We provide IT Staff Augmentation Services!

Information Assurance Manager Resume

5.00/5 (Submit Your Rating)

Fort Belvoir, Va

PROFESSIONAL SUMMARY

  • Experienced Information Security/Information Assurance Professional with skills in Risk Assessment/Management,
  • Vulnerability/Security Assessment, Cybersecurity, Security Monitoring, IT Regulatory Compliance,
  • IT Security Audit, Security Compliance, Network Security, Security Authorization, and Incident Response
  • Management, where I can effectively become a part of the team and put my knowledge and skills into action
 

SKILLS

  • Information Security
  • Vulnerability Assessments, Nessus Scans (Linux/Windows based), Web Application Security,
  • Intrusion Detection Systems, Retina Security Scanner, Threat Risk Modeling,
  • Incident Response Management, Nmap, Security Audits, Application Security Code Review,
  • Various Security Tools, SDLC, USCYBERCOM Information Assurance Vulnerability Management (IAVM),
  • Security Architecture and Design Review, correcting security deficiencies, Plan of and Milestones (POA&Ms)
  • Operating Systems
  • Windows XP/Vista/7, Windows Server 2003/2008, Active Directory, Linux/Unix, Mac OS,
  • Basic Windows/Linux/Unix Command Lines
  • Applications/Internet Applications
  • Microsoft Office (Word, Excel, PowerPoint, Outlook, Project), SDLC, Extensible Markup Language (XML), SharePoint, Mozilla Firefox, Internet Explorer, Adobe Acrobat, DISA’s Vulnerability Management System
  • Networking
  • TCP/IP, OSI Model, Network Diagnostic Tools, Routers, Firewalls, VPN, Internet/Network Ports and Protocols,
  • Public Key Infrastructure

 EXPERIENCE

Confidential , Fort Belvoir, VA 

Information Assurance Manager

  • Provide security architecture, policy and design guidance for business systems andnetworks; provide Information Security Certification and Accreditation Support for
  • applications, systems and networks in accordance with appropriate DOD policies and
  • processes; review, coordinate, and recommend IA standards and protocols for cost effective
  • application in accordance with the Department of Defense’s (DOD) Defense in Depth
  • (DID) strategies and supporting documentation for each task; ensure compliance with
  • Federal, DOD Information Technology and security requirements, policies, procedures
  • and standards as applicable; conduct DIACAP analysis and configuration assessments for
  • computing environments; develop and execute the DIACAP package to include submission of
  • proposed updates to the accreditation boundary; identify, conduct impact analysis, track, and
  • present outstanding program DIACAP findings through the use of a POAM and work to resolve
  • issues; produce C&A related information and documentation required by DISA to obtain connection
  • approval; manage computing environment vulnerability through the use of Vulnerability
  • Management System (VMS); performs technical writing, presentation preparation, and work
  • collaboratively with agency partners; manage the DIACAP Package through the use of Enterprise
  • Mission Assurance Support System (eMASS); track the expiration of all Accreditation Decisions
  • such as authority to operate (ATO), Interim Authority to Operate (IATO), Denial of Authority to
  • Operate (DATO), and the submission of DIACAP packages throughout the system’s development
  • lifecycle; analyze the DIACAP package, assess the adequacy of the required protective measures, assess
  • residual risk, provide support to determine the readiness of the system for accreditation; recommend
  • for detected vulnerabilities that could preclude accreditation, management, operational, or technical
  • controls to include human procedures, software configuration parameters, system changes to mitigate
  • the risk associated with the vulnerability; perform technical reviews of documented security
  • certification results normally submitted in the DIACAP format to assess their completeness and
  • identify system vulnerabilities and weaknesses; Analyze vulnerability scans and Security Readiness
  • Review (SRR) results, STIG compliance and deficiencies of all forms identified during internal and
  • external IA reviews.

Confidential, Washington, DC 

Senior Information Assurance Analyst

  • Conduct C&A process for Operational, Research, Development, Test and Evaluation
  • (RDT&E) Information Systems and networks within the Navy eMASS in accordance
  • with DoD 8510.01; conduct in - depth technical reviews of C&A documentation from
  • field activities seeking accreditation by the Authorizing Official with
  • appropriate policies and procedures and develop recommendations accordingly;
  • complete reviews and provide appropriate feedback within the timelines; review and
  • complete documentation such as Certification Test & Evaluation (CT&E) test reports,
  • Retina Scans, System Identification Profile (SIP), DIACAP Implementation Plan (DIP),
  • C&A plans, risk assessments, Plan of Action & Milestones, etc; assist in executing the
  • C&A portion of the CS/IA Compliance Inspections as required; analyze and review the
  • results of network and system vulnerability scans and validate implementation of IA
  • controls in accordance with DoD 8500.2; maintain the C&A package repository in
  • the corporate document management system; perform quality assurance reports
  • that support the Authority to Operate (ATO) approvals; analyze Information Systems
  • security requirements to be implemented during system design.

