| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidate260 Eagles View Dr, Texas, Ennis PHONE NUMBER AVAILABLE EMAIL AVAILABLECandidate's Name
Computer Information System ManagerExperienced Risk Management Framework Auditor with over 10 years of full lifecycle IT and IS experience in world-class, fast-paced, and deadline-driven environments. A dynamic and mission-focused leader, skilled in managing teams on mission-critical, enterprise-level challenges to deliver solutions and results on time. Known for driving improvements in efficiency and cost avoidance through innovative strategies and optimizing processes. Strong communicator and resourceful in finding solutions to complex problems.EMPLOYMENT HISTORYInformation System Security Manager; ISSMCAE, Arlington, TX Feb 2023 Present: Full-timeServe as the ISSM for F-16 Flight Simulator-Oversaw multi-million-dollar simulator project in 11 different locations: CONUS and OCONUSIntegrate the Classied Cyber Security Program function with the Program Management leadership teamWork with offsite program personnel to ensure project meets USG certication requirementsAct as the liaison with various government Authorizing Ofcials (AO) for business within their area of responsibilityComply with the Joint Special Access Program Implementation Guide (JSIG) in determining technical Information Assurance (IA)Conduct cyber risk assessment activities including vulnerability analysis and analysis of mitigation solutionsEnsure proper security implementation of the Risk Management Framework (RMF)Follow system documentation for information system authorization, security management, and continuous monitoringCoordinate and drive continuous monitoring activities in accordance with DoD requirementsMonitor security infrastructure and security alarm devices for Indicators of Compromise (IOC) utilizing SIEM and cybersecurity toolsetsPerform hardware/software conguration managementCoordinate with cyber systems security engineers, system architects, and developers to provide oversight in the development of secure technical solutionsParticipate in the implementation of current and future security domains and architectures including those which may introduce new service areasImplement and maintain a comprehensive incident response plan to ensure the rapid detection, containment, and eradication of cyber threats and vulnerabilities.ECS TechnologiesRemote Feb, 2020 - Jan, 2023: Full-timeEnsure that every step of the software development lifecycle (SDLC) follows customer policies and security best practices.Ensure developers/system owners adhere to secure coding principles.Aids in testing the application against security risks/parameters.Ensures developers/system owners adhere to customers processes and procedures established for scanning using defined security tools.Ensures developers/system owners applied and followed remediation procedures for identified vulnerabilities and produce required artifacts (POA&M, scans results, Exception documentation, etc.)Utilizes SNOW, Fortify and Jira tools to track progress and performance.Reviews results of Static Code Analysis tool (Fortify) to whether recommend exceptions.Superintendent, 42 Cyber Operation Squadron CMSgtUnited States Air Force, Scott AFB, Il Aug, 2016 - Jan, 2020: Full-timeEstablished: Air Force Reserve Commands (AFRC) rst and only Cyber Operations Squadron. (2016)Earned industry certications: Certied Information Security Manager Certication.Hand Selected to oversee development of three new critical information security platforms for United States Air Force Reserve Command - standardized and instituted best practice security, audit, and compliance solutions to attain full regulatory compliance and maximize total operational security.Superintendent, 426 Network Warfare Squadron CMSgtUnited States Air Force, Lackland AFB, Texas Aug, 2013 Aug, 2016: Full-timeEstablished: Air Force Reserve Commands (AFRC) rst and only Network Warfare Squadron. (2013)Earned industry certications: COMTIA Security Plus; Green Belt/Six Sigma Trained; Air Force Management CerticationResearched, developed, maintained, and documented hardware architectures requirementsDeveloped software verification plans, testing procedures and testing environments for annual auditsLed a team identifying applications design flaws, improving a total of 15 applications that supported the Operation and Risk departments.EDUCATIONMaster's DegreeMaster of Science Information Technology ManagementTrident University, Cypress, CA United States Jun, 2016Master's DegreeMaster of Science Human Resource ManagementTrident University, Cypress, CA United States Aug, 2014Bachelor's DegreeBachelor of Science Human ResourceAshford University, Clinton, IA United States Jan, 2013SKILLSCISM SEC+MSITM Risk Management FrameworkMonitoring Tools Compliance ProgramsInfrastructure Management NIST 800 seriesJSIG EMASSREFERENCESAaron RoyLead Validator (ECS Technologies)EMAIL AVAILABLE PHONE NUMBER AVAILABLEMichael (Kole) JimenezCyber System Operator (1B4XX)EMAIL AVAILABLE PHONE NUMBER AVAILABLERoss Rea, Major USAF42 Cyberspace Operation SquadronEMAIL AVAILABLE PHONE NUMBER AVAILABLEJoseph D. HenryDHS - Cyber Security AdvisorEMAIL AVAILABLE PHONE NUMBER AVAILABLE/pre> |