<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=User%3AGary_Holloway</id>
		<title>User:Gary Holloway - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=User%3AGary_Holloway"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Gary_Holloway&amp;action=history"/>
		<updated>2026-04-25T20:01:40Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Gary_Holloway&amp;diff=170686&amp;oldid=prev</id>
		<title>KateHartmann: Creating user page for new user.</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Gary_Holloway&amp;diff=170686&amp;oldid=prev"/>
				<updated>2014-03-23T20:40:56Z</updated>
		
		<summary type="html">&lt;p&gt;Creating user page for new user.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Certification &amp;amp; Accreditation Analyst&lt;br /&gt;
Falconwood, Inc.&lt;br /&gt;
Privately Held; 51-200 employees; Defense &amp;amp; Space industry&lt;br /&gt;
January 2014 – Present (3 months) North Charleston, SC&lt;br /&gt;
&lt;br /&gt;
• Analyze and review the results of network and system vulnerability scans and validate the implementation of IA Controls in accordance with DoD 8500.2&lt;br /&gt;
&lt;br /&gt;
• Provide Independant Validation &amp;amp; Verification (IV&amp;amp;V) supporting Naval Enterprise Networks (PMW-205) DIACAP packages, to include requirements traceability matrices, contingency plans, POA&amp;amp;Ms, hardware &amp;amp; network topologies, security standard operating procedures, security test and evaluation plans, and residual risk assessments&lt;br /&gt;
Battalion S6, First Lieutenant&lt;br /&gt;
Army National Guard&lt;br /&gt;
Government Agency; 10,001+ employees; XXXX; Military industry&lt;br /&gt;
March 2012 – Present (2 years 1 month) Georgetown, SC&lt;br /&gt;
&lt;br /&gt;
Signal Officer (25A) with the 1/178 Field Artillery, BN S6&lt;br /&gt;
&lt;br /&gt;
Staff Officer ultimately responsible for the planning and coordinating execution for the use of all signal assets (combat net radios, BFT/FBCB2, satellite, computer, and broadband communications) during drill and annual training periods. Also support the Defense Support of Civil Authorities (DSCA) planning for hurricane preparedness and emergency response for the state of South Carolina.&lt;br /&gt;
Junior Engineer&lt;br /&gt;
Centurum&lt;br /&gt;
Privately Held; 201-500 employees; Defense &amp;amp; Space industry&lt;br /&gt;
February 2013 – October 2013 (9 months) North Charleston, South Carolina&lt;br /&gt;
&lt;br /&gt;
IA Lead charged with providing DIACAP/PIT accreditation support for NAVAIR's USMC Light/Attack Helicopters Program Office (PMA-276)&lt;br /&gt;
System Security Engineer&lt;br /&gt;
Honeywell Technology Solutions, Inc.&lt;br /&gt;
Public Company; 1001-5000 employees; HON; Defense &amp;amp; Space industry&lt;br /&gt;
August 2012 – February 2013 (7 months) North Charleston, SC&lt;br /&gt;
&lt;br /&gt;
• Supported the SPAWAR NSOC Incident Response 24x7 team during non-core business hours consistent with CNDSP requirements&lt;br /&gt;
&lt;br /&gt;
• Diagnosed new and emerging vulnerabilities and created automated detection capabilities for the NSOC's vulnerability scanning infrastructure&lt;br /&gt;
&lt;br /&gt;
• Ensured security incidents were properly entered into appropriate automated reporting systems&lt;br /&gt;
&lt;br /&gt;
• Provided, developed, and maintained a forensic capability to enhance response to, support of, and investigation into significant network incidents in order to provide a clearer view of the exploits, vulnerabilities, and TTPs used to cause the incident&lt;br /&gt;
&lt;br /&gt;
• Coordinated with and provided forensic support to the NSOC through CND Analysis, Fusion, and Monitoring, Cyber Threat Analyst, IAVM, HBSS support, and CND Infrastructure Support staff as necessary to meet CNDSP requirements&lt;br /&gt;
Information Security Analyst&lt;br /&gt;
Honeywell Technology Solutions, Inc.&lt;br /&gt;
Public Company; 1001-5000 employees; HON; Defense &amp;amp; Space industry&lt;br /&gt;
January 2010 – August 2012 (2 years 8 months) Charleston, South Carolina Area&lt;br /&gt;
&lt;br /&gt;
• Analyzed customers requirements regarding applicable security disciplines; physical, personnel, information, communications, computer and emissions&lt;br /&gt;
&lt;br /&gt;
• Evaluated customer security policy and provides recommendations&lt;br /&gt;
&lt;br /&gt;
• Participated in independent and objective evaluations and audits of the security&lt;br /&gt;
&lt;br /&gt;
• Reviewed and evaluated programs and operations to determine adherence to policies and&lt;br /&gt;
procedures&lt;br /&gt;
&lt;br /&gt;
