Resume

Sign in

Security Management

Location:
Herndon, VA, 20170
Salary:
160k
Posted:
April 15, 2016

Contact this candidate

Resume:

Dr. Edgar Carmenatty, CISSP, ITIL Foundations v.*

***** ******* ****** ***. ***

Herndon, VA 22304

Phone : 703-***-****

acudot@r.postjobfree.com

SUMMARY

Excellent problem solver, with strong communication, teamwork, and interpersonal skills. For more than 23 years, acknowledged for capacity to tackle challenging issues, analyze viable alternatives, and provide innovative solutions. Had accumulated an extensive and diverse technical experience in IT Field, emphasizing in management, computer security, network administration, programming, and PC support. Have a master in computer security management (Summa Cum Laude), CISSP and ITIL v3 certifications.

Persistence, personal integrity, and channeled energies are major strengths consistently cited by managers praising team spirit, independent work habits, and the determination to conquer technical challenges.

• DIACAP (VMS, eMass, Xacta, Gold Disk, and Retina)

• DIACAP (C&A package dev. management)

• Incident Management

• ITIL Foundations - V3

• Policy Development and Implementation

• CISSP

• Exposed to FedRAMP

• CSAM

SKILLS

Experience supporting C level senior executives.

Experienced Security Manager.

Certified Information Systems Security Professional (CISSP).

OS Platform: Windows NT 4.0/ 2000/ 2003 Servers

Knowledge on eMass, Xacta AI Manager, Gold Disk, Retina, MS-Office (Word, Excel, PowerPoint, Outlook, Publisher), 97-2010, MS Project and MS Visio.

Collaborates with other departments (e.g., Risk Management) to direct compliance issues to appropriate existing channels for investigation and resolution.

EDUCATION

PhD, Information Technology,

Capella University, Minneapolis, Minnesota

GPA: 3.42, graduation date, March 2015

Master of Science, Computer Science, Computer Security Management, December 2009

Strayer University, Alexandria, Virginia

GPA: 3.92, Summa Cum Laude

B.S., Computer Science, Computer Programming, Minor: Accounting, June 1985

Interamerican University, Guaynabo, Puerto Rico

GPA: 3.21, Major GPA: 3.53

SECURITY CLEARANCE

Top Secret

HONORS

Summa Cum Laude. Strayer University, December 2009.

Outstanding Performance Award. Command Information, Washington, DC, March 2008.

Appreciation for Contribution. Anvicom, Washington, DC, 2008.

PROFESSIONAL EXPERIENCE

Experience supporting C level senior executives, Computer/Network Security, team building and leading, customer Needs Assessment, Team Development/Motivation and Technical Support.

EXPERIENCE

Raytheon Blackbird Herndon, VA Oct. 2015 – Present

Quality and Compliance Manager

In charge of developing and revising the United States Postal Service (USPS) enterprise-wide cyber security strategy, policies, governance structure, compliance program, and risk management framework. USPS is an organization with 486,822 career employees, 31,662 Postal Service-managed retail offices and annual revenue of 67.9 billion.

Responsibilities:

Interface with the CISO team and other leaders to ensure that security goals and policies are supported by well-defined processes, with measurable results, in strict compliance with applicable laws, regulations, and policies.

Ensure that key configuration change procedures are exercised, measured, and monitored to ensure predictable results.

Coordinate regularly with leadership supporting the CISO.

Serve as key resource in promoting quality and policy compliance.

Contribute to development of training resources.

Work with vulnerability assessment manager to collect measures of policy and configuration compliance.

Measure progress and success, as well as identify weaknesses and remediation.

Provide ongoing status to CISO using accurate and current data.

Contribute to policy development and implementation as it relates to NIST guidance.

Coordinate across organization to ensure that all leadership is aware of goals and requirements.

Provide customer with an end-to-end capability.

