We provide IT Staff Augmentation Services!

Information Security Analyst Resume

2.00/5 (Submit Your Rating)

SUMMARY:

  • An Information Security Analyst with vast experience in Managing and Protecting Enterprise Information Systems, Network Systems and Operational processes through Information Assurance Controls, Compliance Verifications, Risk Assessment, Vulnerability Assessment in accordance with NIST, FISMA, OMB and industry best Security practices.

PROFESSIONAL EXPERIENCE:

Information Security Analyst

Confidential

  • Develop, review and update Information Security System Policies, System Security Plans (SSP), and Security baselines in accordance with NIST, FISMA, OMB, NIST SP and industry best security practices.
  • Develop and update System Security Plan (SSP), Privacy Impact Analysis (PIA), System Security Test and Evaluation (ST&E) and the Plan Of Actions and Milestones (POA&M)
  • Designate systems and categorize its C.I.A using FIPS 199 and NIST SP
  • Develop policy and procedural controls relating to Management, Operational and Technical Controls for the Organization.
  • Conduct Security Control Assessment on General Support Systems (GSS), Major Applications and Systems to ensure that such Information Systems are operating within strong security posture.
  • Update IT security policies, procedures, standards, and guidelines according to department and federal requirements.
  • Review and update some of the system categorization using FIPS 199.
  • Carry continuous monitoring after authorization (ATO) to ensure continuous compliance with the security requirements.
  • Put together Authorization Packages (SSP, POA&M and SAR) for Information systems to the Authorization Officer.
  • Develop Security Assessment Plan (SAP) to initiate Security Assessment for low, moderate and high control information systems.

System Analyst

Confidential

  • Conducted kick - off meetings to collect systems information and categorize systems based on NIST SP
  • Developed security control baseline and tested plan used to assess and implement security controls
  • Created and updated the following Security Assessment and Authorization (SA&A) artifacts; FIPS
  • 199, Risk Assessments Report (RAR) Privacy Threshold Analysis (PTA), Privacy Impact Analysis
  • (PIA), Contingency Plan, Security Test and Evaluations (ST&Es), E-Authentication, Plan of Action and Milestones (POAMs).
  • Met with the system team to collect evidence, develop test plans and procedures and document test results.
  • Designed and Conducted walkthroughs, formulated test plans, tested results and developed remediation plans for each area of the testing.
  • Conducted FISMA complaint security control assessments to ascertain the adequacy of management, operational, technical privacy controls.
  • Examined events logs for irregularities. Identified irregularities are then reported as incidents. The incident response is then initiated to mitigate these irregularities.
  • Involved in security incident management in order to mitigate or resolve events that have the potential to impact the confidentiality, availability, or integrity of information technology resources.
  • Created and maintained security metrics in order to help senior management to make decisions.
  • Provided support to internal and external audit teams in gathering evidence to validate controls
  • Interviewed ISSOs, System Owners System Engineers and reviewed existing system documentations in order to make an objective assessment if the system complied with established standards.

Helpdesk Support

Confidential

  • Performed Software/Hardware installation, Maintenance, repair, Update and testing.
  • Installed and configured Microsoft Office Suites on multiple machines.
  • Configured and implemented network interfaces for a Windows Network.
  • Troubleshot and resolved TCP/IP connectivity problems.
  • Created new procedures to improve company’s productivity in the management of information systems
  • Utilized tools to track, record, and transfer request orders and incident tickets
  • Performed network administration functions, set up network user accounts/permissions, reset passwords, and administer group policies.
  • Installed, configure, re-image and maintain desktop systems, copy and scan documents.

We'd love your feedback!