Post Job Free

Resume

Sign in

Information Security Customer Service

Location:
Bloomington, IN
Posted:
February 03, 2024

Contact this candidate

Resume:

Chibuike Ndukaku

Bloomington, IN *****

812-***-**** ad3bz7@r.postjobfree.com

Professional Summary

Highly motivated Information Security Analyst / Security Control Assessor with more than 7 years of experience performing assessments and protecting enterprise information systems. Possess expertise in customer service management, security, and data protection, team leadership, project management, strategic planning, policy and procedure reinforcement. Experienced with GRC tools and Vulnerability assessment tools. Proficient in Vulnerability Management, A&A, and System Development Life Cycle (SDLC). Detailed-oriented, with strong problem-solving and organizational skills. Excellent communication skills with the ability to build and lead high-performance teams to drive positive results.

Skills

Excellent communication, collaboration, and presentation skills. Proven detail-oriented and problem-solving abilities.

Experienced in GRC tools (CSAM, ServiceNow)

Experience with the following industry/regulatory requirements and frameworks: such as

ISO 27001 and 27002, HIPAA, NIST 800 Series, SANS 20, and FedRAMP.

Experience with Vulnerability assessment scanning tools such as Tenable Nessus, and Qualys, analyzing and validating vulnerability scan reports.

Experienced in SIEM technologies such as Splunk, IDS/IPS, Firewall Logs

Microsoft Office (Word, Excel, PowerPoint)

Knowledge of AWS cloud services

Security Technologies: Windows Operating systems, McAfee ePolicy Orchestrator, Imperva Secure Sphere

(WAF), Cisco IronPort, MS Exchange, Mail Filtering. Vulnerability Scanning/Assessments, Symantec EndPoint

Protection, Sumologic, Vectre, FireEye, Wireshark, Splunk

Incident Response Management, Security Control Evaluation

Access Control Management, Two-Factor Authentication

Security Policy Development, Threat Intelligence Analysis

Risk Assessment Expertise, Intrusion Detection Systems

Identity Management, System Security Planning, User Awareness Training

Developing Security Plans, Business Continuity Planning

Regulatory Compliance

Risk Mitigation, Resource Allocation, Disaster Recovery.

Work History

10/2022 to Current

Security Controls Assessor

Deltaah Tech Consulting – Berwyn Heights, MD

Provide assessment reports on the severity of findings/weaknesses and recommend corrective actions for mitigating vulnerabilities and exploits to the information and information system.

Develop Security Authorization Packages that are compliant with FedRAMP and perform detailed security assessments.

Perform comprehensive Security Assessments as part of the A&A process to determine if controls are being implemented correctly, operating as intended, and meeting the desired objectives.

Prepare Assessment and Authorization (A&A) packages, which include but are not limited to SSP, SAP, RTM, RA, SAR and POAM for ATO

Review the A&A Packages to ensure they remain current and security operations are following NIST 800-53 standards, FISMA, and the organization's policies and procedures.

Assist in developing and maintaining information security policies, standards, and procedures relating to Management, Operational, and Technical controls.

Review the POAM to validate the items uploaded in the POAM tracking tools to support the closed findings and coordinate promptly with stakeholders to ensure timely remediation of security weaknesses.

Provide expert analysis and advice on systems and programs related to IT security problems and provide recommendations.

Perform Assessment and Authorization on General Support Systems (GSS) and Major applications to ensure environments are operating within a strong security posture.

Perform vulnerability scans for Database, Network, and Web Applications for clients using Nessus and gather information necessary to maintain system security.

Conduct Privacy Threshold Analysis (PTA) and recommend Privacy Impact Analysis where necessary.

Provide routine support of IT security programs to ensure that security objectives of Confidentiality, Integrity, and Availability are met.

09/2017 to 09/2022

Information Systems Security Officer

Deltaah Tech Consulting – Berwyn Heights, MD

Participated in business continuity and disaster recovery preparedness activities.

Reviewed and recommended updates to information security policies, standards and guidelines

Defined security practices and standards to safeguard company assets and data.

Identified improvement areas and provide organization-wide security awareness training.

Reviewed security controls, policies and procedures and provided recommendations for the adaption of new technologies or policies.

Conducted FISMA-based security risk assessments for government contracting organizations and application systems, including interviews, tests, and inspections; produced assessment reports and recommendations; conducted out-briefings.

Performed security categorization, using FIPS 199, and reviewed Privacy Threshold Analysis (PTA), and E-Authentication with business owners and selected stakeholders.

Obtained and reviewed FedRAMP ATO packages for SaaS and PaaS applications

Conduct continuous monitoring on SaaS applications that have been procured by the agency and provide status updates to the stakeholders.

Assessments conducted following NIST 800 processes and controls.

Perform security categorization, using FIPS 199, and review Privacy Threshold Analysis (PTA), and E-Authentication with business owners and selected stakeholders.

Develop NIST Compliant vulnerability assessments, technical documentation, and Plans of Action and Milestone (POA&M), and address system weaknesses.

Perform comprehensive Security Control Assessment (SCA) and prepare report on management, operational and technical security controls for audited applications and information systems.

Reviewed and Analyzed System Security Plan (SSP), Security Assessment Report (SAR), Security Plan of Action and Milestones (POA&M), Authorization letter/memorandum (ATO).

Risk Management Framework (RMF) assessments and Continuous Monitoring: Performed RMF assessment on several different environments using both scanning tools and manual assessment.

Assessment included initiating meetings with various System Owners and Information System Security Officers (ISSO), providing guidance of evidence needed for security controls, and documenting findings of assessment.

Conducted risk assessments regularly; ensured measures raised in assessments were implemented in accordance with risk profile, and root-causes of risks were fully addressed following NIST 800-30 and NIST 800-37

Conducted comprehensive reviews of Cloud Systems seeking Agency Authorization using FedRAMP standards and provide Authorization recommendation to the Authorizing Official

Documented and Reviewed security plans (SP), contingency plans (CP), contingency plan tests (CPT), privacy impact assessments (PIA), and risk assessment (RA) documents per NIST 800 guidelines for various government agencies.

Education

05/2011

Bachelor of Science (B.Sc)

Nnamdi Azikiwe University - Awka, Nigeria

Certifications

CompTIA Security +, CISM



Contact this candidate