We provide IT Staff Augmentation Services!

Systems Auditor Resume Profile

4.00/5 (Submit Your Rating)

Experience Summary

  • Confidential has over twelve years experience in Information Technology and is certified in information systems auditing as well as risk and information systems controls. He has a strong foundation in Information Systems, Security, Compliance, Audit, and Management processes. He has conducted assessments, such as SAS70, NAIC MAR, HIPAA, and so forth, to determine that internal controls are compliant with industry best practices and government standards based on NIST, FISCAM, STIG and other regulations. He has implemented, interpreted and monitored security policies and procedures on various processes, such as business continuity, vulnerability scanning, and configuration management as well as system platforms, such as z/OS RACF , Windows Active Directory, Novell, UNIX and RSA SecurID to remain compliant with standards set by HIPAA, CMS, and the Department of Defense.
  • Confidential is an Adjunct Instructor for South University in areas such as IT Security: Access and Protection, IT Security Information Assurance, and Applications of Management Information Systems. He possesses a Masters degree in Computer Resources and Information Management with an emphasis in security.

Employment History

Confidential

Information Systems Auditor

conducts audits of I/S operations and data processing systems to verify that I/S plans and objectives are met and to verify that appropriate internal controls are present, functioning, and effective for all lines of business. He conducts security reviews to make sure that security systems are appropriately designed and effectively implemented, and conducts assessments to determine that internal controls are compliant with industry best practices and government standards based on NIST, FISCAM, STIG and other regulations.

Confidential

System Security Officer

was responsible for the delivery of system security activities for ESD task orders as outlined in the CMS Business Partners System Security Manual BPSSM . In his capacity as System Security Officer, he made sure that ESD system security requirements were considered during budget development and execution, reviewed compliance of the CMSRs and reported vulnerabilities with management upon release of draft and final documents publication, and made sure that IT technical and IS controls were incorporated into new ESD IT systems by participating in all business planning groups and reviewing all new systems/installations and major changes. Mr. Briggs made sure subcontracts were following ESD security requirements involving the handling, processing, and/or analysis of Medicare data and participated in all official external evaluations of the ESD program. Additionally, he facilitated the completion of the ESD Information Security Risk Assessment, made sure that an operational IT Systems Contingency Plan was in place and tested for ESD task orders, made sure the ESD monthly Plan of Action and Milestones POA M were updated in CFACTS, defined the DISA STIG configuration standards for the ESD systems and coordinated with appropriate teams to ensure implementation and compliance to the DISA STIGs, and coordinated activities related to ESD Application Security Test and Evaluations ST E in conjunction with account staff, auditors, application support and client.

Confidential

Information Systems Auditor

conducted audits of I/S operations and data processing systems to verify that I/S plans and objectives are met and to verify that appropriate internal controls are present, functioning, and effective for all lines of business. He conducted security reviews to make sure that security systems are appropriately designed and effectively implemented, and conducted assessments to determine that internal controls are compliant with industry best practices and government standards based on NIST, FISCAM, STIG and other regulations.

Confidential

managed a staff of three that was responsible for monitoring network users for policy compliance and developing adequate audit records for oversight reporting to make sure that the company was operating at high security standards. He acted as a liaison for internal and external auditors, providing security reports and other pertinent information to complete in depth audits of company procedures and systems. In addition, he implemented, interpreted and monitored security policies and procedures on various operating system platforms, such as z/OS, Windows 2000/2003 servers, Novell servers and RSA SecurID to remain compliant with standards set by HIPAA, CMS, and Department of Defense.

Confidential

managed staff of five responsible for system security administration functions, to make sure security requests were processed in accordance to standard operating procedures and service level agreements. He supported I/S projects performing security assurance reviews for new and modified systems on various operating system platforms, such as Windows 2000/2003 servers, Novell servers and RSA SecurID.

We'd love your feedback!