
Insightful Risk Management Framework (RMF) process consultant with years of experience developing and
implementing security solutions in fast-paced environments. Adept in NIST 800-53 Security Control
Assessment with a proven history of delivering exceptional risk management support. Skilled in assembling
authorization packages (SSP, SAR, POA&M) using documents like NIST 800 series, FIPS 199
and FIPS 200, and industry best standards. Seeking a challenging position to contribute to
achieving the organizational security objectives Certified Great skills in patient care. Ability to manage multiple patients and projects simultaneously Excellent communication, writing, people and customer service skills. Good skills in use of computer applications
● Per NIST 800 guidelines develop, review, update, and manage Systems Security Plans (SSP),
Contingency Plans (CP), Privacy Impact Assessments (PIA), and Privacy Threshold Analysis (PTA)
● Monitor controls post-authorization to ensure continuous compliance with the security requirements.
● Effectively communicate with multiple clients to perform POA&M remediation, also handle internal
communications within the Office of Information Security and external communications with several
different divisions daily.
● Determine system categorization level using FIPS 199, NIST 800-60.
● Select security and privacy controls for information systems using NIST 800-53 Rev 2.
● Perform Security Risk Assessment and risk analysis of resources, controls, vulnerabilities, the impact of
losing systems’ capabilities, and threats to the mission objective.
● Create and update Plan of Action and Milestones (POA&M) to monitor and track remediation activities.
● Work independently and as part of a team to continuously monitor the security system, updating artifacts
to ensure compliance with the authorization decisions.
● Review relevant FISMA Compliance SOPs bi-annually and other security documentation such as Risk
and Accountability Response Plan, Access Control, Identification and Authentication, Audit and
Accountability, Configuration Management, etc.
● Perform vulnerability scanning and make sure findings are remediated promptly.
● Participate in activities related to physical security assessments and incidence response tabletop
exercises.