Senior Information Security Officer Resume
Washington, DC
SUMMARY:
- Well - rounded and energetic professional with 20+ years experience seeks new challenge and opportunity to apply consummate skills maximizing organization systems performance.
- Awarded an Associate of Arts in Information Technology/Networking
- Obtain my Bachelor of Science in Information Technology with a Concentration in Information Systems Security.
- Researching emerging cyber threats using Confidential and none government sources
- Fully train in the use of Confidential and Confidential .
- Train as a Technical Assurance Oversight SME/Technical Assurance Evaluator
- Escalate organizational development through superior systems management; provide uncompromised security while consistently exceeding goals and objectives
- Responsible for conducting real-time network scans using Nessus software and Web Inspect
- Demonstrate high-level technical management and training qualities; specialize in technical operations, maintenance, testing, and network administration
- Results-driven with military professionalism; United States Top Secret Security Sensitive Compartmented Information ( SCI) Granted on 06/2015
- Organized and detail-oriented; implement conversion of information from Confidential ( Confidential Information Assurance Certification and Accreditation Process) to RMF (Risk Management Framework).
- Creating and enforcing group policy that limits user’s access to certain information
- Self motivated and dedicated; expertise utilizing a Vulnerability Analysis and Assistance program; identify risk and provide maintenance to increase security
- Pro-active leader with personnel management experience; provide training and development, conduct performance evaluations, build strong teams, and achieve organizational goals
- Communicate technical and complex information easily and concisely; conduct investigations and create reports and databases; establish excellent work relationships and provide in-house training; proficient in technical and operations support, and ensure excellent customer service
- Demonstrate diagnostic and collaborative problem-solving skills; exhibit proficiency in translating individual needs into responsive, customized solutions
- Qualified to handle to use Commutations Security Material System (CMS) for Siprnet and JWIC network.
KEY AREAS OF EXPERTISE:
- Technical Management
- Confidential & RMF
- IT Support & Administration
- IT Hardware/Software Procurement
- Network Security Functions
- Network Message Traffic Systems
- Network Maintenance/Administration
- Vulnerability Analysis
- Setting Group Policy
- Commutations Security Material System (CMS)
- Public Key Infrastructure (PKI)
- Data Transfer Systems Design
- Computer Installation/Testing
- Budgeting/Allocations
- Document Management
- Personnel Management
- Team Building & Training
- Troubleshooting
- SQL & Action Queries in Access 2010
EMPLOYMENT HISTORY:
Senior Information Security Officer
Confidential, Washington, DC
Responsibilities:
- Recommending courses of action and policies to senior management that allow the Justice Department to securely meet its organizational goals.
- Ensuring that automation security programs are implemented through development and promulgation of: notices, policies, procedures; training and awareness programs, and customer surveys.
- Managing the conduct of vulnerability assessments and audits to: (a) ascertain the current state of automation security and to highlight areas of high, medium and low risk to agency management; (b) identify systems that are considered sensitive, and their associated risks, develop and implement security plans for sensitive systems.
- Ensuring that all actions are taken so that management can be reasonably assured that Agency information assets are protected. Propose areas where increased management controls will help with security. All network information is entered into Risk Vision.
- Obtain information from Confidential and enter into RMF in an efforted to conduct business with Confidential and other Federal Agencies.
- Process all network alerts from the DOJ Enterprise Security Operations Center (ESOC) Remedy System which effect my assigns network.
- Performing security engineering analysis risk and vulnerability.
- Assesses and mitigates system security threats/risks throughout the program life cycle; determines/analyzes and decomposes security requirements at the level of detail that can be implemented and tested; reviews and monitors security designs in hardware, software, data, and procedures; performs system certification and accreditation planning and testing and liaison activities; supports secure systems operations and maintenance.
- Managing the monitoring and recording the performance of information systems security initiatives for regularly reporting its status to the Director of IRM, the CIO, and Assistant Administrator, Management (Agency/Bureau). The ISSO will be prepared to report the information systems security status to the Administrator's senior staff meeting.
- Obtain my Bachelor Science Degree in Computer Security with a Concentration in Information Systems Security.
- Communicate to team members and senior personnel through email and daily briefing.
- Has experience in advance knowledge of security system testing and documentation.
Technical Assurance Oversight SME/Technical Assurance Evaluator and Information Security Officer
Confidential, Columbia, MD
Responsibilities:
- Provide support for the development of technical oversight to all Confidential supporting the Confidential .
- Can multi-task and can work by himself or with a team will little or no supervision.
- Has a keen ability to research and verify solutions meeting government requirments.
- Prepare a TA validation reports to provide guidance and direction to the Confidential and Confidential Components on the proper implementation of the TAS.
- Provide interpretation and guidance of policy documentation for specific evaluations.
- Conduct peer reviews of new implementation documentation. Facilitate meetings to manage and approve changes to the Confidential TA methodologies.
- Research and respond to queries regarding interpretation of the TA Policy Documents and as it applies to the Confidential TA Component.
- Created Classified PowerPoint presentation for civilian and senior military personnel.
- Drafting and maintaining Excel spreadsheet to keep track of numbers and manipulate the data for certain projects.
- Recertify a classified network.
