| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
INFORMATION SYSTEMS SECURITY OFFICER (ISSO)Lanham, Maryland EMAIL AVAILABLE PHONE NUMBER AVAILABLE LinkedInSUMMARY:Cybersecurity Professional with 8 years of experience as an Information System and application security, including Cyber Defense Frameworks, Cyber Threat Intelligence, Network Security and Traffic Analysis, Endpoint Security Monitoring, Security Information and Event Management, Digital Forensics and Incident Response with Phishing.Led the strategic implementation of the NIST Cybersecurity Framework across organizations, enhancing the security posture by 10% through the integration of advanced system projects and innovative cybersecurity initiatives.Demonstrated proficiency in CI/CD pipeline development and management utilizing tools such as Jenkins and JFrog for automated build and deployment processes.Employed DevOps and Agile methodologies in cloud security and infrastructure management roles, reduced manual configuration efforts by 15% through infrastructure as code (IaC) practices.Managed open-source operating systems, particularly Linux-based systems, overseeing their configuration, security hardening, and maintenance to ensure optimized performance and security compliance.Acted as a cybersecurity advisor to senior management, providing insights on emerging technologies and advanced security techniques, leading to the adoption of enhanced SIEM implementations and cloud security best practices.Hands-on experience in implementing AWS Security Best Practices, focusing on IAM security, VPC, Data Security, Security of servers, Application security, Monitoring, logging, and auditing, and AWS CAF. Proven track record of successful execution of cybersecurity initiatives to mitigate risks and protect valuable assets.Spearheaded the resolution of critical vulnerabilities within Dell Technologies' AWS VPC architecture, implementing cutting-edge solutions to significantly reduce unauthorized access risks and strengthen network security.Developed and implemented plans, policies, and procedures to enforce technical guidelines for information security, establishing robust frameworks that guide the organization's approach to data protection and cyber threat resistance.Communicated effectively with both internal and external stakeholders and customers on information security matters, presenting security strategies, audit results, and compliance issues to ensure transparency and collaborative security efforts.Proficient in deploying and managing Imperva security solutions, emphasizing data and application security.Applied comprehensive understanding of NIST Cybersecurity Framework, ISO 27001, and CIS Controls to establish and enhance cybersecurity policies and procedures.Conducted comprehensive risk analyses to evaluate vulnerabilities and ensure the security of systems, utilizing advanced techniques to identify and mitigate potential threats effectively.Applied advanced systems engineering and enterprise-level IT security principles, including the Zero Trust Architectural Model, to develop and enforce cybersecurity strategies that significantly reduced the risk of data breaches and network attacks.Enhance data security through encryption mechanisms (KMS, S3, EBS), AWS Secrets Manager, and AWS Certificate ManagerMade informed decisions and provided strategic recommendations that significantly influenced important agency IT policies or programs, driving substantial improvements in IT infrastructure and service delivery across the organization.Safeguard applications using AWS WAF, AWS Shield, and secure coding practices.\Implement robust monitoring, logging, and auditing using CloudWatch, AWS Config, and AWS CloudTrail.Developed Compliance as Code frameworks automating compliance validation against NIST and GDPR standards across cloud environments, reducing manual audit efforts and ensuring continuous compliance.Adhere to the AWS Well-Architected Framework, with a focus on the Security Pillar, ensuring a secure and scalable cloud infrastructure.Utilized project management tools and skills to meticulously plan and manage in-depth cybersecurity project plans, ensuring projects adhered to timelines, budget constraints, and scope specifications.Implements and manages network security measures, including Firewalls, and IDS/IPS, and conducts in-depth traffic analysis using tools such as Wireshark and TCP/IP.Utilize Java and Bash Shell Scripting skills to develop and implement security measures, contributing to the robustness of security controls.Developed and deployed innovative IT solutions to optimize and secure the operational environment, enhancing system efficiency and safeguarding sensitive data against emerging cyber threats.Deep understanding of information technology security concepts, with extensive knowledge of NIST 800-53 controls and requirements, and familiarity with the MITRE