Quantcast

It Security System Resume Reston, VA
Resumes | Register

Candidate Information
Name Available: Register for Free
Title It Security System
Target Location US-VA-Reston
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

System Security Cyber Ashburn, VA

System Security Cyber Bowie, MD

Information System Security Officer Waldorf, MD

Security Engineer System Hyattsville, MD

System Security Computer Science Hagerstown, MD

Security Officer Information System Hyattsville, MD

System Security Controls Hagerstown, MD

Click here or scroll down to respond to this candidate
Candidate's Name
Stafford Virginia Street Address
Email: EMAIL AVAILABLE PHONE NUMBER AVAILABLECLEARANCE LEVEL: SECRET. WORK AUTHORIZATION: US CITIZEN OBJECTIVE:A self-motivated and passionate analytic person with excellent communication skills who combines professional and interpersonal skills to accomplish the mission, vision, and goal of an organization. Ability to motivate, lead, and work with a team in IT Security. Seeking to utilize background and experience within a progressive and responsible position, attention to detail, and passion for excellence to enhance the confidentiality, Integrity, and availability of the information system.10 + years of IT Security experienceQualifications Summary and Technical ExperienceReview the System Security Plan (SSP) using NIST SP 800-18 as a guideParticipated in the FIPS 199 process in which Security Categorization takes place, and selected the Technical, Operational, and Managerial Controls using NIST SP 800-60 guidelines.Reviewed E-Authorization document using NIST 800-37 as a guideAbility to develop POA&M (Plan of Action & Milestones) document to take corrective actions resulting from ST&E (System Test & Evaluation)Data Loss Prevention (DLP) Event Handling.Cybersecurity-related governance, risk & compliance.Reviewed and updated Risk Assessment (RA) using NIST SP 800-30 guidelines.Understanding of IT Security Compliance work, including demonstrated experience documenting/reviewing policy, Plan and Procedures, and IT Security artifacts following NIST.Review and assist in eMass and Networking.Professional knowledge in supporting and guiding System owners through the NIST Risk Management Framework & Systems Assessment and Authorization processes.Led change management activitiesProfessional ExperienceInformation Security Analyst,August 2023 to date:SECURITAS CRITICAL INFRASTRUCTURE SERVICES, INC.Provides first contact and incident resolution to customers with hardware, software, and application problems. Includes both customer telephone support as well as electronically submitted requests.Perform systems administration of desktop systems connected to local and wide area networks. Provide desktop system management/maintenance responsibilities involving account monitoring, account creation, security, Operating System (OS) installation, and other local area system administration-related functions.Monitor systems/networks in real-time NOSC environment and initiate fix actions or problem escalation to Tier II/Tier III admins.Provide support for implementation, troubleshooting, and maintenance of IT systems.Manage IT system infrastructure and any processes related to these systems.Provide support to IT systems including day-to-day operations, monitoring, and problem resolution for all theclient/server/storage/network/print devices, and mobile devices.Provide polite and friendly customer service.Attempts to resolve as many incidents as possible during the first contact, or at Tier I/II. Efficiently escalates incidents to Tier III when required.Documents incident status and solutions in incident database tools.Possesses current working knowledge of computers, printers, laptops, and common Windows applications.Work through various types of Tiers I issues with telephone assist.Provides answers to Frequently Asked Questions or solutions to common problems as part of a customer self-help capability. Possesses comprehensive knowledge of the principles, methods, and techniques used in computer troubleshooting and support.Possesses comprehensive knowledge of desktop operating systems and applications.Responsible for implementing and enforcing an Information Assurance (IA). Data Loss Prevention (DLP) Event HandlingCybersecurity-related governance, risk & complianceEnsured all systems and applications were certified and accredited and that RMF packages were processed, reported, and coordinated in a timely fashion with the organization.Assisted subordinate IAMs in creating RMF artifacts and Plans of Action and Milestones (POA&Ms).Ensured POA&M mitigations and timelines were adhered to and documented any changes that occurred.Applied mastery of IT system security principles, concepts, and methods, including state-of-the-art and emerging techniques and products, to recommend appropriate technical strategies to resolve. complex and persistent IT security challenges.Reviewed the status of Information Systems for modifications and assessed the impact on current system accreditation.Validated system requirements, security policies and procedures, contingency plans, incident response plans, personnel security, access control mechanisms, and identification and authentication. mechanisms.Performed technical assessments to ensure the system or application proposed for accreditation or connection met the classification and sensitivity levels of the systems and applicable policies, regulations, and standards.Ensured the implemented security safeguards were adequate to assure the integrity, availability, and confidentiality of the information being processed, transmitted, or stored consistent with the level of sensitivity of that information.Ensured system POA&M mitigations and timelines were adhered to and documented all changes that occurred.Responsible for 4 accredited systems and ensuring that system.Security postures.Work with business process owners to ensure timely identification. And remediation of jointly owned risk-related issues and action plans.Perform comprehensive Security Controls Assessment (SCA) and write. reviews of management, operational, and technical security controls for audited applications and information systems.Manually reviewed logs and provided documentation guidelines to business process owners and managementContribute to initiating FISMA metrics such as Annual Testing, POA&M Management, and Program Management.Cyber security SpecialistFebruary 2015 -September 2021Brians House INC: Cyber security Specialist, under the chief information security officer(CISO).Skills & Tasks My key responsibilities as a Cyber Security SpecialistScorecard MetricsUpdating all components on SharePoint and Splunk.Cybersecurity-related governance, risk & complianceAssist with the preparation and maintenance of documentation.Data Loss Prevention (DLP) Event HandlingTECHNICAL SKILLAssist with the CM for information system security software, hardware, and firmware.Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. including system upgrades.Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies.Develop and maintain documentation for C&A by ODNI and DoD policies Provide CM for security-relevant information system software, hardware, and firmware (U) Develop system security policy and ensure compliance Evaluate security solutions to ensure they meet security requirements forprocessing classified informationMaintain operational security posture for an information system or program Provide support to the Information System Security Manager (ISSM) for Maintaining the appropriate operational IA posture for a system program, or enclave.Develop and update the system security plan and other IA documentation. Assist with security aspects of the information system and perform day-to-day security operations.Schedule automation accounts of Cloud-hosted environments from Azure Portal, ticket generation to Microsoft.Good knowledge of cloud computing and basic knowledge of Azure and other cloud service providers.Developed an IT Strategy including implementation of a $3M IT program including an ERP and document management platform.My tech experience includes MS SQL Server, IIS, and Cloud computing technologies like AWS, Azure, Kubernetes, etc.Working on AWS Cloud computing, designing and implementing new APIs, and enabling new integrations to automate tasks.Analysis, design, and implementation of cloud computing solutions in the SFDC. Key DutyConduct access control verification and secure highly classified information.Verify and grant access of cleared individuals to sensitive compartmented information.Reviewed the status of Information Systems for modifications and assessed the impact on current system accreditation.Validated system requirements, security policies and procedures, contingency plans, incident response plans, personnel security,access control mechanisms, and identification and authentication. mechanisms.Performed technical assessments to ensure the system or application proposed for accreditation or connection met theclassification and sensitivity levels of the systems and applicable policies, regulations, and standards.Ensured the implemented security safeguards were adequate to assure the integrity, availability, and confidentiality of the information being processed, transmitted, or stored consistent withthe level of sensitivity of that information.Work with a team of information security professionals to conduct Security Authorization packages based on NIST standards forgeneral support systems and major applications.Provide security support to government and contractor personnel Provide input to management on appropriate FIPS 199 impactslevel designations and identify appropriate security controls. on the characterization of the general support system or major applications Work in the command center as a part of the special operations unit, developing knowledge and experience with Google Drive, and utilizing SharePoint for document management and storage systemWork with the Certification and Accreditation team to conduct risk assessment; updated System Security Plan (SSP), contingency plan (CP), Privacy Impact Assessment (PIA), and Plan of Action and Milestones(POA&M)Update Plan of Action & Milestones (POA&M) and Risk Assessment based on findings assessed through monthly updates.Conduct an assessment of controls on Information Systems by interviewing, examining, and testing methods using NIST SP 800-53A as a guide.Create, update, and review System Security Plans using NIST 800-18, Contingency Plans using NIST 800-34, NIST 800-30, and Incident Reports using NIST 800-61.Front Desk Technician.January 2010 to May 2013Marie Stops Sierra LeoneFreetown Sierra LeoneSkills & TasksMy key responsibilities as Cyber Security AnalystData Loss Prevention (DLP) Event HandlingCybersecurity-related governance, risk & complianceAssist with the preparation and maintenance of documentation.Assist in the evaluation of security solutions to ensure they meet security. requirements for processing classified informationAssist with the CM for information system security software, hardware, and firmwareMaintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. including system upgrades.Propose, coordinate, implement, and enforce information systems security. policies, standards, and methodologiesDevelop and maintain documentation for C & A in ODNI and DoD policiesProvide CM for security-relevant information system software, hardware, and firmware (U) Develop system security policy and ensure compliance.Evaluate security solutions to ensure they meet security requirements for processing classified informationMaintain operational security posture for an information system or program.Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclaveDevelop and update the system security plan and other IA documentation. Assist with the management of security aspects of the information system and perform day-to-day security operations of theProviding Risk assessment, RMF Accreditation, Vulnerability Management, and Security Analysis support for various MCEN systems and network devices.Working with Tanium and McAfee tools for endpoint security protectionSupporting HBSS Administration for their HBSS instanceSupporting IAVAs and POAMsHelp Desk TechnicianJanuary 2007 to January 2010National Electoral CommissionFreetown Sierra LeoneAnswer employees and provide technical support and troubleshooting for desktop, laptop, and tablet systems hardware and software, network, printers, phones, and mobile devices. Assist with the installation, configuration, and deployment of software on new desktops, laptops, and tablets.Read technical manuals, confer with users, and conduct computer diagnostics to investigate and resolve problems, when needed, in providing technical assistance and support.Document service requests, issues, and resolutions in the corporate ticketing system. Provide on-site support for those in the local office and remote support for those outside the building.Assist with maintenance, configuration, and management of user accounts.Track/monitor system performance and activity.Perform software installation and upgrades.EDUCATION CERTIFICATIONS:2002=2003 Institute of Commercial Management (ICM) England. Advanced Diploma in Business Law, International Business Communications, and Business Administration.CERTIFICATIONCompTIA CASP +CISM CERTIFIEDTechnical Skill:Software: MS Office (Word, Excel, Outlook, Access, PowerPoint)Great communication skills between my superiors and subordinates. Microsoft Word, Excel, and PowerPointSecurity Technologies: Network Security Scanner; Nessus Security Center, IDS/IPS; Log Management, Anti-Virus Tools, McAfee, DLP, Cisco Privileged Access Management(PAM) Application Security Management (ASM) PCI/DSSOperating Systems: Unix-Based Systems (Splunk Solaris, Linux); Windows (all) Networking: LANs, VPNs, Routers, Firewalls, TCP/IPTicket Systems: JIRA and Remedy (BMC)Solar WindsREFERENCES: Available upon request

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise