{"id":431,"date":"2025-11-26T00:08:53","date_gmt":"2025-11-26T00:08:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aberr019\/?page_id=431"},"modified":"2025-11-26T00:08:53","modified_gmt":"2025-11-26T00:08:53","slug":"interview","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aberr019\/interview\/","title":{"rendered":"Interview"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>Interview with Mr. Jackson Walker<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Cybersecurity Architect for Valor Cybersecurity<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>November 18<sup>th<\/sup>, 2025<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Interviewed by: Alexander Berrios<\/strong><\/p>\n\n\n\n<p>Since I began at Valor, I have worked almost exclusively with Jackson Walker. The CEO, Greg Tomchick, assigned Jackson as one of my primary points of contact for guidance and mentorship, in addition to himself. Jackson works virtually, so most of our conversations take place through Teams, phone calls, or text messages; however, despite never meeting him face-to-face, his mentorship has already left a lasting impression on me. I\u2019ve chosen to interview him because he\u2019s an intelligent, personable, and engaging colleague who leaves me inspired and motivated after each conversation we share. He displays wisdom well beyond his years, and I consider myself fortunate to work alongside him.<\/p>\n\n\n\n<p><strong>Entry Into Cybersecurity<\/strong><\/p>\n\n\n\n<p>A large theme throughout the interview was Jackson\u2019s intentional journey into cybersecurity. His early interest in computers began in middle school, where he taught himself how to build PCs by watching YouTube videos and experimenting with hardware. This ultimately led him to study computer science at Christopher Newport University (CNU), where he later discovered that a new cybersecurity major was being offered. Noting the similarities between both programs, he chose to pursue a double major during his junior year.<\/p>\n\n\n\n<p>While pursuing his double major, he managed to continue working in software engineering during his internship with NASA. He admitted that he lacked networking knowledge and broader technical theory exposure, however, studying cybersecurity helped fill that gap. He also noted that his computer science background has given him a competitive edge during his search for cybersecurity opportunities.<\/p>\n\n\n\n<p><strong>Reflections<\/strong><\/p>\n\n\n\n<p>When asked if he would have done anything differently entering cybersecurity, Jackson expressed overall satisfaction with his path. He believes that his foundation in programming, operating systems, and fundamental computing made advanced security coursework significantly easier. His advice to individuals entering the field was to master the \u201chard, technical skills first,\u201d as these skills later develop into problem-solving abilities and provide fundamental expertise that remains valuable throughout a career.<\/p>\n\n\n\n<p>He added that if he were to change anything, he would have pursued additional certifications earlier, specifically cloud or beginner penetration testing certifications.<\/p>\n\n\n\n<p><strong>Skill Development<\/strong><\/p>\n\n\n\n<p>Jackson emphasized the difficulty of time management and learning to work effectively under strict time constraints. In a professional environment, ensuring productivity within defined timeframes is essential, especially while attempting to maintain a healthy work-life balance. He explained that \u201canyone can get something done if they work 40 or 50 hours,\u201d but learning to achieve the same levels of productivity in 20 hours is a challenge. Developing this efficiency was one of the most difficult skills he has been continuously learning to improve.<\/p>\n\n\n\n<p>He also highlighted the importance of mastering the fundamentals: networking concepts and core computing knowledge that \u201chasn\u2019t changed since the 70s.\u201d He stated that these foundations are timeless and remain relevant no matter how the field evolves.<\/p>\n\n\n\n<p><strong>Roles, Responsibilities, &amp; Growing at Valor<\/strong><\/p>\n\n\n\n<p>Jackson\u2019s role at Valor shifted slightly after another team member, Derek, left the company soon after I onboarded. Initially, Jackson shared client responsibilities and shadowed Mr. Tomchick, Valor Cybersecurity CEO, learning about operations and the business model. With time, Jackson took on tasks and additional responsibilities such as:<\/p>\n\n\n\n<ul>\n<li>Leading client calls<\/li>\n\n\n\n<li>Developing CMMC documentation (SSPs, WISPs, IRPs)<\/li>\n\n\n\n<li>Building internal processes<\/li>\n\n\n\n<li>Managing all clients previously handled by Derek<\/li>\n<\/ul>\n\n\n\n<p>The turnover with Derek doubled his workload, giving him ownership of 8 clients overnight. This transition demonstrated Jackson\u2019s adaptability, organizational discipline, and enhanced understanding of Valor\u2019s operations and services.<\/p>\n\n\n\n<p>At Valor, the most challenging skill Jackson described as needing to develop was maintaining organizational discipline: keeping track of every client, their documentation status, and their unique CMMC needs. Without a standardized tracking system, the Valor team builds some internal processes \u201con the go,\u201d making organization, collaboration, and communication critical.