- Working with Confidential 800 series, especially 800-53 and FIPS
- Re-certify classified IT network
- Qualify using Confidential
Information Assurance Specialist
Confidential, Linthicum, MD
Responsibilities:
- Identify, develop, and track operational requirements for computer network defense (CND) tools and solutions in the areas of Situational Awareness and Incident Management
- Configuration and maintain Network Configuration and Security, Fault Tolerance, Discovery, PKI, and CND standards/strategy
- Department primary liaison with Confidential /CIO/NNI and Confidential for issues, policies and implementation of IT Security policies
- Experience in briefing senior military and civilian personnel regarding current network threats
- Perform requirements analysis and verification and validation testing for IA and computer network defense tools and solutions
- Exhibited experience with Vulnerability Management System (VMS). Joint Incident Management System (JIMS), Joint CERT Database (JCD), Joint Indicators Database (JID) and Assured Compliance Assessment Solution ( Confidential )
- Strong program/project management experience, with the ability to multi-task and manage multiple projects/CND tools
Customer Data Services (CDS) Security Engineer
Confidential, Hanover, MD
Responsibilities:
- Strong technical skills related to information security, network security, Windows security, UNIX/Linux security, web application security, and wireless security
- Experience with Federal Information Security Management Act ( Confidential ), compliance & reporting, Nessus Scanning, Web Inspect, tenable support and working with the ISSO to resolve any vulnerabilities
- Evaluate technical controls through interviews, documentation creation and review, and comprehensive technical assessments
- Confidential -wide ( Confidential ) systems and networks for the identification of computer incidents, threat analysis and proactive response, IA analysis, IA reporting
- Security assessments and consulting on the Network's networking infrastructure, Web hosting environment, encryption technologies, firewall rule base analysis, remote access solutions, client engagement connections, vulnerability and threat analysis
- Working with functional teams to identify opportunities and provide recommendations on how security can be built into projects/products that are being developed
- Serve as a subject matter expert regarding information security leading practices and federal regulations such as Confidential (Computer Fraud and Abuse Act), National Security Directive 42 (NSD-42), Confidential (National Institute of Standards and Technology, Confidential (Federal Information Security Management Act), Confidential 800-40 (version 3) and Public Key Infrastructure (PKI)
- A systematic, accountable, and documented process for managing exposure to vulnerabilities through the timely deployment of patches
- Review and prioritize vulnerabilities and patches for immediate deployment and alternative remediation approach if patching is not possible
Principal Security Engineer
Confidential, Fort Meade, MD
Responsibilities:
- Monitor Confidential -wide systems and networks for the identification of computer incidents, threat analysis and proactive response, IA analysis, IA reporting, and IA response to the DISN and GIG users
- Hands on experience with security standards, policy, procedures, C&A and IA risk assessments
- Coordinate real time response to security incidents that affect the military domain with recommended course of action that mitigates and contains the risk while limiting the impact on the customer
- Experience with VMS compliance & reporting, Retina REM Scanning and Hercules Remediation tool
- Demonstrated knowledge and understanding of CNDSP 6510, INFOCON, IAVM/VMS, Incident Reports, FRAGO, NTOC, WARNORD and STRATCOM Directive 527-1
- To maintain, educate and train military and civilian user on email cryptography
Information Security Specialist
Confidential, Fort Meade, MD
Responsibilities:
- Demonstrate a working knowledge of government/business network security practices and procedures
- Responsible for conducting real-time analysis of theater IA-CND data from Confidential Command Center ( Confidential ) and Confidential Support Element ( Confidential ) in the Confidential Field Office ( Confidential ) US Cyber Command ( Confidential ) on a regular basis
- Monitor Confidential -wide systems and networks for the identification of computer incidents, threat analysis and proactive response, IA analysis, IA reporting, and IA response to the DISN and GIG users
Information Security Specialist /Administrator
Confidential, Washington, DC
Responsibilities:
- Demonstrated expertise while working on Department of Energy ( Confidential ) / National Nuclear Security Administration ( Confidential ) Metrica Team Venture drafting network security policies
- Shown a high degree of critical reasoning and the ability to work independently on network security projects
- Proficient in gathering system security control information from audit findings and other cross-functional sources to make value judgments on implementing changes that would positively affect the security posture of a network
- Dedicated in gathering data and evidence to be used in prosecuting cybercrime; can install security and network monitoring software which are essential in today’s corporate/government scenario as cyber-attacks have become more sophisticated
System Administrator
Confidential, Columbia, MD
Responsibilities:
- Successfully monitored multiple classified government intelligence networks at Fort George Meade; ensured networks operated at capacity or provided an alert to a System Technician
- Key player who skillfully developed records utilizing a ARTS ticketing system; entered noteworthy events on a DOC logging system
- Served as System Liaison to various representatives of the United States armed forces and their supervisors
Senior Information System Security Officer
Confidential, MD
Responsibilities:
- Boosted business efficiency by managing Information Systems Security administration for computer systems; conducted testing of security procedures and ensured all policies were adhered to
- Expertly oversaw systems including various scans, patches, security relevant software and hardware changes, and system security plan maintenance
- Maintained security by completing documentation and storing data in the computer system database; SRTMS, COOP, Contingency Plans, POA&M, audits, and security finding mitigations
Computer Technical Support Analyst
Confidential, Elkridge, MD
Responsibilities:
- Essential team player who provided technical, operations and training support to personal computer users; skillfully produced reports and databases for weekly meetings
- Aided in design and coordination of personal computer support systems; installed and tested computers and printers; configured operating systems, and shrink-wrapped programs and applications software
- Led technical and operations support to Joint Worldwide Intelligence Communications Systems ( Confidential )
- Accurately organized and installed Information Assurance Vulnerability Alert ( Confidential ) patches
- Demonstrated expertise by conducting hardware diagnostics, providing customized solutions, and coordinated repairs
- Served as liaison for data transfer systems design and implementation
- Exhibited experience with Fiber Optic, Cat 5 and Cat 6 cable; wired a new network for Confidential