Home / DoD / Stephen Denker Assigned as NRO Deputy Director

Stephen Denker Assigned as NRO Deputy Director

denker_stephen_small
Maj. Gen. Stephen Denker

Maj. Gen. Stephen Denker — formerly director of air, space and cyberspace operations at Headquarters Air Force Space Command — has been assigned to the position of deputy director at the National Reconnaissance Office.

The U.S. Air Force’s chief of staff announced Denker’s new assignment on Friday.

He previously served as director of strategic plans, programs and analyses at Headquarters Air Force Materiel Command in Wright-Patterson Air Force Base, Ohio.

Denker started his career with the Air Force in 1986 as a spacecraft engineer at Los Angeles Air Force Base in California before he received acquisition assignments with the then Strategic Defense Initiative Organization, currently the Missile Defense Agency, and the Special Programs organization at the Pentagon.

He served as executive officer for the deputy division chief on the assistant secretary of the Air Force (acquisition) staff and served as commandant of Air Command and Staff College and vice commander of Spaatz Center for Officer Education at Air University in Maxwell AFB, Alabama.

Denker holds a bachelor’s degree in aerospace engineering and mechanics from the University of Minnesota-and a master’s degree in systems management from the University of Southern California.

Check Also

Lead HHS Cyber Auditor Says Team ‘Well Aligned’ to Face Challenges

The head of cybersecurity at the Health and Human Services Department’s Office of the Inspector General recently said that he and his team are learning as much as they can about supply chain threats and application development security, to respond to such issues effectively, Federal News Network reported Friday. Jarvis Rodgers, HHS OIG Cybersecurity and IT Audit Division director, told Federal News Network via email that his unit is aware that risks related to global supply chains “present a unique set of challenges” and that poorly written code can result in costly and persistent security vulnerabilities.

Leave a Reply

Your email address will not be published. Required fields are marked *