We provide IT Staff Augmentation Services!

Senior Security Analyst Resume

3.00/5 (Submit Your Rating)

SUMMARY

  • Certified Project Management Professional (PMP), # 1545785
  • Certified Information System Security Professional (CISSP) # 329361
  • Certified Information System Auditor (CISA) # 1085906
  • Security+ Certified Professional # COMP 001007413842
  • Certified Ethical Hacker ECC947471
  • Information Technology Infrastructure Library (ITIL) V3 Certified, 019568
  • Current Top Secret Clearance with Special Compartmented Information (TS SCI expired 2014)

PROFESSIONAL EXPERIENCE

Senior Security Analyst

Confidential

Responsibilities:

  • Team Lead for the Security Monitoring and Response Team (SMaRT)
  • Managing the company's Security Information and Event Management (SIEM) tool, Qradar
  • Managing and providing guidance over the company’s Incident Response Plan
  • Coordinating with our global helpdesks/ deskside support teams to locate and eradication Indicator of Compromise (IOC)
  • Investigating and analyzing all network security incidents
  • Providing Enterprise Risk Based security assessments and guidance to Tuner’s business units and legal team on new technology, new contracts and all aspects of securing TBS's global networks.
  • Provides strategic business process/reengineering consulting as appropriate and typically works on multiple, technically complex, mission - critical, and/or high-profile sec security projects.
  • Investigate and recommend custom or packaged security solutions that support business needs while maximizing long-term viability and scalability of Risk Management and Compliance initiatives.
  • Provide cyber threat intelligence to business units and recommending protection solutions and measures.
  • Participate in strategic application/technology discussions to determine long-range business solutions and potential perform an impact analysis.
  • Facilitate, coordinate, and support the Governance, Risk and Compliance organization initiatives by drawing upon specialist areas of expertise such as Risk Management, Regulatory Compliance, Information and Network Security, IT Policy Management.

Computer Security Systems Specialist

Confidential

Responsibilities:

  • Work directly for and advise the Information System Security Officer (ISSO) for ATSDR, Confidential, and NCIPC.
  • Providing daily cyber threat assessments and recommended safe guards to protect the organization Information Systems and data.
  • Regularly attend high level IT meeting and provide executive summary to the leadership.
  • Performing FDCC software security scans for new software application before they are introduced to the CDC’s network.
  • Performing risk analyses including risk assessment, mitigation and contingency planning.
  • Developing and maintain information security policies, procedures and control techniques in accordance with FISMA, NIST, OMB, Confidential and CDC guidance.
  • Coordinating with the Confidential /ATSDR/NCIPC leadership and a other CDC enterprise service providers to identify, research and analyze IT infrastructure, security tools, processes and other services they provide, to including Identity and Access Management (IAM), directory services, application hosting, software licensing, new technologies and Section 508 compliance.
  • Collaborating with Confidential /ATSDR/NCIPC customers, CDC enterprise service providers and the INFOSEC Privacy Team to address potential service integration issues as well as to propose alternative solutions to Confidential /ATSDR/NCIPC’s information security and architectural needs.
  • Participate in various Information Assurance, Enterprise Architecture, IT project meeting and briefings to provide senior management with minutes, recommended courses of actions, and advise on all security and IT related matters.

Security Operations Center Manager

Confidential

Responsibilities:

  • Oversaw and coordinated the activities of SOC personnel supporting the security of critical production environments.
  • Assessed SOC Analyst knowledge, skills, and abilities, and created individualized training plans to achieve desired capabilities.
  • Implemented incident response protocols.
  • Executed emergency response procedures.
  • Ensured quality customer support.
  • Managed and reporting on the cyber activities and performance of the SOC team.
  • Developed and maintaining an inventory of security tools used by the SOC.
  • Provided support and guidance to the SOC personnel.
  • Evaluated and updating SOC policies and procedures as appropriate.
  • Ensured SOC personnel follow SOC policies and procedures.
  • Verified all SOC security components are functioning optimally.
  • Identified information security risk within the enterprises and recommending priorities for risk mitigation.
  • Collaborated with system owners and operators, information security professionals, and other Government and contractor personnel to ensure effective SOC monitoring is implemented for all environments.
  • Worked closely with Incident Response Teams to analyze and resolve security incidents.
  • Provided reports and statistics as required to Program Management, Security, and Operations personnel.
  • Evaluated new or improved technologies, on a regular basis, for the purpose of replacing or upgrading existing SOC tools.
  • Installed, maintained, updated and deployed security products (hardware and software).
  • Collected and analyzed antivirus, firewall, IDS/IPS, proxy, DHCP, NAT, application and security event logs.
  • Conducted security product research, development, evaluation and testing.
  • Gathered, disseminated and acted on cyber intelligence.
  • Maintained all physical and electronic activity log books to track calls, visitors, shift changes, inventory, and others as needed.
  • Performed quality assurance and quality control activities on all forms of correspondence to and from the SOC.
  • Oversaw the operation, maintenance and user support of cyber security tools including, but not limited to, firewalls, scanning tools and systems, traffic analyzers, sniffers, asset management and vulnerability management tools, forensics tools, etc.
  • Participated and recommended guidance for network, security and hardware engineering efforts and special projects.
  • Mentored and guided SOC Analysts in performance of their duties.
  • Expert level knowledge in troubleshooting technical issues, administration, implementation, and integration of security monitoring tools, firewalls, HIDS, NIDS, Anti-Virus solutions, Identity management, and other tools as needed.
  • Oversaw Incident Handling & Closure.
  • Critical Incident Report (CIR).
  • Weekly/ Bi-weekly reports presentation.
  • Managed new requirements.
  • Other duties and responsibilities as assigned.

Information Assurance Program Manager

Confidential

Responsibilities:

  • Served as the Chief Information Security Officer (CISO) / Information Assurance Program Manager (IAPM) for U.S 3rd Army/United States Army Central (USARCENT) Command.
  • Provided project and program management oversight of the purchasing, installing and configuring and relocating of all network security devices for the unclassified and classified networks during the relocation of USARCENT from Atlanta, GA to Sumter, SC
  • Provided technical advice and briefings updates to the Commander, staff and the CIO/ G6 on enterprise IT Security operations to support the Command’s classified and unclassified networks.
  • Provided compliance, management oversight and guidance for the Information Assurance (IA) program, IA security controls, IA security policies and procedures and IA security training and awareness program.
  • Managed over 250K in IA training and one million in IA budget/ operations annually.
  • Managed all efforts in Certifying and Accrediting classified and unclassified networks in Atlanta Georgia, Kuwait, and Sumter South Carolina
  • Managed the continuous monitoring and compliance auditing to ensure the command was prepared for the Department of the Army (DA) Inspector General’s Information Assurance inspection, HQDA Force Protection-IA Inspection, and the Department of Defense (DoD) Certification and Accreditation, and FISMA requirements.
  • Performed internal compliance audits and inspection to ensure proper integration and security configuration of IT systems in the enterprise architecture.
  • Managed compliance enforcement activities associated with network security and information assurance operations to preserve the confidentiality, integrity, and availability of USARCENT’s classified and unclassified data networks.
  • Managed, tracked and reported the command’s IA Vulnerability Management (IAVM) program and reported status to senior leaders and higher headquarters.
  • Managed the research, planning, deployment, and day to day operations of network security management tools such as Bigfix, SCCM, Network Intrusion Prevention (IPS) devices, and Network Access Control (NAC) appliances.
  • Provided oversight and auditing of the network firewall, IDS, and NAC policies and logs.
  • Participated in the commands Configuration Management Board (CMB) to ensure compliance with Department of Defense and Department of the Army configuration standards.
  • Responsible for developing, monitoring, and enforcing all Command Information Assurance (IA) and network security policies.
  • Performed risks assessments to identify, mitigate, and monitors cyber security threats on day to day operations and special missions.
  • Identified and tracked disaster recovery related vulnerabilities and developed remediation recommendations.
  • Performed in-depth technical analysis and provided technical project and program management on new security technologies and/or threats and recommended changes, including short and long range program, policies, strategies, and objectives.
  • Managed the command’s security incident response team.
  • Developed cyber security policies, cyber strategies, and tactical cyber plans.
  • Represented the ARCENT CIO/G6 as his Cyber security Officer with USCENTCOM, USCYBERCOM and ARFORCYBER command on all cyber warfare and Critical Infrastructure issues.

Deputy Knowledge Management Officer

Confidential

Responsibilities:

  • Provided knowledge management (KM) skills, advice, and oversight for 3rd Army USARCENT Commander and staff.
  • Planned, coordinated, and executed the creation of a new KM cell.
  • Provided project and program management oversight of the planning, purchasing and coordinated the implementation of various KM tools such as an unclassified SharePoint Portal, Relocation Knowledge Transfer System, and Enterprise Mass Notification System.
  • Provided design oversight and Best Business practice guidance over a classified SharePoint Portal.
  • Performed internal and external knowledge gap analyses to identify create and distribute critical knowledge using (KM) best practices.
  • Four month assignment to Afghanistan to serve as the Knowledge Management Officer during the Afghanistan build up.
  • Established a knowledge Management section in Afghanistan to support the buildup of American forces in Afghanistan.
  • Provided management oversight of a two man SharePoint team administering SharePoint services to United State Forces Afghanistan - South (USFOR-A South).
  • Provided project and program management oversight for the redesign and increased functionality to the USFOR-A South classified, unclassified and coalition Portals. Coordinated the efforts to purchase and implement three Storage Area Network (SANs) to support three Portals.
  • Implemented and integrated Best Business Practices into the USFOR-A south SharePoint environments.
  • Coordinated with various staff sections to automate their business processes, identify knowledge requirements and information gaps and applied Knowledge Management principles and tools to increase information sharing, workflow, situational awareness, and to shorten decision making processes.
  • Coordinated with surrounding units to identify and meet their SharePoint requirements.
  • Developed plans, policies, and practices to protect information stored on the portal from unauthorized access and disclosure.

Division Chief, IT Programs

Confidential

Responsibilities:

  • Provided project and program management oversight over Information Technology projects in Atlanta, Kuwait, Iraq, Afghanistan, and Sumter, SC.
  • Served as the Chief Information Security Officer (CISO) and Information Assurance Program Manager (IAPM) for U.S 3rd Army/United States Army Central (USARCENT) Command provide management oversight for all Network and Information Security in Atlanta and Kuwait.
  • Managed day to day operations to ensure ARCENT meet all security controls, FISMA compliance, network certification and accreditation of USARCENT’s classified and unclassified networks
  • Supervised the command’s IA Vulnerability Management (IAVM) program
  • Planned, developed and coordinated long range strategic communication initiatives for Joint and Coalition operations in Southwest Asia (SWA)
  • Provided funding oversight of IT and communication projects supporting military units and operations at installations in Kuwait, Iraq and the communication buildup in Afghanistan
  • Developed IT and security policies for USARCENT headquarters and subordinate organizations in Kuwait and Atlanta
  • Provided management oversight of the research, planning, deployment, and day to day operations of network security management tools such as Bigfix, SCCM, Network Intrusion Prevention (IPS) devices, and Network Access Control (NAC) appliances.
  • Developed and monitored firewall, IDS, and NAC policies
  • Developed and provided management oversight of USARCENT’s Configuration Management Board (CMB) in Atlanta and Kuwait to ensure compliance with Department of Defense and Department of the Army configuration standards
  • Provided management oversight of the processing and response to Freedom of Information Act (FOIA) request to all military operations in Southwest Asia to include Detainee Operations.
  • Provided IT project and program management oversight for the relocation of all communication systems, equipment, and capabilities for USARCENT's Base Realignment and Closure (BRAC) move from Atlanta to Shaw Air Force Base.

Enterprise Architecture Branch Chief

Confidential, Atlanta

Responsibilities:

  • Researched, developed, and coordinated the creation of three annual Long Range strategic Communication plans for the Southwest Asia Theater.
  • Staffed, coordinated, and provided program management oversight for top-down driven Enterprise IT projects for the Southwest Asia (SWA) Theater.
  • Researched, coordinated, and integrated Commercial Off-The-Shelf (COTS) equipment into deployed tactical networks.
  • Ensured IT compliance and interoperability of Enterprise solutions with Best Business Practices (BBP), Department of Defense (DoD), Department of the Army (DoA), and Federal Regulations such as the Clinger-Cohen Act, and Federal Information Security Management Act.
  • Developed and managed the Configuration Management Board to maintain standards, compliance, and awareness of changes to the Enterprise network.
  • Researched, planned, and advised on highly mobile communication package to provide secure and unsecure Voice over IP (VoSIP/VoIP), Secure VTC, Classified and Unclassified data to remote locations in Iraq and Afghanistan and to the Commanding General as he travels to various countries throughout Southwest Asia.

Advisor

Confidential

Responsibilities:

  • Advised Confidential Chief Information Officer (CIO) on all Information Technology concepts, initiatives, Program and project management issues, training, personnel management, acquisition, and day to day activities
  • Provided project management oversight for the planning and installation of eight local Area Networks (LANs), three Wide Area Networks, four data centers and 20 network communication rooms connecting military installations in various cities throughout the Kingdom of Saudi Arabia.
  • Provided contract management oversight as the Contracting Officer Representative (COR) on all IT projects and programs.
  • Provided project and program management oversight over the OPM- Confidential Information Technology budget of $40 million dollars for a contracted workforce of 72 network and computer technicians manning the Confidential Computer Center and Help Desk.
  • Provided Information Assurance and Network security guidance on securing and protecting Confidential 's various WANs, LANs, and Data Centers.

Automation Officer

Confidential

Responsibilities:

  • Planned and coordinated the installation of new telecommunication circuits throughout Europe.
  • Coordinated network security incidents and response with the regional Emergency Response Team Europe (RCERT-E).
  • Managed and provided status reports on 20 Deployable Communications Packages providing secure and unsecure voice, data, and VTC to the War Fighter.
  • Provided day to day management oversight of a 600 user network and provided help desk services to the commander and staffs.
  • Supervised the brigade’s School of Information Technology, trained soldiers and leaders on the latest COT technology such as routers, switches, servers, firewall, IDS, cache engines, VTC equipment, and PBX telephone switches training over 250 students for various military operations and Operations Iraqi Freedom.
  • Monitored and managed IDS and firewall for deployed communications packages
  • Researched, tested, evaluated, and purchased Commercial off the Shelf communication equipment
  • Conducted IA and security compliance inspections for deploying communication packages deploying on military operations throughout Europe
  • Served as the Project Manager and directed help desk operations for the largest Joint Command and Control exercises in Europe.
  • Monitored WAN/LAN data networks and provided weekly network health reports and briefings to the leadership.
  • Managed the commands Websense and Internet policy and program
  • Planned and coordinated the installation of new telecommunication circuits throughout Europe.

We'd love your feedback!