Overview
Work History
Education
Certification
Timeline
Skills
Summary
Generic

Domingo Udofia

Security Control Assessor
Edgewood,MD

Overview

7
7
years of professional experience
4
4
Certification
5
5
years of post-secondary education

Work History

Cyber Application Assessor

Emagine IT
Baltimore, MD
03.2023 - Current

• Determined whether assertions made in documentation and interviews are correct by exercising and testing system's functionality.
• Focused on testing application and database components of systems, with less focus on underlying operating systems, network devices, databases, and applications.
• Followed guidance provided by each Control's “Assessment Methods and Objects” in current version of ARS (5.0), industrial best practices, and all other CMS guidance and directives for all technical testing.
• Discovered any operational flaws that could violate CMS Policies, Standards and Procedures, and write vulnerability findings for remediation.
• Assessed susceptibility of system to insider, intranet, internet, and network-based attacks
• Ensured adequate testing of every in-scope capability and sub-capability (and corresponding controls and control enhancements) in ARS.
• Verified all control inheritance assertions and documented any issues with inheritance.
• Ensured that technical testing portions of ACT requirements are performed in non-production environment that is near copy of production environment.
• Performed testing in validation/test/pre-production environment, rather than testing production application itself.
• Performed application testing from technical configuration perspective to ensure application security controls have been implemented, are working as intended and producing desired results.
• Worked with CMS and support contractors to use existing scan results uploaded to repository (CFACTS) from available tools.
• Reviewed/analyzed scan configuration, ensure scans are credentialed where applicable, and ensure scans include all assets in scope.
• Performed analysis of application behavior and examining automated tool output to identify vulnerabilities.
• Identified deviations from best application security practices.
• Recorded findings and consulting with other Assessors and Assessment Lead to verify/corroborate findings.
• Wrote findings for daily briefings to System Team and Assessment Lead
• Interviewed application system staff and presented application findings during daily stakeholder briefings.
• Performed other duties assigned by management team.
• Analyzed and evaluated vulnerability scan results.

Trainer Assistant

Communitywide Institute Of Technology, CIT
Baltimore, MD
02.2022 - 02.2023

• Analyzed IT system functionality and integration with management processes, structure, culture, and performance.
• Computer fundamentals and Software Collaborations Tools
• Tasks and Time Management and Office Fundamentals
• Network Operating System and Security and IOT
• Data Foundation, Human and Customer Service
• Operating System, Upgrading and Protocol Suites
• Updated and set up instructions and uploaded course materials in webinar and learning management software.
• Filed, organized, and archived training materials to support future training sessions.
• Developed and executed performance management programs to increase employee engagement and productivity.
• Liaised with trainers and participants to provide logistical and technical support before, during and after learning course.
• Trained and mentored [25] new personnel hired to fulfill various roles.
• Ability to prioritize tasks to support assessments on multiple boundaries at a given time.
• Ability to present IT security risks to executive management.

Information Security Analyst

OrbRyde Technologies Inc
Bowie, MD
10.2020 - 02.2022

• Developed, reviewed, and updated InfoSec system policies, system security plans, and security baselines in accordance with NIST, FISMA, OMB App.III A-130, and NIST SP 800-18
• Applied appropriate information security control for Federal Information System based on NIST 800-37 rev1, SP 800-53 rev4, FIPS 199, FIPS 200 and OMB A-130 Appendix III
• Conducted systems and network vulnerability scans to identify and remediate potential risks.
• Performed Federal Information Security Management Act (FISMA) audit reviews.
• Performed risk assessments, security control assessments and vulnerability scanning with use of NESSUS.
• Developed configuration management plans, contingency plans, and incident response plans.
• Monitored controls post-authorization to ensure compliance with security requirements.
• Coordinated and managed team activities and deadlines during assessment engagements
• Communicated effectively through written and verbal means to co-workers, clients, vendors, and senior leadership.

Security Analyst

WereSoft Technologies Consulting LLC
Greenbelt, MD
09.2019 - 10.2020

• Performed FISMA audit reviews and updated IT security policies, procedures, standards, and guidelines according to departmental and federal requirements.
• Documented and reviewed system Security Plan (SSP), Security Assessment Report (SAR), and Security Plan of Action and Milestone (POA&M)
• Conducted IT risk assessment and documented security controls.
• Analyzed security reports for security vulnerabilities.
• Performed selection and implementation of controls that apply system security protections.
• Monitored controls post authorization to ensure continuous compliance with security requirements.
• Ensured all POA&M actions are completed and tested in a timely manner.
• Updated IT security policies, procedures, standards, and guidelines according departmental and federal requirements
• Communicated effectively through written and verbal means to co-workers, clients, vendors, and senior leadership.
• Oversaw software configurations and updates for [ 20] systems across various departments.
• Reduced security risks by 20% through enhancing protocols and ensuring adherence to regulations.
• Created and implemented security network framework across multiple devices.

Network Analyst

WereSoft Technologies Consulting LLC
Greenbelt, MD
08.2016 - 08.2019

• Ensured network connectivity across company's LAN/WAN infrastructure is on par technical consideration.
• Provided technical support and troubleshooting to Users.
• Designed and administered network security.
• Reviewed violations of computer security procedures and developed mitigation plans.
• Conducted security audits to identify vulnerabilities and monitored security patch levels on servers, workstations, network environments, and anti-virus systems.
• Configured HIDS for mission critical network systems and applications with sensitive data.
• Designed proactive scanning based on known trends and suspected malicious traffic.
• Troubleshooted and resolved network connectivity issues to include TCP/IP, DHCP, and DNS
• Administered and maintained WAN.
• Monitored computer virus reports to determine when to update virus protection system.
• Designed and implemented networks in collaboration with project engineers.
• Communicated effectively through written and verbal means to co-workers, clients, vendors, and senior leadership

Education

Bachelor of Science - Engineering

University of Oklahoma
Norman, OK
01.2013 - 12.2017

Certification

  • CISA - Certified Information Systems Auditor
  • CompTIA Security+CE
  • Microsoft Certified Trainer (MCT)
  • Microsoft Networking Fundamentals (MTA)

Timeline

Cyber Application Assessor

Emagine IT
03.2023 - Current

Trainer Assistant

Communitywide Institute Of Technology, CIT
02.2022 - 02.2023

Information Security Analyst

OrbRyde Technologies Inc
10.2020 - 02.2022

Security Analyst

WereSoft Technologies Consulting LLC
09.2019 - 10.2020

Network Analyst

WereSoft Technologies Consulting LLC
08.2016 - 08.2019

Bachelor of Science - Engineering

University of Oklahoma
01.2013 - 12.2017

Skills

  • Information Security Assessment
  • Project Management
  • Business Analysis, Strategic and Planning
  • Network Security
  • Technical Security Analysis
  • Physical Security and Design
  • IT Vulnerability Management
  • Risk Assessment
  • RMF ( Risk Management Framework)
  • Vulnerability Assessment
  • Vulnerability Scanning and Analysis
  • Splunk Analysis
  • Disaster Recovery Plans
  • Incidence Response Plans

Summary

  • Implement and check information system security plans to ensure NIST control requirements are met.
  • Work hand in hand with the team to have a proper artifact collection and brief clients' examples of artifacts that will satisfy assessment requirements.
  • Support client security policies and activities for networks, systems, and applications including vulnerability management, incident reporting, mitigation, and continuous monitoring.
  • Maintain, create, and operate a schedule of vulnerability scanning, including business co-ordination with its stakeholders. Establish vulnerability scanning resolution on server, cloud, and desktop environments.
  • Continuous monitoring of the network and internal systems for malicious activity.
  • Ensure effectiveness of all security controls, vulnerabilities, and threats to support organizational risk management decisions.
  • Managing multiple priorities with a positive attitude and willingness to take on added responsibilities to meet team goals.
  • Develop and review policies related to Disaster Recovery and Business Continuity.
  • Reviewing and updating security artifacts such as System Security Plan (SSP), Security Assessment Report (SAR), Security Assessment plan (SAP), Contingency Plan (CP), Privacy Impact Assessment (PIA), and Plan of Actions and Milestones (POA&M).
  • Reviewed security logs to ensure compliance with policies and procedures and identifies potential anomalies.
  • Reviewed authorization documentation for completeness and accuracy for compliance.
  • Solved unique and complex problems with broad impact on the business.
Domingo UdofiaSecurity Control Assessor