We provide IT Staff Augmentation Services!

Senior Federal Govcloud Isso Resume

0/5 (Submit Your Rating)

BostoN

OBJECTIVE:

  • Obtain a CISO role or support a CISO/VP of information security implement an effective organizational security program charter and execution, concerned with planning, strategy governance and compliance.
  • Oversee internal audits and support external audits through utilization of my skills and experience of 23 years in information systems risk, compliance and analysis. I have competency in applying project management, information security, information security policy, business analysis, IT risk management, compliance, and internal auditing for government and private organizations.

TECHNICAL SKILLS:

Software: - AWS Workdocs, AWS eQuip, AWS Projects, AWS Security Hub, Confluence, Redlock.io, Splunk, IP360, Alienvault, SIEM tools, DBProtect, Spiceworks, SharePoint 2010/2007; MS Access, MS Project, SQL Server, MS Office, MS Visio, Symantec Endpoint Antivirus, MS Anti- Spyware; Windows OS {all versions}, MAC OS X, ClearCase, Adobe Acrobat, Filezilla, Remedy, Nessus/Retina port scanner

Hardware: - Mac, PC, Network Printers, Laptops, Desktops

Platforms: - Office 365, Windows NT, Active Directory, UNIX/LINUX, Sybase, UDB, Mainframe, CentreOS

Other: - Computer Forensics, CIS, NIST, ISO 27001, ITIL, SOC2/3, Sarbanes-Oxley, Cobit, CCNA, Network Administrator, Database, Systems Analysis, Mainframe Administrator, Configuration Management

PROFESSIONAL EXPERIENCE:

Confidential

Senior Federal GovCloud ISSO

Responsibilities:

  • Lead responsible for maintaining Apptio GovCloud FedRamp P-ATO.
  • Lead responsible for responding to questions, concerns, comments from the JAB.
  • Responsible for writing up risk findings, recommend remediations, and draft risk acceptances and report directly to the CISO.
  • Senior lead advisor for security impact assessments (SIA) for Apptio GovCloud.
  • Senior lead advisor on all Significant Change Request (SCRs) to Apptio GovCloud.
  • Scoping for Apptio GovCloud “uplift” from Moderate to IL4 security baseline.
  • Perform Moderate to IL4 gap analysis.
  • Collaborate with ConMon to ensure vulnerabilities are remediated in a timely manner and meet FedRamp thresholds.
  • Lead SSP updates/revisions to include SCRs, and technological changes/updates.
  • Developed risk management strategy for Apptio GovCloud.
  • Managing security & compliance team daily tasks around information assurance, i.e. security documentation, jira ticketing approval, vulnerability remediations for Apptio GovCloud, and general security & compliance advisory.
  • Collaborated with Products & Engineering to ensure vulnerabilities thresholds are not exceeded.
  • Collaborated with Information Security team to ensure security monitoring and response/incident mechanisms are operating as intended.
  • Communicated cyber security risks, trends, threats from 3rd party sources to ensure Apptio internal threat modeling is continuously updated and security mechanisms configured as needed.
  • Collaborate with the Apptio GovCloud stakeholders to ensure all security controls are in place and meet Apptio security policies.
  • Worked with Apptio Sales to train personnel on FedRamp GovCloud space advise on sales/advertising strategy.
  • Managed FedRAMP Annual Assessments.
  • Managed team of two contractors and 3PAO advisor.
  • Managed project tickets and and provided input for ServiceNOW implementation project.

Confidential

Senior Security Risk & Compliance

Responsibilities:

  • Senior lead advisor for security impact assessments for AWS Cloud Features/Services.
  • Project managed AWS features FedRamp approval process.
  • Developed risk management strategy for U.S. Government Security & Compliance (UGSC) team responsible for providing oversight and guidance on FedRamp authorizations for AWS Services and Features
  • Developed risk registry for UGSC team.
  • Collaborated with AWS Service teams.
  • Provided weekly status updates with the AWS Global Engineering and Architecture Readiness (GEAR) team.
  • Prioritized Features assessments and coordinated yearly roadmap with AWS services teams, GEAR, and vulnerability management (VM) onboarding teams to ensure features met JAB security requirements for U.S Federal clients.
  • Developed FedRamp Security Impact Assessments (SIAs) for 3PAO reviews.
  • Reviewed 3PAO attestations and provided features authorization packages to the JAB.
  • Advised and improved overall features assessments, tracking, and workflow processes.
  • Maintain internal AWS features status and wiki page.

