We provide IT Staff Augmentation Services!

Branch Chief Resume

5.00/5 (Submit Your Rating)

Washington, DC

SUMMARY:

Cyber - Security practitioner with 24 years of diverse technical experience who leverage current technology to improve business processes private and public sector business. The opportunities performed over the years in the Information Technology (IT) industry evolved

PROFESSIONAL EXPERIENCE:

Confidential

Branch Chief, Washington, DC

Responsibilities:

  • Developed and managed a compliance program charter facilitating annual assessments based on the Risk Management Framework leveraging Confidential standards which required review of all IT Systems that have Authority to Operate (ATO). The annual review was also inclusive of the Security Program which required review of all standard operating procedures with contract personnel to assess knowledge and consistency in incident response.
  • Managed and trained government staff on the assessment process using security controls from the National Institute of Standards and Technology ( Confidential ) and System Administration and Security Institute ( Confidential ) control(s). As a result, the trained staff under my leadership produced twenty assessments from compliance activity which addressed weaknesses in IT processes and allowed for future planning through a Plan of Action & Milestone (POA&M) schedule. The fruit from the Confidential Top 20 assessments also helped in managing efforts with the Security Operations Center to improve workflows for account and patch management and produced recommendations that improved the process for account reviews and patching metrics.
  • Managed and developed media sanitization process to address the backlog of hard drives containing PII data. As a result of implementing this process, destruction of 3,000 hard drives occurred and saved the agency $75,000 in cost leveraging free hard drive destruction services offered at the National Security Agency (NSA).
  • Managed staff efforts to conduct account reviews and clean up account activity of user accounts in Active Directory who should not have elevated access based on specific group assignments and identified accounts of personnel who left the agency which were deleted in accordance to organizational policy.
  • Assessments conducted by the compliance program identified the need for a Data Loss Prevention plan to address insider threat activity and increase efforts to address data retention policy of audit logs stored in Splunk. Managed work activity with the Security Operations Center (SOC) contract personnel to implement a Splunk configuration to store and retrieve historical log data and to also purge archived log data in accordance with organizational policy.
  • Managed FISMA data call metrics for account management and patching numbers for endpoints and servers for the CISO. Developed an automated way to determine the compliance posture based on data gathered from Tenable Nessus vulnerability scans, Tivoli EndPoint Manager (TEM), and Windows System Update Service (WSUS) to report weekly status to management.
  • Managed the responsibility of bringing structure to an asset management process in the government which required development of an automated process to track all assets (physical and virtual) through its life cycle, and provide near real time metrics of inventory thresholds on a monthly basis. The build and implementation of a homegrown asset tracking system provides an inventory data feed into the security program for correlation against other authoritative data. As a result of my efforts, the organization can determine compliance metrics and provide inventory tracking of IT assets that are disbursed to field inspector personnel.
  • Branch Chief for the Network Security Operations Branch ( Confidential ) who managed contract and government personnel to conduct vulnerability assessments, monitor incident response, and security monitoring of server and network activity. Oversaw contract deliverables and reviewed daily status reports of all security related incidents produced through tools that was inclusive of ArcSight, Splunk, BlueCoat, SourceFire, and Symantec Enterprise Endpoint Manager.
  • Managed a tiger team responsible in assisting the organization move to using two-factor card authentication to meet compliance with the HSPD-12 mandate to enforce two-factor authentication for all contractor and government personnel. Developed an automated process to determine HSPD-12 metrics to report to management on a weekly basis.
  • Managed the development of Security Test Scripts with security analyst for web applications to validate functional testing against Confidential security controls. Coordinated with the Application Development team to leverage test scripts in the code build process which produced test results validating specific security findings.
  • Managed the implementation of IBM AppScan in a test server environment with the Application Development team. Oversaw the install and configuration of the tool capability, and provided secure code scan results for two web applications to find code deficiencies against WASP standards. The report findings informed the Application Development team of code deficiencies and prioritized the deficiencies by risk level to resolve before deployment to production systems.
  • Managed and implemented the Symantec Security Control Compliance Suite in a test environment with government staff and contract personnel. Developed the project plan with management for approval and aided in the coordination efforts to mobilize government and contract resources to install and configure the compliance tool capability. As a result, management personnel received compliance-reporting metrics to track the improvement of application security against Confidential standards.
  • Managed the task of validating virtual server builds against Security Technical Implementation Guides (STIGs). Oversaw development of the baseline STIG image build for servers tested for production use. Coordinated with the System Administration team to document registry settings through GPO policy for virtual and physical Linux and Microsoft server builds to improve security compliance of applications across the enterprise.
  • Branch Chief and supervisor overseeing assigned government and contract resources to coordinate and schedule security assessment and accreditation activity for thirteen production web application systems across the enterprise, responsible for compliance metrics for security awareness and role-based training activity.
  • Managed the software assurance process for the government and determined software baseline numbers for various Microsoft products for an annual maintenance agreement contract. Developed a home grown tool to generate software metrics for reporting to management and technical staff for tracking. The software assurance process identified software unapproved software installed on servers and endpoints which imposed increased cost to the organization. Overall, the process reduced the licensing footprint and saved the agency 2 million dollars in cost.
  • Managed the security process to migrate production applications to a private cloud platform by identifying additional security controls to assess against systems of record to ensure security compliance with Confidential standards.
  • Responsible for specialized training of government personnel in security awareness training efforts, and have created detailed tracking mechanisms to report current status of all training percentages to senior management for annual security awareness training and role based training.
  • Worked in the Security Operations Center as a security analyst for two years handling incident response tasks and monitored network and end-point activity using Splunk, Blue Coat, Tivoli EndPoint Manager, and Blue Coat Proxy, WireShark, and Source Fire IDS/IPS.
  • Manage SQL Server 2012 database backend for the security branch and develop frontend tools to track security activity in the areas of asset management, security awareness and training, Nessus vulnerability tracking. Also have a working experience with Open Source platforms such as Linux, Postgres, and Node.JS.

Confidential

Security Engineer, McLean, Va

Responsibilities:

  • Information Systems Security Engineer who managed validation of system security packages before submission to the Certifier for determination of accreditation level and approval of the system.
  • Oversaw development of Certification Test Plans to demonstrate compliance with security control requirements.
  • Performed threat identification using DOD vulnerability scanning tools (DISA Gold Disk, WASSP 5, SECSCN, and Retina).

Confidential

Senior Web Application Engineer

Responsibilities:

  • Team Lead providing technical analysis and documentation on existing web environments, developed a centralized portal framework utilizing Fusebox and Java Script integrating other web technologies for a Boeing Intranet Portal.
  • Developed coding standards for tool interfaces and created project plans to set task timelines to build interfaces for the portal framework.

Confidential

Senior Data Analyst, Vienna, VA

Responsibilities:

  • Senior Data Analyst responsible in creating database schemas in SQL Server 2005 to upload disparate data sets from secure government sites, and implemented scripts to provide integrity checks on data loads from scheduled job tasks.
  • Also constructed XML schemas from different data sets using XML Spy.

Confidential

System Administrator, Herndon, VA

Responsibilities:

  • System administrator responsible in managing Active Directory and Novell 4.11 server platforms for the Federal Emergency Management Agency.
  • Also, performed web development tasks in building an intranet portal to track IT inventory assigned to government and contract personnel using Aperture, Oracle, and Cold Fusion.

Confidential

System Administrator

Responsibilities:

  • System Administrator responsible in managing Active Directory and Novell 4.11 servers, and performed tier 2 help-desk support servicing a staff of 500 employees. Also developed software training packages for staff in preparation of migrating to different software platforms.

We'd love your feedback!