Description
Summary - Experienced in all Information Security Risk Management, including design of counter-attack and counter-intelligence controls and force protection activities designed to prevent or thwart spying and intelligence gathering, and to be a defense against deliberate attacks

Accomplishments
Highlights:

Keywords