Confidential, Atlanta, GA

Enterprise Consultant, Security Controls Assessor

Responsibilities:

  • Advised and developed FedRAMP readiness and risk assessment for Deputy CISO at Lexus Nexus for On Prem migration to a cloud environment.
  • Drafted FedRamp compliant system security plan for Deputy CISO at Lexus Nexus.
  • Lead FedRamp internaudit for Oakland Ridge Nuclear Laboratory (ORNL).
  • Developed roadmap for AWS Cloud ATO.
  • Drafted a security assessment plan.
  • Conducted technical assessment interviews.
  • Mapped Control Review items to NIST ; 37;137.
  • Drafted and finalized Nexus Lexus system security plan (SSPs), contingency plans (CP).
  • Drafted and finalized security assessment reporting, risk exposure tables, and executive summaries.
  • Lead two-week ISO 27001 compliance assessment.
  • Lead FedRamp readiness assessment.

Confidential, Seattle, WA

Enterprise Risk Management (ERM), Program Manager

Responsibilities:

  • Key AWS Enterprise Risk Management member responsible for assessing risk related to information security and data protection.
  • Developed roadmap for standing up new AWS Enterprise Risk Management Program.
  • Project manager for risk assessment team.
  • Developed AWS Third Party Risk assessment questionnaire.
  • Evaluated and assessed enterprise risks across the global AWS operations.
  • Drafted AWS Enterprise Risk Management policy.
  • Drafted the AWS Third party risk management policy.
  • Developed AWS third party risk framework.
  • Coordinated risk assessment interviews with AWS risk owners and stakeholders across the enterprise.
  • Remediated AWS asset management risk concerns relating to GDPR.
  • Assessed risks relating to AWS general ledger and Spending and Transaction policy.
  • Completed for AWS Security HUB.
  • Completed for integrating security findings from AWS Guard Duty and commercial SIEM tools to AWS Security Hub.
  • Applied FAIR method for evaluation of AWS corporate risks.
  • Developed ERM tool for initial risk scoring of AWS corporate risks.
  • Reviewed ERM Implementation Plan.
  • Responsible for ERM reporting from AWS Risk registry to upper management.
  • Responsible for maintaining AWS risk registry and risk mitigation.

Confidential, Boston

Senior Information Security Specialist

Responsibilities:

  • Performed HITRUST self-assessment on MS Azure environment.
  • Reviewed cloud implementation security documentation.
  • Wrote control implementations descriptions based on documentation review.
  • Administered HITRUST MyCSF tool, providing user permissions.
  • Drafted security policies based on gap analysis to reflect require security domains.
  • Managed HITRUST Assessment via MyCSF tool for entire cloud implementation.
  • Provided HITRUST Assessment reporting and results to client including findings report.
  • Collected technical artifacts to validate risk assessment results.
  • Managed security implementation descriptions for access management controls via Active Directory.
  • Performed SOC 2 audits for client.

Confidential, San Diego, CA

Cloud Risk & Security Analyst

Responsibilities:

  • Provided executive cloud risk assessment report to VP of Technology Risk.
  • Performed cloud security risk assessment baselined against NIST
  • Project managed two cloud risk assessments for Director of Risk Management for AWS Landing Zone
  • Drafted and finalized 14 security policies aligned with NIST requirements.
  • Assesses risk of landing zone for 2 mobile applications.
  • Developed Corrections Action Plans based upon risk assessment findings
  • Interviewed stakeholders within the Enterprise Operations, Info Sec, and Application Development team.
  • Recommended Multi factor Authentication be implemented on a network system component.
  • Ensured data encryption is applied to data at rest and data in transit
  • Performed SOC 2 audits.
  • Ensured CyberArk was implemented for privileged access to AWS/Azure environments.
  • Ensured Email scanning was implemented via ProofPoint.
  • Ensured code scanning via Veracode.
  • Ensured Endpoint protection was implemented via Crowd Strike/Windows Defender.
  • Ensured life cycle management was implemented vis Venafi.
  • Ensured vulnerability mgmt. was implemented via Nexpose/Splunk.
  • Ensured firewalls were configured properly via Palo Alto.
  • Ensure server configuration followed CIS hardening baselines.
  • Ensured Redlock.io compliance tool is configured on the cloud environment.

Confidential, Washington DC

Senior Information Security Specialist

Responsibilities:

  • Developed SAR for government client.
  • Developed SSP for Microsoft Azure Cloud solution for government client.
  • Drafted and finalized 14 security policies aligned with NIST requirements.
  • Managed drafting of security policies aligned with requirements.
  • Conducted CIS audit for commercial client.
  • Wrote up access control polices and assisted with Microsoft Azure MFA configurations.

Confidential, Washington DC

Senior Information Security Specialist

Responsibilities:

  • Performed HITRUST assessment on AWS Cloud solution.
  • Administered HITRUST MyCSF tool, providing user permissions.
  • Reviewed cloud implementation security documentation.
  • Managed HITRUST Assessment via MyCSF tool for entire cloud implementation.
  • Provided HITRUST Assessment reporting and results to client including findings report.
  • Managed security implementation descriptions for access management controls via Active Directory.
  • Performed SOC 2 audits.

Confidential

Lead Senior Security Specialist

Responsibilities:

  • Performed IT security support function to the Office of the CISO regarding risk management, internal audits, policy development, project support.
  • Responsible for implementing access control polices for management of user accounts.
  • Project lead on multiple corporate security control assessments (SCA) on general support systems (GSS)/major applications (MA).
  • Developed DAR for Symantec DLP solution.
  • Worked with Symantec DLP reps to align network infrastructure with product offering.
  • Acted a project coordinator between Symantec DLP rep and QSSI.
  • Drafted Corporate Vendor Management Policy.
  • Drafted vendor management procedure.
  • Developed vendor security assessment questionnaires and business reqs.
  • Drafted Sharepoint Administration Policy.
  • Supported IT audits for corporate projects for CMS, DSH.
  • Working experience with CMS CFACTS audit tool.
  • Managed and mitigated POAMs and CP test for ACA exchange systems.
  • Developed SSPs, RAs, CPs, POAMs for applications/systems.
  • Coordinated infrastructure vulnerability scans using IP360, nCircle CCM, DB protect.
  • Responsible for POAM mitigation on corporate GSS systems.
  • Provided NIH Proposal QSSI Technical documentation.
  • Provided Contingency Plan to IT staff.
  • Reviewed security policies and mapped to NIST standards and HIPAA standards.
  • Performed security control assessment on major financial applications (Deltek CostPoint).
  • Created risk determination methodology for the Chief Information Security Officer (CISO).
  • Identified technical common controls for enterprise adaptation.
  • Reviewed Incident Response Plans.
  • Reviewed Facilities Management Plans.
  • Obtained HITRUST assessor /HITRUST Tool experience.
  • Provided project plans and goal setting for corporate internal audits.
  • Drafted business development initiative plans for acquiring new business.
  • Developed Mobile Security, Mobile Code, and Incident Response policies.
  • Employed XLC methodologies.
  • Monitored firewall configurations for best security practices
  • Implemented OpenFISMA for corporate audit needs.
  • Drafted Master Corporate Security Plans.
  • Regularly reported to the CISO overall corporate infrastructure security status.
  • Developed privileged access management policies for organization corporate.
  • Developed and advised on Identity Access Management policies and baseline configurations for enterprise implementation.

Confidential, Alexandria, VA

Enterprise Risk Specialist Consultant

Responsibilities:

  • Performed security policy reviews and recommendations for technology devices/applications employed at BOA systems.
  • Information Security SME on multiple technical policy documents.
  • Supported daily activities of the VP, Senior Architect Enterprise Information Security.
  • Drafted security control guidelines and practices for BOA Global Information Security (GIS) team.
  • Provided new technology recommendations to business units.
  • Provided security input on multiple new technologies for baseline implementation.
  • Monitored and provided security input within major mobile payment project at BOA.
  • Provided weekly updates on mobile payment project to entire global information security (GIS) team at BOA.

