We provide IT Staff Augmentation Services!

Information Systems Security Officer Resume

2.00/5 (Submit Your Rating)

Fort Lee, VA

SUMMARY:

  • Results - driven project lead seeking full-time Information Assurance opportunities.
  • Currently serves as the Insider Threat and Cybersecurity SME for a global agency, providing program and policy development, expert analysis, and risk mitigation recommendations.
  • Proficient in evaluating and assessing complex organizations and processes, independently and in collaboration with enterprise teams.
  • Experienced with a variety of applications and systems; able to rapidly diagnose vulnerability, risk, and security penetrations.
  • Capable multi-tasker adept at quickly grasping network environments and technical platforms to competently administer information systems auditing principles.Possesses an

TECHNICAL SKILLS:

Tools: Logrhythm, Encase Suite, IT Forensics Toolkit, D3 Case Management, Evidencetrac, Access Data Forensics Tool Kit (FTK) (Cerberus), Dossier, Talon, Cellebrite, Acunetix, Symantec DLP, NetwiitnessEndpoint Management, Barracuda Message Archiver, Checkpoint, HBSS, Solarwinds, Sourcefire, Site Protector, RSA, Bluecoat, Securonix, Innerview. Splunk, eMASS, Acas, FedRamp, Scap

PROFESSIONAL HISTORY:

Information Systems Security Officer

Confidential, Fort Lee, VA

Responsibilities:

  • Provide trend and anomaly analysis, support to insider threat investigative activities and production of limited scope threat assessments to assist in mitigating identified personnel, physical, and information security vulnerabilities.
  • Serve as a Cybersecurity expert for the program throughout all stages of acquisition, systems engineering, and maintenance processes.
  • Prepare formal briefings and analytic products with reports of findings and recommendations upon which security countermeasures, investigations and remediation actions may be based.
  • Utilize user activity monitoring, databases, data mining and visualization tools in order to discern threats and conduct limited inquiry and testing to prove threat and risk hypotheses for further investigation and resolution.
  • Compare cyber counterintelligence analytic results against known tactics, techniques and procedures employed by adversaries to exploit individuals and networks.
  • Provide Cybersecurity Assessment and Authorization (A&A) services; support NITTF, CCRI, Confidential, and PCI audits.
  • Develop Confidential Information Assurance Certification and Accreditation Process (DIACAP) and Risk Management Framework (RMF) packages.
  • Remediate existing vulnerabilities or develop mitigations that minimize impact, likelihood, or risks, and work with the program to in corporate findings into the system POA&M.
  • Developing proposed policies and Tactics, Techniques, and Procedures (TTP) in support of the Army’s Defense-in-Depth strategy and the Department of Defense Global Information Grid (GIG) Vision.
  • Ensure system designs and implementations are consistent with Department of Defense ( Confidential ) and DON Cybersecurity policies, requirements, and directives.
  • Implement agency wide security awareness training and suspicious activity reporting.

Sr. Insider Threat Analyst

Confidential, Fort Lee, VA

Responsibilities:

  • Under guidance of Confidential serve as Confidential - defined, planned, designed, and evaluated information security systems.
  • Conducted ongoing Insider Threat activity analysis and prepare internal briefs and evidence cases of findings for management review and decision-making
  • Implemented training and awareness of IT security programs for all users
  • Conducted analysis for indicators of Advanced Persistent Threat (APT).
  • Performed vulnerability and cyber security assessments and gap analysis of security program and related systems and networks. Applied necessary controls.
  • Conduct penetration tests against systems and networks
  • Applied digital forensic analysis, intrusion analysis, data recovery, malware analysis, and reverse engineering techniques for identifying and characterizing cyber threats
  • Develop and maintain tools, techniques, countermeasures, and trends related to data hiding, covert communications, encryption, network security, and offensive/defensive cyber operations.
  • Assist in deterring, identifying, monitoring, investigating, and analyzing cyber intrusions
  • Prescribe cyber security best practices and anti-malware techniques to address weaknesses in cyber assets and combat sophisticated threats against those assets.

