Post Job Free

Resume

Sign in

Security Analyst Customer Service

Location:
Waldorf, MD
Posted:
January 09, 2024

Contact this candidate

Resume:

COMFORT A. ATOH

CYBER SECURITY ANALYST.

CERTIFICATES

COMPTIA, CASP+

CERTIFIED SCRUM MASTER

ORACLE OCA CERTIFIED,

BACHELORS IN HCM

SECRET CLEARANCE ACTIVE

Maryland

ad2l6r@r.postjobfree.com TEL 240-***-****

PROFESSIONAL SUMMARY:

•Security Analyst working experience of over 4 -6 years of performing research, analysis, and troubleshooting to identify, resolve, and explain complex cybersecurity and physical security issues

•Cybersecurity, incident management, and IT compliance support across the enterprise infrastructure

•Assessed risks and threats of theft, explosions, fire, emergency evacuations, and unauthorized access capabilities; site, facility, restricted areas, materials, and information

•Cybersecurity capabilities and risk management in line with the Systems Engineering Life Cycle and consistent with technical requirements to ensure network and IT systems are protected against cyber-attacks and malicious intrusion

•Have a combine ability of technical abilities, communication skills, and ability to multitask that allow me to collaborate with end-users or business.

•Great attention to detail, and ability to work effectively as a team member with excellent communication, strong analytical and collaborative skills.

•With the capability of adapting to new and fast-changing technologies

•Creates and document reports, rules, trends and dashboards.

•Analyzes ArcSight and related tools and resolved IT secuirty failures.

•Performs Splunk tuning and filtering of alerts and monitoring components to ensure only relevant secuirty data are gathered.

•Security policies interpretation and implementation requirements to ensure confidentiality, integrity, availability of information, systems, and network.

•Performed research, analysis, and troubleshooting to identify, resolve, and explain complex security issues to members of the company.

•Security Assessment and Authorization (SA&A) professional with in-depth knowledge in Risk Management Framework (RMF), Systems Development Life Cycle (SDLC), security life cycle and vulnerability management using FISMA, and applicable NIST standards.

•Working knowledge of different Operating Systems such as Linux, Solaris and Windows

•Assists in the gathering and preservation of evidence used in the prosecution of computer thief. Identify IT security program implications of new technologies or technology upgrades

•Conduct IA cost benefit, economic and risk analysis in the IT acquisition decision making process.

•• Interpret security requirements relative to the capabilities of new information technologies. Interprets patterns of non-compliance to determine their impacts on levels of risk and/or overall effectiveness of IA programs.

•• Analyze and identify security strategies and recommends the best approaches and/or practices. Monitor and evaluate the effectiveness of IA security procedures and safeguards to ensure they provide the intended level of protection.

•Over-see the preparation of Risk Management Framework (RMF) cybersecurity certification and accreditation documentation plus identify and verify scanning requirements and remediation task order assigned cybersecurity enclaves.

• Security policies interpretation and implementation requirements to ensure confidentiality, integrity, availability of information, systems, and network.

•Performed research, analysis, and troubleshooting to identify, resolve, and explain complex security issues to members of the company.

•Security policies interpretation and implementation requirements to ensure confidentiality, integrity, availability of information, systems, and network.

•Performed research, analysis, and troubleshooting to identify, resolve, and explain complex security issues to members of the company.

•Security Assessment and Authorization (SA&A) professional with in-depth knowledge in Risk Management Framework (RMF), Systems Development Life Cycle (SDLC), security life cycle and vulnerability management using FISMA, and applicable NIST standards.

•Working knowledge of different Operating Systems such as Linux, Solaris and Windows

•Maintain data standards, including adherence to the Data Protection Act.

•Write database documentation, including data standards, procedures, and definitions for the data dictionary (metadata).

•Perform backup/recovery and refresh of databases using the best practices followed in the industry and Database team.

