Summary
Overview
Work History
Education
Skills
Certification
Additional Information
Timeline
Generic

GAIL JAMISON

STAFFORD,VA

Summary

A team player seeking a full-time position with the ability for continued growth in the IT profession. Dedicated to providing prompt and efficient customer service.

Overview

9
9
years of professional experience
1
1
Certification

Work History

Cyber Analyst II

Agile Defense
Quantico, VA
10.2016 - Current
  • Provide a detailed description of the vulnerability and its impact on the system/application/network
  • Include information such as how the vulnerability was exploited or could potentially be exploited, the potential consequences of exploitation, and any specific areas or functionalities that were affected
  • Mitigate vulnerability, such as temporarily disabling affected functionality, implementing access controls, or isolating affected systems from the network
  • Conducting vulnerability scans and recognizing vulnerabilities in security systems
  • Describe the measures taken to address the vulnerability permanently, such as software patches, configuration changes, or infrastructure upgrades
  • Include details about testing procedures, change management processes, and any dependencies or risks associated with the fixes
  • Provide information on any additional steps taken after the vulnerability was mitigated, such as system monitoring, user awareness training, or security enhancements
  • Ensure RMF artifacts are complying
  • Collect and collate system or site information and use it to evaluate and document in Enterprise Mission Assurance Support Service (EMASS) the security posture of the Propulsion, Power, & Auxiliary Machinery systems and subsystems being Assessed, Authorized, and maintained
  • Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation
  • ScienceLogic Ticketing System for Vulnerabilities to track and updates
  • Determine a system’s compliance with all applicable Controls and Assessment Procedures
  • Track deliverables and action items in accordance with A&A guidance
  • Identify systemic security issues based on the analysis of vulnerability and configuration data
  • Developing insights about the context of an organization’s threat environment
  • Summarize the incident report by emphasizing the successful mitigation of the vulnerability, the lessons learned from the incident, and any recommendations for future prevention or detection of similar vulnerabilities.

IA Security Officer, Army Support

Spear Inc
Herndon, VA
03.2015 - 04.2017
  • Supporting execution of RMF IV&V events utilizing DoD approved tools and applications
  • Analyzing results and summarizing findings
  • Creating documents and reports as part of IV&V artifacts; including, but not limited to, Security Assessment Plans, Security Assessment Reports, Risk Assessment Reports, and Plan of Action and Milestone (POA&M) documents
  • Creating standardized documents for higher level review such as Acceptable Risk Report (ARR), security posture summaries, Authority to Operate (ATO) status briefings, SCA/Authorizing Official (AO) Recommendation Memorandums
  • Conducting code reviews of government off-the-shelf applications utilizing approved tools, such as HP fortify, and providing documents and reports based on analysis
  • Managing and using for analysis and reporting, the local RMF tool (such as Xacta)
  • Establishing Standard Operating Procedures, checklists and other desktop procedure documents to facilitate the streamlining of processes and improve validation performance

Systems Administrator

BAI Inc
Alexandria, VA
11.2014 - 05.2015

Support

  • Remote desktop support for large customer base as needed
  • Track and route problems and requests, and document resolutions
  • Update management of recurring problems
  • Troubleshoot printing and scanning devices including, but not limited to, networked Multifunction Devices (MFD)
  • Understanding of network essentials, troubleshooting network and cable connectivity
  • Troubleshooting knowledge of mobile computing devices such as tablet PCs, notebook PCs
  • Firm working knowledge of Windows 10 and later OSs

Education

A.A - Network Security Management

Stratford University
December 2013

Skills

  • Active Directory, Remedy
  • Mobile Devices
  • Enterprise Directory Services
  • Active Directory Domain Services
  • Group Policy Management
  • OWA and Web Proxy
  • Windows Server 2012
  • MS Office 2013, Office 365
  • MS Office, Communicator
  • VMWare
  • RMF
  • XACTA
  • EMASS
  • MS PowerShell
  • Active Client Agent

Certification

  • CISM
  • CompTIA (CASP) CE
  • CompTIA Security+ CE
  • Advance Cyber Security
  • ACAS Certificate

Additional Information

  • SECURITY CLEARANCE: , DoD Top Secret

Timeline

Cyber Analyst II

Agile Defense
10.2016 - Current

IA Security Officer, Army Support

Spear Inc
03.2015 - 04.2017

Systems Administrator

BAI Inc
11.2014 - 05.2015

Support

A.A - Network Security Management

Stratford University
  • CISM
  • CompTIA (CASP) CE
  • CompTIA Security+ CE
  • Advance Cyber Security
  • ACAS Certificate
GAIL JAMISON