Quantcast

Information Security Risk Management Res...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Information Security Risk Management
Target Location US-MD-Silver Spring
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Risk Management Information Security Washington, DC

Information Security Risk Management Damascus, MD

Information Security Risk Management Pikesville, MD

Information Security Risk Management Waldorf, MD

Information Security Risk Management Baltimore, MD

Risk Management Information Security Elkridge, MD

Information Security Risk Management Herndon, VA

Candidate's Name Silver Spring, MDEMAIL AVAILABLEPHONE NUMBER AVAILABLEPerformance-driven Cybersecurity professional offering ten years of experience, leveraging expertise in information security and cloud security. Experience in developing project plans and implementing solutions with concise results. An industry leader in risk management with focused results and insights on industry issues and trendsWork ExperienceCybersecurity LeadDLH-Bethesda, MDAugust 2023 to Present Lead for Cloud Services Cybersecurity support NIH, leading a team of Security Engineers providing security oversight for enterprise-wide risks and initiatives impacting all aspects of operations. Coordinate with stakeholders to establish project security plan requirements, identify security vulnerabilities, create project plans, and advise on necessary environmental changes to fortify the on- prem network, and cloud structures(including AWS, Azure, GCP, and GitHub). Conduct security analysis to determine security gaps and provide solutions to mitigate risks and protect data. Coordinated, implemented, and managed monitoring tools including Splunk and Science Logic, ensuring integration into ServiceNow and communication with core service areas. Lead and advise on projects including incorporating a TIC 3.0 dataflow model for both AWS and Azure, improvements to CI/CD pipeline, infrastructure as code security, vulnerability management, system ATOs, Incident response, log management, contingency planning, disaster recovery, etc. Evaluate and incorporate security products, services, and procedures best suited to meet NIHs current footprint, and future endeavors including emerging technologies such as Artificial Intelligence. Create, review, and revise documentation and policies in compliance with NIST, FedRAMP, and NIH compliance requirements. Provide coaching and mentoring to employees, review individual development plans, and guide continued professional growth that reinforces competitive advantage. Conduct the review of cybersecurity controls, ensuring controls meet or exceed protection requirements by testing controls effectiveness through various testing methods. Create procedures to meet critical process improvement benchmarks that satisfy A&A requirements, and failed audit controls. Work directly with vendors including Microsoft, Amazon, and Google on cloud solutions and best practices for NIH projects.Information Technology Specialist (25B)United States Army ReserveNovember 2016 to Present Implement and configure applications, changes, and upgrades to United States Army systems. Provide troubleshooting for issues including encryption, routing, satellite signal acquisition, data path transmission, and related irregularities. Day-to-day tasks include network creation, configuration, and management, including LANs, VLANS, routers, switches, access points, servers, and cabling. Built military transmission signals for satellite and network transmission. Cybersecurity Vulnerability Management Team LeadSkyline Technologies-Glen Burnie, MDAugust 2022 to June 2023 Established a complete Vulnerability Management Process for State of Maryland agencies. Managed the Vulnerability Management IT Security team of 6 employees and contractors to implement projects related to IT Security policies and protocols. Supervise, coach, and evaluate the team throughout each project. Create and present weekly reports to senior leadership on the status of current and upcoming projects. Build project schedules to give senior management and stakeholders a realistic time frame from start to finish. Analyze existing operations and schedule training to equip administrators, engineers, and management on improved operating procedures. Established technical and high-level presentations for leadership and stakeholders on cyber threats facing the organizations security posture. Establish applicable IA engineering and configuration control plans, policies, and procedures for the execution of network activities. Analyze and develop strategies for the administration of networks consistent with NIST framework requirements. Review and revise InfoSec policies, requirements, and vulnerability management processes to ensure the organizations security requirements are met. Instituted a plan of action to incorporate ServiceNow for management and engineering processes and procedures.Information System Security Officer (ISSO)TIAG (DHS)-Bethesda, MDSeptember 2021 to August 2022 Manage network security