{"id":117,"date":"2026-04-26T19:09:22","date_gmt":"2026-04-26T19:09:22","guid":{"rendered":"https:\/\/student.wp.odu.edu\/atrev004\/?p=117"},"modified":"2026-04-26T19:19:22","modified_gmt":"2026-04-26T19:19:22","slug":"reflection-2-continued-work-at-cnrfc","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/atrev004\/2026\/04\/26\/reflection-2-continued-work-at-cnrfc\/","title":{"rendered":"CYSE 368 Reflection 2: Continued Work at CNRFC"},"content":{"rendered":"\n<p>Reflection 2: Continued Work at CNRFC<br>Alexander L. Trevino<br>Spring 2026 CYSE 368 Internships in Cybersecurity<br>Professor Teresa Duvall<br>TA Joshua Russell<br>Commander, Navy Reserve Forces Command<br>Due: March 8, 2026<br><br>I work at Commander, Navy Reserve Forces Command, and for my internship I am<br>assigned under Christopher Gregory. CNRFC sits near the top of the Navy Reserve chain,<br>with Navy Reserve Centers and Navy Reserve Component Commands underneath it, so<br>our IT shop supports broad, enterprise level issues that can affect multiple commands<br>across the Reserve force. Under LT Gregory\u2019s supervision, I rotate through different<br>sections, shadow technicians, and learn how IT operations support mission readiness<br>while meeting strict security and accountability standards.<br>After gaining experience in the Customer Support Center described in Reflection 1, I<br>transitioned into Key Management Infrastructure (KMI), which introduced stricter<br>accountability and security procedures. In KMI, I learned the processes and control<br>standards used to issue Secret Internet Protocol Router Network(SIPR) equipment to<br>different commands within the Navy Reserve. Because this equipment supports secure<br>communications on classified systems, every step must be carefully documented and<br>completed correctly.<br>My day to day work in KMI included issuing and inventory equipment for multiple<br>Navy Reserve Centers while maintaining required logs and supporting documents. Before<br>equipment could be released, I recorded serial numbers and asset tags and verified each<br>entry for accuracy. After documenting the equipment, I performed basic functionality<br>checks to confirm it was working and complete, then packaged, sealed, and prepared it for<br>delivery to the receiving command. This reinforced why attention to detail and<br>documentation is nonnegotiable when handling equipment that can access classified<br>networks.<br><br>In addition to inventory and issuance work, I assisted with troubleshooting SIPR connectivity inside the building during an urgent situation. Right before the Admiral had an important meeting with senior Navy leadership, his SIPR connection went down. Because the timeline was short, the response had to be immediate and precise. I assisted with rewiring and restoring connectivity by repatching the physical connections and moving the line to the correct network ports, then verifying the connection was stable before the meeting started. This showed me how quickly IT issues can become mission critical and how important it is to stay calm and follow procedures under pressure.<br>After KMI, I moved into work related to the Local Registration Authority (LRA), which focused on system monitoring, security checks, and reporting procedures. In LRA, I learned how to review and manage device logs using Event Viewer, focusing on relevant event IDs that can indicate system health issues, user activity, or potential security concerns. I also ran scripts to review system and security information more efficiently, including checking system and security logs, monitoring disk space, verifying group membership, reviewing registry changes, and identifying software changes that could signal an unauthorized installation or a configuration issue. I learned that security applications must be monitored to ensure they are running properly, updated, and reporting correctly.<br>Once the scripts and reports were reviewed, I learned how incidents are handled when suspicious or abnormal activity is identified. If an issue is confirmed or strongly suspected, the affected device must be removed from the network to prevent further compromise. The incident must then be documented and reported through the proper chain, including reporting to leadership and to Naval Network Warfare Command when<br><br>required. This portion of the internship showed me how technical actions connect directly to operational leadership and why accurate, timely reporting matters.<br>Overall, this phase of my internship expanded my understanding of supporting a large command environment. KMI strengthened my appreciation for accountability and chain of custody requirements tied to classified network capable equipment, and it highlighted how urgent operational needs can require immediate action. LRA strengthened my ability to think more critically about system health, log review, and incident response fundamentals. Together, these experiences helped me see how IT, security, and mission readiness are directly linked at Commander, Navy Reserve Forces Command, where actions can impact multiple commands across the Reserve force.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reflection 2: Continued Work at CNRFCAlexander L. TrevinoSpring 2026 CYSE 368 Internships in CybersecurityProfessor Teresa DuvallTA Joshua RussellCommander, Navy Reserve Forces CommandDue: March 8, 2026 I work at Commander, Navy Reserve Forces Command, and for my internship I amassigned under&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/atrev004\/2026\/04\/26\/reflection-2-continued-work-at-cnrfc\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26774,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/117"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/users\/26774"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/comments?post=117"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/117\/revisions"}],"predecessor-version":[{"id":125,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/117\/revisions\/125"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/media?parent=117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/categories?post=117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/tags?post=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}