / 5.00 - 10/21/13 - IBC Award for Excellence Enterprise Service Center Data Center Move Team -7/24/13 - Nomination as 2012 Interior Business Center Professional Employee of the Year (1 of 4 across NBC) -2/18/13 - Individual Cash Award - Employee of the Quarter ($500) - - 9/23/12 - Selection as Q3 2012 NBC Technical Employee of the Quarter (1 of 4 across NBC) -9/16/12 - Quality Step Increase (QSI) to GS-14 step 5 - 10/31/13 - Supervisory Performance Appraisal - Exceptional 4.75 / 5.00 - 10/31/12 - Within-grade Increase (WGI) to GS-14 step 4 - 4/22/12 - Individual Cash Award Rating ($1,550) - 12/2/11 - Supervisory Performance Appraisal - Exceptional 4.75 / 5.00 - 10/1/11 - DOI / NBC Award for Excellence (z/OS Mainframe Upgrade) - July, 2011 - Nomination as 2010 NBC Supervisor of the Year (1 of 4 across NBC) -4/1/11 - Within-grade Increase (WGI) to GS-14 step 3 -4/24/11 - On the Spot Cash Award $250 -1/30/11 - Performance Award $4,289 -11/21/10 - Supervisory Performance Appraisal (4.8 / 5) -9/30/10 - Within-grade Increase (WGI) to GS-14 step 2 -4/25/10 - DOI NBC Certificate of Achievement, FBMS Refresh -2/3/10 - DOI NBC Certificate of Achievement, Federal Cloud Computing Project -1/29/10 - Performance Award $2,851 -12/04/09 - Supervisory Performance Appraisal (4.4 / 5) -9/30/09 - Promotion to GS-14 step 1 -4/26/09 - FCCO DOIM Sabre Award 2003-2009 -4/09 - Fort Carson "Mission First - People Always" Award -4/09 - 2008 Army DOIM Award -CONUS -8/21/08 - 2008 Army Information Assurance Award, Category II (Most Innovative Project & Implementation) -CONUS -8/21/08 - PCMS Certificate of Achievement -6/30/08 - Ten Year Certificate of Service -1/24/08 - NSPS Performance Increase $1,465 & Performance Bonus $413 -1/6/08 - Perm Promotion / Reassignment YC-02 (GS-13) -10/19/07 - Temp Promotion / Reassignment YC-02 (GS-13) -7/22/07 - Special Act or Service Award $5,000 -7/18/07 - Army Certificate of Achievement -6/22/07 - Army Certificate of Achievement -5/4/07 - Performance Award $2,500 -4/20/07 - Special Service Award $3,600 -3/29/07 - Army Achievement Medal for Civilian Service -11/17/06 - Promotion GS-11 step 2 to GS-12 step 1 -1/22/06 - Performance Award $2,500 -1/19/06 - On the Spot Cash Award $350 -11/7/05 - Army Certificate of Achievement -10/27/05 - Within-grade Increase (WGI) to GS-11 step 2 -6/12/05 - Army Certificate of Achievement -11/18/04 - Retention Bonus, Cash Award $4,742 -10/15/04 - Accretion of Duties Promotion GS-9 step 1 to GS-11 step 1 -6/13/04 - Previous (military & civilian) awards list available upon request LICENSES / CERTIFICATES: - VMware Certified Professional - VCP 5 - 2013 - Project Management Institute (PMI) #1954-PBM501 – 13 PDU - ITIL v3 Foundations Certification (HDI) -6/26/08 (IT service frameworks (e.g. ITIL)) - Lean Six Sigma (LSS) Project Sponsor Certification (IMCOM) -5/9/08 - Previous Associate of the (ISC)2 for CISSP – February 2009 Completed CISSP (Certified Information Systems Security Specialist) training & credential test, but CISSP not conferred as required experience at the time, as CP-34 IDP required GS/GG-2210(INFOSEC) experience at / after credential certification. (Please see training section of resume, CP-34 and DoD8570 for additional information.) - Related BrainBench certifications-http://www.brainbench.com Transcript #61725 WWW Concepts, Internet Concepts, Web Server Administration, Master Apache 1.3.12 Administration, etc

Page 22: Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4

Kevin L. Lucier Page 22 of 22 

OTHER INFORMATION: - Long history of exceptional annual performance ratings - Security Clearance: Active Top Secret (previous TS SCI) - Myers-Briggs Type Indicator (MBTI): ESTJ - Strength Deployment Inventory (SDI): Hub - Senior Executive Service Qualifications; Leading Change, Leading People, Results Driven, Business Acumen, Building Coalitions - Memberships / Affiliations: AMA - American Management Association, ACM - Association of Computer Machinery, ACT-IAC - American Council for Technology & Industry Advisory Council, AFCEA - Armed Forces Communications & Electronics Association , Denver VMUG - VMware Users Group, DAV-Disabled American Veterans, American Legion, Scoutmaster / Adult Leadership – Boy Scouts of America