We provide IT Staff Augmentation Services!

It Security Analyst Resume

2.00/5 (Submit Your Rating)

TECHNICAL SKILLS:

Windows 7 Professional, NT, Windows 98, Windows 2000 Professional, Windows XP Professional, D - Base IV, Word Perfect, Peregrine, Remedy, Active Directory, Microsoft Exchange Administrator, Windows Support Tools, Splunk, Wireshark, Whats Up Professional 2005, Visio, Microsoft 2003 Office Suite, Blackberry Desktop Software Installation and Maintenance, Active Card Gold, Form Flow, Adobe 7.0 Professional, McAfee ePolicy Orchestrator 3.0, McAfee WebShield e1000 Appliance, Telos Xacta, SecureInfo RMS, Microsoft Operations Manager 2007 (MOM), FrameMaker 8, HP OpenView, DISA Gold Disk, Confidential Retina, Vulnerator, Nessus , Remote Desktop, Digital senders, TortoiseSVNDoD Vulnerability Management System (VMS), Host Based Security System, Secure Configuration Compliance Vulnerability Initiative - Confidential, Microsoft SharePoint, Secure Configuration Remediation Initiative, BMC Bladelogic

EXPERIENCE:

Confidential

IT Security Analyst

Responsibilities:

  • Established, implemented, and interpreted the requirements for agency compliance with policy directives governing infrastructure protection
  • Coordinated the review and evaluation of the agency infrastructure protection program, including policies, guidelines, tools, methods, and technologies
  • Identified current and potential problem areas
  • Updated or established new requirements
  • Made recommendations for Confidential fully compliant infrastructure protection program to be implemented throughout the agency
  • Monitored agency compliance with infrastructure protection requirements across IT programs
  • Adjusted program guidelines in response to changing technologies
  • Provided security compliance administration and oversight to security policy and compliance management
  • Provided oversight to security related operational activities
  • Participated in the development of security policies
  • Participated in the certification and accreditation of systems
  • Identified security risks and recommended risk mitigation strategies
  • Documented compliance with security controls
  • Helped to identify mitigation and remediation for non-compliance with security standards/controls
  • Managed POA&M compliance and responses
  • Developed plans to implement POA&M required infrastructure

Confidential

Information Assurance Analyst

Responsibilities:

  • Perform technical support on the development, operation, management, and enforcement of security capabilities for Confidential, ensuring system availability, integrity, authentication, confidentiality, and nonrepudiation.
  • Assist in the design of information security for our customer’s applications, networks and stand-alone devices.
  • Work with government and integrated product teams in functional testing of Confidential 8500.2 Confidential controls.
  • Evaluate security systems according to industry best practices to safeguard internal information systems and databases.

Confidential

Cyber Security Analyst

Responsibilities:

  • Provided technical support to Information System programs and secure software development and integration tasks, including the review of work products for correctness, adherence to the design concept of The Joint Staff (JS) Office of the Chief Information Officer
  • Supported Confidential and Confidential with technical cyber security analysis and recommendations.
  • Ensured life cycle security integrity for multiple Network Modernization Projects
  • Direct remediation efforts and build Security Assessment Reports and Risk Assessments
  • Manage the agency’s Plan of Action and Milestone (POA&M) process including creation, update, closeout, tracking and reporting of POA&Ms to management
  • Perform and/or evaluate vulnerability scans using DISA Gold Disk and Confidential Retina in production and lab environments
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
  • Reported to project management on the progress of the Configuration Management effort including the status of project software builds, deployments, and environments.
  • Implemented Confidential Best Practices and formulating remediation guidance for technologies such as Windows Server Operating Systems, Unix/Linux Operating Systems, Oracle Database Management Systems, Web Technologies and Hardware Virtualization.

Confidential

Cyber Security Analyst

Responsibilities:

  • Provided technical support to Information System programs and secure software development and integration tasks, including the review of work products for correctness, adherence to the design concept of The Joint Staff (JS) Office of the Chief Information Officer
  • Supported Confidential and Confidential with technical cyber security analysis and recommendations.
  • Ensured life cycle security integrity for multiple Network Modernization Projects
  • Direct remediation efforts and build Security Assessment Reports and Risk Assessments
  • Manage the agency’s Plan of Action and Milestone (POA&M) process including creation, update, closeout, tracking and reporting of POA&Ms to management
  • Perform and/or evaluate vulnerability scans using DISA Gold Disk and Confidential Retina in production and lab environments
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
  • Reported to project management on the progress of the Configuration Management effort including the status of project software builds, deployments, and environments.
  • Implemented Confidential Best Practices and formulating remediation guidance for technologies such as Windows Server Operating Systems, Unix/Linux Operating Systems, Oracle Database Management Systems, Web Technologies and Hardware Virtualization.

