We provide IT Staff Augmentation Services!

It Business Systems Analyst Resume Profile

3.00/5 (Submit Your Rating)

Career Objective

  • Seeking a professional position in the Information Technology field which utilizes my comprehensive training, background and technical experience.
  • Qualifications Profile

Active TS SCI Clearance

Technical Proficiencies

Platforms:

Windows 9x/NT/2K/ME/XP/Cisco/HP-UNIX/KMI Spiral I

Tools:

Cisco IDS-module-2, Security Manager 3.0, Real secure IDS, SNORT, IAVA, Retina Network scanner, ISS internet scanner

Networking:

Cisco Routing, Switching, Remote Access and Advance Design Cisco secure products, Protocols OSPF, ATM, ISDN, RIP, BGP

IT Project Manager,

Confidential

  • Drafts policies and related standards in accordance with the National Institute of Standards and technology NIST , the Department of Health and Human Services HHS , the Office of Management and Budget OMB and other applicable Federal government requirements, guidance, and directives. Develops procedures, awareness programs, and supporting templates to aid stakeholders in developing their HHS certification and accreditation and or Systems Development Lifecycle SDLC artifacts. Analyses short, medium and long-range projects for solutions of complex operational or policy issues in areas such as information security, information security reporting, SDLC, quality assurance and others as directed.
  • Provide underlying support to Office of the Secretary, Office of Information Security OS/OIS through the implementation of IT Asset Management to identify and determine risks for OS IT assets. Ensure the rigorous application of information security / information assurance IA policies, principles, and practices are integrated in the planning and implementation of processes and services.
  • Implement processes and services adhering to Project Management PM and Information Technology Infrastructure Library ITIL methodologies and best practices. Applies knowledge and skills to conduct market analyses on current or new solutions in terms of quality, customer service, feasibility, viability and cost. Develop budget projections and procurement documents. Provide technical direction to, manage and monitor contract resources. Meet project objectives and manage day-to-day project activities, risks and issues. Communicate to internal and external stakeholders, management and project team. Ensure processes are streamlined, effective and efficient by continuously assessing and implementing improvement opportunities and uses metrics to demonstrate process/service improvement trends.

IT Business Systems Analyst,

Confidential

Conducted Enterprise Data field Mapping while reading through software manufacture API documents and extracting the required information to map multiple applications to the data field level. Conducted order fulfillment and service delivery space based on the TMF TAM forum. Ensured compliance and verified the software development life cycle SDLC process. Developed technical solutions to business problems and advanced company sales efforts

Information Technology Senior Chief

Confidential

  • I served as Senior Technical specialist for all customer service related problems. Maintained network operations and resolved inquiries and problems concerning components, peripherals and services including email and web access. Operates network equipment maintains and inventories media and technical library documents customer trouble calls safeguards Communication Security materials handles classified materials initializes computer workstations and installs external peripherals and internal core workstation components communicates network and system problems to appropriate personnel and supervises technical personnel. I have conducted IT strategic planning and project management activities, and provided expert technical advice in the monitoring and evaluation of contractor activities.
  • Develops, manages maintains Communications Security COMSEC assets and requirements, logistical and Cryptologic programs for SECDEF Communications that embeds all customers to include the front offices of the Secretary and Deputy Secretary of Defense and political appointees, SECDEF Executive Travel, alternate sites, and other organizations within the National Capital Region. Implement, test, maintain, and deploy COMSEC cryptographic keying material and equipment over innumerable configurations and classifications in support of in-garrison and deployed locations. Serve as the NSA appointed COMSEC Custodian/Key Management Infrastructure KMI Operations Account Manager KOAM responsible for the KMI Operating Account KOA , managing the distribution of KMI products to the End Cryptographic Units ECU , fill devices and Advanced Key Processor AKP .
  • Tracks requirements and provides effective status of associated keying material short titles as the Controlling/Command Authority for all SECDEF cryptographic keying material and associated DOD wide intrinsic infrastructures. Develops, employs and maintains TS/SCI and collateral classified cryptologic distribution programs for secure video-teleconference, voice, and data cryptographic systems including 2 White House Executive Cabinet offices, 2 Service Departments, Combatant Commands, U.S. Embassies, Defense Telephone Link DTL and a global foreign cryptologic exchange program. Manages a physical and personnel security program certifies forward deployed tactical TS/SCI operating areas. Administers, tracks and briefs/de-briefs personnel assigned to a local Nuclear Command and Control access control program. Provides guidance to the Director of SECDEF Communications on DOD wide technical and information/physical/personnel security policies in order to establish standard operating procedures that meet the communications needs for the SECDEF and DEPSECDEF in the most secure manner while maintaining compliance with subsequent National directives. Establishes and maintains residential communications systems at all classification levels for the SECDEF, DEPSECDEF, and senior staff members. Provides solutions for secure executive motorcade and other mobile communications security for the Office of the Secretary of Defense and other classified programs. Reviews, assesses, and provides classified Technical Security assessments to the Director of Secretary of Defense Communications. Serves as a subject matter expert in secure communications and appropriate encryption to support alternate sites.
  • Performed all matters related to the management of COMSEC material and the operation of COMSEC equipment security management procedures to include issue, turn-in, disposition, and accounting for COMSEC material. Investigated reports of COMSEC incidents infractions or violations and coordinated reporting to the Special Programs Security Manger, Program Management Office, NSA security representative. Created, implemented and communicated COMSEC security compliance requirements to the appropriate authority. Designed, implemented, and delivered COMSEC security education, training, and awareness programs through briefings, white papers, and other customer directed security training. Conducted COMSEC security compliance audits, inventories, and physical security inspections providing detailed reporting to NSA.
  • Developed and executed Emergency Action Plan and implement communications security reports Information Security and Communications Security compliance identifies, evaluates, and reports security incidents performs combat system training team duties manages personnel security clearance requirements, security programs, system operations, automated data processing software, audit data, security and network documentation, and security system logs prepares for information system risk assessments updates information systems operating procedures identifies database security concerns, information systems security risks, and malicious code develops information systems security policies, network policies, and procedures for network administration implements communications security and network firewall implements policies and reporting process, security programs, new operation procedures, and requirements for disposition of Automated Information Systems equipment and media determines computer software for migration or installation, including associated costs, problems, and time verifies security controls upon network restoration and executes reporting requirements to various agencies. Other duties include project management, budget and resource management, and strategic management.
  • Maintain, troubleshot and ensured optimal uptime and security of large WAN/LAN network consisting of 800 nodes and 1K users, all with separate privileges. Monitored performance of, upgraded and resolved issues with network software, hardware and components. Supervised, trained and mentored up to 75 team members. Managed network inventory and budget of 2M . Liaise with vendors, facilitating cost-efficient purchases of hardware, software and services. Interface with representatives of cross-functional departments, providing updates on scheduled system maintenance and upgrades and gathering requirements for troubleshooting issues. Created and administered network accounts and monitored system activity including password assignments, audit trail reviews, and compliance with security directives and procedures.

Key Achievements:

  • Network Operations Customer Support Help Desk Manager.
  • Plan develop, and conduct security testing, including vulnerability and compliance scans.
  • Categorize IT systems, define system boundaries, and establish and maintain information security standards and procedures.
  • Perform updates and maintain baselines for System Security Plans and other Security Assessment and Authorization artifacts.
  • Lead, report, monitor, and investigate security and privacy incidents.
  • Perform site security assessments and contractor system oversight.
  • Validate the security of Personally Identifiable Information PII .
  • Administered seven Windows 2000 servers, two Windows Server 2003, two CD-Rom servers and two HP-UNIX NTCSII, GCCS-M servers and various off-board connections for 220 nodes and 350 users.
  • Maintained Satellite and pier side data communications INMARSAT A/B, STU III, SDT 1910, Digital Encryptions and CSU/DSU Modem .
  • Maintained 2600 series routers and 4000 series routers
  • Manager of the Naval Tactical Command Support System NTCSS II HP TAC-4 Server.
  • Designed, installed and managed 40 Windows 2000 and XP computer nodes.
  • Served as network security point-of-contact for all offices connected to LAN, ensuring all Information System IS security regulations were adhered to and included in network infrastructure design to include vulnerability testing, risk mitigation, risk analysis, and documentation utilizing the Department of Defense Information Technology Security Classification and Accreditation Process DITSCAP process.
  • Provide continuous communication services and C2 support to U.S, Allied and Coalition forces worldwide.
  • Developed System Security Plans, Risk Assessments, Security Assessment Reports, Contingency Plans, Security Test and Evaluation Scans Reports, Requirements Traceability Matrix and Security Plan Of Action and Milestones POA M spread sheets. Supported C A Team effort to develop and assemble C A Packages and Recommendations to the Chief Information Officer CIO for a System Authority To Operate ATO Certification

We'd love your feedback!