Dedicated professional with history of meeting organization goals utilizing consistent and accurate practices. Skilled in working under pressure and adapting to new situations and challenges to best enhance the organizational mission outcome.
Active Top Secret Clearance w/ SCI and CI Poly
· Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies
· Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed
· Understanding of the US Government system accreditation process under Risk Management Framework (RMF); including directives: Intelligence Community Directive 503 (ICD-503), Committee on National Security Systems Instruction (CNSSI) 1253, Defense Security Service Assessment and Authorization Process Manual (DAAPM), and the National Industrial Security Program Operating Manual (NISPOM Chapter 8)
· Perform vulnerability/risk assessment analysis to support assessment and accreditation
· Consult on the design, development, integration, and configuration management for information system security software, hardware, and firmware
· Manage changes to system and assesses the security impact of those changes
· Evaluate security solutions to ensure they meet security requirements for processing classified information.
· Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, ATO packages, and SRTMs
· Coordinate government approvals, program needs, as well as corporate and customer compliance
· Assist in conducting comprehensive investigation of computer security incidents
· Utilize corporate and customer enterprise tools to manage, maintain, audit, track, and document systems (ADO, ServiceNow, MS Teams, etc.)
· Establish complex operational software configuration controls and system interfaces for computer system(s) assigned
· Maintain file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
· Analyze and troubleshoot system anomalies to ensure optimum equipment performance
· Prepare system for operational use and support operational tests
· Review, prepare, and update authorization packages
· Notify customer when changes occur that might affect authorization accreditation
· Conduct cybersecurity portion of the self-inspection’s checklist
· Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package
· Identify any and all vulnerabilities and implement countermeasures
· Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices
· Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration
· Provide External Information System(s) Client Support
· Perform account creations, changes, & deletions on multiple authorization boundaries
· Perform Help Desk & troubleshooting activities
· Perform Hardware/Software System Configuration, upgrades and modifications
· Perform system and network appliance patching activities
· Provide Government-Issued Laptop Support
· Assist in Media Control & Accountability activities
· Perform COMSEC account/equipment management activities
Staff Management
CompTIA Security+ Training - 2022