Post Job Free
Sign in

Business Analyst Risk Management

Location:
Irving, TX
Salary:
130.000
Posted:
January 26, 2024

Contact this candidate

Resume:

KELLY MASANGO

Irving, TX ***** 612-***-**** ***********@*****.***

SUMMARY

Multi-talented IT professional with over 10+ years' experience developing and implementing security controls in fast-paced environment, Third-party vendor risk & Compliance Analyst. Committed expert in reviewing and implementing internal control procedures to ensure efficiency and risk mitigation, vulnerability management, risk assessment, corrective action plan, continuous monitoring PCI DSS, HIPPA, HITRUST, ISO 2700 NIST 800, FISMA, and FEDRAMP. Skilled in security and privacy control assessment with proven history of delivering exceptional risk management support (Risk Management Framework (RMF). Skilled in assembling authorization package using documents like NIST 800 series, FIPS 199, FEDRAMP. Implement new security solutions as well as conduct vulnerability assessments and compliance audits to ensure that systems obtain and maintain their ATO's while interfacing with stakeholders in an interdisciplinary environment. Solutions-oriented Business Analyst possessing unique combination of business analysis, quality assurance testing and applications development experience in top-tier organizations. Solid SQl query writing skills paired with familiarity of visualization tools and techniques. Successful provider of financial services with 10 years of comprehensive experience. Solutions-oriented Business Analyst possessing unique combination of business analysis, quality assurance testing and applications development experience in top-tier organizations. Solid SQl query writing skills paired with familiarity of visualization tools and techniques. Successful provider of financial services with 8 years of comprehensive experience. Flexible and versatile Business Analyst specializing in developing innovative solutions to organizational problems. Advanced knowledge of asset tracking software. Committed to providing accurate, effective advice to customers. Detail-oriented risk management specialist versed in financial analysis and reporting. Brings advanced understanding of market conditions and trends, risk mitigation strategies and financial decision-making. Expert in diverse statistical analyses techniques. Adept at uncovering fraud and suspicious transactions. Well-versed using strong attention to detail and systematic approach to review daily merchant portfolio batches. Good report writing and recordkeeping abilities.

SKILLS

Risk Management Framework

Expert Knowledge of NIST SP 800

Special Publication Series/FISMA

requirements.

Vulnerability Scan analysis with

Nessus, dB Protect, & Web Inspect

scanning tools, Qualys, Nmap

Knowledge of Enterprise Risk

models and tools as well as a

good understanding of Enterprise

Risk framework.

Excellent written communication

and documentation skills

Compliance /Audits

Vendor Risk/ Third-Party Security

Risk Management

Operational Reporting

Data Mapping

Data Mining

Business Planning

Requirements Gathering

Internal Auditing

Strategic Planning

Technical Writing

Quality Assurance

Competitive Analysis

KPI Tracking

Cost-Benefit Analysis

Product Management

Revenue Development

Search Engine Optimization

Needs Assessments

Plan of Action and Milestones

(POA&M)

LogMeIn/One-Trust Tool and Jira,

Service now, knowBe4

Fed Ramp Compliance

SOC Reports, and SIG Review

Excellent analytical, decision-

making, and problem-solving skills

Multi-tasking work independently

and with team

Strong skills in MS PowerPoint, MS

Word, and MS Excel

Risk Mitigation Strategies

Stress Testing

Data Interpretation

Internal Audits

Employee Safety

Risk Mitigation

Trend Analysis

Incident Investigations

Analytical Mindset

Mediation

Claims Management

Data Analysis

Quantitative Analysis

Root Cause Analysis

Operations Analysis

Campaign Performance Tracking

Workflow Analysis

Customer Needs Assessment

Business Process Improvement

Gap Analysis

User Acceptance Testing

Project Management

CRM Systems

Stakeholder Management

Financial Advising

Product Development

Pivot Tables

Operations Management

Microsoft Office Suite

Human Resources Information

Systems (HRIS)

HTML and CSS

BI Tools Expertise

SAP

Consulting

Negotiation

Staff Management

Customer Targeting

Forecasting and Planning

EXPERIENCE

07/2021 - Current Risk Management Analyst

SNF Inc. - Fort Worth, Texas

Conducted Privacy Threshold Assessment to determine if there have been any changes that might lead to PII collection and Privacy Impact Analysis Vast knowledge in all aspects of Security Authorization and Continuous Monitoring process using National Institute of Standard Publications 800-30, 800-37 Rev 2, 800-60, 800-53 Rev 5, 800-53(a) Rev 5, 800-171, FIPS 199, FIPS 200

Experience in remediating vulnerabilities and defect fixes by working closely with development leads and engineers

(Emergency on-call ISSO)

Managing and ensuring information systems security is secured within my organization for systems that are under my care

Conducting continuous monitoring, risk assessments, monitoring security compliance, practicing security training, and responding to security incidents

Security Control Selection: Based on the categorization of the information system, I select security controls using NIST 800-53 Rev 5 Set up meetings with the common control providers to identify system- specific and hybrid controls and tailor the control based on the organization's mission and needs

