We provide IT Staff Augmentation Services!

It Security Analyst Resume

Baltimore, MD


  • Over 5/6 years of experience in Information Technology services supporting security initiatives for government and commercial customers.
  • Work experience encompasses threat analysis, incident response, network surveillance, Data mining, Risk Management Framework (RMF), System Development Life Cycle (SDLC), Information security documents, developing and promulgating Security Assessment Plans (SAP) and Security Assessment Reports (SARs).


  • Microsoft Office Suite
  • CSAM
  • Adobe
  • Qualified Typist (70wpm)
  • Nessus Vulnerability Scanner (SC - 5)
  • MS Project
  • C+ + Programming
  • XML
  • Microsoft Office


Confidential, Baltimore, MD

IT Security Analyst


  • Conduct IT risk assessment to identify system threats, vulnerabilities and risk, and generate reports.
  • Maintain, review and update information security system documentations procedures, security control baselines in accordance with Confidential guideline and security practices.
  • Apply appropriate information security control for Federal Information System
  • Assess security controls and develop security assessment report (SAR)
  • Support Confidential & Confidential activities (Categorize, Selection, Implement, Assessment, Authorize, Monitor) according to the Confidential & Confidential project plan.
  • Review authorization documentation for completeness and accuracy for compliance.
  • Facilitate Security Control Assessment (SCA) and monitor activities.
  • Executed examine, interview, and test procedures in accordance with Confidential SP Confidential Revision 4.
  • Ensure cyber security policies are adhered to and that required controls are implemented.
  • Validated information system security plans to ensure Confidential control requirements are met.
  • Assist team members with proper artifact collection and detail to client’s examples of artifacts that will satisfy assessment requirements.
  • Review security logs to ensure compliance with policies and procedures and identifies potential anomalies.
  • Update and review Confidential & Confidential Packages to include Core Docs, Policy & Procedures, Operations and. Maintenance Artifacts, SSP, SAR, Confidential 200, Confidential 199, and POA&M.
  • Collect Operation and Maintenance artifacts on an ongoing basis so that Security Control Assessment (SCA) is seamless.
  • Upload supporting documentations into the Sharepoint, Google Docs, and CSAM
  • Manage vulnerabilities with the aid of Nessus vulnerability Scanners to detect potential risks on Confidential single or multiple assets across the enterprise network.

Confidential, VA

Information Security Analyst


  • Conduct security assessment interviews to determine the Security posture of the System and to
  • Perform kick Off Meetings
  • Apply appropriate information security control for Federal Information system based on Confidential Rev 1.
  • Facilitate Security Control Assessment (SCA) and monitor activities.
  • Reviewing, maintaining, and ensuring all assessment and authorization ( Confidential & Confidential ) documentation is included in the system security package.
  • Perform information security risk assessments and assist with the internal auditing of information security processes. Assessed threats, risks, and vulnerabilities from emerging security issues and also identified mitigation requirements.
  • Work with system owners to develop, test, and train on contingency plans and incident response plans.
  • Tests, assess, and document security control effectiveness.
  • Collect evidence, interview personnel, and examine records to evaluate effectiveness of controls.
  • Review and update remediation on plan of action and milestones (POA&Ms), in organization’s CSAM Work with system administrators to resolve POA&Ms, gathering artifacts and creating mitigation memos, residual risk memos and corrective action plans to assist in the closure of the POA&M.


Help Desk/ User Support


  • Desk service agent providing support to office automation hardware (PCS, laptop - docking stations Printers, scanners, PC projectors, fax machines) Software and standard MS office 2003 Professional) Network and password rests.

Hire Now