We provide IT Staff Augmentation Services!

It Specialist Resume

Arlington, VA

SUMMARY

  • Over twenty years of experience supporting and working for the Federal government.
  • Key strengths include Cyber Security, Project Management, and Software Development.
  • Excellent analytical skills with the ability to design and develop an entire system from start to finish. Demonstrated by leading the development of many applications that promotes better business process within the organizations Leading Change, Results Driven
  • Work extensively with ISC2 as SME to develop test questions for the Certified Secure Software Lifecycle Professional (CSSLP) Certification exam. Leading Change, Building Coalitions
  • Continually demonstrate professional deportment, setting the example for all peers to emulate. Actively sought out for advice as senior member in multiple organizations. Leading People, Results Driven
  • Manage requirement analysis and implementation of many projects that are led by my team within the National Cyber Protection System. Business Acumen, Leading People

AREAS OF EXPERTISE

  • Develop Winning Teams
  • Develop Strategies
  • Innovation
  • Negotiation
  • Leading Change
  • Program Management

PROFESSIONAL EXPERIENCE

IT Specialist

Confidential, Arlington, VA

Responsibilities:

  • Provide supervisory and managerial oversight to subordinate supervisors and staff, to include contract staff, to ensure the assigned work is completed in a timely manner. Evaluate the work of staff, provide feedback and resolve conflicts when needed. Business Acumen, Leading People
  • Provide expertise to the Network Security and Deployment staff in matters of software engineering, information sharing, and various cyber - related subject areas that provide confidentiality, integrity, availability authentication, and non-repudiation. Leading Change, Leading People
  • Consult with customers to evaluate functional requirements; coordinate with architecture, security, and other functional teams to provide oversight in the development of solutions, to define project scope and to make sure project objectives are based on customer and mission requirements. Business Acumen, Building Coalitions
  • Develop Enterprise Services plan and strategy for Identity Credential and Access Management (ICAM) Solutions to be used by each project within the program. Building Coalitions, Leading Change
  • Follow Agile and Waterfall Methodologies and the Confidential Software Development Lifecycle (SDLC) process to include improving controls at all phases of solution development and maintenance, from planning through disposition. Results Driven
  • Conducted Alternative of Analysis and other evaluations on various information sharing capabilities in order to influence and develop long and short range plans.
  • Developed information-sharing solutions for the goals set forth by the National Strategy for Information Sharing and Safeguarding as well as the recent Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience (CISR) and Executive Order (EO) on Cybersecurity. Building Coalitions, Leading People
  • Worked with the Comprehensive National Cybersecurity Initiative (CNCI-5) and Enhanced Shared Situational Awareness inter-agency groups to assess policy needs and to develop an information sharing framework for governing cyber information sharing for the Federal Government. Building Coalitions, Leading Change
  • Provide expert technical support by providing detailed reports and recommendations to the Confidential Program Offices on programmatic implementation. Identify problems and recommending solutions that are important to the organization’s program direction. Problem Solving
  • Collaborate with internal and external partners to ensure effective operation of programs as well as to assess new system design and to improve software quality for the organization. Develop and recommend changes to existing systems engineering policies, procedures and guidelines. Building Coalition

Manager

Confidential, Reston, VA

Responsibilities:

  • Provided supervisory and managerial oversight to subordinate supervisors and staff, to include outside contractors, to ensure the assigned work performed was of the highest quality. Participated in special projects, ongoing analyses, investigations, and initiatives that have high priority for upper-level management. Results Driven, Leading People
  • Ensured various parts of each team’s proposals covered all areas of the PIV Card Replacement System, to include collection of information from federal employees, contractors, as well as securing facilities, unescorted access to Confidential -owned facilities and commercial facilities operating on behalf of Confidential, access to Confidential IT systems and data, or access to classified systems or information. Business Acumen, Leading Change, Building Coalitions
  • Developed proposals relating to cybersecurity. Consistently ensured that all proposals were complete, concise, relevant, and in the prescribed format. Submitted all proposals well within established deadlines. Business Acumen, Building Coalitions