• Examined controls over data integrity, identifies risks, evaluates safeguards, ascertains compliance with security policies, evaluates, efficiency and cost effectiveness of protective measures, recommends corrective actions, and monitored implementation of approved recommendations&lt;br /&gt;
IA Watch Officer and Signal Platoon Leader&lt;br /&gt;
Army National Guard&lt;br /&gt;
Government Agency; 10,001+ employees; XXXX; Military industry&lt;br /&gt;
May 2011 – January 2012 (9 months) Bagram/Kandahar, Afghanistan&lt;br /&gt;
&lt;br /&gt;
228th Tactical Theater Signal Brigade and 422nd Expeditionary Signal BN (Nevada National Guard)&lt;br /&gt;
&lt;br /&gt;
• Deployed as part of Operation Enduring Freedom – Afghanistan – as an Information Assurance (IA) Watch Officer &amp;amp; Signal Platoon Leader&lt;br /&gt;
&lt;br /&gt;
• Investigated and logged theater-wide IA incidents working from the Joint NETOPS Control Center - Afghanistan (JNCC-A)&lt;br /&gt;
&lt;br /&gt;
• Directly supervised 56 Soldiers deployed throughout Southern Afghanistan (RC-South) in order to provide reliable communications to over 400 tactical subscribers&lt;br /&gt;
&lt;br /&gt;
• Planned and executed relief in place between two company sized elements involving forty personnel &amp;amp; equipment valuing over $10 million dollars&lt;br /&gt;
Internal IT Audit Intern&lt;br /&gt;
TIAA-CREF&lt;br /&gt;
Privately Held; 5001-10,000 employees; Financial Services industry&lt;br /&gt;
June 2009 – August 2009 (3 months) Charlotte, North Carolina&lt;br /&gt;
&lt;br /&gt;
• Performed team based integrated, SOX Compliance, and technical information security audits&lt;br /&gt;
&lt;br /&gt;
• Contributed to maintaining internal document repository (narratives, flow charts, risks, controls, matrices) and assisted in collection process and risk/control documentation&lt;br /&gt;
&lt;br /&gt;
• Personally corresponded with clients and identified opportunities for improvement in their risk mitigation and auditing operations&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gary Holloway's Education&lt;br /&gt;
&lt;br /&gt;
Penn State University&lt;br /&gt;
Master's of Professional Studies, Homeland Security - Information Security &amp;amp; Forensics&lt;br /&gt;
2012 – 2015 (expected)&lt;br /&gt;
&lt;br /&gt;
http://www.worldcampus.psu.edu/degrees-and-certificates/homeland-security-information-security-and-forensics/overview&lt;br /&gt;
Appalachian State University&lt;br /&gt;
Bachelor of Science in Business Administration, CIS, Military Science&lt;br /&gt;
2005 – 2009&lt;br /&gt;
&lt;br /&gt;
Activities and Societies: AITP, Army ROTC&lt;br /&gt;
Gary Holloway's Certifications&lt;br /&gt;
&lt;br /&gt;
Associate of CISSP (T- 2 Months)&lt;br /&gt;
(ISC)2License 465370January 2014&lt;br /&gt;
Security+&lt;br /&gt;
CompTIA License 5PQ049RLPCE1CCGE March 2010&lt;br /&gt;
Certified Ethical Hacker&lt;br /&gt;
EC-Council License ECC976199 March 2013&lt;br /&gt;
Intermediate Level Navy Validator&lt;br /&gt;
US Navy License I0927 March 2014&lt;br /&gt;
Windows 7 Configuration&lt;br /&gt;
Microsoft License E081-8958 November 2012&lt;br /&gt;
Network+&lt;br /&gt;
CompTIA License LHS9QLBJFL4QCM1V December 2010&lt;br /&gt;
Server+&lt;br /&gt;
CompTIALicense T0TB8C3L2CE4C1S5 August 2010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gary Holloway's Skills &amp;amp; Expertise&lt;br /&gt;
&lt;br /&gt;
Computer Security  DIACAP  Security+  Program Management Vulnerability Scanning  CISSP  Software Documentation  Military Certification &amp;amp; Accreditation  Leadership  Team Building  Risk Management Auditing  Security Clearance  Analysis  DoD  Risk Assessment Threat &amp;amp; Vulnerability Management  ST&amp;amp;E  IV&amp;amp;V&lt;br /&gt;
View All (41) Skills&lt;br /&gt;
Gary Holloway's Honors and Awards&lt;br /&gt;
&lt;br /&gt;
Military Awards&lt;br /&gt;
U.S. Army&lt;br /&gt;
Air Assault Badge&lt;br /&gt;
German Armed Forces Proficiency Badge (Gold)&lt;br /&gt;
Army Commendation Medal&lt;br /&gt;
National Defense Ribbon&lt;br /&gt;
Afghanistan Campaign Ribbon (w/ 2 Campaign Stars)&lt;br /&gt;
Global War of Terrorism Service Ribbon&lt;br /&gt;
Armed Forces Reserve National Guard Ribbon (w/ M device)&lt;br /&gt;
Army Service Ribbon&lt;br /&gt;
Army Overseas Service Ribbon&lt;br /&gt;
NATO ISAF Ribbon&lt;br /&gt;
SC Army National Guard Mobilization Support Award Ribbon&lt;br /&gt;
SC Army...more&lt;br /&gt;
Gary Holloway's Organizations&lt;br /&gt;
&lt;br /&gt;
South Carolina Army National Guard Association&lt;br /&gt;
 March 2012 to Present&lt;/div&gt;</summary>
		<author><name>KateHartmann</name></author>	</entry>

	</feed>