We provide IT Staff Augmentation Services!

Staff Information Security System Resume Profile

3.00/5 (Submit Your Rating)

MarylanD

OBJECTIVE: Highly motivated individual with over 14 years of experience in Cyber Security/ Information Assurance seeking employment with anorganization that embraces professional growth and creates opportunities for upward mobility.

Professional Experience:

Sr. Staff Information Security System Analysis/

Confidential

  • Approved and managed Firewall changes on the Cisco ASA firewall
  • Oversaw the Security Architecture for the Unclassified DMZ
  • Audited Networking gear such as Cisco 2960/3750 and Juniper Ex4500 and Cisco ASA 4520 and Juniper SRX 650 to ensure compliance
  • Enforced IA policies in accordance with DoD and Air force regulations
  • Updated Certification and Accreditation packages using the Enterprise Mission Assurance Support Service eMASS
  • Developed Administered and applied the Security Technical Implementation Guides STIG process for network devices, databases workstations and servers for the DC3 enclave
  • Conducted analysis and compiled reports using DISA Security Content Automation Protocol SCAP SCAP Compliance Checker SCC and DISA STIG Viewer
  • Conducted penetration and vulnerability analysis using the Assured Compliance Assessment Solution ACAS , and the Secure Configuration Compliance Validation Initiative eEye Retina
  • Updated the Certification and Accreditation package in accordance to both the Risk Management Framework RMF and DoD Information Assurance Certification and Accreditation Process DIACAP Standards
  • Developed process to review C A controls bi-annually for the enclave
  • Providesecurity analysis in reporting time sensitive data in support of Joint National theater level consumers
  • Configured and enforced Continuous Monitoring and Risk Scoring CMRS reporting cybersecurity based on published asset inventory and relative compliance data.
  • Analyze network posture and obtain reports using the Host Based Security System HBSS
  • Implemented various security techniques and best practices on a wide range of security areas including architectures, firewalls, IDS, content filtering and network access.
  • Complied relevant information pertaining to network architecture, devices, and policy compliance and briefed those findings to Sr. Management
  • Enforced Information Assurance Vulnerability Management Compliance IAVM process
  • Authored and enforced a Risk Assessment process for new software/applications to be introduced to the network
  • Performed risk assessments on software, hardware, systems, and web applications for US Air Force
  • Investigates security violations and prepared reports specifying preventive action to be taken.
  • Review and analysis logs in ArcSight
  • Developed and administered security procedures for classified documents, proprietary materials and equipment.
  • Responded to security incidents Incident response for the organization.
  • Report vulnerabilities found on network devices to appropriate authority.
  • Conducts Security Test and Evaluation ST E to include Vulnerability scans and interviews with responsible individuals in order to complete relevant security checklists

LeadSr. Information Security System Analysis

Confidential

  • Enforced IA policies in accordance with DoD and Air force regulations
  • Complied relevant information pertaining to network architecture, devices, and policy compliance.
  • Conducted penetration and vulnerability analysis using eEye Retina , Harris Stat, Hercules and Nessus Scanners
  • Developed and administered security procedures for classified documents, proprietary materials and equipment.
  • Managed the PDS team and its personal during management transition.
  • Planned and Coordinated the securing of over 25,000 PDS boxes in the National Capital Region NCR
  • Conducted risk assessment and provides recommendations for application design
  • Enforced and defined Acceptable Use Policy for use of Government Furnished Equipment including Workstations and Servers.
  • Reported assets in the Asset Vulnerability Tracking Resource AVTR and Vulnerability Management System VMS
  • Interpreted Vulnerabilities found on network devices and made decisions on how they may impact network operability.
  • Enforced all Information Assurance activities as directed by JTF-GNO
  • Report vulnerabilities found on network devices to appropriate authority.
  • Enforced Information Assurance Vulnerability Management Compliance IAVM process
  • Implemented Mitigation strategies for vulnerabilitiesfound on network devices, Servers and workstations
  • Provided an IA presence at a wide range of technical and transition meetings in all matters with Information Assurance relevanceDeveloped technological ideas and implemented their development into product
  • Performed DISA Gold Disk Scans and audits
  • Conducted penetration and vulnerability analysis using eEye Retina , Harris Stat, Hercules and Nessus Scanners
  • Implemented various security technologies in a wide range of security areas including architectures, firewalls, IDS, content filtering and network access.
  • Administered and applied the Security Technical Implementation Guides S.T.I.G. process for network devices, databases workstations and servers
  • Conducts Security Test and Evaluation ST E to include VAB scans and interviews with responsible individuals in order to complete relevant security checklists
  • Coordinated with government agencies and officials to obtain rulings, interpretations, and acceptable deviations for compliance with Government regulations and policies.
  • Complied relevant information pertaining to network architecture, devices, and policy compliance.
  • Confidential IA- Lead for the Pentagon Primary Technical Control Facility P.P.T.C.F. Information Assurance Mission.
  • Administered security procedures for classified documents, proprietary materials and equipment
  • Report vulnerabilities found on network devices to appropriate authority.
  • Enforced Information Assurance Vulnerability Management Compliance IAVM process
  • Implemented Mitigation strategies for vulnerabilities found on network devices, Servers and workstations
  • Developed technological ideas that were implemented development into various projects and products
  • Provided an IA presence at a wide range of technical and transitional meetings in all matters with Information Assurance relevance
  • Conducts Security Test and Evaluation ST E to include Vulnerability scans and interviews with responsible individuals in order to complete relevant security checklists
  • Report vulnerabilities found on network devices to appropriate authority.
  • Performed risk assessments on software, hardware, systems, and web applications for US Air Force 844th
  • Enforced Information Assurance Vulnerability Management Compliance IAVM process
  • Administered and applied the Security Technical Implementation Guides S.T.I.G. process for network devices, databases workstations and servers
  • Performed DISA Gold Disk Scans and audits
  • Coordinated with government agencies to obtain rulings, interpretations, and acceptable deviations for compliance with government regulations.
  • Investigated security violations and prepared reports specifying preventive action to be taken.

Confidential

  • Subject matter expert demonstrating unyielding initiative in troubleshooting systems abnormalities, while insuring mission continuity in preventing countless hours of mission downtime
  • Analyzed multiple source intelligence and presented briefings on current situation for high-level policy decision makers. Theses briefs provided background information, current situation status and critical data in support of Counter-Terrorism efforts.
  • Performed systems audits in accordance with US Navy standards and policies
  • Participated in testing procedures for system modifications, and analyzed impacts and resource contentions.
  • Authored software trouble reports and recommended solutions enhancing the system performance.
  • Highly Skilled in all aspects of acquisition, processing, analyzing and reporting data using complex operating systems
  • Collaborated with fellow analyst to develop special targets of interest in support of Counter-Terrorism
  • Performed advanced signals analysis on pulse signals, printer signals, digital communications and a variety of enciphered communications.
  • Demonstrated extensive knowledge on the theory of electronics, radio wave propagation, signals multiplexing and communication networks.

We'd love your feedback!