Manage policy and policy implementation

RedPort-Information Assurance (USSS) Washington, DC Oct. 2014 – 2015

Compliance Officer

My responsibility as a Compliance Officer includes the reviews of policies and procedures. Assist in the review of FISMA accreditation and authorization (A&A) compliance reports, questionnaires, procedures, certifications and the evaluation o A&A documents.

Additional duties comprise the following:

Gain a thorough understanding of the company’s systems. Learning who has access and where weak points of the systems are. Recommend ways to improve and update the security of the company’s computers. Recommend ways to improve a system’s security, through both hardware and software solutions.

Develop, implement, maintain, and revise policies and procedures for the general operation of compliance processes and its related activities and manages day-to-day Accreditation and Authorization (A&A) operation issues.

Act as part of the CISO’s independent review and evaluation body to ensure that A&A process complies with FISMA requirement and address compliance concerns that may exist within the organization.

Design, monitor and oversee the implementation of a SharePoint A&A portal and application that is been used to coordinate all FISMA compliance activities for the client's systems portfolio such as:

oPOA&M management

oAssessment and Authorization documentation management

oHardware and software inventory

oPolicy Management

oSystems boundary

oAnalysis of scans results on a per boundary basis

oGroups Weekly Actions Reports

oChange request

oWaivers

This portal is been used to identify trends and to measure and improve processes performance.

Identify potential areas of compliance vulnerability and risk; develops/implements corrective action plans for resolution of problematic issues, and provides general guidance on how to avoid or deal with similar situations in the future.

Blue Canopy Herdon, VA Oct. 2013 – Oct. 2014

Sr. Consultant

My responsibility as a consultant was to resolve any security issue that may surface. It does not matter if I am coaching a person, facilitating a meeting, leading a training class, dealing with NIST Risk Management Framework issues or I am dealing with some IT Governance challenge, I will adapt to the needs of my client. My obligation as a consultant was to understand the business problem or need, develop appropriate recommendations, and present the pros and or cons and trade-offs to the executive. He or she must have all available information to help him or her to make an informed decision.

As part of my responsibilities, performed the following duties:

Participate on security control assessments for a federal (civilian) General Support Systems (GSS) and Mayor Applications (MA) to ensure compliance with FISMA security framework controls using CMS Information Security Acceptable Risk Safeguards (ARS) 2.

Verify that that systems owned or managed by the federal agency meet specific security requirements on the following classes of security controls: operational, management and technical.

Determine completeness and compliance of the following documents: System Security Plans (SSP), Contingency Plans (CP), Incident Response (IR) plans, and artifacts.

Verify that the agency security controls and requirements had been satisfied.

Work on reports, presented to ISSOs, CISO, Cyber Security Team, and CIO that depict vulnerabilities and suggested mitigations that could be used to improve the system(s) security posture.

This role also requires interviewing Federal employees and/or contractors with security responsibilities in any of the three security classes (management, operational and technical) during systems security assessments.

RedPort-Information Assurance (DOT) Washington, DC Aug. 2012 – Sept. 2013

IMC/Security Manager (Sr. Security Manager) Manage a team of 21 employees

Gain a thorough understanding of the company’s systems. Learning who has access and where weak points of the systems are. Recommend ways to improve and update the security of the company’s computers.

Recommend ways to improve a system’s security, through both hardware and software solutions.

Revise and set user policies and protocols, monitor them, and enforce them. They must also set up countermeasures that protect the system when an unauthorized user attempts to gain access to the system.

As a member of the team supporting the DOT Office of the Secretary (OST) senior executives under the Information Assurance Office (SSO) I am executing managerial responsibilities as the IMC (Incident Management Center) and Security Manager. In charge of providing an integrated approach to IT security services for monitoring and responding to Infrastructure and Network Incidents throughout the DOT COE (Common Operations Environment) with over six thousand (6,000) users.

