We provide IT Staff Augmentation Services!

Information Assurance Manager Resume Profile

5.00/5 (Submit Your Rating)

NC

Experience Summary

  • Over 10 years of Network Management experience focusing on Information Assurance IA , Systems Administration and Computer Network Defense CND supporting large enterprise clients.
  • Verbal, written, and presentation communication skills are exceptional as it relates to all levels of management and cross functional teams.
  • Proven record of evaluating system vulnerability in order to recommend security improvements as well as improve efficiency while aligning business processes with network design and infrastructure.
  • Superior capacity to solve complex problems involving a wide variety of information systems, work independently on large-scale projects, and thrive under pressure in fast-pace environments while directing multiple projects from concept to implementation.
  • Experience with information security devices e.g. firewalls, and intrusion detection/prevention systems and security information management, correlation, and collaboration tools/web based applications such as Microsoft Office Suite, MS Server R2, MS SharePoint/Project/Visio, MS TFS, MS SQL, DIACAP, SSAA, Linux, System Center Configuration Manager SCCM , MS Active Directory, Bluecoat Proxy, Remedy, Citrix,OSI Model, SOX, PCI-DSS,ITIL, NIST, FISMA, COBIT, SIEM, HP Software Security Center,HP Jet Direct, Solarwinds, WhatsUp Gold, PureEdge, Adobe Connect, Defense Travel System DTS , COGNOS, Retina, QTIP, MS Network Baseline Security Analyzer, Flying Squirrel, USB Detect, Cisco VPN and ASA Firewall, Symantec Endpoint Protection/SIEM/DLP, HBSS ePO/HIPs/PA/ABM/RSD, McAfee DLP, Tenable Nessus, Metasploit, Wireshark, GFI LanGuard, and Log Collector.

Employment

Confidential

Information Assurance Manager

Manage security-related projects including remediation of vulnerabilities, implementation of new security technologies or tools, and coordination of audits. Monitor equipment logs for anomalies and threat intelligence feeds for vulnerabilities, threats or trends. Create, test and implement disaster recovery and business continuity plans.Perform threat, vulnerability, and risk assessments. Manage/perform security audits. Develop security awareness products and conduct training for military and civilian customers. Perform or assist with investigations. Enforce Information Assurance Vulnerability Management IAVM dissemination, reporting, compliance, and verification procedures according to regulations, policies and Army Best Business Practices.I completed DIACAP packet for strategic NIPRNET, SIPRNET, and CENTRIXS networks which included the SIP, DIP, Scorecard, Supporting Documentation, and POA Ms.Create, maintain, and document security baselines for classified and unclassified networks.Performed physical security assessments for locations occupied by US military/civilian personnel, coalition, and Afghan local nationals with classified AIS equipment. Perform remediation of third party patches and MS updates using GFI LanGuard,WSUS, and SCCM. Performed Retina, HBSS, QTIP, USB Detect, Flying Squirrel network scans for network vulnerabilities, antivirus definition updates, unauthorized software, unapproved PED, cross-domains and unapproved wireless devices. Establish MAC Filtering on all enclaves to mitigate against cross-domains and trained employees on processes of Blacklisting/Whitelisting AIS devices. Develop, prepare, distribute, and maintain plans, instructions, and SOPs/TTPs concerning system security. Monitor and ensure military commands compliance with published IA policy and guidance, DISA Security Technical Implementation Guides STIG , Information Assurance Vulnerability Alerts IAVA and Bulletins IAVB , Operational Directives, and CTOs.User account administration, media control, security audit reviews, implementation and enforcement of DOD computer security policies/procedures/directives, and system security training.Perform troubleshooting of HBSS components and applications when ePO policies are preventing application operations. Maintain the latest HBSS configuration to address known exploits using the HIPS. Monitor the HBSS for alerts, assess and modify the HBSS operational parameters filters, signatures, rules when requested. Conduct analysis of malicious events and known exploits/vulnerabilities for the creation of custom signature rule sets for the accompanying modules. Install HBSS SADRs on NIPRNET, SIPRNET, and CENTRIXS for systems to receive antivirus updates on all enclaves. Support day-to-day administration of various security systems including firewalls, IDS, IPS, AV, scanners, patching and remediation systems, content filtering, DLP, and SIEM.

