Project Manager Resume
SUMMARY:
- I am seeking a challenging position; which allows me to make an immediate contribution to the company.
- Exceptional problem - solver with keen ability to resolve issues; analyze/define business operations for improvement; plan, design, develop, and implement highly successful administrative policies and processes.
- Excellent interpersonal, written, and verbal communicator who can deliver effective presentations, consult on projects, make recommendations, and communicate highly technical information to senior leadership.
- Strong team leader and facilitator who excels in mediating among multiple divisions or large organizations and maintaining productive, collaborative relationships with staff members and stakeholders.
- I have experience in developing system security plans, risk assessments, incident response plans, and contingency plans.
- I also conduct cyber security capability validations in accordance with established practices and standards.
- I conduct federal Computer Network Defense (CND) validations in accordance with established practices and standards.
- I provide support for the creation of reports and compliance dashboards based on the data gathered through assurance programs.
- I develop and pilot risk based assessment programs with measurable performance metrics which target key areas of federal civilian network defense.
- I conduct research to maintain awareness of current and emerging cyber security capabilities, technologies, vulnerabilities, and threats.
- I ensure suspected system security intrusion incidents are reported, Run Gold Disk and Retina Scans of assets, upload reports to Vulnerability Management System (VMS), Nmap, nesses and address discrepancies.
- I ensure that all new assets are compliant to the latest DIACAP Security Standards and I conduct STIG checklists (Security Technical Implementation Guides) on all new assets that are on the network.
AREAS OF EXPERTISE:
- Information Assurance
- Design and Implement Procedures
- Incident Response
- Team Builder
- Risk Assessments
- Microsoft Office Suite
- Cyber Security
- Project Management
PROFESSIONAL EMPLOYMENT HISTORY:
Confidential
Project ManagerResponsibilities:
- Develop, modify, build, implement, deploy and test SIEM correlation and vulnerability management rules in alignment with client requirements utilizing change management best practices.
- Develop and maintain internal asset classification and categorization in the vulnerability management portal.
- Guide client with a primary mission to proactively prevent incidents by utilizing Vulnerability Scanning recommended solutions as appropriate.
- Perform security incident analysis, recommend remediation steps and orchestrate available resources to respond in accordance with appropriate incident response plans.
- Configure and manage security tools in compliance with Department of Defense requirements while also ensuring continued compliance for all devices.
- Generate and review ACAS scans reports to include IAV and STIG related findings, upload results to clients as prescribe in Security center.
- Monitoring the security posture of assigned networks and develop mitigation plans and tasking to address vulnerabilities.
- Work with the security operations center team to ensure security devices/tools are configured properly to monitor, track, and analyze networks/systems for potential security violations while also assisting in all potential incidents.
- Work in close coordination with the Information Assurance team and SOC to appropriately resolve daily incidents.
- Ensure customers are following Confidential, Confidential, organizational policies and procedures regarding asset security.
Confidential, Adelphi, MD
Project ManagerResponsibilities:
- Assisted in the maintenance and assurance of information systems to protect data from unauthorized users.
- Provided knowledge of commonly-used concepts, practices, and procedures within the information security field to include the ability to identify, report, and resolve security violations.
- Performs risk assessments, identifies potential of exploitation, and assigns risk levels to systems.
- Conducts vulnerability assessments and security scans of systems and networks to identify and mitigate security vulnerabilities.
- Generates IA related reports and documentation, including Validation Reports and Plans of Action and Milestones.
- Reviews and analyzes vulnerabilities that have been identified as being required for system functionality.
- Participates in and conduct security related meetings and teleconferences.
- Maintain awareness of the latest security tools, including vulnerability assessment, network discovery, penetration, and other tools that could aid in providing better services.
- Conduct highest quality technical analysis in the area of Computer Intrusion Analysis, Systems and Vulnerabilities, and Information Operations and produces.
- Assists in the maintenance and assurance of information systems to protect data from unauthorized users.
- Stays current with threats/product vulnerabilities, with a particular focus on how they relate to Confidential systems.
- Reviews latest patch releases to identify the risks of delaying patch application and to identify possible alternative mitigations.
Confidential, Adelphi, MD
Information Assurance Network Scanner
Responsibilities:
- Performs risk assessments, identifies potential of exploitation, and assigns risk levels to systems.
- Conducts vulnerability assessments and security scans of systems and networks to identify and mitigate security vulnerabilities.
- Generates IA related reports and documentation, including Validation Reports and Plans of Action and Milestones.
- Reviews and analyzes vulnerabilities that have been identified as being required for system functionality.
- Participates in and conduct security related meetings and teleconferences.
- Maintain awareness of the latest security tools, including vulnerability assessment, network discovery, penetration, and other tools that could aid in providing better services.
- Conduct highest quality technical analysis in the area of Computer Intrusion Analysis, Systems and Vulnerabilities, and Information Operations and produces.
- Assists in the maintenance and assurance of information systems to protect data from unauthorized users.
- Stays current with threats/product vulnerabilities, with a particular focus on how they relate to Confidential systems.
- Reviews latest patch releases to identify the risks of delaying patch application and to identify possible alternative mitigations.
Confidential, Ft. Belvoir, VA
Project Manager
Responsibilities:
- Served as an IT Project Manager on a contract in the Plans and Architecture Branch of the 7th Command.
- Ensured compliance with Confidential strategic goal, increasing customer awareness, which includes follow-up of requirements; customer feedback and actions.
- Determined appropriate procedures or processes to define project scope, requirements, and deliverables.
- Developed, modified, or provided input to project plans; implement project plans to meet objectives; coordinate and integrate project activities; manage, lead, and administer project resources.
- Monitored project activities and resources to mitigate risk; implement and maintain quality assurance processes.
- Provided suggestions to make improvements, solved problems, and took corrective action utilizing problem solving skills.
- Created and presented briefings on all aspects of the project; participate in multiply phases, milestones, and final project reviews.
- Identified project documentation requirements and procedures, while analyzing information systems requirements, design and conducted analytical studies, cost-benefit analysis, and other researches.
- Evaluated, monitored, and ensured compliance with applicable laws, regulations, policies, standards, or procedures; throughout the project execution.
- Participated in change control (for example, reviewing configuration change requests) while managing multiple and varied IT projects, programs and initiatives requiring knowledge of IT technologies such as, client/server design methodologies, relational database management systems, test facilities and integration methodologies.
- Interfaced with the government to resolve complex issues, by setting up various meeting and get agenda ready for discussion.
- Tracked completion of work requests received from various customer sources; provide effective and courteous assistance and response to customers’ inquiries, including feedback related to problems resolution.
- Ensured customers understand planning and funding requirements throughout project process.
- Managed and was responsible for technical aspects of the project from beginning to end, and met deliverables by writing WAR reports on weekly basis.
- Applied in depth knowledge of Federal, Confidential, Confidential policy and regulations throughout the project management process; thereby ensuring Networthines and other Information Assurance compliances, such as completion of TEMPEST, Tenant Security Plan (TSP), or Authorization to Operate (ATO).
- Identified and defined project scope and manage all resources, including subcontractors, required to get project completion.
- Managed all aspects of the project including project scope, resource assignment, project plan development, project tracking, monitoring and reporting through the application of proven project management principles and methodologies.
- Developed and maintained all project documentation and Communication Plan with contractors and stakeholders.
- Worked with contractors and stakeholders to avoid project over run on all project and adhere to project scheduled.
- Informed all departmental heads on Project Status on weekly basis.
- Used critical thinking skills to anticipate and manage potential risks that will arise.
- Communicated these risk to the stakeholders on a regular basis and ensure decisions are made quickly and effectively.
Confidential, Reston, VA
Help Desk Manager/System Administrator
Responsibilities:
- Assigned tickets to technician base on area of expertise and competence and follow through until the problem is resolved to our customer satisfaction.
- Served as the point of contact for all inquiries related to network administration, helpdesk management and day to day activity relating to Confidential contract.
- Assisted in adding and configuring new printer to the Confidential network.
- Provided phone and desk side support to clients when necessary and served as POC for the front office.
- Attended to any technical needs of the Surgeon General, the Deputy Surgeon General and the Chief Of Staff Office for the Navy.
- Attended meetings with government representative; while engaging in dialogue, planning and implementing the final outcome of the meetings.
- Created new user accounts, new network drives and a template for new users to be able to scan documents on the Xerox printer.
- Created tickets for trouble calls through the Call Center and provide resolution to trouble calls at customer locations.
- Resolved IT related issues, and provided a variety of network services, including resetting/unlocking NIPRNET and SIPRNET accounts, using Active Directory, a remote tool used to monitor, control and connect to network accounts.
- Reset windows password in the Active Directory.
- Facilitated the migration of user accounts into a new domain.
- Removed and transferred accounts to transition OU installed and configured VPN clients.
- Troubleshooted connectivity problems.
