We provide IT Staff Augmentation Services!

Cyber Security Program Manager Support/business Analyst Resume

4.00/5 (Submit Your Rating)

Research Triangle Park Rtp North, CarolinA

SUMMARY:

Business Analyst/Governance Risk & Compliance - Obtain and excel in a position of Enterprise wide management of compliance/policy/mission & business objectives obtained in line with industry level regulations and standards

PROFESSIONAL EXPERIENCE:

Confidential, Research Triangle Park (RTP), North Carolina

Cyber Security Program Manager Support/Business Analyst

Responsibilities:

  • Direct report to an International Investment Bank’s Head of Cyber Security Product & Services; supported oversight of programmatic goals & activities of Project Leads for Threat Identification, Detection, Protection, Response & Recovery.
  • Facilitated regulatory/audit/risk reporting as aligned to corporate practices with global audience
  • Standards and policy alignment with products and services offered
  • Supported development & vendor receipt of Security Operations Center(SOC) RFP for services & product
  • Use Case (user stories) product test scripts - reviewed for business requirements traceability; JIRA intro

Confidential, Reston, Virginia

Strategic Planning Officer

Responsibilities:

  • Assessment & reporting of Confidential capabilities aligned to National Intelligence Priorities
  • Organizational business customer development of strategy, plans and operational implementation efforts
  • As task lead supervised a team of 12 support officers

Confidential, Reston, Virginia

Plans and Action Officer

Responsibilities:

  • Response to Confidential community inquiries involving mission, technology, resources and operational status in the form of operational/tactical reports
  • Continual SQL/numerous database reviews of global threat reporting, operational reporting, and assessment of impacts
  • Program Level representative to Community level functional & operational risk management assessments and analyses

Confidential, McLean, Virginia

Resource & Budget Consultant

Responsibilities:

  • Review, analysis & reporting to Confidential and National Security Staff on Confidential prioritized programs, underlying infrastructure, & resources in alignment with National Security objectives for CT mission
  • Coordination & collaboration with SOC personnel, CFO, Policy and Programmatic officers, & Functional managers to ascertain mission to capability to technology alignment for Counter Terrorism mission

Enterprise Business/Performance Architect

Confidential

Responsibilities:

  • Managed efforts for initial creation of Confidential Architecture ( Confidential ) Business and Performance Models, working with community business/functional peers for Information Technology and Data Models
  • Business Rule and Functional requirements gathering with 16 agencies; all levels of stakeholders
  • Coordinated EA performance measurement with Confidential & community wide business, data, technical and performance peers.
  • Supported development of CIO’s Confidential Exhibit 300 write-up.

Process Improvement /Enterprise Risk Manager

Confidential

Responsibilities:

  • Through gathering, audits and documenting of user process & procedural activities before and after
  • Achieved Federal Aviation Administration Integrated Capability Maturity Model ( Confidential ) Level 4 for risk management (adherence to business rules, development of to-be user stories, train, test, implement)
  • Developed and managed customer’s risk management policies, process and artifacts

IT Process Assessment Officer

Confidential

Responsibilities:

  • Managed the improvement of timeliness and efficiency for a particular business process within an intelligence member s multi organizational security operations facility (SOC).
  • Defined the As - Is business process threads thru facilitated stakeholder working sessions to gather user requirements and user outcomes adhering to operational center s business rules
  • Developed a change management metrics program for assessing operational improvements
  • Planned and facilitated Intelligence Community Confidential assessments of potential operational impacts
  • Formulated an Confidential wide data call to collect and document Confidential IT infrastructure holdings
  • Nominated Confidential infrastructure holdings for prioritization based on risk assessments
  • Development of Confidential wide contingency and disaster recovery procedures

We'd love your feedback!