We provide IT Staff Augmentation Services!

It Security Analyst Resume

Suitland, MD

SUMMARY:

  • Skilled Information Security Analyst, knowledgeable in risk management framework (RMF), systems development life cycle (SDLC), security life cycle, and vulnerabilities management using FISMA, and applicable NIST standards. Organized, Solutions - focused, deadline-focused, team oriented, work well independently, or in team providing all facets of computer supports with in-depth knowledge and understanding of numerous software packages and operating systems. A proven project and team lead with aptitude for good customer service, leadership, excellent communication (both oral and written), and presentation skills. Specialized in providing IT security expertise and guidance in support of security assessments and continues monitoring for government and commercial clients.
  • Assessment and Authorization (A&A)
  • IT Security Compliance
  • Vulnerability Assessment
  • Vulnerability Scanning
  • Security Test and Evaluation (ST&E)
  • Certification and Accreditation (C&A)
  • Risk Assessment
  • Systems Development Life Cycle
  • Technical Writing
  • Project Management and Support

TECHNICAL SKILLS:

Nessus Vulnerability Scanner, Microsoft Office, Excel, Word, PowerPoint, MS Project, Access, Mac, Microsoft Windows, Linux, VMware, Oracle virtual box, Parallel Virtual Machine, CSAM, RSAM, Tripwire, Accellion/WatchDox secured file solution, RMPS, Remedy, Splunk, Active Directory, ServiceNow, Trend Micro, and more.

PROFESSIONAL EXPERIENCE:

IT Security Analyst

Confidential, Suitland, MD

  • Supported client Security policies and activities for networks, systems and applications including Vulnerability Management, Incident Reporting, Mitigation, and Continuous Monitoring
  • Supported all Assessment and Authorization (A&A) phases and processes
  • Proven ability to support the full life-cycle of the Assessment and Authorization (A&A) process
  • Developed, reviewed, and updated Information Security System Policies, System Security Plans, and Security baselines in accordance with NIST, FISMA, OMB App. III A-130 and industry best security practices
  • Applied appropriate information security control for Federal Information System based on NIST rev1, SP, FIPS 199, FIPS 200 and OMB A-130 Appendix III
  • Direct experience with formatting, customizing, and providing feedback for documentation relating to Information Assurance & IT Security Vulnerability
  • Provided security expertise and guidance in support of security assessments.
  • Supported A&A (C&A) activities according to the A&A project plan
  • Review, analyze and evaluate business system and user needs, specifically in Authorization and Accreditation (A&A)
  • Perform internal audits of the systems prior to third party audits
  • Reviewed authorization documentation for completeness and accuracy for compliance
  • Facilitated Security Control Assessment (SCA) and Continuous Monitoring Activities
  • Executed examine, interview, and test procedures in accordance with NIST SP A Revision 4
  • Ensured cyber security policies are adhered to and that required controls are implemented
  • Validated information system security plans to ensure NIST control requirements are met
  • Authored recommendations associated with findings on how to improve the customer’s security posture in accordance with NIST controls
  • Assisted team members with proper artifact collection and detail to clients examples of artifacts that will satisfy assessment requirements
  • Updated and reviewed A&A Packages to include Core Docs, Policy & Procedures, Operations and Maintenance Artifacts, SSP, SAR, FIPS 200, FIPS 199, POA&M, CPTPR, BIA, PTA, PIA, and more
  • Collected Operation and Maintenance artifacts on an ongoing basis so that Security Control Assessment (SCA) is seamless
  • Uploaded supporting docs in the System’s Artifact Libraries, Google Docs, and CSAM
  • Updated, reviewed, and aligned SSP to the requirements in NIST, rev4; so that assessments can be done against the actual requirements and not ambiguous statements
  • Managed vulnerabilities with the aid of Nessus vulnerability Scanners to detect potential risks on a single, and multiple assets across the enterprise network
  • Reviewed SAR post assessment; created and completed POAM’s milestones to remediate findings and vulnerabilities
  • Monitored security controls post authorization to ensure continuous compliance with the security requirements

IT Security Analyst

Confidential, Laurel, MD

  • Developed, reviewed, and updated Information Security System Policies, System Security Plans, and Security baselines in accordance with NIST, FISMA, OMB App. III A-130 and industry best security practices.
  • Applied appropriate information security control for Federal Information System based on NIST rev1, SP, FIPS 199, FIPS 200 and OMB A-130 Appendix III
  • Provided security expertise and guidance in support of security assessments
  • Supported A&A (C&A) activities according to the A&A project plan
  • Reviewed authorization documentation for completeness and accuracy for compliance
  • Facilitated Security Control Assessment (SCA) and Continuous Monitoring Activities
  • Executed examine, interview, and test procedures in accordance with NIST SP A Revision 4
  • Ensured cyber security policies are adhered to and that required controls are implemented
  • Validated information system security plans to ensure NIST control requirements are met

Hire Now