•Performance monitoring/tuning/troubleshooting on for systems in with the company SLA

•Ability in building operating system on servers in linux, knowledgeable in configuring kvm virtual machines, input memory and allocate it as needed by the company.

•Innovative IT professional with a proven track record for managing and leading various large-scale business projects from ideation to implementation using agile practices. Total 9 years’ experience in IT, Worked with business stakeholders, project teams and other personnel to coordinate efforts of team members to deliver on deadlines. Used Atlassian products (Jira, Confluence) to track metrics and for documentation.

•Facilitate all scrum ceremonies: daily stand-up, sprint planning, sprint review/demo, and retrospective meeting.

•Worked closely with Product Owners and Stakeholders to establish a simple, solid, and understandable product backlog, then work with cross-functional teams to help understand the product backlogs as well as write good user stories.

•Facilitate the removal of impediments for the team by targeting the issue internally within the team, escalating to the right company personnel or to other external teams as needed.

•Successfully determined gaps in the team’s efforts and performance; developed and implemented improvement plans and strategies.

•Developed weekly agile metrics reports and dashboards for senior management including capacity tracking, task burn-downs, story burn-ups, and velocity metrics.

•Assisted with internal/external communications and encouraged sharing of information on the task board to help improve transparency.

•Resolved issues and conflicts which affected management, technology peers and business partners.

•Provided escalation to senior management when appropriated. Provided accurate project task estimates and resource planning forecasts. Worked with the product owner on grooming and prioritizing product backlog items.

•Researched Agile/Scrum techniques and shared findings with the team, keeping the team practices up to date, constantly evolving into highly efficient, and self-organizing teams.

•System resource management including bottleneck detection, contention tuning on SGA, CPU, Memory and I/O etc.

•Ability to prioritize and meet operational deadlines in fast paced environment with good stress management skills.

•SQL Net installation/configuration/troubleshooting (Server and Client side

•Storage Management including fragmentation detection, tablespace growth ratio.

•Excellent interpersonal and strong analytical, problem-solving skills.

•Monitored the alert logs and troubleshot the errors.

Skill Sumary

Technologies and Tools: MS Office (Word, Excel, Outlook, PowerPoint, Access); Wireshark, ArcSight, Splunk, SharePoint, Nessus, Burp Suite, NMAP, Yara, Thunderbird, Snort, Cain and Abel, Ophcrack, OurSecret, Cryptool 2 Remedy, VMware, CSAM, STIGs, and Security Content Automation Protocol (SCAP), Oracle (Oracle Enterprise Manager, SQL*Plus, SQL Loader, DB Configuration Assistant) Toad, OEM Grid, RMAN, SQL*Loader, Exp/Imp/Data Pump, Log Miner, Statspack/AWR, Top, DBCA, DBUA, ADDM, Remedy, BMC Control-M, SSMS, MySQL Workbench, and pgAdmin.

Software Development Life Circle (SDLC); Communication; Iteration/Sprint Planning

Tasking Meetings/Retrospectives

Project Management Tools

• Jira, Confluence, Rally, TFS, Rational, Visual Studios,

OTHER TOOLS USED FOR SCRUM.

MS word, MS Excel, MS PowerPoint, MS Outlook, Google Apps, Zoom, Skype for Business, Join Me, Google Hangouts, webex for meetings, Microsoft Teams, Slack

Operating Systems and Databases:

MS Windows, UNIX, MS SQL Server, MS Access, UNIX (Solaris 8/9/10), AIX, HP-UX), LINUX, WINDOWS 2008, 2012 Centos 7

Oracle 10g, 11g, 12c, 19c SQL server 2008, 2012, MySQL 5.0, 5.0, OAM Confoguration 12c, oracle access ment, configured OUD, CONFURE ORACLE HTTP,, ORACLE WEBGATE FileMaker 16

Specialties Skills Cloud computing, System Administration, Security Analyst, Application Support, Project Management, Strong Analytical & Collaboration, Technical Support & Customer Service, Cyber kill chain methodology, MITRE ATT&CK framework, Incidence response, Vulnerability Management, RMF, NIST 800

PROFESSIONAL EXPERIENCE:

Information Security Analyst / Assurance Analyst.

