| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Owings Mills, Maryland Street Address PHONE NUMBER AVAILABLE EMAIL AVAILABLENetwork Security / Information AssuranceResults-oriented Network Security / Information Assurance Professional with 20+ years of progressive experience providing support and leadership while managing the inter-relationship between various departments within highly complex organizational structures. Superior record of optimizing small to large scale, mission critical projects on time while exceeding quality assurance expectations. Recognized as a trusted, logistical, resource with a history of making key decisions regarding projects, teams, and application support functions. Experienced in the strategic detail planning, execution, and leadership of enterprise-wide cybersecurity initiatives, which support business goals, deliver continuous improvement, and enhance productivity levels.AREAS OF EXPERTISENetwork Security Cyber Security Threat Management Threat Modeling Attack Lifecycle Threat Detection Adversary AnalysisSystems Management Intelligence Analysis Operational Security Threat Research Briefing Threat AssessmentDIACAP & RMF A&A Testing Commutations Security Material CSM Public Key Infrastructure (PKI)Data Transfer Systems Design Computer Installation / Testing Budgeting / AllocationsTeam Building & Training SQL & Action Queries in Access 2010 eMASSKEY PROPOSITIONAchieved organizational development by implementing superior systems management, resulting in uncompromised security, and exceeding goals and objectives consistently.Possess United States Top Secret Security Sensitive Compartmented Information (SCI) clearance, demonstrating a results-driven approach and military professionalism.Successfully managed the conversion of information from DIACAP (DoD Information Assurance Certification and Accreditation Process) to RMF (Risk Management Framework), showcasing strong organizational and detail-oriented skills.CAREER HIGHLIGHTSIntermediate Information Security Specialist (PENTAGON) CHENEGA September 2023 April 2024Established information security technology disciplines and practices to ensure the confidentiality, integrity, and availability of corporate information assets by established standards and procedures.Key Initiatives:Developed and maintained a knowledge of changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards and ensure compliance throughout the organization.Provided technical support to Army Intelligence Enterprise, by identifying CS requirements and specifications following Intelligence Community Directives and Standards, participating in staff assistance visits for data gathering, performing technical analysis.Managed and reviewed RMF security packages, identify salient security issues, make the determination as to whether an agency system meets the appropriate Intelligence Community Directive (ICD) 503 information security requirements for that system.Investigated and analyze all response activities related to cyber security incidents within the network environment or enclave; serve as action officer coordinating cyber security sanitization and reporting; perform incident triage to include determining scope, urgency, and potential impact.Information Security Specialist (NRO) ALKU Admin April 2023 - June 2023Implemented a cybersecurity framework consisting of best practices, policies, tools, and security protocols to ensure the protection of organizational data and business operations.Key Initiatives:Developed controls to safeguard against potential vulnerabilities and attacks, effectively mitigating security threats.Utilized intrusion detection software, such as security information and event management (SIEM) products, intrusion detection systems (IDS), and intrusion prevention systems (IPS), to monitor network activity and identify suspicious behavior.Managed / maintained proficiency in MacOS, Windows, Linux, and their respective command-line interfaces to effectively analyze and address security threats on all operating systems.Demonstrated expertise in incident handling, including familiarity with NRO organization's incident response plan, digital forensics, and malware analysis.IT FISMA Audit (Justice Department) Systems Integrations Partners, LLC October 2022 January 2023Demonstrated proficiency as a Security IT Audit Specialist with a strong background in delivering both application and network security solutions. Delivered a deep understanding of Cybersecurity and financial audit practices, gained through experience as an integral member of a highly productive team of seasoned technical professionals.Key Initiatives:Designed, developed, led, and implemented secure application and infrastructure capabilities for a diverse range of legacy and modernized systems and applications.Supported the development of engineering artifacts capturing system security requirements, application and network security design, and network security architecture.Ensured timely, secure, compliant, and cost-effective completion of all assigned work activities while maintaining the highest quality of performance.Coordinated cybersecurity efforts/initiatives with appropriate Department of Justice and service-level committees/panels/working groups and evaluated technologies from Service laboratories.Information Assurance Analyst (PENTAGON) Cydecor March 2020 - October 2022Implemented risk management framework (RMF) for Assessment and Authorization (A&A) in accordance with Intelligence Community Directive (ICD) 503 and Naval Intelligence Activity (NIA) RMF. Reviewed and commented on system security documentation, attended meetings and briefs, and ensured compliance with national intelligence information guidelines.Key Initiatives:Developed N2N6T1 policy direction for control, administration, and management of systems processing certain national intelligence information. Liaised with NIA and other IC Element organizations to review, track and respond to IA related issues, concerns, and tasks.Conducted thorough analysis of cybersecurity risks to identify vulnerabilities