Is Security Supervisor Resume
SUMMARY:
IT security professional with years of leadership, training, and problem solving experience in various private and government environments.
TECHNICAL SKILLS:
SOFTWARE COMPETENCIES: Microsoft Windows XP/7, Windows Server 2003/2008, Microsoft Office 2003/2007/2010/2013 , Open Office, Wireshark, Microsoft Visio 2003/2010/2013 , Microsoft Project 2003/2010, Mobile Armor, Tripwire, eEye Retina, eMASS, Xacta, Confidential Vulnerability Management System (VMS), Tenable Security Center, McAfee ePO, Triton Websense
AREAS OF EXPERTISE: Leadership; Problem Solving; Troubleshooting; Job Planning; Budgeting; Communications; Technical Research; Information Security; Technical Trainer; TCP/IP; Technical Writing; Application Performance Testing; Network Performance; Cross Domain Solutions; Cross Domain Approval Process; Confidential Certification and Accreditation; Requirements Gathering; Requirements Management; Project Management; Risk Management; Policy/Procedure Development; Confidential Guidance
AREAS OF EXPOSURE: VLAN; LAN; Cisco - IOS; Cisco Routers; Cisco Switches; System Analysis; System Design; Use-Cases; Data Models; UML; User Interface Design; Routing Protocols; Disaster Recovery Planning; Business Continuity; Contingency Planning; Network Modeling/Simulation; Mobile Armor System Administration; ArcSight administration; SourceFire; Business Development; Proposals Writing; FISMA; Enterprise Architecture; Web Application Firewall
WORK EXPERIENCE:
Confidential
IS Security Supervisor
Responsibilities:
- Performing the duties of a Chief Information Security Officer ( Confidential ).
- Attempting to change the culture of the organization from a security perspective to ensure industry best practices are followed.
- Leading the initiative of establishing an Information Security Program for the organization.
- Developing policies, procedures, and guideline for the department and the entire organization.
- Established a security framework based on National Institute of Standards and Technology ( Confidential ) guidance.
- Provide approvals for changes in permissions - web filtering, file share access, application access, etc.
- Supervise and perform periodic audit of user permissions.
- Provide metrics to senior leadership on a monthly basis for visibility and address concerns.
- Coordinate with other departments, such as Purchasing and Risk, to ensure security is aligned with their business goals and objectives.
- Defines and manages security department annual budget.
- Developed Request for Proposal (RFP) to have security assessment performed in order to determine the current security posture of the organization following Confidential 800-53 r4 security controls.
- Provided oversight for the security assessment to ensure the project was completed on time and within the budget.
- Lead the initiative in implementing Role Based Access to critical applications which house Confidential .
- Developed and implemented a mandatory security awareness program.
- Perform annual reviews of security staff.
- Assist in interviewing candidates in other departments as well as security department candidates.
- Developed a five year roadmap to show the organization how the organization could improve its security posture and maintain an acceptable level of risk.
- Mentors staff to ensure they can reach their professional goals.
- Evaluates security products that meet business objectives and provide recommendations.
- Identifying staff required to complete new security initiatives.
Confidential
Information Assurance Analyst
Responsibilities:
- Identify current vulnerabilities and provide recommendations on mitigation strategies.
- Assist Information System Security Manager ( Confidential ) with reporting Vulnerability Management compliance for their different Programs of Record ( Confidential ) to the Network and Operation Security Center.
- Provide recommendation on procedures to implement with vendors to ensure systems remain compliant with Confidential regulations.
- Develop and review security documentation which provides the Confidential with a complete understanding of their security posture.
- Developed the architecture to deploy a continuous compliance monitoring tool which will help to track compliance with Confidential regulations.
- Developed two white papers: One was developed to address deficiencies in manpower supporting this department’s security efforts.
- The other was making recommendations for an enterprise-wide compliance monitoring tool deployment.
- Attend weekly Working Group meetings to plan for new initiatives as well provide updates to current tasks.
- With our successful deployment of the continuous monitoring solution, we’ve become the resident experts for the Confidential .
- Became the Subject Matter Expert (SME) for the Tenable security product.
- Attended meeting with Confidential representatives to make recommendations on how the Confidential should implement the tool enterprise wide.
- Assisted business development team respond to Request for Proposals (RFP).