Confidential Washington, DC,

Information Systems Security Officer 

  • Develop Security Assessment & Authorization (SA&A) documentation and maintain the
  • System Security Plans; create PKI certificates (encryption and digital signatures);
  • review application, system, and security audit logs; oversees system recovery
  • processes; consult IT Security and Information Security incidents or violations;
  • scan systems for vulnerabilities; ensure compliance with information awareness
  • training; ensure security policies, procedures, standards, and guidelines are followed;
  • appropriately protect information collected, processed, transmitted, stored, or
  • disseminated; ensure access to information systems are controlled; ensure system security
  • requirements are addressed during all phases of the system lifecycle; monitor all changes
  • to Information Systems software, firmware, hardware, and documentation; review NIST
  • 800 series and security controls; manages review and release of media and memory components;
  • disseminate information concerning common vulnerabilities and threats; ensure awareness
  • and precautionary measures are exercised to prevent introduction and proliferation of
  • malicious code; respond and investigate to all information security-related incidents or
  • violations, maintain records, and prepare reports; review and update system security plans,
  • policies and procedures; conduct risk analysis to protect Information Systems; assist with
  • mitigating risks on Information Systems; ensure Plan of Actions and Milestones (POA&M)
  • are mitigated and closed; update antivirus signatures; review security controls. Assist with
  • DIACAP Packages; support preparing artifacts and additional documentation related to
  • systems or applications; review the findings and identify a mitigation solution; provide
  • support in order to maintain the ATO as software changes/upgrades occur; support the
  • utilization of the automated validation capabilities of the Enterprise Mission Assurance
  • Support Service (eMASS) for preparation of the DIACAP Package; work with Application
  • Security & Development STIGs; prepare the supporting documentation required for the
  • DIACAP requirements Plan of Actions and Milestones (POA&M),System Security Plan (SSP),
  • actual validation results in the Vulnerability Management System (VMS) and eMASS,
  • Configuration Management Plan (CMP), artifacts associated with implementation of IA controls.

Confidential Baltimore, MD, 

Information Assurance Protection Specialist

  • Performed network vulnerability scans/assessments and thoroughly analyzed vulnerability
  • scan results for Computer Network Defense (CND) Subscribers; evaluated DOD
  • Information Assurance Certification and Accreditation (C&A) packages; monitored
  • and tracked CND Subscribers compliance to report to JTF-GNO/USCYBERCOM on
  • NIPRNet (unclassified) and SIPRNet (classified) network; evaluated security posture
  • through various aspects of documentation and meetings; recommended system
  • enhancements to improve information security deficiencies; assisted with securing system
  • configurations and installing security IA tools; researched and analyzed a wide variety of
  • vulnerabilities for multiple operating systems and applications; reviewed Incident Response
  • Procedures and DISA STIGs; disseminated Situational Awareness Reports and Malware
  • reports to CND Subscribers; made recommendations for enhancements to improve efficiency,
  • reliability, and security; evaluated and enhanced security policies and procedures. 

Confidential,  Arlington, VA, 

Associate Technical Analyst

  • Researched and understood current phishing methodologies and techniques including web
  • kit deployment, spam, and malware distribution and associated activities related to identify theft,
  • social engineering and online scams; performed response activities related to reports of phishing
  • attacks and brand infringement violations against Cyveillance customers; tracked the process of
  • unresolved cases to ensure their successful completion or escalate to the appropriate individuals or
  • rganizations based on established guidelines and procedures; fostered the development of
  • relationships with providers while succeeding in the removal of malicious account from their networks.
Confidential, 

 LLC, Columbia, MD, 

Computer Security Specialist

  • Security Certification and Accreditation activities; network and web
  • application vulnerability assessments; analyzed security logs; scanned
  • networks and/or hosts for vulnerabilities on a monthly basis; analyzed and
  • produced vulnerability/remediation reports in response to scans; updating and
  • monitoring periodic scans; maintained configuration of the nessus scanner;
  • security test and evaluation preparations (gather information from systems
  • with security tools); audited systems; periodically updated
  • security procedures and other IT security documentations.
Confidential, 

.Vienna, VA,

 Information Assurance Analyst

  • Worked with on-site personnel and provided security expertise as
  • requested; supported agency computer security awareness training;
  • provided recommendations for consolidating or developing IA
  • policies and procedures; supported Computer Emergency Response Team
  • (CERT) and computer security incident inquiries and investigations;
  • worked on Certification and Accreditation (C&A) application problems
  • involving all phases of systems analysis to provide IA solutions; developed
  • system security plans (NIST SP 800-53); supported Federal Information Security
Confidential, 

 Miami, FL,

ISecurity Internal 

  • Lead the analysis, documentation and remediation of
  • Foundstone security vulnerability management; scanned
  • the environment for security vulnerabilities; analyzed the
  • data in order to rank the severity of the vulnerabilities; researched
  • for remediation tools; executed process for identifying components,
  • vulnerabilities and servers.
Confidential, 

 Miami, FL,

Computer Technician 

  • Assisted users with technical problems on computers, laptops, IT network, and printers;
  • deployed and configured computers and peripherals; updated resolutions in Track IT
  • helpdesk database; stored and delivered data backup tapes; installed approved softwares;
  • re-imaged computers using ghost disk; configured/resolved computer network issues.

We'd love your feedback!