Confidential

Information Assurance Security Officer

Support the execution of the DoD Information Assurance Certification and Accreditation Process DIACAP and annual security reviews for custom developed and integrated COTS solutions. Assist in tracking, completion, and reporting of actions required to resolve IA issues, alerts, plan of action and milestones POAMs . Utilize automated tools to support IA functions including vulnerability scanning and reporting. Supports multiple change management processes by evaluating changes for potential impacts to the organization's security posture. I have in-depth experience with DoD Information Assurance IA architecture and equipment to include RETINA server, Window Server Update Server WSUS 3.0, Microsoft System Center Configuration Manager SCCM , GFI Event Manager and GFI LanGuard Server. Active Directory services, ports and protocols and DISA STIG compliance also efficient with Yellow Jacket, Q-Tip, Harris Stat, Microsoft Patch Deployment and Log Collector. I have successful and progressive experience in systems implementation, vulnerability assessments, consulting, dispersed team management, risk assessment and accreditation. Also I have experience in Configuration and Release Management documenting creating, reviewing/revising, and managing HW/SW/Security Baseline releases and process improvement activities for enterprise level security process/validation/verification best practices and infrastructure. DIACAP / DOD 8500.2 / DOD 8510.01 and IA Vulnerability Management IAVM experience.

Confidential

Senior Consultant

Prepare and present briefings to senior military leadership, and high-level government management personnel as required. Oversaw the day-to-day operations and execution of contract deliverables associated with the coordination of all network installations and upgrades, thus maintaining cognizance over all C4I installation activities for the HQ FORSCOM Operations Center FOC as it relates to strategic/tactical voice and data networks. Monitoring vulnerability risk alerts from Microsoft, Symantec and Sun and escalating critical alerts to COS for immediate remediation. Provide multi-tier support for software/hardware to remote and local FORSCOM customers and its components. Monitor the status and performance of and maintenance of installed communications, computer systems and local area networks LAN . Perform desktop support of laptops, workstations, servers, and printers, interface with the customer, and install desktop and server hardware and software. Operate video teleconferences equipment. Maintain and create reports, schematics and databases to support the customers using JOPES, GCCS-A, COGNOS, and other deployments and transportation related software packages.

Confidential

Systems Support Specialist

Assist PC Support Manager as a liaison with project management office PMO to ensure project work was performed according to scope. I oversaw retail banking systems RBS migrations which upgraded 3500 workstations and 100 servers. Perform technical analysis of complex software/hardware using various diagnostic tools in support of network operations. Prioritize, classify and resolve problems utilizing remote tools or via desktop visit with hands-on troubleshooting where necessary. Work closely with other departments to ensure successful support of existing environment including new projects and installations. Mentored team members to improve their understanding and skillset related to hardware/software within the banking industry.

Confidential

Information Management Officer/ Senior Lithographer

Serve as team lead for section thus leading and managing soldier personnel in garrison and on deployments. Managed and maintained reproduction equipment over 5 million which included digital/horizontal cameras, copiers, digital duplicators/presses, and multi-headed offset presses.

As an Information Management Officer IMO created users accounts and managed security permissions and outlook exchange setup. I imaged/restored desktops/laptop computers as required. Installed, configured, and maintained customer software/hardware and other peripherals including desktops, laptops, printers, digital senders, switches, and VOIP phones.

Confidential

As a Network Security Analyst with the US Army Reserves Information Operations Command I serve as a member of a computer emergency response team CERT support group, a technical research team and an information infrastructure defense assistance team. Address numerous security areas, including information assurance, virus detection and prevention, vulnerability assessment, intrusion detection and cyber incident response. Specialize in identifying hidden files, performing analysis of suspicious network traffic, analyze registry entries and recover user passwords. Maintain information assurance capability for the Army by protecting, detecting and assessing, restoring and responding to related cyber threats. I'm knowledgeable of network security concepts, experience with the details of secure implementations and a firm grasp of security best practices. I conducted training on securing UNIX and Windows operating systems as well as Microsoft Exchange Servers, Internet Information Servers, file servers, Active Directory, DNS, and MySQL Servers. Also trained on the ability to use intrusion detection systems IDS and network traffic encryption technologies deploy network routers and firewalls to secure the network topology and install and configure proxy servers, centralized software patching services and e-mail filters. Experience with the following Endpoint Technology Areas: McAfee and Symantec Endpoint Suites, Host IPS, Encryption, Host DLP, Advanced Malware, and Application Control. Experience with McAfee Vulnerability Manager and Policy Auditor, Nessus and Symantec.

We'd love your feedback!