Reflection 2: Continued Work at CNRFC
Alexander L. Trevino
Spring 2026 CYSE 368 Internships in Cybersecurity
Professor Teresa Duvall
TA Joshua Russell
Commander, Navy Reserve Forces Command
Due: March 8, 2026
I work at Commander, Navy Reserve Forces Command, and for my internship I am
assigned under Christopher Gregory. CNRFC sits near the top of the Navy Reserve chain,
with Navy Reserve Centers and Navy Reserve Component Commands underneath it, so
our IT shop supports broad, enterprise level issues that can affect multiple commands
across the Reserve force. Under LT Gregory’s supervision, I rotate through different
sections, shadow technicians, and learn how IT operations support mission readiness
while meeting strict security and accountability standards.
After gaining experience in the Customer Support Center described in Reflection 1, I
transitioned into Key Management Infrastructure (KMI), which introduced stricter
accountability and security procedures. In KMI, I learned the processes and control
standards used to issue Secret Internet Protocol Router Network(SIPR) equipment to
different commands within the Navy Reserve. Because this equipment supports secure
communications on classified systems, every step must be carefully documented and
completed correctly.
My day to day work in KMI included issuing and inventory equipment for multiple
Navy Reserve Centers while maintaining required logs and supporting documents. Before
equipment could be released, I recorded serial numbers and asset tags and verified each
entry for accuracy. After documenting the equipment, I performed basic functionality
checks to confirm it was working and complete, then packaged, sealed, and prepared it for
delivery to the receiving command. This reinforced why attention to detail and
documentation is nonnegotiable when handling equipment that can access classified
networks.
In addition to inventory and issuance work, I assisted with troubleshooting SIPR connectivity inside the building during an urgent situation. Right before the Admiral had an important meeting with senior Navy leadership, his SIPR connection went down. Because the timeline was short, the response had to be immediate and precise. I assisted with rewiring and restoring connectivity by repatching the physical connections and moving the line to the correct network ports, then verifying the connection was stable before the meeting started. This showed me how quickly IT issues can become mission critical and how important it is to stay calm and follow procedures under pressure.
After KMI, I moved into work related to the Local Registration Authority (LRA), which focused on system monitoring, security checks, and reporting procedures. In LRA, I learned how to review and manage device logs using Event Viewer, focusing on relevant event IDs that can indicate system health issues, user activity, or potential security concerns. I also ran scripts to review system and security information more efficiently, including checking system and security logs, monitoring disk space, verifying group membership, reviewing registry changes, and identifying software changes that could signal an unauthorized installation or a configuration issue. I learned that security applications must be monitored to ensure they are running properly, updated, and reporting correctly.
Once the scripts and reports were reviewed, I learned how incidents are handled when suspicious or abnormal activity is identified. If an issue is confirmed or strongly suspected, the affected device must be removed from the network to prevent further compromise. The incident must then be documented and reported through the proper chain, including reporting to leadership and to Naval Network Warfare Command when
required. This portion of the internship showed me how technical actions connect directly to operational leadership and why accurate, timely reporting matters.
Overall, this phase of my internship expanded my understanding of supporting a large command environment. KMI strengthened my appreciation for accountability and chain of custody requirements tied to classified network capable equipment, and it highlighted how urgent operational needs can require immediate action. LRA strengthened my ability to think more critically about system health, log review, and incident response fundamentals. Together, these experiences helped me see how IT, security, and mission readiness are directly linked at Commander, Navy Reserve Forces Command, where actions can impact multiple commands across the Reserve force.
Leave a Reply