and provide recommendations for mitigation.Participated in security assessments, vulnerability scans, and penetration testing to ensure security compliance.Page 1 of 4CAREER HIGHLIGHTS CONTINUEDInformation Assurance Analyst (PENTAGON) Cydecor March 2020 - October 2022Supported assessment of emerging systems security requirements for processing national intelligence information which consists of continual awareness and review of draft ODNI, Navy IC, and DOD policies. Conducted extensive research on Information Security (INFOSEC) matters, leveraging experience coordinating information assurance efforts and initiatives with DOD, IC, and Service-level committees/panels/working groups.Key Initiatives:Evaluated technologies from Service laboratories, DOD agencies, government initiatives, and commercial industry to identify and address capability-related gaps within policies.Maintained all phases of the integrated DOD acquisition, technology, and logistics life cycle management processes, encompassing a broad range of acquisition management activities.Assisted in the development of OPNAV N2N6T1 policy direction for control, administration, and management of the Navy IC Computer Network Defense (CND) program and associated cybersecurity initiatives.Liaised with IC and other organizations in support of OPNAV N2N6T1 by reviewing, tracking, and responding to cybersecurity-related issues, concerns, and/or tasks.Conducted assessments and monitoring of cybersecurity capabilities, including boundary protection, intrusion detection systems, and intrusion prevention systems.Security Control Authority (FEMA) Chronos Inc. November 2019 March 2020Conducted thorough assessments of information systems based on the Risk Management Framework (RMF). Evaluated authorization packages and provided comprehensive recommendations for approval. Analyzed IT threats and vulnerabilities to determine the necessity of additional safeguards.Key Initiatives:Advised the Information System Security Officer (ISSO) on the impact levels for Confidentiality, Integrity, and Availability (CIA) of information within a system.Reviewed and approved Security Control Assessment Procedures, Security Assessment Plans, and Security Control Traceability Matrix.Managed configuration of a central repository for authorization documentation, promoting efficient record-keeping.Compiled the Body of Evidence, including security control allocations, test results, Security Assessment Reports (SARs), Plan of Action and Milestones (POA&M), risk acceptance recommendations, and mitigation strategies.Conducted vulnerability and compliance scans utilizing approved enterprise scan solutions, such as Nessus, to ensure status validation.Countermeasure Officer / Countermeasure Analyst (Fort Meade) Insight Global April 2018 May 2019Provided technical oversight and support to all TA laboratories that supported the DOD, ensuring compliance with government requirements. Demonstrated exceptional multitasking and self-directed work, both independently and as part of a team, with minimal supervision. Conducted extensive research to verify solutions and prepare TA validation reports, providing guidance and direction to TAlabs and DoD Components on proper TAS implementation.Key Initiatives:Offered expertise in interpreting and guiding policy documentation for specific evaluations and conducting peer reviews of new implementation documentation.Facilitated meetings to manage and approve changes to the USCYBERCOM TA methodologies.Efficiently handled research inquiries and provided clarification regarding the interpretation of the TA Policy Documents and its relation to the USCYBERCOM TA Component.Developed a classified PowerPoint presentation for civilian and senior military personnel and maintained an Excel spreadsheet to track numbers and manipulate data for specific projects.Successfully recertified a classified network and worked extensively with NIST 800 series, particularly 800-53 and FIPS.Senior Information Security Officer (ISSO) (US Justice Department), ManTech Inc., Washington D.C. January 2016 - January 2018Conducted ongoing research on Federal legislation, regulations, policies, and practices to maintain an up-to-date knowledge of information systems security. Utilized industry-standard methodologies and best practices to evaluate the status of Federal Information Systems Security initiatives relevant to the Department of Justice.Key Initiatives:Provided recommendations to senior management regarding policies and courses of action to ensure the achievement of organizational goals while maintaining high levels of security.Implemented automation security programs through the development and dissemination of notices, policies, procedures, training and awareness programs, and customer surveys.Obtained information from DIACAP and enter in RMF in an efforted to conduct business with DoD and other Federal Agencies.Identified and developed security plans for sensitive systems and associated risks.Page 2 of 4CAREER HIGHLIGHTS CONTINUEDInformation Assurance Oversight SME / IS Officer (ISSO) US Cyber Command, CRGT Inc. July 2013 - December 2015Provided technical oversight and support to all TA laboratories that supported the DOD, ensuring compliance with government requirements.Demonstrated proficiency in multitasking and working independently or in a team with little to no supervision.Key Initiatives:Conducted extensive research to verify solutions that met government regulations and prepared TA validation reports to guide and direct the TA laboratories and DOD components on the proper implementation of the TAS.Offered interpretation and guidance on policy documentation for specific evaluations and conducted peer reviews of new implementation documentation, resulting in improved compliance with USCYBERCOM TA methodologies.Facilitated meetings to manage and approve changes to the USCYBERCOM TA methodologies, ensuring that the new policies were effectively communicated to all stakeholders.Responded to queries regarding interpretation of the TA Policy Documents and their application