ATT&CK framework, to develop and implement security measures that meet and exceed industry standards.Manages security on Linux (Ubuntu, Unix) and MacOS systems, ensuring a secure operating environmentDeveloped and implemented strategies for knowledge sharing across the organization, enhancing operational efficiency by fostering a culture of continuous learning and adoption of best practices in project and process management.Implemented major changes to group policies, enhancing system securities and compliance measures. This included regular reviews and updates to policies to reflect evolving security standards and organizational needs, ensuring robust protection against emerging threats.Planned and executed hardware and software upgrades, supporting system growth and enhancing system capabilities.Spearheaded the development of ERP systems, focusing on integrating third-party connectivity to streamline operational processes and improve data synchronization across platforms.Spearheaded organizational efforts to prepare for and respond to rigorous information security compliance audits, ensuring alignment with industry standards and regulatory requirements, which resulted in enhanced security measures and successful audit outcomes.Followed stringent information dissemination protocols to address internal and external inquiries regarding the organization's cybersecurity and privacy initiatives and operations.Led the design and implementation of multiple new landing zones in Azure and AWS GovCloud, enhancing the infrastructure's scalability and compliance with government regulations.EDUCATION:Bachelor of Science BS, Computer ScienceUniversity of BueaCERTIFICATIONS:Certified Information Systems Security Manager (CISM)AWS Certified DevOps Engineer ProfessionalCompTIA Security+Project Management Professional (Google Certified)MILITARY EXPERIENCESKILLS:Cyber Defense Frameworks:NIST Cybersecurity Framework, ISO 27001, CIS Controls, CSAM, FEDRAMPProgramming Languages:Java, Bash Shell Scripting, PythonCyber Threat Intelligence:Threat Intelligence Platforms, Threat Hunting, OSINTNetwork Security and Traffic Analysis:Firewalls, IDS/IPS, Wireshark, TCP/IPEndpoint Security Monitoring:Endpoint Protection Platforms, EDR SolutionsSIEM:Splunk, QRadar, ArcSightDigital Forensics and Incident Response:Volatility, Encase, Autopsy, Incident HandlingPhishing:Phishing Simulations, Email Security, User Awareness TrainingOperating SystemsLinux (Ubuntu, Unix), MacOSAWS SECURITY KNOWLEDGE:IAM SECURITY: AWS Identity, Access Management (IAM), Role-Based Access Control (RBAC)VPC: Virtual Private Cloud, Network Acls, Security Groups, VPC Flow LogsData Security: Encryption (KMS, S3, EBS), AWS Secrets Manager, AWS Certificate ManagerSecurity Of Servers: EC2 Instances, AWS Systems Manager, AWS InspectorApplication Security: AWS WAF, AWS Shield, Secure Coding PracticesMonitoring, Logging, And Auditing: CloudWatch, AWS Config, AWS CloudTrailAWS CAF: AWS Well-Architected Framework, Security PillarEXPERIENCE:Information Systems Security Officer, full-time,40hrs/weekMcKinsey & Company, Summit, NJ Aug 2020 - PresentLed IT Project Development and Implementation of a centralized threat intelligence platform, overseeing project planning, system design, and execution to enhance real-time threat detection and response capabilities.Guided IT resource testing and procurement processes, ensuring that new technologies and upgrades met rigorous standards for functionality, security, and compatibility with existing systems.Led the development and deployment of a threat intelligence platform, enabling proactive identification and mitigation of emerging threats.Gained proficiency in both on-premises and cloud-based voice and IT network protocols and architectures, employing structured analysis and programming techniques to troubleshoot complex IT and voice network issues effectively.Implemented a comprehensive SIEM solution (Splunk), reducing incident response time by 20% and improving threat detection capabilities.Implemented security and networking standards, including IPv6 protocols, across organizational networks to support future-proof infrastructure upgrades and enhanced network security measures.Conducted comprehensive security system audits and vulnerability scans to manage an information assurance vulnerability assessment program, identifying and mitigating potential threats to maintain organizational data integrity and security.Developed, implemented, and interpreted metrics to evaluate the effectiveness and efficiency of cybersecurity programs, enabling continuous improvement through data-driven insights and performance analysis.Applied expertise in data search techniques, including advanced indexing, querying, and visualization to extract actionable insights from large datasets, improving incident response and threat detection.Participated in the development of policy, procedures, and