We provide IT Staff Augmentation Services!

Information Assurance/alternate Information System Security Officer Resume

5.00/5 (Submit Your Rating)

SUMMARY:

  • 7+ years of experience in IT Security positions within Federal organizations, leading and managing network security, vulnerability management.
  • Proficient in Security Assessment and Authorization process from initiation to continuous monitoring.
  • Skilled in the development of security plans (SP), Contingency Plans, Disaster Recovery Plans, Incident Response Plans/Training, Configuration Management Plans, System Security Checklists, Privacy Impact Assessments, POA&M, Authority to Operate (ATO) letters, FISMA Reports, Standard Operating Procedures (SOP)
  • Possesses in - depth ability performing information security risk assessments and analysis, risk mitigation in large-scale networked application environments.
  • Performed risk analysis, assessment testing and analysis utilizing tools such as Nessus and others to support the testing process.
  • Testing and Assessing Network Infrastructures, Data Warehouses, Web Applications, Oracle Databases, Application Servers, Windows and Unix/Linux systems, Penetrating testing, PCI (DSS), Security Test & Evaluation, Security Training, VM ware, Mainframe- RACF, TAF, IDEA, CSAM, XACTA IA Manager, eMASS, NESSUS, Microsoft SharePoint, Confidential Review and system configuration.
  • Possesses excellent analytical/strong initiative and qualifications required to excel and succeed.
  • Continuously upgrading and readily prepared to take on new challenges, absorb and easily adapt to any emerging technology.

EXPERIENCE:

Confidential

Information Assurance/Alternate Information System Security Officer

Responsibilities:

  • Assist in the development of System Security Accreditation Agreement (SSAA) documentation in accordance with the Confidential guidelines
  • Review and apply Command Cybersecurity policies, Information Assurance policies
  • Familiar with Risk Management Framework (RMF), ACAS and eMASS
  • Develop supporting documentation for Interim Authority to Connect (IATC), Interim Authority to Operate (IATO), and Authority to Operate (ATO)
  • Facilitate security and site surveys
  • Member of the configuration control board evaluates the security impact of purpose system change to verify compatibility with current IA policy and standard.
  • Certification Testing & Evaluation (CT& Confidential ) and operational Security Testing & Evaluation ( Confidential & Confidential )
  • Respond to FISMA and IA data calls and perform task as directed by the Government lead
  • Senior IA Specialist or system owner leading to the assurance that the IA requirements are met
  • Liaison with various Government agencies and contractors to process C&A documentation for final approval and Independent Verification and Verification (IV&V) of technical documentation
  • Ensure that all monitored systems comply with the DoD Gold disk, STIGs, IAVA, IAVB, IAV-TA, Security Control procedures in addition to FISMA requirements
  • Report on all security, IA, and C&A compliance requirements

Confidential

Information Assurance Analyst

Responsibilities:

  • Conducting the following annual information assurance security requirements and completing documentation for new/existing OBO Major Applications and General Support Systems (A&A) leading to successful ATOs.
  • Implement Confidential guidance that is pertinent to Risk Management Framework
  • Responsible for conducting interviews with application and system developers to document system operation
  • Assist application and system developers with documenting control implementation
  • Conduct Plan of Action and Milestone review
  • Ensure Implementation of System Technical Implementation Guide ( Confidential ) and Security Readiness Review.
  • Conduct and coordinate annual control assessments and contingency plan test
  • Mentors team members in establishment, evaluation, and reporting upon risks and controls in the IT and business environments.

