Summary
Overview
Work History
Skills
Software
Websites
Additional Training
Additional Information
Languages
Timeline
Generic

Amber Anderson

Cyber Security Analyst
Oxford,GA

Summary

Cyber Security Analyst with an active secret clearance and 5 years of experience in monitoring vulnerabilities, analyzing generated reports from diverse electronic communications. Expertise in identifying and mitigating cyber threats, managing personnel, project management, implementing security policies, and managing compliance. Proven success in reducing system vulnerabilities, leading cross-function teams, and knowledge a strong foundation in risk management and infrastructure security. Ready to apply skills to new challenges.

Overview

10
10
years of professional experience

Work History

Cyber Security Analyst

Leaders Communication Inc
Columbus, GA
4 2023 - 3 2024
  • Assessed and managed artifacts in eMASS by enforcing access and process controls in alignment with NIST 800-53 standards, ensuring up to date compliance and security measures.
  • Generated daily reports to present to cyber manager by identifying potential vulnerabilities and security alerts to show the results of systems that are affected by not having a system updates.
  • Assisted in the completion of monthly security audits, by utilizing a Tenable scanner to identify and detect risk in over 13,000 machines and systems in order to meet the compliance of FISMA.
  • Developed and executed scripts to automate the removal of vulnerable applications from non-compliant machines by using PowerShell to remove vulnerabilities and to maintain a low count of vulnerable machines.
  • Reduced vulnerabilities in systems and serves by creating a plan with the MECM team to scan and patch quarantined machines to be able to be mission ready for deployments.
  • Analyzed data logs using the tool ELK stack to identify events and data of each systems that is non-compliant according to common vulnerabilities and exposures and common vulnerability scoring system to evaluate the threat levels.

Security Analyst

Apex Drop
Erie, PA
06.2022 - 02.2023
  • Conducted thorough research and assessments to identify control gaps in processes, procedures, and systems, leading to the implementation of enhanced methods that improved operational efficiency and reduced risk.
  • Applied exceptional writing, editing, and proofreading skills to produce clear, engaging, and error-free content, contributing to improved communication and documentation standards.
  • Served as a subject matter expert by updating and creating knowledge management documents, and provided analysis through Asana, which improved knowledge sharing and decision-making processes.
  • Designed and enforced security policies and plans across data, software applications and hardware resulting in a secured IT environment.
  • Developed and implemented security rules while continuously tracking and evaluating internal information systems, successfully mitigating threats and enhancing overall system protection.

Procurement Specialist

Kellogg Brown & Root Inc
03.2020 - 03.2021
  • Tracked purchased orders using the system army food management information system to followed up with vendors and carriers to ensure the time management orders and decrease risks.
  • Developed and maintained detailed records of all procurement activities for accurate tracking and reporting purposes to be given to Facility manager to be logged and filed forthcoming quarterly audits.
  • Researched and identified potential risks that can affect supplies and inventory levels according to the monthly budget levels so that there is product availability.
  • Conducted weekly inventories to identify accurate supplies in storage containers by forecasting using data analysis in the army food management information system to enable decision making on the budget for next purchases.

Personnel Manager (Culinary)

United States Army
08.2012 - 02.2020
  • Utilized Army food information system to track contract quality assurance, financial accounting and inventory control to provide accountabilities of army food inventories.
  • Managed culinary operations and personnel, ensuring a risk free environment when utilizing computer systems and providing resources about on data loss prevention so that personnel's are aware of potential threats.
  • Conducted monthly and quarterly reports on personnel performance on how well they mitigated risks, followed existing policies and procedures, and identify areas of improvement to be consider for promotion.
  • Analyzed data from the army food management information system to generate detailed reports on meal production, headcount and inventory reporting to analyze and implement changes to meet monthly budgets cost
  • Successfully managed multiple projects and personnel by coordinating a team of SME who were able to identify risks and threats to to mission, evaluate changes to reports while ensuring compliance with Army standards.

Skills

ACAS

Active Directory

AESMP

Analytical Review

ASANA

Audit reporting

Azure Intelligence

Cloud Technology

Compliance Monitoring

Data Warehousing

eMass

Ethical AI Practices

Global Intelligence

Governance, Risk Management and Regulatory Compliance

Information Security Program

Infrastructure Security

ISO27002

IT security

MECM

NIST SP 800s

Nmap

People Leadership

PowerShell

Project management

Risk Management

Security Architecture

Security Threat Monitoring

SIEM Management

STIGs

Threat Analysis

Vulnerability Assessment

Windows Systems

Software

CompTIA Security

Certified Ethical Hacking

Splunk, Core User

AIGPE Six SIGMA Green Belt

Additional Training

Cyber Warrior Pathway | Intellectual Point | Nov 2023 – Feb 2024
Learned skills in threat detection, network security, ethical hacking, cybersecurity tools, and compliance, preparing them to secure IT environments.

·  Gained hands-on experience in identifying and responding to various cyber threats, including malware, phishing, and network intrusions.

·  Mastered the implementation and management of secure network architectures, firewalls, and encryption techniques to protect sensitive data.

·  Developed skills in ethical hacking, including conducting penetration tests to identify vulnerabilities and improve organizational security.

·  Proficiently used industry-standard cybersecurity tools, such as SIEM systems, intrusion detection systems, and vulnerability scanners, to monitor and secure IT environments.

·  Learned to ensure organizational compliance with cybersecurity regulations and standards, such as NIST, ISO 27001, and GDPR, while effectively managing and mitigating risk.


DevOps | Intellectual Point     NOV 2020 – JAN 2021

• Skilled in analyzing security implications when integrating systems and data encryption

• Skilled with using anti malware software, VPNs, and operating systems.

• Demonstrated understanding of the life cycle of network threats, attacks, and attack vectors.

• Perform Infrastructure qualification activities, testing and change controls.

• knowledge of regulations with (GDRP) General Data Protection Regulation, PCI and privacy.

• Skilled in conducting network monitoring and intrusion detection analysis using various computer network defense tools.

• Efficient in identifying malicious factors on customer networks through triage alerts

• Hands-on expertise in configuring rules for firewall, VLAN, and router, access control list, port security, and unified threat management.

• Knowledge of SIEM and Incident Response.

Additional Information

  • Investigated computer security violations and incidents in alignment with NIST 800-53 standards, collaborating closely with cybersecurity team leaders and staff
  • Conducted comprehensive security audits, vulnerability assessments, and compliance evaluations using the ACAS system to ensure machine and system integrity
  • Established company-wide security best practices and protocols with ACAS, significantly mitigating the risk of data breaches
  • Provided technical support by utilizing eMASS to track and manage the progress of POA&Ms, ATOs, FISMA, and ATCs, ensuring compliance and security readiness
  • Input artifacts into the Army Portfolio Management System, ensuring alignment with eMASS and strict adherence to security procedures

Languages

Arabic
Native or Bilingual

Timeline

Security Analyst

Apex Drop
06.2022 - 02.2023

Procurement Specialist

Kellogg Brown & Root Inc
03.2020 - 03.2021

Personnel Manager (Culinary)

United States Army
08.2012 - 02.2020

Cyber Security Analyst

Leaders Communication Inc
4 2023 - 3 2024
Amber AndersonCyber Security Analyst