Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

USIFU KOROMA

Lanham,MD

Summary

Ensures customer satisfaction with IT support, broadcasting engineering, and network security. Current aspirations include the information technology field to include networking concepts, system administrations and cybersecurity. Demonstrating high sense of responsibility and devotion to duty. Possesses and demonstrates a professional demeanor in all aspects of performance.

Clearance Level: Active Secret, Willing to obtain Top Secret

Overview

8
8
years of professional experience
1
1
Certification

Work History

Information Security Analyst

Kyndryl
New York, NY
05.2022 - 06.2023
  • Configured hardware, devices and software to set up work stations for employee
  • Prepared documentation and records for upcoming audits and inspections.
  • Assisted investigation and risk management teams with fraud investigations and risk identification.
  • Developed improvement and corrective action plans to bring operations in line with requirements.
  • Supported and trained customers on compliance-related issues.
  • Helped create training programs to handle system-wide issues and maintain compliance.
  • Documented noncompliance activities and communicated with design-builder on remediation.
  • Wrote, reviewed and interpreted contract documents.
  • Documented daily inspection activities by taking photos and filling out inspection reports.
  • Enforced compliance with complex state and federal laws, rules and regulations for industry.
  • Communicated materials documentation deficiencies to project engineer, project staff and design-builder.
  • Directed activities of workers searching records and provided technical guidance as necessary.
  • Completed field checks to verify licenses and permits for various business.
  • Identified gaps in existing compliance processes and recommended updates.
  • Developed and implemented corrective action plans for non-compliance issues.
  • Patched software and installed new versions to eliminate security problems and protect data.
  • execute information technology (IT) program life-cycle management processes to meet mission plans and goals.
  • document software design modification for an information technology (IT) program You will write complex Performance Work Statements and cost estimates for a large, complex IT acquisition.
  • Troubleshooting issues with Adobe and Exchange Email Strong Experience troubleshooting Network Connectivity issues.
  • Apply metrics to monitor performance and measure key project criteria
  • Participate in special studies and stay current on emerging tools, techniques, and technologies
  • Establish and maintain security, integrity, and business continuity controls and documents
  • Resolve any issues with mobile devices (incorrect PIN, password, e-mail not syncing, etc.) by performing basic troubleshooting prior to placing a trouble call with DONCIO ITD ticketing system
  • Supported IT services for NAVSEA, CNIC, NAVFAC and multiple other navy commands.
  • troubleshooting hardware and replacing parts for Laptops and Desktops Strong knowledge of circuit boards, processors, electronic equipment and computer hardware and software.
  • Confirm and prioritize project plans and deliverables with the customer
  • Assist information engineers in coding, testing, implementation, and documentation projects.
  • Monitored use of data files and regulated access to protect secure information.
  • Conducted security audits to identify vulnerabilities.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Executed penetration testing to identify security weaknesses and develop disaster recovery plans.
  • Educated and trained users on information security policies and procedures.
  • Developed, tested and implemented security policies, plans and procedures for organizational protection.
  • Drafted security reports and metrics to track security performance and strategize improvements.
  • Analyzed network traffic and system logs to detect malicious activities.
  • Investigated and resolved incidents of unauthorized access to sensitive information.
  • Implemented security measures to reduce threats and damage related to cyber attacks.
  • Researched and developed new computer forensic tools.
  • Reviewed violations of computer security procedures and developed mitigation plans.
  • Engineered, maintained and repaired security systems and programmable logic controls.
  • Worked with other teams to enforce security of applications and systems.
  • Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
  • Encrypted data and erected firewalls to protect confidential information.
  • Recommend improvements in security systems and procedures.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Worked well in a team setting, providing support and guidance.

