IT security professional with * years of
experience designing and implementing
security solutions in high-availability
environments. Skilled in FISMA, RMF,
and NIST Special Publications adept at
delivering strong risk management
practices.
Security Assessment & Authorization
Knowledgeable in POA&M
Management, RMF, FISMA, SSP, and
NIST Special Publications
Develops A&A Artifacts such as (PTA,
PIA, SSP, RAR, SAR)
Ability to multitask, work
independently and as part of a team
Effective interpersonal and
verbal/written communication skills
Tenable Nessus
Encryption
Managing security breaches
Bachelor of Science
Ashford University
San Diego, CA,
Health Informatics, 06/2014
Diploma in Information Management
And Communications
Institute of Management Studies
Ghana
Communications And Management,
07/1998
Multisys Cyber Technologies
Cybersecurity Analyst Gaithersburg, MD 05/2018 to Current
Conduct System Security Authorization, using FISMA and applicable NIST standards.
Develop, review, and evaluate System Security
documentations based on NIST Special Publications. Develop Security Assessment Report (SAR) detailing the results of the assessment along with Plan of Action and Milestones (POA&M).
Develop and conduct ST&E (Security Test and Evaluation) according to NIST SP 800-53A and NIST SP 800-53R4. Prepare recommendation reports that are made available to system owners to remediate identified vulnerabilities during the risk assessment process
Compile data to complete Residual Risk Report and transfer the contents into POA&M
Worked closely with team members to deliver project requirements, develop solutions and meet deadlines. Demonstrated leadership by making improvements to work processes and helping to train others.
Demonstrated self-reliance by meeting and exceeding workflow needs.
Analyzed system risk to identify and implement appropriate security countermeasures.
Paragon Systems
Information Security Analyst Herndon, VA 05/2015 to 04/2018
Maintain a high security standard of systems via
documentation and remediation of detected vulnerabilities after assessment of the damage.
Communicate vulnerabilities and anomalies that could be threats
Prepare and submit Security Assessment Plan (SAP) to CISO for approval
Develop Security Assessment Report (SAR) documenting all Richard
Boateng
**********@*****.***
Elkridge, MD 21075
Summary
Skills
Education and Training
Experience
RB
Certified Authorization Professional
(CAP)
the issues, findings, and recommendations detected after assessment.
Develop and update System Security Plan(SSP), and its appendices to provide an overview of system security requirements and describe the controls in place or planned by information system owners to meet those requirements.
Compile data to complete Residual Risk Report, and transfer the contents into Plan of Action and
Milestone(POA&M).
Assist in developing a continuous monitoring strategy for implemented security controls.
Monitor Security Controls to determine the security impact of proposed or actual changes to the information and its environment of operation.
Certifications