Quantcast

Information Security Officer Resume Rose...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Information Security Officer
Target Location US-MD-Rosedale
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Information Security Officer Beltsville, MD

Information Systems Security Officer Upper Marlboro, MD

Information Systems Security Officer Chesapeake Beach, MD

Security Officer Information System Hyattsville, MD

Chief Information Security Officer Lorton, VA

Security Officer Information Systems Washington, DC

Security Officer Information Systems Washington, DC

Click here or scroll down to respond to this candidate
ABACandidate's Name
Rosedale, MD PHONE NUMBER AVAILABLE EMAIL AVAILABLEGRC ANALYSTAREAS OF ECAREER XPERTISEPROFILEExperienced in Governance, Risk, and Compliance (GRC). Passionate about crafting robustframeworks that protect organizations across various industries. I have a knack for spotting andneutralizing risks, ensuring that all operations comply with regulations while continually seekingways to improve. My days are filled with conducting thorough risk assessments, drafting policies,and overseeing internal audits to maintain regulatory integrity. Working closely with teams fromdifferent departments, I ensure that our GRC efforts are in line with our business goals, making ouroperations more efficient and secure. Keeping up with the ever-changing regulatory landscape iscrucial; it's like staying one step ahead in a strategic game. I aim to translate complex technicalrequirements into clear strategies that not only strengthen our cybersecurity but also keep uscompliant. Ultimately, I see my role as a guardian of our organization's resilience and growth,fostering collaboration across teams to safeguard our data and achieve our business objectives.Policy Development and Risk Assessment and Analysis Data Privacy Laws andImplementation Threat Intelligence and StandardsRegulatory Compliance Detection Compliance AutomationManagement Vulnerability Management Tools and SolutionsStrong knowledge of cloud Incident Response Planning Network Securityservices such as Amazon Web Business Impact Analysis Protocols and SystemsServices, Microsoft Azure Etc Security ArchitectureRegulatory UnderstandingFramework Adherence (ISO, (HIPAA, PCI DSS, SOX, etc.) DesignNIST, GDPR, Nessus, Qualys, Security OperationsCompliance Audits andetc.) Center (SOC) ProcessesAssessmentsBoard Reporting and Identity and AccessData Analysis and ReportingStakeholder Management Management (IAM)Compliance Monitoring andCybersecurity Governance Best Security Awareness andReportingPractices. TrainingRisk Communication andDocumentationPROFESSIONAL EXPERIENCEInformation Security Officer Apex Systems, Glen Allen, VAFeb 2021-PresentConduct regular risk assessments and vulnerability assessments.Develop and enforce comprehensive security policies and procedures.Create, submit, and manage Plans of Actions and Milestones (POA&Ms) for approval byCISO.Implemented a complex security protocol that improved data protection by 96%Managed and responded to security incidents and breaches.Monitoring and analysis of network traffic for unusual activity.Ensure compliance with industry standards and regulatory requirements.Lead and mentor a team of security professionals.Maintain and report on RMF processes using related toolsCollaborate with cross-functional teams to integrate security measures.Prepare detailed security reports for executive review.Continuous monitoring of Identity and Access Management (IAM) logs to detect unauthorizedaccess.Proficient in implementing RMF processes and compliance.Regular internal audit of third-party access and licenses to prevent data breachEnsure a successful security incident reduction by 94% through constant monitoring andresponse.Implementation of Key Performance Indicator (KPI) to monitor the organization s securitygrowth.GRC Analyst MyITAcademy Solutions, Austin, TXJan 2020 Jan 2021Contributed to the development and upkeep of Governance, Risk, and Compliance (GRC)frameworks, aimed at strengthening governance and risk management practices.Engaged in risk assessments to pinpoint potential threats and vulnerabilities within theorganization.Worked collaboratively with cross-functional teams to establish policies that adhere toregulatory standards.Assisted in overseeing compliance efforts and preparing detailed reports for seniormanagement review.Offered support and expertise on GRC issues to stakeholders across the organization.Spearheaded a team with a primary focus on risk mitigation and compliance adherence inthe development of a finance application.Integrated robust internal controls and data security measures to fortify the system againstpotential risks.Managed and executed controls within the finance application to ensure alignment withfinancial regulations and cybersecurity protocols.Emphasized proactive risk management and compliance oversight, ensuring acomprehensive approach to project governance.Cultivated a culture of risk awareness and proactive mitigation strategies among teammembers.Deputy Sheriff Harford County Sheriff's OfficeJune 2017- Dec 2019Developed and implemented security protocols using advanced surveillance and monitoringtechnologies to prevent disturbances, assaults, and escapes, ensuring compliance withregulations.Oversaw the daily activities of inmates through electronic tracking systems, ensuringadherence to all rules, policies, and standards.Implemented and monitored risk management strategies using data analytics and digitaltools, maintaining detailed logs for audit purposes and ensuring the safety and security ofthe facility.Conducted regular audits and inspections with digital checklists and reporting tools toidentify and mitigate potential security threats, including contraband and unsanitaryconditions.Managed critical incidents by subduing and restraining inmates during fights, riots, andescape attempts, following established governance procedures and compliance regulations.Report on inmate conduct, ensuring alignment with reporting standards and governancerequirements for accurate documentation.Applied use-of-force policies and governance standards when restraining inmates, ensuringcompliance with all regulatory requirements.Supported inmate rehabilitation and counseling, aligning efforts with compliance programsand risk management frameworks.Inspected mail and visitors for prohibited items, following stringent compliance guidelinesand security protocols.Author incident reports and daily activity logs, ensuring accurate, compliant documentationthat meets governance standards.Regularly inspect cells for unsanitary conditions, contraband, and potential securitybreaches, adhering to risk management practices and compliance requirements.Operated manual and electronic locking systems, ensuring they meet security standards andgovernance policies.EDUCATIONBACHELOR OF SCIENCE in BUSINESS ADMINISTRATION UNIVERSITY OF LAGOS- LAGOS, NGDIPLOMA in DESKTOP PUBLISHING COMPACT TECHNOLOGIES INSTITUTE OF COMPUTER STUDIES- LAGOS, NGHIGHSCHOOL DIPLOMA IN BUSINESS RAYMOND PRIVATE SECONDARY SCHOOL - LAGOS, NGTRAINING AND CERTIFICATIONSCertified in CybersecurityCompTIA Security+Certified in CJISMPCTC

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise