Richard Somuah
Grayson Falls Ln, Springs, TX ****9• 614-***-**** • *******.******@*******.***
SKILLS AND CORE COMPETENCIES
• Experienced in Managing Rapid7 (insight VM)
• Privacy Impact Assessment, POAM
• FIPS, Risk Management Framework (RMF)
• Ability to Managing Complexity & Data Integrity
• NIST Publications & Standards SP 800-53 Rev 4 & 5
• Experience in Managing Kenna VM
• Proficient in Microsoft Azure for Cloud Computing
• Experienced in Managing Qualys, Tennable.io
• Stakeholder management (Splunk, confluence, Jira)
• Vulnerability Management Analysis
• Excellent communication and collaboration skills to work effectively within a team environment
PROFESSIONAL EXPERIENCE
Dell Technologies
Snr Vulnerability assessment methodology Analyst - (Sept. 2021-Present) Round Rock, Texas
• Conducted Business Resiliency and Continuity, Disaster Recovery, Incident Response as well as IT Audit, Regulatory Support.
• Conducted comprehensive vulnerability assessments utilizing methodologies such as CVSS and OWASP, resulting in enhanced security posture and risk mitigation.
• Monitored SIEM Tools, including Splunk, to promptly identify and respond to security incidents, ensuring timely resolution and minimal impact on operations.
• Managed risk exposure to cyber threats by proactively identifying vulnerabilities and implementing effective remediation strategies.
• Developed and implemented automated and continuous scanning techniques to support IT and application teams, improving overall system reliability and security.
• Contributed to the enhancement of the vulnerability scanning and tools program by delivering high-quality outputs and participating in future planning aligned with industry best practices and internal requirements.
• Actively participated in transitioning to Agile framework for planning and executing cybersecurity initiatives, fostering agility and responsiveness to evolving security challenges.
• Identified vulnerabilities across deployed technologies, converting findings into actionable remediation tasks to address security gaps effectively.
• Provided detailed scan reports and progress updates on remediation activities to stakeholders, ensuring transparency and accountability in addressing security issues.
• Conducted analysis and review of false positives in Rapid7, optimizing scan results for more accurate threat identification and prioritization.
• Deployed Rapid7 engines (Windows & Linux), Rumble, and conducted agent installations to facilitate comprehensive vulnerability scanning and assessment.
• Ran vulnerability scans in Rapid7, Tenable, and Qualys platforms, delivering comprehensive insights into system vulnerabilities and potential risks.
• Utilized FastApi to streamline onboarding of AD Groups to Dell Scan Gateway Portal, improving efficiency in access management and security administration.
• Maintained oversight of ongoing security issues, collaborating with relevant parties to assess and resolve issues promptly, ensuring continuous protection against cyber threats.
• Managed, searched, and tracked assets using Kenna VM. DXC Technologies
Senior Compliance Manager (Aug, 2019 – Sep, 2021) Houston, TX
• Conducted comprehensive security assessments utilizing industry-leading tools such as Nessus, Qualys, and Rapid7, employing advanced vulnerability testing methodologies and meticulous risk analysis.
• Utilized the Splunk SIEM tool to analyze security breaches, identifying root causes and facilitating swift and effective incident response measures.
• Ensured prompt implementation of protection or corrective measures upon discovery of system incidents or vulnerabilities, minimizing potential impact and enhancing system security.
• Prioritized intrusion detection, diligently addressing unprotected vulnerabilities, and fortifying remote access points to maintain robust security posture.
• Offered strategic recommendations for enhancing security systems flagged as risks, providing detailed modification plans to mitigate potential threats effectively.
• Managed and optimized existing security solutions, including firewalls, anti-virus software, and intrusion detection systems, to uphold system integrity and resilience against emerging threats.
• Leveraged ServiceNow to efficiently create and track incident tickets, streamlining incident management processes and ensuring timely resolution.
Richard S. pg. 2
• Conducted both internal and external security audits, meticulously tracking findings and facilitating updates through effective communication and collaboration with relevant stakeholders.
• Maintained up-to-date knowledge of the company's incident response and disaster recovery plans, contributing to continuous improvement and readiness in addressing security incidents.
• Actively participated in OS patch management and coordination efforts, ensuring systems remain updated and fortified against known vulnerabilities.
• Facilitated weekly meetings to foster collaboration and alignment between the Cybersecurity Asset Manager (CAM) and service delivery teams, enhancing operational efficiency and effectiveness.
• Utilized a comprehensive suite of security controls, including SIEM, EDR, network security, phishing defense, and identity access management, to proactively respond to and mitigate the likelihood of significant security events. Exela Technologies
Information Security Analyst/SCA (Jul 2016– Aug 2019) Woodlands, TX
• Meticulously conducted comprehensive risk analysis, by thoroughly evaluating assets within system boundaries, and systematically identifying potential vulnerabilities.
• Assessed security controls in strict adherence to assessment procedures outlined in the Security Assessment Plan (SAP), employing a multifaceted approach encompassing examination, interviews, and rigorous testing methodologies.
• Initiated prompt remediation actions on security controls based on meticulous analysis of findings and recommendations outlined in the Security Assessment Report (SAR), ensuring thorough reassessment of remediated controls as deemed necessary.
• Spearheaded comprehensive security assessments by meticulously reviewing System Security Plans (SSP) to develop Kick- Off Presentation Slides, Security Assessment Plans (SAP), and detailed Security Control Assessment (SCA) matrices.
• Facilitated the upload of Plan of Action and Milestones (POA&Ms) into CSAM, meticulously validating provided artifacts to for efficient remediation of POA&Ms.
• Crafted comprehensive Security Assessment Reports (SAR) to furnish stakeholders with in-depth insights into the security posture of their systems, meticulously aligning with controls outlined in NIST SP 800-53 Rev. 5.
• Scheduled meetings with diverse system teams to gather evidence, develop robust test plans and procedures, and meticulously document test results and exceptions.
• Reviewed and enforced timely remediation of audit issues through thorough review of POA&Ms, ensuring adherence to established security protocols and standards.
• including System Security Plan (SSP), FIPS 199 Categorization, PIA, ST&E, SAP, DRP, IRP, ISCP, and CMP to meet stringent regulatory and compliance standards.
• Managed and optimized existing security solutions, including Meraki firewalls, anti-virus software, intrusion detection systems, and implemented cutting-edge security tools such as Intrusion Detection Prevention (IDP) tools and End Vulnerability Scanners (e.g., Nessus, Nexpose), as well as Security Information and Event Management (SIEM) systems, to safeguard organizational assets and data integrity. EDUCATION
• Ass. Applied Sciences, Columbus State Community College Columbus, OH CAPSTONE PROJECTS
• Developed and effectively manage the Vulnerability Management Department
• Develops standard operating procedures around the internal Vulnerability Management remediations and planning
• Works directly with other departments to help with vulnerability remediation.
• Trains others on the team and teach them vulnerability Management the use of Tenable.io, strategies and methodologies of mitigating risk
CERTIFICATIONS AND INTERESTS
• Certified Information Security Manager (CISM), ISACA
• CompTIA Security+
• ITIL (R) Foundation: ITIL 4 Edition
LinkedIn profile: Here