Experienced US Army veteran with TS/SCI clearance with 10 years of hands-on experience in cyber security 4 years of SAP role experience. Seeking to advance career in Cyber Security Information Assurance, eager to tackle new challenges and further hone skills as a cybersecurity professional.
Overview
16
16
years of professional experience
Work History
Information Systems Security Officer
ITI Solutions Inc
10.2024 - Current
Using NIST 800-37 as a guide, assessments and continuous monitoring: Preformed RMF assessment included initiating meetings with various System Owners and Air Force (GS) ISSO, providing guidance of evidence needed for security controls, and documenting findings of assessment.
Performed evaluation of policies, procedures, security scan results, and system settings in order to address controls that were deemed insufficient during Certification and Accreditation, RMF, continuous monitoring.
Reviewed vulnerability scanning as part of assessment and continuous monitoring and provide remediation to system and application administrators.
Reviewed and update POA&Ms, security vulnerabilities and mitigation strategies; and develop security A&A artifacts, to include but not limited to, sensitivity assessments, SSP, and SAR.
Contributed in the development of SSP, incident response plans, and contingency plans.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
Prepare reports on the status of security safeguards applied to computer systems.
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries.
Information Systems Security Officer
CACI
02.2023 - 10.2024
Plan, supervise and conduct testing to confirm continuous efficiency and effectiveness of information systems controls
Managing and using for analysis and reporting, the local RMF tool (eMASS and Xacta)
Creating and reviewing information systems policies, standards and procedures to verify that they address the organization's internal and external requirements.
Provide information systems control status reporting to relevant stakeholders to enable informed decision making
Perform vulnerability assessments scans using Nessus/SCAP against each applicable system. Recommend revisions to security controls and/ or authorizations to operate as appropriate
Design and implement solutions for protecting the confidentiality, integrity, and availability of sensitive information
Conduct audits, technical reviews to identify and mitigate potential security weakness
Advise and assist project teams on compensating control alternatives where IT risk requirements cannot be met
Monitors the threat environment to provide management awareness of current and emerging threats to better inform risk management decisions
Leads risk management activities including planning and conducting assessments to meet objectives
Conduct weekly ACAS scans in support of RMF, vulnerability assessments and queries specifically targeting authorization package assets; support continuous monitoring for authorized packages and report vulnerability status of all active Enterprise Security packages; create asset lists using provided hardware lists.
Performs risk analyses of computer systems and applications during all phases of the system development life cycle using the Assured Compliance Assessment Solution (ACAS) tool.
Conducting the assessment security system needs and provide corrective actions into a coherent security strategy
Review and analyze systems architecture diagrams and networks
Create System Security Plan's (SSP's) and all supporting documentation for all ATO's
Convey knowledge and security focused comprehensive solutions to technically complex systems and challenges
Track and report on POAM&Ms and ensure any identified vulnerabilities are adequately addressed per policy guidelines
Information Security Specialist IV
Kaihonua
08.2020 - 01.2023
Develop, evaluate, and implement information assurance (IA) policies and procedures, and establish operational frameworks for security program installations that prevent unauthorized access to digital and non-digital information assets
Process the training and certification status of all approved installers, in accordance with DoD and Army best practices, SOPs, and installation regulations
Point of contact for all IA operations, including personnel, physical location, communications, hardware, software, and procedures
Monitor the certification and accreditation status of all Automated Indicator Sharing (AIS), and evaluate the need for changes or corrections
Initiate security and technical reviews of all proposed network changes and additions as the IA Policy Management Branch representative on the Technical Review workgroup
Oversaw day-to-day cybersecurity operations, including vulnerability management, information security policies, disaster recovery, regulatory, and compliance areas
Compiled, organized, and analyzed vulnerability reports for five teams using Excel and Tenable Security Center, while automating processes; reduced the management security workload by more than 30%
Updated over 60% of the technical documentation on vulnerability management procedures and exemptions to
ensure the proper completion of vulnerability management processes by team members
Improved information security policies establishing the accuracy of all vulnerability scans and increased the
identification of non-compliant devices across the organization
Drove regulatory and compliance efforts using the DISA framework to confirm all sub-organizations were
compliant, resolving more than 5K tickets from eight months of backlogged work orders
Led a STIGS project focused on the review of all company devices, users, permissions, and credentials, approving
access for more than 25K users
Cyber Security Analyst
Milvets System Technologies INC.
08.2019 - 07.2020
Worked as the IT Specialist, Cybersecurity Compliance/Defense Branch, and Installation Information Assurance
Network Manager (IANM), planning, responding, investigating, and reporting undisclosed classified incident
remediation
Assisted in the administration of an effective Cybersecurity Defense (CSD) program for an Installation providing
CSD advice and assistance as a Cybersecurity SME
Worked with 100 system owners to close IAVMs/ICVMs and open POA&Ms, in accordance with DoD
instructions
Managed Information Assurance Vulnerability Alert (IAVA) security notices and other bulletins requiring
acknowledgment and implementation of specified security measures
Analyzed systems, reviewed security architectures, and developed engineering solutions to proactively manage
information protection and meet integrated information security requirements
Reviewed and validated system security requirement definitions supporting Change Management and Change
Control Board processes
Information Assurance Security Specialist
Trowbridge & Trowbridge, LLC
07.2018 - 07.2019
Utilized knowledge of FISMA and reporting requirements, gaining experience working directly on-site with a DoD
client
Established STIGs and checklists, referring to ATCTS, IA, and security laws, regulations, and policies
Analyzed network assets and individual users to ensure compliance with cybersecurity policies and best practices as a member of the Compliance team
Evaluated the compliance of IT systems through an assessment of vulnerabilities and provided appropriate countermeasures
to ensure newly applied security architectures conformed to enterprise-level security architecture
standards
Supported the DoD Risk Management Framework (RMF) program, the Command Cyber Readiness Inspection
(CCRI), and any other Cybersecurity Inspections
Helpdesk Analyst
TEK Systems, INC.
04.2018 - 06.2018
Installed, maintained, and upgraded Windows desktop and Windows notebook computers, utilizing knowledge of
remote desktop connections, peer-to-peer file sharing, and other applications associated with remote IT assistance
Repaired, upgraded, and completed PC configurations and peripherals, escalated issues to the proper help desk
associate when necessary, and followed up within a timely manner
Documented all inquiry activities in the appropriate REMEDY ticketing system, responding to user inquiries
regarding computer, email, and phone connectivity, software or hardware, and resolving or escalating the problem
Radio Ops Supervisor
United States Army Signal Corps
07.2009 - 03.2018
Supervised installations, operations, and maintenance on manual and automated telecommunications equipment
for multiple computer networks, including a Windows upgrade for over 1K systems
Installed, maintained, and updated computer network planning and automation, and communication interfaces, including the proper interaction with LAN/WAN systems
Established a battalion standard operating procedure for COMSEC; resulted in over 50 transfers to numerous devices without an incident