Post Job Free

Resume

Sign in

Security Information

Location:
Springfield, VA
Posted:
April 19, 2018

Contact this candidate

Resume:

SECURITY CLEARANCE: ACTIVE TOP SECRET/SCI

EDUCATION/CERTIFICATION

CompTIA Advanced Security Practitioner Certificate (CASP)(DoD 8570 compliance at the IAT level III and IAM Level II)

Certified Ethical Hacker (CEH) CND (Computer Network Defense)

Microsoft Certified Professional (MCP)

Certified Identity and Access Manager (CIAM)

Scrum Master Accredited Certificatioin

Security+ CE, ITIL V3 Foundation, Network+ CE

DISA: Assured Compliance Assessment Solution (ACAS) certified

DISA HBSS 201 Admin ePO5.3 (2016 Version) certified

Certificate of Cloud Security Knowledge (CCSK)

Bachelor of Science in International Business; Strayer University, Washington DC

TECHNICAL SKILLS:

Assured Compliance Assessment Solution (ACAS),RMF, FISMA, NIST 800-53, NIST 800-37, eMASS, XACTA, Tenable Nessus Scanner, Microsoft Office 2010/2013, Microsoft Windows 7/8/10, Microsoft Windows Server 2012, Splunk, Nmap, WHOIS, BMC Remedy Ticketing System, HBSS, Encase, DISA STIG Viewer, Kali Linux, SCAP Tool, DHCP, DNS, Active Directory.

PROFESSIONAL EXPERIENCE

Falconwood, Inc. (NAVSEA) July 2016 - Present

Senior Security Engineer (Security Operation Center)

Conduct Assessment and Authorization (A&A) process for Operational information systems and networks within Navy Enterprise Mission Assurance Support System (eMASS) in accordance with current DOD, DON and NAVSEA A&A policies.

Maintain and administer applications, operating systems, and hardware related to Microsoft Windows Workstation and Server based operating systems

Review new security solutions designs and specifications to validate they are ready for existing security operations environment

Experience scripting and automating system administration tasks on a variety of platforms

Conduct system hardening, and security assessment, vulnerability scanning, and penetration testing

Assist in proactively developing patch and vulnerability management procedures and processes within the security operations center

System, network, and application vulnerability remediation and technical policy compliance

Conducing vulnerability analyses and risk management of computer systems and recovering information from computers and data storage devices

configured, and supported the McAfee ePolicy Orchestrator (ePO) management console version 5.3

Installed, configured, and maintained the following end point products within the ePO console and with scripts: (MA, HIPs, DLP, PA, VSE, and RSD)

Describes provisions for configuration identification, change control, configuration status and configuration audits

Identify security deficiencies and provide patch remediation

Maintain strict IT configuration control over the contract life to include policies, procedures, and hardware/software

Experience in operating in cloud based environments (AWS/Virtual Systems)

Use forensic tools and investigative methods to find specific electronic data, including Internet use history, word processing documents, images and other files

Work with technical personnel to remediate vulnerabilities and security findings.

Support the evaluation, qualification, testing and delivery of security architecture improvement, obsolescence replacement and vulnerability response projects.

Monitoring HBSS and ACAS and creating weekly dashboard reports

Support Information Assurance (IA) data collection and continuous monitoring updates for assigned security architectures.Complete reviews and provide appropriate feedback within the timelines dictated by appropriate policies and procedures.

Configures, and implements solutions to resolve technical issues related to information security, identity management, user access authentication, authorization.

Conducts analysis of system requirements and components and performs system audits to ensure intended system functionality, operation, and performance requirements are met.

Perform information assurance certification and accreditation analysis, security assessments, and make recommendations to the Information System Security Managers to bring their systems into compliancy.

Document and analyze deficiencies in Plans of Actions and Milestones (POA&Ms) or requests prepared for Acceptance of Risk (AoR)

Demonstrated experience with incident response consistent with DoDD O-8530.1; NIST 800 series, specifically, NIST 800-61, Rev2 Computer Security Incident Handling Guide and NIST 800-86 Guide to Integrating Forensic Techniques into Incident Response and any other controls and tools (e.g. VMS, SCCM, HBSS, McAfee and Symantec antivirus) that are applicable to information and network system security.

