Quantcast

System Security Cyber Resume Ashburn, VA
Resumes | Register

Candidate Information
Name Available: Register for Free
Title System Security Cyber
Target Location US-VA-Ashburn
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

System Security Cyber Bowie, MD

Network Security Cyber Burke, VA

Cyber Security Analyst Springfield, VA

Security Analyst Cyber Germantown, MD

Technical Support Cyber Security Woodbridge, VA

Cyber Security Access Management Silver Spring, MD

Cyber Security Application Development Chantilly, VA

Click here or scroll down to respond to this candidate
Candidate's Name
Suitland, MD Street Address
Phone: PHONE NUMBER AVAILABLEEmail: EMAIL AVAILABLEClearance Level: TS/SCI/CI POLYEXECUTIVE SUMMARYDetail-oriented and highly skilled Cyber Security System Engineer with over ten years of experience in designing, implementing, and managing cybersecurity solutions across diverse technical environments. Proven ability to build secure systems, enhance operational efficiency, and lead teams in high-stakes environments. Recognized for delivering innovative security frameworks that meet compliance requirements while anticipating the evolving cyber threat landscape.CORE COMPETENCIESCybersecurity Engineering & ArchitectureSecurity Control Assessments & AuthorizationRisk Management Framework (RMF) ImplementationAdvanced Vulnerability Management & Threat AnalysisSecurity Software Development Lifecycle (SecSDLC)System Hardening & Configuration ManagementCloud Security Solutions (AWS, Azure, O365)Incident Response & Forensic AnalysisCross-Domain Solutions (Forcepoint / AFRL)CERTIFICATIONSCompTIA Advanced Security Practitioner (CASP)+Pursuing: Security+, Microsoft CertificationsPROFESSIONAL EXPERIENCESecurity Control Assessor / System Security EngineerGovCIO  DHS, Washington DCSept 2019  Present- Lead end-to-end cybersecurity assessments and engineering solutions for cross-domain information systems using RMF, ensuring secure and compliant operations.- Collaborate with ISSOs to evaluate systems' confidentiality, integrity, and availability, leading to enhanced overall security frameworks.- Drive the design and implementation of continuous monitoring strategies, successfully navigating multiple systems through Authority to Operate (ATO) processes.-Help address challenges to ensure customers disparate legacy systems are compliant with current cybersecurity policy and support the Project Managers management plan and provide inputs to update the plan when necessary.- Produce detailed technical reports and executive summaries, improving senior leadership's ability to make informed strategic decisions.Information System Security Officer / System Security EngineerZermount Inc  DHS/USSS, Washington DCOct 2017  Aug 2019-Led the development and engineering of Security Authorization documents (SSP, POA&M, Risk Assessments) for federal information systems.- Conducted extensive vulnerability analyses and risk assessments using industry best practices to fortify network architectures against cyber threats.- Engineered advanced security protocols by integrating Group Policies (GPOs) and securing hardware/software configurations.- Actively engaged in the Request for Change (RFC) and Configuration Control Board (CCB) review process for upcoming system implementations within the US Secret Service (USSS) programs.Information System Security OfficerCriterion Systems  SBA, Washington DC Oct 2016  Oct 2017- Managed comprehensive cybersecurity engineering processes for high-profile government systems, ensuring FedRAMP compliance and real-time monitoring.-Develop a variety of Security Authorization deliverables including System Security Plans, Security Assessment Reports, Risk Assessment Reports, Privacy Impact Assessments (PIA), Annual Assessments, Contingency Plans, FIPS 199 Security Categorizations, Plan of Action and Milestones (POA&M), etc.- Designed and implemented virtualized testing environments to improve pre-assessment readiness, enhancing the overall security posture.- Conducted extensive vulnerability analyses and risk assessments using industry best practices to fortify network architectures against cyber threats.Information System Security OfficerVOR Technology  Ft. Meade Army Base, MDFeb 2016  July 2016- Conducted thorough risk analyses and vulnerability assessments, improving security measures for mission-critical systems.- Authored technical security documentation and ensured compliance with RMF and relevant security standards.-Requested required information for system vulnerability scans in accordance to establish policy.-Assessed and mitigated system security threats/risks throughout the program life.cycle; determined/analyzed and decomposed security requirements at thelevel of detail that can be implemented and tested.IA Analyst / Desktop SupportMcKean Defense Group  Naval Surface Warfare Center, MDAug 2015  Feb 2016- Trained personnel on security best practices, enhancing system protection and operational efficiency through strategic initiatives.- Led risk assessments and implemented security measures to safeguard against unauthorized access, preserving system integrity.-Monitor the use of data files and regulate access to safeguard information in computer files.Senior System SpecialistManTech International Corporation  JBAB Air Force Base, Washington DCOct 2009  Oct 2014- Oversaw comprehensive network security analysis and compliance initiatives (NIST, RMF), advising leadership on effective vulnerability mitigation strategies.-Maintain file servers, network access, document, analyze and troubleshoot system anomalies to ensure optimum equipment performance.-Evaluate IT threats and vulnerabilities to determine whether additional safeguards are needed.- Ensured the proper declassification and handling of secure system memory and media, significantly enhancing operational compliance.EDUCATION- Massachusetts Institute of Technology (MIT)No Code AI and Machine Learning June 2023  Sept 2023- TESST Technology CollegeNetworking Technology June 2004 GPA: 3.7Award: Student of the YearTECHNICAL SKILLS-Cybersecurity Tools-RSA Archer, Xacta 360, ACAS Security Center, Qualys, Nessus, CSAM-Cloud & Network: AWS, Azure, O365, TCP/IP, HTTP, DNS, SSL/TLS-Operating Systems: Microsoft Windows, Linux, Apple OS-Languages & Frameworks: SQL, Hibernate- Specialties: Risk Assessment, Vulnerability Management, Authentication & Access Control, Regulatory Compliance

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise