Cybersecurity Security Operations Manager Resume
2.00/5 (Submit Your Rating)
SUMMARY:
- I am a high performing cybersecurity professional and veteran project manager. I am able to manage and understand the detail of network infrastructure and security issues.
- Well versed in the Risk Management Framework and detail knowledge of SP 800 - 53 rev4, SP 800-53a, SP 800-37 which comes from several years of leading over 7 audits.
- As a Project Manager and as an engineer I have managed, monitored, analyzed, and minimized the operational impact of dynamic threats to critical public and private sector IT infrastructures. Domain knowledge of network design, routing protocol, incident handling, remediation, packet analysis, security auditing, intrusion detection, and vulnerability assessment—coupled with team leadership, hands on, and financial management capabilities—enables me to deliver, redundant, efficient, secure, available infrastructures and systems that defend against attacks and infiltration.
- I have credentials in industry-leading security and management certifications (e.g. PMP, CISSP, CISA, ITIL, CSM, CCNA), expertise in legal and regulatory compliance, and additional experience in current cyber technologies
- I have lead cross-functional teams to define scope, plan, execute and deliver exceptional business value on time and within budget.
- The projects I managed ranged in size from large to small across a wide range of technology platforms. All my projects have been very visible and hands-on project management role where I was the spokesperson for the capabilities of the project across a variety of audiences, as well as coordinate and lead project activities. I was always the single point of contact for all project activities and responsible for each project success.
PROFESSIONAL EXPERIENCE:
Confidential
Cybersecurity Security Operations Manager
Responsibilities:
- Started up, Lead, and managed the Cyber Integrity Center ( Confidential ) SOC team supporting the 24/7/365 SOC that monitors intrusion detection systems ( Confidential ) working with Splunk SIEM engineers, remediation Team, and Threat Intelligence Team
- Created SOP for the intrusion detection process and identified new metrics tied to key points in the process, with the goal of reducing time of infection to time of remediation
- Created a weekly (sometimes every other day) “learning Briefing” that was designed to share new insights into new malicious code, how to look for new or emerging attacks.
- Developed an out-of-band capability using a virtual machine for analysts to use by going to suspected malicious sites and record the interaction, like registry changes, system call-backs, or downloading software to confirm the event was positive and provide the evidence to the Level III analysts and the forensics team
- Developed specific Use Cases for potential cyber attacks
- Developed key metrics for process improvement for all 4 teams listed above
- Creates effective security event notifications through increased communication Identified strong performers in the group and designated shift leads, assigning additional duties that included monitoring and mentoring the performance of shift personnel
Confidential
Network CyberSecurity SME/Project Manager
Responsibilities:
- Lead Cyber Security projects to completion. Develop requirements, milestones, tasks and activities, and manages stakeholder’s expectations. Conduct risk analysis on security related issues as well as project related issues.
- Conduct the scheduling, planning, design, engineering, deployment, operation, and maintenance of the organizations security tools.
- Developed the Splunk design and install process.
- Wrote SIEM CONOPS, SOP and assisted in the USE Case development for potential malicious actors.
- Provided guidance to the SOC team on the process for Incident Management.
- Provided guidance on what logs and by what priority needed to be ingested by the Splunk SIEM.
- Reviewed the Port Authority’s technical infrastructure to support the security tools, and review configurations and upgrades necessary to implement and maintain them.
- Develop milestones, progress reports, manage vendors and responsible for the standardize security deployment and operating procedures with respect to the use of these tools.
- Reviewed and analyze marketplace technology to help develop the Cyber Security Program.
- Used National Institute of Standards and Technologies (NIST) SP 800 series (RMF) documents as the security framework for securing the PANYNJ network.
- Manage and track activities related to the above efforts to ensure that its use of technologies - and its policies, processes, and procedures - comply with the NIST standards and guidelines.
- Track and coordinate activities related to the Cyber Security Program to ensure that its industrial control systems comply with NIST RMF security practices.
- Organize and consolidate risk assessments on different technologies used, to help determine and prioritize remediation plans. Drafted policies and procedures related to cyber security.
- Based on the NIST Risk Management Framework (SP 800-53 Rev 4), consolidated several vendors’ security assessments and developed a rational and coherent summary for the Port Authority Management to develop an Enterprise Security Enhancement Program.
- Project Manager for several medium to large size projects including; Splunk and Click design, pilot, tuning, and deployment; EnCase design, pilot, tuning, and deployment; Evaluation of 18 security tools that are in different stages of deployment and configuration; Pentest of an ICS; and Network segmentation.
Confidential, New Cumberland, PA
Infrastructure Project Manager
Responsibilities:
- The Defense Logistics Agency ( Confidential ) provides logistical support for all branches of the US Military worldwide. There is over 50,000 servers, desktops, laptops, and mobile devices that need software maintain and configured securely.
- Responsible for all aspects of the development and implementation of software deployment for the entire Defense Logistics Agency assigned projects and provide a single point of contact for those projects that involve the distribution of software updates, security packages, images upgrades Confidential the enterprise level.
- Lead one major infrastructure of over $4 million and several smaller projects. I had 6 direct reports and 24 additional individuals in a matrix environment working on all my projects.
- Take projects from original concept through final implementation. I Interfaces with all areas affected by the project including; senior management, accounting, end users, computer services, vendors, and client services.
- Develop detailed work plans, schedules, project estimates, resource plans, and financial and operational status reports: utilizing SharePoint, MS Project, Scrum and EV.
- Conduct project meetings and is responsible for project tracking using several tools to include Earned Value and Risk Analysis.
- Ensures adherence to quality standards and reviews project deliverables.
- Manages the integration of vendor tasks and tracks and reviews vendor deliverables.
- Provides technical and analytical guidance to all team members. Recommends and takes action to direct the analysis and solutions of problems.
Confidential, Audubon, PA
Sr. Security Analyst
Responsibilities:
- Lead the development, documentation and maintenance of information security policies, procedures, and standards across departments.
- Created and maintained all information system and software security certificate activities.
- Initiated, facilitated, and promoted the activities that created information security awareness throughout organization.
- Monitored and routinely audits compliance of all information security procedures and policies, and ensured consistency of internal controls across departments.
- Lead the creations and maintenance of the information systems disaster recovery and business continuity plans. Including desktop and server backup systems deployment and maintenance.
- Monitored changes in local, state, and federal regulations and accreditation standards affecting information security, and make recommendations to the CIO and other leaders on the need for policy changes.
- Provided oversight and ownership for intrusion detection and response.
- Assisted in system and software architecture and design to ensure that companies assets are appropriately secured Confidential all times.
- Guided the risk assessments and works closely with the company’s auditor and other 3rd party auditors to preempt, mitigate, and swiftly respond to any audit findings that require action. To include prioritizing ongoing needs related to the companies’ SAP ERP environment.
Confidential
Team Lead/Manager
Responsibilities:
- Lead and managed the Confidential Support SOC Team supporting the 24/7/365 SOC that monitors intrusion detection systems ( Confidential the DHS SOC, working with SourceFire sensors through the Defense Center Management Console and ArcSight Enterprise Management System
- Team consisted of 13 individuals; level I, level II analysts, and a forensics team. The level III analysts were government employees who had the ability to reach individuals devices for remediation.
- Revamped SOP for the intrusion detection process and identified new metrics tied to key points in the process, with the goal of reducing time of infection to time of remediation
- Created a weekly (sometimes every other day) “learning Briefing” that was designed to share new insights into new malicious code, how to look for new or emerging attacks.
- Developed an out-of-band capability using a virtual machine for analysts to use by going to suspected malicious sites and record the interaction, like registry changes, system call-backs, or downloading software to confirm the event was positive and provide the evidence to the Level III analysts and the forensics team
- Creates effective security event notifications through increased communication between the SOC team and the Confidential security team Confidential the Mount Weather Emergency Operations Center, ensuring quick resolution to incidents
- Identified strong performers in the group and designated shift leads, assigning additional duties that included monitoring and mentoring the performance of shift personnel
- Implemented a three-point program to reduce false positives: correctly defining the Home Net for all sensors; correctly identifying infrastructure devices; and creating an IP address process for unrecorded networking devices, including rule changes.
Confidential
Information Assurance System Engineer IV/Manager
Responsibilities:
- Managed the installing and securing of control platforms of Drone Aircraft being built for the Confidential
- Used Earned Value Management for reviewing project progress, enabling early forecasting and resolution of cost and schedule issues.
- Provided technical and managerial support to Information Assurance Certification & Accreditation activities, including analysis and evaluation of security concepts, designs, and tests; threat, risk, and vulnerability assessments; security certification Confidential &E; and risk analysis in a software development lifecycle
- Team assessed system vulnerabilities and determined the adequacy of security controls and the level of residual risk in networking devices and software (custom and COTS)
- Managed multiple projects Used DIACAP to secure servers, networking devices, and software; directed running Gold Disk and SRR scans; directed and performed Retina and Nmap scans; and developed Plans of Action and Milestones (POA&Ms)—all leading to Authorization to Operate
Confidential
Senior Information Assurance Security Analyst
Responsibilities:
- Analyzed requests for connection to the SIPRNet to ensure that they met government standards based on the DoDI 8500 series and NIST Special Publication 800 series
- Reviewed network diagrams, scorecards, POA&Ms, and Designated Approving Authority Interim Authorization to Communicate and Authorization to Communicate requests
Confidential
Project Manager/Lead Auditor
Responsibilities:
- Defined scope, gathered requirements, developed tasks and tasks sequence, developed communications plan and risk matrix Managed projects from requirements gathering through closure. Provided SME guidance and Project Manager over site to security audits, risk assessments, and system Confidential &E ( Confidential &E); providing instruction on writing of System Security Plans in compliance with government regulations reviewed, edited, and approved documentation to be given to the customer. Assisted clients write Disaster Recovery Plans and Business Continuity Plans
- Advised team members on conducting Confidential & Confidential and the execution of scans using Foundstone Enterprise, Nessus, ISS, Retina, and Burp Suite scanners, also on proper document results and updating earlier documents
Confidential
Network Administrator
Responsibilities:
- Managed data center operations, leading the design/implementation of WAN connectivity for secure VPN tunneling and for monitoring critical/noncritical systems worldwide
- Designed and implemented a companywide infrastructure plan using VPN and consolidating three companies/networks, including three major sites and 15 remote sites
- Planned and implemented a Windows Active Directory network merger/upgrade and developed and implemented a companywide end-user support process plan
- Oversaw the design, implementation, and management of infrastructure related projects in corporate and regional offices - - including an Confidential implementation using Cisco 3640, 2600, and 1700 series routers and Checkpoint FW1 that connected three locations
- Migrated newly purchased companies to Windows 2000/Exchange from Novell Confidential based networks and performed security analysis of remote offices and main data center