Post Job Free

Resume

Sign in

Information Security Cyber

Location:
Lanham, MD
Posted:
November 27, 2023

Contact this candidate

Resume:

Joy N. Ohaka

Lanham MD Tell: 240-***-**** Email: ad1hin@r.postjobfree.com

OBJECTIVE

IT Analyst with 9 years of experience, qualified, respected, dedicated and results-driven professional with a consistent record of success in improving aspects of information security through Third Party Risk Management, Risk Assessment, Incident Response, Compliance and Policy procedures. In addition, great team player, reliable, hard worker with great time management skills.

SKILLS AND TRAINING

Strong communication skills, analytical ability, good judgment, and the ability to work effectively with clients and IT management and staffs.

Highly technical and agile, can quickly adapt and become proficient administering, engineering, and supporting various cyber security controls and technologies.

People skills, and the ability to communicate effectively with various clients with the ability to explain and elaborate on technical details.

Monitors security logs, scrutinizing anomalous infrastructure events, establishing, and updating security baselines, and troubleshooting.

Participates in audit support activities, as they pertain to Information Security, for both internal and external audits. Perform audit support tasks as assigned.

Participates in audit support activities, as they pertain to Information Security, for both internal and external audits. Perform audit support tasks as assigned.

Strong focus on innovation and respond quickly and confidently to change.

Knowledge and proficiency in technical writing

Flexibility and adaptability to work in a growing, dynamic, international team with a strong customer-oriented attitude

Strong verbal and written communication skills with the ability to communicate to all levels of the organization

ServiceNow & Remedy, AppOS, Mimecast

Imaging & Patching.

Knowledgeable in assessing aspects of CyberArk Security System, Ad hocs – DLM, Asset Track

EXPERIENCE

Information Security Administrator (ISA) April 2022 - Present

NASA Federal Credit Union

Design and implement safeguards to minimize risks, maintain compliance, and enable security.

Protect the integrity and security of the Credit Union network, data, and infrastructure.

Administer and maintain end user accounts, permissions, and access rights.

Facilitates the day-to-day operations of the in-place security solutions.

Identifies, investigates, and resolves security incidents detected by those systems.

Participates in the implementation of new security solution.

Participates in the creation and or maintenance of policies, standards, baselines, guidelines and procedures, and reports.

Demonstrates the ability to identify organizational risk and escalate appropriately.

Keeps current with emerging security alerts and issues.

Demonstrates familiarity with the NIST Cybersecurity Framework.

Enforces established policies, procedures and associated plans for system security administration and user system access.

Reviews logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.

Assists with coordination of penetration testing to identify system vulnerabilities.

Assists with audit or examination preparations and required responses.

Applies scheduled fixes and security patches consistent with change management practices.

Participates in investigations into anomalous security activity.

Ability to research, analyze and resolve complex problems with minimal supervision and escalate issues as appropriate.

Implements and maintains policies, procedures and associated plans for system and network security administration and user system access. Oversee enforcement of these policies and procedures.

Respond to unauthorized access incidents or member information usage that could result in substantial harm or serious inconvenience to a member.

Maintains up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.

Performs the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.

Performs and/or oversee penetration testing of all systems to identify system vulnerabilities.

Assist with documenting responses to external audits, intrusion attempts, risk assessments, cyber-crime, and vulnerability assessments.

Performs and documents risk assessments, as well as investigates and remediates independent risk assessments.

Maintains, tunes, and analyzes alerts from network security devices including IDS/IPS, NAC, SIEM, Firewalls, and other network devices.

Manages security patches, fixes, and overall support of security tools consistent with change management practices.

Manages security-related incident response activities and security breach remediation.

Maintains operational security and cyber-security operations (e.g., incident response, security infrastructure management and monitoring services).

Provides regular security reporting to management.

Manages connection security for local area networks, the company website, the company intranet, and e-mail communications.

Manage and ensure the security of databases and data transferred both internally and externally.

Download and tests new security software and/or technologies.

Provide on-call support for end users for all in-place security solutions.

Provide security information and reporting to the Information Security Oversight Committee (ISOC).

Identifies reasonably foreseeable internal and external risks to the security, confidentiality, and/or integrity of any electronic, paper, or other records containing PI and PHI.

Provide technical guidance to junior staff.

May provide support for projects that require security expertise. Typically consults with project teams addressing projects of moderate size and complexity and where the security issues are clear.

Act as an expert providing direction and guidance to process improvements and establishing policies.

Diagnose security issues that may involve extensive analysis and recommends resolutions to management.

Research opportunities to resolve persistent IT security issues and improve overall IT security architecture.

Contribute to the development of controls and processes improving information security services.

Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts.

Research and recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.

Deploy and/or manages all security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software.

