An effort that worked


Security Dimensions, LLC (SDLLC) is a Delaware based small business servicing the mid-atlantic regional.  We offer a senior-level cyber security subject matter expert (SME)  versed in defense-in-depth security  with knowledge gained from years of experiences in a variety of technology roles and responsibilities.  My initiation to supporting computer products and services began in 1979, while developing skills in the federal government workspace.

These roles were the foundation to establishing SME consulting roles across multiple United States (US) government agencies as a federal contractor.  My security engineering roles and responsibilities span decades in helping customers understand National Computer Security policies (relevant to their enterprise networks compliance and security authorizations). 

As an independent consultant, my knowledge of generating policy overlays to meet each customer’s compliance requirements is transparent to computer systems of any business type, size, or scope.  Since all systems are different in their own right, my experience provides a generic high-level approach to addressing decision-makers systems security needs.

This can only be accomplished through effective security engineering analysis and assessments, teamwork, and business objectives to meet your goals in a timely and efficient manner.   As a SME (consultant) I can effectively translate applicable policies and procedures for building compliant systems, as well as support a variety of security engineering components (e.g., documentation development, security assessments, writing IT white papers, etc.).

We all want things to go smoothly when we’re engineering or maintaining technology efforts.  It can be like a lot of life’s issues, without the right engineering approach or processes and procedures in place, it can be difficult to meet.  Building complex systems and integrating products creates a myriad of idiosyncrasies (i.e., known and unknown) and team building issues. 

A typical example would be designing a complex system integrating a variety of “commercially off the shelf (COTS)” products to support an organization’s computing platforms.  In supporting the roles and responsibilities for such a robust systems environments it requires a lot of mitigation.  It starts with developing a set of assumptions and requirements, getting the stakeholders (e.g., management, engineers, users, etc.) to verify and refine them, and having the leadership versed in engineering “best practices.”