Summary
Overview
Work History
Education
Skills
References
Timeline
Generic

VONDA BUSH

Arlington,VA

Summary

A motivated IT professional with an active TS/SCI clearance with 20 years of technical professional and educational hands on progressive training and experience with a long-term goal for a senior management position managing personnel. Experienced in leading and directing employees, with a proven record of accomplishment with problem resolution through data analytics to present findings and issue recommendations at an executive level. Exemplary customers service skills and etiquette at various. Exceptional team building traits fostering superb management skills with a passion for mission accomplishment and customer satisfaction. Organized and dependable candidate successful at managing multiple priorities with a positive attitude. Willingness to take on added responsibilities to meet team goals. Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.

Overview

25
25
years of professional experience

Work History

Information Systems Security Officer

US State Department Bureau of Consular Affairs
03.2014 - Current
  • Assist over 33 contractors in guidance of applications, patches and database systems for security enhancement to enable deployment for production to consulates and embassies around the world.
  • Address Plans of Actions & Milestones that exist concerning findings and how it affects the ATO's of systems.
  • Monitor systems with detection tools that categorize anomalies and vulnerabilities detected within the organization's workstations, servers, applications and data systems within the network.
  • Track patches, antivirus updates, SMS, SCR aspects of vulnerability and remediation concepts
  • Collectively assist GTMs and Sys Admins as over site concerning security issues on any project that effects the Consular of Affairs mission.
  • Advise best security practices and research innovative technology for the agency to prevent hackers, viruses and anomalies of all kinds in efforts to minimize the possibilities of infiltrating the network.
  • Investigate instances in which policies and guidelines are not followed by the user(s) and report and remediate such instances to ensure proper protocol is followed on a case by case criteria.
  • Monitor iPost anomalies and vulnerabilities for CA domestic sites for Passport agencies,contractor sites and applications.
  • Approve and Disapprove requests for all type of admin accounts: DMZ/DOMAIN ADMIN/ CA ADMIN/ Cyber Ark and service accounts.
  • Monitor badging access requests and assist when complications arise for access.
  • Developed comprehensive security policies, procedures, and training materials to strengthen organizational security posture.
  • Ensured business continuity by developing disaster recovery plans and conducting regular testing exercises.
  • Reduced exposure to cyber threats by proactively monitoring the threat landscape for new risks or changes in tactics from adversaries.
  • Streamlined vulnerability management by automating scanning, reporting, and remediation tasks.
  • Designed secure networks by applying defense-in-depth principles that minimized attack surfaces while maintaining usability requirements for end users.
  • Collaborated with IT teams to integrate security best practices into system development and operations.
  • Conducted regular risk assessments for proactive identification and mitigation of potential vulnerabilities.
  • Managed incident response processes, ensuring timely resolution and minimal business impact.
  • Contributed towards reducing overall enterprise risk by consistently analyzing and refining the organization''s risk appetite and tolerance levels.
  • Increased user awareness through targeted cybersecurity training programs tailored to employee roles.
  • Enhanced network security by implementing robust threat detection and prevention systems.
  • Established effective communication channels between cross-functional departments to facilitate prompt exchange of relevant cybersecurity information.
  • Evaluated emerging technologies and made recommendations for strategic investments in information security tools and resources.
  • Performed forensic investigations following incidents to identify root causes, assess damage, and recommend appropriate mitigations or improvements in processes or tools.
  • Conducted security audits to identify vulnerabilities.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Recommend improvements in security systems and procedures.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Reviewed violations of computer security procedures and developed mitigation plans.
  • Encrypted data and erected firewalls to protect confidential information.
  • Inspect Sites and ensure awareness of Policies and Procedures that are being followed according to NIST/FAM and FAH guidelines and regulations
  • Update Contingency Plans and Disaster Recovery Procedures
  • Issue out Locks and ensure SF 700/701 and 702's are completed with security compliance/ end of day check and safe opening and closure checks.

Information Systems Security Officer

US Navy "Mesa Verde Ship -LPD 19"
02.2010 - 03.2013
  • Information Assurance Manager/ISSO/Information Technologist /Help Desk Supervisor/Information Assurance Vulnerability Assessment (IAVA) reporting,Information Security Awareness training, PKI migration, configuration changes, anti-virus protection deployment, firewall log review and reporting, vulnerability assessment , risk management and continuous monitoring mitigation
  • Responsible for new installation and training for implementation of 100 CAC readers and software for over 300 personnel onboard ship
  • Obtained an additional 200 CAC readers to install allowing all personnel access to vital websites with no additional cost to the command through utilization of resources, networking and effective communication
  • Upgraded Unclassified and Classified computers throughout the command to include 8 servers -for equipment valued up to Over $400,000 and maintained quality assurance and coordination of upgrade
  • Created a customer help desk tracking log that increased customer service productivity by over 45 percent which decreased customer support delays by over 80 percent and assisted with detecting trends that effected the system health of servers which circumvented server degradation and allowed technicians to become proactive in system maintenance and analysis
  • Monitored VERITAS backups for Microsoft Exchange Server(s)
  • Developed hardware, software applications and maintained licenses
  • Created design architecture of the network topology
  • Implement and monitored all levels of classification for systems in accordance with DoD guidelines
  • Establish IA policies and guideline consistent with DoD directives concerning ports, protocol management, vulnerability management, biometrics, security management, IA education and training, mobile code and interconnection between domains
  • Provide IA support to DoD components as required to assess the threats and vulnerabilities of components of Information technologies.

Work Center Supervisor Information Technician

US Navy - CTF57 (Command Task Force Unit)
12.2009 - 03.2010
  • Maintained Video Teleconferences and establish the communications through loading the crypto for top officials on a Globally level- with pertinent time stamps with 98 percent effect communications 2 percent disreputability/100 percent efficient trouble shooting techniques and re-connectivity
  • Secure Voice Over IP Phones - Administrator for troubleshooting discrepancies with connectivity
  • Monitored and maintained surveillance and communications on the watch floor with other units in the field abroad
  • Messaging Center Administrator- helped maintain successful message traffic for command which is essential in assisting in carrying out the command's mission
  • 24/7 message processing
  • Create the command's watch schedule and ensure all personnel adhere to their assigned watches for CTF57 Command Task Force Unit in Bahrain with special operations.
  • Crypto Management

System Administrator/Network Tech/DoDIIS Instructor

US Navy - European Service Command/DIA
02.2005 - 12.2009
  • Joint Duty Assignment at DoD level providing intelligence products and services to US War fighters, senior military leaders and civilian defense lead in support of military operations
  • Trained 300 personnel on a new system, DoDIIS, increased productivity by 400% with a 100% effective training rate and reduced account creation process for customers by 60%
  • Worked cohesively with contractor engineers with weekend scheduled maintenance of all systems Windows and Oracle based
  • Responsible for successfully installing 30 new required Linux based systems
  • Assist with world-wide global help desk
  • Conduct daily system administrative tasks on the network through active directory and respond to trouble calls and requests.

System Administrator/Assistant Squadron Duty Officer

US Navy- VS22 Squadron
01.2001 - 11.2009
  • HetDeveloped and maintained computer hardware, software applications and licenses
  • Create design architecture of the network topology as it exists in the environment in the command. Implement and monitor levels of classification for all systems in accordance with D0D guidelines
  • Design mitigation plan for possible degradation of system services
  • Validate appropriate documents through Designated Approving Authority to ensure the command receives Authority to Operate - maintain IATO while procedure is in process of being established
  • Inspection and validation process takes approximately 6 months- licenses are good for approximately 2 years
  • Administrative procedural documentation and paperwork is maintained, managed and updated to the Information Systems Security Officer and the Network Security Officer
  • Develop command presentations and training instruction for all personnel entering the command on policies and procedures concerning network security and Information Security
  • Additionally, periodically re-iterate command wide training of information assurance awareness
  • Provide everyday guidance and assistance with user(s) questions concerning emails, spam, computer phishing and anti-virus malware concerns- providing solutions and answers to technical computer issues
  • Utilize manpower by training, appointing and initiated designation in writing of 15 command TASO's (Terminal Areas Security Officers) to assist with minor administrative duties to minimize trouble calls and directly assist with departmental computer task and technical issues
  • Increased command productivity by 50% to help maintain command readiness for mission critical evolutions
  • Provide information assurance support to DoD components as required to assess the threats to the vulnerabilities of components of information technologies
  • Generated a web based resource that accesses current D0D and Federal IA and IA related policy guidance and guidelines
  • Conduct monitoring and develop risk assessments to detect, isolate and react to active penetration and testing to isolate intrusions and disruption of service
  • Establish IA policies and guidelines consistent with DoD directives concerning ports, protocol management, vulnerability management, biometrics, security management, IA education and training, mobile code and interconnection between domains
  • Maintained digital forensics investigations by monitoring and scanning all personal drives on the network and the network share drive
  • Utilized the Internet Security Acceleration Server to can for unauthorized use of un-prohibited web sites as documented by command policy and DoD guidelines as advised by the "Black List"
  • Evidence is researched and validated as being un-authorized and sent to the Network Security Officer to block from the firewall
  • Evidence is maintained in a secure location
  • Information is passed up the chain to higher authorities to decide punishment and prosecution as applicable
  • Utilization of Host Based Security System and secure Configuration Compliance Validation Initiative VRAM Retina to conduct scans on the network and validate patching
  • Scans to detect USB, IPOD, IPAD, MP3 or attachment of unauthorized cameras or electronic devices to government computers.

