Cyber Security Analyst / Security Control Assessor Resume
2.00/5 (Submit Your Rating)
Greenbelt, MD
SUMMARY:
A Cyber Security Analyst with experience in Confidential Risk Management Framework (RMF), FISMA compliance, SANS 20/CIS security controls, PCI/DSS, Risk Assessment & Mitigation, and Security Assessment & Authorization ( & Accreditation) activities. I enjoy working in a team as well as independently to help organizations protect their information systems with the best industry security practices.
TECHNICAL SKILLS:
- FISMA, RMF, CERT - RMM, SANS Top 20/CIS Critical Security Controls, PCI/DSS
- Confidential SPs: A .
- FIPS Publication: FIPS 199, FIPS 200
- and Accreditation (C&A) / Assessment and Authorization(A&A) Documents
- System Security Plan (SSP)
- Security Assessment Plan (SAP)
- Requirement Traceability Matrix (RTM)
- Security Assessment Report (SAR)
- Plan of Action and Milestones(POA&Ms) Management
- Contingency Plan (CP)
- Configuration management(CM)
- Vulnerability Scanning tools - Nessus, WebInspect, Nmap, Zenmap and Burp Suite.
- Splunk
- Firewall, Antimalware, Symantec End Point Protection
- Snort
- Windows, Windows server (2012, 2016), Linux Distributions
- Oracle VirtualBox, VMware
- Active Directory, MS SQL Server
- MS-Excel, MS-PowerPoint, MS-Word, MS-Outlook, MAXIMO Remedy ticketing system, PeopleSoft ELM.
WORK EXPERIENCE:
Cyber Security Analyst / Security Control Assessor
Confidential, Greenbelt, MD
Responsibilities:
- Review the development, monitoring and update of information security policies and procedures using cyber security standards such as Risk Management Framework (RMF), CERT - RMM, Sans 20 / CIS 20 Critical Security Controls, and PCI-DSS.
- Provide expertise as it relates to FISMA compliance, Confidential Special Publications and Standards, and all six phases of Risk Management Framework (RMF) following Confidential standards and guidelines.
- Review security categorization document of enterprise information systems based on Federal Information Processing Standards (FIPS 199) CIA categorization, Confidential and other company specific policies and procedures.
- Review selected security controls using PCI-DSS, Confidential SP, FIPS 200 and SANS Top 20 standards as a guide.
- Analyze security control design and evaluate their effectiveness and compliance with policy, standards, and guidelines.
- Devise tests and procedures for use in Security Test and Evaluation (ST&E) of individual systems.
- Support the development of Assessment & Authorization (A&A) deliverables for information systems such as System Security Plans (SSP), Requirement Traceability Matrix (RTM), Security Assessment Reports (SAR), Plan of Action and Milestones (POA&M) and Authorization Letter (ATO).
- Perform vulnerability assessment using tools such as Tenable Nessus, Nmap & HP Webinspect. Determine if vulnerabilities exist and, if found, suggest what mitigating strategies can be applied.
- Support in preparing Plan of Actions and Milestones (POA&M) management tool.
- Review Assessment and Authorization (A&A) packages for submission to the Information Assurance Program Office for approval of an Authorization to Operate (ATO).
- Monitor information system’s Plan of Actions & Milestones (POA&Ms) to confirm findings, recommendations and risk mitigation strategies.
- Perform verification of continuous monitoring of applicable security controls using SIEM such as Splunk.
- Review Contingency Plan (CP) as part of system security documents, following Confidential CP guide and ensure CP remains current.
Information Security Analyst
Confidential, Washington, DC
Responsibilities:
- Advised ISSOs and System Owners on information system categorization and security requirements of the system based on CERT-RMM and Confidential RMF as over arching framework.
- Supported System Owners and ISSOs through the and Accreditation (C&A) and audit process.
- Reviewed applicable Sans - 20/Center for Internet Security (CIS), Confidential and PCI-DSS security controls to protect company information system assets.
- Tested, assessed, and documented security control effectiveness by collecting evidence from screen shots, interviewing personnel, and examining policy & procedures.
- Performed, reviewed, and monitored periodic vulnerability assessments using tools such as Tenable Nessus, Nmap & HP Webinspect.
- Worked with information system stake holders to resolve, update and close Plan of Action & Milestone (POA&Ms).
- Support the development of Assessment & Authorization (A&A) deliverables for information systems such as System Security Plans (SSP), Requirement Traceability Matrix (RTM), Security Assessment Reports (SAR), Plan of Action and Milestones (POA&M) and Authorization Letter (ATO).
- Support formal response to audit enquiries, including providing information and evidence on applicable control implementation documented in Notice of Findings and Recommendation (NFR).
- Reviewed Approved Scanning Vendors (ASV) scan report for PCI compliance and mitigate vulnerabilities using configuration changes, disabling services, filtering incoming traffic, closing ports and applying vendor specific patches.
- Review security events, asses its impact and assist in investigation.
- Reviewed PeopleSoft ELM employee and contractor Security Awareness records and recommended changes.
- Documented and analyzed changes that occur to information systems and perform continuous monitoring using SIEM such as Splunk in accordance with the organization's monitoring strategy.
Control Engineer
Confidential, Washington, DC
Responsibilities:
- Assembled, installed, tested, and maintained electrical wiring, components and devices associated with electrical equipment, following scematics.
- Reviewed, designed updates and documented preventive maintenance manuals.
- Performed installation and maintenance tasks, located and fixed malfunctions of control systems, security systems and other electrical systems.
- Executed testing to identify and correct system problems at component and system levels as part of system sustainment activities.
- Diagnosed malfunctioning systems, apparatus, and components, using test equipment and hand tools, to locate the cause of a breakdown and correct the problem.
- Fixed malfunctions of Intrusion Detection Systems, Alternating Current/ Direct Current (AC/DC) Power supplies, transformers, Batteries, D Confidential Communication Systems, Remote Terminal Units (RTUs), control panels, Station Processors (STAPs), Vital and Non-Vital Processors (IVPs and INVPs)
- Tested for defective wiring and connections using precision measuring equipment such as megger and multimeter.
- Used oscilloscopes and analyzers to troubleshoot, align, adjust, and calibrate circuits; and other instruments as required.
- Used ticket tracking system (Maximo) software to ensure timely responses and closure of reported indents, documenting all incidents in a comprehensive manner.
- Escalated issues to appropriate personnel/department for problems that cannot be resolved.