We provide IT Staff Augmentation Services!

Information Assurance Vulnerability Assessment Analyst Resume

4.00/5 (Submit Your Rating)

OBJECTIVE:

A highly qualified information technology professional with 15 years of diverse technical experience; who is seeking a challenging position in Information Technology, Information Assurance and Cyber Security. An effective communicator who is highly motivated with a demonstrated ability to complete multiple concurrent tasks in an extremely fast - paced environment. Presently have a DoD TS/SCI security clearance and have been cleared of a background investigation for positions of public trust.

TECHNICAL SKILLS

Software:  ArcSight ESM, ArcSight Loggers, Sophos HIPS AV, Site Protector IPS and Vulnerability Scanner, Altiris, PUTTY, McAfee IPS and, VMware, Splunk, MIC, Symantec, Sophos, SCAP, Snocat, Netcraft, NetInfo, NMap, IDS, Cisco Secure IDS, WireShark, Snort, Bit9, SourceFire IDS

Vulnerability Scanner:  Retina, REM, Vulnerator, Nesuss, AppDetective, WebInspect, McAfee, ACAS

Tools:  Remedy, GRC RT Ticket System

Planning Tools:  Microsoft Project, Microsoft Outlook Planning Calendar

Project Management:  Introduction to Project Management, PMP Boot Camp

Microsoft Office Software:  Windows 7, Excel 2003, Power Point 2003, MS Word 2003, Access Database, Publisher, MS Visio, Windows XP, Adobe Acrobat, Visio, Microsoft PowerPoint

WORK EXPERIENCE

Information Assurance Vulnerability Assessment Analyst

Confidential

Responsibilities:
  • Conduct on-site vulnerability assessment audits on the EIMA ITA Dept of Army (NIPR and SIPR) systems and networks within the Pentagon enclave that poses a risk via system vulnerabilities, mis-configurations and outdated patches.
  • Conduct war walks and war drives to detect unauthorized devices that are not permitted on the Pentagon network.
  • Identify systems and networks that are not in compliance with DoD Federal Information Security Management Act (FISMA) process as well as those that deviate from acceptable configurations, enclave policy and local policies.
  • Conduct vulnerability scan on HEN Pentagon backbone and report and tack IAVMs, and system vulnerabilities to ensure servers/workstations are compliant according to DISA standards.
  • Generate and review Security Technical Implementation Guide (STIG) reports for Zero-days, IAVAs and CAT1, CAT2 system vulnerabilities on Pentagon subscribers.
  • Prepare technical remediation report on system vulnerabilities for recommend mitigations as identified by DISA, CYBERCOM and CVE’s to decrease potential security risks to the Pentagon network.
  • Work with Connection Approval Office (CAO) to establish strict program control and ensure mitigations of risks are supported by obtaining Certification and accreditation of systems.
  • Support the C&A process by ensuring that all systems are scanned and mitigated prior to Authority to Operate date expires.
  • Install Retina application on laptops and servers and verify that all scan engines and audit patterns are up-to-date via DISA requirements.
  • Pull Retina scanner updates from DISA via Secure Configuration Compliance Validation Initiative (SCCVI) updates.
  • Perform analysis to validate established security requirements and recommend additional security safeguards to subscribers.
  • Document the results of Certification and Accreditation activities, assist with system Security plans and update Plans of Actions and Milestones (POA&M) once the system has been remediated.
  • Conduct Validation scans on subscriber systems to validate that vulnerabilities have been fixed.
  • Conduct complete evaluation of each system’s assets and monitor corrective actions until audit is completed and closed out.
  • Conduct ST&E evaluation to ensure that the security controls are configured properly and that adequate security controls are in place to secure the systems on the Pentagon network.
  • Document and provide security metrics to EIMA/ITA upper level directorates outlining the top offending system that reside on the Pentagon network.
  • Perform compliance audits and active evaluations to ensure that systems are patched and secured to meet DOD 8500.1 IA security policies and requirements.
  • Mentor and train Junior level Information Assurance Analysts.