Advanced Systems Development, Inc (Joint Chief of Staff, Pentagon) May 2015- July 2016

Senior Information Assurance/Security Specialist

Determine enterprise information assurance and security standards.

Develop and implement information assurance/security standards and procedures.

Coordinate, develop, and evaluate security programs for an organization. Recommend information assurance/security solutions to support customers' requirements.

Overhaul continuous monitoring program by spearheading Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP), and Security Technical Implementation Guide (STIG) engineering and analysis activities.

Identify, report, and resolve security violations.

Working knowledge of vulnerability scanning as it pertains to the underlying OS, such as MS Windows and Linux/Unix

Working knowledge of: McAfee EPO (HBSS), Windows Architecture and other security tools.

Document and report incidents from initial detection through final resolution using standard DoD incident reporting channels and methods.

Deploy, configure and maintain the full capabilities of the Host Based Security System (HBSS) products to all enterprise-wide managed systems including, McAfee Agent (MA), HIPS, Device Control Module (DCM), Policy Auditor (PA), Data Loss Prevention, Rogue System Detection (RSD) and VirusScan (VSE) for McAfee Host Based Security System (HBSS).

Monitor open source feeds and reporting on the latest threats against computer network defenses.

Establish and satisfy information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.

Identifying and validating system/service vulnerabilities

Support customer at the highest levels in the development and implementation of doctrine and policies.

Perform analysis, design, and development of security features for system architectures.

Create and present reports and other artifacts on the vulnerability assessment and penetration testing processes and routines to support Agency and Federal security and privacy compliance goals and requirements

Proactively drive hunting and analysis of data and various client-side Network Security Monitoring (NSM) and Security Event and Information Management (SIEM) tools for signs of malicious or suspicious activity

Analyze general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.

Perform vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.

Identify, track, and remediate vulnerabilities identified by Information Assurance Vulnerability Alerts (IAVA), A&S teams, or by scanning with automated security tools.

Knowledge Consulting Group, Inc. (FBI Contract) November 2014 –May 2015

Information Systems Security Officer (ISSO)

Ensure that assigned information systems are operated, maintained and disposed of in accordance with approved security policies and practices

Ensure that system security requirements are addressed during all phases of the IS lifecycle.

Develop and maintain SSPs and all other system security documentation, reviewing and updating them at least annually for all assigned systems

Author or coordinate the development of other required system security plans: Configuration management (CM), Contingency Plan (CP), Continuity of Operations (COOP), Disaster Recovery Plan (DR) and Incident Response Plan (IRP).

Support risk assessment and evaluation activities throughout the system's lifecycle.

Implement a strategy for continuous monitoring for assigned systems including: Establishing system audit trails and ensuring their review, reporting all identified security findings and initiating the periodic review of security controls

Advanced Information Security technical skills and understanding of information security practices and policies

Knowledge utilizing Risk Vision to update the security controls for various systems

Performing Vulnerability scanning using Nessus and AppDetector

Request or conduct required information system vulnerability scans in accordance to establish policy; Develop system POA&Ms in response to reported vulnerabilities

Ensure compliance with annual FISMA deliverables and reporting.

Investigate any information technology or system security incidents

Assesses and mitigates system security threats/ risks throughout the program life cycle; determines/ analyzes and decomposes security requirements at the level of detail that can be implemented and tested; reviews and monitors security designs in hardware, software, data, and procedures,

Perform system certification and accreditation planning and testing and liaison activities; supports secure systems operations and maintenance.

Perform security engineering analysis, risk and vulnerability assessment, etc. Monitor and analyze security functional tests. Prepare C&A documentation such as SSP, SCONOPS, ST&E reports, etc.

