Information Security Resume Profile
SKILLS SUMMARY
- Computer Technology amp Administration 27 Years
- Technical Training Development amp Instruction 30 Years
- Computer Security amp Information Assurance 26 Years
- Supervision amp Project Management 18 Years
- Communications Technology Maintenance amp Repair 39 Years
- Database Development amp Administration 10 Years
- Software amp Systems Engineering 17 Years
- Certification amp Accreditation 14 Years
- Computer Modeling and Simulation Development 12 Years
- Systems Analysis amp Forensics Evaluation 12 Years
- Technical Writing amp Manual Development 32 Years
- Computer Hardware amp Interface Design 11 Years
- Tactical Systems Support amp Development 8 Years
- Computer amp Incident Response Support 17 Years
- Information Technology Architecture SOA amp Web Services Support 11 Years
- Classified Program Support 27 Years
OVERALL EXPERIENCE
Confidential
Information Security Forensics Management Team ISFMT Bath S.C. Performs detailed security evaluations and assessments SA amp A certification and accreditation C amp A support test and evaluation risk assessments and third party independent verification amp validation IV amp V of security controls software programs wireless network assessments audits computer support actions network and systems administration function consulting activities for variety of clients. Primary security activities include security controls assessments test amp evaluation efforts for security of systems security documentation development to include policies and procedures security risk assessments threat assessments task lead amp trainer for COOP and Anti-Terrorism support for DOD field level agency and system-level certification activities while performing C amp A A amp A DIACAP and FISMA compliance activities for multiple governmental military and private clients.
Other security actions include performance of detailed computer and information forensics data collections evaluations amp investigations. These investigations include review of suspect hard drives removable drives networks and malicious software code examinations evaluations and disassembly. Data recovery and analysis reports are developed documented and delivered to both private and governmental clients. Develops incident response action plans implements same and recovers data and incident particulars for further investigation evaluation analysis and follow-on procedural activities. Research and develop full system-level risk assessments including threat reviews vulnerability reviews likelihood of exploit determinations and residual risk reports. Performs site evaluations and installation recommendation reviews for wireless system deployments on an as-needed basis for customers and clients. Perform detailed evaluations for Disaster Recovery and Business Continuity of systems applications essential functions and primary recovery needs for both private and public organizations. Developed and conducted business impact analysis BIA events for clients. Primary architecture activities include design and development of corporate security architectures for customers based upon Business Impact Analysis events gathering of operational requirements and business process re-engineering. Outputs from these efforts include all operational system and technical architectural views for DODAF compliant organizations and all appropriate documents and drawings for Federal Enterprise Architecture compliant organizations.
Served as the primary regional security administration and IT support person for all office and off-site locations. As senior security engineer I performed duties as Information Systems Security Manager ISSM for high profile customers throughout the client base of LMIT PS to include the Pentagon Renovation and Construction Program PENREN/C and the Washington Headquarters Services WHS the main support element for all support activities within the National Capital Region for the Department of Defense. These duties included updating and maintaining the security posture for all workstations and servers assigned providing tracking and statistical data to military civilian and federal authorities providing policy and procedural guidance and recommendations as needed or requested conducting the risk management process overseeing the DIACAP reviews for operational systems updating the DISA based Vulnerability Management System for all assigned equipments and systems with current status patch levels Plans of Actions amp Milestones and assigning new systems applications and equipment as it is fielding within the 9 Domains of WHS and generally overseeing the actual day-to-day security operations of the IASO cross-domain assigned staff which number 11 and are from multiple staffing vendors. Participated in planning operations and after action reviews for WHS scheduled and unscheduled COOP exercises and events as well as oversight of assigned IASO activities for COOP events. Also I served as primary security engineer for customer and LMIT Information Assurance programs and projects including performing reviews and engineering evaluations for System Security Authorization Agreement SSAA and Certification amp Accreditation C amp A activities in support of organizational DoD Information Technology Security Certification and Accreditation Process DITSCAP and the new DoD Information Assurance Certification and Accreditation Process DIACAP activities and submittals. The areas of evaluation and support included COOP and Contingency Planning Incident Response Audit and Accountability Risk Management and Risk Evaluations amp Assessments Systems Communications User authentication and identification and system and network integrity.
I was the senior Modeling and Simulation M amp S engineer for military federal and commercial customers and programs and M amp S task lead for projects and programs with modeling and simulation activities involving the use of OPNET toolsets CA All Fusion toolsets and other M amp S toolsets. I performed duties as the software architect for the WIN-T Embedded Training system which included developing architecture diagrams and analysis reports requirements gathering and development for embedded training efforts providing operational and system view documents in accordance with the DOD Architecture Framework DODAF requirements and Army Training Development standards and procedures and concepts of operation for training the operator maintainer and repair soldiers on the WIN-T integrated wireless communications system.