compliance by analyzing and managing approved changes affecting configuration items in the operations baseline. Conducted comprehensive risk assessments of IT and non-IT assets that identified gaps in secure and insecure areas using NIST and ISO/IEC 27001 Framework. Provide security compliance for Cloud Service providers AWS, Google Cloud, and Azure. Implemented cloud security policies for private and hybrid cloud solutions. Author, review, and update security policies, System Security Plans, and risk assessment documents. Build SA&A assessment packages, which are responsible for gathering information from FedRAMP packages and system owners and attending meetings to complete the assessment successfully. Cybersecurity Cloud Architect/Lead Security Engineer TIAG-Bethesda, MDDecember 2019 to September 2021 Planned and executed a large-scale migration to transition a classified data network to a secure cloud platform. Researched and implemented solutions for deidentifying PHI data before migration to the cloud. Provide risk management through incident response, malware analysis, network log analysis, review security protocols, and employee training using ServiceNow discovery, Splunk, Tenable, Security Center, and several other tools. Perform weekly vulnerability scans and reports on all servers, workstations, network devices, and cloud environments using Nessus and Security Center. Configured cloud buckets by project needs and users need to know; ensuring proper access controls were implemented for each. Provided solutions to leverage several current on-prem security tools within the cloud by integrating these solutions through various connectors. Implemented continuous monitoring for a secure private cloud via Splunk, reviewing logs for anomalies and changes within the environment. Installed and maintained SIEM and other security tools within both on-prem and cloud environments. Utilized Cloud DLP for consistent protection of all data entering and leaving the environment. Assessed, designed, implemented, and documented solutions leveraging Google Cloud Platform (GCP) and other third-party solutions based on the client's need. In-depth knowledge of tools and technologies used in the cloud environment to provide security controls and assessments of the applications. Analyze requirements, design, and field products for security in proposed projects. Create policies and procedures to detect, control, and protect the network and connected nodes. Cybersecurity EngineerGDIT (DOS)-Arlington, VANovember 2017 to December 2019 Led Firewall Advisory Board, approving secure infrastructure changes to all DOS networks, including cloud and mobile environments. Advised engineers on security requirements for SAAS, IAAS, and PAAS cloud solutions within the Department of State networks, ensuring that zero trust, continuous monitoring, and data loss prevention aligned with best practices for all solutions. Worked closely with vendors to ensure proper patching and maintenance based on the cloud-shared responsibility model. Reviewed all software, hardware, and network connections, ensuring industry standards were applied for data at rest, in transit, and in use for all solutions accessing network resources. Oversaw Change Control Board and approved all hardware, software, and miscellaneous changes impacting public and private DOS networks. Conduct annual A&A assessment and continuous monitoring tasks. Met with stakeholders to assess proposed network architecture and protection changes. Provided briefings to senior leadership on significant technical security risks that could impact clients. Cybersecurity AnalystLockheed Martin-Baltimore, MDJanuary 2013 to November 2017 Conduct vulnerability and configuration compliance scans of the network and impacting technology via Tenable. Perform centralized security management and administration to corresponding software, applications, and devices via McAfee HBSS ePolicy. Reviewed and edited incident response procedures, standard operating procedures, contingency plans, and other relevant technical documentation. Evaluate current security policies and write reports on the findings to determine recommended strategies for improvement. Conduct meetings with vendors to determine the best security tools to implement within the environment. Configured, reviewed, and monitored network traffic, configurations, and settings. Maintain and consistently update SharePoint SOP database integrity. Provide Host intrusion detection and prevention education and prevention. Update and edit incident response, program procedures, IT contingency plans, and other relevant technical documentation.EducationMaster of Science in Cybersecurity TechnologyUniversity of Maryland Global CampusBachelor of Science in Computer Technology: Network Security Bowie State UniversitySkills Cloud security Azure Google Cloud Platform Information Security Network Security Cloud Computing AWS Cybersecurity Disaster RecoveryCertifications and LicensesCCSPCompTIA Security+CISSP

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise