Motivated Cyber Analyst II equipped with strong problem-solving abilities, willingness to learn with good communication skills. Poised to contribute to team success and achieve positive results. Ready to tackle new challenges and advance organizational objectives with dedication and enthusiasm.
Overview
10
10
years of professional experience
1
1
Certification
Work History
Cyber Analyst II
Inventium
03.2024 - Current
Authored and maintained comprehensive System Security Plans (SSPs), Security Assessment Plans (SAPs), Security Assessment Reports (SARs), and directly contributing to successful Authorization to Operate (ATO) approvals.
Conduct regular security control assessments and identify security weaknesses and vulnerabilities.
Perform security impact analyses for system changes and provide recommendations for remediation.
Analyze security scan results (vulnerability scans, penetration tests) and ensure remediation efforts are tracked and completed.
Develop and manage PO&AMs, tracking progress towards the mitigation of identified risks.
Implement and manage security controls in accordance with the NIST Risk Management Framework (RMF) and ensure compliance with applicable laws, regulations, and policies.
Guide system owners and development teams through the RMF steps (Categorize, Select, Implement, Assess, Authorize, Monitor).
Collaborate with Authorizing Officials (AOs) and security assessors to address ACASfindings during security assessments, and providing clear evidence and remediation plans.
System Administrator-SecOps
Inventium
03.2023 - 03.2024
Manage ACAS vulnerability reports and remediates as required
Performs software upgrades, patch installs, and firmware upgrades
Diagnose and troubleshoot problems related to the OS, hardware, network, and related software
Daily written and oral communications with coworkers and leadership
Continual attention to periodic SCAP and STIG requirements using Evaluate STIG
Create scripts in various shells to automate daily tasks
Maintain up to date STIGs released from DISA in STIG Manager
Date knowledge of the IT security industry, including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
Recommend solutions to mitigate risk in any activity that potentially impacts the security of existing IT and information management.
Tracks and manages STIG checklists across a variety of operating systems and applications. Document weekly reports for leadership
Linux System Administrator
Future Technologies Inc
05.2022 - 04.2023
Create Linux virtual machines ranging from Red Hat 6.10- Red Hat 7.9
Perform daily back-ups of all Linux VM's (Virtual Machines)
Ensure all Red Hat Linux machines on network are in compliance with DOD security standards through the use of the Security Technical Implementation Guide (STIG) and Security Content Automation Protocol (SCAP).
Perform ACAS scans of all Red Hat Linux machines to ensure there are no vulnerabilities.
Perform patching of all Red Hat Linux machines as needed utilizing Red Hat Satellite Server.
Create directories as needed for Red Hat Linux machines.
Create new mounting points if needed for Red Hat Linux machines.
Add/manage new users on all Red Hat Linux machines and ensure all users are added to appropriate groups
Verify all partitions (I.E /home, /var etc.) have appropriate amount of available space
Ensure all Windows machines on network are in compliance with DOD security standards through the use of the Security Technical Implementation Guide (STIG) and Security Content Automation Protocol (SCAP).
Ensure prerequisites on all windows machines (virtual/physical) are set to allow the use of "BigFix" software.
Systems Administrator
Bowhead
08.2018 - 05.2022
Working in Remedy and Service Now to update and close any tickets that comes within E department
Imaging old and new, desktops and laptops, to the latest version of Windows 10 to be sure all are in compliance
Working in Active Directory to ensure all user and computer profiles are setup properly
Resetting passwords, unlocking user accounts, and providing the user with permissions to access shared drives
Ensuring that all McAfee modules are up to date and on all machines
Installing software on workstations per user's request
Managing and ensuring that all machine scans in ACAS are in compliance
Patching all systems that comes back with vulnerabilities and running full ACAS scans to clear
Accepting, creating, and closing tickets with meeting SLA's in ServiceNow
Tracks and remediates IVAM vulnerabilities
Remoting into computers to troubleshoot daily issues and resolving
Computer Specialist
Quadrant Inc/Applied Computing Technologies, FEMA
12.2017 - 08.2018
Utilize Microsoft Office Suite 2013 and 2010.
Configure and setup Microsoft Lync/Skype 2013.
Provide technical support to customers via telephone, email, and through Remedy tickets.
Analyze and troubleshoot software and hardware issues.
Identify and resolve issues pertaining to network configurations, web hosting, and domain registration.
Respond to queries pertinent to package details, e-commerce solutions, email configurations, and search engine submission packages.
Create help desk documentation with step-by-step instructions on problem solving techniques.
Knowledgeable of PC setup and installation to include peripheral installations.
Imaging laptops from Windows 7 to Windows 10.
Assisting users with setting up iPhone and/or iPads to receive emails by using AuthenX and MobileIron User Portal Sign In
Systems Administrator
Tek Systems
06.2017 - 09.2017
System Administrator on the Accounts Management Team creating Unclassified, Classified, and Top-Secret Network Accounts using Active Directory.
Creation of Network email accounts and Non-Persona Entities on Unclassified and Classified Systems working with DISA.
Analyze technical data and resource requirements for customers In-processing and system accounts that have already been established.
Use Remedy as an analytical tool to understand technical material that has been submitted by the customer or the Service Desk.
Modify customers Network Accounts by granting them permissions to shared files and folders.
Perform ongoing monitoring and threat analysis.
Analyze logs/traffic.
Desktop Support
DHA (FBI)
12.2016 - 05.2017
Install desktops, portable microcomputers, peripherals, and software products for networked, classified and unclassified, and standalone environments.
Detect, diagnose, and resolve desktop and portable microcomputer software and hardware failures.
Create/modify/delete distribution groups and shared mailboxes.
Analyze and assess customers' service request and provide prompt technical solutions.
Conduct IT audits in compliance with policies governing the administration, utilization, and acquisition of desktop and portable microcomputer products.
Prepare progress/status reports team leads.
Utilize trouble-ticketing software for opening/closing tickets in a timely and appropriate manner.
Prepare equipment for reuse or surplus of property actions.
Provide technical support for customers assigned to remote locations.
Perform software and hardware upgrades and installations involving multiple microcomputers configured for desktop, portable, and server operations.
Systems Administrator
DMI, Inc
06.2015 - 12.2016
Help maintain a customer facing, customer friendly environment in the IT Mart resolving issues efficiently to meet or exceed published 95% SLAs.
Create and manage over 30,000 user and administrator accounts within Active Directory for the Department of State.
Use Remedy ticketing software to manage issues.
Troubleshoot and assist with high level ticket escalations.
Remotely train IT Service Center Technicians on using BMC Remedy.
Work closely with direct supervisor to maintain the Department of State standards for all controlled network accounts.
Install, repair software, and deploy new assets to users with hardware issues. Install and map users to network and local printers.
Education
Bachelors of Science - Computer Science
Virginia State University
Petersburg, VA
12.2013
Skills
Risk Assessment and Risk Management
Control Assessments
Using SNOW to create and resolve tickets for ACAS remediation's or STIG completion
Proficient in ACAS to review all devices scanned and all vulnerabilities
Cybersecurity Analysis and Security
Proficient in eMASS
Using eMASSter tools to create POA&M's and provide reports
Certified Navy validator for NAVY packages
Accomplishments
Received ATO for 1 package within the first 6 months of being a Navy Qualified Validator.
Certification
CompTIA Security Plus (2018)- June 2024- June 2027