Our next (ISC)2 Quantico Chapter Meeting
will be Wednesday, Oct 17th at 6:00 P.M.
Meetings are held on the 3rd Wednesday each month at
THE BUILDING DOORS AUTOMATICALLY LOCK AT 5:00 PM. SOMEONE
This month, our meeting will be at Cask LLC, in Aquia Towne Center.
Dr. Thierry Wandji has more than fifteen years of combined experience in teaching, academic research, private, and government industry. He received his Bachelors of Science degree in Electrical Engineering from The Polytechnic School of Engineering at Montreal, Canada in 2003 and his M.S in Electrical Engineering from Morgan State University in Baltimore, MD in 2007.
He obtained a graduate certificate in cybersecurity focused on embedded systems from Georgia Tech and a Master of Science in Cybersecurity Technology from University of Maryland University College. He also went through a three stage (expert) cybersecurity workforce development program within NAVAIR, which led to a highly selective and competitive technical rotation at the Naval Research Lab. He undertook this intensive cybersecurity training and development, while performing his full-time duties as the Software Reliability Technical Lead.
He has advanced to the position of Senior Program Engineer at Morgan State University and Adjunct Faculty at University of Maryland University College, where he oversees many research studies in cybersecurity, designs cybersecurity curriculum, and teaches cybersecurity. Additionally, he designed and implemented a cybersecurity virtual lab (cyber range) for his students to develop hands on experience in cybersecurity.
He currently work as Software Security Technical Lead and within the Cyber Warfare Detachment as Cybersecurity Technical Expert. His duties include but are not limited to assess software security throughout the software development lifecycle, plan, develop and coordinate high impact research projects on cyber defensive technologies, oversee the development of innovative cyber technologies, develop policy guidance/standards and workforce development for software security and integrate them into the acquisition process to ensure that systems are both reliable and highly resilient to cyber-attacks.