directives for information technology (IT) security risk management, contributing to frameworks that ensure organizational compliance with evolving security standards and regulations.Managed crisis events by coordinating response strategies and balancing the conflicting needs of various stakeholders, ensuring swift resolution and minimal impact on business operations.Demonstrated proficiency in using command-line tools for Windows, Linux/Unix operating systems, enhancing system management and troubleshooting abilities.Maintained and supported the inventory management of software within the program development offices, ensuring accurate tracking and management of software assets to enhance operational efficiency.Orchestrate the configuration and management of SIEM solutions such as Splunk, QRadar, and ArcSight for unparalleled log analysis and correlation capabilities.Conducted thorough risk assessments of both planned and installed information systems to identify vulnerabilities, assess potential impacts, and prioritize security enhancements based on organizational risk appetite and regulatory requirements.Engaged in the development, application, analysis, and testing of improved IT services and security methods, enhancing the protection of IT systems through innovative solutions and best practices.Operated and maintained cloud-based technology solutions, ensuring the cybersecurity, reliability, stability, resiliency, and compliance of platforms such as AWS, focused on enhancing system architectures and optimizing cloud service deployments to meet stringent security standards.Recommended new or revised security measures and countermeasures based on the outcomes of accreditation reviews, enhancing organizational security postures and compliance with national and international standards.Authored detailed policies related to the protection and security of systems, networks, and data, aligning with cybersecurity standards and best practices to fortify defenses and mitigate potential threats.Established a collaborative framework involving IT system owners, developers, and project managers to ensure robust security from inception through deployment.Information Systems Security Officer, full-time, 40hrs/weekDell Technologies, McLean, VA Feb 2018 - Jul 2020Designed and implemented a secure AWS VPC architecture, reducing the risk of unauthorized access and enhancing network security.Designed, built, and implemented a robust container-based platform using Kubernetes in a multi-tenant environment, ensuring optimal resource utilization, scalability, and isolation between different operational workloads.Developed technical specifications to ensure compliance with security requirements at both the systems and local area network (LAN) levels, implementing robust security measures to protect networked systems from unauthorized access and cyber threats.Utilized US Federal government standards, including publications from the NIST to conduct thorough assessments of IT systems and cybersecurity, data governance, and privacy programs, ensuring compliance with regulatory requirements and industry best practices.Identified and specified information systems security requirements for migrations to new environments, ensuring seamless transitions while maintaining stringent security protocols and data integrity.Employed a variety of coaching and planning techniques to ensure the integration of cybersecurity best practices into Identity Credential and Access Management (ICAM) and Public Key Infrastructure (PKI) systems, enhancing security protocols and user authentication processes.Implemented and managed the Risk Management Framework (RMF) across multiple IT projects, ensuring comprehensive risk assessments, system categorization, security control implementation, and continuous monitoring to maintain security and complianceLed the integration of cybersecurity best practices throughout the IT system development lifecycle (SDLC), focusing on cyber defense planning and the delivery of enterprise security services.Conducted thorough analysis of cloud storage options and efficiencies, recommending optimal cloud service providers based on comprehensive performance comparisons and cost-benefit analyses to support scalable, secure, and cost-effective cloud solutions.Developed and implemented detection engineering practices, utilizing 'detection as code' methodologies to automate and enhance threat identification capabilities across enterprise systems.Managed a diverse array of cloud infrastructure and frameworks, utilizing IaaS, SaaS, and PaaS hosted services. Demonstrated expertise in configuring and administering environments across major cloud providers like Amazon Web Services ensuring efficient operation and robust security measures.Designed and implemented an organization-wide domain name system (DNS) infrastructure, enhancing domain resolution processes and security