Work with developers, system administrators, and third parties such as vendors and Cloud Service providers (CSP) to ensure that the controls are implemented and document all approved controls in the SSP Assist with the development and maintenance of all necessary A&A documents

Experience using the Risk Management Framework (RMF) to support the A&A process, including analyzing the development of supporting policies, procedures, and plans, designing, and implementing security controls I play a crucial role in safeguarding sensitive data and maintaining the integrity, confidentiality, and availability of information systems under my care

Knowledge of Federal regulatory bodies such as the Office of Management Budget (OMB), National Institute of Standards and Technology (NIST), Federal Information Security Management Act of 2002

(FISMA), Federal Risk and Authorization Management Program (FedRAMP) Tracking IT security risks by monitoring POA&Ms that exceed the remediation timelines established in the vulnerability, management plan and ensuring valid risk mitigation plans are in place Provide coordination, tracking, and management through all aspects of the initial and recurring A&A processes.

Investigated incidents related to security breaches, malware infections, or other cyber-attacks.

Issued clear warnings to violators, outlining infractions, penalties and remediation steps.

Analyzed system logs regularly to identify suspicious activity or unauthorized access attempts.

Conducted regular audits to ensure compliance with internal controls, applicable laws, and regulations.

Investigated reported and identified compliance issues against accepted standards.

Followed proper protocols for reporting suspected violations to internal personnel or outside governing agencies.

Established working relationships with regulatory agencies. Facilitated adherence to safety and regulatory objectives and managed client-specific projects, training programs and personnel background checks.

Analyzed data to provide insights and recommendations for mitigating conduct risk.

Developed and implemented strategies necessary for minimizing risk of non-compliance.

Issued official approvals in instances of achieved or exceeded compliance standards.

Established internal controls and processes to support compliance through project management and engagement of key stakeholders. Liaised between regulatory agencies and internal departments to facilitate regulatory and related matters.

Collected and reviewed data to identify potential compliance issues requiring further review.

Researched emerging technologies that can improve the organization's overall security posture.

Evaluated vendor services for compliance with organizational requirements regarding data protection.

Monitored compliance risk controls to identify deviations and offer recommendations.

Performed periodic vulnerability scans to identify potential points of entry into the network.

Recruited, hired and oversaw team of personnel maintaining [Type] compliance.

Utilized risk management techniques and business knowledge to improve compliance programs.

Developed systems to track and monitor compliance with regulatory requirements and internal policies.

Conducted reviews to foster ongoing compliance with federal and local regulations.

Stayed abreast of applicable laws and state or federal regulation to report violations.

Documented all processes related to systems administration tasks performed by IT personnel.

Monitored network traffic using intrusion detection software to detect potential threats or malicious activities.

Used proprietary systems to process applications, filings and registrations. Provided guidance on how best to respond when faced with a security incident.

Reviewed existing applications for security vulnerabilities or weaknesses before deployment into production environments.

Produced reports outlining assessments completed and follow-up recommendations.

Maintained compliance frameworks, policies and documentation to support audits.

Identified areas of risk within the system and worked to eliminate them through appropriate solutions.

01/2018 - 07/2021 Information System Security Officer (ISSO) Acuity Brands - Irving, Texas

Conducting risk assessments and collaborating with clients to provide recommendations regarding critical infrastructure, network security operations and Continuous Monitoring processes

Coordinating with team members to perform in-house security risk assessments (SRA)

Providing high-level analysis of data security to identify significant gaps in controls on Information Systems

Performing security oversight of security and compliance requirements of FISMA, NIST, HIPAA, PCI-DSS

Identifying and analyzing threats, providing mitigation strategies, and documents and presenting the impact of resulting threats including security gaps to management

Developing, coordinating, implementing, and maintaining cybersecurity policies, standards, and procedures to protect the security and integrity of information systems and data

Assisting System Owners with developing and reviewing Interconnection Security Agreements, and Memoranda of Understanding Responding to IT Security trouble tickets generated by customers and IT staff

Identifying solutions, working with customer and OCIO team to execute solutions, and managing ticket input, updates, and resolution in the OCIO ticketing system to maintain service level agreements Performing system assessments and reaccreditations within required timeframes and reviewing proposed system changes for security impact Prepare requests for waivers and exceptions and providing advice and assistance to stakeholders on security-related issues Identifying and prioritizing information security risk advise business partners on security/privacy requirements and solutions to ensure compliance Creating, updating and revising Planning documents such as System Security Plans, Contingency Plans, Incident Response and Plan of Action & Milestone Collaborating with SOC engineers to perform continuous monitoring of systems to ensure security and compliance Reviewing new and existing systems to ensure baseline security requirements are met and to recommend security enhancements Generating, reviewing, and updating the SSP against NIST 800-18 and NIST 800-53 requirements

Performing POA&M remediation and evaluating policies, procedures, security scan results and system settings to go through the SA&A and continuous monitoring

