Summary
Overview
Work History
Education
Skills
Websites
Certification
Area Of Expertise
Timeline
Generic

YAWO KONDO

Frederick,MD

Summary

Results-driven and highly skilled Security Analyst with a doctorate in Information Technology, offering extensive expertise in data loss prevention, HIPAA compliance, vulnerability management, and effective management of third-party vendor relations. Proven track record of implementing robust security measures to safeguard sensitive information and mitigate potential risks. Adept at utilizing cutting-edge technologies to enhance overall cybersecurity posture.

Overview

6
6
years of professional experience
1
1
Certification

Work History

Computer Science Professor

Walden University
08.2021 - Current
  • Educate students on cybersecurity principles, data protection, and compliance standards, including HIPAA
  • Conduct research on emerging cybersecurity threats, contributing to the advancement of knowledge in the field
  • Teach cybersecurity courses with a focus on data loss prevention and HIPAA regulations
  • Conducted research in vulnerability management and published articles in reputable journals
  • Mentored students in cybersecurity projects, fostering a solid understanding of industry best practices
  • Prep students to obtain cybersecurity certifications such as CompTIA SEC+, and CEH
  • Provide examples of gained experience to help prepare students for their daily duties as a SOC analyst, IT Security analyst, or cloud security analyst.

Information System Security Officer

University of Maryland
03.2018 - Current
  • Develop processes and procedures to identify risks, implement remediation plans, and reduce organizational risk across the enterprise
  • Manage the organization-wide execution of IT risk strategies, incorporating changes to environmental practices while adhering to standards and regulations for critical systems and core infrastructure
  • Provide consultation to drive the implementation of a Risk Assessment process and remediation plans for sustainable organizational execution
  • Conduct IT security due diligence, 3rd-party risk assessments, gap analysis, and author comprehensive risk reports
  • Ensure the remediation of identified weaknesses from vulnerability scans following the organization's defined time frames
  • Prepare recommendation reports for system owners to address identify vulnerabilities during the risk assessment
  • Review and maintain Segregation of Duties (SOD) in all applicable environments.

Information Security Consultant

Lausey Technology
03.2018 - 01.2021
  • Oversaw the security posture for one or more system(s) throughout the entire lifecycle; provides continuous monitoring through scheduled audits, controls testing, and audit reviews, and escalates issues as needed
  • Collaborated with clients to assess their cybersecurity needs and provide tailored solutions
  • Conducted HIPAA compliance audits and implemented measures to ensure the confidentiality and integrity of healthcare data
  • Developed and executed comprehensive vulnerability management programs, reducing the risk of security breaches
  • Monitored and analyzed security alerts to identify and mitigate potential data loss incidents
  • Implemented and maintained data loss prevention tools and technologies
  • Conducted risk assessments and vulnerability scans, providing actionable insights for risk mitigation
  • Assisted in implementing DLP solutions, analyzing security logs, and responding to incidents
  • Conducted risk assessments and contributed to the development of security policies.

Security Project Manager

Cheryl Health
  • Collaborated with various groups within the organization, serving as a Security Project Manager, managing and leading the development and/or implementation of security-focused solutions
  • Maintained a deficiency dashboard and monitored the status of remediation efforts to ensure completeness
  • Participated in developing an engagement letter, documenting and confirming the external auditor's acceptance, the objective and scope of the audit, the extent of the auditor's responsibilities to the company, and the acceptable form of reports
  • Conducted security assessments and audits for government and private sector clients, evaluating their compliance with various regulatory frameworks, including NIST SP 800-53 and FedRAMP
  • Developed and implemented information security policies, procedures, and controls for clients to enhance their overall security posture
  • Assisted clients in achieving and maintaining compliance with federal information security requirements
  • Conducted vulnerability assessments and penetration tests to identify security vulnerabilities and provide recommendations for mitigation.