IT Forensics Analyst

Confidential, San Ramon, CA

Responsibilities:

  • Reviewed and processed cases for senior investigators. Performed forensic investigations of IT assets through the utilization of accepted procedures to document alleged incidents of inappropriate use of corporate assets.
  • Extracted digital data from any computer, server, database storage media, mobile device and guaranteeing its accuracy and reliability for a court of law, if necessary.
  • Participated in Global Security and Law function authorized investigations; multiple interactions with human resources and attorneys. Experience in internal, HR, divestiture and eDiscovery cases.
  • Performed investigative analysis by locating electronic artifacts and subsequently testifying to the methods and protocols involved; worked with LAW LFA-IT to get findings and load for review.
  • Performed evidence handling, by labeling the evidence properly, packaging it and sealing it in order to meet the Federal Rules of Evidence and to fulfill the Forensics Operations Procedures.
  • Maintained confidentiality of information received through interviews and all investigations and legal matters being addressed. Gained knowledge of agile work environment.

Network Security Specialist

Confidential, Fort Lee, VA

Responsibilities:

  • Developed and implemented enterprise information assurance/security standards and procedures following the DIACAP process.
  • Gained experience in the interactions the various IAVAs may have with the STAMIS Support testing as necessary to ensure functionality following the installation of the patch and provide feedback to the ACERT for issues that may exist within the patches.
  • Analyzed results and STIGS from Retina, SCAP, NESSUS or Gold Disk - Platinum level scans in order to make recommendations to System Manager (SM).
  • Built and tested images of SEC-LEE programs: SAAS MOD, PBUSE, SAMS-E, FMTP, ULLS AE, SARSS-1. Experience with Ghostcast Server/Acronis and SCCM in image development/deployment.
  • Established and satisfied information assurance and security requirements based on the analysis of user, policy, regulatory, and resource demands. Consult with vendors on findings.
  • Performed analysis, design, and development of security features for system architectures.
  • Analyzed and defined security requirements for computer systems, which may include mainframes, workstations, and personal computers.
  • Performed vulnerability/risk analyses of c mputer systems and applications during all phases of the system development life cycle.
  • Developed, researched, and maintained proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption.
  • Provided computer forensic support to high technology investigations in the form of evidence seizure, computer forensic analysis, and data recovery.
  • Performed assessment on cloud vendors using FedRamp

Desktop Support

Confidential, Fort Lee, VA

Responsibilities:

  • Assisted in the configuration, installation, commissioning, operation, and trouble-shooting of information technology hardware, software, operating systems and networking issues in support of the Army Logistics University ( Confidential ) and Sustainment Center of Excellence (SCOE/CASCOM) schools.
  • Assisted in the deployment of Windows 7; primary deployment led to an Confidential wing (100+ users).
  • Supported the workload of the student-user training stations, troubleshooting of wired and wireless networks, Confidential, and other issues including: IAVA compliance, personnel account management, classroom system management, and information assurance conformity.
  • Diagnosed and problem-solved for various incoming inquiries and requests, including: replacement
  • Provided technical support to students that may have connectivity or issues operating Standard Army Management Information Systems (STAMIS),BCS3, CRXXI and ATSC
  • Applications: Kanguru imaging systems, Track-It trouble ticket system, and Dame Ware/SCCM.

Helpdesk Analyst

Confidential, Richmond, VA

Responsibilities:

  • Level 1 and Level 2 troubleshooter for technical, functional, hardware, and other peripheral issues in support of more than 10,000 users world-wide.
  • Working familiarity of Confidential and commercial applications and systems, including: SAP, DPACS, Oracle, Fusion, EBS, Red Stone, AMPS, CITRIX, CFOL, Confidential, BES, SCCM
  • Provided ongoing analysis and support for ongoing Windows 7 deployment for local and global users across several military and government installations.
  • Processed, tracked, and managed open/closed work-order service tickets using Magic and Remedy.
  • Supported the installation of new software/hardware configurations; test user systems as required.
  • Performed basic networking maintenance functions such as user creation and assignment of rights and permission in Active Directory. Knowledge of remote access (SMS) and VPNs ( Confidential ).
  • Administered file-backups, system restores, imaging, and software installations.
  • Consistently ranked #1 for Calls Taken and Trouble Tickets Opened/Closed; overall top 10%.

We'd love your feedback!