Information Assurance Resume
3.00/5 (Submit Your Rating)
SUMMARY:
- Knowledge of and experience with Federal security regulations/standards/processes including FISMA, FIPS, NIST.
- Experienced IT Support/cyber security Analyst with strong analytical skills and a broad range of computer expertise.
- Excellent problem - solver, able to learn new technology.
- Very good working in a team and independently.
- Experience in conducting cyber security capability validations in accordance with established practices and standards.
- Good understanding of A&A activities, including the preparation and maintenance of information security certification and accreditation documentation, such as Systems Security Plans (SSP), and Plan of Actions and Milestones (POA&M).
PROFESSIONAL EXPERIENCE:
Confidential
Information Assurance
- Implement risk management framework based on the guidelines provided.
- Prepare and review all security and assessment and authorization packages for completeness in line with the security standard.
- Examine system documentation to determine if the system security plan/document is accurate, updated and includes description of the information system,
- Provide recommendations to develop methods and procedures to assess the management, operational and technical security control.
- Conduct kick-off meetings with system owners to review SA &A process.
- Use the assessment and management tool to manage all SA&A activities and make sure we're compliance.
- Review IT security change requests (SCR) and perform security impact assessment and evaluation
- Evaluate vulnerability scan results.
Confidential
Cyber security Assessor
- Assists in the maintenance and assurance of information systems to protect data from unauthorized users.
- Experience in performing the 6 steps of the A&A process: security categorization, select controls, implement, assess, authorize and monitor security controls.
- Ability to use assessment and management tool to make sure the systems are in compliance.
- Review system security plan (SSP) for accuracy and updates.
- Experience in reviewing A&A packages based on NIST standards for general support systems and major applications.
- Participates in cyber security planning and implementation.
- Provide input to management on appropriate FIPS 199 impact level designations and identify appropriate security controls based on characterization of the general support system or major applications.
- Experience in preparing Authorization & Accreditation (A&A) packages for approval of an Authorization to Operate (ATO)
- Conduct kick-off meetings/interviews with system owners and everyone connected to the system to review documentations, screen shoots and other evidence on how their controls are being implemented.
- Perform comprehensive Security Control Assessment and write reviews for management, operational and technical security controls.
- Ability to audit systems, databases and perform vulnerability assessment.
- Good knowledge of NIST Authorization & Accreditation (A&A) processes, NIST policies and documents, NIST Risk Management Framework, Federal Information Processing Standards (FIPS) and FISMA requirements.
Confidential
Computer support Specialist
- Windows workstations and application maintenance, user account maintenance
- Install, troubleshoot, repair and perform preventive maintenance on all IT equipment on site
- Support and maintain system applications of all assigned locations
- Training users on different in house applications and operating systems
- Processing trouble tickets, maintain user accounts and outlook email setup.
- Travel to different AO for site stand up or maintenance (imaging PCs, installation of applications and set up Printers)
Confidential
Senior Network/Systems Administrator
- Provided technical support for all users, and very good in following up with users, excellent skills
- Ensure that all workstations are current on drivers, patches and security updates.
- Troubleshoot all PCs, laptops, network scanners, and all printers network connectivity issues
- Set up of all new workstations, and printers and responds to complex technical hardware and software issues
- Troubleshoot all hardware and software: IE browser, MS Outlook, Cisco VPN and other custom designed products
- Trained users and other junior technicians how to perform some task.
- Break/fix, deployment of hardware, ghost image desktop PCs and laptops, and complete hardware installations for E
