Staff Information Security System Resume Profile
3.00/5 (Submit Your Rating)
MarylanD
OBJECTIVE: Highly motivated individual with over 14 years of experience in Cyber Security/ Information Assurance seeking employment with anorganization that embraces professional growth and creates opportunities for upward mobility.
Professional Experience:
Sr. Staff Information Security System Analysis/
Confidential
- Approved and managed Firewall changes on the Cisco ASA firewall
- Oversaw the Security Architecture for the Unclassified DMZ
- Audited Networking gear such as Cisco 2960/3750 and Juniper Ex4500 and Cisco ASA 4520 and Juniper SRX 650 to ensure compliance
- Enforced IA policies in accordance with DoD and Air force regulations
- Updated Certification and Accreditation packages using the Enterprise Mission Assurance Support Service eMASS
- Developed Administered and applied the Security Technical Implementation Guides STIG process for network devices, databases workstations and servers for the DC3 enclave
- Conducted analysis and compiled reports using DISA Security Content Automation Protocol SCAP SCAP Compliance Checker SCC and DISA STIG Viewer
- Conducted penetration and vulnerability analysis using the Assured Compliance Assessment Solution ACAS , and the Secure Configuration Compliance Validation Initiative eEye Retina
- Updated the Certification and Accreditation package in accordance to both the Risk Management Framework RMF and DoD Information Assurance Certification and Accreditation Process DIACAP Standards
- Developed process to review C A controls bi-annually for the enclave
- Providesecurity analysis in reporting time sensitive data in support of Joint National theater level consumers
- Configured and enforced Continuous Monitoring and Risk Scoring CMRS reporting cybersecurity based on published asset inventory and relative compliance data.
- Analyze network posture and obtain reports using the Host Based Security System HBSS
- Implemented various security techniques and best practices on a wide range of security areas including architectures, firewalls, IDS, content filtering and network access.
- Complied relevant information pertaining to network architecture, devices, and policy compliance and briefed those findings to Sr. Management
- Enforced Information Assurance Vulnerability Management Compliance IAVM process
- Authored and enforced a Risk Assessment process for new software/applications to be introduced to the network
- Performed risk assessments on software, hardware, systems, and web applications for US Air Force
- Investigates security violations and prepared reports specifying preventive action to be taken.
- Review and analysis logs in ArcSight
- Developed and administered security procedures for classified documents, proprietary materials and equipment.
- Responded to security incidents Incident response for the organization.
- Report vulnerabilities found on network devices to appropriate authority.
- Conducts Security Test and Evaluation ST E to include Vulnerability scans and interviews with responsible individuals in order to complete relevant security checklists
LeadSr. Information Security System Analysis
Confidential
- Enforced IA policies in accordance with DoD and Air force regulations
- Complied relevant information pertaining to network architecture, devices, and policy compliance.
- Conducted penetration and vulnerability analysis using eEye Retina , Harris Stat, Hercules and Nessus Scanners
- Developed and administered security procedures for classified documents, proprietary materials and equipment.
- Managed the PDS team and its personal during management transition.
- Planned and Coordinated the securing of over 25,000 PDS boxes in the National Capital Region NCR
- Conducted risk assessment and provides recommendations for application design
- Enforced and defined Acceptable Use Policy for use of Government Furnished Equipment including Workstations and Servers.
- Reported assets in the Asset Vulnerability Tracking Resource AVTR and Vulnerability Management System VMS
- Interpreted Vulnerabilities found on network devices and made decisions on how they may impact network operability.
- Enforced all Information Assurance activities as directed by JTF-GNO
- Report vulnerabilities found on network devices to appropriate authority.
- Enforced Information Assurance Vulnerability Management Compliance IAVM process
- Implemented Mitigation strategies for vulnerabilitiesfound on network devices, Servers and workstations
- Provided an IA presence at a wide range of technical and transition meetings in all matters with Information Assurance relevanceDeveloped technological ideas and implemented their development into product
- Performed DISA Gold Disk Scans and audits
- Conducted penetration and vulnerability analysis using eEye Retina , Harris Stat, Hercules and Nessus Scanners
- Implemented various security technologies in a wide range of security areas including architectures, firewalls, IDS, content filtering and network access.
- Administered and applied the Security Technical Implementation Guides S.T.I.G. process for network devices, databases workstations and servers
- Conducts Security Test and Evaluation ST E to include VAB scans and interviews with responsible individuals in order to complete relevant security checklists
- Coordinated with government agencies and officials to obtain rulings, interpretations, and acceptable deviations for compliance with Government regulations and policies.
- Complied relevant information pertaining to network architecture, devices, and policy compliance.
- Confidential IA- Lead for the Pentagon Primary Technical Control Facility P.P.T.C.F. Information Assurance Mission.
- Administered security procedures for classified documents, proprietary materials and equipment
- Report vulnerabilities found on network devices to appropriate authority.
- Enforced Information Assurance Vulnerability Management Compliance IAVM process
- Implemented Mitigation strategies for vulnerabilities found on network devices, Servers and workstations
- Developed technological ideas that were implemented development into various projects and products
- Provided an IA presence at a wide range of technical and transitional meetings in all matters with Information Assurance relevance
- Conducts Security Test and Evaluation ST E to include Vulnerability scans and interviews with responsible individuals in order to complete relevant security checklists
- Report vulnerabilities found on network devices to appropriate authority.
- Performed risk assessments on software, hardware, systems, and web applications for US Air Force 844th
- Enforced Information Assurance Vulnerability Management Compliance IAVM process
- Administered and applied the Security Technical Implementation Guides S.T.I.G. process for network devices, databases workstations and servers
- Performed DISA Gold Disk Scans and audits
- Coordinated with government agencies to obtain rulings, interpretations, and acceptable deviations for compliance with government regulations.
- Investigated security violations and prepared reports specifying preventive action to be taken.
Confidential
- Subject matter expert demonstrating unyielding initiative in troubleshooting systems abnormalities, while insuring mission continuity in preventing countless hours of mission downtime
- Analyzed multiple source intelligence and presented briefings on current situation for high-level policy decision makers. Theses briefs provided background information, current situation status and critical data in support of Counter-Terrorism efforts.
- Performed systems audits in accordance with US Navy standards and policies
- Participated in testing procedures for system modifications, and analyzed impacts and resource contentions.
- Authored software trouble reports and recommended solutions enhancing the system performance.
- Highly Skilled in all aspects of acquisition, processing, analyzing and reporting data using complex operating systems
- Collaborated with fellow analyst to develop special targets of interest in support of Counter-Terrorism
- Performed advanced signals analysis on pulse signals, printer signals, digital communications and a variety of enciphered communications.
- Demonstrated extensive knowledge on the theory of electronics, radio wave propagation, signals multiplexing and communication networks.