Quantcast

Information Technology Risk Management R...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Information Technology Risk Management
Target Location US-AL-Birmingham
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Information Technology Be A Pelham, AL

Information Technology Customer Service Hoover, AL

Information Technology Technical Support Birmingham, AL

Operations Manager Risk Management Birmingham, AL

Information Manager Executive Coordinator Talladega, AL

Technology Consultant Independent Birmingham, AL

Health Information Medical Center Oneonta, AL

Click here or scroll down to respond to this candidate
Active TS/SCI Security Clearance with Counterintelligence Security PolygraphCandidate's Name
Security+CEIntelligence AnalysisNational SecurityProgram/Project ManagementStrategic PlanningInformation AssuranceRisk ManagementRequirements ManagementRequirements AnalysisInformation TechnologyGovernment StrategiesConfiguration ManagementMilitary OperationsLogistics ManagementHonors and Awards2017 On the Spot Award2014 DHS Service ExcellenceAward2011 Defense MeritoriousService Medal2011 NRO Bronze PerformanceMedal2011 MS&O Employee of theQuarter2009 Joint Commendation MedalMeticulous Security Professional with several areas of expertise and a proven record of accomplishments in Information Assurance, Information Technology and Logistics Management. Developed and maintained System Security Plans (SSPs) as described in applicable government directives Intelligence Community Directive (ICD) 503, Risk Management Framework (RMF), NIST SP 800 Series, CNSS Evaluation and Incident Response/Management, security planning, risk analysis, risk management, and assessment and authorization activities for on-premises and cloud systems. Demonstrated experience as a Security Certification Officer (SCO), Security Control Assessor (SCA), and Information System Security Manager/Engineer/Officer (ISSM/E/O) with more than 20 years of Information Assurance, Information Technology, and Logistics Management within the DoD, contractor and the Intelligence Community. Highly motivated, articulate with impeccable organizational and customer service skills.EducationAmerican Military University, Charleston, WVMaster of Science in Security Management, 2012Strayer University, Woodbridge, VABachelor of Art in Computer Information Systems, 2004Community College of the Air Force, Maxwell AFB, ALAssociate in Applied Science in Logistics Management, 2000Relevant TrainingeMASS CBT Training 2023Cyber Security Fundamentals (CSF) 2023Certified Information System Security Professional (CISSP) Certificate Training, 2018Harvard Kennedy School Executive Education Cambridge, Cybersecurity: The Intersection of Policy and Technology, 2014Certified ScrumMaster Training 2016XACTA ISSO Training, 2015ICD 503 Risk Management Framework (RMF), 2013Introduction to CCTV Course, 2010Survival Skills for the Acquisition Workforce, 2010Building and SCIF Construction Course, 2009DNI Physical Security DCID 6/9, 2009Noncommissioned Officer Leadership School, 2007Certifying and Accrediting Information Systems (C&A) DCID 6/3, 2004Information Systems Security Workshop (ISSW), 2004CertificationsSecurity+ CEWork History21 Years -- United States Air Force1 Year -- Welkin1 Year 2 months -- General Dynamics2 Years 5 months -- Blue Canopy Group2 Years 9 months  Radiant Solutions3 Years 4 months  Oracle11 months  Radiance TechnologiesRadiance Technologies (May 2023  Present)Information System Security OfficerServe as the Information System Security Officer (ISSO) support to the Organizational ISSM, in the management and administration of authorization and accreditation (A&A) package processing. Responsible for IA of tactical networks, systems, security practices, and the application of IA concepts to rapid hardware/software prototype development.Participates, as a team member, within the assessment of confidentiality, integrity, and availability of systems, networks, and data through the coordination, planning, analysis, development, implementation, and enhancement of information assurance programs, policies, procedures and tools.Serves as the front-line team member to the organizations Authorizing Official team ensuring the dissemination and adherence to IA policies, procedures, guidance, and training requirements. Enforces IA standards and procedures for all phases of hardware and software lifecycle management process and assists in developing solutions to complex problems.Assist in the administration management support of the RCCTO by carrying out and responding in a timely manner to IT/IA tasks and requests; and manage internal office IT and IA work tasks.Develop and maintain relationships between Program/Project Management Offices, RCCTO program staff, and outside organizations to ensure proper communication, development and deployment of information assurance technologies, products, and systems.Assist in preparing briefing materials, supporting engineering and development meetings, coordinating security testing events, scheduling, and supporting teleconferences and video teleconferences and other administrative support tasks as directed.Monitors and manages system accounts in eMASS.Oracle (Nov 2019  April 2023)Consulting Technical ManagerResponsible for ensuring the confidentiality, integrity and availability is implemented into the concept, development and transition to production of information systems. As well as performing, reviewing, technical security assessments of cloud computing environments to identify points of vulnerability, non-compliance with established Information stopAssurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security design.Assist the Government Security Personnel in the oversight, inspection, review, and accreditation of Information SystemsAssesses and mitigates system security threats/risks throughout the program life cycle and contributes to the security planning, assessment, risk analysis, risk management, certification and accreditation activities for system and network operationsDevelop and manage Standard Operating Procedures (SOP), System Security Plans (SSP), Continuous Monitoring Plans (CMP), Incident