Confidential

Information Assurance Consultant

Responsibilities:

  • Provide support by preparing and maintaining accreditation documentation and artifacts in accordance with Confidential
  • Review security architecture and design diagrams detailing ports and protocols
  • Implement Confidential Best Practices and formulating remediation guidance for Windows Server Operating Systems
  • Perform and/or evaluate vulnerability scans on production and integration systems utilizing approved network scanning tools and appropriate Government provided software and scanning tools such as Retina and Gold Disk
  • Perform Security Test and Evaluation, direct remediation efforts, build Risk Assessment Reports and tracking POA&M.
  • Write Privacy Impact Assessments (PIA) displaying knowledge of best practices protecting Personally Identifiable Information (PII)
  • Work directly with customer representatives and develop and report present task status

Confidential

Senior Information Assurance Analyst

Responsibilities:

  • Anticipate and plan for Interim or Final Authority to Operate against significant/major system development milestones
  • Prepare system security documentation; perform testing, Document results, Assist Confidential & Confidential officials to test/exercise the system
  • Provide Information Assurance ( Confidential ) support to Biometrics Automated Toolset (BAT)
  • Define information system security requirements for Local Area Networks and Wide Area Networks
  • Show fundamental knowledge of the Department of Defense Confidential methods and structure
  • Provide Life Cycle Management and advise PM BIO regarding considerations in applications system procurement or development, implementation, operational maintenance, and disposal activities as it pertains to Confidential
  • Perform analysis on computer systems software to determine vulnerabilities and security requirements; designs, develops and implements computer security solutions; conducts Security Test and Evaluation (ST&E) of computer and network systems
  • Interact daily with System Administrators, BAT Programmers, Network Engineers, Program Manager and Customer to provide automated information systems security guidance and assistance for planned requirements implementation and upgrades
  • Analyzing, define, and recommend Confidential and system requirements for advanced technology systems; preparing security certification and accreditation documentation; investigating and reporting on applicable Confidential and system technologies; conducting engineering reviews on technology affecting Confidential and system components; reviewing the results of security test and evaluations or system tests and providing implementation recommendations; Confidential and system testing; identifying and tracking metrics; systems integration; providing technical recommendations based on these reviews

Confidential

Program Manager

Responsibilities:

  • Responsible for coordinating employee scheduling, performance assessment, work assignments, and recognition/ disciplinary actions
  • Displayed expertise in customer service and technical knowledge resolving issues in Confidential call center/ help desk environment
  • Answered customer questions about company or contract products or services and/or status of services
  • Met with upper management to provide project status

Confidential

Senior Information Assurance Analyst

Responsibilities:

  • Display knowledge of CJCSI 6510.01 by monitoring and enforcing Confidential compliance requirements across the Confidential enterprise
  • Create and update Confidential -related artifacts and publishes Confidential notices to the Confidential
  • Track and report on Confidential regular basis to project leadership and senior Confidential leaders the status of Confidential efforts by publishing Confidential Watch List to identify significant issues
  • Gathers IAVA compliance information, correlates statistics and developing trends to report to senior Confidential leaders
  • Perform in-depth analysis of compliance statistics to determine potential threats to the Department of Defense ( Confidential ) systems due to non-compliance with IAVA notices
  • Track and report on Confidential regular basis to project leadership and client Points of Contact on the status of Confidential efforts
  • Manage compliance and reporting activities of all the CC/S/As through the Vulnerability Management System (VMS) database
  • Perform risk analysis and evaluate the Plan of Action &Milestones (POA&Ms) provided by CC/S/As to determine what the operational, mission, and financial impact on the Global Information Grid (GIG) is as well as the validity
  • Follow the progression of POA&Ms to ensure that they remain on schedule, and are relevant to that particular reporting CC/S/ Confidential
  • Examine and coordinate with the Joint Computer Emergency Response Team (CERT) Database (JCD) threat data to identify incidents attributed to the failure to implement Confidential direction and guidance
  • Facilitate communications between the JTF-GNO and the CC/S/ Confidential community, the Joint Staff and USSTRATCOM for the Secure Configuration Compliance Validation Initiative (SCCVI) and Secure Configuration Remediation Initiative (SCRI) programs

Confidential

Secure Systems Engineer

Responsibilities:

