Information Security Specialist Resume Profile
NashuA
Desired Position:
Information Technology Security Manager, Cyberspace Operations Analyst, Cyberspace Engineer, IT Security and Information Protection Consultant, Security Project Manager, IT Risk Analyst
Career Objective:
Seeking to leverage my computer networking security experience for a business or agency focused upon achieving leadership and excellence in its field.
Security Clearance: Inactive Clearance Previously help TS/SSBI
Work History:
Confidential
- CISSP-ISSAP Information System Security Architecture Professional certification prep ISC2.org
- Project Management Professional PMP certification prep - American Management Association
Confidential
- Understand and leverage Raytheon IDS business knowledge to achieve results financial, manpower, etc
- Demonstrate ability to develop and defend Basis of Estimates.
- Utilize forward thinking to anticipate customer/government changes and challenges
- Ability to handle difficult people and/or situations in high pressure environments.
- Ability to apply information system knowledge to other government compliance documents JAFAN, DCID .
- Maintains an IS professional certification commensurate with DoD 8570.1-M requirements CISM, CISSP or other .
- Utilize the ODAA Baseline Standards requirements for technical security configuration. - Demonstrate experience with certification and configuration of various operating systems Windows, Solaris, Linux, HPUX, AIX, etc. - Develop effective briefings and training material and present to all organizational levels. - Make tough decisions and utilize excellent communication skills written oral .
- Remain customer focused and demonstrate excellent time management skills
Confidential
- Performed all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
- Developed and implemented IT security architectures.
- Responded to information security-related inquiries using information security tools/procedures.
- Implemented/administers information security controls using software and vendor security systems.
- Executed security controls to prevent hackers from infiltrating company information or jeopardizing programs.
- Maintained the company's firewall and utilized applicable encryption methods.
Information Systems Security Officer Contractor
Confidential
- Information Systems Security Officer at the Albany FBI Field Office, Albany, NY,
- Ensured operational security is maintained on a day-to-day basis for assigned information systems IS .
- Conducted compliance reviews and self-assessments.
- Validated system security requirements are addressed during all phases of the system lifecycle.
- Certified Configuration Management for security-relevant IS software, hardware, and firmware is maintained and documented.
- Ensured all users have the requisite security clearances, authorization, and need-to-know. ,
- Verified systems are operated, maintained, and disposed of in accordance with security policies and practices outlined in the approved accreditation package.
Managing Director Consultant
Confidential
- Managing Director for North America's oldest and largest provider of grief and bereavement educational resources with over 1.4 million in annual sales.
- Developed business policy and formulated strategy and direction by assessing the effectiveness of operations using both qualitative and quantitative methods.
- Provided resources for grief and bereavement education, organized budgeting, accounts payable and receivables, fixed and variable organizational costs, employee management and supervision, and facilities management.
- Provided oversight and management of all IT services and systems, including system security, network and server administration, desktop support, acquisition and development, contracting of services, auditing and risk management functions, business continuity/disaster recovery.
Senior Information Assurance IA Analyst Contractor
Confidential
- Point of contact for Information Security INFOSC issues in compliance with Department of Defense ONE-NET Enterprise at the U.S. Navy's Theater Network Operations and Security Center in Naples, Italy for within the European Theater of Operations.
- Ran and participated in a team that analyzes and evaluates system security technology, policy, and training requirements in support of the DOD, Department of Navy, ONE-NET Enterprise and Federal INFOSEC policies
- Implemented risk management programs, reviews and validates system-wide changes and manages the site operations INFOSEC programs.
- Operated, maintained, and supported the development and sustainment of all operational Security Operations Center SOC infrastructure and procedures.
- Responsible for maintaining all security settings and configurations of systems and their corresponding or associated software, including McAfee ePO servers, firewalls, VPNs, IDSs, vulnerability assessment tools, auditing and antivirus software.
- Monitored Host-based Security program, VPNs, server logs, firewall logs, intrusion detection logs, EMS, and network traffic for unusual or suspicious activity.
Information Security Specialist III Contractor
Confidential
- Supported contract services with the Internal Revenue Service's IRS General Support Management project
- Performed high level review analysis of Internal Revenue Manual IRM 10.8.1, Information Technology IT Security, Policy and Guidance to recommend changes to security related policy for the protection of all information and systems.
- Researched and recommended the adoption of applicable Oracle Database best practices and solutions.
- Subject Matter Expert in NIST 800 Series, FISMA, FDCC, SCAP
- Coordinated findings with managers of the IRS Cyber Security Policy Procedures Management team.
