Cyber Security Analyst Resume
2.00/5 (Submit Your Rating)
OBJECTIVE
- Looking to apply my experience and skills to help attain organizational goals and objectives.
- To enhance knowledge for professional growth in the field of Information security and elevate to higher achievements in my career
- Working Knowledge of Confidential SP 800 - 37, SP 800-60, SP 800-53 Rev 4, SP 800-18, Confidential and during documentation review and update
- In-depth understanding and professional knowledge in providing support and guidance to System Owner’s through the Confidential Risk Management Framework System Assessment and Authorization processes, including monitoring C&A artifact compliance, annual self-assessment ( Confidential Confidential ) completion, Contingency Plan Testing and POA&M’s
- Review and update Contingency Plan (CP) using Confidential SP800-34 guidelines.
- Participate in the Confidential 199 process in which Security Categorization takes place and the selection of technical, operational and managerial controls using Confidential SP 800-60 guidelines.
- Perform Security Control Assessments (SCA) according to Confidential Confidential .
- Work effectively in a team environment and participate in collaborative initiatives that foster the mutual exchange of knowledge and expertise
- Ability to multi-task, work independently and as part of a team, share workloads, and deal with sudden shifts in project priorities.
PROFESSIONAL EXPERIENCE
Cyber Security Analyst
Confidential, Washington
Responsibilities:
- Assess the Confidential risk of IT systems documenting them in formal risk assessments and supporting artifacts associated with the A&A process.
- Organize, develop, and present briefings, written summaries, and written reports incorporating narrative, tabular and/or graphic elements.
- Responsible for vulnerability remediation through patching using VA approved methods.
- Implements IT security solutions and assures successful implementation.
- Applies knowledge of security principles, policy and regulations to daily tasking.
- Researches policies, procedures, standards, and guidance, and applies needed changes under specific conditions for the protection of information and information systems.
- Support & review security documentations & scans before submission for ATO.
- Assist with development of security standards and procedures.
Information Security & FISMA Compliance Analyst
Confidential
Responsibilities:
- Prepared and reviewed C&A package for Information Systems.
- Assessed System Security Controls using Confidential .
- Adhered to client security standards and industry best practices
- Documented all operational processes and procedures to optimize support
- Evaluated, tested, coordinated, monitored and maintained information assurance controls.
- Assessed information assurance controls for compliance.
- Assisted with development of security standards and procedures
Information Security Analyst
Confidential - Maryland MD
Responsibilities:
- Ensured that Information Systems security architecture, designs, plans, controls, processes, policies and procedures are aligned with client policies.
- Analyzed and defined security requirements for networks, applications/systems, end user computing, mobility, and data center technologies and solutions
- Determined security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analysis and risk assessments.
- Reviewed and updated Contingency Plan (CP) using local guidelines
- Developed the following documents: Risk Assessment Report, Security Assessment Plan, System Security Plan, Contingency Plan, and Security Assessment Report.
- Developed, reviewed and evaluated Security Plan based on Confidential Special Publications 800-18.
- Prepared and reviewed C&A package for Information Systems.
- Assessed System Security Controls using Confidential .
IT Support
Confidential
Responsibilities:
- Performed data backups and disaster recovery operations.
- Maintained and administered computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations.
- Planned, coordinated, and implemented network security measures in order to protect data & hardware.
- Operated master consoles in order to monitor the performance of computer systems and networks, and to coordinate computer network access and use.
- Performed routine network startup and shutdown procedures, and maintain control records.
- Conferred with network users about how to solve existing system problems.
- Monitored network performance in order to determine whether adjustments need to be made, and to determine where changes will need to be made in the future.
- Analyzed equipment performance records to determine the need for repair or replacement.
- Maintained logs related to network functions, as well as maintenance/repair records.
