{"id":420,"date":"2025-11-25T23:51:57","date_gmt":"2025-11-25T23:51:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aberr019\/?page_id=420"},"modified":"2025-11-25T23:51:57","modified_gmt":"2025-11-25T23:51:57","slug":"reflection-paper-1","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aberr019\/internship\/reflection-paper-1\/","title":{"rendered":"Reflection Paper 1"},"content":{"rendered":"\n<p>            The first 50 hours working at Valor Cybersecurity have been far more fruitful than I could have anticipated; from being exposed to the fundamentals of cloud computing and helping orchestrate the beginning framework for the development of a secure portal, to familiarizing myself with the basics of the Cybersecurity Maturity Model Certification (CMMC) framework that defense contractors must adhere to. This role has allowed me to work closely with the defense sector, providing me with the opportunity to observe defense contract operations from a supporting role while developing cybersecurity architecture within CMMC compliance.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Understanding the services Valor Cybersecurity provided was crucial to getting briefed and involved quickly. My military background and experience working as a defense contractor gave me a solid foundation to hit the ground running when brushing up on CMMC and how this organization interacts with clients. Entering with this level of experience was precisely why I was able to shift my focus from deep diving into CMMC documentation to Microsoft Azure\u2019s cloud computing fundamentals.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Earning experience with cloud computing services like Microsoft Azure by contributing to this project gives me a competitive edge in the job market, especially if it results in earning the Microsoft Azure certification. Thus far, with guidance from my colleagues and Mr. Tomchick, I\u2019ve been exposed to the fundamentals of cloud computing, and moving forward, I anticipate establishing proficiency in network security and architecture by helping design the framework for Valor Cybersecurity\u2019s secure software solution.<\/p>\n\n\n\n<p>            Following several days of independent research to gain familiarity with both the organization and Microsoft Azure, I was tasked with developing a project plan for a software-based enterprise dubbed ValorVictor. This project required a comprehensive understanding of the company\u2019s operations to effectively translate them into a secure, online portal supported by Azure applications. My focus has shifted from formulating abstract concepts of potential solutions to developing a structured framework, rooted in the established cybersecurity best practices gathered during my undergraduate studies and CMMC guidelines. This work marks my first opportunity to implement my knowledge in a practical, real-world context.<\/p>\n\n\n\n<p>             The next 50 hours at Valor will be spent finalizing the framework and collaborating with Valor Cybersecurity\u2019s Jackson Walker, a senior employee tasked with showing me the ropes. Working closely with Jackson, we\u2019ll begin dynamically implementing cloud service resources with CMMC-compliant security controls to construct a secure portal that Valor can utilize for streamlining client documentation and paperwork, improving efficiency, and aiding with scalability.<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-074d94a8-09d1-4738-bbde-abd4528cfd4a\" href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/11\/Reflection-Paper-1.docx\">Reflection-Paper-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aberr019\/wp-content\/uploads\/sites\/36366\/2025\/11\/Reflection-Paper-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-074d94a8-09d1-4738-bbde-abd4528cfd4a\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The first 50 hours working at Valor Cybersecurity have been far more fruitful than I could have anticipated; from being exposed to the fundamentals of cloud computing and helping orchestrate the beginning framework for the development of a secure portal, to familiarizing myself with the basics of the Cybersecurity Maturity Model Certification (CMMC) framework that&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aberr019\/internship\/reflection-paper-1\/\">Read More<\/a><\/div>\n","protected":false},"author":29079,"featured_media":0,"parent":97,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/420"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/users\/29079"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/comments?post=420"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/420\/revisions"}],"predecessor-version":[{"id":422,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/420\/revisions\/422"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/97"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/media?parent=420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}