PAMELA A. EDGERTON
Alpharetta, Georgia Phone: 404-***-****
E-mail : ***********@*****.***
~ IT SECURITY ANALYST ~
Information Security Compliance Audit
Profile
Results-oriented and performance-driven IT professional with outstanding background in client support services, network, and project management; able to bridge the gap between technical and non-technical teams. Proven ability to coordinate support activities and processes through outstanding verbal and written communication skills. Familiar with evaluation, selection, and purchasing functions.
Skilled at increasing line of business audit; passed rating by implementing risk management standards and practices for risk factor identification and exposure management
Principally effective in leading evolution of technical and non-technical solutions from development through implementation
Able to utilize formal software deployment methodologies and best practices; adept at providing consultative services and managing diverse projects
Expert at implementing comprehensive security programs and solutions to generate consistent bottom-line results
Skilled at communicating with internal departments and senior management, supporting product / service presentations, and meeting with customer expectations
Strengths
Systems Security
SOX, SOC 1 and 2
Identity & Access
Scrum Master
Remediation
Regulatory Compliance
Risk Assessment & Management
eDiscovery/Forensics
ISO 27001 Compliance
SAFe Agile Framework
Technical Summary:
Software
MS Office 365, Adobe Acrobat, HEAT, Remedy, SharePoint, IronMail 6.5.1, MS Exchange, Websense, Sarbanes-Oxley Comply, Laboratory Information System Software, Medical Manager, Risk Navigator, Archer, Sailpoint, Encase Guidance Software, Discovery Attender, Relativity, Symantec Enterprise Vault, LeanKit, Tableau, Rapid7, Kairos
Career Path
Information Security Business Analyst
2015 - Present
McKesson, Alpharetta GA
Assist BUs with process improvement with regards to security and compliance.
Engage and build relationships with other groups inside and outside of BU, including auditors, business teams, vendors, customers, and partners.
Assist with HIPPA, EHNAC, SOX, SOC 1/2 assessments
Review and provide walkthrough testing evidence to internal and external auditors
Assist with the coordination of the yearly US Pharma Disaster Recovery Exercise
IT Security/Risk Analyst– Information Security Risk Management
2014 - Present
McKesson, Alpharetta GA
Act as a liaison to the lines of business to ensure that all aspects of logical access to key financial and other critical applications are structured and documented appropriately.
Assist in the daily administration of Archer. Craft and communicate updated, effective IT Security Policies and procedures based on Archer and ISO 27001 framework and NIST 800-53. - Engage and build relationships with other groups inside and outside of BU, including auditors, business teams, vendors, customers, and partners.
Assist with HIPPA, EHNAC and Vendor risk assessments
Review and provide walkthrough testing evidence to internal and external auditors
Approve/Deny Policy Exceptions
Monitors and reviews policies, standards and procedures and provides advice on compliance with government guidelines and regulatory requirements. Identifies areas of opportunity for process, control, or cost improvement.
IT Security Specialist– Enterprise eDiscovery and Forensics
2013-2014
ING, Atlanta, GA
Follow proper protocols in preserving electronic evidence. Document chain of custody
Effectively manage and analyze large volumes of electronic data.
Perform investigative analysis of electronic data according to the specific needs of the case
Utilize tools such as EnCase, Symantec EV and Relativity to execute investigative analysis
Customize analysis and professional reports for investigations
Conducts electronic searches of mailboxes, mail archives, shared and personal network drives, documentation systems, and client endpoints. Process collected data based on legal counsel requests.
Gather evidence from custodians identified by the General Counsel in a manner that maintains the integrity of the evidence and follows proper chain of custody procedures.
Manages eDiscovery projects; prioritizes multiple projects to meet litigation discovery deadlines.
IT Security/Compliance Consultant – Enterprise Technology and Risk Management
2012-2013
SunTrust Banks, Inc Atlanta, GA
Act as a liaison to the lines of business to ensure that all aspects of logical access to key financial and other critical applications are structured and documented appropriately.
Plans and coordinate logical access evaluations on all critical applications, executing these evaluations and interpreting the results, identifying internal access control weaknesses, and making recommendations for cost-justified improvements in operations.
Conduct application assessments
Monitors and reviews policies, standards and procedures and provides advice on compliance with government guidelines and regulatory requirements. Identifies areas of opportunity for process, control, or cost improvement.
Act as a liaison with internal business units and external agencies to assess compliance, risk, and security issues.