Security Controls Assessor

Experis
Milwaukee, WI
05.2022 - 06.2023
  • · Develop Security Assessment Plans (SAPs) and Conduct an assessment of security control selections on various Moderate impact level systems to ensure compliance with the NIST SP 800-53A Rev 4 Conduct security control interview meetings and Artifact gathering meetings with various stakeholders using assessment methods of interview, examination, and testing
  • · Customized audit plans to address significant high-risk areas and improve cost structure by 10%; partnered with the Audit committee of Board and Executive Management for operational improvements
  • · Create a Requirement Traceability Matrix (RTM) by citing whether controls assessed effectively passed or failed under the NIST SP 800-53A guideline
  • Review A&A package items using NIST guidance for FISM compliance such as FIPS 199 Categorization, e-Authentication Assessment, PTA, PIA, contingency Plan (CP) and contingency Plan Test (CPT) and executed vulnerabilities assessment of identified risks and provide recommendations based on findings and risk level presented
  • · Document assessment findings in a Security Assessment Report (SAR) and recommend remediation actions for controls that failed and vulnerabilities
  • · Conduct interviews, assess operational needs, and check artifacts to determine that system's security posture to develop a Security Assessment Report (SAR) and meet accreditation requirements
  • · Schedule kick-off meetings with system owners to help identify the assessment scope, system boundary, and the information system's category and attain any artifacts needed in conducting the assessment

IT Specialist

Adventist Health Care
Rockville, MD
01.2015 - 05.2022
  • Responded to support requests from end-users and patiently walked individuals through basic troubleshooting tasks.
  • Patched software and installed new versions to eliminate security problems and protect data.
  • Explained technical information in clear terms to non-technical individuals to promote better understanding.
  • Configured hardware, devices, and software to set up workstations for employees.
  • Monitored systems in operation and input commands to troubleshoot areas.
  • Maintained servers and systems to keep networks fully operational during peak periods.
  • Performed server backups and changed and replaced backup tapes daily.
  • Suggested software and hardware modifications to reduce lag time and improve overall speed.
  • Rolled out software updates and applied server patches to thwart threats from penetrating networks.
  • Collaborated with vendors to locate replacement components and resolve advanced problems.
  • Walked individuals through basic troubleshooting tasks.
  • Explained technical information in clear terms to promote better understanding for non-technical users.
  • Monitored systems in operation and quickly troubleshot errors.
  • Managed high levels of call flow and responded to technical support needs.
  • Translated complex technical issues into digestible language for non-technical users.
  • Used ticketing systems to manage and process support actions and requests.
  • Assisted customers in identifying issues and explained solutions to restore service and functionality.
  • Collaborated with supervisors to escalate and address customer inquiries or technical issues.
  • Resolved diverse range of technical issues across multiple systems and applications for customers and end-users across various time zones.
  • Explained security measures in simple terminology to help users understand malware and phishing threats.
  • Assisted with updating technical support best practices for use by the team.
  • Documented support interactions for future reference.
  • Responded promptly to incoming sales leads and requests for technical support.
  • Researched product and issue resolution tactics to address customer concerns.
  • Configured hardware and granted system permissions to new employees.

Education

Associate of Applied Science - Information Technology

Lincoln College of Technology
05.2015

Skills

  • Networking Concepts: OSI and TCP/IP Model
  • Fiber Optics
  • Operating Systems: MacOS, Windows and Linux
  • Protocols: IP, UDP, TCP, HTTP, SMTP, DHCP
  • Configuring Software
  • Hardware: Reimaging Machines, Rebranding and Installing motherboards, Decrypting Hard Drives
  • Active Directory: Group Policy, Account Management, Windows and 3rd party patches, Assign licenses
  • Compliance Frameworks: FedRAMP, FISMA, HIPPAA, PCI-DSS, NIST and ISO 27000
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Identify, analyze, and respond to security events and incidents
  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
  • Ticketing Systems: HP Service Manager, Remedy and Service Now
  • O365: Teams, Excel, Outlook, Sharepoint and PowerBi
  • Cloud Services: Amazon Web Services and Microsoft Azure
  • Software: Trelix, ActivClient, Tanium, Intune, MECM, Microsoft Defender, Pulse Secure, Cisco VPN, SCCM
  • Providing support for high level executives

Certification

  • CompTIA Security + 601
  • CISA and DoD Cyber Training
  • Pursuing Microsoft Azure Fundamentals

Timeline

Information Security Analyst

Kyndryl
05.2022 - 06.2023

Security Controls Assessor

Experis
05.2022 - 06.2023

IT Specialist

Adventist Health Care
01.2015 - 05.2022

Associate of Applied Science - Information Technology

Lincoln College of Technology
USIFU KOROMA