  • Demonstrate technical leadership and customer management
  • Interact directly with developers and program managers to identify the steps required to take various systems through the Confidential & Confidential process
  • Coordinated with TCS staff and customers to create Confidential & Confidential documentation and facilitate security testing to achieve successful accreditation
  • Utilize Unix scripting, networking & administration skills with strong emphasis on security
  • Development, testing, documentation, and training of TCS products
  • Provide systems engineering and integration support for all TCS products in Confidential Department of Defense or Commercial environment
  • Integrate other COTS products with the TCS product line to ensure proper functionality
  • Provide security assessments and configuration of servers to include web, database, and remote applications
  • Show in-depth knowledge of federal information security requirements, including FISMA and Confidential Special Publications (Guide for the Security Certification and Accreditation of Federal Information Systems), and Confidential Guide for Assessing the Security Controls in Federal Information Systems)

Confidential

Certification and Accreditation Engineer

Responsibilities:

  • Assist government leadership in implementing, and executing Confidential program
  • Work with Information Systems Security Officers (ISSO's) to advise, coordinate and facilitate resolution of Confidential issues; drafting, reviewing, and/or providing guidance on Confidential requirements during the processing of certification and accreditation packages
  • Support security requirement definitions of new, upgraded and reconfigured Information systems
  • Review system audit records and intrusion detection data to assist ISSO's and incident response personnel in identifying anomalies and security incidents within Confidential test environment
  • Keep abreast of Confidential and IC policies, standards and procedures for system accreditation
  • Enforce certification and accreditation methodologies within the NGA Information system environment
  • Responsible for management of Plan of Action & Milestone (POA&M) in support of Confidential & Confidential testing/remediation

Confidential

Senior Systems Administrator

Responsibilities:

  • Responsible for leadership of junior technicians in Confidential 24x7 Operations Center as Assistant Manager
  • Prepare daily brief of network status for morning presentation
  • Provide support for Confidential wide variety of software and hardware systems for Government customer
  • Account management including adding, modifying and deleting user accounts through Active Directory and Exchange 2003 on Confidential, Confidential, JWICS, NSANET and IDCNET
  • Responsible for day-to-day configurations and operations business systems
  • Optimize system operations to ensure the maximum possible quality of service for users, and assist users in their use of the system
  • Microsoft patching and IAVA updates
  • Install new software releases, system upgrades, evaluates and installs patches and resolves software related problems
  • Perform system backups and recovery
  • Maintain data files and monitor system configuration to ensure data integrity
  • Network monitoring with COTS tools such as What’s Up Gold Professional
  • Operate as Trusted Agent Security Manager (TASM) for Confidential reset station

Confidential

Senior Consultant

Responsibilities:

  • Apply information technology skills in the analysis, specification, development, integration and acquisition of systems in Confidential Windows 2000 Professional environment
  • Responsible for managing/configuring web and e-mail anti-virus appliances
  • Performed network security monitoring and analysis, identified suspicious and malicious activities, identified and tracked malicious code (including worms, viruses, trojan horses, etc)
  • Maintained Symantec's Norton Antivirus Server
  • Microsoft patching and IAVA updates
  • Administer and maintain enterprise anti-virus, anti-spam and content filtering solutions for numerous National Geospatial-Intelligence Agency networks using various COTS security tools (i.e. McAfee ePolicy Orchestrator 3.0 and McAfee WebShield e1000 Appliance)
  • Generate reports and conduct analysis utilizing the enterprise anti-virus management system
  • Demonstrated an understanding of Confidential, DCID 6/3, NIACAP, and Confidential
  • Enforce anti-virus defense-in-depth policies and strategies
  • Conduct out-break response activities to include virus response, reporting and vulnerability mitigation
  • Construct Standard Operating Procedures for each daily task

Confidential

Help Desk Support

Responsibilities:

  • Perform analysis of desktop hardware/software to debug and configure based on Confidential pre-specified software baseline
  • Received trouble calls, opened trouble tickets, query user, identify problems, and resolve problems using Peregrine
  • Escalate unresolved trouble tickets to operation and maintenance personnel
  • Track calls and keep customer informed until resolution
  • Update trouble ticket status and close trouble ticket upon resolution
  • Monitor system status and report anomalies to O&M personnel

Confidential

Installation Technician

Responsibilities:

  • Perform cable plant installation projects, conduct site surveys for extensive and complex projects and develop material lists
  • Pulling and terminating category 5 and fiber optic cable (single and multi-mode)
  • Determine and implement required pinouts
  • Install and configure equipment chases, cards, power supplies, racks, wall jacks, hardware and patch panels
  • Testing and documenting installation

We'd love your feedback!