F. James Miller, Cissp, Cap
About F. James Miller, Cissp, Cap
F. James Miller is the Director of Cybersecurity at ATCC in Manassas, VA, where he has worked since 2004. He has extensive experience in incident response, data classification, compliance auditing, and identity and access management.
Current Role at ATCC
F. James Miller serves as the Director of Cybersecurity at ATCC, a position he has held since 2004. In this role, he is responsible for managing incident response processes for cyber incidents, which includes the identification, investigation, containment, eradication, service restoration, reporting, and continuous improvement of security measures. His leadership in cybersecurity ensures that ATCC maintains a robust defense against potential threats.
Previous Experience at FCI and Novoste Corporation
Prior to his current role, F. James Miller worked as a Systems Analyst at FCI from 1997 to 2000 for three years. He then transitioned to Novoste Corporation, where he served as a Senior Systems Analyst from 2000 to 2004 for four years. During his tenure at Novoste, he developed corporate-wide information awareness training, which included regular phishing simulations and specialized training for various departments.
Education and Academic Background
F. James Miller studied Computer Science at Millersville University of Pennsylvania from 1995 to 1999. Although he did not achieve a formal degree, his education provided a foundation for his career in cybersecurity and systems analysis.
Cybersecurity Implementations and Compliance
In his role at ATCC, F. James Miller has implemented data classification across on-premises and cloud applications utilizing Microsoft Information Protection. He has also developed and audited compliance with various policies, including Information Security, Incident Response, Disaster Recovery, and Business Continuity. His efforts contribute to the organization's overall security posture.
Identity and Access Management Initiatives
F. James Miller has developed corporate-wide processes for strong identity and access management. This includes the use of Azure Active Directory, conditional access, and risk-based authentication. Additionally, he has implemented Security Information and Event Management (SIEM) and Vulnerability Management Solutions for consolidated monitoring of the IT estate, utilizing tools such as Azure Sentinel and Azure Security Center.