We provide IT Staff Augmentation Services!

Information Systems Security Officer Resume

PROFESSIONAL EXPERIENCE:

Confidential

Information Systems Security Officer

  • Performed Certificate Management, conducted System and Network Vulnerability Scans, and performed Security Device Maintenance.
  • Set - up of Information Assurance (IA) processes, system access procedures, encryption management, virus protection policy, network scans, and system intrusion detection.
  • Created & enforced Harris-IS policies for Operating Systems
  • Implemented & monitored customer IA policies (NASA Baseline Standards)
  • Performed Asset Sanitization/Disposal
  • FIPS140-2 certified Device configuration and management
  • Provided Technical Guidance to programs
  • Monitored system posture & risk level
  • Supported Certification & Accreditation requirements for program life cycle - from system proposal to system disestablishment
  • Performed Data Transfers - Approve and execute
  • Performed incident response communication, equipment handling, cleanup management, customer coordination Media Management - approvals, tracking, storage, disposal
  • Performed Annual System Review - Risk assessment, Control Assessment, Inventory tracking
  • Performed Antivirus Scans and Updates (DAT Files)
  • Performed System Security Plans- draft, review, updates/maintain records
  • Managed and Coordinated Network Updates & Maintenance
  • Performed Software Requests - approvals, documentation, coordination with user & System Admin
  • Performed Disaster Recovery - documentation/update
  • Performed Information Security requirement planning
  • Attended Customer meetings- Program Reviews
  • Performed Communication with or Designated Accrediting/Approving Authority (DAA)
  • Performed ISSO Related Training as required by customer
  • User hands-on training for IS

Confidential

Information Systems Security Officer

  • Ensured that security requirements for the assigned major application or general support system are being or shall be met.
  • Ensured that requests for security authorization (also referred to as certification and accreditation or C&A) of assigned major application or general support system is completed in accordance with the published procedures.
  • Ensured that protective measures for physical security threats are in place.
  • Ensured compliance with all legal requirements concerning the use of commercial proprietary software, e.g., respecting copyrights and obtaining site licenses.
  • Maintained an inventory of hardware and software within the program/development offices or field site facility.
  • Coordinated the development of a Contingency Plan and ensured that the plan is tested and maintained in Xacta.
  • Ensured risk analyses are completed to determine cost-effective and essential safeguards.
  • Ensured preparation of security plans for sensitive systems and networks.
  • Attended security awareness and related training programs and distributing security awareness information to the user community as appropriate.
  • Reported IT security incidents (including computer viruses) in accordance with established procedures.
  • Reported security incidents not involving IT resources to the appropriate security office.
  • Provided input to appropriate IT security personnel for preparation of reports to higher authority concerning sensitive and/or national security information systems.
  • Created and remediated Plan of Action & Milestones (POA&M) within Xacta.

Confidential

Jr. Cyber Security Analyst

  • Monitored Computer Incident Response Team (CIRT) mailbox in regard to ticket creation in Remedy 8.1
  • Conducted cyber threat analysis implemented by security information and event management (SIEM) technology such as Splunk.
  • Monitored incoming network traffic via FireEye, Splunk, and RSA Secure Analytics for pcaps (packet capture).

SaiTech

Systems Administrator

  • Provided desk side support to end users.
  • Performed vulnerability patches and windows security updates to Windows 7 machines.
  • Performed security updates on Barracuda Load Balancers.
  • Performed software patching to Windows 2008 Server.
  • Member of Change Control Board (CCB) for any and all changes to the Network Integration Center (NIC) for NASA shuttle/probe launches.
  • Deployed appropriate security software and apply all appropriate security patches to systems via Dell KACE.
  • Performed vulnerability scanning on systems before connection to the GSFC CNE domain.
  • Supported detection and resolution of security incidents.
  • Ensured that all computer system users are aware of policies and issues related to GSFC security.
  • Ensured that timely vulnerability security scanning is performed on ISD computer systems, routinely and on-demand.
  • Proactively identified potential security weaknesses in computer systems.
  • Provided periodic reporting on the status of computer systems security posture to the appropriate GSFC personnel.

Confidential

Proprietary Systems Specialist II

  • Provided desk side support to end users.
  • Installed various software on end users computers via Remote Desktop.
  • Provided Blackberry and iPhone support with password resets and reactivations via the Blackberry Enterprise Server/Airwatch.
  • Provided after hours support for users within a one hour response time via email or phone
  • Assisted with Ethernet patching for port activations and deactivations.
  • Assisted the special projects team with the migration of Blackberries to the iPhones as well as the configuration process of the iPhone 5c.
  • Conducted iPhone 5c training for technicians and end users.
  • Provided Video Teleconference (VTC) support.
  • Assisted with the deployment of Cisco Voice over Internet Protocol (VOIP) phones.
  • NTFS Folder Permissions for network folders.
  • Created user accounts for Relativity Version 8 Database.
  • Assisted with Group Policy Management and Database Management via Windows Server 2008 r2 and Active Directory.

Confidential

Proprietary Systems Specialist I

  • Provided phone support to end users.
  • Provided remote assistance to end users using dameware and Microsoft Remote Assistance.
  • Created new user profiles, email accounts, distribution lists, shared email accounts, group calendars, and access permissions via Windows Server 2008 r2 and Exchange Management Console 2010.
  • Provided password resets for users that have locked their accounts via Active Directory.
  • Provided Personal Identification Number (PIN) resets for Personal Identification Verification (PIV) cards using the USAccess System.

Confidential

Security Specialist

  • Verified clearances through the use of Joint Personnel Adjudication System (JPAS)
  • Verified user information through the use of DISA Corporate Management Information System (CMIS)
  • Created and updated users information through use of Lenel OnGuard Security Management System
  • Performed fingerprinting of the FD-258 for background investigations.

Confidential

IT Specialist

  • Performed IT disconnects and reconnects of personal computers, laptops, and docking stations.
  • Supervised and escorted uncleared contractors for dismantling government computer equipment.
  • Documented and inventoried computer equipment being moved for the Base Closure and Realignment Commission (BRAC) transition to Fort Meade, MD.

Hire Now