We provide IT Staff Augmentation Services!

Archer Sme Resume

Washington, DC

TECHNICAL PROFICIENCIES:

Platforms: Windows 7/8/8.1/10, Windows Server 2012 R2, SQL Server, UNIX (Solaris, HP - UX), Linux (Red Hat, Ubuntu), Mac OS, Android, iOS

GRC: NIST 800-53, FING, SOX 404, GLBA, HIPPA, PCI, ISO 27001/2, Vendor Management, Identity and Access Management

Languages: C#, ASP.NET, HTML/HTML 5, FileMaker, PHP, CSS, SQL

Tools: RSA Archer v5.x/6.x, VMware

PROFESSIONAL EXPERIENCE:

Confidential, Washington, DC

Archer SME

Responsibilities:

  • Built bronze medal award winning Customer Automated Security Information System
  • Implemented automatic record permissions to allow bureaus access to view their own records related to their business unit
  • Established data feeds from bureau records questionnaires to security incidents application to include multiple bureau tracking IDs associated with one parent record

Confidential, Richmond, VA

Archer Developer

Responsibilities:

  • Responsible for integration between Confidential asset scanning solution to archer platform
  • Created data feeds to associate vulnerabilities feed from Dell Secure Works to Archer platform
  • Built Technologies Application feed to load IT assets to hardware application, software application, and applications application

Confidential, Fairfax, VA

Sr. RSA Archer Developer

Responsibilities:

  • Supported implementation of CDM platform integration to track and monitor federal assets, vulnerabilities, and metrics to DHS for tracking assets with Federal Information Security Modernization Act ( Confidential ) Framework
  • Converted FY17 Confidential Documents to Questionnaires with Advanced workflow functionality based on workflow diagrams provided by CDM PMO
  • Conducted quality assurance testing and training amongst CDM contributors on a quarterly basis

Confidential, Phoenix, Arizona

Information Security Analyst

Responsibilities:

  • Produce security plans using RSA Archer questionnaires to determine threat and vulnerability impact calculations for Confidential Devices, Software, and Data Transmissions
  • Identified appropriate security controls based on risk and business impact for enterprise and vendor assets
  • Evaluate network diagrams to determine vulnerabilities and lack of security controls between network transmissions in a relevant data set
  • Determine GLBA relevant assets based on questionnaire responses
  • Evaluate the adequacy and effectiveness of IT controls, policies, procedures, processes, initiatives, products and identified issues resulting from internal or external examinations
  • Review effectiveness of SOX controls by running vulnerability scans of the environment to provide evidence of any ineffective general, internal or external controls

Confidential, Phoenix, Arizona

Information Security Analyst

Responsibilities:

  • Developed and maintained a secure database application to track and audit cargo delivery driver wait times using Filemaker Pro 13 and SQL Server
  • Implemented Splunk software to monitor logs, traffic, servers and devices for 6 airport locations.
  • Implement, maintain, and oversee all aspects of the information technology systems, solutions and information forensic events at airport locations
  • Provide high level recommendations on upcoming technology needs and priorities based on airport security and infrastructure standards for technology hardware and software

Confidential, Scottsdale, Arizona

Information Security Analyst

Responsibilities:

  • Implemented security standards for confidential data records stored in school districts student information system to comply with Arizona state HIPPA standards
  • Administrate district's infrastructure environment for students and staff to provide efficient and secure communications and data transmissions.
  • Developed information security and disaster recovery plans in compliance with state standards for mandatory settings and controls for mobile, web, internal and external facing technologies
  • Implemented, monitored and enforced IT-related security procedures, infrastructure processes and best IT practices for students, teachers and administrators based on Arizona Department of Education standards

Confidential, Washington, DC

Information Security Analyst

Responsibilities:

  • Utilized QRadar for vulnerability management within internal applications that correlated with data collection for the accounting audit department
  • Effectively managed the Windows deployment server, patch configurations, capture and create deployment images to keep systems updated and running efficiently
  • Successfully managed virtual computing environment for remote employees, providing patches, port management and VPN configurations
  • Maintained systems high availability and performance monitoring with ITIL best practices

Confidential, Arlington, VA

Information Technology Consultant

Responsibilities:

  • Engineered company network, firewall and server infrastructure for student/employee environment
  • Oversee the daily performance of windows computer systems, server 2008 R2 and network functionality to ensure minimal end user downtime
  • Prepared evaluations of software and hardware, and implement improvements or upgrades to prevent external international risk
  • Conducted office automation feasibility studies, including workflow analysis, space design or cost comparison analysis

Confidential, Falls Church, VA

Database and Technology Coordinator

Responsibilities:

  • Established file sharing system to share files across the organization with a centralized cloud storage system using Confidential protocol
  • Responded to the organization's technology use and needs and recommended improvements, such as hardware and software upgrades for office feasibility
  • Coordinated recruitment and selection of project personnel for development of new web application to automate form submissions
  • Evaluated the organization's technology use and needs and recommended improvements, such as hardware and software upgrades, and security standards requirements for accredited institutions

Hire Now