Cybersecurity Assurance Engineer Resume
5.00/5 (Submit Your Rating)
Washington, DC
SUMMARY:
- Cyber Security Professional with 8 years of working experience.
- I am seeking a position to bring value and experience to enhance the vision of the organization
- Knowledge of the entire RMF process and its compliance using Confidential publications and standards,
- Working knowledge of Confidential … 18, 115, 137, 128, 30, 34, 37, 63, 200, 53Ar4, 60 vol 1&2, Confidential 37 RMF, FIPS 199, FIPS 200, and FISMA guidelines to comply with Federal and private agencies.
- Support the Security Assessment and Authorization process of the clients’ systems as a Security Analyst
- Utilize FedRAMP requirements to assess cloud systems to ensure the proper security requirements are satisfied.
- Review technical security controls and provide implementation responses to meet requirements
- Document findings in the SAR
- Meet with client to discuss findings and process of remediation
SKILLS:
Tools: Nessus, Splunk, Nmap, Kali Linux, Cain & Abel
Networks: VLAN, LAN, WAN, DNS, Routers, Firewalls, Switches, TCP/IP.
Operating Systems: MS Office (Word, Excel, Outlook, PowerPoint) (5 years)
WORK EXPERIENCE:
Cybersecurity assurance engineer
Confidential, Washington, DC
Responsibilities:
- Serving as the principle advisor to the Information System Owner and Authorizing Official on all matters involving security of the information systems;
- Develop Security Assessment plan (SAP) according to Confidential SP 800 - 53A.
- Determine security controls effectiveness (i.e., controls implemented correctly, operating as intended, and meeting security requirements) using the three basic methods of assessment - Examine, Interview and Test (EIT).
- Assess existing security policies, processes, and templates against Confidential guidance.
- Perform on-site security testing using vulnerability scanning tools such as Nessus.
- Document findings in the Security Assessment Report (SAR) and
- Conduct risk assessments regularly; ensured measures raised in assessments were implemented in accordance with risk profile, and root-causes of risks were fully addressed following Confidential 800-30 and Confidential 800-37.
- Develop Confidential Compliant vulnerability assessments, technical documentation, and Plans of Action and Milestone (POA&M), and Address System Weaknesses.
- Ensure customers are in compliance with security policies and procedures following Confidential 800 53 and Confidential 800-53A.
- Assisting in the development of security policies and procedures for the systems, along with ensuring compliance with those policies and procedures;
Cyber Security Analyst
Confidential, Bethesda, MD
Responsibilities:
- Knowledge of the entire RMF process and its compliance using Confidential publications and standards,
- Working knowledge of Confidential … 18, 115, 137, 128, 30, 34, 37, 63, 200, 53Ar4, 60 vol 1&2, Confidential 37 RMF, FIPS 199, FIPS 200, and FISMA guidelines to comply with Federal and private agencies.
- Acquainted on vulnerability scanning tools and penetration testing
- Experienced in the development of System Security Plans (SSP), Security Assessment Report, Contingency Plans, Disaster Recovery Plans, Incident Response Plans/Training, Memorandum of understanding and Configuration Management
- Skilled in plans, System Security Checklists, Privacy Impact Assessments, POA&M, Authority to Operate (ATO) letters,
- Maintaining detailed knowledge and expertise required to manage the security aspects of the systems which may include physical and environmental protection; personnel security, incident handling, promoting security awareness and training; and day-to-day security operations;
- Assisting in the development of security policies and procedures for the systems, along with ensuring compliance with those policies and procedures;
- Ensuring monitoring of the systems and their operational environment;
- Assisting in the development of and updates to system security documentation;
- Ensuring Plans of Action and Milestones are maintained and remediation of system deficiencies is addressed;
Help Desk Support
Confidential
Responsibilities:
- Accurately document tickets in the ticketing system.
- Provide customer with incident reference numbers, keep customer informed of resolution steps.
- Gather information and respond to emails and calls regarding general knowledge of Confidential Health services program
- Provide troubleshooting support to end user and clients
- Recording and tracking incident reports through ticketing software
- Follow-up with customer to confirm/verify resolution.
- Walk customer through problem-solving process.