Confidential
Associate
Responsibilities:
- Supported one of the Defense Information Systems Agency ( Confidential ) high-visibility program reaccreditation efforts.
- Assisted in the development of documentation to provide the Chief Information Officer (CIO) with the security posture of the program.
- Assisted in leading weekly status meeting to track progress of delegated documentation development efforts.
- Provided recommendations of meeting federal security requirements. Worked with vendors to ensure/validate they are compliant with mandatory federal regulations.
- Assisted in the development of the project timeline of the next version of the system. Worked with engineers in getting Ports, Protocols, and Services approved through the Confidential Ports, Protocols, and Services Management (PPSM) Office.
- Assisted with project scheduling and tracking of software and documentation development to support the Confidential efforts to implement Public Key Infrastructure (PKI) on government systems. Monitored and reported on project budget to the government client to protect against cost overruns.
- Performed security reviews for several Confidential systems within their classified enclave. Performed security reviews to validate compliance with established Confidential policies and guidelines.
- Developed technical and security agreements between the US Department of Defense ( Confidential ) and its closest coalition partners, which addressed possible security concerns as well as organizational roles and responsibilities. Assisted in the development of test cases to be performed between the Confidential and coalition exercise.
- Assisted in functional testing the proposed architecture prior to the coalition exercise.
- Worked closely with engineers to identify the best solution which would meet the client’s requirements while keeping their cost down.
- Assisted clients through the entire lifecycle of getting their cross domain solution approved for use on the Confidential enterprise network.
- Performed duties as a Project Manager for several projects, where each project would take 6 months or more to complete.
- Developed and maintained project schedules for new implementations; finding available resources; and provided customer’s progress throughout the process to ensure they meet their project milestones. Assisted customers in developing a cost strategy when their cost exceeded their expectations.
- Assisted our business development team in responding to RFPs and Request for Information ( Confidential ) from the federal government.
Confidential
Information Assurance Engineer
Responsibilities:
- Supported Information Assurance Domain Lead on the Consolidated Afloat Network and Enterprise Services ( Confidential ) proposal, which our architecture was selected to be one of two companies selected to design the final product.
- Assisted in developing test cases to be used in government demo to show the goodness of the Defense in Depth approach in our architecture.
- Assisted with integrating various commercial of the shelf ( Confidential ) security products to create a Defense in Depth solution, to include Data Loss Prevention solutions. Attended senior management meetings when the lead architect was not available.
Information Assurance Analyst
Confidential
Responsibilities:
- Supported Confidential Information Assurance (IA) team efforts by collecting data and reviewing documentation to ensure compliance with established Confidential procedures and guidelines for the US Confidential System Command ( Confidential ).
- Ensured technical and administrative security controls were in compliance before providing a recommendation to authorize the information to operate on the Confidential network.
- Performed vulnerability assessment scans using industry recognized tools to help various programs to generate their Plan of Action and Milestone.
Systems Engineer
Confidential
Responsibilities:
- Supported data modeling, collection and documentation efforts for the Data Center Transformation ( Confidential ) program.
- Responsible for interfacing with other subject matter experts to collect, analysis, and document data for Messaging, File, or Applications technologies using modeling & simulation tools like OPNET, scripts, or vendor test tools.
- Provided support in the form of documentation and/or programming to contribute to the completion of Confidential milestones.
- Performed functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
Technical Consultant
Confidential
Responsibilities:
- Provided support to hospitals and laboratories throughout the US and Canada.
- Troubleshot with lab technicians and Field Service Engineers over the phone or via modem to repair hardware, software, and reagent issues.
- Repairs that could not be solved over the phone, dispatched Field Service Engineers to the sites to repair equipment. Scheduled Field Service Engineers for problems that could not be repaired. Maintain a dispatch log to alert management of any coverage issues.
- Certified to repair all hemostasis equipment manufactured by Trinity and Confidential .
System Engineer
Confidential
Responsibilities:
- Provided 24/7 coverage to hospitals and laboratories in the US, Canada, France and other european countries.
- Troubleshot with lab technicians and Field Service Engineers over the phone or via modem to repair hardware and software issues.
- Repairs that could not be solved over the phone, dispatched Field Service Engineers to the sites to repair equipment.
- Certified to repair all hemostasis equipment manufactured by Confidential .