In charge of creating and developing a comprehensive set of operational procedures and guidelines that will help DOT the mission and ensure compliance to Federal and DOT security requirements following the: DOT Cyber Security Compendium, FISMA, Computer Security Act of 1987, The Clinger-Cohen Act, OMB Circular A. 130, NIST SP 800-18, SP 800-37, SP 800-53, and FIPS 199 series and Act as a consultant to support information assurance policies, standards, directives and requirements initiatives.

Assisted ISSO:

oOn the implementation of applicable cyber security policies for the information system and those aspects of information system-related physical security.

oVerifying and certifying that operational security posture is consistent with DOT’s security policy.

oOn the distribution of cyber security, notices and advisories are distributed to appropriate personnel and that vendor-issued security patches issues were reported.

oAs the manager of the Incident Management Center serves as a focal point for cyber security incident reporting and subsequent resolution for assigned information systems

oOn each phase of the SDLC security-related documentation at each phase meets all identified security needs.

oTo maintain the security assessment and authorization documentation (formerly C&A) for information systems according to Department of Transportation Cyber Security Compendium.

oOn the selection of NIST SP 800-53r3 baseline security controls are appropriate for the information system based on the FIPS 199 security categorization guideline, NIST SP 800-53 guidance, and supplemental Department of Transportation policy and the Departmental Cyber Security Compendium.

oRecording all known security weaknesses of assigned information systems in the POA&M in accordance with Department of Transportation policy and procedures.

oTracking all security education and awareness training conducted for personnel and contractors, as required by Departmental Cyber Security Compendium.

oOn required updates that were performed to key documents in accordance with NIST SP 800-37 for continuous monitoring as supplemented by Departmental Cyber Security Compendium.

oIdentifying changes to the information system that may affect security controls, performing the security impact assessment of proposed changes, reporting any change in risk posture, and providing recommendations for risk mitigation.

oDeveloping an FISMA Compliance Database (MS Access) that it is used as part of the Continuous Monitoring Strategy to monitor and track vulnerability findings from Plan of Action & Milestones (POA&M), identifying vulnerabilities that can be quickly resolved and to follow up with Subject Matter Experts (SMEs) to update current POA&M status. This application manages meetings, agenda/minutes, and dashboard, organize an artifact repository, organize data collection for audits, and research support in addressing POA&M findings.

oVerifying and ensuring that external connections to/from information systems and networks are provided by an approved Trusted Internet Connection Access Provider (TICAP) or DOT-approved Managed TIC Provider Service (MTIPS).

oEnsuring that the information on the security management system (CSAM) accurately contains required information system inventory, categorization, POA&Ms and other security metrics required by the CIO through this policy and the Departmental Cyber Security Compendium for the system(s) for which the ISSO is responsible.

oCompleting mandatory annual specialized information security training.

Managed several projects such as Improvement of the Incident Management Center, POA&M management, and resolution that included the development of an Access Database as part of the vulnerabilities resolution strategy.

TWD & Associates (NAVY) Washington, DC Feb. 2012 – Aug. 2012

HQ Operations Project Services Team PM (Managed a team of 11 employees) – Promotion from prior position.

Responsible for DIACAP and project management teams that provide security engineering, operations and maintenance support to NAVSEA systems.

Responsible for managing the schedule, technical execution, contractual compliance and customer satisfaction in coordination with an internal program management office (PMO), government senior program management and technical points of contact, and subcontractors

Responsible for Project Control team that ensures that HQ NAVSEA IT systems conform to the DoD/DoN Governance Chain. The Chain’s “links” include FISMA, DITPER-DON, DIACAP Certification and Accreditation Process, NMCI Certification, DADMS and SAHRAP Registration and Approval Process, CARS and LNS Initiatives, and a growing number of subordinate requirements and procedures. Project Control performs other duties such as maintaining NAVSEA Server and Software Portfolio in DADMS; producing NMCI and other technical documents that support HQ NAVSEA systems; and assisting system owners by conducting and documenting FISMA Annual Security Reviews, Security Controls Tests, and Contingency Plan Tests.

