System Security & Authorization Analyst Resume
5.00/5 (Submit Your Rating)
Baltimore, MD
SUMMARY:
I am a motivated IT professional, with several years’ experience in deploying, supporting, monitoring, and analyzing information technology infrastructure. Knowledgeable in Security Assessment and Authorization professional, Risk Management Framework (RMF), Systems Development Life Cycle (SDLC), security life cycle and vulnerability management using FISMA, OMB App. III A - 130, and Confidential standards. Organized and detail-oriented individual who demonstrates professionalism, and ability to multi tasks.
TECHNICAL SKILLS:
- Security Assessment & Authorization
- Security Planning
- Risk Assessments
- Vulnerability Management
- FISMA
- SDLC
- RMF
- Confidential 800-Series
- Incident Response
- Policy and Process Development
- Windows Server
- Linux
- Windows 7, XP
- Word
- Project
- Excel
- Power Point
- Visio
- Retina
- Nessus
EXPERIENCE:
System Security & Authorization Analyst
Confidential, Baltimore, MD
Responsibilities:
- Ensure Information Systems are compliant to Confidential Standards by ensuring Controls were put in place using Security Test and Evaluation Templates (ST&E) and POA&M.
- Create ATO package documents; SSP, SAR and POA&M based on the security assessments performed on systems
- Reviewed scan results and document findings in POA&M
- Collaborated with system administrators to remediate (POA&Ms) findings. Ensure vulnerabilities and risks are efficiently mitigated in accordance with the organization continuous monitoring Plan
- Performed information security risk assessments and assist with the internal auditing of information security processes. Assessed threats, risks, and vulnerabilities from emerging security issues
- Reviewed information systems security environments to include all aspects of physical, technical and administrative security measures
- Monitored and evaluated a systems compliance with Information Technology security requirements in accordance with Confidential 800 series
- Assisted with the development, implementation, and administration of information security policies, standards, and procedures adhering to industry best practices
- Provided analysis of system requirements relating to security/ Vulnerability reviews, risk, and contingency planning
- Developed plans of actions and milestones and/ or risk assessments for identified vulnerabilities, and work with multiple teams to track the execution of POA&M items to completion.
- Provided ongoing gap analysis of current policies, practices, and procedures as they relate to established guidelines outlined by Confidential, OMB, FISMA
- Provided support to the Information System Security Officer (ISSO) in the key role of Confidential Certification and Accreditation (C&A) and Documentation and Continuous Monitoring
- Reviewed and tested the Confidential SP 800-53 security controls on a variety of systems. This entails understanding and evaluating system architecture and a broad understanding of IT management, operations and technical practices.
- Reviewed detailed descriptions of the controls, provide edits and feedback on their actionable quality, and based on the descriptions perform tests to prove the validity of these assertions through interviews, examining of evidence and either overseeing or directly running technical scanning tools against targeted systems
- Conducted Security Assessments, Security Audits, Security Awareness Presentations and security.
IT Technologist Support
Confidential, Washington, DC
Responsibilities:
- Answered incoming client and customer calls
- Troubleshoot software and hardware issue via phone
- Trained end users in the use of equipment and software
- Acquired and maintain expert knowledge of emerging desktop technologies and software applications
- Fully document all cases in call tracking software and escalate to appropriate queue
- Escalated support call to supervisor as necessary
- Assumed ownership of project-related tasks as needed or assigned
- Ability to establish and maintain effective working relationships with clients and co-workers
- Skills in interviewing users to help analyze and resolve issues
- Strong organizational, analytical and planning skills
- Ability to read and interpret system security policies, rules and regulations
- Ability to communicate security and risk-related concepts to both non-technical and technical audiences
- Strong communication (verbal & written) and presentation skills