Goal-oriented IT professional with significant success in planning, analyzing and implementing of security plans and initiatives. Excel in developing comprehensive, secure network designs and systems.
Overview
14
14
years of professional experience
1
1
Certification
Work History
Information System Security Manager Support
Sentar, Inc
Huntsville, AL
10.2023 - Current
Coordinate with various stakeholders, e.g., Security Engineers, Network Administrators, System Administrators, Chief Information Officers (CIOs), Information Assurance Managers (IAMs) / Information Systems Security Managers (ISSMs), certification authorities (and representatives), accreditation authorities (and representatives), program managers, vendors, etc., necessary to properly identify, document, mitigate, and manage risk attributed to the target system, network, and/or application.
Identify, develop (directly or in coordination with applicable experts), and incorporate common artifacts found in RMF authorization packages, e.g., system architecture and boundaries, hardware and software inventories, policies and procedures, risk assessment reports, POA&Ms, data flows, PPSM accounting, and other necessary system, network, and application documentation.
Apply knowledge and experience in identifying, assessing, and documenting compliance against applicable DoD
Information Assurance (IA) security controls (technical, management, operational), Service (e.g., Army) regulations, etc., within the RMF package.
Apply knowledge of, and ability to use, applicable compliance and authorization reporting environments (e.g., eMASS, CMRS) to document the progress of RMF risk assessments.
Conduct root cause analysis for inconsistencies or shortfalls in system cybersecurity posture.
Utilize vulnerability scanning and assessment tool results (e.g., ACAS/Nessus/STIG Viewer/SCAP) necessary to identify and document compliance while providing cybersecurity recommendations based on organizational requirements.
Analyze Host-Based Security System (HBSS) and/or Endpoint Security Solution (ESS) output and configurations.
Coordinate with system POCs, review authorization boundary diagrams, architecture/data flow diagrams, hardware/software inventories, IP address/subnet assignments, Med-COI Zone taxonomy, and other artifacts.
Utilize compliance and authorization reporting environments (e.g., eMASS, CMRS, COAMS, Tanium, and Phoenix) and coordinate with system POCs to explain compliance requirements, assist in reaching compliance, and provide training.
Develop meeting agendas/briefings and lead/attend and speak in meetings with stakeholders to discuss status of efforts.
Apply NIST, DoD, and DHA security requirements to include NIST SP 800-53 controls, DISA Security Technical Implementation Guides (STIGs), and Security Requirements Guides (SRGs).
Information System Security Officer
Sekon Enterprise, Inc.
Reston, VA
07.2022 - 08.2023
Supporting the U.S. Department of Defense (DoD), Defense Health Agency (DHA), Program Executive Office (PEO), Defense Healthcare Management Systems (DHMS), Defense Medical Information Exchange (DMIX)
Review existing PEO Cybersecurity policies and recommend changes, additions, and/or improvements to the PEO Cybersecurity Lead
Assist with Risk Management Framework Assessment and Authorization actions for assigned systems
Notify ISSM when changes occur that might affect the authorization determination of the Information System(s)
Enter system information into the Enterprise Mission Assurance Support Service (eMASS)
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM prior to change
Provide peer review and comment on documents prepared by the PEO Cyber Team for the client
Coordinate with the Testing Infrastructure (TI) Team to discuss policies or Security Controls
Execute the cyber security portion of the self-inspection, to include security coordination and review of system assessment plans
Support Cybersecurity functions such as Configuration Management, Incident Response, Contingency Planning, Disaster Recovery
Prepare reports on the status of security safeguards applies to computer systems
Write POA&Ms, including detailed justification for program-required, non-compliant items, and manage POAM&Ms using eMASS and JAZZ LMT
Information Security Analyst
Intellidyne, LLC
Falls Church, VA
03.2019 - 07.2022
Supporting the U.S. Department of Defense (DoD), Defense Health Agency (DHA), Program Executive Office (PEO), Defense Healthcare Management Systems (DHMS), Defense Medical Information Exchange (DMIX).
Work closely with team members to deliver project requirements, develop solutions and meet deadlines.
Work with System/Network Administrators and other associates to ensure secure implementation of applications and networks.
Perform scans, evaluate results, and determine remediation steps.
Identify areas of applications for regression testing following software updates, system changes or functionality changes to avoid unnecessary downtime and recoding.
Assist with the development of processes and procedures to improve incident response times, analysis of incidents and overall security operation functions.
Analyze system risk to identify and implement appropriate security countermeasures.
Implement plans to secure computer files against breach, destruction or accidental modification.
Update virus protection systems based on computer virus reports.
Analyze security procedure violations and developed plans to prevent recurrence.
Implement company policies, technical procedures and standards for preserving integrity and security.
Execute scripts to communicate with back-end servers and provide real-time updates.
Information Technology Specialist
Trinity Wiring and Security Solutions
Manassas, VA
09.2010 - 03.2019
Provided technical support for users and ensured proper maintenance of workstations, printers and peripherals.
Tested performance, functionality and security of network systems, individual workstations and peripheral devices.
Responded to user service requests and expediently resolved trouble tickets to maximize system uptime.
Deployed new work stations and printers, installed operating systems, applications and drivers, and configured network properties and hardware.
Supported disaster recovery plans, performed regular backups and created images of workstations prior to upgrades.
Supported desktop and laptop users with issues related to Microsoft, Adobe, Symantec and other deployed software.
Researched, documented and escalated support cases to higher levels of support when unable to resolve issues using available resources.
Disassembled computer systems to troubleshoot and resolve hardware issues.
Investigated technical issues using knowledge base and personal experience to complete timely resolutions.
Education
Bachelor of Science - Computer Information Systems
Strayer University
Associate of Science - Computer Networking Technology