Provide security guidance in Information Assurance (IA), Certification and Accreditation (C&A), network security, security life cycle management, risk management, and security awareness.

Assist in the review of DIACAP documentation to support systems accreditation.

Ensured that Department of the Navy, DoD, DIACAP and NIST security requirements and processes are properly implemented on Navy computers, systems and networks and thoroughly documented for formal system accreditation.

Developed and implemented two applications, one for C&A package verification with canned findings and a weekly/ monthly status report used to justify TWD and Associates presence.

C&A Projects Managed:

oEnhancement of the Incident Management Center

oVoice Over Internet Protocol

oProgram Executive Office Integrated Warfare Center Integrated Data Environment

oINAVSEA

oDigital Signage and IPTV

oVideo Teleconference

oSecured Video Teleconference

TWD & Associates (NAVY) Washington, DC Nov. 2011 – Feb. 2012

Configuration Management Analyst 4 (Supervised one employee) – Promoted to the next position

Assists in the maintenance and control of the configuration of identified items such as baselines, documentation, drawings, specifications, and associated documentation within approved Configuration Management parameters.

Check DoD DIACAP C&A packages for quality control.

Delta Resources (DISA) Alexandria, VA May 2011 – Nov. 2011

Senior Information Systems Analyst/ Alternate IAM

Support the IAM on oversight of information systems security for automated information systems assigned to the PEO-MA directorate through participation in working groups and with individual users.

Responsible for understanding, implementing, and complying with all policies and procedures identified in DoDD 8500.1, DoDI 8500.2, DoDI 8570.1 and the DoD Information Assurance Certification and Accreditation Process (DIACAP).

Responsible of developing and maintaining the organization of DoD information system-level IA program that identifies IA architecture, IA requirements, IA Security Plan, IA objectives, and policies. Additionally, the support includes: reviewing, commenting, tracking, and maintaining the DISA repository for all PEO-MA IA certification and accreditation documentation; ensuring that all systems, associated Information Assurance Vulnerability Assessments (IAVA) and Security Readiness Reviews (SRR) results are recorded and in the Vulnerability Management System (VMS); track and report on all IA management review items; monitor IAVA compliance in VMS and prepare weekly IAVA compliance reports.

Support the Directorate IMO in providing automation support to the end users. The IMO’s duties and responsibilities include developing and publishing the Directorate Information Management Plan (IMP); identifying, tracking, recommending automation equipment requirements; developing procedures to validate and manage information requirements; communicating, collecting and reporting data calls related to Action Information Management System (AIMS) suspense’s; researching, responding, and reporting on Requirements Identification Documents (RIDS). The IMO is the first contact for the Help Desk for end-user automation support and is the designated representative to request automation support.

Support the Directorate Equipment Custodian in receiving, tracking, issuing, and disposing of all Automated Data Processing Equipment (ADPE).

Alion Science and Technology (NAVY) Alexandria, VA August 2010 – May 2011

Senior Data Security Analyst

Experience with DIACAP process. Software used for documentation and evaluation of systems: Xacta AI Manager (User and Administrator), Gold Disk, and Retina.

Develop, implement, enforce, and communicate security policies or plans for data, software applications, hardware, telecommunications, and information systems security education/awareness programs.

Carry out all phases of information systems/networks security program that involves access to computers and computerized data enabling company to meet contractual requirements for network security.

Research, evaluate, test, recommend, communicate, and implements new security software or devices.

Conducted regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans.

Conducted investigations of computer security violations and incidents, reporting as necessary to the management. Identifies and recommends solutions to security exposures.

Developed, tested, and operated firewalls, intrusion detection systems, enterprise anti-virus systems, and software deployment tools.

Worked with commercial computer product vendors in the design and evaluation of state-of-the-art secure operating systems, networks, and database products.

Coordinated with project teams in system consolidation, information security software upgrades, and contingency management planning and execution.