May develop procedures for the execution of security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company systems (e.g., email, data, ecommerce and other internal or customer facing systems).

Lead information security resources for projects.

Manage the analysis and reporting of security activities to management.

IT Specialist June 2021 – April 2022

Exelon – Washington D.C

Installed new hardware, systems, and software for user workstations and thin clients.

Troubleshoot end user computer and phone problems. Resolves issues or refers problems to vendor support as appropriate. Assists offsite vendors as needed.

Managed Symantec Endpoint Management for endpoint malware/anti-virus security.

Reviewed vulnerabilities using security tools and helping security tools and helping with security documentation.

Repaired on-site hardware as appropriate.

Enable peripherals within the bios such as the camera and microphone.

Uninstalled and installed approved software utilizing Window’s PowerShell ISE

Operated and troubleshoot Microsoft products such as Teams, Outlook.

Removed and add devices to the network domain.

Inventory devices issued out to end users and returned.

Installed and troubleshoot VPN connection issues.

Utilized trouble-ticketing software for opening/updating/closing tickets in a timely and appropriate manner.

Installed, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.

Worked with System Administrators to ensure secure configurations are used on all systems.

Quickly adapted and responded in a fast pace changing work environment.

Worked independently and in a team environment as needed.

Provided troubleshooting assistance and support for systems/software.

IT Specialist September 2020 – 2/2021

Exelon – Washington D.C

Installed new hardware, systems, and software for user workstations and thin clients.

Troubleshoot end user computer and phone problems. Resolves issues or refers problems to vendor support as appropriate. Assists offsite vendors as needed.

Managed Symantec Endpoint Management for endpoint malware/anti-virus security.

Reviewed vulnerabilities using security tools and helping security tools and helping with security documentation.

Repaired on-site hardware as appropriate.

Enable peripherals within the bios such as the camera and microphone.

Uninstalled and installed approved software utilizing Window’s PowerShell ISE

Operated and troubleshoot Microsoft products such as Teams, Outlook.

Removed and add devices to the network domain.

Inventory devices issued out to end users and returned.

Installed and troubleshoot VPN connection issues.

Utilized trouble-ticketing software for opening/updating/closing tickets in a timely and appropriate manner.

Installed, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.

Worked with System Administrators to ensure secure configurations are used on all systems.

Quickly adapted and responded in a fast pace changing work environment.

Worked independently and in a team environment as needed.

Provided troubleshooting assistance and support for systems/software.

IT Specialist Sept 2017 – Sept 2019

Kaiser Permanente

Implemented system diagnostic and maintenance tools to ensure the availability and functionality of the system.

Managed the installation of software and hardware, system fixes, updates, and enhancements.

Installed and configured commercial off-the-shelf (cots) applications and software/hardware enhancements.

Ensured application of information security/information assurance policies, principles, and practices while developing procedures responding to new threats to systems to ensure confidentiality, integrity, and availability.

Served as a technical analyst and primary customer liaison with responsibility for resolving difficult customer problems.

Ensured delivery of information technology services responsive to customer needs while maintaining installation mission and programs.

Maintained and monitors security access management accounts for each server and server environments.

Referred problems requiring highly specialized expertise to the senior technical analyst.

Assisted in planning and coordinating new systems design, acquisition, testing, installation, and support.

Evaluated and reports on new tools and trends in the customer support field.

Help Desk 2007 - 2010

Bowie State University

•Maintained computer hardware and software applications inventory for ensuring availability of equipment and instructional material in computer lab.

•Performed routine/ preventative maintenance of computer lab and classroom equipment (e.g. dusting, cleaning, virus scanning, and defragmenting)

•Provided troubleshooting malfunctions of hardware/or software applications to determine appropriate actions to maintain steady computer lab operations

•Instructed students/ staff in the use of computer lab technology and software applications

•Documented all issues & generated report detailing common problems

•Responsible for organizing, modifying, and supporting computer systems in a dynamic Windows environment.

•Identify user needs, and maintained integrity of network, server deployment, and security in the University system.

•Experience in the installation, configuration, tuning, maintenance, administration, upgrade, backup, and recovery of systems.

• Script new user roll-on in batch and computer setup for better efficiency.

•Thoroughly troubleshoot hardware and software issues on various types of hardware such as laptops, desktops, and monitors.

•Assist clients with profile builds and remote connection.

EDUCATION

University of Maryland Global Campus, Baltimore, MD

Master in Cybersecurity Management and Policy June 2020

Bowie State University, Bowie MD

Bachelor of Science Degree in Biology, Dec. 2010

Minor: Chemistry

CERTIFICATION

CompTIA Security+

Certified Advanced Security Practitioner

Certified Information Security Manager In progress



Contact this candidate