Confidential

Independent Security Consultant

Responsibilities:

  • Developed Health Care Security Policy for the company.
  • Provided daily IT consultation.
  • Repaired computers for health-care office.

Confidential, Washington DC

Information Security Specialist III

Responsibilities:

  • Mapped Control Review items to NIST ; 37;137.
  • Created control criteria for control review questions for C&A effort.
  • Wrote guidance document on Continuous Monitoring based upon NIST .

Confidential, VA

Information Security Specialist

Responsibilities:

  • Trusted Agent FISMA (TAF) coordinator, assessing NIST documents.
  • Quality control management with Risk Management Systems (RMS)
  • Mapped Control Review items to NIST A; 37;137.
  • Managing multiple applications for FISMA/NIST C&A effort.
  • Performing in TAF/RMS for DHS employees.

Confidential, Washington DC

Enterprise Risk Specialist

Responsibilities:

  • Proposed IBM Tivoli Access Manager (TAM) for Confidential client.
  • Conducted security assessments for 37 web-based applications.
  • Prepared risk assessments outlining residual risk levels.
  • Prepared security assessment report deliverables for client.
  • Prepared AO matrix dashboard for client deliverables.
  • Provided & implemented improvement recommendations to AO matrix.
  • Provided weekly status reports.
  • Performed identity access management (IAM) client assessments for technical solution requirements.
  • Performed data loss protection (DLP) client assessments for technical solution requirements.
  • Provided Identity access management planning//Data Loss prevention current status reports to client.
  • Reviewed client policies regarding information security and enforcement of policies.

Confidential, Washington, DC

Information Security Engineer III/IRS Consultant

Responsibilities:

  • Responsible for aligning current IRS technical controls with updated applicable Treasury and NIST guidance.
  • Rewrote current Identification and Authentication (IA) controls for IRS organization - wide policy document.
  • Provided security controls for web security.
  • Rewrote current Access Controls (AC) for IRS policy document.
  • Provided applicable guidance for E-Authentication implementation based upon OMB and E-Gov guidance.
  • Attended and documented server farm migration meetings.
  • Provided weekly status reports.

Confidential, Washington DC

Senior Security Engineer/FAA Consultant

Responsibilities:

  • Coordinated SCAP (System & Accreditation Packages) for FAA applications.
  • Wrote and reviewed system security plans, incident recovery plans, and contingency plans.
  • Performed penetration testing on FAA systems using NESSUS scanner and reviewed and reported on results.
  • Created POA&M items for security team and verified completion of existing POA&M items.
  • Provided auditable evaluation documentation in the form of reports and checklist for FISMA requirements.
  • Created and edited executive summaries, risk assessments, POA&Ms for FAA systems.
  • Installed Symantec antivirus on workstation and server levels.

Confidential, Washington DC

Senior C&A Specialist/Department of Interior

Responsibilities:

  • Conducted Internal Control Reviews (ICRs) for their National Business Center.
  • Reviewed STIGS and verified server baseline configuration implementation.
  • Reviewed and verified server configurations and patch management.
  • Tested internal controls on servers, and web based software.
  • Evaluated system security plans, incident recovery plans, contingency plans, and risk assessments against the a standards.
  • Created POA&M items for security team and verified completion of existing POA&M items.
  • Provided auditable evaluation documentation in the form of reports and checklist for FISMA requirements.
  • Mapped NIST a controls to the existing controls found in place for DOI GSS/MA applications.

Confidential, Washington DC

Senior Information Security Specialist

Responsibilities:

  • Evaluated system security plans, incident recovery plans, and contingency plans, against the standards and HUD’s established common controls.
  • Created POA&M items for security team and verified completion of existing POA&M items.
  • Coordinated ST&E testing for over 10 applications.
  • Provided auditable evaluation documentation in the form of reports and checklist for FISMA requirements.
  • Evaluated web security vulnerability results.

