Cyber Security Program Manager Support/business Analyst Resume
Research Triangle Park Rtp North, CarolinA
SUMMARY:
Business Analyst/Governance Risk & Compliance - Obtain and excel in a position of Enterprise wide management of compliance/policy/mission & business objectives obtained in line with industry level regulations and standards
PROFESSIONAL EXPERIENCE:
Confidential, Research Triangle Park (RTP), North Carolina
Cyber Security Program Manager Support/Business Analyst
Responsibilities:
- Direct report to an International Investment Bank’s Head of Cyber Security Product & Services; supported oversight of programmatic goals & activities of Project Leads for Threat Identification, Detection, Protection, Response & Recovery.
- Facilitated regulatory/audit/risk reporting as aligned to corporate practices with global audience
- Standards and policy alignment with products and services offered
- Supported development & vendor receipt of Security Operations Center(SOC) RFP for services & product
- Use Case (user stories) product test scripts - reviewed for business requirements traceability; JIRA intro
Confidential, Reston, Virginia
Strategic Planning Officer
Responsibilities:
- Assessment & reporting of Confidential capabilities aligned to National Intelligence Priorities
- Organizational business customer development of strategy, plans and operational implementation efforts
- As task lead supervised a team of 12 support officers
Confidential, Reston, Virginia
Plans and Action Officer
Responsibilities:
- Response to Confidential community inquiries involving mission, technology, resources and operational status in the form of operational/tactical reports
- Continual SQL/numerous database reviews of global threat reporting, operational reporting, and assessment of impacts
- Program Level representative to Community level functional & operational risk management assessments and analyses
Confidential, McLean, Virginia
Resource & Budget Consultant
Responsibilities:
- Review, analysis & reporting to Confidential and National Security Staff on Confidential prioritized programs, underlying infrastructure, & resources in alignment with National Security objectives for CT mission
- Coordination & collaboration with SOC personnel, CFO, Policy and Programmatic officers, & Functional managers to ascertain mission to capability to technology alignment for Counter Terrorism mission
Enterprise Business/Performance Architect
Confidential
Responsibilities:
- Managed efforts for initial creation of Confidential Architecture ( Confidential ) Business and Performance Models, working with community business/functional peers for Information Technology and Data Models
- Business Rule and Functional requirements gathering with 16 agencies; all levels of stakeholders
- Coordinated EA performance measurement with Confidential & community wide business, data, technical and performance peers.
- Supported development of CIO’s Confidential Exhibit 300 write-up.
Process Improvement /Enterprise Risk Manager
Confidential
Responsibilities:
- Through gathering, audits and documenting of user process & procedural activities before and after
- Achieved Federal Aviation Administration Integrated Capability Maturity Model ( Confidential ) Level 4 for risk management (adherence to business rules, development of to-be user stories, train, test, implement)
- Developed and managed customer’s risk management policies, process and artifacts
IT Process Assessment Officer
Confidential
Responsibilities:
- Managed the improvement of timeliness and efficiency for a particular business process within an intelligence member s multi organizational security operations facility (SOC).
- Defined the As - Is business process threads thru facilitated stakeholder working sessions to gather user requirements and user outcomes adhering to operational center s business rules
- Developed a change management metrics program for assessing operational improvements
- Planned and facilitated Intelligence Community Confidential assessments of potential operational impacts
- Formulated an Confidential wide data call to collect and document Confidential IT infrastructure holdings
- Nominated Confidential infrastructure holdings for prioritization based on risk assessments
- Development of Confidential wide contingency and disaster recovery procedures