Quantcast

Iam Architect Resume Washington, DC
Resumes | Register

Candidate Information
Name Available: Register for Free
Title IAM Architect
Target Location US-DC-Washington
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Cloud Architect Aws Chesapeake Beach, MD

IAM Okta Engineer Baltimore, MD

Solutions Architect Devops Engineer Lanham, MD

Solutions Architect Aws Gwynn Oak, MD

Information Technology Cloud Architect Ashburn, VA

AWS SOLUTION ARCHITECT Silver Spring, MD

Cloud Architect Washington, DC

Click here or scroll down to respond to this candidate
 Name: Candidate's Name
Phone: PHONE NUMBER AVAILABLEEmail: EMAIL AVAILABLELinkedIn: LINKEDIN LINK AVAILABLE
Professional SummarySeasoned Cybersecurity Professional with over seven years of experience in developing and maintaining robust cybersecurity measures. Skilled in Certification & Accreditation processes, safeguarding data privacy, and enforcing security policies. Proficient in aligning cyber assets with system security boundaries and administering security controls. Adept in Linux administration and troubleshooting network issues. Experienced in leading Configuration Management initiatives and incident detection methodologies. Dedicated to enhancing organizational cybersecurity posture through continuous improvement and collaboration. Versed with tools such as EMASS, RSA Archer, AuditBoard, JIRA, Splunk, Confluence, OneTrust, Burp suite, AWS, Wireshark, Nessus, ServiceNow, Rapid7 and CSAM.
Key Skills
      Cybersecurity Management      Certification & Accreditation      Data Privacy Protection      Security Policy Enforcement      System Security Alignment      Security Control Implementation      Linux Administration      Network Troubleshooting      Configuration Management      Incident Detection & ResponseEducation and certifications      BS in Computer Science, University of Bamenda, Bamenda, Cameroon, 2017.      Diploma in Cyber security administration, Saint Matin University, 2024      BS in Cyber Security Technology, UMGC (In progress)      CISSP (In progress)      AWS Solution Architect
      Certified Information Systems Auditor (CISA)      Certified in Governance, Risk and Compliance (CGRC)      CompTIA Security +.Information System security officer (ISSO).                                                                         March 2023- presentCyber Centurion-Adelphi MD      Develop and maintain documentation for Certification & Accreditation in accordance with specified policies, develop system security procedure, ensure compliance, and maintain operational security posture for information systems.      Assist in the development of the Security Assessment Plan (SAP), perform and document initial and annual risk assessments of all systems, document all supporting Security A&A artifacts (PIA, SP, ITCP, BIA, CMP, MOU, ISA).      Maintain Data Privacy by safeguarding PII, conducting and reviewing Privacy Threat Analysis (PTA), Privacy Impact Assessments (PIAs) and System of Record and Notice (SORN).      Assist in gathering data, analyze compliance and report results on the condition and progress of local unit Cybersecurity programs, security plans, plan of action and milestones (POA&M) and Assessment and Authorization (A&A) workflow tools data, patch management, information assurance vulnerability alerts (IAVA), and Federal Information System Modernization Act (FISMA) compliance requirements, and Authorizations to Operate (ATOs) to unit leadership as directed.      Lead collaboration efforts across the organization to establish foundational cyber security processes, focusing on the alignment of Cyber Security assets to system security boundaries.      Lead continuous Implementation of enterprise tools and conduct thorough analysis to discover and align IT assets within various security boundaries, ensuring the protection of systems, networks, and sensitive information across the organizations infrastructure.      Provide support for implementing and enforcing information systems security policies, standards, and methodologies.      Manage the creation and maintenance of POAMs to track remediation efforts and ensure timely resolution of vulnerabilities.      Develop and update system security plans and other A&A documentation, perform annual A&A documentation review, log issues were appropriate, remediate and get approval, meeting ATO requirements.
      Spearheaded Configuration Management initiatives for information system security software, hardware, and firmware, ensuring compliance with security protocols and standards. Additionally, administered user identification and authentication mechanisms within the Information System, contributing to enhanced cyber defense and access control measures.      Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation.      Provide liaison support between the system owner and other information security personnel.      Provide support for the integration of cybersecurity and privacy risks into the Enterprise Risk Management (ERM) function, to support FISMA requirements.
      Perform continuous monitoring of implemented security controls to ensure that they are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the cybersecurity requirements for assigned IT systems.
      Provide support for the integration of cybersecurity and privacy risks into the Enterprise Risk Management (ERM) function, to support FISMA requirements.      Brief senior management and ISSM on the security status of assigned authorization boundaries, collect, compile, validate, and submit FISMA reporting metrics representing all systems, services, applications, and programs.      Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information.      Support and facilitate internal and external audits of assigned FISMA systems.      Provide cybersecurity- and privacy-related awareness training content and development support.      Create and annually review/update the Business Continuity Plans (BCP) for each of the mission functions and conduct annual desktop exercises as required.      Provide coordination between customers and other government organizations for security related activities.US Army                                                                                                        September 2019   February 2023US Army   Fort Bliss, TX      Troubleshoot and diagnosed computers within the company ensuring LAN/WAN connectivity which improved computer network efficiency by 20%.      Enhanced reconnaissance capabilities by conducting thorough area assessments and gathering critical intelligence data.      Completed comprehensive training on cloud computing, encompassing the utilization of computing resources such as servers, storage, databases, networking, software, and analytics delivered over the internet. Proficient in leveraging cloud services including IaaS, PaaS, and SaaS to provide flexible and scalable solutions.
      Skilled in Linux administration, encompassing the management, configuration, and maintenance of Linux operating systems. Experienced in deploying, securing, and optimizing Linux-based systems, with responsibilities ranging from software installation and user management to network configuration and system monitoring.
      Conducted risk assessments and maintained situational awareness in dynamic operational environments.      Generated and communicated critical information effectively and rapidly through radio communication and written reports following the scouts  guidelines and standards.      Collaborated with team members and other units to achieve mission objectives.      Adapted quickly to changing circumstances and solved problems under pressure.      Utilized technical skills to operate and maintain communications equipment and navigation systems.Junior Information system security Analyst.                                                December 2017- September 2019Zermount Inc.- Arlington VA.      Demonstrated Hands on experience with industry standard information assurance tools such as Security Content Automation Protocol (SCAP), NESSUS, Host Based Security System (HBSS), Assured Compliance Assessment Solution (ACAS), and Splunk.      Demonstrated experience analyzing and implementing NIST SP 800-53 Security Controls on wide range of Information Systems including Enterprise Datacenters, Mobile units, and virtualized environments.
      Knowledgeable in Linux command line implementing complex technologies at multiple classification levels within large environments and at an Enterprise level.
      Maintained records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades.      Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each information system (IS).      Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle.      Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis.      Conduct required IS vulnerability scans according to risk assessment parameters.      Manage the risks to ISs and other assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs).      Coordinate system owner concurrence for correction or mitigation actions.      Monitor security controls for ISs to maintain security Authorized to Operate (ATO).      Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase.      Ensure that changes to an IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM).      Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR

Respond to this candidate
Your Email «
Your Message
Please type the code shown in the image:
Register for Free on Jobvertise