DSA/JPEO-CNRND .

May 2022 – Present

Conducts security control Assessment to assess the adequacy of management, operational, privacy, and technical security controls implemented.

Develops, coordinates, implements, and maintains standards and procedures to protect the security and integrity of information systems and data.

Observes and analyses traffic to learn valuable lessons from known malicious actors and to determine countermeasures against such threats.

Daily review of logs and alerts from IDS/IPS devices, DLP system, and Splunk.

Provides high-level analysis of security data to identify significant activity.

Performs vulnerability scanning with Nessus to detect potential risks on single or multiple assets across the enterprise network.

Leverage Nessus to identify systems compliance risk levels, identify non-compliance issues, security vulnerabilities and manage remediation activities.

Keeping Track on the Company Asset Management List, by Conducting and updating IT Equipment Hand Receipts Annually.

Communicates security gaps with remediation recommendations to systems owner management.

Provides support and security overview on cloud-based solutions implementation, including private, community, hybrid, and public cloud deployment models.

Develops, reviews, and evaluated System Security plan based NIST special publications SP 800-53r4.

Possessed a unique combination of technical abilities, communication skills and ability to multitask that allow me to collaborate with end-users or business

Provides detailed status updates on existing cybersecurity incidents daily to include follow up with client/customer to ensure satisfactory resolution.

Develops risk assessment reports, identifying threats and vulnerabilities applicable to the system.

Evaluates the likelihood that vulnerabilities would be exploited and assess the impact associated with this threat and vulnerabilities.

< Experience working on SIPR&NIPR on eMASS, working on diffirent systems

Monitoring packages on eMASS.

Categorized information on the system and aplied the control necessary to implement on those systems.

Deployed artifacts and export to the systems needed by the teams.

Experience upgrading server operating systems, tech refresh, imaging, patch management

Investigate and research issues, determine the impact, and provide remediation and document root cause analysis (RCA) when required and Performs mitigation required to protect critical resources.

Conducts kick-off meetings to categorize the system according to NIST requirements of Low, Moderate, or High System. FIPS 199 and SP 800-60

System Security Analyst/Oracle dba

AVANCO INTERNATIONAL

September 23th 2020 – February 2022

Provides high-level analysis of security data to identify significant activity.

Performs vulnerability scanning with Nessus to detect potential risks on single or multiple assets across the enterprise network.

Leverage Nessus to identify systems compliance risk levels, identify non-compliance issues, security vulnerabilities and manage remediation activities.

Communicates security gaps with remediation recommendations to systems owner management.

Develops, coordinates, implements, and maintains standards and procedures to protect the security and integrity of information systems and data.

Observes and analyses traffic to learn valuable lessons from known malicious actors and to determine countermeasures against such threats.

Daily review of logs and alerts from IDS/IPS devices, DLP system, and Splunk.

Provides support and security overview on cloud-based solutions implementation, including private, community, hybrid, and public cloud deployment models.

Develops, reviews, and evaluates System Security plan based NIST special publications SP 800-53r4.

Possessed a unique combination of technical abilities, communication skills and ability to multitask that allow me to collaborate with end-users or business

Provides detailed status updates on existing cybersecurity incidents daily to include follow up with client/customer to ensure satisfactory resolution.

Develops risk assessment reports, identifying threats and vulnerabilities applicable to the system.

Evaluates the likelihood that vulnerabilities would be exploited and assess the impact associated with this threat and vulnerabilities.

Experience upgrading server operating systems, tech refresh, imaging, patch management

Investigate and research issues, determine the impact, and provide remediation and document root cause analysis (RCA) when required and Performs mitigation required to protect critical resources.

