We provide IT Staff Augmentation Services!

Seta Support For Cyber Security Coordination Center Resume

4.00/5 (Submit Your Rating)

Mclean, VA

SUMMARY:

  • Confidential has 18 years of federal consulting experience, specializing in IT strategy and IT shared services, organization change management and IT process improvement.
  • Confidential is a thought leader, big picture focused, with process improvement and strategic planning experience in IT shared services and cyber security.
  • She combines excellent technical skills with an understanding of organizational change management.
  • She has worked in various intelligence community agencies and other federal government departments, using her skills and experience to implement IT process improvement best practices to support federal agencies and departments meet their mission.

TECHNICAL SKILLS:

  • Performance Management/Measurement
  • IT Portfolio Management
  • System Engineering & PM
  • Process Improvement and development
  • Software Quality Assurance
  • Service Level Management
  • IT Change Management
  • Service Catalog
  • Internal Controls and Audit Readiness
  • Organizational Change Management
  • IEEE 12207, 15288
  • Business Process Reengineering
  • Business Systems Integrator
  • OMB A - 123, A-130, A-11 part 6, FISCAM, FISMA
  • Software Testing Environment
  • ITSM/ITIL Framework
  • Configuration Management
  • Strategic Planning IT shared services

PROFESSIONAL EXPERIENCE:

Confidential, Mclean, VA

SETA Support for Cyber Security Coordination Center

Responsibilities:
  • For the past two years, at the IC CIO office, Confidential supported the Cyber Security Coordination Center (SCC) as SETA support for the Intelligence Community Information Technology Environment (IC ITE) shared services initiative.
  • In this role, she functions as the liaison between the IC CIO office and security operations center providing insight and direction on Cyber Security guidelines, policies, strategic planning, performance management and the PPBE process for shared services.
  • Confidential assists with developing and shaping the end to end security situational awareness and coordinates security relevant events/incidents to determine the security risk posture of the shared environments.
  • Confidential provides insight and direction on IT shared services, incorporating IC directives, policies, and approaches within the Intelligence Community.
  • This includes the adoption and execution of Cyber security as a shared service, the design and implementation of enterprise processes and governance solutions, the development of executive communications in support of the IC CIO Office strategic priorities. She monitors and oversee the execution and compliance of the ICD 502 CONOPs and supporting ICD 502 IC Standards.
  • She reported issues of ICD 502 non-compliance to the IC CISO and IC CIO monthly and provide direct reporting of IC CIO Critical Cybersecurity Information Requirements (CCIRs), current operational items of interest, imminent and emerging risks and threats to the IC CIO and the IC CISO. Confidential respond with a high priority to requests for information on issues of strategic concern from the IC CISO and other senior IC ITE security officers.
  • She oversaw the planning, budget and execution of SCC allocated funding by working with the budgeting team and security operations team.
  • Confidential provided input to quarterly and other mandated reporting with respect to funding provided for execution. She also provided input to the ICD 502 annual report and the FISMA reports for enterprise situational awareness for cyber security and shared services. She also monitored the Coordinated Response Process (CRP) for cyber incidents and participated and integrated with other National Cybersecurity Centers for Cyber war gaming Training and Exercises.

Confidential

Performance management

Responsibilities:
  • At the Confidential, Confidential was a management analyst for the IC ITE initiative. Confidential applied enterprise IT strategy and IT architecture principles as the management analyst for the Confidential within the strategic programs division on the performance management team.
  • Confidential performed as the liaison across multiple agencies to develop performance measures using the strategic planning process to help create and align program strategic goals, objectives to forecast outcomes to meet the IC ITE strategic plan.
  • Confidential ensured business objectives of the enterprise are understood by the enterprise architecture team and that the capabilities of the technology are fully understood and engaged with the enterprise planning process and performance team. She was responsible for interfacing and collaborating with all aspects of the strategic planning functions, enterprise architecture function, adoption team and key stakeholders both in business and in IT to develop strategic performance metrics.
  • She assisted each program with programing planning budgeting and execution (PPBE) cycle. She assisted with developing and planning strategic workshops that help to align for greater results for CIO priorities.
  • Confidential was the liaison for the Information Assurance Division (IAD) to establish enterprise IT performance measures and Information Authentication and Authorization performance measures for enterprise safeguarding. She monitored, managed and reported on performance management measures of the strategic goals, and objectives for evaluation of progress against the IC ITE strategic plan and enterprise security/safeguarding. She monitored, managed and reported on the IT strategies and participated in mid-year and annual performance management reviews for the IC ITE initiative for shared IT services.

Confidential

Organization change management team lead

Responsibilities:
  • At the Confidential, Confidential supported an initiative to streamline IT shared services for the CIO Business Management Support Office.
  • Confidential performed as an organizational change consultant, supporting communications between the Business Process Managers and the FAA CIO.
  • Confidential applied a structured change management strategy to focus on the people side of change, including changes to business processes, systems, technology, job roles, and organizational structures to conduct readiness assessments for large IT transformation.
  • She conducted organizational interviews and evaluated results.
  • She then presented findings and solutions in a logical and easy-to-understand manner to track adoption, utilization and proficiency of the change initiative.
  • She also guided the branch chief to evaluate strategies and plans that maximize adoption and usage and minimize resistance to drive for faster adoption, higher utilization, and greater proficiency of the changes that impact employees in the organization.
  • She consulted and coached branch chief and management on the change management process and importance of organizational readiness.

Confidential

IT Strategist

Responsibilities:
  • While working with the NEN acquisition program office, Confidential ensured business objectives of the enterprise were understood by the IT strategy team and that the capabilities of the technology are fully understood and engaged with the enterprise planning process.
  • She ensured that IT strategies were appropriately translated into specific IT objectives, initiatives, investments that were totally aligned with the Department of Navy CIO policies and mandates.
  • Confidential designed and ensured that the organization had a systematic approach toward examining new technologies and utilizing core IT assets that address both the fundamental business goals and persistent business needs.
  • She interfaced and collaborated with senior strategic planning functions and key stakeholders both in the business and in IT operations.
  • She coordinated enterprise engineering projects, activities and actions with the customers and stakeholders.
  • She worked closely with requirements management team to conduct analyses to address the risks associated with implementation, estimated cost to implement, estimated timeline for completion, and recommended priority of requirements that aligned to high-level functional business processes to ensure traceability to capability.

Confidential

ITIL SME/Service level manager

Responsibilities:
  • As the Service Level Manager and ITIL SME for the Testing and Evaluation Team for an ACAT I major systems acquisition program for the NGEN program, Confidential prepared and presented management technical presentations on enterprise service levels, Key Performance Parameter (KPPs), service desk, and system activities to deliver or support delivery to senior leadership for monthly Metrics Meetings. She developed performance management approach, metrics and toolkit for senior leadership to follow for future reporting. She identified business process improvements and develop performance optimization metrics for Service Level Requirements and Service Validation & Testing.
  • She provided recommendations, after reviewing program policies to translate them into business requirements for operational purposes, for implementing technology and system enhancements to re-engineer business practices.
  • Confidential supported project tasks for ITIL/Process-related tasks including assessment, selection, development and subsequent integration of ITIL processes into the client environment. She collected and analyzed data necessary to assist process owners in creating an integrated service support.

Confidential

ITIL SME Senior business analyst process improvement Lead

Responsibilities:
  • Confidential managed a project team of three, project schedules, oversaw deliverables, and provided regular status reports, including weekly and monthly to Confidential Allen and the client. She evaluated the IT Service Continuity Management process using the ITIL best practice for the current Disaster Recovery team within Cyber Security for the IRS. She coordinated and lead kick off meetings with senior leadership and stakeholders.
  • She developed stakeholder’s surveys and interview questions to perform stakeholder interviews and evaluation of the current IT Continuity Management process and procedures across cyber security.
  • She led client and user facilitation sessions, conducted interview sessions with government staff and contractors, reviewed existing documentation to analyze information to develop recommendations and provide input into IT roadmaps.

Confidential

Business process lead

Responsibilities:
  • Confidential coordinated and oversaw the development of the TBITS Concept of Operations document and was responsible for the oversight and tasking of the communications support staff and analytics support staff.
  • She assessed the current state of the IT backend infrastructure environment from a process perspective to identify gaps and inconsistencies.
  • Confidential provided input to a gap analysis to identify processes that are missing critical components that align to the ITIL framework.
  • She provided oversight of the development of the Treasury DO Incident Management process using ITILv3 and developed the Change Management process and Configuration Management process for phase II implementation.

Confidential, McLean, VA

Audit readiness team

Responsibilities:
  • Confidential performed internal assessment of IT security access, application, and general controls over the Financial Accounting Corporate Tracking System (FACTS) for federal client. As part of the audit readiness team, Confidential conducted interviews with federal stakeholders and process owners responsible for system application program to determine if information system controls met the overall control objectives prescribed in the draft FISCAM for application controls.
  • She was required to reviewed policies and procedures from the resource management organization and software development team to include system security plans, configuration management plans, interface design documentation.
  • She developed a results and recommendations deliverable document for improvement for application controls, change management, configuration management, change control to provide guidance to stakeholders on improving the accountability and effectiveness of federal programs and operations.
  • These recommendations were implemented in preparation for the organizations internal controls annual audit.

Confidential, Mclean, VA

Business Analyst

Responsibilities:
  • Confidential led the human capital implementation effort to centralize HR using a construct best practice model for the Human Capital Support Office (HCSO) at Defense Intelligence Agency (DIA).
  • She conducted data analysis to identify qualified personnel to staff new offices using extracted data on personnel with existing HR system access and further refined search by examining employee occupational series, job codes, position numbers, and performance appraisals, all data was analyzed for key skill requirements, including experience with administering benefits, recruiting and staffing, and awards.
  • She administered and analyzed workload surveys and questionnaires to staff officers and supervisors to determine level of experience of candidates.
  • Confidential also developed presentations of analyzed data in excel data to be presented to supervisors and key directorate stakeholders for validation.
  • She also used benchmark data from Exxon, the CIA, and other organizations to helped DIA identify candidate personnel to administer staffing and recruiting, benefits, awards, and other HR services.
  • She created a communication plan aligned with the project plan that provided the tactics and tools to help support the HCSOs.

We'd love your feedback!