Security Analyst II/Incident Handler

Confidential

Responsibilities:
  • Provide first level IDS monitoring, analysis and incident response for intrusion detections, system compromises, denial-of-service intruder activities
  • Analyzed and monitored network traffic and IDS alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms.
  • Identified anomalous or malicious activity on Confidential networks using analytical tools such as ArcSight, ISS Site Protector, McAfee, Splunk and Sophos in an operational environment.
  • Utilized Splunk and Sophos to analyze application problems and to investigate security incidents daily.
  • Processed vulnerability scans utilizing McAfee, AppDetective and WebInspect;
  • Analyzed packet capture data for various security incidents and intruder attacks using Wireshark.
  • Provided reports of vulnerabilities and remediation steps to system owners and administrators.
  • Participated in the DAR process to analyze various tools that would potentially go into the NG environment.
  • Created custom IPS signatures in ISS and McAfee using Snort
  • Performed investigations on possible exposed systems to identify vulnerabilities and attacks
  • Researched spam emails and URLs for malicious content and requested and implemented blocks on domain, C2s and IPs using the McAfee Intrusion Prevention System.
  • Analyzed potential impact of new threats and exploits and communicated risks to CERT and network and firewall admins and relevant SISO business units and managers.
  • Utilized TRUMAN (NG Home Grown Tool) to analyze and investigate potential malware.
  • Participated in the DAR to analyze various tools that would potentially go into the NG environment.
  • Assisted in testing of software deployment tools
  • Developed and tested security policies and provided metrics regarding incidents, and other relevant security measures.
  • Created documentation to ensure the policies of the various systems are in line with Audit regulations.
  • Collaborated with team members to discuss the latest threats in security
  • Implements, enforces and communicates security policies and/or plans for data, software applications, hardware and telecommunications.
  • Performed weekly review of assigned company standards to confirm any CVE or vendor patch announcements and applicable write-ups when appropriate
  • Composed and sent security alert notifications.
  • Advised incident responders on how to mitigate and resolve computer security issues.
  • Recommended IPS filters to eliminate false positives.
  • Create RT tickets to track, analyze and solve various security events, unauthorized software/applications and system compromises using GRC and Remedy tracking system.
  • Analyzed, research and follow up with SISO’s and help desk personnel to submit software waivers.
  • Researched and gathered latest security vulnerabilities, patches, Malware, Spyware articles off DISA and Cybercom government websites.
  • Create CSIRT report for upper management, document and write technical white papers on security tools.
  • Gather metrics to identify security trends, measures and global hackers.
  • Perform research and analysis to detect unauthorized software applications and open ports for possible intrusions on NGGN desktops, laptops and servers.
  • Deploy and install XPU and Firmware updates to Intrusion Prevention and Intrusion Detection Systems
  • Performed SDR, Critical, Non-Critical, CMOC and Adhoc Scans on new and modified servers before going into production.
  • Troubleshoot and researched vulnerabilities found on servers, databases and desktop workstations and assist users to remediate and mitigate vulnerabilities.
  • Provided customer service to NGNN global network users to research, analyze and resolve.

Configuration Management Analyst

Confidential

Responsibilities:
  • Prepared and managed change request documents and baseline lists.
  • Assigned configuration identification numbers to hardware and COTS software applications for version control.
  • Performed hardware and COTS server audits to detect and prevent defects in the production system.
  • Conducted server build audits to ensure that the COTS software and applications are in compliance with the hardware configuration management baseline.
  • Performed server audits to ensure that COTS and software applications are processed within customer requirements.
  • Conducted and document hardware and software CM audits.
  • Performed Engineering Change Request ECR process configuration control and configuration status accounting via Hardware Configuration Control Board (CCB).
  • Developed engineering change procedures and hardware CM SOPs.
  • Monitored and managed the Engineering Change Process (ECP) workflow.
  • Maintained the CM library, GFE databases and other configuration management tools.
  • Organized and facilitated weekly hardware CCB meeting deploying changes in a systematic manner.
  • Write and published weekly Hardware CCB minutes and assign action items to project personnel.
  • Audit ECRs to verify change requests are correctly implemented, documented and tested.
  • Tracked and identified all ECR non -compliances and provide corrective actions to QA Manager.
  • Performed quality assurance testing for new code and system changes
  • Coordinated, planned software/hardware production releases and ensured that release schedules are posted in planning tool.
  • Developed and implemented the Hardware and Release Plan template that outlined the contents of the release, scope, mitigating factors and risks, resulting in very streamlined and organized production releases.
  • Researched and gathered data to report metrics identifying process defects and trends to upper management.
  • Conducted ECR process training to new hires and existing personnel.

Production Release Manager

Confidential

Responsibilities:
  • Scoped, planned, coordinated and managed monthly project releases to include quality checks for production releases.
  • Primary point of contact for hardware builds, upgrades, engineering change requests and system enhancements.
  • Report final release results to government customer COTR.
  • Conducted lessons learned meetings to identify post release issues, provided corrective actions in order to implement solutions.
  • Developed and presented monthly release plans identifying system risks, impacts and resources to project managers.
  • Created Cutover Readiness Release Checklist for monthly hardware and software releases.
  • Conducted cutover readiness reviews with onsite customer and internal project staff.

Program Management Support

Confidential

Responsibilities:
  • Assisted with procuring, receiving and closing out software and hardware purchases.
  • Worked with business and procurement office personnel to create purchase orders and close-out invoices for commercial and Government vendors and NG buyers and finance personnel.
  • Received, tracked and inventoried all hardware equipment, software and service maintenance contracts.
  • Coordinated all computer and hardware moves according to the(SEC)customer requirements
  • Managed and maintain hardware, software and government furnished equipment (GFE) inventory database.
  • Primary point of contact for hardware equipment upgrades, returns and end of life products
  • Worked with SEC operations center to receive all hardware and software deliveries.
  • Performed physical audits of all hardware and software received for Edgar project.
  • Completed RMA’s to trade-in and return Sun Solaris server and Cisco routers.
  • Assisted in purchasing various hardware, communications equipment and COTS software from outside vendors.
  • Developed and created Bill of Materials (BOM), technical instructions (TIs,) statement of work (SOW) for the acquisition and purchase of hardware and software for Edgar technical projects.
  • Worked with vendors to obtain price quotes, configurations, service level agreements and maintenance cost for various hardware and software.
  • Tracked, maintained and negotiated hardware and software maintenance renewal contracts with outside vendors
  • Conducted monthly vendor meetings to discuss maintenance contract SLAs, new technologies, upgrades, end of life hardware and software maintenance agreements.
  • Managed, maintained and renewed hardware and COTS software license and maintenance contracts.
  • Provided monthly status reports to upper management with all new hardware equipment, software and maintenance purchases.

Network System Test Engineer II

Confidential

Responsibilities:
  • Built and configured Virtual Private Networks using TCP/IP protocols.
  • Connected and configured Cisco and Lucent routers using network design requirements and specifications.
  • Installed, configured and maintained Compaq, Windows NT and Solaris operating systems using server hardware UNIX and COTS application software.
  • Detected, diagnosed and reported defects in hardware and software release code.
  • Planned, tracked and maintained hardware and COTS software requests for desktops, Solaris and Compaq servers as well as Cisco switches, routers hubs and other network equipment.
  • Created and provided reports and Visio diagrams to build VPN’s.
  • Configured, racked and mounted Solaris, Compaq servers and Cisco routers, switches and hubs.
  • Configured and built Solaris servers to give access to the IP VPN secured network.
  • Verified and tested Cisco and Lucent switches, routers and hubs within an IP VPN secured network.
  • Created reports and test documentation for new product code releases and custom configuration products to report bugs and defects
  • Worked directly with developers and management team to facilitate change requests and establish software code baselines.
  • Attended design reviews and walk-through release meetings to validate system architecture, code and requirements.
  • Implemented the IP VPN Development Team’s database trouble tracking system using Rational Products with a SQL Server backend database for Web and Client Servers.
  • Downloaded and upgraded patches and software on Solaris and Compaq servers
  • Performed weekly web and client server backups.

Production Support Analyst

Confidential

Responsibilities:
  • Diagnosed and resolved various MVS mainframe and system application problems.
  • Troubleshoot mainframe and client/server application system problems.
  • Provided Tier II Help Desk production support to customers and entered trouble tickets into database.
  • Monitored MVS mainframe applications system performance and ABEND errors.
  • Teamed with system analysts, testers and developers to perform quarterly system updates and production maintenance releases.
  • Performed monthly on-call application support. Performed front-end on-line system functionality and verification testing
  • Performed system testing for monthly code ships and modifications in a production test environment.
  • Attended monthly walk-through production release meetings.
  • Coordinated, administered weekly Maintenance Reviews (MR) meetings to address system code modifications, system issues to provide MR reports to management
  • Created, assigned and set up user accounts and passwords to give users access to various mainframe and client server applications
  • Troubleshoot user account application and system problems.
  • Performed password resets to user accounts in a help desk environment
  • Implemented and created a user account ID administration procedures manual
  • Provided end user training to AT&T users.
  • Coordinated with the RACF Protection Administration group and assisted in Price Water house audits on AT&T systems
  • Maintained user accounts and provided security guidelines and procedures to application users.
  • Provided monthly statistical reports to upper management.

We'd love your feedback!