Post Job Free
Sign in

Information Security Cyber

Location:
Lanham, MD
Posted:
November 21, 2024

Contact this candidate

Resume:

Joy Nkeiruka Ohaka

Summary:

Cybersecurity Specialist with 9 years of experience, qualified, respected, dedicated and results-driven professional with a consistent record of success in improving aspects of information security through Patching, Third Party Risk Management, Risk Assessment, Incident Response, Compliance and Policy procedures. Vulnerabilities notification from Microsoft: Investigate within security-microsoft.com and remediate. Maintained, tuned, and analyzed alerts from network security devices including IDS/IPS, NAC, SIEM, Firewalls, and other network devices.

Skills And Training

●Strong communication skills, analytical ability, good judgment, and the ability to work effectively with clients/ users and management.

●Monitors security logs, updates security baselines, and troubleshooting.

●Flexibility and adaptability to work in a growing, dynamic, international team with a strong customer-oriented attitude.

●ServiceNow & Remedy.

●Imaging Medical Devices using AppOS & Patching servers/ devices.

●Knowledgeable in assessing aspects of CyberArk Security System, Active Directory, Ad hocs – DLM, Asset Track

Education:

●Master in Cybersecurity Management and Policy, University of Maryland Global Campus, Baltimore, MD June 2020

●Bachelor of Science Degree in Biology, Bowie State University, Bowie MD Dec. 2010

Certification:

●CompTIA Security+

●Certified Advanced Security Practitioner

●Certified Information Security Manager

●Project Management Professional

Professional Experience

IT Specialist/ Systems Analyst July 2024 - September 2024

DC OCFO

Agency: GoIntellects INC.

●Imaging Cart: Ensure the imaging cart is always full and the slots are stocked.

●Backups: Complete any necessary backups promptly.

●Zendesk Tickets: Keep tech tickets updated, assigned, and follow up on any outstanding issues.

●Absolute Dark Devices: Identify any dark devices, send emails to users, and initiate any necessary investigations.

●Oomnitza Records: Update, archive, and maintain accurate status records.

●Zendesk Tickets: Keep tickets updated

●Software Versions: Remove multiple versions of software identified on computers.

●Kaseya efficiency

●Compliance/ Compliance or compatibility issues.

●Determines enterprise information assurance and security standards.

●Develops and implements information assurance/security standards and procedures.

●Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers’ requirements.

●Identifies, reports, and resolves security violations.

●Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.

●Supports customers at the highest levels in the development and implementation of doctrine and policies.

●Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.

●Performs analysis, design, and development of security features for system architectures.

●Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.

●Designs, develops, engineers, and implements solutions that meet security requirements.

●Provides integration and implementation of the computer system security solution.

●Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.

●Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.

●Ensures that all information systems are functional and secure.

Information Security Specialist April 2022 – March 2024

NASA Federal Credit Union

●Protect the integrity and security of the Credit Union network, data, and infrastructure.

●Identifies, investigates, and resolves security incidents detected by the different systems.

●SecureWorks: verify incident is blocked, if not, investigate and remediate

●CarbonBlack: Review and research file integrity. Proceed to whitelist, block or request management approval if needed. Sometimes must contact the requestor if additional action is needed to complete the approval process.

●CounterAct (NAC): identifies network endpoints the minute they connect to the network.

●Rapid7: Review and remediate. Open case with vendor if additional action is needed.

●Umbrella: Review request and if needed for job functions. Proceed to whitelist within the policy assigned to the requestor. (Sometimes, we must request approval from the manager if necessary.)

●Vulnerabilities notification from Microsoft: Investigate within security-microsoft.com and remediate.

●Microsoft Defender for Cloud Apps: Investigate and remediate.

●Mimecast & Outlook: proficient in using these tools.

●Azure AD: identity and access management solution for multicloud environment

●Demonstrates the ability to identify organizational risk and escalate appropriately.

●Assists with coordination of penetration testing to identify system vulnerabilities.

●Use Wireshark to look at logs when I’m trying to check the traffic across our network. It helps to drill down into the everyday TCP/IP connection issues. Also, it allows me to see the real-time analysis of hundreds of protocols.

●Respond to unauthorized access incidents.

●Maintains, tunes, and analyzes alerts from network security devices including IDS/IPS, NAC, SIEM, Firewalls, and other network devices.

●Manages security patches, fixes, and overall support of security tools consistent with change management practices.

●Provides regular security reporting to management.