Conducts kick-off meetings to categorize the system according to NIST requirements of Low, Moderate, or High System. FIPS 199 and SP 800-60

Conducts security control Assessment to assess the adequacy of management, operational, privacy, and technical security controls implemented.

Prepares systems certification and Accreditation package, making sure that management, operational, and technical security controls adhere to a formal and well-established security requirement authorized by NIST 800- 53r4.

Develops Security Assessment Report (SAR) detailing the results of the assessment along with the Plan of Action and Milestones (POA&M)

Conduct follow up meetings to assist information system owners to close/remediate POA&M items

Develops System Security Plans (SSP) to provide an overview of system security requirements and describe the controls in place or planned by information system owners to meet those requirements

Conveys verbal briefings to management on pending cyber incidents as necessary and make recommendations to senior management on results of analysis and work closely with other Information Technology groups to refine and enhance security controls

Monitors security patch levels of servers, workstations and network environments, and anti-virus systems

Investigates and research security issues, determine impact, and provide remediation and document RCA when required and Performs mitigation required to protect critical resources.

Supports infrastructure hardening and Security Administration & Installation on multiple systems

Performs monitoring and capacity planning in anticipation of system resource usage and needs

Verify the application of security patches within NIST and enterprise guidelines

Ensure compliance of operations with various regulatory authorities like HIPPA, Data Privacy Acts amongst others.

Information Security Analyst/oracle database administator

DXC/BOEING

March 2018 to August 2020

Responsibilities

• Maintaining, reviewing and updating Information System Security documentations, to include but not limited to System Security Plan (SSP), Plan of Action & Milestone (POA&M), Risk Assessment (RA), policies and procedures, security control baselines in accordance with NIST guideline and security practices.

• Conduct IT Controls risk assessment to identify system threats, vulnerabilities and risk, and generate reports.

• Develop and Conduct Security Test and Evaluation (ST&E) according to NIST SP 800-53A.

• Develop System Security Plan (SSP) to provide an overview of the system security requirements and the needed security controls.

• Develop Security Assessment Report (SAR) detailing the results of the security controls assessment along with Plan of Action& Milestones (POAM).

• Create standard templates for required security assessment and authorization documents; System Security Plan (SSP), Contingency Plan (CP) and Security Plan (SP).

• Conducted periodic IT Risk Assessment and Reviewed IA controls for any deficiencies and reported to the ISSO for appropriate mitigation actions.

• Assisted in the development of an information security continuous monitoring strategy.

Monitor computer networks and analyze packets captured using Wireshark to identify potential security issues.

Work with other teams to identify potential threats to various aspects of the network.

Performs vulnerability scans using Nessus to detect potential risks assets across the enterprise network.

Leverage Nessus to identify systems compliance risk levels, identify non-compliance issues, security vulnerabilities and manage remediation activities.

Follow up to ensure security vulnerabilities identified are regularized promptly by respective teams.

Communicate security gaps with remediation recommendations to respective system owners.

Investigate security breaches and other forms of cybersecurity incidents and report accordingly.

Document security incidents and assess the extent of the damage caused.

Develops, coordinates, implements, and maintains standards and procedures to protect the security and integrity of information systems and data.

= Determine countermeasures against threats identified from analyzing network traffic.

= Review of logs and alerts from IDS/IPS devices, DLP system, and Splunk on a daily basis.

Develop Standard Operating Procedures (SOP) for network system security, Operations security as well as Incidence response plan.

Develops Security Assessment Report (SAR).

Conducted follow up meetings to assist information system owners to close/remediate POA&M items

Develops System Security Plans (SSP) to provide an overview of system security requirements and describe the controls in place or planned by information system owners to meet those requirements.

Perform physical controls on data center.

Monitors security patch levels of the servers, workstations and network environments, and anti-virus system.

Stay up to dates on data breaches in the Industry and respective counter measures.

Develop enterprise wide best security practices.

Provides support and security overview on cloud-based solutions implementation, including private, community, hybrid, and public cloud deployment models.