Confidential, Pentagon City, VA

Senior Information Security Engineer

Responsibilities:

  • Information security engineer lead for DEA Security Programs, Information Security section.
  • Evaluated and updated NIST special publications database.
  • Managed DEA-wide Computer Security Assessment program for web security.
  • Information security engineer lead on security programs team responsible for drafting DEA standard regarding use of portable electronic devices within DEA secure facilities.
  • Drafted DEA policy regarding the standard operating procedure for employing external vendors for the destruction of classified documents.
  • Drafted Memorandum of Agreement regarding Foreign Nationals employment within DEA.
  • Drafted standard operating procedure for encrypting storage devices within DEA.
  • Administered for appropriate use of portable electronics devices.
  • Facilitated and implemented plan for internal social engineering evaluation exercise within DEA.

Confidential, Reston, VA

Senior Information Security Engineer

Responsibilities:

  • Administered mainframe security configurations.
  • Reset security passwords for database administrators nationwide.
  • Performed mainframe help desk duties.
  • Provided NIST publication research.
  • Updated mainframe records for active veteran benefits.

Confidential, Baltimore, MD

Senior IT Auditor

Responsibilities:

  • Team member for central monitoring team, responsible for daily monitoring of 21 financial applications on Active Directory.
  • Team member for central monitoring team, responsible for daily monitoring of UNIX root logins, successful su attempts, and failed su-attempts.
  • Reviewed daily application logs of 65,000 rows of activity and filtered for privileged activity.
  • Managed and created incidents reports in SHAREPOINT and FILEZILLA for all privileged or unapproved activity by internal users.
  • Reconciled incident reports through REMEDY ticketing software.
  • Escalated incident report status when explanation provided by application teams was considered insufficient.

Confidential, Merrifield, VA

Senior Information Security Specialist

Responsibilities:

  • Created complete process documentation for Sarbanes Oxley (SOX) review of internal financial applications as a contractor to Confidential
  • Created a complete procedural instructions document for Sarbanes Oxley (SOX) review of internals controls to be followed by all internal auditors of Confidential SOX artifacts.
  • Reviewed data security dumps from UNIX, Sybase, UDB, Windows NT, and Mainframe platforms for violations based upon Confidential security policy standards.
  • Trained over 50 project managers in the process of SOX reviews through PowerPoint presentations.
  • Provided violation reports based upon SOX reviews to senior management weekly and daily team status reports upon request.
  • Mapped SOX review items to Confidential policies, CoBIT controls, and ISACA application control standards.
  • Managed SOX orientation of new auditors.
  • Facilitated and observed security audit meetings between Confidential VP’s, directors and system owners.

Confidential, Washington D.C

IT Support Professional

Responsibilities:

  • Advised small business owners on web page development.
  • Provided desktop support to user.
  • Installed and configured necessary anti-virus components for new systems.

Confidential, Washington D.C

IT Project Manager

Responsibilities:

  • Managed 30 workstation technology labs. Responsible for network maintenance, hardware repair, and software installation.
  • Managed FacNet project where over $100,000 worth of new desktops/laptop (IBM/Mac) computers were disseminated to various university faculty.
  • Coordinated hired installers daily activities and school/department assignments.
  • Created documentation for FacNet database conversion plan.
  • Exported data necessary for FacNet inventory database.
  • Responsible for pc support for all distinguished faculty and high-ranking administrators.
  • Provided weekly status reports on all weekly tasks.
  • Presented PowerPoint presentation on the strengths and weakness of iMac and IBM compatible PC’s.
  • Wrote official Confidential network access documentation for iMac and IBM pc configuration.

Confidential, New York, NY

Interning Computer Specialist

Responsibilities:

  • Assisted MCSE professional with daily network maintenance in order to support over 10, 000 end-users.
  • Provided PC support to office departments to enhance company work efficiency.
  • Managed nationwide inventory auditing project to help accounting department accurately report financial statements to IRS.
  • Populated inventory database containing national computer equipment information of over 100 outlets nationwide. (Workstations, modems, faxes, etc.)

Confidential, Rockville, MD

Interning Computer Security Specialist

Responsibilities:

  • Assisted with organization of Y2K contingency plan manual for Justice Department Y2K task force.
  • Ran daily surveillance of Internet server that facilitated over 20,000 “hits” of different IP address worldwide in order to deter possible Internet intrusion.
  • Collected and evaluated over 200 datasets taken daily in order to assure the protection of government networks.
  • Administered mainframe software “Top Secret” concerned with storing large datasets.

We'd love your feedback!