across the enterprise, ensuring robust defense mechanisms against DNS-based threats..Developed the technical portion of the Information Management Plan (IMP), outlining the strategic use of IT resources to support organizational objectives and enhance data governance and system efficiency.Planned and executed strategies to anticipate, identify, evaluate, mitigate, and minimize risks associated with IT system vulnerabilities. Developed effective security measures and metrics to enhance system resilience and reduce exposure to security threats.Collaborated with multidisciplinary audit teams, providing expert guidance in the execution of audits. Ensured technical procedures were developed and implemented effectively, leading to the accurate identification of IT system weaknesses and compliance issues.Identified Requirements and Administered IT Contracts for IT professional services, ensuring vendors met stringent performance criteria and delivered services aligned with organizational needs.Collaborated with cross-functional teams, providing leadership and mentorship to foster a culture of innovation and excellence in software development. Facilitated regular knowledge-sharing sessions and workshops to elevate team skills and promote a collaborative work environment.Utilized API scripting and programming languages such as Python for automation and the development of custom security tools, increasing operational efficiency and effectiveness in threat management.Conducted thorough reviews of team members' work products, ensuring accuracy and comprehensive support for identified weaknesses in IT systems security. Upheld the highest standards of compliance with applicable professional standards and organizational policies.Developed and maintained software architecture standards to ensure consistency, efficiency, and scalability across all development projects. Established guidelines that promote best practices in software design and integration, enhancing overall system performance and maintainability.Utilize tools like Volatility, Encase, and Autopsy for incident handling and digital forensics.Developed and implemented strategies for ensuring, protecting, and restoring IT systems, services, and capabilities, leading to strengthened organizational defenses and minimized downtime during security incidents.Take charge of implementing and managing Endpoint Protection Platforms and Endpoint Detection and Response (EDR) solutions.Cloud Security/DevOps Engineer full-time,40hrs/weekAdient, Holland, MI Feb 2016 Jan 2018Implemented application security best practices, including secure coding guidelines and regular security code reviews, resulting in a 15% reduction in application vulnerabilities.Conducted life cycle management of automation technologies, overseeing the evaluation, selection, implementation, and maintenance phases to ensure optimal performance and alignment with IT strategic goals.Orchestrated the development and implementation of security requirements focusing on application security and cloud infrastructure within AWS environmentsDeveloped and implemented a centralized logging and monitoring solution using AWS CloudWatch, enhancing visibility into security events and enabling timely response to incidents.Led a diverse team of information security professionals, orchestrating the development and enforcement of security controls that significantly mitigated cybersecurity risks across critical network infrastructures.Administered Systems Integration Projects and strategic implementation of Jenkins and JFrog within CI/CD pipelines, facilitating automated builds and deployments that improved software delivery speeds by over 20%.Led the migration of on-premises infrastructure to AWS, ensuring a secure and compliant cloud environment.Conducted security awareness training programs and simulated phishing exercises, reducing successful phishing attacks by 70%.Analyze and resolve conflicts related to the merging of source code for Git.Employed Infrastructure as Code (IaC) methodologies using tools such as Terraform and Ansible to automate and manage cloud deployments, significantly reducing manual configuration errors and improving deployment consistency across environments.Monitored and managed cloud resources on AWS to optimize performance and cost through auto-scaling, load balancing, and resource allocation.Implemented continuous monitoring tools to track and verify security measures in real-time, facilitating immediate response to potential vulnerabilities and threats within application infrastructures.Managed and maintained containerized applications using Docker and orchestrated them with Kubernetes for efficient resource utilization and scalability.Conducted comprehensive audits and assessments of security protocols across critical application development stages, ensuring adherence to best practices and identifying areas for enhancement. |