<\/p>\n\n\n\n<p>He manages these challenges through note-taking, organizing emails into client-specific folders, and utilizing LLM scripts to automate and speed up repetitive tasks. His inclination towards standardization and maximizing efficiency helps him balance his various roles and responsibilities smoothly.<\/p>\n\n\n\n<p><strong>Technical Skills &amp; Daily Tools<\/strong><\/p>\n\n\n\n<p>Jackson leans heavily on this strong programming experience working at Valor, noting that he uses personally customized scripts and artificial intelligence (AI) to streamline tasks. When dealing with high-volume work, such as preparing multiple WISP documents, he utilizes scripts in conjunction with LLMs to analyze documents, extract and organize specific sections, and identify discrepancies. His utilization of AI as a <em>tool<\/em> to assist with completing the work, rather than relying on it entirely to complete the work, reflects a uniquely intentional approach that enhances his efficiency while ensuring he maintains full control over the quality and accuracy of all his products. &nbsp;<\/p>\n\n\n\n<p>He also uses tools like Mermaid, a script-based diagramming program, to generate visual flowcharts for clients during meetings. These visual aids help bridge the gap between technical concepts and clients who may not entirely understand. These diagrams proved especially useful in simply explaining how Controlled Unclassified Information (CUI) moves through an organization.<\/p>\n\n\n\n<p><strong>Present &amp; Future Skills<\/strong><\/p>\n\n\n\n<p>Jackson emphasized the need for constant learning within the cybersecurity field. He\u2019s determined to continue improving his core technical expertise, with cloud certifications being his priority. He expressed interest specifically in the AWS Cloud Practitioner certification to complement his Microsoft Azure experience. He\u2019s also considering certifications related to CMMC auditing. Overall, Jackson makes it clear that he values technical skill growth significantly more, since many soft skills come naturally to him.<\/p>\n\n\n\n<p><strong>New Hires &amp; Measuring Performance<\/strong><\/p>\n\n\n\n<p>Jackson highlighted two main qualities he looks for when evaluating new hires:<\/p>\n\n\n\n<ol>\n<li>Self-Starters \u2013 Being able to take ownership of tasks and solve problems without handholding.<\/li>\n\n\n\n<li>Personability &amp; Professionalism \u2013 Especially important when communicating with CEOs and business leadership<\/li>\n<\/ol>\n\n\n\n<p>While technical knowledge matters, he emphasized that those skills can be taught, while initiative and professionalism cannot. Valor is a small business without formal evaluations established to measure performance; in place of this, Jackson believes employee performance should be measured directly by how they support CMMC documentation, client readiness, and mutual endeavors.<\/p>\n\n\n\n<p><strong>Career Aspirations<\/strong><\/p>\n\n\n\n<p>Looking ahead, Jackson sees himself continuing to help Valor grow, gaining deeper experience with running small business operations. Eventually, he would like to start his own company or work in more advanced infrastructure or low-level engineering positions. Ultimately, he aspires to \u201cbuild things and have a big impact\u201d, regardless of where his career leads.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>The interview with Jackson reveals a cybersecurity professional who blends technical expertise, self-driven initiative, and commitment to continuous learning. Reflecting on his journey, he reiterates the value of developing foundational skills in cybersecurity and encourages embracing unconventional career paths. His insights from our conversation provided meaningful guidance for aspiring cybersecurity professionals at any stage of their career. Echoing the words of the book he recommends to anyone navigating their career: \u201cBe so good they can\u2019t ignore you.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interview with Mr. Jackson Walker Cybersecurity Architect for Valor Cybersecurity November 18th, 2025 Interviewed by: Alexander Berrios Since I began at Valor, I have worked almost exclusively with Jackson Walker. The CEO, Greg Tomchick, assigned Jackson as one of my primary points of contact for guidance and mentorship, in addition to himself. Jackson works virtually,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aberr019\/interview\/\">Read More<\/a><\/div>\n","protected":false},"author":29079,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/431"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/users\/29079"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/comments?post=431"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/431\/revisions"}],"predecessor-version":[{"id":432,"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/pages\/431\/revisions\/432"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aberr019\/wp-json\/wp\/v2\/media?parent=431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}