Responded to queries and requests for computer security information and reports. May prepare security reports to regulatory agencies such as Departments of Defense or Energy.

Provided guidance to less skilled Data Security Analysts.

Unisys (TSA) Reston, VA June 2009 – August 2010

Network Design Engineer 4

Analyzed local and wide area network systems, including planning, designing, evaluating, selecting operating systems and protocol suites and configuring communication media with concentrators, bridges and other devices.

Oversee network communications for Cisco routers and switches. Fulfill requested security changes (port security) following contract and change control procedures.

Resolved interoperability problems to obtain operations across all platforms including E-Mail, file transfer, multimedia, teleconferencing and the like.

Configured and harden systems for secure user environments.

Supported acquisition of hardware and software as well as subcontractor services as needed.

Unisys (Census Bureau) Reston, VA February 2009 - June 2009

Consultant 2

Member of the Unisys Training team, in charge of evaluating, modifying training materials for the Census, Office Computing Environment (OCE), and the Mobile Computing Equipment (MCE).

My main responsibility as a member of the team was Puerto Rico’s Spanish documentation validation and QC. This included to verify the correctness in the translation of:

o Personal information and identification (PII) data protection while gathering information.

oInstructions on how to manage government equipment (computers) that contains PII.

Beacon Hill (Census Bureau) Largo, MD November 2008 - February 2009

Trainer

Member of the Unisys Training team, in charge of evaluating, modifying training materials for the Census, Office Computing Environment (OCE), and the Mobile Computing Equipment (MCE).

My main responsibility as a member of the team was Puerto Rico’s Spanish documentation validation and QC. This included to verify the correctness in the translation of:

oPersonal information and identification (PII) data protection while gathering information.

oInstructions on how to manage government equipment (computers) that contains private information

Anvicom/CommandInformation (FAA) Washington, DC May 2006 - November 2008

Helpdesk Manager

Help Desk Manager at FAA, responsible for providing advice to end-users on software and hardware related problems. Computer imaging, AD management, and support to users, printers, and tape library and enforcement of department policies as:

Enforced established policies on physical access to data processing equipment.

Enforced access control policies into network drops.

Magnetic media management protection and destruction.

Did on the spot training on how to identify and protect PII media and data.

Access control to digital resources in digital media.

On the spot training on software usage, access control, phishing, malware, email usage, PII protection, software installation protection. Safe management of recording media.

Friendly presence and helpful attitude; excellent interpersonal skills and ability to work well with others.

Information Network Inc. Lanham, MD September 2005 - May 2006

Network Administrator

Responsible for overseeing the daily operations of thirteen (13) Windows 2000/2003 servers at the headquarters.

In charge of server, workstation anti-virus, installations and updates. Medial protection, backups, access control, system and services acquisition, systems and communications protection.

In charge of controlling physical access to HQ and one additional office.

Managed office expansion for a new contract, this included new drops, and computers physical security of a VPN for remote access to HQ servers. Manage the internal IT helpdesk providing support to desktop to 40 users, and assist the Office of the CIO in building and maintaining the growing corporate IT infrastructure. Additionally, administrator of the following systems: Data Watch (Access control system), Avaya IP Office (IP telephony system).

Florida Hospital Orlando, FL June 2003 - April 2004

System Analyst

Designed analyzed, coded and implemented several applications for the call center using Telescript (call center scripting software for inbound and outbound).

Develop applications that increased productivity and reduced phone time.

Develop programs that had controls for information integrity and access controls to program modules.

Executrain Orlando, FL October 2000 - October 2002

IT Manager

Responsible for the setup and maintenance of six (6) training rooms (100 computers). In charge of network accounts maintenance, connectivity, security, trust, upgrades, troubleshooting (protocols, software, and hardware), installation and configuration of software, the email system, and all computers in both sites. Responsible of supervising one person during this period.

Responsible for overseeing the daily operations of five (5) Windows 2000 and one (1) Novel servers at the headquarters and one office at Melbourne.

