We provide IT Staff Augmentation Services!

Project Manager Resume

4.00/5 (Submit Your Rating)

SUMMARY:

  • I am seeking a challenging position; which allows me to make an immediate contribution to the company.
  • Exceptional problem - solver with keen ability to resolve issues; analyze/define business operations for improvement; plan, design, develop, and implement highly successful administrative policies and processes.
  • Excellent interpersonal, written, and verbal communicator who can deliver effective presentations, consult on projects, make recommendations, and communicate highly technical information to senior leadership.
  • Strong team leader and facilitator who excels in mediating among multiple divisions or large organizations and maintaining productive, collaborative relationships with staff members and stakeholders.
  • I have experience in developing system security plans, risk assessments, incident response plans, and contingency plans.
  • I also conduct cyber security capability validations in accordance with established practices and standards.
  • I conduct federal Computer Network Defense (CND) validations in accordance with established practices and standards.
  • I provide support for the creation of reports and compliance dashboards based on the data gathered through assurance programs.
  • I develop and pilot risk based assessment programs with measurable performance metrics which target key areas of federal civilian network defense.
  • I conduct research to maintain awareness of current and emerging cyber security capabilities, technologies, vulnerabilities, and threats.
  • I ensure suspected system security intrusion incidents are reported, Run Gold Disk and Retina Scans of assets, upload reports to Vulnerability Management System (VMS), Nmap, nesses and address discrepancies.
  • I ensure that all new assets are compliant to the latest DIACAP Security Standards and I conduct STIG checklists (Security Technical Implementation Guides) on all new assets that are on the network.

AREAS OF EXPERTISE:

  • Information Assurance
  • Design and Implement Procedures
  • Incident Response
  • Team Builder
  • Risk Assessments
  • Microsoft Office Suite
  • Cyber Security
  • Project Management

PROFESSIONAL EMPLOYMENT HISTORY:

Confidential

Project Manager

Responsibilities:

  • Develop, modify, build, implement, deploy and test SIEM correlation and vulnerability management rules in alignment with client requirements utilizing change management best practices.
  • Develop and maintain internal asset classification and categorization in the vulnerability management portal.
  • Guide client with a primary mission to proactively prevent incidents by utilizing Vulnerability Scanning recommended solutions as appropriate.
  • Perform security incident analysis, recommend remediation steps and orchestrate available resources to respond in accordance with appropriate incident response plans.
  • Configure and manage security tools in compliance with Department of Defense requirements while also ensuring continued compliance for all devices.
  • Generate and review ACAS scans reports to include IAV and STIG related findings, upload results to clients as prescribe in Security center.
  • Monitoring the security posture of assigned networks and develop mitigation plans and tasking to address vulnerabilities.
  • Work with the security operations center team to ensure security devices/tools are configured properly to monitor, track, and analyze networks/systems for potential security violations while also assisting in all potential incidents.
  • Work in close coordination with the Information Assurance team and SOC to appropriately resolve daily incidents.
  • Ensure customers are following Confidential, Confidential, organizational policies and procedures regarding asset security.

Confidential, Adelphi, MD

Project Manager

Responsibilities:

  • Assisted in the maintenance and assurance of information systems to protect data from unauthorized users.
  • Provided knowledge of commonly-used concepts, practices, and procedures within the information security field to include the ability to identify, report, and resolve security violations.
  • Performs risk assessments, identifies potential of exploitation, and assigns risk levels to systems.
  • Conducts vulnerability assessments and security scans of systems and networks to identify and mitigate security vulnerabilities.
  • Generates IA related reports and documentation, including Validation Reports and Plans of Action and Milestones.
  • Reviews and analyzes vulnerabilities that have been identified as being required for system functionality.
  • Participates in and conduct security related meetings and teleconferences.
  • Maintain awareness of the latest security tools, including vulnerability assessment, network discovery, penetration, and other tools that could aid in providing better services.
  • Conduct highest quality technical analysis in the area of Computer Intrusion Analysis, Systems and Vulnerabilities, and Information Operations and produces.
  • Assists in the maintenance and assurance of information systems to protect data from unauthorized users.
  • Stays current with threats/product vulnerabilities, with a particular focus on how they relate to Confidential systems.
  • Reviews latest patch releases to identify the risks of delaying patch application and to identify possible alternative mitigations.