Confidential

Information Security Analyst

Responsibilities:

  • Responsible for all phases of C&A to ensure compliance and provide guidance on IT Security requirements to assigned stakeholders.
  • Assist in developing and executing the agency Certification & Accreditation
  • Assist in developing unified guidelines and procedures for conducting certifications and/or system-level evaluations of federal information systems and networks including the critical infrastructure
  • Advise the Government on new standards and make recommendations on new IT Security technologies to improve efficiencies.
  • Conduct C&A Kick-off Meetings; Prepare the Security Test & Evaluation ( Confidential & Confidential ) Plan; Conduct the Confidential & Confidential Kick-off Meeting; Conduct the Confidential & Confidential Execution via document examination, interviews and manual assessments; Analyze automated scan results; Conduct Step 4, Self-Assessment of the RMF; Populate the Requirements Traceable Matric (RTM) with results of Confidential & Confidential ; Perform Risk Analysis; Create a Security Accreditation Report (SAR); Create a Plan of Action and Milestones (POA&M); Conduct Confidential & Confidential Findings Meeting with the System Owner, ISSO and other system personnel as required.
  • Risk Management Framework that is the 6 step of RMF, Confidential 800-37 steps in the security Assessment and Authorization (A&A) document from Categorize information system to follow-up Monitoring Security Control
  • Communicate with ISSO on continuous monitoring activities related to Plan of Action and Milestone closures, waivers and exceptions;
  • Coordinate courtesy scans with ISSOs and Security Engineers as requested by assigned systems;
  • Advise new system development teams on Security Policies and Technical Standards;
  • Track security activities of assigned systems and brief senior leadership on said activities;
  • Attend Security Training as requested by senior leadership;
  • Advise ISSOs on successful completion of System Security Plans, Contingency Plans, FIPS 199 and Confidential -Authentication Workbooks.
  • Responsible for ensuring assigned systems are decommissioned according to Media Sensitization
  • System Technical Implementation Guide ( Confidential ) requirement are maintained

Confidential

Risk Management Analyst

Responsibilities:

  • Develop guidance, processes, and procedures for the secure configuration and management of IT-enabled medical devices throughout the SDLC.
  • Coordinate with VA's MDPP Working Group, which is comprised of client subject matter experts and stakeholders, to address medical device security issues.
  • Serve as an author for deliverables - primarily policy and procedure documentation - but also bulletins, process flows, roles and responsibilities, and presentations. Using technical knowledge, provide input to other MDPP work products such as checklists, bulletins, and guidance documents.
  • Assist in the development of presentations for training VA personnel on new guidance
  • Perform guidance for the communication on medical device security needs, risks and controls
  • Conduct Risk Assessments in according to Confidential SP 800-30

Confidential

IT Security Analyst

Responsibilities:

  • Conduct meetings with the IT team to gather documentation and evidence about their control environment.
  • Perform Security Categorization (FIPS 199), Privacy Threshold Analysis (PTA), Confidential -Authentication with business owners and selected stakeholders.
  • Develop and conduct Confidential & Confidential (Security Test and Evaluation) according to Confidential SP 800-53A.
  • Apply current computer science technologies and Information Assurance (IA) requirements to the analysis, design, development, evaluation, and integration of computer/communication systems and networks to maintain an acceptable system security posture throughout the lifecycle of multiple national level mission system.
  • Develop, maintain, and communicate a consolidated risk management activities and deliverables calendar.
  • Work with business process owners to ensure timely identification and remediation of jointly owned risk related issues and action plans.
  • Perform comprehensive Security Control Assessment (SCA) and prepare report on management, operational and technical security controls for audited applications and information systems.
  • Review audit logs and provide documentation guidelines to business process owners and management

Confidential

IT Security Analyst

Responsibilities:

  • Conducted FISMA-based security risk assessments for various government contracting organizations and application systems - including interviews, tests and inspections; produced assessment reports and recommendations; conducted out-briefings.
  • Documented and reviewed System Security Plan (SSP), Security Assessment Report (SAR), Security Plan of Action and Milestones (POA&M), Authorization letter/memorandum (ATO).
  • Assisted with review of policy, security alerts, guidance, regulations and technical advances in IT Security Management
  • Utilized processes within the Security Assessment and Authorization environment such as system security categorization, development of security and contingency plans, security testing and evaluation, system accreditation and continuous monitoring.
  • Contributed to initiating FISMA metrics such as Annual Testing, POA&M Management, and Program Management.
  • Communicated effectively through written and verbal means to co-workers, subordinates and senior leadership.

We'd love your feedback!