Highly trained individual knowledgeable in implementing effective security strategies that are compliant with government regulations. A resourceful Information Systems Security Manager with definitive leadership qualities and strong critical thinking and decision making skills.
Education
American Intercontinental UniversitySchaumburg, ILExpected in 09/2011 ā āBS:Criminal Justice - GPA:
GPA: 3.46
Certifications
CISSP | ISC2 | 2020
CASP+ | CompTIA | 2018
Security + | CompTIA | 2018
Skills
Leadership
Teamwork
Risk Management Framework
Information technology
Information systems
Budget and management
Information systems
Information technology
Network architecture
Network Security
Policy and control implementation
Security planning
Work History
Leidos - Information Systems Security Manager Honolulu, HI, 05/2020 - Current
Oversees Information Assurance (IA) Program for ASC through.
Responsible for analyzing and determining weaknesses in local security policy and procedures and develops SOPs to correct deficiencies.
Administers and Monitors DoD Risk Management Framework (RMF) Accreditations ensuring compliance with NIST/industry standards.
Maintains accurate records of Accreditation Standards and assembles authorization packages for Authorizing Official (AO) approval.
Assesses security measures against government policies and regulations.
Supervises staff members in education of all company employees on common threats and ways to promote cybersecurity best practices.
Oversees user provisioning efforts for Active Directory network accounts, verifying credentialing and issuance of PKI tokens and verifying mandatory user IA training.
Verified continuous update of systems and immediately patched vulnerabilities to prevent security issues.
Applies cybersecurity best practices to information system standards, directives and guidance for all personnel, monitoring compliance across organization.
Coordinatea with management teams to plan, develop, align and execute strategies that would meet the organization's vision, mission and purpose.
Leads Security Configuration Management Team for software engineering services and supported key clients in development efforts, establishing standards, determining specifications and creating Service and Operational Level Agreements (SLA).
Leads Army Computer Emergency Response (ACERT) team for IA security incidents.
Responsible for validating and verifying preparatory measures, response actions, and restoration activities for Continuity of Operations Planning (COOP).
Participates in the development, implementation, and maintenance of COOP for all network systems to avoid interruption in the event of disaster or emergency.
Autodesk Inc. - IT Specialist Arkansas, KY, 10/2017 - 05/2020
Serves as the Information System Security Manager (ISSM) for HQ First Army.
Works actions supporting HQ, First Army Information Assurance (IA) Program to include oversight of operations and readiness programs, Network Security Improvement Program initiatives and requirements, IA Vulnerability Alert monitoring, analysis and reporting, IA issue resolution, development of IA policy/guidance/procedures (SOPs) pertaining to IT network security, and implementation of IA technologies.
Administers the Cybersecurity/IA programs and IA assessment and compliance monitoring.
Administers and monitors implementation of the DoD Risk Management Framework (RMF) package for certification and accreditation Process.
Develops guidance and assists system owners through the RMF phases: Definition, Verification, Validation, and Post Accreditation.
Maintains data base of system accreditation status, develops reports, and alerts system owners when accreditation documentation must be updated.
Develops methods to identify events that negate IA accreditation or require re-accreditation.
Assists system owners with identification of Information Assurance (IA) controls to be implemented using RMF/eMASS.
Provides guidance on implementation details from DoD 8500.2 and Security Technical Implementation Guides (STIGS)
Reviews IA control implementation to ensure compliance with RMF standards prior to validation stage.
Guides system owners through certification and accreditation business process based on AR 25-2.
Assists system owners with system registration and update in Army Portfolio management Solution, development of RMF documentation, coordination with DA Certifying Authority, and coordination with Designated Approval Authority (DAA).
Provides input to program, budget and management systems and processes.
Reviews Army policy and develops policy and procedures that implement NSIP subprograms and initiatives to include Remote Access, IA Tools, and Network DMZ, Connection Approval Process, and NIPRNET/SIPRNET security.
Develops and manages the command program that implements information systems security technology and procedures, to include (CAC) Public Key Infrastructure (PKI) and biometrics that address access control and authentication of users and transmitted information to include appointment as the Trusted Agent (TA) for HQ First Army for ordering/revoking/replacing both alternate smart cards for log in (ASCL) and SIPR tokens.
Administers programs which address IA operations and IA readiness to include Information Operations Condition (INFOCON) and IA readiness metrics included in the Joint Force Readiness Report (JFRR).
Evaluates Information System Security and Computer Network Defense (CND) procedures for inclusion as defensive measures in the INFOCON Program.
Advises management regarding INFOCON measures to mitigate a threat to systems and networks.
Analyzes command IA posture and develops input to JQRR and other IA assessment reports.
Ensures conformance with network security architecture and NIPRNET/SIPRNET policy.
Coordinates with NECs, HQDA IA Office and DISA POCs to ensure that Connection Approval Process (CAP) requirements are met and connection waivers are accurate and submitted in accordance with DoD and Army policy.
Monitors compliance with Information Assurance Vulnerability Alert (IAVA).
Evaluates and analyzes IA policies, programs, and procedures involving network security configuration and performs on-site network security assessments to ensure compliance with regulations..
Reviews implementation of network security tools to include but not limited to firewalls, proxy servers and DMZ.
Identifies areas of non-compliance or deficiencies and makes recommendations and establishes timelines for corrective action.
Performs IA assessments to identify vulnerabilities of information technology system processing environment and recommend countermeasures in support of the Force Protection/Anti-Terrorism Program.
Completes package for tenant security plans (TSPs) both NIPR and SIPR.
Knowledge in incident response procedures in regards to an IA infraction or network spillage including malware/spyware, AUP violations and anything that falls within violation of Army and DoD regulations in regards to appropriate, authorized use of government systems.
Eliminating the threat, and reporting the incident and resolution to the appropriate personnel (IAPM, RCERT, ACERT).
Provides policy/practices/documentation to NEC installation network to ensure RMF accreditation standards are implemented to include: Disaster Recovery and Business Continuity Plans, Vulnerability Management Plans, RMF Implementation Plan, as well as compiling relevant network diagrams, dataflow diagrams, host lists, and other documentation.
Army - Army Captain (Operations Officer) City, STATE, 08/2003 - 10/2017
Developed and executed project budget, managed project resources, planned project activities, established workload priorities, assigned tasks to team members, coordinated team member inputs and reviewed inputs for technical accuracy, and presented findings to senior management for information and/or decision.
Exercises personnel management responsibilities.
Plans and assigns work, sets priorities, advises employees on program goals and objectives, and makes decisions on work problems presented by employees. Hears and resolves grievances and employee complaints.
Reviews and recommends approval on serious disciplinary actions involving non-supervisory employees.
Develops strategic plans for all IT procurement by using analytical skills to provide market analysis and feasible studies for all IT expenditures.
Highly efficient in communicating effectively the needs of the organization to all employees in both oral and written communication to effectively achieve organizational goals.
Prepares and coordinates project authorization documents, operational benefit statement, and cost comparisons of alternatives, status reports, requirements documentation, risk analyses and other technical documentation.
Prepared, coordinated and presented information and decision briefings with HQ First Army, installations, at all levels to include SES / General Officer level, and represented the command in meeting with top executive representatives.
Additional appointment as Knowledge Management Officer for the Headquarters to develop processes and tools for cyber awareness and collaboration.
Responsible for establishing policies, and procedures for staffing, archiving, and distributing KM best practices/business rules.
Responsible for executive level training and briefings on emerging tools and information requirements.
Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.
How this resume score could be improved?
Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume: