Summary
Overview
Work History
Education
Skills
Timeline
Generic

Rondell Hamilton

Wetumpka,AL

Summary

Information systems security professional equipped to enhance security posture and protect critical assets. Proven ability to identify vulnerabilities, implement robust security measures, and ensure compliance with industry standards. Demonstrates expertise in risk mitigation and incident response, alongside strong analytical and communication skills.

Overview

14
14
years of professional experience

Work History

Information System Security Officer(ISSO)

Essnova Solutions/Blue Horizon
06.2023 - Current

Provide the detailed knowledge and expertise required to manage the security aspects of an IS. Maintain responsibility for the day-to-day security operations of the system. Responsibilities may also include:

  • Security Control Assessments
  • ATO approval
  • Role based awareness training
  • Patch Management
  • Vulnerability Management
  • Change management
  • Security Incident Management
  • POA&M Management
  • Providing support for implementing and enforcing information systems security policies, standards and procedures
  • Ensure all security controls meet security requirements for all information that will be inputted, stored and transmitted
  • Assisting with preparation, review and updating all documentation
  • Provide support and guidance to the SO/ISSM
  • Develop system security policies and ensure its compliances
  • Prepare Top Secret/Secret SAPs Video Teleconferences(VTCs) for organizational usage

Information System Security Officer(ISSO)

Air Force Cyber College/ 6K Systems
11.2021 - 06.2023
  • Maintained DOD 8570 certification per DOD Manual 8570.1
  • Developed, review, update, and enforce implementation of information security system policies, system security plans (SSP), and security baselines in accordance with FISMA, NIST SP 800-18, OMB and industry best security practices.
  • Conducted periodic reviews for privileged user accounts quarterly IAW with NIST SP 800-53; Security Controls AC-2 Access Control and CM-E(5) Access Restrictions for Change
  • Conducted reviews of security documents updated by the ISSO to ensure FISMA compliance, reviewing and validating of items uploaded into the POA&M tracking tool in support of remediated findings.
  • Researched, prepared, presented, and participated in meetings, reviews, briefings, and video teleconferences(VTC)
  • Archived all completion of security awareness and training records listed in section 8.2 for each user and AF IC Privileged Access Agreement
  • Maintained JWICS switches, taclanes, and 30+ JWICS terminals
  • Reviewed vulnerability scanning as part of assessment and continuous monitoring and provide remediation to system and application administrators.



Instructor Network Security Analyst

22nd Century Technologies
02.2016 - 06.2021
  • Responsible for training and instructing employees in which are able to be evaluated and certified for key Defensive Cyber Operations for the Air Force
  • Detects and responds to Air Force network intrusions
  • Detects and responds to Air Force network intrusions
  • Provide guidance and resolution to issues affecting the mission
  • Ensures crew is trained to accomplish NIPR and SIPR missions and that task qualifications are met
  • Monitored emerging threats and updated defensive strategies accordingly, maintaining a proactive security posture.

Network Security Analyst

Computer Science Corporation, CSC
07.2013 - 02.2016
  • Assisted with the security of Air Force networks by providing uninterrupted network confidentiality for the Air Force
  • Conducted network monitoring and intrusion detection analysis
  • Performed duties as real-time analyst looking and verifying at alerts generated in real-time from network traffic believed to be either malicious or unauthorized


Network Analyst

Computer Sciences Corporation/ 26 NOS
07.2013 - 02.2016
  • Assisted with the security of Air Force networks by providing uninterrupted network confidentiality for the Air Force
  • Conducted network monitoring and intrusion detection analysis
  • Performed duties as real-time analyst looking and verifying at alerts generated in real-time from network traffic believed to be either malicious or unauthorized

Network Support Technician/Site Lead

Abacus Solutions Group
05.2011 - 06.2013
  • Supported end-users by providing prompt technical assistance, enhancing overall satisfaction levels
  • Supported users both local and by phone with problem resolution and education
  • Logged, resolved and escalated on-site and off-site issues
  • Provide telephone technical support

Education

Bachelor of Science - Computer Information Systems

Alabama State University
Montgomery, AL
05-2008

Skills

  • Microsoft Office Suite
  • SIEM management
  • Threat intelligence
  • Wireshark software
  • Analytical skills
  • Documentation
  • Risk Traceability Matrix
  • NIST SP 800 series
  • FISMA
  • Plan of Action & Milestones
  • Incident and Contingency planning
  • FedRamp Compliance
  • ServiceNow
  • Internet/Software Applications
  • Excel
  • Nessus
  • Webinspect
  • Sharepoint/ OneDrive
  • Vulnerability assessment
  • ArcSight Console
  • NIPRnet & SIPRnet systems
  • Intrusion Detection System
  • Intrusion Prevention System
  • Security policy development
  • Access control

Timeline

Information System Security Officer(ISSO)

Essnova Solutions/Blue Horizon
06.2023 - Current

Information System Security Officer(ISSO)

Air Force Cyber College/ 6K Systems
11.2021 - 06.2023

Instructor Network Security Analyst

22nd Century Technologies
02.2016 - 06.2021

Network Security Analyst

Computer Science Corporation, CSC
07.2013 - 02.2016

Network Analyst

Computer Sciences Corporation/ 26 NOS
07.2013 - 02.2016

Network Support Technician/Site Lead

Abacus Solutions Group
05.2011 - 06.2013

Bachelor of Science - Computer Information Systems

Alabama State University
Rondell Hamilton