Education

Doctor of Information Technology -

Walden University
12.2023

MS of Health Informatics Administration -

Washington Adventist University

Skills

  • Triage vulnerability alerts from security tools, external intelligence providers, penetration tests, and user-reported findings to assess the impact on the organization
  • Leveraged tools including Splunk, Open-Source Intelligence, Snort, and Splunk Security Apps, performing cyber incident response analysis, content development, and maintenance
  • Proficient in monitoring compliance status and preparedness through internal audits and gap assessments, enhancing awareness of policies and controls
  • Demonstrated skills in crafting and upkeeping comprehensive security policies across the enterprise, with a keen ability to identify and address potential risks
  • In-depth technical skills in VPC, Direct Connect, Transit VPC, VPC Peering, Reverse Proxy Caching, CDN, IPsec, and VPN for secure data transfer, and secured connection to other AWS services
  • Good knowledge of AWS services: EC2, S3, VPC Endpoints, VPC PrivateLink, VPC Peering, Transit VPC, Network Protocol, Subnetting (Private and Public), IPsec, VPN, Route53, ELB, Auto scaling, IAM, DynamoDB, Lambda Amazon Kinesis, Cloud Front, Cloud Formation, CloudWatch, CloudTrail, Storage Gateway, Internet Gateway
  • Conducted comprehensive security control assessments based on NIST SP 800-53 controls and FedRAMP requirements
  • Led the end-to-end FedRAMP authorization process for multiple cloud service providers, achieving successful authorizations for federal agency use
  • Develop processes and procedures to identify risks, implement remediation plans, and reduce organizational risk across the enterprise
  • Manage the organization-wide execution of IT risk strategies, incorporating changes to environmental practices while adhering to standards and regulations for critical systems and core infrastructure
  • Provide consultation to drive the implementation of a Risk Assessment process and remediation plans for sustainable organizational execution
  • Conduct IT security due diligence, 3rd-party risk assessments, gap analysis, and author comprehensive risk reports
  • Ensure the remediation of identified weaknesses from vulnerability scans following the organization's defined time frames
  • Prepare recommendation reports for system owners to address identify vulnerabilities during the risk assessment
  • Review and maintain Segregation of Duties (SOD) in all applicable environments
  • Oversaw the security posture for one or more system(s) throughout the entire lifecycle; provides continuous monitoring through scheduled audits, controls testing, and audit reviews, and escalates issues as needed
  • Collaborated with clients to assess their cybersecurity needs and provide tailored solutions Conducted HIPAA compliance audits and implemented measures to ensure the confidentiality and integrity of healthcare data
  • Developed and executed comprehensive vulnerability management programs, reducing the risk of security breaches
  • Monitored and analyzed security alerts to identify and mitigate potential data loss incidents Implemented and maintained data loss prevention tools and technologies
  • Conducted risk assessments and vulnerability scans, providing actionable insights for risk mitigation Assisted in implementing DLP solutions, analyzing security logs, and responding to incidents
  • Conducted risk assessments and contributed to the development of security policies
  • Collaborated with various groups within the organization, serving as a Security Project Manager, managing and leading the development and/or implementation of security-focused solutions
  • Maintained a deficiency dashboard and monitored the status of remediation efforts to ensure completeness Participated in developing an engagement letter, documenting and confirming the external auditor's acceptance, the objective and scope of the audit, the extent of the auditor's responsibilities to the company, and the acceptable form of reports
  • Conducted security assessments and audits for government and private sector clients, evaluating their compliance with various regulatory frameworks, including NIST SP 800-53 and FedRAMP
  • Developed and implemented information security policies, procedures, and controls for clients to enhance their overall security posture
  • Assisted clients in achieving and maintaining compliance with federal information security requirements Conducted vulnerability assessments and penetration tests to identify security vulnerabilities and provide recommendations for mitigation
  • Nessus
  • Qualys
  • Snort
  • AWS Natives
  • McAfee Platform
  • Burp Suite
  • Suricata
  • Nikto
  • Wireshark
  • Splunk
  • Snyk
  • Fortify
  • [Area of Study] Instruction
  • Lesson Plan Development
  • Progress Reporting

Certification

  • CompTIA Security+
  • CCSK Certificate of Cloud Security Knowledge
  • CISM Certified Information Security Manager

Area Of Expertise

  • Vulnerability Management
  • Information Security and Compliance
  • IT Security & Compliance
  • Enterprise Risk Management
  • Technical Recommendations
  • Project Management
  • Stakeholder Collaboration
  • AWS Cloud Security
  • FedRAMP Authorization

Timeline

Computer Science Professor

Walden University
08.2021 - Current

Information System Security Officer

University of Maryland
03.2018 - Current

Information Security Consultant

Lausey Technology
03.2018 - 01.2021

Security Project Manager

Cheryl Health

Doctor of Information Technology -

Walden University

MS of Health Informatics Administration -

Washington Adventist University
YAWO KONDO