●Manages connection security for local area networks, the company website, the company intranet, and e-mail communications.

●Manage and ensure the security of databases and data transferred both internally and externally.

●Research and recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.

IT Specialist June 2021 – April 2022

Exelon – Washington D.C

Agency: TEKSYSTEMS

●Installed new hardware, systems, and software for user workstations and thin clients.

●Troubleshoot end user computer and phone problems. Resolves issues or refers problems to vendor support as appropriate. Assists offsite vendors as needed.

●Managed Symantec Endpoint Management for endpoint malware/anti-virus security.

●Reviewed vulnerabilities using security tools and helping security tools and helping with security documentation.

●Repaired on-site hardware as appropriate.

●Enable peripherals within the bios such as the camera and microphone.

●Uninstalled and installed approved software utilizing Window’s PowerShell ISE

●Operated and troubleshoot Microsoft products such as Teams and Outlook.

●Removed and added devices to the network domain.

●Inventory devices issued out to end users and returned.

●Installed and troubleshoot VPN connection issues.

●Utilized trouble-ticketing software for opening/updating/closing tickets in a timely and appropriate manner.

●Installed, tested, maintained, and upgrade network operating systems software and hardware to comply with IA requirements.

●Worked with System Administrators to ensure secure configurations are used on all systems.

●Quickly adapted and responded in a fast pace changing work environment.

●Worked independently and in a team environment as needed.

●Provided troubleshooting assistance and support for systems/software.

IT Specialist September 2020 – 2/2021

Exelon – Washington D.C

Agency: TEKSYSTEMS

●Installed new hardware, systems, and software for user workstations and thin clients.

●Troubleshoot end user computer and phone problems. Resolves issues or refers problems to vendor support as appropriate. Assists offsite vendors as needed.

●Managed Symantec Endpoint Management for endpoint malware/anti-virus security.

●Reviewed vulnerabilities using security tools and helping security tools and helping with security documentation.

●Repaired on-site hardware as appropriate.

●Enable peripherals within the bios such as the camera and microphone.

●Uninstalled and installed approved software utilizing Window’s PowerShell ISE

●Operated and troubleshoot Microsoft products such as Teams and Outlook.

●Removed and added devices to the network domain.

●Inventory devices issued out to end users and returned.

●Installed and troubleshoot VPN connection issues.

●Utilized trouble-ticketing software for opening/updating/closing tickets in a timely and appropriate manner.

●Installed, tested, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.

IT Specialist Sept 2017 – Sept 2019

Kaiser Permanente, Hyattsville, MD

Agency: Mastech Digital

●Implemented system diagnostic and maintenance tools to ensure the availability and functionality of the system.

●Managed the installation of software and hardware, system fixes, updates, and enhancements.

●Installed and configured commercial off-the-shelf (cots) applications and software/hardware enhancements.

●Ensured application of information security/information assurance policies, principles, and practices while developing procedures responding to new threats to systems to ensure confidentiality, integrity, and availability.

●Served as a technical analyst and primary customer liaison with responsibility for resolving difficult customer problems.

●Ensured delivery of information technology services responsive to customer needs while maintaining installation mission and programs.

●Maintained and monitored security access management accounts for each server and server environments.

●Referred problems requiring highly specialized expertise to the senior technical analyst.

●Assisted in planning and coordinating new systems design, acquisition, testing, installation, and support.

●Evaluated and reports on new tools and trends in the customer support field.

Help Desk 2007 - 2010

Bowie State University

●Maintained computer hardware and software applications inventory for ensuring availability of equipment and instructional material in computer lab.

●Performed routine/ preventative maintenance of computer lab and classroom equipment (e.g. dusting, cleaning, virus scanning, and defragmenting)

●Provided troubleshooting malfunctions of hardware/or software applications to determine appropriate actions to maintain steady computer lab operations.

●Instructed students/ staff in the use of computer lab technology and software applications.

●Documented all issues & generated report detailing common problems.

●Responsible for organizing, modifying, and supporting computer systems in a dynamic Windows environment.

●Identify user needs, and maintain integrity of network, server deployment, and security in the University system.

●Experience in the installation, configuration, tuning, maintenance, administration, upgrade, backup, and recovery of systems.

●Script new user roll-on in batch and computer setup for better efficiency.

●Thoroughly troubleshoot hardware and software issues on various types of hardware such as laptops, desktops, and monitors.

●Assist clients with profile builds and remote connection.



Contact this candidate