Objective

Obtain permanent placement in Information Assurance, Software Security and Design, Computer Forensics-related, Technical Proposal Support or Project Management position in an organization seeking a highly motivated, dependable individual with excellent written communication skills, in-depth knowledge of software development, Disaster Recovery and Business Continuity, NIST standards and regulations, Certification and Accreditation requirements, Security Authorization requirements, great appreciation for computer security and computer forensics skills.

MSCS, CISSP, Security+

Tag: MSCS

Education

Masters of Science in Computer Science
College of Engineering and Mineral Resources, ABET Accredited
West Virginia University, Morgantown, WV
05/2007
Graduate Certificate in Computer Forensics
College of Engineering and Mineral Resources, ABET Accredited
West Virginia University, Morgantown, WV
05/2007
Bachelor of Science in Computer Engineering
Emphasis Areas: Communications and Signal Processing; Computers
College of Engineering and Mineral Resources, ABET Accredited
West Virginia University, Morgantown, WV
05/2005
Bachelor of Science in Electrical Engineering
Emphasis Areas: Communications and Signal Processing; Computers
College of Engineering and Mineral Resources, ABET Accredited
West Virginia University, Morgantown, WV
05/2005
Associate of Arts in Electrical Engineering
Potomac State College of West Virginia University, Keyser, WV
05/2002

Publications

McCarty, Jacob D. “Specifying Security Requirements: Improvement for IEEE Standard 830.”
WVU Scholar. West Virginia University, 2007. Web. 15 May 2007. http://hdl.handle.net/10450/5101.

Abstract: This paper presents a concept on how the software requirements specifications template provided by IEEE Standard 830 could be updated to ensure that security is analyzed during the early stages of the software development lifecycle. This improved security requirement in the software requirements specifications will ensure that software developers will have a more clear understanding of how to protect digital information.