Summary
Overview
Work History
Education
Skills
Websites
Personal Information
Timeline
Generic

Marquis Samuels

Converse,USA

Summary

Experienced US Army veteran with TS/SCI clearance with 10 years of hands-on experience in cyber security 4 years of SAP role experience. Seeking to advance career in Cyber Security Information Assurance, eager to tackle new challenges and further hone skills as a cybersecurity professional.

Overview

16
16
years of professional experience

Work History

Information Systems Security Officer

ITI Solutions Inc
10.2024 - Current
  • Using NIST 800-37 as a guide, assessments and continuous monitoring: Preformed RMF assessment included initiating meetings with various System Owners and Air Force (GS) ISSO, providing guidance of evidence needed for security controls, and documenting findings of assessment.
  • Performed evaluation of policies, procedures, security scan results, and system settings in order to address controls that were deemed insufficient during Certification and Accreditation, RMF, continuous monitoring.
  • Reviewed vulnerability scanning as part of assessment and continuous monitoring and provide remediation to system and application administrators.
  • Reviewed and update POA&Ms, security vulnerabilities and mitigation strategies; and develop security A&A artifacts, to include but not limited to, sensitivity assessments, SSP, and SAR.
  • Contributed in the development of SSP, incident response plans, and contingency plans.
  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
  • Ensure audit records are collected, reviewed, and documented (to include any anomalies).
  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
  • Prepare reports on the status of security safeguards applied to computer systems.
  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries.

Information Systems Security Officer

CACI
02.2023 - 10.2024
  • Plan, supervise and conduct testing to confirm continuous efficiency and effectiveness of information systems controls
  • Managing and using for analysis and reporting, the local RMF tool (eMASS and Xacta)
  • Creating and reviewing information systems policies, standards and procedures to verify that they address the organization's internal and external requirements.
  • Provide information systems control status reporting to relevant stakeholders to enable informed decision making
  • Perform vulnerability assessments scans using Nessus/SCAP against each applicable system. Recommend revisions to security controls and/ or authorizations to operate as appropriate
  • Design and implement solutions for protecting the confidentiality, integrity, and availability of sensitive information
  • Conduct audits, technical reviews to identify and mitigate potential security weakness
  • Advise and assist project teams on compensating control alternatives where IT risk requirements cannot be met
  • Monitors the threat environment to provide management awareness of current and emerging threats to better inform risk management decisions
  • Leads risk management activities including planning and conducting assessments to meet objectives
  • Conduct weekly ACAS scans in support of RMF, vulnerability assessments and queries specifically targeting authorization package assets; support continuous monitoring for authorized packages and report vulnerability status of all active Enterprise Security packages; create asset lists using provided hardware lists.
  • Performs risk analyses of computer systems and applications during all phases of the system development life cycle using the Assured Compliance Assessment Solution (ACAS) tool.
  • Conducting the assessment security system needs and provide corrective actions into a coherent security strategy
  • Review and analyze systems architecture diagrams and networks
  • Create System Security Plan's (SSP's) and all supporting documentation for all ATO's
  • Convey knowledge and security focused comprehensive solutions to technically complex systems and challenges
  • Track and report on POAM&Ms and ensure any identified vulnerabilities are adequately addressed per policy guidelines

Information Security Specialist IV

Kaihonua
08.2020 - 01.2023
  • Develop, evaluate, and implement information assurance (IA) policies and procedures, and establish operational frameworks for security program installations that prevent unauthorized access to digital and non-digital information assets
  • Process the training and certification status of all approved installers, in accordance with DoD and Army best practices, SOPs, and installation regulations
  • Point of contact for all IA operations, including personnel, physical location, communications, hardware, software, and procedures
  • Monitor the certification and accreditation status of all Automated Indicator Sharing (AIS), and evaluate the need for changes or corrections
  • Initiate security and technical reviews of all proposed network changes and additions as the IA Policy Management Branch representative on the Technical Review workgroup
  • Oversaw day-to-day cybersecurity operations, including vulnerability management, information security policies, disaster recovery, regulatory, and compliance areas
  • Compiled, organized, and analyzed vulnerability reports for five teams using Excel and Tenable Security Center, while automating processes; reduced the management security workload by more than 30%
  • Updated over 60% of the technical documentation on vulnerability management procedures and exemptions to
    ensure the proper completion of vulnerability management processes by team members
  • Improved information security policies establishing the accuracy of all vulnerability scans and increased the
    identification of non-compliant devices across the organization
  • Drove regulatory and compliance efforts using the DISA framework to confirm all sub-organizations were
    compliant, resolving more than 5K tickets from eight months of backlogged work orders
  • Led a STIGS project focused on the review of all company devices, users, permissions, and credentials, approving
    access for more than 25K users