to the USCYBERCOM TA Component, providing valuable insights to key stakeholders.Information Assurance Specialist, United States Cyber Command (USCC), The Expert Inc., Linthicum, MD July 2011 June 2013Developed and tracked operational requirements for computer network defense (CND) tools and solutions, specifically in the areas of Situational Awareness and Incident Management. Configured and maintained Network Configuration and Security, Fault Tolerance, Discovery, PKI, and CND standards and strategies.Key Initiatives:Acted as the department's primary liaison with DOD/CIO/NNI and DISA for issues, policies, and implementation of IT Security policies.Briefed senior military and civilian personnel on current network threats, demonstrating strong communication skills.Conducted requirements analysis and performed verification and validation testing for IA and computer network defense tools and solutions.Exhibited extensive experience in utilizing Vulnerability Management System (VMS), Joint Incident Management System (JIMS), Joint CERT Database (JCD), Joint Indicators Database (JID), and Assured Compliance Assessment Solution (ACAS).IS Specialist / Information Security Specialist, Tech USA Government Solutions, Fort Meade, MD February 2010 June 2011Utilized comprehensive knowledge of government and business network security practices and procedures to effectively perform job duties. Conducted real-time analysis of theater IA-CND data from DISA Command Center and DISA Support Element on a regular basis in the DISA Field Office USCyber Command.Key Initiatives:Monitored DISA-wide systems and networks to identify computer incidents, perform threat analysis, provide proactive response, IA analysis, IA reporting, and IA response to the DISN and GIG users.Coordinated real-time response to security incidents that impacted the military domain and provided an effective course of action to mitigate the risk while limiting the impact on the customer.Demonstrated hands-on experience with security standards, policies, procedures, C&A, and IA risk assessments.Possessed expertise in VMS compliance and reporting, Retina REM Scanning, and Hercules Remediation tool.Senior Information System Security Officer Szanca Solutions, Annapolis Junction, MD October 2007 January 2010Spearheaded the oversight of systems, implementing scans, patches, and relevant software and hardware changes for optimal cybersecurity measures. Maintained security protocols through meticulous documentation and data storage in the computer system database, including SRTMS, COOP, Contingency Plans, POA&M, audits, and security finding mitigations.Key Initiatives:Played an essential role as a team member, providing technical, operational, and training support to personal computer users while skillfully producing reports and databases for weekly meetings.Assisted with the design and coordination of personal computer support systems, installed and tested computers and printers, configured operating systems, and shrink-wrapped programs and applications software.Led technical and operational support to Joint Worldwide Intelligence Communications Systems (JWICS).Conducted hardware diagnostics and provided customized solutions, coordinating repairs, and exhibiting expertise.Senior IT Helpdesk / Administrator BancTec/Toyota Financial Services, Owings Mills, MD September 2006 October 2007Increased business development by managing daily operations, administration, and maintenance of 500 CPUs; reloaded operating systems and supervised weekly system backups. Proficiently constructed, analyzed, and maintained reports; wrote 15+ technical reports utilizing controls for receipt and distribution.Page 3 of 4CAREER HIGHLIGHTS CONTINUEDSenior IT Helpdesk / Administrator BancTec/Toyota Financial Services, Owings Mills, MD September 2006 October 2007Key Initiatives:Managed daily operations, administration, and maintenance of 500 CPUs to increase business development.Reloaded operating systems and supervised weekly system backups to ensure system reliability.Constructed, analyzed, and maintained reports with proficiency and wrote 15+ technical reports utilizing controls for receipt and distribution.Participated in weekly policy meetings, encouraging exchange of information and training development.Conducted in-house training on computer use and on the job security.Additional Notable Experience: Naval Information Systems Security Officer (ISSO) & Information Security Specialist, Retired.United States Navy Petty Officer First Class (E-6).TECHNICAL SNAPSHOTOperating Systems: Windows, Windows 8/Windows 10 Communications Systems: Microsoft Access, Microsoft Access 2002, Windows 2000 and Windows XP Professional, Computer Basic, Computer Forensic, Dell Portables-XPS M1330 Certified, and Business Writing LAN/WAN installation and repair, and Network Security Software: Nessus, WebInspect, Microsoft Office, Word Perfect, Lotus Notes, CISCO Net Ranger, Work Centre Supervision, Microsoft Security, Microsoft Windows Vista Desktop Administration, Symantec Ghost, Millennium, Security Scanner, and Remedy, ESOC, Risk Vision Intrusion Detection System platforms: RealSecure, NetRanger, Snort and Tripwire, Sun StorEdge L700e server, ARTS ticketing system and DOC logging system, Vulnerability Analysis and Assistance ProgramProficient with Fiber Optic, Cat 5, and Cat 6 CableEDUCATIONMaster of Information TechnologyBachelor of Science in Computers Security with a Concentration in Information Systems SecurityAssociate of Arts in Information Technology / NetworkingCertificate of Criminal Justice, Catonsville Community College, Catonsville, MDUnited States Top Secret Sensitive Compartmented Information (SCI) National Security Agency (NSA)CERTIFICATIONSSecurity + Microsoft Security CISO Security Computer Hardware Technician Microsoft Windows Vista Desktop AdministrationInformation System Security Professional (CISSP) (Training) Up and Running with VISO 2013 Excel 2010 Essential TrainingWindows Version 10 VISO 2010 Essential Training Excel 2010 Essential Training / SQL Essential TrainingPage 4 of 4 |