Post Job Free

Resume

Sign in

System Security Supply Chain

Location:
Colorado Springs, CO
Posted:
March 07, 2024

Contact this candidate

Resume:

Eunice Brathier, CompTIA SEC+

Colorado Springs, CO 316-***-**** ad36a6@r.postjobfree.com

Secret Clearance DoD

Summary

A team player with leadership skills, and the ability to manage diverse project teams with 7yrs Experience in information system security, risk management, and vendor-supply chain management. Fluent in multiple languages, English, and French. Experience working in a technical environment interfacing with all engineering disciplines and able to work well in a team environment. Possesses extensive experience using SAP and Microsoft Office Suite applications. BMC Remedy, IBM CLM, and Microsoft SharePoint.

Education

Bachelor of science with a concentration in Accounting Wichita State University – KS (Dec. 2016)

Certifications

CompTIA Security+ Certification (COMP001021992392) 02/2022, - (IAM-I) and (IAT-II) CSWF Compliance. Linux training

Core Competencies: Systems Administrator, Incident Response, Regulatory Compliance, Security & Vulnerability Assessment, Cybersecurity, NIST 800-37 Risk Management Framework (RMF) Security Assessment and Authorization (SA&A), Plan of Action and Milestones (POA&M), System Security Plans (SSP), Security Assessment Report (SAR), Continuous Monitoring (CM), Contingency Plans (ISCP)

Professional Experience

IT Specialist- T & H SERVICES, CO July 2023-Present

Assessed system vulnerabilities, implemented risk mitigation strategies, validated secure systems, and tested security products and systems to detect security weaknesses.

Supporting the processing, tracking, and monitoring of Change Requests and Configuration Change Requests submitted by the customer.

Providing patch management process support to ensure software patches being pushed from the corporate level are completed.

Supporting the tracking and publishing of relevant metrics as well as Updating and maintaining Standard Operating Procedures for Configuration Management process.

Install, operate, and perform unit maintenance on multi-functional/multi-user information processing systems, peripheral equipment, and auxiliary devices.

Gathering and auditing artifacts, as well as migrating and monitoring the necessary changes as related to system development.

Resolve network performance issues and establish a disaster recovery plan. Supporting the tracking and publishing of relevant metrics

Updating and maintaining Standard Operating Procedures for the CM process

Recommends upgrades, patches and new applications and equipment.

Develop and implement security policies, procedures, and measures to protect computer systems and data.

Supports, designs, maintains, and monitors internal and external networks.

Configure and manages all applications, and system including firewalls, intrusion detection system security, and antivirus software.

Assisted in integrating cybersecurity into the overall design and implementation of system application while ensuring that security aligns with the organization’s business objectives.

Trained system users on new or changed operating systems, IT equipment, software, and/or the application of security guidelines.

Educate users on best practices for safe computing and data protection.

System Administrator- - U.S. ARMY – Fort Carson, CO February 2017–December 2022

Worked with developer teams to understand their requirements and configure systems appropriately.

Troubleshooted application issues that arose during deployments and tuned environment for performance enhancements and security requirements.

Setting up SELinux, firewall configuration, ACLs, user management, sudo, yum.

Experienced configuring Grafana and Prometheus to monitor the system.

Experienced with Red Hat, CentOS, VMware ESXi, Filesystem management (ext4, VFAT, XFS).

Experienced Utilizing LVM to manage filesystem, & Linux server troubleshooting skills.

Linux server deployment, administration, patching, and network troubleshooting.

Experienced with NFS, DHCP, TCP/IP, SSH, LDAP, DNS.

Used vulnerability scan tools such as Nessus and Nmap to detect vulnerabilities within the system.

Investigated information system security violations and helped prepare reports specifying corrective and preventative actions.

Performed cybersecurity technical review of the system security configurations.

Identified security weaknesses and documented the weaknesses in the Security Assessment Report (SAR).

Continuously monitor computer systems, networks, and applications for security vulnerabilities and threats.



Contact this candidate