Cyber Security Analyst

Milvets System Technologies INC.
08.2019 - 07.2020
  • Worked as the IT Specialist, Cybersecurity Compliance/Defense Branch, and Installation Information Assurance
    Network Manager (IANM), planning, responding, investigating, and reporting undisclosed classified incident
    remediation
  • Assisted in the administration of an effective Cybersecurity Defense (CSD) program for an Installation providing
    CSD advice and assistance as a Cybersecurity SME
  • Worked with 100 system owners to close IAVMs/ICVMs and open POA&Ms, in accordance with DoD
    instructions
  • Managed Information Assurance Vulnerability Alert (IAVA) security notices and other bulletins requiring
    acknowledgment and implementation of specified security measures
  • Analyzed systems, reviewed security architectures, and developed engineering solutions to proactively manage
    information protection and meet integrated information security requirements
  • Reviewed and validated system security requirement definitions supporting Change Management and Change
    Control Board processes

Information Assurance Security Specialist

Trowbridge & Trowbridge, LLC
07.2018 - 07.2019
  • Utilized knowledge of FISMA and reporting requirements, gaining experience working directly on-site with a DoD
    client
  • Established STIGs and checklists, referring to ATCTS, IA, and security laws, regulations, and policies
  • Analyzed network assets and individual users to ensure compliance with cybersecurity policies and best practices as a member of the Compliance team
  • Evaluated the compliance of IT systems through an assessment of vulnerabilities and provided appropriate countermeasures
    to ensure newly applied security architectures conformed to enterprise-level security architecture
    standards
  • Supported the DoD Risk Management Framework (RMF) program, the Command Cyber Readiness Inspection
    (CCRI), and any other Cybersecurity Inspections

Helpdesk Analyst

TEK Systems, INC.
04.2018 - 06.2018
  • Installed, maintained, and upgraded Windows desktop and Windows notebook computers, utilizing knowledge of
    remote desktop connections, peer-to-peer file sharing, and other applications associated with remote IT assistance
  • Repaired, upgraded, and completed PC configurations and peripherals, escalated issues to the proper help desk
    associate when necessary, and followed up within a timely manner
  • Documented all inquiry activities in the appropriate REMEDY ticketing system, responding to user inquiries
    regarding computer, email, and phone connectivity, software or hardware, and resolving or escalating the problem

Radio Ops Supervisor

United States Army Signal Corps
07.2009 - 03.2018
  • Supervised installations, operations, and maintenance on manual and automated telecommunications equipment
    for multiple computer networks, including a Windows upgrade for over 1K systems
  • Installed, maintained, and updated computer network planning and automation, and communication interfaces, including the proper interaction with LAN/WAN systems
  • Established a battalion standard operating procedure for COMSEC; resulted in over 50 transfers to numerous devices without an incident

Education

Associates - Information Technology

Carolina Career College
Durham, NC
06.2019

Associates - Information Technology

Keiser University
Fort Lauderdale, FL
02.2019

No Degree -

Memorial High School
Port Arthur, TX
06.2009

Skills

  • CASP
  • SEC
  • CCNA
  • ITIL v3
  • SCAP
  • HBSS
  • NET
  • STIGS
  • Active Directory
  • eMASSter
  • Assured Compliance Assessment Solution (ACAS)
  • SharePoint
  • MS Office Suite
  • Nessus
  • (Tenablesc)
  • Xacta
  • eMASS
  • PC Configuration Vulnerabilities Assessment

Personal Information

Title: Information Security System Officer

Timeline

Information Systems Security Officer

ITI Solutions Inc
10.2024 - Current

Information Systems Security Officer

CACI
02.2023 - 10.2024

Information Security Specialist IV

Kaihonua
08.2020 - 01.2023

Cyber Security Analyst

Milvets System Technologies INC.
08.2019 - 07.2020

Information Assurance Security Specialist

Trowbridge & Trowbridge, LLC
07.2018 - 07.2019

Helpdesk Analyst

TEK Systems, INC.
04.2018 - 06.2018

Radio Ops Supervisor

United States Army Signal Corps
07.2009 - 03.2018

Associates - Information Technology

Keiser University

Associates - Information Technology

Carolina Career College

No Degree -

Memorial High School