Confidential, Adelphi, MD

Information Assurance Network Scanner

Responsibilities:

  • Performs risk assessments, identifies potential of exploitation, and assigns risk levels to systems.
  • Conducts vulnerability assessments and security scans of systems and networks to identify and mitigate security vulnerabilities.
  • Generates IA related reports and documentation, including Validation Reports and Plans of Action and Milestones.
  • Reviews and analyzes vulnerabilities that have been identified as being required for system functionality.
  • Participates in and conduct security related meetings and teleconferences.
  • Maintain awareness of the latest security tools, including vulnerability assessment, network discovery, penetration, and other tools that could aid in providing better services.
  • Conduct highest quality technical analysis in the area of Computer Intrusion Analysis, Systems and Vulnerabilities, and Information Operations and produces.
  • Assists in the maintenance and assurance of information systems to protect data from unauthorized users.
  • Stays current with threats/product vulnerabilities, with a particular focus on how they relate to Confidential systems.
  • Reviews latest patch releases to identify the risks of delaying patch application and to identify possible alternative mitigations.

Confidential, Ft. Belvoir, VA

Project Manager

Responsibilities:

  • Served as an IT Project Manager on a contract in the Plans and Architecture Branch of the 7th Command.
  • Ensured compliance with Confidential strategic goal, increasing customer awareness, which includes follow-up of requirements; customer feedback and actions.
  • Determined appropriate procedures or processes to define project scope, requirements, and deliverables.
  • Developed, modified, or provided input to project plans; implement project plans to meet objectives; coordinate and integrate project activities; manage, lead, and administer project resources.
  • Monitored project activities and resources to mitigate risk; implement and maintain quality assurance processes.
  • Provided suggestions to make improvements, solved problems, and took corrective action utilizing problem solving skills.
  • Created and presented briefings on all aspects of the project; participate in multiply phases, milestones, and final project reviews.
  • Identified project documentation requirements and procedures, while analyzing information systems requirements, design and conducted analytical studies, cost-benefit analysis, and other researches.
  • Evaluated, monitored, and ensured compliance with applicable laws, regulations, policies, standards, or procedures; throughout the project execution.
  • Participated in change control (for example, reviewing configuration change requests) while managing multiple and varied IT projects, programs and initiatives requiring knowledge of IT technologies such as, client/server design methodologies, relational database management systems, test facilities and integration methodologies.
  • Interfaced with the government to resolve complex issues, by setting up various meeting and get agenda ready for discussion.
  • Tracked completion of work requests received from various customer sources; provide effective and courteous assistance and response to customers’ inquiries, including feedback related to problems resolution.
  • Ensured customers understand planning and funding requirements throughout project process.
  • Managed and was responsible for technical aspects of the project from beginning to end, and met deliverables by writing WAR reports on weekly basis.
  • Applied in depth knowledge of Federal, Confidential, Confidential policy and regulations throughout the project management process; thereby ensuring Networthines and other Information Assurance compliances, such as completion of TEMPEST, Tenant Security Plan (TSP), or Authorization to Operate (ATO).
  • Identified and defined project scope and manage all resources, including subcontractors, required to get project completion.
  • Managed all aspects of the project including project scope, resource assignment, project plan development, project tracking, monitoring and reporting through the application of proven project management principles and methodologies.
  • Developed and maintained all project documentation and Communication Plan with contractors and stakeholders.
  • Worked with contractors and stakeholders to avoid project over run on all project and adhere to project scheduled.
  • Informed all departmental heads on Project Status on weekly basis.
  • Used critical thinking skills to anticipate and manage potential risks that will arise.
  • Communicated these risk to the stakeholders on a regular basis and ensure decisions are made quickly and effectively.

Confidential, Reston, VA

Help Desk Manager/System Administrator

Responsibilities:

  • Assigned tickets to technician base on area of expertise and competence and follow through until the problem is resolved to our customer satisfaction.
  • Served as the point of contact for all inquiries related to network administration, helpdesk management and day to day activity relating to Confidential contract.
  • Assisted in adding and configuring new printer to the Confidential network.
  • Provided phone and desk side support to clients when necessary and served as POC for the front office.
  • Attended to any technical needs of the Surgeon General, the Deputy Surgeon General and the Chief Of Staff Office for the Navy.
  • Attended meetings with government representative; while engaging in dialogue, planning and implementing the final outcome of the meetings.
  • Created new user accounts, new network drives and a template for new users to be able to scan documents on the Xerox printer.
  • Created tickets for trouble calls through the Call Center and provide resolution to trouble calls at customer locations.
  • Resolved IT related issues, and provided a variety of network services, including resetting/unlocking NIPRNET and SIPRNET accounts, using Active Directory, a remote tool used to monitor, control and connect to network accounts.
  • Reset windows password in the Active Directory.
  • Facilitated the migration of user accounts into a new domain.
  • Removed and transferred accounts to transition OU installed and configured VPN clients.
  • Troubleshooted connectivity problems.

