Cyber Security Compliance Analyst Resume
4.00/5 (Submit Your Rating)
Washington, DC
Summary
- Experienced Information Security Analyst with 8+ years of result oriented background in maintaining the security and integrity of data by planning and carrying out security measures to protect computer networks and systems, enterprise Information Systems,
- Network Systems and Operational processes through Information Assurance Controls,
- Compliance Verifications, Risk Assessment, Vulnerability Assessment in accordance with NIST 800 FISMA, and industry best Security practices.
- Experience with Federal security regulations, standards, and processes including FISMA, FIPS199, 200, NIST 800 - 53 rev4, and FedRAMP
- Remediate Security Issues
- Respond to Requests for Specialized Cyber Threat Reports
- Perform Cyber and Technical Threat Analyses
- Perform Security Continuous Monitoring
- Produce Situational and Incident-Related Reports
- Provide Timely and Relevant Security Reports
- Self-Motivated
- Support and Manage Security Services
- Strong communication with various clients
- Creative and detail oriented
- Earn Value Management experience
- Define Process for Managing Network Security
- Discover Vulnerabilities in Information Systems
- Evaluate Malware Software
- Familiar with Security Regulations and Standards
- Use various tools to detect and mitigate security risks
Experience
Cyber Security Compliance Analyst
Confidential - Washington, DC
- Develop security test plans and conduct security testing in accordance with NIST SP 800-53, Revision 4; NIST SP 800-53A, Revision 1; and departmental policies and requirements.
- Use NIST 800 53A to assess controls of various systms
- Created and monitored POA&Ms while working with Security Team to mitigate risks that were found
- Develop procedures and templates associated with the Security Assessment and Authorization (SA&A) process and activities to ensure compliance with federal guidelines, and policies.
- Play key role as Subject Matter Expert in ensuring security baseline met Command Cyber criteria for excellent rating during security audit. Guided leadership, peers and subordinates in tactics techniques and procedures.
- Use CSAM to continuously assess, monitor, update and test controls of High, Moderate and Low Systems including front-end cloud systems
- Work with CDM team to request, install and update scanning tools such Tenable and Nessus
- Plan, conduct, and document IT security testing in accordance with NIST SP 800-53A Revision 5
- Facilitate and conducts Security Control Assessments (SCA) and possibly additional advanced-level Continuous Monitoring Activities within internally hosted and cloud-based environments
- Ensures cyber security policies are adhered to and that required controls are implemented
- Validate respective information system security plans to ensure NIST control requirements are met
- Develop resultant SCA documentation, including but not limited to the Security Assessment Report
- Initiate recommendations associated with the findings on how to improve the customer’s security posture in accordance with NIST controls
- Review the controls that support the Requirements Traceability Matrix (RTM) and the details of the System Security Plan (SSP) to determine completeness and accuracy
- Follow and abide by the SCA Standard Operating Procedure (SOP) that is provided by the client
- Provides Security Assessment Results to meet client requirements and standards,
- Create and update FedRamp documents for cloud system continuous monitoring
- Monitor CIRC mailbox and respond to potential phishing email reports.
- Utilize Symantec Endpoint Protection for anti-virus.
IT Security Analyst
Confidential, Baltimore, MD
- Acted as a liaison between various departmental groups on information security related topics in order to audit systems based on security standards.
- Collaborated in teams of technical and non-technical experts providing results that are beneficial to the company.
- Made recommendations to senior management on results of analysis and worked closely with other Information Technology groups to refine and enhance security controls.
- Developed, reviewed, and updated Information Security System Policies, System Security Plans (SSP), and Security baselines in accordance with FedRAMP, NIST, FISMA, NIST SP 800-18 and Monitored the overall Secured Health of the center
- Complete vulnerability scans IBM’s Bigfix and Tenable. Results are analyzed, and reports are sent to ISSO.
- Analyzed risk assessment reports for data systems to ensure adherence to National Institute of Standards and Technology (NIST) and Federal Information Security Modernization Act (FISMA) guidelines.
- Respond to and investigate “Lost & Stolen” incidents. If lost, Computrace is utilized to freeze the workstation. A ticket is open immediately and sent to CSOC.
- Reviews the controls that support the Requirements Traceability Matrix (RTM) and the details of the System Security Plan (SSP) to determine completeness and accuracy
- Follows and abides by the SCA Standard Operating Procedure (SOP) that is provided by the client
- Provides Security Assessment Results to meet client requirements and standards, which will include at a minimum the following documents: SAR, RTM, and a detailed technical results document as stipulated by the client upon Security Assessment completion
- Assists with the interpretation and analysis of Security Assessment Results upon completion of each Security Assessment and/or as requested to assist with post-assessment questions
Cyber Security Analyst
Confidential, Newington, VA
- Continuously monitored, analyzed, and identified security alerts information from all approved security devices, collection techniques and designated system logs.
- Managed Certification and Accreditation (C&A) activities to define application problems by consulting with team to evaluate procedures and processes.
- Generated security documentation, including: security assessment reports; system security plans; contingency plans; and disaster recovery plans
- Use Splunk to monitor the network and perform analysis, while integrating the results and information needed to provide incident response and proactively protect the enterprise. This includes developing customized signatures, enterprise content filtering, or firewall ACL change recommendations.
- Supported security tests and evaluations (ST&Es) while creating and tracking POA&Ms using Trusted Agent FISMA (TAF).
- Acted as alternate shift lead as necessary, mentor new associates on process and procedure, manage group mailbox, and open tickets for new incidents.
- Interacted with cyber intelligence analysts conducting threat analysis operations as well as numerous IT professionals performing varying technical roles within the client organization.
Help Desk Technician - Tier 1 Soc Analyst
Confidential, Upper Marlboro, Maryland
- Respond to reported security incidents using ticketing system (Remedy).
- Provide security event analysis and support.
- Developed awareness campaign for the cyber security awareness program using numerous marketing tools and strategies
- Maintained regulatory requirements while managing and facilitating information security assessment continuous monitoring activities
- Provide security events analysis and support to include identifying potential threat, anomalies, and infections, documenting findings, providing recommendations within the incident management system, performing triage of incoming security events, performing preliminary and secondary analysis of those events, and validating the events
- Perform analysis on logs produced by network devices utilized such as firewalls, content filtering, syslog from various sources/devices, assorted Intrusion Detection capabilities, substantiating vulnerability scanner results, directory services, DHCP logs, and Secure Email Gateway logs.