President

Confidential, Alexandria, VA

Responsibilities:

  • Contract called for the consolidated the security operations business processes of all 22 Confidential Component SOCS, NOCS, and Privacy offices with the development of the Confidential Enterprise Operations Center (EOC) online Portal. The portal enabled incident reporting, collaboration, vulnerability management, and an Executive Level Dashboard to provide situational awareness across the Department. Business Coalition, Leading Change, Results Driven
  • Produced complex analyses and written reports for Confidential Management and the Office of Management and Budget (OMB) for the Federal Information Security Management Act (FISMA). Leading Change, Building Coalitions
  • Developed long-range plans that anticipated, identified, evaluated, and mitigated risks associated with system vulnerabilities. Leading Change
  • Interfaced with the Confidential Component Security Operations Centers to determine requirements and required system attributes necessary to execute the Confidential mission of the Enterprise Operations Center. Building Coalitions
  • Managed incident, network, and vulnerability data shared across the department in response to cyber security incidents, network outages, and vulnerability scans and notices. Results Driven, Building Coalitions
  • Provided supervisory and managerial oversight to subordinate supervisors and staff, to include outside contractors, to ensure the assigned work performed was of the highest quality. Leading People
  • Worked with vendors to integrate external cybersecurity products such as Symantec Risk Automation Suite, Tenable, and Arcsight into the EOCOnline portal. Building Coalitions, Results Driven
  • Provided security analysis expertise to the EOC to include incident handling, security event management, vulnerability assessments, and facilitated daily situational awareness meetings that included multiple Confidential components as well as US-CERT. Leading People

Sr. Security Analyst

Confidential, Springfield, VA

Responsibilities:

  • Performed multiple duties required for network security including network monitoring, creation of security event notifications, incident response, vulnerability assessment scanning, and development of department-wide policies relating to security. Results Driven, Business Acumen
  • Improved productivity and streamlined business processes for managing security operations by consolidating enterprise operations with the development of an Enterprise Portal. This allowed operations to be conducted in a centralized mode, thus providing greater managerial oversight. Leading Change, Building Coalitions, Results Driven
  • Followed the Software Development Lifecycle (SDLC) process of Confidential to include improving controls at all phases of solution development and maintenance, from planning through disposition. Results Driven

Information Technology Specialist

Confidential, Arlington, VA

Responsibilities:

  • Spearheaded the initiatives for “Build Security In”, “Common Body of Knowledge” (CBK), and hosted Software Assurance Forum events expounding on the best practices to developing secure software code. Leading People, Leading Change, Building Coalitions
  • Provided supervisory and managerial oversight to subordinate supervisors and staff, to include outside contractors, to ensure the assigned work performed was of the highest quality. Leading People

Senior Security Analyst

Confidential, Fairfax, VA

Responsibilities:

  • Collaborated with various teams to provide multiple inputs to dashboard which required interfaces to a host of other Confidential applications, including email gateway and proxies. Building Coalitions, Results Driven, Leading Change
  • Ensured dashboard represented current state of computer security operations throughout Confidential to include status of computer viruses, spam email, intrusion detection state, patch management, and vulnerability management notices for remediation purposes. Leading Change, Building Coalition, Results Driven
  • Followed the Software Development Lifecycle (SDLC) process of Immigration and Customs Enforcement (ICE) to include improving controls at all phases of solution development and maintenance, from planning through disposition. Prepared interface control diagrams, logic tables, and linkages with other applications systems. Performed testing, validation, and documentation of all applications. Results Driven
  • Provided IT Security support to Confidential CSIRC and associated component agencies, to include identifying and preparing Information Security Vulnerability Management (ISVM) notices, providing support to CSIRC Hotline for incoming computer security issues and reporting security incidents using CSIRC Incident Handling System with further escalation to the US-CERT. Results Driven, Building Coalition, Leading Change

Hire Now