A team player seeking a full-time position with the ability for continued growth in the IT profession. Dedicated to providing prompt and efficient customer service.
Overview
9
9
years of professional experience
1
1
Certification
Work History
Cyber Analyst II
Agile Defense
Quantico, VA
10.2016 - Current
Provide a detailed description of the vulnerability and its impact on the system/application/network
Include information such as how the vulnerability was exploited or could potentially be exploited, the potential consequences of exploitation, and any specific areas or functionalities that were affected
Mitigate vulnerability, such as temporarily disabling affected functionality, implementing access controls, or isolating affected systems from the network
Conducting vulnerability scans and recognizing vulnerabilities in security systems
Describe the measures taken to address the vulnerability permanently, such as software patches, configuration changes, or infrastructure upgrades
Include details about testing procedures, change management processes, and any dependencies or risks associated with the fixes
Provide information on any additional steps taken after the vulnerability was mitigated, such as system monitoring, user awareness training, or security enhancements
Ensure RMF artifacts are complying
Collect and collate system or site information and use it to evaluate and document in Enterprise Mission Assurance Support Service (EMASS) the security posture of the Propulsion, Power, & Auxiliary Machinery systems and subsystems being Assessed, Authorized, and maintained
Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation
ScienceLogic Ticketing System for Vulnerabilities to track and updates
Determine a system’s compliance with all applicable Controls and Assessment Procedures
Track deliverables and action items in accordance with A&A guidance
Identify systemic security issues based on the analysis of vulnerability and configuration data
Developing insights about the context of an organization’s threat environment
Summarize the incident report by emphasizing the successful mitigation of the vulnerability, the lessons learned from the incident, and any recommendations for future prevention or detection of similar vulnerabilities.
IA Security Officer, Army Support
Spear Inc
Herndon, VA
03.2015 - 04.2017
Supporting execution of RMF IV&V events utilizing DoD approved tools and applications
Analyzing results and summarizing findings
Creating documents and reports as part of IV&V artifacts; including, but not limited to, Security Assessment Plans, Security Assessment Reports, Risk Assessment Reports, and Plan of Action and Milestone (POA&M) documents
Creating standardized documents for higher level review such as Acceptable Risk Report (ARR), security posture summaries, Authority to Operate (ATO) status briefings, SCA/Authorizing Official (AO) Recommendation Memorandums
Conducting code reviews of government off-the-shelf applications utilizing approved tools, such as HP fortify, and providing documents and reports based on analysis
Managing and using for analysis and reporting, the local RMF tool (such as Xacta)
Establishing Standard Operating Procedures, checklists and other desktop procedure documents to facilitate the streamlining of processes and improve validation performance
Systems Administrator
BAI Inc
Alexandria, VA
11.2014 - 05.2015
Support
Remote desktop support for large customer base as needed
Track and route problems and requests, and document resolutions
Update management of recurring problems
Troubleshoot printing and scanning devices including, but not limited to, networked Multifunction Devices (MFD)
Understanding of network essentials, troubleshooting network and cable connectivity
Troubleshooting knowledge of mobile computing devices such as tablet PCs, notebook PCs
Firm working knowledge of Windows 10 and later OSs
Education
A.A - Network Security Management
Stratford University
December 2013
Skills
Active Directory, Remedy
Mobile Devices
Enterprise Directory Services
Active Directory Domain Services
Group Policy Management
OWA and Web Proxy
Windows Server 2012
MS Office 2013, Office 365
MS Office, Communicator
VMWare
RMF
XACTA
EMASS
MS PowerShell
Active Client Agent
Certification
CISM
CompTIA (CASP) CE
CompTIA Security+ CE
Advance Cyber Security
ACAS Certificate
Additional Information
SECURITY CLEARANCE:
, DoD Top Secret
Timeline
Cyber Analyst II
Agile Defense
10.2016 - Current
IA Security Officer, Army Support
Spear Inc
03.2015 - 04.2017
Systems Administrator
BAI Inc
11.2014 - 05.2015
Support
A.A - Network Security Management
Stratford University
CISM
CompTIA (CASP) CE
CompTIA Security+ CE
Advance Cyber Security
ACAS Certificate
Similar Profiles
Laforest CannonLaforest Cannon
Telecommunications Technician at Agile DefenseTelecommunications Technician at Agile Defense