Confidential, Washington, DC

Information Assurance Analyst

Responsibilities:

  • Conducted highest quality technical analysis in the area of Computer Intrusion Analysis, Systems and Vulnerabilities, and Information Operations and produces.
  • Assisted in the maintenance and assurance of information systems to protect data from unauthorized users.
  • Provided knowledge of commonly-used concepts, practices, and procedures within the information security field to include the ability to identify, report, and resolve security violations.
  • Served as the focal point for program information systems security and security awareness information.
  • Developed system security plans, risk assessments, incident response plans, and contingency plans.
  • Developed and administered information system security guidelines and procedures.
  • Ensured safeguards are implemented to protect against malware.
  • Ensured suspected system security intrusion incidents are reported.
  • Ensured compliance with the System Security Program.
  • Initiated protective and corrective measures when a security problem is discovered
  • Conducted Risk and Vulnerability Assessments and Operational Threat Assessments using automated vulnerability scans and penetration tests.
  • Conducted Gap Analysis and Remediation by identifying areas where automated cyber tools do not exist.
  • Conducted cyber security capability validations in accordance with established practices and standards.
  • Conducted federal Computer Network Defense (CND) validations in accordance with established practices and standards.
  • Provided support for the creation of reports and compliance dashboards based on the data gathered through these assurance programs.
  • Developed and piloted risk based assessment programs with measurable performance metrics which target key areas of federal civilian network defense.
  • Updated current assessment models and supplement with risk based performance metrics.
  • Conducted research to maintain awareness of current and emerging cyber security capabilities, technologies, vulnerabilities, and threats.

Confidential, Washington, DC

Lead Helpdesk/ Helpdesk Manager

Responsibilities:

  • Assigned tickets to technician’s base on area of expertise and competence and provided follow - up services to the customer base until the problem is resolved to ensure customer satisfaction.
  • Served as the point of contact for all inquiries related to network administration, helpdesk management and day to day activity relating to Confidential contract.
  • Managed tracking systems, case log sheets and file organization procedures, while establishing software library to include: license control, software control, data input into Asset Control Tracking System inventory ( Confidential ) management system.
  • Reviewed and established document control, contract, warranty maintenance, and coordinated with Logistics for hand receipt turn in, issuance, service and contracting office.
  • Conducted research to develop or acquire new IT products/services that will increase systems and user efficiency.
  • Developed and modified methods and processes for testing, demonstrating and prototyping new technologies.
  • Established statement of need for contracts for purchasing software or hardware include estimates of funding and time phasing requirements.
  • Reviewed and evaluated contractor proposals; develops performance and/or systems standards, and monitors performance including conformance with price and schedule provision of task orders.
  • Provided hands-on working knowledge in MS Windows XP, IBM-compatible personal computers, software installation, Citrix clients, CAC Readers, Blackberry and remedy application support.
  • Mapped client to the network and configured outlook and setting up email account for the client.
  • Installed and configured fast data for users. Installed and configured CHCS 1 and CHCS2 for clients in the military environment.

Confidential, Largo, MD

LAN Technician/System Analyst

Responsibilities:

  • Reset users password both mainframe and windows terminals.
  • Performed Login functions to the mainframe to check users login ID and reset password.
  • Removed users out of the mainframe when necessary and reset mainframe printers.
  • Inputted user's information into magic service desk for tracking until the request is resolved
  • Forwarded the users request to the appropriate section of the department for ticket resolution.
  • Investigated root causes of data quality issues within the IPCA Database, to insure that information is accurately entered in the system.
  • Answered telephone calls at the call center, help resolved user’s problem and escalate the ticket when necessary.

Confidential, Bowie, MD

Help Desk Support/ Systems Consultant

Responsibilities:

  • Provided phone and in-person support to users in the areas of outlook configuration.
  • Served as the initial point of contact for any network connectivity problems.
  • Provided technical support to end users in windows environment.
  • Monitored network resources, diagnosing using Solar wind software.
  • Added printers to network printers and mapping users to the new printers in their location.
  • Assigned IP addresses release and renewed IP addresses and map users to their network share drives and setup new users profile and joining computers to a domain.
  • Monitored user problem reports to identify patterns and recommend solutions.
  • Worked with client servers, Windows NT, Microsoft exchange and network support.
  • Diagnosed and resolve problems in the area of hardware, applications and operating
  • System.
  • Created user accounts and kept up with maintenance, data security and back-up of data.

Confidential, West Washington, DC

Network Administrator Associate

Responsibilities:

  • Provided technical support and setup new computer systems and printers.
  • Configured and troubleshooted the network problems.
  • Installed and maintained workstations, servers, business software and application.

We'd love your feedback!