Confidential, Washington, DC
Information Assurance Analyst
Responsibilities:
- Conducted highest quality technical analysis in the area of Computer Intrusion Analysis, Systems and Vulnerabilities, and Information Operations and produces.
- Assisted in the maintenance and assurance of information systems to protect data from unauthorized users.
- Provided knowledge of commonly-used concepts, practices, and procedures within the information security field to include the ability to identify, report, and resolve security violations.
- Served as the focal point for program information systems security and security awareness information.
- Developed system security plans, risk assessments, incident response plans, and contingency plans.
- Developed and administered information system security guidelines and procedures.
- Ensured safeguards are implemented to protect against malware.
- Ensured suspected system security intrusion incidents are reported.
- Ensured compliance with the System Security Program.
- Initiated protective and corrective measures when a security problem is discovered
- Conducted Risk and Vulnerability Assessments and Operational Threat Assessments using automated vulnerability scans and penetration tests.
- Conducted Gap Analysis and Remediation by identifying areas where automated cyber tools do not exist.
- Conducted cyber security capability validations in accordance with established practices and standards.
- Conducted federal Computer Network Defense (CND) validations in accordance with established practices and standards.
- Provided support for the creation of reports and compliance dashboards based on the data gathered through these assurance programs.
- Developed and piloted risk based assessment programs with measurable performance metrics which target key areas of federal civilian network defense.
- Updated current assessment models and supplement with risk based performance metrics.
- Conducted research to maintain awareness of current and emerging cyber security capabilities, technologies, vulnerabilities, and threats.
Confidential, Washington, DC
Lead Helpdesk/ Helpdesk Manager
Responsibilities:
- Assigned tickets to technician’s base on area of expertise and competence and provided follow - up services to the customer base until the problem is resolved to ensure customer satisfaction.
- Served as the point of contact for all inquiries related to network administration, helpdesk management and day to day activity relating to Confidential contract.
- Managed tracking systems, case log sheets and file organization procedures, while establishing software library to include: license control, software control, data input into Asset Control Tracking System inventory ( Confidential ) management system.
- Reviewed and established document control, contract, warranty maintenance, and coordinated with Logistics for hand receipt turn in, issuance, service and contracting office.
- Conducted research to develop or acquire new IT products/services that will increase systems and user efficiency.
- Developed and modified methods and processes for testing, demonstrating and prototyping new technologies.
- Established statement of need for contracts for purchasing software or hardware include estimates of funding and time phasing requirements.
- Reviewed and evaluated contractor proposals; develops performance and/or systems standards, and monitors performance including conformance with price and schedule provision of task orders.
- Provided hands-on working knowledge in MS Windows XP, IBM-compatible personal computers, software installation, Citrix clients, CAC Readers, Blackberry and remedy application support.
- Mapped client to the network and configured outlook and setting up email account for the client.
- Installed and configured fast data for users. Installed and configured CHCS 1 and CHCS2 for clients in the military environment.
Confidential, Largo, MD
LAN Technician/System Analyst
Responsibilities:
- Reset users password both mainframe and windows terminals.
- Performed Login functions to the mainframe to check users login ID and reset password.
- Removed users out of the mainframe when necessary and reset mainframe printers.
- Inputted user's information into magic service desk for tracking until the request is resolved
- Forwarded the users request to the appropriate section of the department for ticket resolution.
- Investigated root causes of data quality issues within the IPCA Database, to insure that information is accurately entered in the system.
- Answered telephone calls at the call center, help resolved user’s problem and escalate the ticket when necessary.
Confidential, Bowie, MD
Help Desk Support/ Systems Consultant
Responsibilities:
- Provided phone and in-person support to users in the areas of outlook configuration.
- Served as the initial point of contact for any network connectivity problems.
- Provided technical support to end users in windows environment.
- Monitored network resources, diagnosing using Solar wind software.
- Added printers to network printers and mapping users to the new printers in their location.
- Assigned IP addresses release and renewed IP addresses and map users to their network share drives and setup new users profile and joining computers to a domain.
- Monitored user problem reports to identify patterns and recommend solutions.
- Worked with client servers, Windows NT, Microsoft exchange and network support.
- Diagnosed and resolve problems in the area of hardware, applications and operating
- System.
- Created user accounts and kept up with maintenance, data security and back-up of data.
Confidential, West Washington, DC
Network Administrator Associate
Responsibilities:
- Provided technical support and setup new computer systems and printers.
- Configured and troubleshooted the network problems.
- Installed and maintained workstations, servers, business software and application.