Quantcast

Security Officer Information Systems Res...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Security Officer Information Systems
Target Location US-DC-Washington
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes
Click here or scroll down to respond to this candidate
Candidate's Name
EMAIL AVAILABLEWashington, DCPhone: PHONE NUMBER AVAILABLEProfessional SummaryA skilled government ISSO (Information System Security Officer) with over 6 years of experience supporting federal agencies in information assurance. Displays a strong background in the NIST Cybersecurity Risk Management Framework (RMF), Vulnerability Management, Plans of Action and Milestones, SOP development, and effective communication with the client, colleagues, and stakeholders.Possess an active Top-Secret clearance.EducationB.A.  Criminology, Virginia Union UniversityCompTIA Security+Experience & SkillsXACTACSAMJIRANIST 800-53SplunkServiceNowPower BINessusSQL DatabaseSharePointMS Excel, Word & PowerPointRelevant ExperiencePlanet Technologies/U.S. Department of JusticeInformation System Security OfficerJanuary 2022- PresentDevelop and manage RMF for on-premises and cloud environments in the XACTA GRC tool to achieve AO, ADD utilizing the RMF package approval chain process.Support cloud environments for infrastructure as code, PaaS, IaaS and SaaSTracks organizational cybersecurity compliance, ensures necessary remediation needs.Ensure necessary cybersecurity documentation is accurate and in order.Conduct comprehensive assessments of the management, operational, and technical security controls employed within or inherited by information systems to determine the overall effectiveness of the controls.Respond to cyber events and incidents from discovery to closure as a part of the local incident response policies.Review network architecture diagrams for cybersecurity compliance.Assess and authorize use of software and hardware across multiple enterprise networks.Global Intellectual Solutions/U.S. Department of JusticeInformation System Security OfficerJanuary 2020- January 2022Conduct security awareness training for users of multiple federal information systemsCategorize information systems through meetings held with stakeholders and system owner utilizing FIPS 199 and NIST 800-60 Vol. IIClosed out two high level POA&Ms in under a one-month timeframe.Work directly with ISSM in creation of SOPs dealing with cybersecurity measures and practices conducted within the organization.Responsible for upkeeping and continuously monitoring 4 federal information systems.Develop System Security Plans (SSPs) utilizing NIST 800-53 and NIST 800-18Review System Design Documents and network diagrams to ensure they meet organizational compliance requirements.Present to government leads weekly on the security status of information systems.Conduct meetings with the IT team to gather documentation and evidence about their control environment.Work with system owners to ensure timely identification and remediation of jointly owned risk related issues and action plans.Implement agency policies and procedures to ensure that federal systems are FISMA compliant.Work with SCAs (Security Control Assessor Team) to ensure that implementation statements are accurate in system SSPs.Inter-con Security/US Department of StateJunior Information System Security OfficerMay 2016-January 2020Ensured POA&M mitigations and timelines were adhered to and documented any changes that occurred.Reviewed technical and administrative controls and conducted RMF per NIST 800-60, 800-53, NIST 800-57 and FIPS 199.Evaluated security vulnerabilities, developed mitigation strategies, and implemented remediation.Tracked POA&Ms for several information systems and briefed senior personnel on remediation efforts and trackingConducted administrative tasks for senior managementAnalyzed the creation of cybersecurity documentation, including security policies, procedures, and plans.Worked with ISSEs in monitoring network traffic coming through information systemsAssisted ISSOs and ISSM in creating Contingency Plans

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise