We provide IT Staff Augmentation Services!

Information Security Analyst Resume

4.00/5 (Submit Your Rating)

MD

SUMMARY:

  • An Information System Security Analyst proficient in building security authorization packages using NIST Publications A 0 - 60, FIPS 199, FIPS 200, OMB A-130 APP. III. Vast knowledge of Federal Information Processing Standards (FIPS) 199 System Categorization, System Security Plan (SSP), Security Assessment Plan (SAP), Plan of Action &Milestone (POA&M), Risk Assessment (Impact Analysis) and Contingency Planning

PROFESSIONAL EXPERIENCE:

Confidential, MD

Information Security Analyst

  • Ensure proper system categorization using NIST and FIPS 199; implement appropriate security controls for information system based on NIST rev 4 and FIPS 200. Conduct security assessment interviews to determine the Security posture of the System and to Develop a Security Assessment Report (SAR) in the completion of the Security Test and Evaluation (ST&E) questionnaire using NIST SP A required to maintain Company Authorization to Operate (ATO), the Risk Assessment, System Security Plans, and System Categorization.
  • Reviewing, maintaining, and ensuring all assessment and authorization (A&A) documentation is included in the system security package.
  • Perform information security risk assessments and assist with the internal auditing of information security processes. Assessed threats, risks, and vulnerabilities from emerging security issues and identified mitigation requirements.
  • Work with system owners to develop, test, and train on contingency plans and incident response plans.
  • Tests, assess, and document security control effectiveness. Collect evidence, interview personnel, and examine records to evaluate effectiveness of controls.
  • Review and update remediation on plan of action and milestones (POA&Ms), in organization’s cyber security assessment and management (CSAM) system. Work with system administrators to resolve POA&Ms, gathering artifacts and creating mitigation memos, residual risk memos and corrective action plans to assist in the closure of the POA&M.
  • Assist team members with proper artifact collection and detail to client’s examples of artifacts that will satisfy assessment requirements.
  • Review security logs to ensure compliance with policies and procedures and identifies potential anomalies.
  • Update and review A&A Packages to include Core Docs, Policy & Procedures, Operations and. Maintenance of Artifacts, SSP, SAR, FIPS 200, FIPS 199, and POAM
  • Collect Operation and Maintenance artifacts on an ongoing basis so that Security Control Assessment (SCA) is seamless.
  • Upload supporting documentations into the System’s Artifact Libraries, Google Docs and CSAM.

Confidential, MD

Cyber Security / Compliance Analyst

  • Performed Federal Information Security Management Act (FISMA) audit reviews using NIST rev 1
  • Participate in client interviews to determine the security posture of the System.
  • Supported the Information Assurance (IA) team to conduct risk assessments, documentation for Security Control Assessment, vulnerability testing and scanning.
  • Prepare and submit Security Assessment Plan (SAP) to CISO for approval.
  • Develop and update Security Plan, Plan of Action and Milestones (POA&M).
  • Monitor controls post authorization to ensure continuous compliance with the security requirements.
  • Prepare and update the Security Assessment Report (SAR)
  • Analyze and perform technical and non-technical security risk assessments of computer and network systems via network scans, interviews, documentation review and walk-through of both new and existing federal information systems for FISMA compliance using NIST guidelines and controls.
  • Knowledge of IT security architecture and design (firewalls, Intrusion Detection Systems (IDS), Virtual Private Networking (VPN), Security Monitoring Tools and Intrusion Prevention Systems (IPS).
  • Conduct Risk Assessment on all system changes.
  • Re-assess remediated controls for effectiveness.

Confidential, MD

Information Security Analyst

  • Participate in client interviews to determine the security posture of the System.
  • Supported the Information Assurance (IA) team to conduct risk assessments, documentation for Security Control Assessment, vulnerability testing and scanning.
  • Prepare and submit Security Assessment Plan (SAP) for approval.
  • Conducted initial assessment, and performed continuous monitoring of security control post assessment.
  • Worked with System Owner to develop and perform periodic testing of contingency and disaster recovery plan.
  • Develop and update Security Plan, Plan of Action and Milestones (POA&M).
  • Monitor controls post authorization to ensure continuous compliance with the security requirements.
  • Identify new, maintain and disposal of information system inventory in accordance with established policies and procedures, ensure accurate configuration management and property accountability.
  • Modify and maintain procedures, operational process document, change control document, operational checklist, detailed system specifications and procedures.
  • Develop training materials for employees on data protection.
  • Conducted security assessment interviews to determine the Security posture of the System and to develop a Security Assessment Report (SAR) in the completion of the Security Test and Evaluation (ST&E) questionnaire using NIST SP A required to maintain Company Authorization To Operate (ATO), the Risk Assessment, System Security Plans, and System Categorization.
  • Performed information security risk assessments and assist with the internal auditing of information security processes. Assessed threats, risks, and vulnerabilities from emerging security issues and also identified mitigation requirements.
  • Exposed to Vulnerability scanning and assessment tools such as Retina, Nessus and CSAM.

We'd love your feedback!