Performed server, workstation anti-virus, installations, and updates. Responsible of medial protection, backups, access control, system and services acquisition, systems, communications protection, inventory, and configuration control.

In charge of controlling physical access to HQ and one additional office.

Florida Technical College Orange City, FL January 2000 - July 2000

Instructor

Responsible for the technical training of new MCSE 4.0 candidate’s technologies at the college. Gave classes on courses like: Supporting Microsoft Windows NT Server 4.0 Enterprise Technologies, Administering Microsoft Windows NT 4.0, Core Technologies of Exchange Server 5.0, and 5.5, Supporting Microsoft Windows NT 4.0 Core Technologies, Microsoft IIS 4, Supporting Microsoft Windows NT 4.0, and Internetworking with Microsoft TCP/IP.

In charge of MCSE training of setup, maintenance of NT computers, systems hardening, system accounts standards policies (security templates) and maintenance. Additionally, responsible of network connectivity, security, trust, upgrades, troubleshooting (protocols, software, and hardware), system configuration management, contingency planning, media protection and server’s physical protection.

Scala of North America Lake Mary, FL January 1999 - January 2000

Senior Technical Consultant

Responsible for the installation and upgrade of Scala’s accounting application all over US, the Caribbean and South America.

Productivity Point International Santurce, PR June 1997 - November 1998

Senior Technical Instructor

Responsible for delivering technical training for MCSE and MCSD candidates. Delivered seminars and or trainings on Microsoft Certified Development and Network courses, MS Office and Project.

In charge of training MCSE candidates in setup and maintenance of NT computers, systems hardening, system accounts standards policies and maintenance. Additionally, instructed on network connectivity, security, trust, upgrades, troubleshooting (protocols, software, and hardware), system configuration management, contingency planning, media protection, and server’s physical protection.

DRC, Inc. Santurce, PR January 1996 - June 1997

Certified Instructor/Consultant

Worked as an application development consultant and MS Certified Curriculum trainer.

Developed programs that implemented information access and integrity controls coded into program modules.

WSD Corp Rio Piedras, PR September 1994 - January 1996

Owner

In charge of client software, hardware evaluation, for automated solutions. Develop solutions in a Windows environment using Visual Basic 3.00, FoxPro 2.6, Access 2.00, prepared related documentation, and installation of software and servers.

Developed programs that implemented information access and integrity controls coded into program modules.

Interamerican University, Computer Center Guaynabo, PR September 1989 - August 1994

Director

In charge of managing the campus central computing facility operations of as it provided both academic and administrative support to the organization

In charge of budget ($750,000), planning, presentation, and implementation.

Established the first inter-divisional committee, that provided each division technological needs.

Supervised 11 employees.

In charge of systems, service acquisition, protection of systems communications, program management, policy planning, and access controls

AFFILIATIONS

InfraGard

CERTIFICATIONS

Fully Qualified Navy Validator, April 2012

Certified Information Systems Security Professional (CISSP), February 2010

Certified Cisco Network Associate. Cisco Certification (CCNA), October 2009 - June 2012

ITIL Foundations V3, October 2009

MCP. Microsoft, June 2002

MCSE - NT4. Microsoft

MCSD - Visual Basic 6. Microsoft

MCP+Internet. Microsoft

TRAINING

Fully Qualified Navy Validator, April 2012

Cyber Law I, 2011

IA Briefing for Senior Operational Leaders, 2011

NETOPS: An Overview, 2011

NETOPS: Applied to GIG Operation, 2011

Introduction to Continuity of Operations, 2011

Annual Antiterrorism Training, 2011

Annual OPSEC Awareness, 2011

Annual Counterintelligence Training, 2011

DoD Information Assurance Training, 2011

PII Training, 2011

Phishing Ver. 1.0 - Operations, 2011

ITIL Foundations V3, 2009

CISSP, 2009

CCNA, 2009



Contact this candidate