Develops, reviews, and evaluated System Security plan based NIST special publications SP 800-53r4.

Provides detailed status updates on existing cybersecurity incidents daily to include follow up with client/customer to ensure satisfactory resolution.

Develops risk assessment reports, identifying threats and vulnerabilities applicable to the system.

Monitor progress on mandatory employee security trainings.

Conducts security control Assessment to assess the adequacy of management, operational, privacy, and technical security controls implemented

== Have a unique combination of technical abilities, communication skills and ability to multitask that allow me to collaborate with end-users or business owners effectively.

Stay up to date with trends in the cybersecurity Industry.

USCIS – McLean, VA Jan 2017 June 2020

Oracle DBA / Information Security Analyst/scrumaster

Experienced in both Oracle Application development and SDLC. Allocated system storage and plan future storage requirements by developing shell scripts that backup, and deleting archive logs every 15 minutes.

Involved in 24x7 on-call support for 12 databases of 20 TB 3 Node production for 10g and 11g RAC databases using Oracle 12c Cloud Control for alert monitoring and notification.

Responsible for setting and managing user management and space management, granting required privileges to users. Applied upgrade and security patches, maintenance, and interim (OPatch) patch on all databases.

Developed PL/SQL packages, DML, DDL, Oracle tables, stored procedures, functions, cursors, triggers, and UNIX shell scripts. Refreshed development and Test instances with data from production regularly.

Scheduled repetitive activities such as gathering schema statistics, exports, and table space usage report using crontab. Loaded data from flat files to database using SQL*Loader and External Tables.

Upgraded and migrated the database from 11.2.0.4 to 12.1 on RAC cluster; and migrated all databases using data pump from old server to new RAC cluster servers, applying patches whenever required.

Upgrading of databases from 11g to 12.1 and 12.2

supporting app focals applications

creating users accounts and users.

performance tuning on databases,

and Oracle 11g exp/imp data pump.

• Monitored and performed database sizing, tablespace management and rollback tablespace management, transaction management and security administration

• Created the database objects such as Tables, Indexes, Views, Database Triggers, Procedures, Functions, etc

. creating database links.

. Database and schemas migration using datapump

. Cumulative backups using RMAN. Troubleshooting with RMAN backup problem.

. Performance monitoring/tuning/troubleshooting on for systems: Oracle, UNIX, Linux.

. System resource management including bottleneck detection, contention tuning on SGA, CPU, Memory and I/O etc.

. Always prioritize to meet operational deadlines in fast paced environment with good stress management skills.

. SQL Net installation/configuration/troubleshooting (Server and Client side

Storage Management including fragmentation detection, tablespace growth ratio.

. Excellent interpersonal and strong analytical, problem-solving skills.

. Monitored the alert logs and troubleshot the errors.

. I was working on Unix, Solaris, AIX, NT, RedHat, Windows systems.

Data migration between databases using both Oracle 10g and 11g and 12c. export/import utility and Oracle 11g, 12c, exp/imp data pump.

Provided remote technical support using SSH and terminal services

•Troubleshooting, Restructuring and tuning for optimal performance of existing databases that were poorly designed for heavy hits.

•Design of databases following OFA: Creating Databases schemas, profiles, database links, Snapshots and Synonyms of objects as required to ensure data quality and security to comply with company's business rules. Oracle scripting in Windows/ Solaris and UNIX platform.

•Backup / Recovery methodology specification for mission critical databases

•Performed hot and cold Backups.

•Scheduled daily Exports/Imports to serve as temporary backup Red s.

•Configured Oracle OAM 12c,

•Configured the Domian,

•Configured the OUD,

•Configured Weblogic

•Confirgured HTTPS,

•Built Red system

•Buit server for the system.

CERTIFICATIONS:

Oracle 11gR2 OCA (No Experation date)

SCM Certified.

COMPTIA CASP+

PMP Certified



Contact this candidate