Determining security controls effectiveness (i.e., controls implemented correctly, operating as intended, and meeting security requirements) Evaluating threats and vulnerabilities based on Nessus tenable reports and Implementing Risk Management Framework (RMF) in accordance with NIST SP 800-37

Classifying and categorizing Information Systems using the RMF processes to ensure system Confidentiality, Integrity, and Availability Selected security control and applied allocated control inheritance in Archer

Ensuring all documentation pertaining to key management policies and procedures reflects current practice within the organization Working with the client and internal development team to identify security gaps and resolve them to protect client data and reduce business risk. 05/2015 - 01/2018 Sr. Security Analyst

Security Manufacturing - Irving, Texas

Selected security control and applied tailoring and control inheritance in Cyber Security Assessment Management (CSAM)

Created POA&Ms and POA&M milestones and requested for POA&M closure using the CSAM tool

Assisted and recommended policies, standards, procedures, and controls to assure the confidentiality, integrity, and availability of the information technology environment for on-premises as well as cloud-hosted IT applications and infrastructure

Analyzed the type of information collected, processed, maintained, disseminated, transmitted, or stored by or through the information system and determined whether it contained privacy data and financial data, and then determined the security impact that might have resulted from the unauthorized disclosure, modification, or loss of availability of this information

Conducted Security Test and Evaluation (ST&E) assessment and populated Requirement Traceability Matrix (RTM) based on NIST SP 800-53A Reviewed the provisional impact levels (NIST-recommended) for appropriateness based on the organization's mission and considered whether the NIST- recommended impact level was appropriate for the System or whether the impact level should be modified to a lower or higher level and then provided the rationale for the adjustment Managed IT Security awareness training program in coordination with the Learning Management team, to including developing and delivering IT Security awareness training modules

Coordinated activities related to internal and external assessments and/or audits of information technology systems and processes, interpreted results and developed and communicated recommendations to management Managed Password Management system in coordination with Service Desk

Provided support and recommendations to various application users and proactively identified, diagnosed, took corrective action, and resolved application system incidents and problems

Then, documented, communicated, and escalated technical issues, managed them to resolution, and articulated business impact Collaborated closely with the IT team and vendors to understand the overall application architecture/design and, as warranted, submitted change requests for system improvements, recommended and implemented system changes and enhancements, and participated in planning sessions regarding the application, hardware, and software changes

Developed and recommended appropriate information security policies, standards, procedures, checklists, and guidelines using generally recognized security concepts tailored to meet the requirements of the organization for on-premises as well as cloud-hosted IT applications and infrastructure

Established, implemented, and managed security procedures and practices in support of customer requirements and objectives. 11/2013 - 02/2015 Vendor Risk Analyst / Information Assurance EJ Ajax & Sons - Minneapolis, MN

Actively reviewed vendor compliance documents from a BCP/DR and Data Security perspective ensuring document meet all corporate guidelines and specifications

Managed the maturity and execution of the division's Third-Party IT Risk Management program to reassess current risks and to identify emerging key risks

Planned, designed and executed IT compliance testing, controls assessment and documentation across all domains for IT General Controls,

(PCI DSS) Payment Card Industry, Data Privacy, HIPAA and other compliance requirements, as appropriate

Develop and update compliance control and process documentation as required in support of SOC2 initiatives

Tracked compliance processes such as remediation plans, audit requests, and recurring audit reviews to ensure timely completion Performed Risk and Control assessments for all Third-Party Service Providers to evaluate effectiveness of control systems

Ensured vendors adherence to contractual/regulatory compliance to minimize the risk of fines and reputational harm

Demonstrated in-depth understanding of security requirements associated with cloud- hosted environments, services, and solutions Reviewed services provided by vendor and defined scope of assessment based on the Standardized Information Evaluates, recommends, and implements security controls associated with cloud-hosted environments, services, and mobile device solutions

Gathered (SIG) questionnaire and audit reports

Forged strong working relationships with vendors to ensure seamless audits. Monitored daily and long-term routes for weather, traffic, and other conditions.

Studied product and industry specs and prices to update signage and complete merchandising activities.

Listened to customer needs to identify and recommend best products and services.

Advised senior leadership on issues concerning vendor relations. Resolved conflicts between vendors and internal stakeholders in a timely manner.

Reset store displays for special events and seasonal merchandise changes.

Tracked contract renewals, expirations, amendments, and terminations. Developed and implemented strategies for vendor onboarding, training, and performance management.

Identified customer needs by asking questions and advising on best solutions.

Monitored vendor performance against contracted service level agreements.

Verified accuracy of boxed merchandise against documentation to reduce errors.

Maintained well-stocked and organized sales floor with latest merchandise to drive sustained sales revenue.

EDUCATION AND TRAINING

Bachelor's degree in Law

University of Yaoundé 2 - Cameroon

CERTIFICATIONS

Certified Information security manager (CISM)

CompTIA Security +

Qualys Vulnerability Analyst Certifie

CISSP in Progress

Oracle Database Administrator Certified Associate 11g



Contact this candidate