We provide IT Staff Augmentation Services!

Physical Security Research Specialist Resume

4.00/5 (Submit Your Rating)

Herndon, VA


Standards: COSO, COBIT 4.1, Sarbanes-Oxley Act, SAS-70, ISO 17799, NIST 800-Series, FIPS, FISMA, FEDRAMP

Software/Platform/Artifacts: MS Office Suite (PowerPoint, Excel, Access), Fips199, NIST 800-37 SORN, E-Autantication, PTA, PIA, RA, SSP, CP, CIPT, ST&E, SAR, POA&M, ATO, NIST 800-53A, ISA


Confidential, Herndon, VA

Physical Security Research Specialist


  • Conduct surveys and analyses to identify criticality and vulnerability of facilities or sites.
  • Consult with operating personnel and other security specialists to devise protection systems.
  • Inspect, analyze, and evaluate security systems within the client’s organization.
  • Assess the adequacy of inventory and management control systems.
  • Recommend appropriate corrective action where security requirements are not being observed.
  • Research on new trends and developments in the new technology to be deployed; incorporates new developments as appropriate; and ensures processes; policies and practices are interpreted and applied consistently and effectively.
  • Carries out studies and analyses to define business requirements and alternative options for improvements for a variety of operational, procedural, and management issues.
  • Prepare concise, comprehensive reports, flow charts, statistical analyses, graphs and other documents.
  • Assist with the development and reporting of performance measurements.

Confidential, Sioux Falls, SD

Information Security Analyst


  • Performing analysis, maintaining security requirements dealing with application authorization, ID provisioning and ID management to minimize access control issues and segregation of duty (SOD) concerns
  • Using established processes to promote security changes following documented procedures
  • Monitoring all aspects of IAM processes for security violations.
  • Assist in establishing minimum security baselines according to risk level
  • Defining process for certifying dat information systems meet minimum security requirements and for obtaining management authorization to operate an information system
  • Monitoring compliance with information security requirements and assist in deploying security controls
  • Conduct third party risk assessments aligned with ISO and NIST standards
  • Review completed SIG questionnaires based on vendor inherent risk
  • Perform vendor documentation review and analysis
  • Perform onsite assessments of vendor facilities
  • Identify and measure risk associated with vendor security controls

Confidential, Jefferson City, MO

IT Security Analyst


  • Held meetings with CISO and system stakeholders prior to assessment engagements.
  • Prepared and submitted Security Assessment Plan (SAP) to CISO for approval.
  • Used NIST SP 800 - 37 Guide in applying the Risk Management Framework to Federal Information Systems
  • Worked with the NIST SP 800-53 Security and Privacy Controls for Federal Information Systems.
  • Developed and conducted Contingency Plan and Test
  • Developed and updated system security plan (SSP), plan of action and milestone (POA&M).
  • Monitored controls post-authorization to ensure continuous compliance with security requirements.
  • Used vulnerabilities assessment tools such as Retina, Nessus and MBSA vulnerability scanners to detect potential risks on single and multiple assets across the enterprise network.
  • Created reports detailing the identified vulnerabilities and the step taken to remediate them.
  • Knowledgeable in Risk Assessment and Risk Management

Confidential, Jefferson City, MO

Information Security Administrator


  • Analyzing and defining security requirements for a variety of IT issues.
  • Designing, developing and implementing solutions to IT security requirements at various levels of the agency’s System Development Life Cycle (SDLC).
  • Gathering, analyzing and organizing technical information about systems, existing security products and ongoing programs.
  • Performing risk analysis dat also include risk assessments.
  • Performing vulnerability checks and assessment


Junior Fraud Analyst


  • Reviewed incoming leads to determine if further investigation is warranted.
  • Conduct independent reviews resulting from the discovery of situations dat potentially involve fraud, waste and abuse.
  • Review information contained in standard claims processing system files (e.g., claims history, provider files) to determine provider billing patterns and to detect potential fraudulent or abusive billing practices
  • Compile and maintain various documentation and other reporting requirements
  • Assisted on projects, audits, and other tasks reviewed and conducted in-depth analysis on regulatory and legal changes dat affected the company.
  • Prepared written reports and analyzed for compliance management.
  • Assisted on projects, audits, and other tasks as assigned. Managed projects required to implement regulatory and legal changes, which included the implementation of project goals, coordination of efforts between multiple departments and monitoring for effectiveness

We'd love your feedback!