Smartronix, Inc., Marine Corps Network Operations and Security Center November 2013-November 2014

Senior SQL Server DBA/Database Security

Responsible for the operation, maintenance and support of the high-availability SQL server database/SAN platforms located in remote Data Centers across multiple time zones.

Support daily operations including monitoring, alerting, troubleshooting, capacity management, software configuration, patching, upgrades, proactive performance monitoring/maintenance and backup/recovery of all installed MSSQL databases across all environments

Help with cyber defense of client networks at the DB and related technology level.

Create, manage and troubleshoot Windows Clustering and SQL Server

Sustainment of SQL 2008 and 2012 clusters and migration of various disparate SQL environments onto new clusters.

Under general supervision, operated all aspects of Information Systems, data availability, integrity, authentication, confidentiality, and non-repudiation.

Ensure timely resolution of vulnerabilities on agency IT Systems

Work with team members in identifying potential vulnerabilities to cyber and information security

Usage of SCOM and SCCM for the monitoring and applying patches of SQL and the servers they reside

Resolve all DBA incident tickets and provide a DBA Status Report on a weekly basis on DBA incidents escalated from Tier I organizations.

Provide guidance and instruction to the service desk for handling standard network infrastructure related incidents and service requests.

Administration, implementation, monitoring, and operations and maintenance of SQL databases on VMware servers and on non-virtualized servers.

Provide DBA Documentation to Tier I organizations on the procedures for completing the task.

Support multiple servers and multiple databases of medium to high complexity with multiple concurrent users, ensuring control, integrity and accessibility of the data.

Allocation and management of drive space on the servers.

Maintain the overall health of technologies associated with Database Infrastructure.

Monitor the health of Database Infrastructure with MCNOSC provided event management tools.

Provide MCNOSC project support for Database Infrastructure related technologies.

Coordinate with S5 and other MCNOSC sections on DBA issues and participate in a Change Review Board. Escalate DBA issues to third party product vendors.

Conduct Certification and Accreditation using Department of Defense (DOD) Standard Implementation Guidance (STIG) for SQL Server

Wagner Resources Inc., Department of Army (Afghanistan) June 2010- November 2013

Information Security Analyst

Guide System Owners and ISSOs through the Certification and Accreditation (C&A) process, ensuring that management; operational and technical controls for securing either sensitive Security Systems or IT Systems are in place and are followed according to federal guidelines (NIST 800-53).

Conduct the IT risk assessment and documented the control, Conduct meetings with the IT client team to gather evidence, develop test plans, test procedures and document test results and exceptions.

Conduct walkthroughs, formulate test plans, document gaps, test results, and exceptions; and develop remediation plans for each area of testing.

Develop the audit plan and perform the General Computer Controls (GCC) testing of Information Security, Business Continuity Planning, and Relationship with Outsourced Vendors.

Implement information security requirements for IT systems throughout their life cycle from the requirements definition phase through disposal.

Create or update the System Security Plan and conduct an Annual Self-Assessment.

Conduct Systems Risk Assessment through Risk Analysis, assess the various Assets within the systems boundaries and rigorously identify all the possible vulnerabilities that exist within the system.

Supports determinations of who should have classification authority, and reviews plans for document and access controls, transmission of sensitive information and materials, and related information controls and safeguards.

Create or update the System Security Plan and conduct an Annual Self-Assessment.

Inspect configuration, check configuration compliance, test IT Controls functionality and inspected logs. Review signatures within IDS/IPS tools (Snort) to ensure signatures are up to date to minimize false positive and false negative in the System.

Perform IT operating effectiveness tests in the areas of security, operations, change management, and email authentication.

Administers and coordinates policies and procedures for analyzing and evaluating the character, background, and history of employees, candidates for employment, and other persons having or proposed to be granted access to classified or other sensitive information, materials, or work sites. Prepares visitor access requests (VARs), as appropriate.

Working experience with Security Technical Inplementation Guide (STIG), DoD Information Assurance polices and experience with the NIPR, SIPR or CENTRIXS certification process



Contact this candidate