George Okauru
Raleigh, NC
919-***-**** *****************@*****.***
PROFESSIONAL SUMMARY
Experienced Information System Security Analyst with years of experience maintaining, reviewing, and updating information security system documentations, to include but not limited to System Security Plan (SSP), Plan of Action & Milestone (POA&M), Contingency Plan (CP), Incident Response Plan (IR) in accordance with NIST guideline and security practices. Experienced with NIST 800 SPs series such as NIST SP 800-18, 800-30, 800-37, 800-53 & 53A, 800-60, FIPS 199/200.
EDUCATION
B.S., Business Management - University of North Carolina Wilmington
CERTIFICATION
Certified Authorized Professional (CAP)
TECHNICAL SKILLS
Assessment Tool: CSAM
Operating System: Windows OS
Framework: NIST, FISMA
Scanning Tools: Tenable Nessus
Software: Microsoft Office
PROFESSIONAL EXPERIENCE
Visual Soft Inc - Vienna, VA May 2019 – Present
Information Security Analyst
Develop and maintain Authorization to Operate (ATO) package for information systems, review existing security artifacts to ensure they comply with organization’s information security requirements and make recommendations for mitigation.
Develop and provide input on existing documentation in compliance with security policies and agency guidance including FISMA and NIST special publications.
Conduct Assessment and Authorization (A&A) package for General Support System and Major application using the NIST Risk Management Framework (RMF) to ensure compliance with the Federal Information Security Management Act (FISMA). Developed and maintained System Security Plan (SSP) and POA&M to obtain the authority to operate (ATO).
Maintain, review and update Information Security System documentations, includes but not limited to System Security Plan (SSP), Plan of Action & Milestone (POA&M).
Develop and update system security plan (SSP) to provide an overview of federal information systems security requirements and implementation of security controls.
D-Vine Consulting LLC - Bowie, MD April 2017 – May 2019
Information System Security Officer
Categorize information system using appropriate standards and NIST guidance.
Developed and update system security plan (SSP) in CSAM to provide an overview of federal information systems security requirements and implementation of security controls.
Maintain, review and update Information Security System documentations, includes but not limited to System Security Plan (SSP), Plan of Action & Milestone (POA&M), Contingency Plan (CP), CPT, Incident Response Plan (IR), Privacy Threshold Analysis (PTA), PIA.
Perform Assessment and Authorization in compliance with FISMA & NIST standard.
Create Plan of Action and Milestones (POA&M) in CSAM based on the review of Security Assessment Report (SAR) and vulnerability scan report to track the remediation of identified vulnerabilities to closure. Ensure compliance with regulatory and statutory security requirements like NIST and FISMA in securing information systems.
The TEK– Raleigh, NC February 2015 – April 2017
Help Desk Support
Assigned issues to appropriate support group for thorough support and prompt resolution.
Researched and resolved technical issues maintain technical aptitude and support corporate initiatives and team department goals according to direction of management.
Interacted with users to provide and process information in response to problems, inquiries, concerns and/or requests, collaborate with customers to resolve application, phone, printer, or computer problems in real time. Worked closely with clients and staffs to ensure smooth, uninterrupted operation of network client workstations, servers, and perform other assigned duties.
Sunstate Security – Raleigh, NC January 2010 – February 2015
Security Officer
Oversee daily monitoring and patrolled buildings, grounds, and work sites.
Gathered information, identified, and implemented resolution, planned follow-up, and logged
and filed incident report to successfully manage complaints.
Conducted regular patrols of key areas to spot and control security concerns.
Reported suspicious activities and persons to law enforcement.
Monitored central alarm systems for fire, intrusion, and duress alarms.
Inspected suspicious activities and monitored premises for criminal acts and rule infractions.
Patrolled and monitored premises in company vehicle, on bicycle and by foot.
Greeted guests professionally and courteously to cultivate welcoming atmosphere while
making safety top priority.