Identify and recommend resolutions. Provides training to less experienced analysts. May be responsible for a specific program/function.
Security/eDiscovery Forensics Analyst
2010-2012
LexisNexis – Alpharetta, GA
Follow proper protocols in preserving electronic evidence. Document chain of custody
Effectively manage and analyze large volumes of electronic data.
Perform investigative analysis of electronic data according to the specific needs of the case
Utilize tools such as EnCase, Discovery Attender and Concordance to execute investigative analysis
Customize analysis and professional reports for investigations
Conducts electronic searches of mailboxes, mail archives, shared and personal network drives, documentation systems, and client endpoints. Process collected data based on legal counsel requests.
Gather evidence from custodians identified by the General Counsel in a manner that maintains the integrity of the evidence and follows proper chain of custody procedures.
Manages eDiscovery projects; prioritizes multiple projects to meet litigation discovery deadlines.
Generally, assists in supporting the technology requirements of the legal department.
Assist in the development and documentation of business and technical requirements for tools required to support investigations, eDiscovery, and collection of evidence.
Assist in the development, review, and documentation of departmental procedures around eDiscovery and collection of evidence.
Interpret and communicate technical findings to non–technical audiences
Security Compliance-
Responsible for reviewing and documenting Technology Risk Management industry trend tool solutions such as policy compliance software and/or appliance.
Contribute information and documentation for the standard Domain Technology Risk Management Reports.
Recommend, schedule and ensure application of fixes, security patches, disaster recovery procedures and any other measures required in the event of a security breach.
Develops security requirements documentation including but not limited to security policy, operational procedures, and standards
IT Security Compliance Analyst and Release Management
2007-2010
MetLife – Alpharetta, GA
Oversee and implement SOX/SAS70 compliance activities including scoping, documentation, testing, remediation and assessment of deficiencies
Organize and prepare SOX status reports for management and external auditors
Involve and contribute in SAS 70 Certification for six applications including vulnerability assessments, security test and evaluations
Analyze proposals and Quality Assurance SOX forms prior to production; gather, review and perform self-test for nine key controls, such as user entitlement, change management and password security
Supply status update and metrics monthly and assume full responsibility in storing and/or archiving of all testing documents
Work closely with process owners on completing documentation revisions due to remediation, changes in control activities or organizational changes
Manage and maintain SOX documentation templates, protocols and user instructions; support process owners in maintaining documentation
Oversee completion of quarterly, semi and annual IT control testing, including sample determinations and report results
Serve as main point of contact for SOX/SAS 70 related IT questions and testing evidence; execute timely completion of quarterly reviews and annual SOX audits by cooperating with external auditors (Deloitte and Touche)
Serve as main point of contact for Release Management. Supervise the Remedy Ticket administration offshore consultants. Directly manage the overall release calendar and ensure proper communication with the entire IT Team.
IT System Analyst
2003-2007
Sealy Inc.- Trinity, NC
Administered email security (SPAM, Phishing, and viruses) using CipherTrust IronMail System; designed the implementation and migration of IronMail
Conducted in-depth analysis regarding email security needs, as well as maintenance of black and white lists
Monitored security trends and developed security threat matrixes regarding SPAM, Phishing attacks, spyware and viruses
Utilized end user-training and Symantec Antivirus Enterprise edition to manage enterprise virus and spyware defenses
Maintained existing security related patch levels on 2000 PCs and laptops and around 150 servers
Oversaw the effectiveness of internal controls, data protection and compliance with security policies and standards relating to SOX
Established IT controls for new processes and executed new controls or standards
Assisted with internal audits and coordinated internal resources related to required testing of existence and in compliance with proper controls and procedures within scope of Sarbanes-Oxley section 404, COBIT, COSO and ISO 17799 requirements
Education / Credentials
DeVry Institute of Technology, Atlanta, GA
Bachelor of Science in Computer Information System
Certifications:
ITIL v3 Foundation
SAFe Practitioner
Certified Advanced Scrum Master (SASM)
CISSP Certification, Scheduled 2018
COMPTIA - A+ Certified, Security+ Microsoft-MCP
Encase-eDiscovery/Forensics
Cipher Trust- IronMail
Symantec Enterprise Corporate Edition
Training:
Internal Controls Compliance Regulatory Compliance; SOX, SSAE16 SOC 1 & 2; ISO 27001, NIST 800-53
COBIT and COSO framework
EHNAC