Author Image

Hi, I am Jacob

Jacob Henson

Senior Software Developer at FTI

With over 20 years of extensive experience in Cybersecurity and IT, adept at leading teams and overseeing projects. Recognized for possessing a focused, calm, and level-headed approach to challenges. Demonstrated track record of successful project-oriented development, governance, and risk management, all tailored to the evolving needs of a growing business. Equipped with in-depth expertise in adhering to various compliance standards, including NIST SP 800-53, NIST SP 800-171, ISO 20,000, CSC Top 20, and NIST Cybersecurity Framework. Proficient in conducting IT due diligence and effectively integrating mergers and acquisitions. My ultimate passion lies in problem-solving and optimizing processes to drive efficiency and innovation.

Certified Information Systems Security Professional (CISSP)
Offensive Security Certified Professional (OSCP)
CompTIA CySA+ ce Certification
Elastic Certified Engineer
Elastic Certified Observability Engineer
Elastic Certified Analyst
Virtual Hacking Labs Advanced
Remote Pilot
Amateur Ham Radio Extra



Sep 2023 - Present

Huntsville Alabama

Headquartered in Dayton, Ohio, FTI has seven additional facilities with varying levels of clearance, along with a presence in 39 states and Puerto Rico.

Senior Software Developer

Sep 2023 - Present

  • Design, develop, document, test, and debug new and existing software systems, applications, and microservices both cloud-based and on-premise.
  • Utilize Docker for creating, managing, and distributing containers, significantly enhancing development pipelines and fostering a consistent, isolated environment across all stages of the application lifecycle.
  • Collaborate with end users to prototype, refine, test, and debug programs to fulfill user needs.
  • Utilize Jupyter Notebooks for various development and data analysis tasks.
  • Manage software development projects using Azure DevOps Server for source control, backlog management, and sprint planning.


Jul 2022 - Sep 2023

Huntsville Alabama

Headquartered in Fairfax, Virginia, ECS has more than 3,500 employees throughout the U.S.

Cybersecurity Engineer

Jul 2022 - Sep 2023

  • As a lead SIEM engineer, I take charge of overseeing professional service engagements and managing service provider (MSP) customers, working collaboratively with a team of engineers.
  • Implementing configuration management using Ansible to streamline and automate processes.
  • Set up and maintain Elasticsearch clusters as well as Swimlane clusters for seamless operations.
  • Configuring Fleet and Elastic agent policies with both standard and custom integrations to optimize operations.
  • Deploy machine learning jobs with the objective of detecting anomalies.
  • Ensuring compliance and security standards by applying STIGS to Swimlane and Elasticsearch platforms.
  • Evaluating and enhancing the performance and security of customers’ Elasticsearch environments by providing expert guidance.
  • Employing Docker for containerization and establishing immutable pipelines for enhanced efficiency.
  • Configure PagerDuty for multiple teams and workflows to ensure smooth incident management.
  • Develop custom solutions using AWS SNS, SQS, and Lambda functions to address specific requirements.
  • Create and maintain comprehensive documentation of security configurations, procedures, and incidents.
  • Facilitate and lead Scrum meetings for the SIEM team while collaborating closely with project managers to prioritize and incorporate tasks into the backlog.


Apr 2019 - Jul 2022

Redstone Arsenal

VIKTech is a small minority owned business that was founded in 2007 with the sole mission to innovate and deliver the complete range of Information Technology support to enable mission and ensure customer success.

Senior Cybersecurity Consultant

Apr 2019 - Jul 2022

  • Serve as Computer Network Defense(CND) Contractor Lead for a MDA Directorate.
  • Work with multiple teams to report and address compliance and information assurance vulnerability management (IAVM) findings.
  • Validate vulnerability assessments, artifacts in eMASS, ePO and ACAS and make a recommendation to address findings.
  • Coordinate with multiple teams to track, document, and respond to incidents.
  • Support Risk Management Framework (RMF) Assessment and Authorization (A&A) processes in our team.
  • Maintain CND Strategic Plans, Policies, Procedures.

HII Technical Solutions

May 2006 - Apr 2019

Huntsville Alabama

Comprising nearly 6,000 professionals in 45 states and 16 countries, Huntington Ingalls Industries’ Technical Solutions division is a professional services business providing mission-critical solutions to a wide variety of government and commercial customers worldwide.

Chief Information Security Officer (CISO)

Feb 2016 - Apr 2019

  • Directed the Cybersecurity Program and Risk Management that includes the Risk Management Framework (RFM) supporting multiple entities in a global division.
  • Team Lead for the division’s Incident Response Team. As the lead, I am responsible for coordinating with multiple departments bring an incident to closure. Provide written and verbal briefings and presentations to business leaders about incidents.
  • Directed IT governance for the division that aligns with HII, compliance frameworks (e.g., ISO 9001, ISO 20000, and NIST SP 800-171), and contractual requirements (e.g., DFARS 252.204-7012) to align with business objectives. Advise senior leadership on governance, risk management, and regulatory compliance requirements.
  • Develop a division-wide Vulnerability Management Program. My team developed governance and processes to reduce the number of vulnerabilities across the division. The program requires interfacing with multiple business units, application owners, and stakeholders to remediate vulnerabilities.
  • Lead the implementation of Multi-Factor Authentication across the various organization in the division. Managed the initial distribution and developing procedures for continued distribution for future users. My team distributed to CONUS and OCONUS users in than more 70 locations.
Information Assurances and Cybersecurity and ISSM

Feb 2014 - Feb 2016

  • Developed, implemented, and maintained Business Continuity and Disaster Recovery Policies and Procedures.
  • Managed process and acted in the lead role for Computer Incident Response Team (CIRT). Perform forensics on compromised machines and networks, malware analysis and reporting relating to security incidents.
  • Install, maintain, and manage security technologies including FireEye NX, Carbon Black Enterprise Response, Carbon Black Enterprise Protection (Bit9), Splunk, Elastic, Logstash, Kabana, Encase, Nessus, and Suricata.
  • Recommended preventive, mitigating, and compensating controls to ensure the appropriate level of protection and adherence to the goals of the overall information security strategy.
  • Configure and Administer BMC Footprints to support our ISO 20000 requirements
  • Developed and maintain corporate information security and privacy policies.
  • Prepare Information System Security Plans, Protection Profiles (SSPs and MSSPs). Interface with the Defense Security Service (DSS) concerning Security Plan approvals for handling, safeguarding, transmitting, receiving, and generating classified information.
  • Manage COMSEC material and accounts.
Manager of Business Systems and ISSO

May 2006 - Feb 2014

  • Prepare Information System Security Plans, Protection Profiles (SSPs and MSSPs). Interface with the Defense Security Service (DSS) concerning Security Plan approvals for handling, safeguarding, transmitting, receiving, and generating classified information.
  • Manage COMSEC material and accounts.
  • Designed, develop requirements, development, debug many internal systems to integrate different business systems. (Websites, Restful APIs, and Services)
  • Install, support, and operate many business systems including Microsoft SharePoint, Microsoft SQL, Deltek (Costpoint, Budget, and Planning, Govwin, Time and Expense), Privia, Team Foundation Server and GitHub Enterprise.
  • Install, support, and operate cybersecurity technologies including FireEye NX, Carbon Black Enterprise Response, Carbon Black Enterprise Protection (Bit9), Snort, Cuckoo Sandbox, and Splunk (dashboards, reports, custom search commands).
  • Provide support and recommendations to HIPAA security assessment and audit. Draft documentation support to ISO 9000, ISO 20000.


Auburn Alabama

The Raymond J. Harbert College of Business is located on the Auburn University campus in the vibrant city of Auburn, Alabama.


Jan 2004 - May 2006

  • Web Developer and Database Administrator
  • Responsible for maintaining the College of Business IT infrastructure, and the design of new web-based applications to aid the College of Business in everyday tasks, including the web-based scholarship application process and an online software request form.
  • Provided various IT services to the College of Business staff including web surveys, database support, and personal site maintenance.
  • Provided custom IT support as needed to assist the College of Business staff.

Commerce Networks

Aug 2001 - Jan 2004

Auburn Alabama

Commerce Networks, headquartered in Auburn, Alabama, services businesses everywhere from startup companies to multimillion dollar corporations.


Aug 2001 - Jan 2004

  • Developed custom dynamic web applications to meet customer’s requirements.

Byte-Me Computers

Jan 1995 - Aug 1999

Intern Land

Intern counting Company (ICC) is responsible for counting worldwide intern Engineers.


Jan 1995 - Aug 1999

  • Provided custom IT and computer resource design, development, testing, and integration.
  • IT Help Desk Support and real-time troubleshooting of IT architectures.
  • Operation System and Software maintenance, upgrades, custom configuration setups, cybersecurity software for penetration and snooping prevention.


Registered Practitioner (RP)
Taken Courses:
  • Cybersecurity Maturity Model Certification
  • Assessments
Bachelor of Computer Science
Taken Courses:
  • Data Structures and Algorithm
  • Network Security
  • Artificial Intelligent
  • Operating System