MESSAGE CENTER TECHNICIAN/TECH CONTROL OPERATOR

NAVAL OCEAN PROCESSING FACILITY (NOPF)
01.1999 - 02.2001
  • Maintain 12 hour watches on the watch floor consistent with 24/7 message traffic monitoring
  • Maintain crypto feeds and VTC
  • Continuous ship to shore communications through GCCS
  • OTAT and OTAR communications
  • Maintain consistent Radioman duties/ LAN administrative duties and capabilities
  • Watch of all communications
  • Message traffic Load Crypto CMS
  • Maintained a safe work environment by strictly adhering to established safety protocols and guidelines.

Education

Bachelor's Degree of Science - Communications

WINGATE UNIVERSITY
Wingate, NC
08.1991

Skills

  • Help Desk
  • Active Directory
  • PowerPoint
  • MS Project
  • Excel
  • CISCO
  • Video/Voice over IP
  • Network Cable Fabrication: RJ45, RJ11, RG6
  • Communications Analyzer &Fluke
  • Security: Network Forensics Tools, Intrusion Detection/Intrusion
  • Linux
  • Anti-virus
  • Microsoft Exchange Server
  • Windows XP
  • VERITAS,
  • Network Security
  • Firewall
  • Symantec
  • Security policy development
  • Incident Response
  • Network Security
  • Patch management
  • Endpoint Protection
  • User Awareness Training
  • Mobile Security
  • Intrusion Detection
  • Disaster Recovery Planning
  • Vulnerability Scanning
  • Compliance Management
  • Risk Assessment
  • Security assurance
  • Information Protection
  • Symantec Endpoint Protection
  • Security metrics
  • Log Analysis
  • Physical Security
  • Access Control Management
  • Two-Factor Authentication

References

Job References are all work professionals from Consular Affairs:



Hetal Doshi |(Branch Chief) | 703-362-1608 | DoshiHJ@State.Gov


Felicia Webb |(Project Manager) |202-340-2079 | WebbFY@State.Gov


Theodore Jackson |(Bureau Security Officer) | 202-970-0036 | JacksonT3@State.Gov

Timeline

Information Systems Security Officer

US State Department Bureau of Consular Affairs
03.2014 - Current

Information Systems Security Officer

US Navy "Mesa Verde Ship -LPD 19"
02.2010 - 03.2013

Work Center Supervisor Information Technician

US Navy - CTF57 (Command Task Force Unit)
12.2009 - 03.2010

System Administrator/Network Tech/DoDIIS Instructor

US Navy - European Service Command/DIA
02.2005 - 12.2009

System Administrator/Assistant Squadron Duty Officer

US Navy- VS22 Squadron
01.2001 - 11.2009

MESSAGE CENTER TECHNICIAN/TECH CONTROL OPERATOR

NAVAL OCEAN PROCESSING FACILITY (NOPF)
01.1999 - 02.2001

Bachelor's Degree of Science - Communications

WINGATE UNIVERSITY
VONDA BUSH