Response Plans (IRP), and Emergency Plans and provide feedback on recommended and required modifications.Review and track progress of sites Plan of Action and Milestones (POA&M)Radiant Solutions (Jan 2017  Nov 2019)Information System Security EngineerResponsible for ensuring the confidentiality, integrity and availability is implemented into the concept, development and transition to production of information systems. As well as performing, reviewing, technical security assessments of cloud computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security design.Builds IA into systems deployed to development and operational environments and assisting architects and system developers in the identification/implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutionsProvides support to the planning, designing and implementing of security controls which safeguard and monitor events for information systems and applications and dataDrafts, reviews and edits assessment and authorization (A&A) documentation, providing feedback on completeness and compliance of its contentCreate and maintain Plan of Action and Milestones (POAMs) as requiredUtilizes various databases such as XACTA IA Manager, XACTA 360, and eMASSBlue Canopy Group, LLC (Aug 2013  Jan 2017)Security Analyst/Information System Security OfficerResponsible for Certification and Accreditation of security systems and advancing them through the ICD 503 process achieving approval to operate (ATO).Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices outlined in the security plan.Develop and maintain security artifacts and ensure they are written and adhere to customer policies, procedures, techniques, and industry best practices (ICD 503)Monitor and maintain Configuration Management (CM) for security-related IS software, hardware, and firmwareSenior Information Assurance EngineerResponsible for the development, implementation and management of enterprise-wide IT Top Secret/SCI Information Systems. Ensured compliance with NIST, using various DNI/DoD/ICD 503 regulations.Participate on Integrated Product Teams to ensure system security control requirements are understood and integrated into the system.Lead system testing before granting approval to load to production environment through Security Testing and Evaluation (ST&E).General Dynamics, AIS. (Jun 2012  Aug 2013)Security Control Assessor (SCA)Responsible for assessing security controls for more than 80 NRO Assets. Coordinated and collaborated with primary stakeholders to include the Designated Authorizing Official (DAO), Program Security Officers (PSO), Information System Security Engineer (ISSE), and Information System Security Officer (ISSO) during assessment and authorization under ICD 503 RMF.Coordinated, tracked, and organized IA requirements and facilitates flow of required documentation for ICD 503 transition.Served as the security expert by articulating security policy and technical requirements for system design, development, and operations.Welkin, Assoc July 2011 (Aug 2011 - Jun 2012)Security SpecialistAdvised and assisted with getting COMM assets certified and accredited through the ICD 503 process. Acted as a liaison between the Program, PSOs, ISSEs, and ISSOs to complete all documentation required for system Approval to Operate (ATO).Review information system security artifacts for accuracy, relevance and compliance.Apply knowledge of National, DoD, AF, and local requirements for system assessments.United States Air Force (1989  2011)National Reconnaissance Office (Jan 2009 - Jul 2011)Program Security Officer (PSO)Logistics Facility Support Group (L&FSG) Manager with oversight of 15 military and contractor personnel including $20M in security assets.Project Manager for physical and technical security infrastructure projects supporting classified programs.National Reconnaissance Office (Sep 2007 - Dec 2008)Manager, Information Management & Technology ProgramLed IT Program ensuring 24/7 computer support to 22 military, 4 government civilians, and 45 contractor personnel.Directed and managed acquisitions, repair, operation, and upgrade of 150 IT systems and served custodian of all IT material.National Reconnaissance Office (Sep 2004 - Aug 2007)Manager, Information Systems CertificationProvided certification and accreditation assistance to Industrial Security Representative and contractors on Information System (IS) requirements.Led inspections at contractor facilities in accordance with established DCID 6/3 policies and implemented procedures, standards, and regulations governing the safeguarding of classified information.Reviewed, edited, and approved system security plans, CONOPS, Risk Management Matrix (RMM) and modifications to ensure compliance with DCID 6/3.National Reconnaissance Office (Oct 2002 - Aug 2004)Deputy Chief, Video Network OperationsManaged and accounted for over $55M in operational multimedia communications equipment that governed the global videoconferencing network and services.Air Force Studies & Analyses Agency (AFSAA), Rosslyn, VA(Apr 2001  Sep 2002)Managed Information Technology (IT) support to 200 DoD and contract research analysts who provided critical analytic support to the Secretary of the Air Force, AF Chief of Staff, Office of the Secretary of Defense, Joint Staff, Air Staff and Major Air Force Commands (MAJCOM).United States Air Force, Laughlin Air Force Base, TX (Jun 1999 - Mar 2001)Information Assurance ManagerManaged two military Communications-Computer Systems (C-CS) operators who isolated faults, determined causes, and recovered from malfunctions due to hardware, software and communications failures. Applied security techniques to preclude unauthorized access to sensitive information and misuse of automated resources.United States Air Force, Various Air Force Bases (Dec 1989 - Mar 1999)Logistics ManagerManaged the supply of logistics-related data to support customers in the day-to-day general areas of acquisitions, supply, configuration management, technical requirements identification, installation and maintenance of equipment, safety and documentation development and maintenance.

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise