Summary
Overview
Work History
Education
Skills
Accomplishments
Additional Information
Certification
Timeline
Generic

Joy Ihuoma

Brandywine ,MD

Summary

Experienced Information System Security Officer with years of experience maintaining, reviewing, and updating information security system documentations, to include but not limited to System Security Plan (SSP), Plan of Action & Milestone (POA&M), Contingency Plan (CP), Incident Response Plan (IR) in accordance with NIST guideline and security practices. Experienced with NIST 800 SPs series such as NIST SP 800 -18, 800-30, 800-37, 800-53 & 53A, 800-60, and FIPS 199/200.

Overview

5
5
years of professional experience
1
1
Certification

Work History

Information System Security Specialist

NTT Data
05.2023 - Current
  • Minimized risk and ensured business continuity with a System Impact Analysis (SIA), which helps organizations evaluate and protect technologies that are critical to operations.
  • Develop and maintain Authorization to Operate (ATO) package for information systems, review existing security artifacts to ensure they comply with organization’s information security requirements and make recommendations for mitigation
  • Develop and provide input on existing documentation in compliance with security policies and agency guidance including FISMA and NIST special publications
  • Conduct Assessment and Authorization (A&A) package for General Support System and Major application using the NIST Risk Management Framework (RMF) to ensure compliance with the Federal Information Security Management Act (FISMA)
  • Maintain, review and update Information Security System documentations, includes but not limited to System Security Plan (SSP), Contingency Plan (CP), Incident Response Plan (IRP), Plan of Action & Milestone (POA&M), Privacy Threshold Analysis (PTA), Privacy Impact Assessment.
  • Recommend improvements in security systems and procedures.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Knowledge of several computer environments: performed updates, install, configure, evaluation and guidance on security controls implementation on multiple environments that includes Windows server, window Xp, Redhat 6/7 and Centos 6/7.
  • Managed communication efforts throughout the entire project lifecycle to ensure consistent messaging across all levels of the organization.
  • Conducted regular audits of equipment inventory, minimizing discrepancies and loss.
  • Enhanced team collaboration by providing clear communication of complex findings through visualizations and reports.

Linux Administrator /Information Security Analyst

CACI
05.2020 - 12.2023
  • Assigned issues to appropriate support group for thorough support and prompt resolution
  • Installing, administering Red Hat using KVM and VMware ESXi hypervisors
  • RPM and YUM package
  • Support 24/7 high availability production servers
  • Created and managed user accounts, security, rights, disk space and process monitoring in RedHat Linux
  • Configure and install RHEL and CentOS Linux servers on both virtual machines and bare metal
  • Install Apache 2.4.x Web Server and configure vHosts on Apache Web Server and supporting
  • Setup Linux servers for LAMP implementations and readiness
  • Created user, manage user permissions, and maintain users on Linux servers
  • Troubleshoot day-to-day system and user problems, escalation support, providing support to customers via BMC Remedy ticketing system and/or phone for Linux servers.
  • Managed backup and disaster recovery through strict data control and retention policies, personally handling recovery tasks when issues arose.
  • Installed and configured network printers and other peripheral devices.
  • Interacted directly with users to diagnose and correct major system issues and address concerns.
  • Tuned system performance to optimize efficacy of new and existing hardware components.

Education

B.Sc. - Cybersecurity, Information System

Strayer University

Skills

  • NIST Security Standards
  • Active Listening
  • Critical Thinking
  • Identifying Risks
  • Risk System
  • Risk Mitigation Plans
  • Tenable Nessus
  • Risk Management Assessments
  • Vulnerability Analysis
  • Network Security Management
  • Multi-Factor Authentication
  • Information Confidentiality
  • Stakeholder Rapport
  • Monitoring Computer Viruses
  • Security Maintenance

Accomplishments

  • Resolved product issue through consumer testing.

Additional Information

  • SECURITY CLEARANCE Secret Clearance

Certification

ITIL

CompTIA linux +

Timeline

Information System Security Specialist

NTT Data
05.2023 - Current

Linux Administrator /Information Security Analyst

CACI
05.2020 - 12.2023

B.Sc. - Cybersecurity, Information System

Strayer University
Joy Ihuoma