Cyber Security Analyst/auditor Resume
2.00/5 (Submit Your Rating)
Reston, VA
SUMMARY:
- Broad knowledge of network operating systems and applications such as windows suite, Experience with pc hardware, software, networking technologies and strong troubleshooting skills.
- Information assurance (IA), security assessment and authorization (SA&A), Risk Management, System monitoring and regulatory compliance, and knowledgeable in most NIST SP 800 publications
- Social Engineering, knowledgeable of cloud computing, ability to perform privacy, technical, operational and management security control assessment and reviews.
- Ability to generate residual Risk report in order to update (POA&M), ability to perform PTA and PIA assessment, in - depth knowledge of HIPAA, COSO, PCI-DSS.
- In-depth knowledge for good customer service relationships, leadership and effective written and verbal communication skills, capable of working in multi-cultural environment. Area of specializations includes but not limited to
- FISMA compliance System Risk Management System Development life cycle System information security life cycle vulnerability assessment Project Management support
PROFESSIONAL EXPERIENCE:
Confidential, Reston, VA
Cyber Security Analyst/auditor
Responsibilities:
- Conduct security control assessment to assess the adequacy of management, privacy, operational and technical security controls implemented (SAR, were developed detailing the result of assessment with POA&M) Provide support to internal and external audit teams as required Perform business impact analysis to analyze mission critical business functions, identify and quantify the impact those functions if these function are lost.
- BIA helps to define the organizational continuity plan and IT internal control audit objectives.
- Design systems and categorize its Confidential, applying FIPS 199 and NIST SP 800-60. conduct IT controls Risk Assessment that involve reviewing entity policies standards and procedures.
- Monitored controls post authorization to ensure continuous compliance with security requirements Conduct first deliverable artifact of the RMF process with IT ISSO, system owners and stake holders.
- Perform bi- annual security policy review to make sure all information’s are current with the laws directive directions and regulations.
Jr. Cyber Security Analyst
Responsibilities:
- Part of a team to perform vulnerability scan using special tools to assess company security baseline such as Nessus, N-mapp and Micro soft baseline analyzer.
- Create reports detailing the identified vulnerability and mitigate procedures.
- Perform Risk analysis that also include Risk assessment Perform vulnerability check on desk computers, security checks on laptops before and after international travels by personnel.
- Run IDS/IPS using special tools Provide support to internal and external audit teams as required, helped in the gathering, presentation evidence to validate controls effectiveness and efficiency.
- Examined event logs for irregularities, identified irregularities are then reported as incident.
- Incident respond process is the initiated to mitigate the irregularities.
- Conduct IT controls risk assessment that include reviewing organization policies, standard and procedures.
- Member of a team that develops system security plans to provide an overview of federal Information System Security requirements and described the controls in place.
DESKTOP SUPPORT ANALYST/TECHNICIAN
Responsibilities:
- Support network, personal computers, printers and software Provide remote or on site client services operational support, maintenance, problem solving, configuration and installations Perform complete backup of PC and systems using ghost software.
- Application software installations, antivirus, spyware and spam protections PC support including system tuning and optimization Cable system, phone, Wi-Fi switches and routers installation and configurations. Conducting staff training seminar and useful packages.