Security Systems Engineer Analyst
Confidential
- Developed and implemented XIT's strategic and operational level plans, processes, tactics, techniques and procedures that relate to Cyberspace Operations.
- Provided access control, traffic analysis, device management, compliance and enforcement of XIT's Cyber Defense and Security Center's 4 million secure Cisco-based enterprise
- Integrated cyberspace operations and effects into XIT's business plans, incorporating time-sensitive, crisis action, and contingency planning and methodologies.
- Conducted Cyberspace Operations vulnerability and threat detection, collection, identification, analysis, and escalation response activities invoked cyber response and counter measures that include short-term incident containment and remediation steps
- Conducted Cyber Intelligence, Surveillance, and Reconnaissance ISR activities
- Executed Cyber Defense activities, such as security monitoring, insider/outsider threat detection, incident response and coordination, forensics, eradication, recovery, and post-incident reports
IT Security Consultant
Confidential
- Performed customer-facing product deployments for paid post sales engagements.
- Ensured ArcSight products are deployed and operating to deliver the technical and business results required by the customer.
- Security device installations, configuration and troubleshooting e.g., firewall, IDS, etc.
- Enterprise software installation e.g., shared business or technical applications
- Sales support and working directly with a sales force.
- Database installation and configuration
Information Technology Staff Auditor
Confidential
- Evaluated the integrity, reliability, performance and capacity, regulatory compliance, and control of critical business processes for Fortune 1000 brokerage financial management firm
- Assessed information technology business risks against the control environment to mitigate internal/external threats from disrupting/exploiting confidential/proprietary information as well as client assets/privacy assessments/audits spanning all 10 CBK domains
- Recommend improvements in effectiveness efficiency of technology processes controls
- Provided actionable guidance on IT management industry best practices
Network Security Information Protection Team ManagerConfidential
- Executed computer network defense CND activities, such as boundary protection, vulnerability assessment, and intrusion detection for 600 million terrestrial/solar meteorological and satellite data processing facility
- Interpreted/applied tactics, techniques, and procedures OPSPLANs,WARNORDs,FRAGOs, TCNOs for Joint Computer Network Operations of fixed and deployed systems in support of global military operations and training
- Performed baseline security validations for multi-platform information systems network
- Coordinated testing implementation of vulnerability updates
- Verified TCNO compliance of 450 specialized meteorological space weather data servers
- Documented operating and network security instructions, guidelines, and standards
- Conducted cyber security incident investigations reporting
- Ensured physical security of U.S. government facilities
- Maintained/enforced Communication/ Information System Security/Cryptographic/Emanation Security policies procedures re: DoD Directives 5200.1 8200.2, DoDI 8560.01, etc.
- Experienced with DITSCAP, DIACAP, DODIIS, ISO 17990, 27001, 27002,
Systems Administration Supervisor Active Duty
Confidential
- Administered e-mail, file, web, print, DHCP, remote access servers development, test, production, and failover application servers
- Deployed/maintained OSI Layer 3 infrastructure, provided software versioning accountability, tracked upgrade testing implementations, created/retained backups of enterprise data, managed user profiles, enforced security policies, diagnosed system faults/failures
- Performed levels I, II, III troubleshooting/maintenance of IT systems
- Analyzed network/application server design architecture for security compliance
- Employed emergency recovery plans, tools, techniques
- Ensured physical security of the Network Communications Center
National Intelligence Weather Team IT Production Manager Active Duty
Confidential
- Provided telecommunication network security for OSI Layers 2-4 secure systems and communications
- Consulted on security architecture design of terrestrial/space weather database servers and applications
- Utilized cryptographic tools and procedures for secure military communications
- Maintained control rosters for secure military facility access
- Employed Emergency Recovery plans, tools, techniques
- Provided physical, system, and information security for terabyte database
- Monitored/maintained Physical Environmental security of secure military facility
- Developed/utilized emergency recovery tools/techniques
- Maintained secure voice, data, and cryptographic systems
- Communications Security Custodian for classified materials
- Vendor Training:
McAfee HBSS ePO, Bluecoat Fundamentals, Cisco Router, IDS/IPS, NMS, MARS Foundry Network Routers Switches Hercules Network Compliance Remediation, Base Information Protection Training Internet Security Systems, Nessus, Retina ArcSight ESM ACSA, ACIA , Security , Network , MS Office, MS-WSUS, MS Windows Server NT/2000/2003 Active Directory