We provide IT Staff Augmentation Services!

Information Security Compliance Analyst Resume

4.00/5 (Submit Your Rating)

SUMMARY:

  • Perform Certification and Accreditation documentation in compliance with company standards
  • Proven ability to author strategic security roadmaps and translate into execution plans to drive desired outcomes.
  • Ability to communicate clearly and effectively with technical and business stakeholders.
  • Excellent verbal and written communication skills including the ability to author and present materials ranging from detailed technical specifications to high - level presentations.
  • Ability to multi-task, work independently and as part of a team
  • Develop, review and evaluate System Security Plan based on NIST Special Publications
  • Ability to identify deficiencies in accordance with OMB Circular A-123, Appendix A

TECHNICAL SKILLS:

Software/Platform/Artifacts: MS Office Suite, Word, Excel, Power Point, Visio, SharePoint, Data Analysis, FIPS 199, E-Authentication, SSP, ST&E, SAR, POAM, ATO, PIA, RA, CP

Standards: SOX, NIST800-53, FIPS, FISMA, SOX Testing, IT Audit support for financial statement review, Attestations engagements (SAS 70/SSAE 16), Audit readiness assignments, NIST 800-53 v4

WORK EXPERIENCE:

Confidential

Information Security Compliance Analyst

  • Assist System owners and ISSO in preparing Certification and Accreditation package for companies’ IT systems making sure that management, operational and technical security controls adhere to a formal and well established security requirement authorized by NIST SP 800-53 R4.
  • Analyze, review and update System Security Plan (SSP), Risk Assessment Report, Privacy Impact Assessment (PIA), System Security test and Evaluation (ST&E) and the Plan of Actions and Milestones (POA&M).
  • Perform Vulnerability Assessment. Make sure that risks are assessed, evaluated and proper actions have been taken to limit their impact on the Information and Information Systems.
  • Create standard templates for required security assessment and authorization documents, including risk assessments, security plans, security assessment plans and reports, contingency plans, and security authorization packages .
  • Additional responsibilities include assurance of vulnerability mitigation, training on C&A tools, supporting System Test and Evaluation (ST&E) efforts and other support to the IT Security Office.
  • Conduct Self Annual Assessment and test Security Controls (NIST SP 800-53A).
  • Designate systems and categorize its C.I.A using FIPS 199 and NIST SP 800-60.

Confidential

SOX Compliance Testing Analyst

  • Evaluated the adequacy of internal controls and compliance with company policies and procedures by conducting interviews with all levels of personnel, examining documents, records, reports and observing procedures.
  • Performed application security assessment on both internal and external applications.
  • Documented risks associated with internal and external applications.
  • Worked with other departments within IT to obtain the required evidence, develop test plans, testing procedure for SOX testing and document test results and exceptions.
  • Performed analysis on SOX control evidence to ensure all controls have been performed according to the requirements. Identify information system vulnerabilities through automatic and manual means.
  • Write audit reports for distribution to management and senior management documenting the results of the audit.
  • Followed up on remediation activities to ensure identified risks are mitigated.
  • Responded to security escalations received from the Security Operations Center (SOC).
  • Assisted with responses to cyber security incidents such as malware detections and malicious activities.

Confidential

Claims Officer

  • Screened claim forms using the standard operating procedures.
  • Vetted claims on time to determine validity by performing in-depth analysis on each claim and also reviewing evidence.
  • Audited medical service providers to review their claims.
  • Sorted and prepared reports on vetted claims to be processed for payment.
  • Liaised with data entry team to ensure that accurate and quality data is processed.

KEY SKILLS

  • Network & System Security
  • Risk Assessment
  • Authentication and Access Control
  • IT Auditing
  • System Monitoring & Regulatory Compliance

We'd love your feedback!